This paper explores the nexus between digital transformation and cybersecurity, examining professional perceptions of these intertwined concepts As Industry 4.0 reshapes organizations and society, digital technologies and connectivity become pivotal. Businesses adopting e-business and cloud computing encounter challenges like information security and disruptive innovations, propelling digital transformation. However, this shift introduces new risks, particularly in cybersecurity, altering risk distribution and security requirements. The widespread integration of interconnected devices across business functions makes them vulnerable to cyber-attacks, necessitating robust cybersecurity measures. This study scrutinizes factors preventing unintentional and intentional security incidents and maps cyber risk perceptions. Through a survey of 124 professionals in collaboration with BUSIBER, we elucidate risk perception and implemented controls, essential for organizations to navigate the digital landscape securely and safeguard their market reputation. Understanding the impacts of digitalization and cybersecurity on diverse business functions is crucial for devising effective strategies to mitigate risks and ensure sustainable development.
DOCUMENT
In case of a major cyber incident, organizations usually rely on external providers of Cyber Incident Response (CIR) services. CIR consultants operate in a dynamic and constantly changing environment in which they must actively engage in information management and problem solving while adapting to complex circumstances. In this challenging environment CIR consultants need to make critical decisions about what to advise clients that are impacted by a major cyber incident. Despite its relevance, CIR decision making is an understudied topic. The objective of this preliminary investigation is therefore to understand what decision-making strategies experienced CIR consultants use during challenging incidents and to offer suggestions for training and decision-aiding. A general understanding of operational decision making under pressure, uncertainty, and high stakes was established by reviewing the body of knowledge known as Naturalistic Decision Making (NDM). The general conclusion of NDM research is that experts usually make adequate decisions based on (fast) recognition of the situation and applying the most obvious (default) response pattern that has worked in similar situations in the past. In exceptional situations, however, this way of recognition-primed decision-making results in suboptimal decisions as experts are likely to miss conflicting cues once the situation is quickly recognized under pressure. Understanding the default response pattern and the rare occasions in which this response pattern could be ineffective is therefore key for improving and aiding cyber incident response decision making. Therefore, we interviewed six experienced CIR consultants and used the critical decision method (CDM) to learn how they made decisions under challenging conditions. The main conclusion is that the default response pattern for CIR consultants during cyber breaches is to reduce uncertainty as much as possible by gathering and investigating data and thus delay decision making about eradication until the investigation is completed. According to the respondents, this strategy usually works well and provides the most assurance that the threat actor can be completely removed from the network. However, the majority of respondents could recall at least one case in which this strategy (in hindsight) resulted in unnecessary theft of data or damage. Interestingly, this finding is strikingly different from other operational decision-making domains such as the military, police and fire service in which there is a general tendency to act rapidly instead of searching for more information. The main advice is that training and decision aiding of (novice) cyber incident responders should be aimed at the following: (a) make cyber incident responders aware of how recognition-primed decision making works; (b) discuss the default response strategy that typically works well in several scenarios; (c) explain the exception and how the exception can be recognized; (d) provide alternative response strategies that work better in exceptional situations.
DOCUMENT
The growing sophistication, frequency and severity of cyberattacks targeting all sectors highlight their inevitability and the impossibility of completely protecting the integrity of critical computer systems. In this context, cyber-resilience offers an attractive alternative to the existing cybersecurity paradigm. We define cyber-resilience as the capacity to withstand, recover from and adapt to the external shocks caused by cyber-risks. This article seeks to provide a broader organizational understanding of cyber-resilience and the tensions associated with its implementation. We apply Weick's (1995) sensemaking framework to examine four foundational tensions of cyber-resilience: a definitional tension, an environmental tension, an internal tension, and a regulatory tension. We then document how these tensions are embedded in cyber-resilience practices at the preparatory, response and adaptive stages. We rely on qualitative data from a sample of 58 cybersecurity professionals to uncover these tensions and how they reverberate across cyber-resilience practices.
