Transformation of Cybersecurity Posture in IT Telecommunication: A Case Study of a Telecom Operator

Research output: Contribution to Book/ReportConference Contributionpeer-review

Abstract

Organisations are facing sophisticated and advanced persistent threats (APT) that are targeting sensitive information assets. Any form of cyber-presence can be typically attacked by adversaries, and the motives of such attacks are context dependent. Besides, users and organisations are prone to software vulnerabilities, misconfigura-tions, outdated systems and several other systemic deficiencies which can be leveraged to compromise enterprise assets and gain an initial foothold within an organisation network. The aim of the pa-per is to develop a flexible and generally comprehensive organisa-tional strategy to defend against the massive increase in cyberat-tacks, in order to protect the strategic business objectives of an or-ganisation and keep an alignment between business objectives and security. Moreover, this paper reflects on the work undertaken by multiple teams within the chosen case study organisation to enhance the cybersecurity.
Original languageEnglish
Title of host publicationCybersecurity, Privacy and Freedom Protection in the Connected World
Subtitle of host publicationProceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021
EditorsHamid Jahankhani, Arshad Jamal, Shaun Lawson
Place of PublicationCham
PublisherSpringer
Pages441-457
Number of pages17
ISBN (Electronic)978-3-030-68534-8
ISBN (Print)978-3-030-68533-1
DOIs
Publication statusPublished - 21 May 2021
EventVIRTUAL 13th International Conference on Global Security, Safety & Sustainability - London, United Kingdom
Duration: 14 Jan 202115 Jan 2021
https://london.northumbria.ac.uk/event/13th-international-conference-on-global-security-safety-sustainability/

Conference

ConferenceVIRTUAL 13th International Conference on Global Security, Safety & Sustainability
Country/TerritoryUnited Kingdom
CityLondon
Period14/01/2115/01/21
Internet address

Fingerprint

Dive into the research topics of 'Transformation of Cybersecurity Posture in IT Telecommunication: A Case Study of a Telecom Operator'. Together they form a unique fingerprint.

Cite this