AIS Logo
Living knowledge for digital leadership
All AI Governance & Ethics Digital Transformation & Innovation Supply Chain & IoT SME & IT Management Platform Ecosystems & Strategy Cybersecurity & Risk AI Applications & Technologies Healthcare & Well-being Digital Work & Collaboration
Unpacking Board-Level IT Competency

Unpacking Board-Level IT Competency

Jennifer Jewer, Kenneth N. McKay
This study investigates how to best measure IT competency on corporate boards of directors. Using a survey of 75 directors in Sri Lanka, the research compares the effectiveness of indirect 'proxy' measures (like prior work experience) against 'direct' measures (assessing specific IT knowledge and governance practices) in reflecting true board IT competency and its impact on IT governance.

Problem Many companies struggle with poor IT governance, which is often blamed on a lack of IT competency at the board level. However, there is no clear consensus on what constitutes board IT competency or how to measure it effectively. Previous research has relied on various proxy measures, leading to inconsistent findings and uncertainty about how boards can genuinely improve their IT oversight.

Outcome - Direct measures of IT competency are more accurate and reliable indicators than indirect proxy measures.
- Boards with higher directly-measured IT competency demonstrate stronger IT governance.
- Among proxy measures, having directors with work experience in IT roles or management is more strongly associated with good IT governance than having directors with formal IT training.
- The study validates a direct measurement approach that boards can use to assess their competency gaps and take targeted steps to improve their IT governance capabilities.
Board of Directors, Board IT Competency, IT Governance, Proxy Measures, Direct Measures, Corporate Governance
The Impact of Gamification on Cybersecurity Learning: Multi-Study Analysis

The Impact of Gamification on Cybersecurity Learning: Multi-Study Analysis

J.B. (Joo Baek) Kim, Chen Zhong, Hong Liu
This paper systematically assesses the impact of gamification on cybersecurity education through a four-semester, multi-study approach. The research compares learning outcomes between gamified and traditional labs, analyzes student perceptions and motivations using quantitative methods, and explores learning experiences through qualitative interviews. The goal is to provide practical strategies for integrating gamification into cybersecurity courses.

Problem There is a critical and expanding cybersecurity workforce gap, emphasizing the need for more effective, practical, and engaging training methods. Traditional educational approaches often struggle to motivate students and provide the necessary hands-on, problem-solving skills required for the complex and dynamic field of cybersecurity.

Outcome - Gamified cybersecurity labs led to significantly better student learning outcomes compared to traditional, non-gamified labs.
- Well-designed game elements, such as appropriate challenges and competitiveness, positively influence student motivation. Intrinsic motivation (driven by challenge) was found to enhance learning outcomes, while extrinsic motivation (driven by competition) increased career interest.
- Students found gamified labs more engaging due to features like instant feedback, leaderboards, clear step-by-step instructions, and story-driven scenarios that connect learning to real-world applications.
- Gamification helps bridge the gap between theoretical knowledge and practical skills, fostering deeper learning, critical thinking, and a greater interest in pursuing cybersecurity careers.
Gamification, Cybersecurity Learning, Student Motivation, Learning Outcomes, Mixed-method Design, PLS-SEM
Digital Resilience in High-Tech SMEs: Exploring the Synergy of AI and IoT in Supply Chains

Digital Resilience in High-Tech SMEs: Exploring the Synergy of AI and IoT in Supply Chains

Adnan Khan, Syed Hussain Murtaza, Parisa Maroufkhani, Sultan Sikandar Mirza
This study investigates how digital resilience enhances the adoption of AI and Internet of Things (IoT) practices within the supply chains of high-tech small and medium-sized enterprises (SMEs). Using survey data from 293 Chinese high-tech SMEs, the research employs partial least squares structural equation modeling to analyze the impact of these technologies on sustainable supply chain performance.

