PreprintArticleVersion 1This version is not peer-reviewed
Approaches of Critical Infrastructure Companies to Recover from Cyber-Attack: Insights from Internal Specialists and External In-Formation Security Auditors
Version 1
: Received: 26 September 2024 / Approved: 26 September 2024 / Online: 26 September 2024 (14:43:49 CEST)
How to cite:
Leroy, I.; Zolotaryova, I.; Semenov, S. Approaches of Critical Infrastructure Companies to Recover from Cyber-Attack: Insights from Internal Specialists and External In-Formation Security Auditors. Preprints2024, 2024092129. https://doi.org/10.20944/preprints202409.2129.v1
Leroy, I.; Zolotaryova, I.; Semenov, S. Approaches of Critical Infrastructure Companies to Recover from Cyber-Attack: Insights from Internal Specialists and External In-Formation Security Auditors. Preprints 2024, 2024092129. https://doi.org/10.20944/preprints202409.2129.v1
Leroy, I.; Zolotaryova, I.; Semenov, S. Approaches of Critical Infrastructure Companies to Recover from Cyber-Attack: Insights from Internal Specialists and External In-Formation Security Auditors. Preprints2024, 2024092129. https://doi.org/10.20944/preprints202409.2129.v1
APA Style
Leroy, I., Zolotaryova, I., & Semenov, S. (2024). Approaches of Critical Infrastructure Companies to Recover from Cyber-Attack: Insights from Internal Specialists and External In-Formation Security <span aria-describedby="tippy-36">Auditors. Preprints. https://doi.org/10.20944/preprints202409.2129.v1
Chicago/Turabian Style
Leroy, I., Iryna Zolotaryova and Serhii Semenov. 2024 "Approaches of Critical Infrastructure Companies to Recover from Cyber-Attack: Insights from Internal Specialists and External In-Formation Security <span aria-describedby="tippy-36">Auditors" Preprints. https://doi.org/10.20944/preprints202409.2129.v1
Abstract
Companies operating in the PayTech and online e-commerce sectors play a crucial role in critical infrastructure, functioning within the dynamic digital landscape. This study focuses on the recovery process after cyber-attacks and examines the contrasting perspectives of internal and external professionals. The research reveals notable differences in the perceptions of recovery strategies between internal stakeholders such as investor relations, reputation management, and Chief Information Security Officers, representing companies belonging to critical infrastructure and external auditors, who provide just and emergency support and perform specific tasks. Importantly, the study underscores the current attitudes towards future information security strategies and their influence on the financial recovery and reputation of reliable companies following cyber incidents. This research contributes to the existing knowledge by shedding light on the perspectives of both a company's internal and external specialists involved in the recovery process and cyber resilience strategies in critical infrastructure sectors.
Keywords
information security; information security assessment; digital; reputation management; cyber autonomy; cyber resilience
Subject
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.