5 FUTURE DEVELOPMENT
HERMENEUT is a knowledge-extraction funnelling
process, which measures the cybersecurity posture of
an organisation from the knowledge of its internals
(employees and C-levels) using questionnaires, to
support their cyber-risk management. Questionnaires
supported processes (e.g. also most Capability
Maturity Models), has biases leading to
approximations that we want to verify. As shown in
Figure 7 data quality/accuracy is directly proportional
to time and cost. The different measurement methods
are valid within limits above which the knowledge
acquired or, the required preciseness degrades.
HERMENEUT still has to understand its limits. A
more robust solution would use a mixed approach,
questionnaires plus technical evidences collection
(e.g., using penetration tests). However, the
advantage of questionnaire-based or mixed
approaches is the saving of costs.
Figure 7: Data quality/accuracy vs time,costs and
knowledge extraction method used.
HERMENEUT will open source in 2019 its
framework, tested in the Healthcare and IP-intensive
industries. The choice is a consequence of the
imbalance between the effectiveness of recent
attacks, the increasing number of those hitting the
intangibles and the relative inadequacy of the
defences.
ACKNOWLEDGEMENTS
Funded under the EU H2020 HERMENEUT project,
grant agreement No. 740322.
REFERENCES
Ahmed, B., 2003. The management of intangibles: The
Organisation’s most valuable assets. London:
Routledge.
Ahmed, B., 2017. Micro - and macroeconomic modelling
of intangible cyber-costs.
Chismon, D. and Ruks, M., 2015. Threat Intelligence:
Collecting, Analysing, Evaluating.
Deloitte, 2016. Beneath the surface of a cyberattack A
deeper look at business impacts., s.l.: s.n.
Dogana, 2018. DOGANA Project. [Online]
Available at: www.dogana-project.eu
Enisa, 2017. Threat Landscape Report. [Online].
Enisa, 2018. Information Sharing and Analysis Centres
(ISACs): Cooperative models. [Online].
FireEye, 2017. Cyber Threats: A perfect storm about to hit
Europe?.
International Organization for Standardization, 2009. ISO
31000 Risk management — Principles and guidelines.
s.l.:s.n.
Jacobs, J., 2014. Fake Followers for Hire, and How to Spot
Them.
Johnson, M., 2016. Cyber crime, security and digital
intelligence. London: Routledge.
Kerber, R. and Jessop, S., 2015. Asset Managers Urged to
Make Cyber Risk Top Priority. [Online].
Langner, R., 2013. To kill a centrifuge. A technical analysis
of what Stuxnet’s creators tried to achieve the Langner
group. London: Routledge.
Nakamura, L., 2003. A Trillion Dollars a Year in Intangible
Investment and the New Economy. In: Intangible
Assets. Oxford: Oxford University Press.
Paychex, 2016. Creating a Cyber Security Culture in Your
Business..
Ponemon, 2018. Cost of Data Breach Study.
ProofPoint, 2018. Protecting People Report. A quarterly
analysis of highly targeted attacks.
ProofPoint, 2018. The Human Factor - People-centred
threats define the landscape.
Riddle, B., Nyman, N. and Rees, J., 2011. Estimating the
costs of a data breach: An exercise at the new
Hampshire state cancer registry. Atlanta, s.n.
SolidWorks, 2018. Secureworks Launches First
Cybersecurity Maturity Model Based on an
Organization’s Inherent Risk.
Stix, 2018. A structured language for cyber threat
Intelligence
Thomas, K. et al., 2015. Framing Dependencies Introduced
by Underground Commoditization. s.l., s.n.
Trend Micro, 2015. Understanding targeted attacks. What
is a targeted attack.
Veris, 2018. Community Database.
Yao, Y. et al., 2017. Automated Crowdturfing Attacks and
Defenses in Online Review Systems. Arxiv.org.
Zurich Insurance, 2014. The good, the bad and the careless.
An overview of corporate cyber risk., s.l.: s.n.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
502