Problem In an era of increasing global uncertainty and supply chain disruptions, businesses, especially high-tech SMEs, struggle to maintain stability and performance. There is a need to understand how digital technologies can be leveraged not just for efficiency, but to build genuine resilience that allows firms to adapt to and recover from shocks while maintaining sustainability.

Outcome - Digital resilience is a crucial driver for the adoption of both IoT-oriented supply chain practices and AI-driven innovative practices.
- The implementation of IoT and AI practices, fostered by digital resilience, significantly improves sustainable supply chain performance.
- AI-driven practices were found to be particularly vital for resource optimization and predictive analytics, strongly influencing sustainability outcomes.
- The effectiveness of digital resilience in promoting IoT adoption is amplified in dynamic and unpredictable market environments.
Digital Resilience, Internet of Things-Oriented Supply Chain Management Practices, AI-Driven Innovative Practices, Supply Chain Dynamism, Sustainable Supply Chain Performance
How Verizon Media Built a Cybersecurity Culture

How Verizon Media Built a Cybersecurity Culture

Keri Pearlson, Josh Schwartz, Sean Sposito, Masha Arbisman
This case study examines how Verizon Media's security organization, known as “The Paranoids,” successfully built a strong cybersecurity culture across its 20,000 employees. The study details the formation and strategy of the Proactive Engagement (PE) Group, which used a data-driven, three-step process involving behavioral goals, metrics, and targeted actions to change employee behavior. This approach moved beyond traditional training to create lasting cultural change.

Problem Human error is a primary cause of cybersecurity breaches, with reports indicating it's involved in up to 85% of incidents. Standard cybersecurity awareness training is often insufficient because employees fail to prioritize security or find security protocols cumbersome. This creates a significant gap where organizations remain vulnerable despite technical defenses, highlighting the need for a deeper cultural shift to make security an ingrained value.

Outcome - The rate of employees having their credentials captured in phishing simulations was cut in half.
- The number of accurately reported phishing attempts by employees doubled.
- The usage of the corporate password manager tripled across the company.
- The initiative successfully shifted the organizational mindset by using transparent dashboards, positive reinforcement, and practical tools rather than relying solely on awareness campaigns.
- The study provides a replicable framework for other organizations to build a security culture by focusing on changing values and beliefs, not just actions.
Cybersecurity Culture, Organizational Behavior, Change Management, Verizon Media, Phishing Simulation, Employee Training, Information Security
Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense

Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense

Ilya Kabanov, Stuart Madnick
This study provides an in-depth analysis of the 2017 Equifax data breach, which affected 148 million people. Using the Cybersafety method, the authors reconstructed the attack flow and Equifax's hierarchical safety control system to identify systemic failures. Based on this analysis, the paper offers recommendations for managers to strengthen their organization's cybersecurity.

Problem Many organizations miss the opportunity to learn from major cybersecurity incidents because analyses often focus on a single, direct cause rather than addressing deeper, systemic root causes. This paper addresses that gap by systematically investigating the Equifax breach to provide transferable lessons that can help other organizations prevent similar catastrophic failures.

Outcome - The breach was caused by 19 systemic failures across four hierarchical levels: technical controls (e.g., expired certificates), IT/Security teams, management and the board, and external regulators.
- Critical technical breakdowns included an expired SSL certificate that blinded the intrusion detection system for nine months and vulnerability scans that failed to detect the known Apache Struts vulnerability.
- Organizational shortcomings were significant, including a reactive patching process, poor communication between siloed IT and security teams, and a failure by management to prioritize critical security upgrades.
- The board of directors failed to establish an appropriate risk appetite, prioritizing business growth over information security, which led to a culture where security was under-resourced.
- The paper offers 11 key recommendations for businesses, such as limiting sensitive data retention, embedding security into software design, ensuring executive leadership has a say in cybersecurity decisions, and fostering a shared sense of responsibility for security across the organization.
cybersecurity, data breach, Equifax, risk management, incident analysis, IT governance, systemic failure
Learning from Enforcement Cases to Manage GDPR Risks

Learning from Enforcement Cases to Manage GDPR Risks

Saeed Akhlaghpour, Farkhondeh Hassandoust, Farhad Fatehi, Andrew Burton-Jones, Andrew Hynd
This study analyzes 93 enforcement cases of the European Union's General Data Protection Regulation (GDPR) to help organizations better manage compliance risks. The research identifies 12 distinct types of risks, their associated mitigation measures, and key risk indicators. It provides a practical, evidence-based framework for businesses to move beyond a simple checklist approach to data privacy.

