Preprint Article Version 1 This version is not peer-reviewed

Approaches of Critical Infrastructure Companies to Recover from Cyber-Attack: Insights from Internal Specialists and External In-Formation Security Auditors

Version 1 : Received: 26 September 2024 / Approved: 26 September 2024 / Online: 26 September 2024 (14:43:49 CEST)

How to cite: Leroy, I.; Zolotaryova, I.; Semenov, S. Approaches of Critical Infrastructure Companies to Recover from Cyber-Attack: Insights from Internal Specialists and External In-Formation Security Auditors. Preprints 2024, 2024092129. https://doi.org/10.20944/preprints202409.2129.v1 Leroy, I.; Zolotaryova, I.; Semenov, S. Approaches of Critical Infrastructure Companies to Recover from Cyber-Attack: Insights from Internal Specialists and External In-Formation Security Auditors. Preprints 2024, 2024092129. https://doi.org/10.20944/preprints202409.2129.v1

Abstract

Companies operating in the PayTech and online e-commerce sectors play a crucial role in critical infrastructure, functioning within the dynamic digital landscape. This study focuses on the recovery process after cyber-attacks and examines the contrasting perspectives of internal and external professionals. The research reveals notable differences in the perceptions of recovery strategies between internal stakeholders such as investor relations, reputation management, and Chief Information Security Officers, representing companies belonging to critical infrastructure and external auditors, who provide just and emergency support and perform specific tasks. Importantly, the study underscores the current attitudes towards future information security strategies and their influence on the financial recovery and reputation of reliable companies following cyber incidents. This research contributes to the existing knowledge by shedding light on the perspectives of both a company's internal and external specialists involved in the recovery process and cyber resilience strategies in critical infrastructure sectors.

Keywords

information security; information security assessment; digital; reputation management; cyber autonomy; cyber resilience

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.