"In the age of information overload, it is refreshing to have a publication whose primary purpose is to serve and educate its readership. A publication that is governed by the people in the industry is always the most compelling and the quality of experience leveraged and information gathered is immediately evident. This journal serves as an industry standard for excellence in reporting on the many facets of our profession, as well as showing where it is going."
Volume 2 (2018-19)
Each volume of Cyber Security: A Peer-Reviewed Journal consists of four quarterly 100-page issues. The articles and case studies published or scheduled to be published in Volume 2 are:
Volume 2 Number 4 (Summer 2019):
-
Editorial
Simon Beckett, Publisher -
The Eurosystem’s cyber resilience strategy for financial market infrastructures
Marc Bayle de Jessé, Director, General Market Infrastructure and Payments, European Central Bank -
Why do cyber security programmes fail?
Chris Moschovitis, Chairman & CEO, The Information Technology Management Group -
Cyber risk: Leveraging a multidisciplinary approach
Charlotte Branfield, Global Head of Information Security Internal Standards and Cyber Advocacy, Citibank -
Thwarting a cyber physical attack in the Internet of Things era
Bharat Mistry, Principal Security Strategist and William Malik, Vice President of Infrastructure Strategies,Trend Micro -
Leadership in the cyber warfare era: Formulating a data breach reporting and management strategy
Garikai Chimuka, Test Engineer, Sopra Steria -
An ISO 27001 compliance project for a cyber security service team
Moh Cissé, CEO, M6C StrategIT -
Civil liberties vs national security in the encryption debate: Exceptional access and the trust deficit
Brittany Bieber, Master of Public Policy candidate, University of California, Berkeley, Ahmad Sultan, Associate Director for Research, Advocacy and Technology Policy, Anti-Defamation League, Michael Nacht, Thomas and Alison Schneider Professor of Public Policy, Goldman School of Public Policy, University of California, Berkeley, and Sabhanaz Rashid Diya, Bill & Melinda Gates Foundation
Volume 2 Number 3 (Spring 2019):
-
Editorial
Simon Beckett, Publisher -
Framing cyber security as a business risk
Evan Wheeler, VP Risk Management and CISO, Financial Engines -
Insider threat detection: Where and how data science applies
Derek Lin, Chief Data Scientist, Exabeam -
DevOps security improvements through effective use of container technology
Murray Goldschmidt, Chief Operating Officer, Sense of Security Pty -
How can we effectively regulate grid security?
Tom Alrich, Cyber Risk Management. NERC CIP Consulting Services, Tom Alrich -
Strategic trends in the global cyber conflict
Gil Baram, Head of Research, Daniel Cohen, Senior Researcher, Zeev Shapira, Researcher in Security and International Relations, Omree Wechsler, Head of Cyber Policy Research, Nir Hight, Researcher, Isaac Ben-Israel, Head, Yuval Ne’eman Workshop for Science, Technology and Security -
SOC 2030: Security Operations centres are broken, let’s fix them
Kerry Matre, Head of Security Operations Strategy, Palo Alto Networks -
Preventing cryptocurrency theft: Learning from the past to secure the future
Amos Kater, Head of Online, Currence and Andrew Jamieson, The University of Melbourne -
Risk perceptions of electronic health records
Patricia Le, Michael Tsiang, Lecturer and Natan Hekmatjah, UCLA and Peter Katona, Clinical Professor of Medicine, David Geffen School of Medicine, UCLA and Adjunct Professor of Public Health, UCLA Fielding School of Public Health
Volume 2 Number 2 (Autumn/Fall 2018):
-
Editorial
Simon Beckett, Publisher -
The cyberthreat facing the financial services industry
Pat Antonacci, Programme Director, SWIFT -
Best practices in creating a vulnerability assessment programme: Measure twice and cut once, avoiding costly mistakes
Christopher Cowen, Cyber Security Expert, US Department of Defense -
Emerging trends in insurance coverage: Massive encryption attacks create urgent need for business interruption and cyber coverage
Sean Hoar, Lewis Brisbois Bisgaard & Smith LLP and Peter M. Marchel, President and Founder, Marchel Risk Consulting LLC -
Risky travel: The missing piece for holistic cyber security risk management
Moh Cissé, GRC Senior Consultant, Hydro-Québec -
The impact of GDPR on WHOIS: Implications for businesses facing cybercrime
Anthony J. Ferrante, Senior Managing Director, FTI Consulting -
One way to better cyber resilience in the financial sector: The Danish approach
René Thomsen, Adviser, Danmarks Nationalbank and Gustav Kaas-Jacobsen, Senior Infrastructure Expert, Danmarks Nationalbank -
Small and medium enterprises: Analysing the cyber challenge
Gianluca Riglietti, Research and Insight Manager, Business Continuity Institute, Patrick Alcantara, Telefonica UK (O2) and Lucila Aguada, Research and Insight Analyst, Business Continuity Institute -
Staying one step ahead of the EU GDPR: Embed privacy and security by design
Ann Cavoukian, Founder and Creator, International Council on Global Privacy and Security by Design -
Measurement of organisational variables associated with cyber security preparedness in Turkey
S. Hakan Can, Criminal Justice Program, Gokhan Ikitemur, Turkish Ministry of Interior and Helen M. Hendy, Professor Emeritus in Psychology, Penn State University
Volume 2 Number 1 (Summer 2018):
Special issue: Women in Cyber Security
-
Editorial
Bonnie Butlin, National Coordinator and Chair of the National Council, Canadian Cybersecurity Alliance -
Banking phishing: The case of Brazil
Beatriz Silveira Brasil, Cybercrime Intelligence Officer, INTERPOL and Karina Correia Figueiredo Campelo, Head of the Division of Prevention and Repression of Cybercrime, Civil Police of Pará State, Northern Brazil -
From panic to pragmatism: De-escalating and managing commercial data breaches
Liisa Thomas, Partner and Amber C. Thomson, Privacy and Cybersecurity Associate, Sheppard, Mullin, Richter & Hampton -
GDPR and employee data protection: Cyber security data example
Deborah Watson, Information Technology Specialist and Ryan Millerick, Information Technology Specialist, KPMG -
Reflections on CIO research: The essential qualities sought after when hiring today’s cyber security leaders
Claire Pales, Director, 27 Lanterns -
#SafeCard: Ukraine’s answer to cyberthreats targeting cardholders
Olesya Danylchenko, Deputy Director, Head of Payment Instruments and Credits Security Forum, Ukrainian Interbank Payment Systems Members Association -
An effective approach to addressing human security vulnerability in an organisation
Masha Sedova, Co-founder, Elevate Security -
Staying safe in an increasingly interconnected world: IOT and cyber security
Theresa Payton, Founder, President and CEO of Fortalice Solutions -
PCI DSS and card brands: Standards, compliance and enforcement
Donna Wilson, Partner, Ethan Roman, Litigation and Cyber Security Attorney and Ingrid Beierly, Senior Advisor, Cyber and Global Payment Security, Manatt, Phelps & Phillips -
Purchasing and understanding cyber insurance coverage
Judy Selby, Principal, Judy Selby Consulting -
‘Reasonable security’: A moving target
Margo H. K. Tank, DLA Piper, James Shreve, Counsel and Elizabeth E. McGinn, Partner, Buckley Sandler