DOCUMENT
In recent years, ArtEZ has worked on a broadly supported strategic research agenda on the themes New Ecologies of Matter (ecological challenges), Social Equity (social-societal issues), (Un)Learning Practices (educational innovations) and (Non)CybernEtic Fabric (technological developments). Building on these strategic themes, the ArtEZ Research Collective as developed an international research strategy to become a valuable partner in the relevant Horizon Europe (HEU) areas of Environment, Industry and Social science and humanities. With its specific knowledge position and approach from arts and creativity, ArtEZ is convinced that it can play a distinctive role in European consortia to tackle various challenges in these areas, in particular from the perspective and research topics of the professorships Fashion and Tactical Design. To achieve its ambitions and goals in its targeted research topics, ArtEZ is convinced that a combination of international connections and local applications is key for successful impact. Building upon existing relations and extending the international research position requires extra efforts, e.g., by developing a strong international framework of state-of-the-art research results, impacts and ambitions. Therefore ArtEZ needs to (further) build on both its international network and its supportive infrastructure. With this proposal ArtEZ is presenting its goals and efforts to work on its international recognition as a valuable research partner, and to broaden its international network in cutting-edge research and other stakeholders. With regards to its supporting infrastructure, ArtEZ has the ambition to expand the impact of the Subsidy Desk to become a professional partner to the professorships. This approach requires a further professionalization and extension of both the Subsidy Desk organization and its services, and developing and complementing skills, expertise and competences to comply to the European requirements.
Real-Time Cyber-Physical Systems (RT-CPS) zijn onmisbaar in onze samenleving, van medische apparatuur tot autonome voertuigen. De betrouwbaarheid en robuustheid van deze systemen zijn echter cruciaal, fouten kunnen immers grote gevolgen hebben. Dit project beoogt de betrouwbaarheid van RT-CPS te vergroten door middel van een modulaire hardware-architectuur en geavanceerde validatie- en verificatiemethoden (V&V). In samenwerking met praktijkpartners, waaronder het Wilhelmina Kinderziekenhuis, wordt een proof-of-concept demonstrator ontwikkeld in een praktijkgerichte casus. De modulaire hardware-architectuur maakt RT-CPS flexibeler, toekomstbestendig en breed toepasbaar. De geavanceerde V&V-methoden borgen de betrouwbaarheid van de systemen en helpen MKB-bedrijven bij de ontwikkeling van hun eigen RT-CPS-applicaties. Naast de directe voordelen voor de betrokken partners, draagt dit project bij aan een bredere maatschappelijke impact. De verhoogde betrouwbaarheid van RT-CPS kan leiden tot verbeterde veiligheid en efficiëntie in diverse sectoren. Een krachtige samenwerking tussen kennisinstituten, praktijkpartners en het MKB is de sleutel tot succes. Dit project bundelt expertise en praktijkkennis om Nederland een leidende positie te laten innemen op het gebied van betrouwbare RT-CPS. In dit 1-jarig verkennend project zal de Hogeschool van Arnhem en Nijmegen samenwerken met Gemini Embedded Technology, Wilhelmina Kinderziekenhuis, het grootbedrijf Capgemini en de Universiteit Utrecht.
In het project onderzoeken we hoe je mensen op de werkvloer kan helpen om zich digitaal veiliger te gedragen door middel van gebruikersgericht ontwerp.Doel Het doel van dit project is om een gebruikersgerichte aanpak voor bruikbare cybersecurity ontwikkelen op basis van wetenschappelijk inzichten over gedrag en design, toegepast op de praktijk. Resultaten Het resultaat zal een handelingskader zijn die een weergave geeft van een gebruikersgerichte aanpak om te komen tot bruikbare cybersecurity. Het is een handige manier om te begrijpen hoe digitale handelingen veiliger gemaakt kunnen worden door het ontwerp van beveiligingsmaatregelen Looptijd 01 oktober 2022 - 01 oktober 2023 Aanpak Aan de hand van een praktijkopdracht en literatuur worden inzichten verworven in bruikbare cybersecurity. Deze inzichten worden gebruikt als leidraad voor het creëren van gebruiksvriendelijke ontwerpen tijdens een co-creatie sessie met experts. De ontwerpen die hieruit voortkomen worden getest en de opgedane kennis wordt in een bredere context gezet.
Lectoraat, onderdeel van NHL Stenden Hogeschool
Lectoraat, onderdeel van NHL Stenden Hogeschool