Information security competence) from each
organization. The results from the tests in Sweden
varied a lot, from non-existed in one organization to
almost optimal in another organization. This was the
main reason for us to use the NIST-tiers to push
forward several participants on all tiers. In our test,
we see that on the different tiers the results are
comparable, but there are differences between the
tires. This shows us that it is necessary to do the test
on all tiers to get the best possible picture to plan for
further use of the results. Compared to other maturity
models, e.g. the Community Cyber Security Maturity
Model (CCSMM) (White, 2007), the Wahlgren and
Kowalski model does not only look at the community
measured as an entirety, but also when looking at
different tiers in the organization, gives suggestions
on what to do to improve the situation. In comparison
to the CCSMM, the Wahlgren and Kowalski model
also uses the ISO-standards for Information Security,
like 27005 and 27035 to be in line with what is
expected in cyber crisis management. Wahlgren and
Kowalski escalation maturity model gives an
overview of what should be done within each
maturity attributes (as a part of the individual report),
to improve the situation. The results vary from Non-
excitant to Optimized on the same attributes, but we
see that there is consensus on the different tires.
Based on those results it will be important to divide
program and action points between the different tiers,
not only per participant.
In our analysis of the results, we intuitively
focused on the weakest scores. It is also important to
analyse the high scores, to find the strength of the
organization, and how to keep and evolve that as well.
After analysing the results, it is nevertheless
important to prioritize which attributes to work with.
We suggest presenting a suggested prioritization to
the management board of which will select acceptable
levels. When prioritized, an action strategy must be
defined within the regulations of project management
in the organization.
Next important step is how to implement the
projects. As mentioned in or model-analysis, we
suggest implementing plans at acceptable levels, both
on information security acceptable levels and on
human acceptable levels. When acceptable levels are
decided, implementation should be applied step by
step.
6 CONCLUSIONS AND FUTURE
RESEARCH
Our research tested escalation MM at the Inland
hospital to understand level of maturity to support
diffusion of cyber security awareness and escalation,
give good knowledge for preparation for the hospital
trust exercises at the best possible level when
executing at the Norwegian Cyber Range (NCR). We
also conclude that the best use of the model is by
testing maturity on both strategic, tactical and
operational levels in the organization, and next to
prepare for equalization amongst the tiers.
We also suggest an improvement maturity process
with concrete improvement-suggestions on each
maturity-step, which can be used for preparation for
instructions in general and exercises in special. We
also propose to use this process in instructions and
exercises, to improve cyber security resilience step by
step. We plan to use the improved maturity model to
do a broad research within municipalities, and
consequently we will suggest necessary development
to contract and compare results from a connected
database.
ACKNOWLEDGEMENTS
We would like to thank the Inland hospital trust for
being all positive and welcoming to do this research.
We would also like to thank Gunnar Wahlgren and
Stewart James Kowalski for giving us the opportunity
to use their newly developed maturity escalation
tools. Additionally, we would also like to give a
special thanks to Kieren Ni
Ĉolas Lovell, RNorN
RTD, for doing the vulnerability scanning on open
sources at the hospital trust.
REFERENCES
Ayat, M., & Sharifi, M. (2016). Maturity Assessment of
Hospital Information Systems Based on Electronic
Medical Record Adoption Model (EMRAM)— Private
Hospital Cases in Iran. International Journal of
Communications, Network and System Sciences,
09(11), 471–477. https://doi.org/10.4236/ijcns.
2016.911038
Baugerød Stokke, O. P. (2009, March 23). Advarer it-sjefer
mot effektivitet. Computerworld.No. Retrieved from
http://www.cw.no/artikkel/enterprise/advarer-it-sjefer-
mot-effektivitet
Becker, J., Knackstedt, R., & Pöppelbuß, J. (2009).
Developing Maturity Models for IT Management.