Problem The GDPR is a complex and globally significant data privacy law, and noncompliance can lead to severe financial penalties. However, its requirement for a 'risk-based approach' can be ambiguous for organizations, leaving them unsure of where to focus their compliance efforts. This study addresses this gap by analyzing real-world fines to provide clear, actionable guidance on the most common and costly compliance pitfalls.

Outcome - The analysis of 93 GDPR enforcement cases identified 12 distinct risk types across three main areas: organizational practices, technology, and data management.
- Common organizational risks include failing to obtain valid user consent, inadequate data breach reporting, and a lack of due diligence in mergers and acquisitions.
- Key technology risks involve inadequate technical safeguards (e.g., weak encryption), improper video surveillance, and unlawful automated decision-making or profiling.
- Data management risks focus on failures in providing data access, minimizing data collection, limiting data storage periods, and ensuring data accuracy.
- The study proposes four strategic actions for executives: adopt a risk-based approach globally, monitor the evolving GDPR landscape, use enforcement evidence to justify compliance investments, and strategically select a lead supervisory authority.
GDPR, Data Privacy, Risk Management, Data Protection, Compliance, Enforcement Cases, Information Security
Exploring the Agentic Metaverse's Potential for Transforming Cybersecurity Workforce Development

Exploring the Agentic Metaverse's Potential for Transforming Cybersecurity Workforce Development

Ersin Dincelli, Haadi Jafarian
This study explores how an 'agentic metaverse'—an immersive virtual world powered by intelligent AI agents—can be used for cybersecurity training. The researchers presented an AI-driven metaverse prototype to 53 cybersecurity professionals to gather qualitative feedback on its potential for transforming workforce development.

Problem Traditional cybersecurity training methods, such as classroom instruction and static online courses, are struggling to keep up with the fast-evolving threat landscape and high demand for skilled professionals. These conventional approaches often lack the realism and adaptivity needed to prepare individuals for the complex, high-pressure situations they face in the real world, contributing to a persistent skills gap.

Outcome - The concept of an AI-driven agentic metaverse for training was met with strong enthusiasm, with 92% of professionals believing it would be effective for professional training.
- Key challenges to implementing this technology include significant infrastructure demands, the complexity of designing realistic AI-driven scenarios, ensuring security and privacy, and managing user adoption.
- The study identified five core challenges: infrastructure, multi-agent scenario design, security/privacy, governance of social dynamics, and change management.
- Six practical recommendations are provided for organizations to guide implementation, focusing on building a scalable infrastructure, developing realistic training scenarios, and embedding security, privacy, and safety by design.
Agentic Metaverse, Cybersecurity Training, Workforce Development, AI Agents, Immersive Learning, Virtual Reality, Training Simulation
Corporate Governance for Digital Responsibility: A Company Study

Corporate Governance for Digital Responsibility: A Company Study

Anna-Sophia Christ
This study examines how ten German companies translate the principles of Corporate Digital Responsibility (CDR) into actionable practices. Using qualitative content analysis of public data, the paper analyzes these companies' approaches from a corporate governance perspective to understand their accountability structures, risk regulation measures, and overall implementation strategies.

Problem As companies rapidly adopt digital technologies for productivity gains, they also face new and complex ethical and societal responsibilities. A significant gap exists between the high-level principles of Corporate Digital Responsibility (CDR) and their concrete operationalization, leaving businesses without clear guidance on how to manage digital risks and impacts effectively.

