Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ EUROPEAN RESEARCH ST...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
EUROPEAN RESEARCH STUDIES JOURNAL
Article . 2024 . Peer-reviewed
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
OAR@UM
Article . 2024 . Peer-reviewed
Data sources: OAR@UM
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Chief Information Security Officer: A Vital Component of Organizational Information Security Management

Authors: Ciekanowski, Marek; Żurawski, Sławomir; Ciekanowski, Zbigniew; Pauliuchuk, Yury; Czech, Artur;

Chief Information Security Officer: A Vital Component of Organizational Information Security Management

Abstract

PRACTICAL IMPLICATIONS: The article addresses the topic of information security, emphasizing its significance in today's digital world, where data is a critical asset for organizations, and it focuses on the ISO 27000 standard, which is one of the most important standards related to information security management. It discusses its main assumptions, scope, and benefits resulting from its implementation. Another aspect addressed is the role of the CISO (Chief Information Security Officer) in the organization. The authors analyze the tasks, responsibilities, and expectations placed on the individual fulfilling this role. They explain that the CISO is a key player in ensuring the integrity, confidentiality, and availability of data within the organization, while also being a leader in the field of information security. The article also discusses the threats that CISOs must contend with in their work, encompassing both technical threats and those associated with human factors, such as lack of employee awareness regarding information security or neglect in security policies and procedures. The authors emphasize that the role of the CISO is becoming increasingly strategic in ensuring information security in organizations.

ORIGINALITY/VALUE: The authors accentuate in this article the fact that organizations must provide adequate support for their CISO and enable access to appropriate resources, including financial and human resources, to effectively fulfill their duties. Furthermore, they emphasize that continued research in the field of information security management is crucial because cyber threats are constantly evolving, and organizations must stay updated with the latest methods and tools for data protection. This research may include new technologies, best practices, risk management, and the development of skills and competencies for information security personnel. Pursuing the continuous improvement of information security processes and strategies will be crucial for maintaining data protection at an appropriate level in a dynamic and changing business environment.

DESIGN/METHODOLOGY/APPROACH: The research problem was formulated as follows: What role does the CISO play in ensuring information security within an organization? To address this research problem, appropriate research methods were employed, such as literature analysis, both domestic and foreign, about information security, ISO 27000 standards, the role of the CISO, and information security threats. This method facilitated understanding existing theories, research frameworks, and practices in the field of information security, as well as the analysis of documents and reports containing current research, data, and information, enabling an understanding of practices and standards applicable in a given organization or sector.

FINDINGS: The process of developing, implementing, maintaining, improving, and auditing the quality management system impacts the security level of the organization. Consequently, it serves as a modern tool focused on instilling organizational order in the company, encompassing both the structure and creativity of all employees.

PURPOSE: The article aims to identify the role of the Chief Information Security Officer (CISO) in managing information security within an organization.

peer-reviewed

Keywords

Computer security, Business enterprises -- Information technology -- Management, Business enterprises -- Computer networks -- Security measures., Information technology -- Security measures, Data protection

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    1
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
1
Average
Average
Average
Green
gold