Transformation of Cybersecurity Posture in IT Telecommunication: A Case Study of a Telecom Operator

Ahmed Mohamed, Dilshad Sarwar, Amin Hosseinian Far

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Organisations are facing sophisticated and advanced persistent threats (APT) that are targeting sensitive information assets. Any form of cyber-presence can be typically attacked by adversaries, and the motives of such attacks are context dependent. Besides, users and organisations are prone to software vulnerabilities, misconfigura-tions, outdated systems and several other systemic deficiencies which can be leveraged to compromise enterprise assets and gain an initial foothold within an organisation network. The aim of the pa-per is to develop a flexible and generally comprehensive organisa-tional strategy to defend against the massive increase in cyberat-tacks, in order to protect the strategic business objectives of an or-ganisation and keep an alignment between business objectives and security. Moreover, this paper reflects on the work undertaken by multiple teams within the chosen case study organisation to enhance the cybersecurity.
Original languageEnglish
Title of host publicationCybersecurity, Privacy and Freedom Protection in the Connected World
EditorsHamid Jahankhani, Arshad Jamal, Shaun Lawson
PublisherSpringer Nature Link
Pages441-457
Number of pages17
ISBN (Print)978-3-030-68533-1
DOIs
Publication statusPublished - 21 May 2021

Fingerprint

Dive into the research topics of 'Transformation of Cybersecurity Posture in IT Telecommunication: A Case Study of a Telecom Operator'. Together they form a unique fingerprint.

Cite this