Outcome - The study identified seventeen key learnings for implementing Corporate Digital Responsibility (CDR) through corporate governance.
- Companies are actively bridging the gap from principles to practice, often adapting existing governance structures rather than creating entirely new ones.
- Key implementation strategies include assigning central points of contact for CDR, ensuring C-level accountability, and developing specific guidelines and risk management processes.
- The findings provide a benchmark and actionable examples for practitioners seeking to integrate digital responsibility into their business operations.
Corporate Digital Responsibility, Corporate Governance, Digital Transformation, Principles-to-Practice, Company Study
Agile design options for IT organizations and resulting performance effects: A systematic literature review

Agile design options for IT organizations and resulting performance effects: A systematic literature review

Oliver Hohenreuther
This study provides a comprehensive framework for making IT organizations more adaptable by systematically reviewing 57 academic papers. It identifies and categorizes 20 specific 'design options' that companies can implement to increase agility. The research consolidates fragmented literature to offer a structured overview of these options and their resulting performance benefits.

Problem In the fast-paced digital age, traditional IT departments often struggle to keep up with market changes and drive business innovation. While the need for agility is widely recognized, business leaders lack a clear, consolidated guide on the practical options available to restructure their IT organizations and a clear understanding of the specific performance outcomes of each choice.

Outcome - Identified and structured 20 distinct agile design options (DOs) for IT organizations.
- Clustered these options into four key dimensions: Processes, Structure, People & Culture, and Governance.
- Mapped the specific performance effects for each design option, such as increased delivery speed, improved business-IT alignment, greater innovativeness, and higher team autonomy.
- Created a foundational framework to help managers make informed, cost-benefit decisions when transforming their IT organizations.
Agile IT organization design, agile design options, agility benefits
Algorithmic Management: An MCDA-Based Comparison of Key Approaches

Algorithmic Management: An MCDA-Based Comparison of Key Approaches

Arne Jeppe, Tim Brée, and Erik Karger
This study employs Multi-Criteria Decision Analysis (MCDA) to evaluate and compare four distinct approaches for governing algorithmic management systems: principle-based, rule-based, risk-based, and auditing-based. The research gathered preferences from 27 experts regarding each approach's effectiveness, feasibility, adaptability, and stakeholder acceptability to determine the most preferred strategy.

Problem As organizations increasingly use algorithms to manage workers, they face the challenge of governing these systems to ensure fairness, transparency, and accountability. While several governance models have been proposed conceptually, there is a significant research gap regarding which approach is empirically preferred by experts and most practical for balancing innovation with responsible implementation.

Outcome - Experts consistently and strongly preferred a hybrid, risk-based approach for governing algorithmic management systems.
- This approach was perceived as the most effective in mitigating risks (like bias and privacy violations) while also demonstrating good adaptability to new technologies and high stakeholder acceptability.
- The findings suggest that a 'one-size-fits-all' strategy is ineffective; instead, a pragmatic approach that tailors the intensity of governance to the level of potential harm is most suitable.
- Purely rule-based approaches were seen as too rigid and slow to adapt, while purely principle-based approaches were considered difficult to enforce.
Algorithmic Management, Multi-Criteria Decision Analysis (MCDA), Risk Management, Organizational Control, Governance, AI Ethics
Dealing Effectively with Shadow IT by Managing Both Cybersecurity and User Needs

Dealing Effectively with Shadow IT by Managing Both Cybersecurity and User Needs

Steffi Haag, Andreas Eckhardt
This study analyzes how companies can manage the use of unauthorized technology, known as Shadow IT. Through interviews with 44 employees across 34 companies, the research identifies four common approaches organizations take and provides 10 recommendations for IT leaders to effectively balance security risks with the needs of their employees.

Problem Employees often use unapproved apps and services (Shadow IT) to be more productive, but this creates significant cybersecurity risks like data leaks and malware infections. Companies struggle to eliminate this practice without hindering employee efficiency. The challenge lies in finding a balance between enforcing security policies and meeting the legitimate technology needs of users.

