Role of Cybersecurity Management Explained by a Single Case Study. Cybersecurity as a Project Solution.
Abstract
In this article is discussed the misunderstanding of the need of cybersecurity managers. The main role of managers is to align the security goals to business goals of the organisation. We can see this role by the change of assets of the information security and the assets of the organisation by a case study through the process analyses. This article proposes a solution with the implementation of project management. We have to look to the cybersecurity as a project, with its programs and packages. The products provided by this approach are management and technological products.
References
2. L. J. Gitman et al., “The Role of Management,” in Introduction to Business, OpenStax Introduction to Business, 2018.
3. К. Пудин, “Мениджърски предизвикателства в сектора за сигурност и отбрана,” Военна академия „Г.С. Раковски”, Годишник, 2/2013, p. 219. K. Poudin, "Managerial Challenges in the Security and Defense Sector," GS Military Academy Rakovski ”, Annual, 2/2013, p. 219 Bulgarian language
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
By submitting a paper for publishing the authors hereby comply with the following provisions: 1. The authors retain the copyrights and only give the journal the right for first publication while licensing the work under Creative Commons Attribution License, which grants permissions to others to share the contribution citing this journal as first publication of the text. 2. The authors may enter separate, additional contractual relations for non-exclusive distribution of the published version of the work in this journal (e.g. to upload it in an institutional depository, or to be published in a book), given that they cite the first publication in this journal. 3. The authors are allowed and are encouraged to publish their works online (e.g. to upload it in an institutional depository, personal websites, social networks, etc.) before, during, and after the submission of the paper here, because this may lead to productive exchange, as well as earlier and larger referencing of the published works (see The Effect of Open Access).