Oral Presentations: UC 326

Author Information

John Williams

Presentation Type

Presentation

Abstract / Artist's Statement

Responding to data breach incidents are a significant concern for businesses of all sizes and industry sectors. Recovering from these incidents is particularly challenging for small to midsize businesses (SMB) due to the limited support staff and institutional knowledge of incident response strategies for cyber attacks. Incident response is an organized approach to addressing and managing the aftermath of cybersecurity data breach attacks by information technology (IT) professionals. Military strategies present a unique opportunity for improving cybersecurity incident response. This case study examines incident response documentation of data breaches occurring at SMBs using the lens of military strategy. Industry best practices and the military strategies of Observe, Orient, Decide, and Act (OODA, Boyd, 1978) and The Art ofWar (Tzu, 5 BC) are used as frameworks for the analysis of cybersecurity incident response. The study seeks to answer the central research question of whether incident response for SMBs can be improved when a military strategy is employed.

Category

Social Sciences

WilliamsResearchPaper.docx (313 kB)
Research Paper

Share

COinS
 
Apr 17th, 4:40 PM Apr 17th, 5:00 PM

Adopting a Military Strategy for SMB Cyber Security Incident Response

UC 326

Responding to data breach incidents are a significant concern for businesses of all sizes and industry sectors. Recovering from these incidents is particularly challenging for small to midsize businesses (SMB) due to the limited support staff and institutional knowledge of incident response strategies for cyber attacks. Incident response is an organized approach to addressing and managing the aftermath of cybersecurity data breach attacks by information technology (IT) professionals. Military strategies present a unique opportunity for improving cybersecurity incident response. This case study examines incident response documentation of data breaches occurring at SMBs using the lens of military strategy. Industry best practices and the military strategies of Observe, Orient, Decide, and Act (OODA, Boyd, 1978) and The Art ofWar (Tzu, 5 BC) are used as frameworks for the analysis of cybersecurity incident response. The study seeks to answer the central research question of whether incident response for SMBs can be improved when a military strategy is employed.