Outcome - Four distinct organizational archetypes for managing Shadow IT were identified, each resulting in different levels of unauthorized technology use (from very little to very frequent).
- Shadow IT users are categorized into two types: tech-savvy 'Goal-Oriented Actors' (GOAs) who carefully manage risks, and less aware 'Followers' who pose a greater threat.
- Effective management of Shadow IT is possible by aligning cybersecurity policies with user needs through transparent communication and responsive IT support.
- The study offers 10 practical recommendations, including accepting the existence of Shadow IT, creating dedicated user experience teams, and managing different user types differently to harness benefits while minimizing risks.
Shadow IT, Cybersecurity, IT Governance, User Needs, Risk Management, Organizational Culture, IT Policy
The Importance of Board Member Actions for Cybersecurity Governance and Risk Management

The Importance of Board Member Actions for Cybersecurity Governance and Risk Management

Jeffrey G. Proudfoot, W. Alec Cram, Stuart Madnick, Michael Coden
This study investigates the challenges boards of directors face in providing effective cybersecurity oversight. Drawing on in-depth interviews with 35 board members and cybersecurity experts, the paper identifies four core challenges and proposes ten specific actions boards can take to improve their governance and risk management capabilities.

Problem Corporate boards are increasingly held responsible for cybersecurity governance, yet they are often ill-equipped to handle this complex and rapidly evolving area. This gap between responsibility and expertise creates significant risk for organizations, as boards may struggle to ask the right questions, properly assess risk, and provide meaningful oversight.

Outcome - The study identified four primary challenges for boards: 1) inconsistent attitudes and governance approaches, 2) ineffective interaction dynamics with executives like the CISO, 3) a lack of sufficient cybersecurity expertise, and 4) navigating expanding and complex regulations.
- Boards must acknowledge that cybersecurity is an enterprise-wide operational risk, not just an IT issue, and gauge their organization's cybersecurity maturity against industry peers.
- Board members should focus on the business implications of cyber threats rather than technical details and must demand clear, jargon-free communication from executives.
- To address expertise gaps, boards should determine their need for expert advisors and actively seek training, such as tabletop cyberattack simulations.
- Boards must understand that regulatory compliance does not guarantee sufficient security and should guide the organization to balance compliance with proactive risk mitigation.
cybersecurity governance, board of directors, risk management, corporate governance, CISO, cyber risk, board expertise
Identifying and Filling Gaps in Operational Technology Cybersecurity

Identifying and Filling Gaps in Operational Technology Cybersecurity

Abbatemarco Nico, Hans Brechbühl
This study identifies critical gaps in Operational Technology (OT) cybersecurity by drawing on insights from 36 leaders across 14 global corporations. It analyzes the organizational challenges that hinder the successful implementation of OT cybersecurity, going beyond purely technical issues. The research provides practical recommendations for managers to bridge these security gaps effectively.

Problem As industrial companies embrace 'Industry 4.0', their operational technology (OT) systems, which control physical processes, are becoming increasingly connected to digital networks. This connectivity introduces significant cybersecurity risks that can halt production and cause substantial financial loss, yet many organizations struggle to implement robust security due to organizational, rather than technical, obstacles.

Outcome - Cybersecurity in OT projects is often treated as an afterthought, bolted on at the end rather than integrated from the start.
- Cybersecurity teams typically lack the authority, budget, and top management support needed to enforce security measures in OT environments.
- There is a severe shortage of personnel with expertise in both OT and cybersecurity, and a cultural disconnect exists between IT and OT teams.
- Priorities are often misaligned, with OT personnel focusing on uptime and productivity, viewing security measures as hindrances.
- The tangible benefits of cybersecurity are difficult to recognize and quantify, making it hard to justify investments until a failure occurs.
Operational Technology, OT Cybersecurity, Industry 4.0, Cybersecurity Gaps, Risk Management, Industrial Control Systems, Technochange
How to Design a Better Cybersecurity Readiness Program

How to Design a Better Cybersecurity Readiness Program

Kaveh Abhari, Morteza Safaei Pour, Hossein Shirazi
This study explores the common pitfalls of four types of cybersecurity training by interviewing employees at large accounting firms. It identifies four unintended negative consequences of mistraining and overtraining and, in response, proposes the LEAN model, a new framework for designing more effective cybersecurity readiness programs.

