across organisations of diverse sizes and industries,
and will consider the extent to which organisations
recognise incident response as an issue, as well as
how the feel in terms of readiness to handle it. The
categories of readiness factor will then be explored in
order to investigate the extent to which each is found
to be a relevant issue in practice. This will assist in
further determining potential interrelationships, as
well as providing at least an initial baseline view of
the relative influence of individual factors (or factor
categories).
5 CONCLUSIONS
The intricacies of organisational preparedness for
cybersecurity incidents are multifaceted, involving a
range of critical factors, including security culture,
training and awareness, communication, management
support, resource allocation, a dedicated IR team,
external collaboration, vendor/third-party relation-
ships, technological infrastructure, regulatory and
standards compliance, and the IR plan. The gap in
organisational readiness highlights the opportunity
for a tool that would assist in evaluating their
response readiness, and support them in taking related
actions to improve their posture, bridging the evident
practice gap and enhancing overall cyber security
readiness.
REFERENCES
Ab Rahman, N.H., & Choo, K.-K.R. (2015). A survey of
information security incident handling in the cloud.
Computers & Security, 49, 45-69.
Abraham, C., Chatterjee, D., & Sims, R.R. (2019).
Muddling through cybersecurity: Insights from the US
healthcare industry. Business Horizons, 62(4), 539-548.
Ahmad, A., Desouza, K.C., Maynard, S.B., Naseer, H., &
Baskerville, R.L. (2020). How integration of cyber
security management and incident response enables
organizational learning. Journal of the Association for
Information Science and Technology, 71(8), 939-953.
Akter, S., Uddin, M.R., Sajib, S., Lee, W.J.T., Michael, K.,
& Hossain, M.A. (2022). Reconceptualizing
cybersecurity awareness capability in the data-driven
digital economy. Annals of Operations Research.
https://doi.org/10.1007/s10479-022-04844-8
Aldawood, H., & Skinner, G. (2019a). Challenges of
implementing training and awareness programs
targeting cyber security social engineering. 2019
cybersecurity and cyberforensics conference (ccc),
Aldawood, H., & Skinner, G. (2019b). Reviewing Cyber
Security Social Engineering Training and Awareness
Programs-Pitfalls and Ongoing Issues. Future Internet,
11(3).
Bahuguna, A., Bisht, R.K., & Pande, J. (2019). Assessing
cybersecurity maturity of organizations: An empirical
investigation in the Indian context. Information
Security Journal: A Global Perspective, 28(6), 164-
177.
BakerHostetler. (2023). 2023 Data Security Incident
Response Report,. bakerlaw.com. https://www.baker
law.com/webfiles/2023%20DSIR%20Report.pdf
Benz, M., & Chatterjee, D. (2020). Calculated risk? A
cybersecurity evaluation tool for SMEs. Business
Horizons, 63(4), 531-540.
Berlilana, Noparumpa, T., Ruangkanjanases, A., Hariguna,
T., & Sarmini. (2021). Organization Benefit as an
Outcome of Organizational Security Adoption: The
Role of Cyber Security Readiness and Technology
Readiness. Sustainability, 13(24).
Cisco. (2023). Cybersecurity Readiness Index Resilience in
a Hybrid World. Cisco. https://www.cisco.com/c/dam/
m/en_us/products/security/cybersecurity-reports/cyber
security-readiness-index/2023/cybersecurity-readiness
-index-report.pdf
Cynet. (2019). NIST Incident Response Plan: Building your
IR process. Cynet. https://www.cynet.com/incident-
response/nist-incident-response/
Daud, M., Rasiah, R., George, M., Asirvatham, D., &
Thangiah, G. (2018). Bridging the Gap between
Organisational Practices and Cyber Security
Compliance: Can Cooperation romote Compliance in
Organisations? International Journal of Business and
Society, 19(1), 161-180.
Deloitte. (2023). 2023 Global Future of Cyber Survey,
.
https://www.deloitte.com/global/en/services/risk-
advisory/content/future-of-cyber.html
Deloitte. (2016). Readiness, response, and recovery: Cyber
crisis management. https://www2.deloitte.com/content/
dam/Deloitte/ch/Documents/audit/ch-en-cyber-crisis-
management.pdf.
Frenken, P. (2020). Why Build a Cybersecurity Culture?,.
ISACA. 22 October 2020. https://www.isaca.org/
resources/news-and-trends/isaca-now-blog/2020/why-
build-a-cybersecurity-culture
Georgiadou, A., Mouzakitis, S., Bounas, K., & Askounis,
D. (2022). A cyber-security culture framework for
assessing organization readiness. Journal of Computer
Information Systems, 62(3), 452-462.
Hasan, S., Ali, M., Kurnia, S., & Thurasamy, R. (2021).
Evaluating the cyber security readiness of organizations
and its influence on performance. Journal of
Information Security and Applications, 58, 102726.
https://doi.org/10.1016/j.jisa.2020.102726
Huang, K., & Pearlson, K. (2019). For What Technology
Can't Fix: Building a Model of Organizational
Cybersecurity Culture. Proceedings of the 52nd Annual
Hawaii International Conference on System Sciences,
6398-6407.
IBM. (2022). Cost of a Data Breach 2022,. IBM.
https://www.ibm.com/reports/data-breach