CRITICAL SUCCESS FACTORS FOR INTEGRATING A CIRCULAR INTERACTION MODEL FOR SECURITY PROCESSES IN DIGITAL TRANSFORMATION Cover Image

CRITICAL SUCCESS FACTORS FOR INTEGRATING A CIRCULAR INTERACTION MODEL FOR SECURITY PROCESSES IN DIGITAL TRANSFORMATION
CRITICAL SUCCESS FACTORS FOR INTEGRATING A CIRCULAR INTERACTION MODEL FOR SECURITY PROCESSES IN DIGITAL TRANSFORMATION

Author(s): Georg Sven Lampe, Stephan Massner
Subject(s): Business Economy / Management, Security and defense, ICT Information and Communications Technologies
Published by: Asociaţia de Cooperare Cultural-Educaţională Suceava
Keywords: Circularity; information security management; interaction model; risk management process; digitization;

Summary/Abstract: A circularity of Information and Communication Systems (ICT) implies a sustainable design of associated management systems to comply with Cyber Security (CS), Information Security (IS) and Data Privacy (DP). Due to the rapidly changing of IT infrastructure and the variety of software systems, changes to the workflow processes in activities are becoming more complex in terms of content. At the same time, global and local threats to electronic information and data processing systems are increasing. An effective protection of the information to be protected for the business processes and business practices is of decisive importance for the success of the organization. Against this background, the strategic potential for a sustainable management of global and local risks in combination with a flexibly designed exchange of information within the management systems is largely unexplored. This paper proposes increasing the efficiency of the Risk Management Process (RMP) by adapting the management activities for IS, CS and DP. Through adapted risk management activities, the assessment of potential consequences or opportunities of risks can be quantified towards the application and management of measures. This includes the combination and expansion of implementing strategic elements for the categorization and group consolidation of management systems as well as the prioritization of secure and sustainable measures. Their dependencies are examined to show that the IS, in combination with the other management systems, plays a central role in the model-based standardization of the information elements. In addition, industry-independent and sustainable security disciplines are proposed in order to model the specific security processes or individual security-relevant process steps within existing company processes.

  • Issue Year: 12/2023
  • Issue No: 2
  • Page Range: 1-10
  • Page Count: 10
  • Language: English