Problem Organizations invest heavily in cybersecurity readiness programs, but these initiatives often fail due to poor design, leading to mistraining and overtraining. This not only makes the training ineffective but can also create adverse effects like employee anxiety and fatigue, paradoxically amplifying an organization's cyber vulnerabilities instead of reducing them.

Outcome - Conventional cybersecurity training often leads to four adverse effects on employees: threat anxiety, security fatigue, risk passivity, and cyber hesitancy.
- These individual effects cause significant organizational problems, including erosion of individual performance, fragmentation of team dynamics, disruption of client experiences, and stagnation of the security culture.
- The study proposes the LEAN model to counteract these issues, based on four strategies: Localize, Empower, Activate, and Normalize.
- The LEAN model recommends tailoring training to specific roles (Localize), fostering ownership and authority (Empower), promoting coordinated action through collaborative exercises (Activate), and embedding security into daily operations to build a proactive culture (Normalize).
cybersecurity training, cybersecurity readiness, mistraining, security culture, employee behavior, LEAN model
How Large Companies Can Help Small and Medium-Sized Enterprise (SME) Suppliers Strengthen Cybersecurity

How Large Companies Can Help Small and Medium-Sized Enterprise (SME) Suppliers Strengthen Cybersecurity

Jillian K. Kwong, Keri Pearlson
This study investigates the cybersecurity challenges faced by small and medium-sized enterprise (SME) suppliers and proposes actionable strategies for large companies to help them improve. Based on interviews with executives and cybersecurity experts, the paper identifies key barriers SMEs encounter and outlines five practical actions large firms can take to strengthen their supply chain's cyber resilience.

Problem Large companies increasingly require their smaller suppliers to meet the same stringent cybersecurity standards they do, creating a significant burden for SMEs with limited resources. This gap creates a major security vulnerability, as attackers often target less-secure SMEs as a backdoor to access the networks of larger corporations, posing a substantial third-party risk to entire supply chains.

Outcome - SME suppliers are often unable to meet the security standards of their large partners due to four key barriers: unfriendly regulations, organizational culture clashes, variability in cybersecurity frameworks, and misalignment of business processes.
- Large companies can proactively strengthen their supply chain by providing SMEs with the resources and expertise needed to understand and comply with regulations.
- Creating incentives for meeting security benchmarks is more effective than penalizing suppliers for non-compliance.
- Large firms should develop programs to help SMEs elevate their cybersecurity culture and align security processes with their own.
- Coordinating with other large companies to standardize cybersecurity frameworks and assessment procedures can significantly reduce the compliance burden on SMEs.
Cybersecurity, Supply Chain Management, Third-Party Risk, Small and Medium-Sized Enterprises (SMEs), Cyber Resilience, Vendor Risk Management
How Boards of Directors Govern Artificial Intelligence

How Boards of Directors Govern Artificial Intelligence

Benjamin van Giffen, Helmuth Ludwig
This study investigates how corporate boards of directors oversee and integrate Artificial Intelligence (AI) into their governance practices. Based on in-depth interviews with high-profile board members from diverse industries, the research identifies common challenges and provides examples of effective strategies for board-level AI governance.

Problem Despite the transformative impact of AI on the business landscape, the majority of corporate boards struggle to understand its implications and their role in governing it. This creates a significant gap, as boards have a fiduciary responsibility to oversee strategy, risk, and investment related to critical technologies, yet AI is often not a mainstream boardroom topic.

