Volume 2 (2018-19)

Each volume of Cyber Security: A Peer-Reviewed Journal consists of four quarterly 100-page issues. The articles and case studies published or scheduled to be published in Volume 2 are:

Volume 2 Number 3 (Spring 2019):

  • Editorial
    Simon Beckett, Publisher
  • Framing cyber security as a business risk
    Evan Wheeler, VP Risk Management and CISO, Financial Engines
  • Insider threat detection: Where and how data science applies
    Derek Lin, Chief Data Scientist, Exabeam
  • DevOps security improvements through effective use of container technology
    Murray Goldschmidt, Chief Operating Officer, Sense of Security Pty
  • How can we effectively regulate grid security?
    Tom Alrich, Cyber Risk Management. NERC CIP Consulting Services, Tom Alrich
  • Strategic trends in the global cyber conflict
    Gil Baram, Head of Research, Daniel Cohen, Senior Researcher, Zeev Shapira, Researcher in Security and International Relations, Omree Wechsler, Head of Cyber Policy Research, Nir Hight, Researcher, Isaac Ben-Israel, Head, Yuval Ne’eman Workshop for Science, Technology and Security
  • SOC 2030: Security Operations centres are broken, let’s fix them
    Kerry Matre, Head of Security Operations Strategy, Palo Alto Networks
  • Preventing cryptocurrency theft: Learning from the past to secure the future
    Amos Kater, Head of Online, Currence and Andrew Jamieson, The University of Melbourne
  • Risk perceptions of electronic health records
    Patricia Le, Michael Tsiang, Natan Hekmatjah and Peter Katona, Clinical Professor of Medicine, Adjunct Professor of Public Health

Volume 2 Number 2 (Autumn/Fall 2018):

  • Editorial
    Simon Beckett, Publisher
  • The cyberthreat facing the financial services industry
    Pat Antonacci, Programme Director, SWIFT
  • Best practices in creating a vulnerability assessment programme: Measure twice and cut once, avoiding costly mistakes
    Christopher Cowen, Cyber Security Expert, US Department of Defense
  • Emerging trends in insurance coverage: Massive encryption attacks create urgent need for business interruption and cyber coverage
    Sean Hoar, Lewis Brisbois Bisgaard & Smith LLP and Peter M. Marchel, President and Founder, Marchel Risk Consulting LLC
  • Risky travel: The missing piece for holistic cyber security risk management
    Moh Cissé, GRC Senior Consultant, Hydro-Québec
  • The impact of GDPR on WHOIS: Implications for businesses facing cybercrime
    Anthony J. Ferrante, Senior Managing Director, FTI Consulting
  • One way to better cyber resilience in the financial sector: The Danish approach
    René Thomsen, Adviser, Danmarks Nationalbank and Gustav Kaas-Jacobsen, Senior Infrastructure Expert, Danmarks Nationalbank
  • Small and medium enterprises: Analysing the cyber challenge
    Gianluca Riglietti, Research and Insight Manager, Business Continuity Institute, Patrick Alcantara, Telefonica UK (O2) and Lucila Aguada, Research and Insight Analyst, Business Continuity Institute
  • Staying one step ahead of the EU GDPR: Embed privacy and security by design
    Ann Cavoukian, Founder and Creator, International Council on Global Privacy and Security by Design
  • Measurement of organisational variables associated with cyber security preparedness in Turkey
    S. Hakan Can, Criminal Justice Program, Gokhan Ikitemur, Turkish Ministry of Interior and Helen M. Hendy, Professor Emeritus in Psychology, Penn State University

Volume 2 Number 1 (Summer 2018):

Special issue: Women in Cyber Security

  • Editorial
    Bonnie Butlin, National Coordinator and Chair of the National Council, Canadian Cybersecurity Alliance
  • Banking phishing: The case of Brazil
    Beatriz Silveira Brasil, Cybercrime Intelligence Officer, INTERPOL and Karina Correia Figueiredo Campelo, Head of the Division of Prevention and Repression of Cybercrime, Civil Police of Pará State, Northern Brazil
  • From panic to pragmatism: De-escalating and managing commercial data breaches
    Liisa Thomas, Partner and Amber C. Thomson, Privacy and Cybersecurity Associate, Sheppard, Mullin, Richter & Hampton
  • GDPR and employee data protection: Cyber security data example
    Deborah Watson, Information Technology Specialist and Ryan Millerick, Information Technology Specialist, KPMG
  • Reflections on CIO research: The essential qualities sought after when hiring today’s cyber security leaders
    Claire Pales, Director, 27 Lanterns
  • #SafeCard: Ukraine’s answer to cyberthreats targeting cardholders
    Olesya Danylchenko, Deputy Director, Head of Payment Instruments and Credits Security Forum, Ukrainian Interbank Payment Systems Members Association
  • An effective approach to addressing human security vulnerability in an organisation
    Masha Sedova, Co-founder, Elevate Security
  • Staying safe in an increasingly interconnected world: IOT and cyber security
    Theresa Payton, Founder, President and CEO of Fortalice Solutions
  • PCI DSS and card brands: Standards, compliance and enforcement
    Donna Wilson, Partner, Ethan Roman, Litigation and Cyber Security Attorney and Ingrid Beierly, Senior Advisor, Cyber and Global Payment Security, Manatt, Phelps & Phillips
  • Purchasing and understanding cyber insurance coverage
    Judy Selby, Principal, Judy Selby Consulting
  • ‘Reasonable security’: A moving target
    Margo H. K. Tank, DLA Piper, James Shreve, Counsel and Elizabeth E. McGinn, Partner, Buckley Sandler