[HTML][HTML] Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role …

C La Fleur, B Hoffman, CB Gibson, N Buchler - Computers & Security, 2021 - Elsevier
A critical component to any modern cybersecurity endeavor is effective use of its human
resources to secure networks, maintain services and mitigate adversarial events. Despite …

Societal Impacts of Cyber Security in Academic Literature: Systematic Literature Review

E Hytönen, A Trent, H Ruoslahti - Proceedings of the 21st …, 2022 - books.google.com
The 2020 Allianz Risk Barometer, with 39% of responses, ranked cyber incidents as the
number one risk threatening business continuity. Any organisation may face a number of …

Research and Practice of Delivering Tabletop Exercises

J Vykopal, P Čeleda, V Švábenský, M Hofbauer… - arXiv preprint arXiv …, 2024 - arxiv.org
Tabletop exercises are used to train personnel in the efficient mitigation and resolution of
incidents. They are applied in practice to support the preparedness of organizations and to …

[PDF][PDF] Hendelseshåndtering ved cyberangrepet mot Østre Toten kommune

G Østby, SJ Kowalski - NTNU. Hentet Mars, 2022 - ototen.no
Hvem var dine ulike kontaktpersonene i Østre Toten kommune (hvem ble det eskalert eller
deeskalerte informasjon til)? og Var du kontaktperson for noen utenom Østre Toten …

On ICS Cybersecurity Assessment with the Help of Delay Calculation

AA Baybulatov, VG Promyslov, EP Jharko - IFAC-PapersOnLine, 2021 - Elsevier
Today, cybersecurity is a well-known concept systematically manipulated in the context of
corporative and personal life. Many stormy debates on reducing cyberthreats are sparked off …

[PDF][PDF] On-demand Deployment and Orchestration of Cyber Ranges in the Cloud.

AP Luise, G Perrone, C Perrotta, SP Romano - ITASEC, 2021 - researchgate.net
In this paper we present a framework for the dynamic deployment, configuration and
orchestration of cyber ranges in a cloud-based environment. We propose a distributed …

Training the Trainers for Cybersecurity Exercises-Developing EXCON-teams

G Østby, BE Selebø, SJ Kowalski - Accelerating Open Access …, 2023 - ntnuopen.ntnu.no
In recent years there has been a large increase in advanced computer attacks targeting
Norwegian authorities and businesses. At the same time there is a great shortage of trained …

[PDF][PDF] Análisis de ejercicios de Ataque y Defensa en Ciberseguridad

ER versus Azul - espam.edu.ec
La ciberseguridad es un campo crucial en la sociedad tecnológica, pues es necesario que
un sistema sea confiable y seguro contra ataques informáticos; sin embargo, ninguno es …

The Human Factor: Identifying and Providing a Cost-Benefit Analysis of Cybersecurity Education

V Cefaratti - 2021 - search.proquest.com
Organizations face many challenges when implementing and maintaining cybersecurity
training for their employees. It is well-known that cybersecurity threats are on the rise and …

[引用][C] Workforce training and development in cybersecurity

J Yu, SA Lee, D Liu - Aviation Cybersecurity: Foundations, Principles, and …, 2021 - IET