Submitted:
26 September 2024
Posted:
26 September 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Motivation
1.2. State-of-the-Art
1.3. Objectives and Contributions
2. Data Collection
3. Methodology
4. Results
| Question number | Questions |
Internal IR/RM specialists, CISO |
External Information security auditors |
||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 1 | 2 | 3 | 4 | 5 | ||
| 1 | In the event of a cyberattack, are there reputation management tools that can assist in restoring the company’s reputation and simultaneously recovering its share value? | 0% | 10% | 30% | 60% | 0% | 0% | 25% | 40% | 20% | 5% |
| 2 | Do you believe companies providing critical infrastructure should establish their own internal CISO position, as well as dedicated IR and RM specialist positions? | 3% | 0% | 43% | 52% | 2% | 10% | 20% | 40% | 30% | 0% |
| 3 | Do you believe that having an internal CISO position, along with IR and RM specialists within critical infrastructure organizations, is sufficient to effectively mitigate reputation damage following a cyber-attack? | 0% | 0% | 40% | 57% | 3% | 20% | 10% | 40% | 25% | 5% |
| 4 | Should CISOs be limited to individuals with only an IT background? | 2% | 57% | 36% | 5% | 5% | 10% | 15% | 60% | 15% | 0% |
| 5 | Is it advisable to base reputation defense after cyber-attacks and stock price recovery strategies on methodologies such as Agile, Lean Six Sigma, PRINCE2, or PM²? | 2% | 3% | 30% | 26% | 39% | 0% | 15% | 45% | 30% | 10% |
| 6 | Do you think that critical infrastructure businesses have industrial dependence on external IT vendors? | 2% | 10% | 16% | 72% | 0% | 0% | 10% | 25% | 65% | 0% |
| 7 | Do you agree that the European Union (EU) should play a vital role in safeguarding critical infrastructure entities located outside its jurisdiction? | 0% | 7% | 33% | 58% | 2% | 15% | 10% | 40% | 35% | 0% |
5. Conclusion
6. Contribution to the Field
7. Research Limitations
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Acknowledgments
Conflicts of Interest
References
- Cartwright, A., Cartwright, E., & Solomon Edun, E. (2023) Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies. Computers & Security, Vol. 131. [CrossRef]
- 2. Claroty Ltd. (2022). Report: The Global State of Industrial Cybersecurity 2021: Resilience Amid Disruption. New York.
- Velinov, E., Leroy, I., Cetlova, E. (2021) ‘Marketing Process in Information Security Context: Comparison Between Czech Republic and Belgium’. In Proceedings of the International Conference Engineering Innovations and Sustainable Development. Chapter 64. Springer. Germany. ISBN 9783030908423.
- 4. Shinichi Kamiya, Jun-Koo Kang, Jungmin Kim, Andreas Milidonis, René M. Stulz, Risk management, firm reputation, and the impact of successful cyberattacks on target firms, Journal of Financial Economics, Volume 139, Issue 3, 2021, Pages 719-749, ISSN 0304-405X. https://doi.org/10.1016/j.jfineco.2019.05.019.
- Shinichi K., Kang J., Jungmin Kim, Milidonis A., (2018) ‘What is the Impact of Successful Cyberattacks on Target Firms?’ SSRN Electronic Journal. [CrossRef]
- 6. Ernst & Young, 2019. What companies are disclosing about cybersecurity risk and oversight. 2019 [online]: https://assets.ey.com/content/dam/ey-sites/ey-com/en_us/topics/cbm/ey-cbm-cybersecurity-risk-oversight-final-eycom.pdf).
- Hiles, A. (2011). Reputation Management: Building and Protecting Your Company’s Profile in a Digital World. NY: Bloomsbury Publishing Plc. ISBN: 9781849300421.
- 8. European Commission. (2016) PM² Project Management Methodology Guide. [online] https://op.europa.eu/en/publication-detail/-/publication/0e3b4e84-b6cc-11e6-9e3c-01aa75ed71a1.
- 9. European Central Bank, (2022) Towards a framework for assessing systemic cyber risk. Financial Stability Review, Belgium.
- 10. European Commission (2016) Directive (EU) 2016/1148 concerning measures for a high common level of security of network and information systems across the Union. Official Journal of the European Union, Belgium.
- Leroy, I. (2022) ‘The relationship between cyber-attacks and dynamics of company stock. The role of Reputation Management’. Int. J. Electronic Security and Digital Forensics, Vol. 3(1), 24–25. ISSN: 17519128.
- Stephen Ziliak T. (2011) ‘W.S. Gosset and Some Neglected Concepts in Experimental Statistics: Guinnessometrics II’. Journal of Wine Economics, 2011. Vol. 6 (2), pp.52–277. ISSN 1931-4361.
- 13. Tran Nguen Bao Ngo & Andrea Tick (2021) ‘Cyber-Security Risks Assessment by External Auditors’, Interdisciplinary Description of Complex Systems, Vol. 19, no. 3, pp. 375 – 390.
| Groups |
Number RM tools used |
Share price recovery time | Share value lost | Companies with internal CISO position | Companie with internal IR or RM position |
|---|---|---|---|---|---|
| Companies with Successful RM | 7 RM tools 100% | 11.2 days | 1.1 % | 92% | 97% |
| Companies with Poor RM | 4 RM tools 58% | 19.5 days | 2.3 % | 81% | 91% |
| Company | Mall Group | Worldline SA | Advantio |
|---|---|---|---|
| Country | Czech Republic | Belgium | Ireland |
| Primary domain of business operations | E-commerce and online retail | Payment processing and digital solutions | Cybersecurity |
| Critical infrastructure operations | Full range of digital ecommerce services for the international market. | Marchant and acquirer solution | PCI security assessments |
|
Question |
Internal IR/RM specialists, CISO |
External Information security auditors |
|---|---|---|
| 1 | 3.5 | 2.75 |
| 2 | 3.5 | 2.9 |
| 3 | 3.63 | 2.85 |
| 4 | 2.69 | 2.8 |
| 5 | 3.97 | 3.35 |
| 6 | 4.3 | 3.55 |
| 7 | 3.55 | 2.95 |
| Mean ratings | = 3.59 | = 3.2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).