Cyber Crossroads: A Global Research Collaborative on Cyber Risk
Governance
- URL: http://arxiv.org/abs/2107.14065v1
- Date: Thu, 8 Jul 2021 11:58:27 GMT
- Title: Cyber Crossroads: A Global Research Collaborative on Cyber Risk
Governance
- Authors: Gregory Falco, Paul Cornish, Sadie Creese, Madeline Carr, Myriam Dunn
Cavelty, Claudia Eckert, Herbert Lin, Gen Goto, Jamie Saunders, Andrew
Grotto, Howard Shrobe, Sean Kanuck, Lawrence Susskind, Arvind Parthasarathi
- Abstract summary: Cyber Crossroads was born out of alarming trends and a realization that the world cannot go on funneling finite resources into an intractable problem.
Cyber Crossroads brings together expertise from across the world, spanning aspects of the cyber problem.
A Cyber Standard of Care should be applicable across industries and regardless of the organization size.
- Score: 2.704346519025199
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Spending on cybersecurity products and services is expected to top 123
billion U.S. dollars for 2020, more than double the 55 billion U.S. dollars
spent in 2011.1 In that same period, cyber breaches quadrupled. Organizations
globally face increasing liabilities, while boards of directors grapple with a
seemingly Sisyphean challenge. Cyber Crossroads was born out of these alarming
trends and a realization that the world cannot go on funneling finite resources
into an indefinite, intractable problem. Cyber Crossroads brings together
expertise from across the world, spanning aspects of the cyber problem
(including technology, legal, risk, and economic) with the goal of creating a
Cyber Standard of Care built through a global, not-for-profit research
collaborative with no commercial interests. A Cyber Standard of Care should be
applicable across industries and regardless of the organization size. It should
be practical and implementable, with no requirement to purchase any
product/service. Cyber Standard of Care should be woven into the existing
governance fabric of the organization and it should not be yet another
technical checklist, but a process/governance framework that can stand over
time. To achieve this, we engaged with cyber risk experts and practitioners
with a variety of relevant expertise, secured the advice/guidance of regulators
and legal experts across jurisdictions, and interviewed leaders from 56
organizations globally to understand their challenges and identify best
practices.
Related papers
- Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns [13.075370397377078]
We use ongoing work on the Cyber Security Body of Knowledge (CyBOK) to help elicit and document the responsibilities and ethics of the profession.
Based on a literature review of the ethics of cybersecurity, we use CyBOK to frame the exploration of ethical challenges in the cybersecurity profession.
Our findings indicate that there are broad ethical challenges across the whole of cybersecurity, but also that different areas of cybersecurity can face specific ethical considerations.
arXiv Detail & Related papers (2023-11-16T19:44:03Z) - Proceedings of the 2nd International Workshop on Adaptive Cyber Defense [0.0]
The 2nd International Workshop on Adaptive Cyber Defense was held at the Florida Institute of Technology, Florida.
This workshop was organized to share research that explores unique applications of Artificial Intelligence (AI) and Machine Learning (ML)
The cyber domain cannot currently be reliably and effectively defended without extensive reliance on human experts.
arXiv Detail & Related papers (2023-08-18T12:56:04Z) - International Institutions for Advanced AI [47.449762587672986]
International institutions may have an important role to play in ensuring advanced AI systems benefit humanity.
This paper identifies a set of governance functions that could be performed at an international level to address these challenges.
It groups these functions into four institutional models that exhibit internal synergies and have precedents in existing organizations.
arXiv Detail & Related papers (2023-07-10T16:55:55Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Cybersecurity in the Smart Grid: Practitioners' Perspective [1.9798034349981157]
We interviewed 18 entities, operating in diverse countries in Europe.
Some threats appear to be much less dangerous than what is claimed in related papers.
Some technological paradigms have dubious utility for practitioners, but are actively promoted by literature.
arXiv Detail & Related papers (2022-10-24T11:09:14Z) - Hyperloop: A Cybersecurity Perspective [56.82349944873289]
We provide the first analysis of the cybersecurity challenges of the interconnections between the different components of the Hyperloop ecosystem.
We investigate possible infrastructure management approaches and their security concerns.
We discuss countermeasures and future directions for the security of the Hyperloop design.
arXiv Detail & Related papers (2022-09-07T12:10:36Z) - Future Computer Systems and Networking Research in the Netherlands: A
Manifesto [137.47124933818066]
We draw attention to CompSys as a vital part of ICT.
Each of the Top Sectors of the Dutch Economy, each route in the National Research Agenda, and each of the UN Sustainable Development Goals pose challenges that cannot be addressed without CompSys advances.
arXiv Detail & Related papers (2022-05-26T11:02:29Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Proceedings of the 1st International Workshop on Adaptive Cyber Defense [0.0]
The 1st International Workshop on Adaptive Cyber Defense was held as part of the 2021 International Joint Conference on Artificial Intelligence.
The cyber domain cannot currently be reliably and effectively defended without extensive reliance on human experts.
bridging critical gaps between AI and Cyber researchers and practitioners can accelerate efforts to create semi-autonomous cyber defenses.
arXiv Detail & Related papers (2021-08-19T03:41:48Z) - A Review on Cyber Crimes on the Internet of Things [4.207621961895129]
The global cybercrime damages predicted to cost up to 6 trillion dollars annually on the global economy by cyber crime.
The reasons for cyber-attacks can be Countries having week cyber securities, Cybercriminals use new technologies to attack.
MSP (Managed Service Providers) face different difficulties in fighting with Cyber-crime.
arXiv Detail & Related papers (2020-09-12T02:56:59Z) - When Wireless Communication Faces COVID-19: Combating the Pandemic and
Saving the Economy [93.08344893433639]
The year 2020 is experiencing a global health and economic crisis due to the COVID-19 pandemic.
Countries across the world are using digital technologies to fight this global crisis.
We show how these technologies are helping to combat this pandemic, including monitoring of the virus spread.
We discuss the challenges faced by wireless technologies, including privacy, security, and misinformation.
arXiv Detail & Related papers (2020-05-12T12:27:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.