Outcome - Identified four key groups of board-level AI governance issues: Strategy and Firm Competitiveness, Capital Allocation, AI Risks, and Technology Competence.
- Boards should ensure AI is integrated into the company's core business strategy by evaluating its impact on the competitive landscape and making it a key topic in annual strategy meetings.
- Effective capital allocation involves encouraging AI experimentation, securing investments in foundational AI capabilities, and strategically considering external partnerships and acquisitions.
- To manage risks, boards must engage with experts, integrate AI-specific risks into Enterprise Risk Management (ERM) frameworks, and address ethical, reputational, and legal challenges.
- Enhancing technology competence requires boards to develop their own AI literacy, review board and committee composition for relevant expertise, and include AI competency in executive succession planning.
AI governance, board of directors, corporate governance, artificial intelligence, strategic management, risk management, technology competence
Experiences and Lessons Learned at a Small and Medium-Sized Enterprise (SME) Following Two Ransomware Attacks

Experiences and Lessons Learned at a Small and Medium-Sized Enterprise (SME) Following Two Ransomware Attacks

Donald Wynn, Jr., W. David Salisbury, Mark Winemiller
This paper presents a case study of a small U.S. manufacturing company that suffered two distinct ransomware attacks four years apart, despite strengthening its cybersecurity after the first incident. The study analyzes both attacks, the company's response, and the lessons learned from the experiences. The goal is to provide actionable recommendations to help other small and medium-sized enterprises (SMEs) improve their defenses and recovery strategies against evolving cyber threats.

Problem Small and medium-sized enterprises (SMEs) face unique cybersecurity challenges due to significant resource constraints compared to larger corporations. They often lack the financial capacity, specialized expertise, and trained workforce to implement and maintain adequate technical and procedural controls. This vulnerability is increasingly exploited by cybercriminals, with a high percentage of ransomware attacks specifically targeting these smaller, less-defended businesses.

Outcome - All businesses are targets: The belief in 'security by obscurity' is a dangerous misconception; any online presence makes a business a potential target for cyberattacks.
- Comprehensive backups are essential: Backups must include not only data but also system configurations and software to enable a full and timely recovery.
- Management buy-in is critical: Senior leadership must understand the importance of cybersecurity and provide the necessary funding and organizational support for robust defense measures.
- People are a key vulnerability: Technical defenses can be bypassed by human error, as demonstrated by the second attack which originated from a phishing email, underscoring the need for continuous employee training.
- Cybercrime is an evolving 'arms race': Attackers are becoming increasingly sophisticated, professional, and organized, requiring businesses to continually adapt and strengthen their defenses.
ransomware, cybersecurity, SME, case study, incident response, cyber attack, information security
Adopt Agile Cybersecurity Policymaking to Counter Emerging Digital Risks

Adopt Agile Cybersecurity Policymaking to Counter Emerging Digital Risks

Masoud Afshari-Mofrad, Alireza Amrollahi, Babak Abedin
This study investigates the need for flexibility and speed in creating and updating cybersecurity rules within organizations. Through in-depth interviews with cybersecurity professionals, the research identifies key areas of digital risk and provides practical recommendations for businesses to develop more agile and adaptive security policies.

Problem In the face of rapidly evolving cyber threats, many organizations rely on static, outdated cybersecurity policies that are only updated after a security breach occurs. This reactive approach leaves them vulnerable to new attack methods, risks from new technologies, and threats from business partners, creating a significant security gap.

Outcome - Update cybersecurity policies to address risks from outdated legacy systems by implementing modern digital asset and vulnerability management.
- Adapt policies to address emerging technologies like AI by enhancing technology scouting and establishing a resilient cyber risk management framework.
- Strengthen policies for third-party vendors by conducting agile risk assessments and regularly reviewing security controls in contracts.
- Build flexible policies for disruptive external events (like pandemics or geopolitical tensions) through continuous employee training and robust business continuity plans.
agile cybersecurity, cybersecurity policymaking, digital risk, adaptive security, risk management, third-party risk, legacy systems
Load More Showing 18 of 24