explanation of how automating the modelling of
large-scale cybersecurity transformations can be done
in an approachable way. We believe that is an
important problem that we could solve or at the very
least simplify for all the organizations that are looking
to improve their cybersecurity posture in an efficient
way.
Fully developing the described methodology and
model would allow to shorten the time and effort
needed to create such comprehensive transformation
plans and, in some cases, might be enough to get the
company on the right track immediately.
REFERENCES
Chen, R., Liang, C., Gu, D., Leung, J., 2017. A multi-
objective model for multi-project scheduling and multi-
skilled staff assignment for IT product development
considering competency evolution, International
Journal of Production Research, Issue 21, Volume 55,
May 2017.
Choi, J., Kaplan, J., Krishnamurthy, C., Lung, H., 2017. Hit
or myth? Understanding the true costs and impact of
cybersecurity programs. https://www.mckinsey.com/
business-functions/digital-mckinsey/our-insights/hit-
or-myth-understanding-the-true-costs-and-impact-of-
cybersecurity-programs. Accessed Jan 2019.
Ericsson, 2017. Ericsson Mobility Report with Middle East
and Africa Appendix, November 2017.
https://www.ericsson.com/assets/local/mobility-
report/documents/2017/ericsson-mobility-report-
november-2017-middle-east-and-africa.pdf.
Stockholm, Sweden. Accessed Jan 2019.
Gartner Inc., 2018. Gartner Forecasts Worldwide
Information Security Spending to Exceed $124 Billion
in 2019, United States. https://www.gartner.com/en/
newsroom/press-releases/2018-08-15-gartner-
forecasts-worldwide-information-security-spending-
to-exceed-124-billion-in-2019. Accessed Jan 2019.
Jasper, S., 2017. Russia and Ransomware: Stop the Act, Not
the Actor. The National Interest, November 20, 2017.
USA.
Libicki, M., Senty, D., Pollak, J., 2014. Hackers Wanted:
An examination of the cybersecurity labor market,
Rand National Security Research Division. Santa
Monica, California, USA.
McAlpine, E., Tedesco, M., Skirbe, K., Boukouris, D.,
Isagon, J., Keswani, J., 2018. Cybersecurity Almanac.
https://momentumcyber.com/docs/Yearly/2018_Cyber
security_Almanac.pdf. Accessed Jan 2019. Momentum
Cyber, San Francisco, USA.
Nagurney, A., Nagurney, L.S., Shukla, S., 2015. A Supply
Chain Game Theory Framework for Cybersecurity
Investments Under Network Vulnerability. Amherst,
USA.
Panaousis, E., Fielder, A., Malacaria, P., Hankin, C.,
Smeraldi, F., 2014. Cybersecurity Games and
Investments: A Decision Support Approach. Queen
Mary University of London, UK.
Ponemon Institute, 2017. The state of cybersecurity in the
oil & gas industry, United States. http://
news.usa.siemens.biz/sites/siemensusa.newshq.busines
swire.com/files/press_release/additional/Cyber_readin
ess_in_Oil__Gas_Final_4.pdf. Accessed Jan 2019.
Rot, A., Blaicke, B., 2017. Internet of Things security.
Selected threats and protection methods on the example
of manufacturing systems, Publishing House of
Czestochowa Technical University, Czestochowa,
Poland.
Rothrock, R.A., Kaplan, J., Van der Oord, F., 2017. The
Board’s Role in Managing Cybersecurity Risks, MIT
Sloan Management Review Magazine: Winter 2018
Issue. Cambridge, USA.
Song, W., Kang, D., Zhang, J., Cao, Z., Xi, H., 2019. A
Sampling Approach for Proactive Project Scheduling
under Generalized Time-dependent Workability
Uncertainty, Journal of Artificial Intelligence Research
Volume 64, 2019.
United States Government Accountability Office (US-
GAO), 2016. Information Security. Agencies Need to
Improve Controls over Selected High-Impact Systems.
https://www.gao.gov/assets/680/677293.pdf
Washington DC., USA. Accessed Jan 2019.
Venkatachary, S.K., Prasad, J., Samikannu, R., 2018.
Cybersecurity and cyber terrorism - in energy sector –
a review. Journal of Cyber Security Technology
Volume 2, 2018.
Verizon, 2017. Data Breach Investigations Report 10
th
Edition, USA.
http://www.verizonenterprise.com/verizon-insights-
lab/dbir/tool/. Accessed Jan 2019.
Vishik, C., Sheldon, F., Ott, D., 2013. Economic Incentives
for Cybersecurity: Using Economics to Design
Technologies Ready for Deployment.
World Economic Forum (WEF), 2019. The Global Risks
Report 2019, 14th Edition. Geneva, Switzerland.
http://www3.weforum.org/docs/WEF_Global_Risks_
Report_2019.pdf. Accessed Jan 2019.
Zetter, K., 2014. Countdown to zero day. Stuxnet and the
launch of the world's first digital weapon, Random
House. USA.
ICEIS 2019 - 21st International Conference on Enterprise Information Systems
350