Volume 3 (2019-20)

Each volume of Cyber Security: A Peer-Reviewed Journal consists of four 100-page issues in print and online. The articles published in Volume 3 are listed below. 

Volume 3 Number 4

  • Editorial
    Simon Beckett, Publisher
  • Moving target defence: Economics and asymmetry
    Don Maclean, Chief Cybersecurity Technologist, DLT – A Tech Data Company
  • 1-10-60: Measuring the speed of incident response
    Ronald Pool, Cyber Security Specialist, CrowdStrike
  • What lawyers mean by ‘reasonable’ cyber security controls
    Chris Cronin, Partner, Halock Security Labs
  • The three P’s of third-party risk
    Mark Sangster, Vice President and Industry Security Strategist, eSentire
  • Cyber incident response approach framework for local government
    Mark Brett, Researcher, Cyber Unit, London Metropolitan University, Joshua Wood, Researcher and Jamie Parker, Researcher, Wrexham Glyndwr University
  • Hacking humans: A case study and analysis of vulnerabilities in the advancing medical device landscape
    Gabrielle Hempel, Senior Security Analyst, Accenture, Diane Brady Janosek, Commandant and Training Director, National Security Agency and Donna Brady Raziano, Chief Medical Officer, Mercy LIFE
  • The role of information about an opponent’s actions and intrusion detection alerts on cyber decisions in cyber security games
    Palvi Aggarwal, Post-doctoral Fellow, Carnegie Mellon University and Varun Dutt, Assistant Professor, Indian Institute of Technology Mandi

Volume 3 Number 3

  • Editorial
    Simon Beckett, Publisher
  • Security and privacy risks in the blockchain ecosystem
    Ivana Bartoletti, Head of Privacy and Data Protection, Samuel Plantié, Principal Data Protection Consultant and Arun Sambodaran, Gemserv
  • IT modernisation in the energy sector: Preventing cyberthreats to critical infrastructure
    Pamela K. Isom, Deputy Chief Information Officer, United States Department of Energy
  • The European Commission goes ‘cloud first’: A roadmap towards trusted cloud adoption to seize the opportunities of digital transformation for EU institutions and agencies
    Ken Ducatel, Director IT Security, Thomas Michlmayr, Head of Unit – Digital Workplace Engineering, Philippe Merle, Deputy Head of Unit – Cloud and Service Management Capabilities, Dalibor Baskovc, Cloud Security Program coordinator, DG DIGIT, European Commission, and François Mestre, Head of Unit Information and Communication Technologies, European Centre for Disease Prevention and Control
  • ADDRR: A counter kill chain cyber security model
    Alex Henneberg, Digital consultant
  • Zero trust in an all too trusting world
    Gerald Caron, Director of Enterprise Network Management, Bureau of Information Resource Management, US Department of State
  • Security monitoring strategies for your OT infrastructure
    Mohammad Jbair, Senior OT Security Consultant, Airbus CyberSecurity
  • Evaluating cyber risk reporting in US financial reports
    Ron Fisher, Director of the Infrastructure Assurance and Analysis Division, Idaho National Laboratory, Justin Wood, Assistant Professor of Accounting at the College of Business, Idaho State University, Celia Porod, Critical Infrastructure Analysis Strategic Planner, Idaho National Laboratory, and Lydia Greco, Graduate Student, Idaho State University

Volume 3 Number 2

  • Editorial
    Simon Beckett, Publisher
  • Third-party risk management: Strategy to mitigate ‘on-premise’ and ‘cloud’ cyber security risks
    Moh Cissé, CEO, M6C StrategIT
  • Digital twins, the industrial Internet of Things and cyber security threats in connected industry
    Mark Hearn, Director of IoT Security and Business Development, Irdeto
  • A strategic approach to cyber security risk reduction for FX in the cloud using people, processes and technology
    Rupert Lee-Browne, Chairman, Caxton
  • Managing the hypercomplexity of cyber security regulation: In search of a regulatory Rosetta Stone
    F. Paul Greene, Partner and the Privacy & Data Security practice group leader, Harter Secrest & Emery
  • Healthcare cyber security and HIPAA assurance with business associates
    Janice Ahlstrom, Director, Christopher Tait, Principal and Kenneth Zoline, Senior Manager, Baker Tilly
  • Preventing cybercrime: A framework for understanding the role of human vulnerabilities
    Christopher S. Kayser, Cybercrime Analytics Inc., Mary Ellen Mastrorilli, Associate Professor and Robert Cadigan, Associate Professor Emeritus, Boston University
  • The nature of society: Are certain cultures less predisposed to cyberthreats than others? An examination using the example of Germany
    Jochen Werne, Authorised Officer, Bankhaus August Lenz

Volume 3 Number 1

  • Editorial
    Simon Beckett, Publisher
  • Impersonation fraud scenarios: How to protect, detect and respond
    Mario Bruno, Lead Investigator, Citigroup
  • Doing risk management correctly
    Randall Frietzsche, Enterprise CISO, Denver Health
  • Examining the relationship between formal RMF training and perceptions of RMF effectiveness, sustainability and commitment in RMF practitioners
    Philip D. Schall, Associate Professor of Information Systems, Liberty University and Oludotun Oni, Professor of Information Systems and Security, University of the Cumberlands
  • Surviving ransom driven DDoS extortion campaigns
    Sean Newman, Senior Director of Product Management, Corero Network Security
  • Resilience to combined attacks
    David Winks, AcquSight
  • A data privacy approach for cyber-physical systems
    Jan Weldert, Cyber Security and Data Privacy Expert, Jana Karina von Wedel, Deputy Head of Cyber Security and Data Privacy and Christian Beul, INVENSITY
  • Cyber security and human resource development implications for the enterprise
    Andrew R. Gillam, Indiana State University