Page 188 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 188
2019 ITU Kaleidoscope Academic Conference
[24] J. Mullins, “The eight failures that caused the Gulf [33] G. Zheng, G.Zhang, W.Yang, C.Vali, R. Shankaran,
oil spill”, New Scientist, Sep. 8, 2010 available: M.Orgun, “From WannaCry to WannaDie: Security
https://www.newscientist.com/article/dn19425-the- Trade-offs and design for implantable medical
eight-failures-that-caused-the-gulf-oil-spill . devices”, IEEE, 17th International Symposium on
Communications and Information Technologies,
[25] S. Morgan, “2018 Cybersecurity Market Report”, 25-27 Sept 2017. Available
Cybersecurity Ventures, May 31, 2017,\. Available: https://ieeexplore.ieee.org/document/8261228 .
https://cybersecurityventures.com/cybersecurity-
market-report/ . [34] J. Freund, J. Jones, “Measuring and Managing
Information Risk: A FAIR Approach”, Butterworth-
[26] S. Morgan, “Cyber Crime Costs Projected to Reach Heinemann, 2014. ISBN-13: 978-0124202313.
$2 Trillion by 2019”, Forbes, Jan. 17, 2016.
available: [35] Open Group, “Risk Taxonomy (O-RT)”, Open
https://www.forbes.com/sites/stevemorgan/2016/01/ Group Technical Standards, Version 2.0, 18-Oct-
17/cyber-crime-costs-projected-to-reach-2-trillion- 2013. Available
by-2019 . https://publications.opengroup.org/c13k .
[27] S. Morgan, “One Million Cybersecurity Job [36] Open Group, “Risk Analysis (O-RA)”, Open Group
Openings in 2016”, Forbes, Jan. 2, 2016. Available: Technical Standards, 18-Oct-2013. Available
https://www.forbes.com/sites/stevemorgan/2016/01/ https://publications.opengroup.org/c13g .
02/one-million-cybersecurity-job-openings-in-
2016/. [37] DoCRA Council, “Duty of Care Risk Analysis
Standard”, Version 0.5, April, 2018. Available
[28] P. Sawers, “Global cybersecurity workforce to be https://docraprod.wpengine.com/wp-
short 1.8 Million by 2022”, Venture Beat, June 7, content/uploads/2018/04/Duty-of-Care-Risk-
2017. Available: Analysis-Standard-v05.pdf .
https://venturebeat.com/2017/06/07/global-
cybersecurity-workforce-to-be-short-by-1-8- 38] C. Cronin, “The Questions a Judge will ask you
million-personnel-by-2022-up-20-on-2015/ . after a Data Breach”, Borderless Cyber, Oct 2019.
Available https://us19.borderlesscyber.org/program-
[29] C. Bryant, “How to justify your IT Security Budget”, schedule/program/108/plenary-session-keynote-the-
17-Oct-2016. Available questions-a-judge-will-ask-you-after-a-data-breach .
https://www.risklens.com/blog/how-to-justify-your-
it-security-budget/ . [39] Verizon, “2016 Data Breach Report”, available:
https://www.verizonenterprise.com/resources/report
[30] D. Hubbard and R. Seiersen, “How to Measure s/rp_DBIR_2016_Report_en_xg.pdf .
Anything in Cybersecurity Risk”. Hoboken, NJ:
Wiley, 2016. [40] “Integrated Adaptive Cyber Defense” available:
https://www.iacdautomate.org/learn/ .
[31] C. Valasquez, et al., “Hybrid Loss Exceedance
Curve (HLEC) for risk assessment”, International [41] “OASIS Cyber Threat Intelligence (CTI) Technical
Symposium on Computational Civil Engineering, Committee (TC)”. Available: https://www.oasis-
Iasi, Romania, May, 2013. available: open.org/committees/tc_home.php?wg_abbrev=cti .
https://www.researchgate.net/profile/Alex_Barbat/p
ublication/259609767_Hybrid_loss_exceedance_cu [42] R. Piazza, J. Wunder, B. Jordan, “STIX Version
TM
rve_HLEC_for_risk_assessment/links/0deec52ce53 2.0”, OASIS Committee Specification, 19 July
c507de4000000/Hybrid-loss-exceedance-curve- 2017. Available https://www.oasis-
HLEC-for-risk- open.org/standards#stix2.0 .
assessment.pdf?origin=publication_detail .
[43] J. Wunder, M. Davidson, B. Jordan, “TAXII
TM
[32] M. Nederlof (1994) "Comparing probabilistic Version 2.0”, OASIS Committee Specification 01.
predictions with outcomes in petroleum exploration Available http://docs.oasis-
prospect appraisal". Nonrenewable Resources,v.3, open.org/cti/taxii/v2.0/cs01/taxii-v2.0-cs01.html .
No.3, 1994, p.183-189.
– 168 –