Proceeding

Cybersecurity as a Key Element of Corporate Strategy

Author

  • Nir Kshetri, Professor, University of North Carolina-Greensboro (UNCG), USA

Download

Slides

Abstract

Cybersecurity (CS) is among the most critical issues facing organizations today. The role of cybersecurity in the pursuit of organizational mission, while currently underappreciated, is likely to become more evident in the future. This presentation examines the organizational, environmental, and contextual aspects of cybersecurity and explores how organizations can acquire, deploy, and develop resources and capabilities to prepare themselves for the changing cybersecurity environment. In doing so, it gives special consideration to strategic management from the cybersecurity perspective, which involves matching an organization’s resources and capabilities with the changing cybersecurity environment in the most advantageous way. It covers the formulation of the organization's cybersecurity objectives and goals, and engagement in implementation and control of decisions and actions that can help achieve these objectives and goals. It presents a conceptual framework delineating the drivers and outcomes of cybersecurity strategy. It provides information on which to build a comprehensive cybersecurity strategy to minimize and prevent cyber-attack risks facing a company, as it examines the corporate cybersecurity environment within the larger context of data-driven decision and increasing cyber-security risks. I classify cyber-threats in terms of various dimensions such as capabilities and motivations of the attacker, potential consequences to the victim organization, relationship with actions and positions of the target and the time-variance relation. It also examines the relevance and limitations of various types of resources in the context of cybersecurity and articulates processes by which internal and market-based resources can be improved and redeployed in order to strengthen cybersecurity and convert into competitive advantages in the big data era. The presentation also introduces the first principle of CS, which involves reducing the cyber-vulnerability and minimizing the potential negative consequences if the firm faces cyber-attacks. Key determinants of vulnerability and consequences are discussed.

CONFERENCE SPONSORS hide▲show▼

  • ADVA Optical Networking
  • CITIC Telecom International CPC Limited
  • CITIC Telecom International
  • Biznet
  • CenturyLink
  • Colt Technology Services
  • Shaw Business
  • Comcast Wholesale
  • China Telecom
  • MegaSys
  • Harris
  • Verizon Wholesale
  • China Unicom Global Limited
  • BTI Systems
  • Paul Hastings
  • Level 3 Communications
  • Vodafone
  • REDCOM
  • Arbor Networks
  • Wolfe
  • PCCW Global
  • Telus
  • ATLANTIC-ACM
  • Infinera
  • CoreSite
  • TNZI
  • Digital Realty
  • World Hub Communications Limited
  • Ciena
  • GTT
  • Telstra
  • Lumen Networks

PLATINUM SPONSORS

GOLD SPONSORS

GOLD SPONSORS

GOLD SPONSORS

SILVER SPONSORS

BRONZE SPONSORS

BRONZE SPONSORS

BRONZE SPONSORS

  • ADVA Optical Networking
  • CITIC Telecom International CPC Limited
  • CITIC Telecom International
  • Biznet
  • CenturyLink
  • Colt Technology Services
  • Shaw Business
  • Comcast Wholesale
  • China Telecom
  • MegaSys
  • Harris
  • Verizon Wholesale
  • China Unicom Global Limited
  • BTI Systems
  • Paul Hastings
  • Level 3 Communications
  • Vodafone
  • REDCOM
  • Arbor Networks
  • Wolfe
  • PCCW Global
  • Telus
  • ATLANTIC-ACM
  • Infinera
  • CoreSite
  • TNZI
  • Digital Realty
  • World Hub Communications Limited
  • Ciena
  • GTT
  • Telstra
  • Lumen Networks
Top of page