Boosting holistic cybersecurity awareness with outsourced wide-scope CyberSOC: A generalization from a spanish public organization study

M Domínguez-Dorado, FJ Rodríguez-Pérez… - Information, 2023 - mdpi.com
Public sector organizations are facing an escalating challenge with the increasing volume
and complexity of cyberattacks, which disrupt essential public services and jeopardize …

CyberTOMP: A novel systematic framework to manage asset-focused cybersecurity from tactical and operational levels

M Domínguez-Dorado, J Carmona-Murillo… - IEEE …, 2022 - ieeexplore.ieee.org
Currently different reference models are used to manage cybersecurity, although practically
none are applicable “as is” to lower levels as they do not detail specific procedural aspects …

Fast, lightweight, and efficient cybersecurity optimization for tactical–operational management

M Domínguez-Dorado, D Cortés-Polo… - Applied Sciences, 2023 - mdpi.com
Featured Application This study holds direct applicability for organizations seeking to
establish comprehensive, tactical, and operational cybersecurity management, especially …

Position Paper: Leveraging Large Language Models for Cybersecurity Compliance

A Salman, S Creese… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
This position paper proposes the use of Large Language Models (LLMs) to evaluate the
compliance of cybersecurity controls with organisational policies. We high-light the …

Prompting LLM to Enforce and Validate CIS Critical Security Control

M Ahmed, J Wei, E Al-Shaer - Proceedings of the 29th ACM Symposium …, 2024 - dl.acm.org
Proper security control enforcement reduces the attack surface and protects the
organizations against attacks. Organizations like NIST and CIS (Center for Internet Security) …

Distributed Hierarchical Event Monitoring for Security Analytics

M Ahmed - 2024 - search.proquest.com
The unprecedented increase in the number and sophistication of cyber-attacks (eg,
advanced persistent threats or APTs) has called for effective and efficient threat-hunting …

[图书][B] Cybersecurity Leadership: Technology Threat Avoidance Factors Affecting Cybersecurity Professionals' Willingness to Share Information

WC Session - 2022 - search.proquest.com
Abstract Through the Cybersecurity Information Sharing Act of 2015, a DHS information-
sharing program was mandated to protect US businesses and critical infrastructure and …