Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)
Title | Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2) |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Barclay, C. |
Conference Name | ITU Kaleidoscope Academic Conference: Living in a converged world - Impossible without standards?, Proceedings of the 2014 |
Date Published | June |
Keywords | capabilities, Capability maturity model, CM2, CM2 model, Computer crime, Context, critical asset protection, cybersecurity capability maturity model, cybersecurity readiness, Education, knowledge integration, Organizations, privacy, proactive security posture, security, security advantage, security controls, security of data, sustainable security advantage |
Abstract | With the rapid advancement in technology and the growing complexities in the interaction of these technologies and networks, it is even more important for countries and organizations to gain sustainable security advantage. Security advantage refers to the ability to manage and respond to threats and vulnerabilities with a proactive security posture. This is accomplished through effectively planning, managing, responding to and recovering from threats and vulnerabilities. However not many organizations and even countries, especially in the developing world, have been able to equip themselves with the necessary and sufficient know-how or ability to integrate knowledge and capabilities to achieve security advantage within their environment. Having a structured set of requirements or indicators to aid in progressively attaining different levels of maturity and capabilities is one important method to determine the state of cybersecurity readiness. The research introduces the Cybersecurity Capability Maturity Model (CM2), a 6-step process of progressive development of cybersecurity maturity and knowledge integration that ranges from a state of limited awareness and application of security controls to pervasive optimization of the protection of critical assets. |
DOI | 10.1109/Kaleidoscope.2014.6858466 |
Citation Key | 6858466 |
- education
- sustainable security advantage
- security of data
- security controls
- security advantage
- security
- proactive security posture
- privacy
- Organizations
- knowledge integration
- capabilities
- cybersecurity readiness
- cybersecurity capability maturity model
- critical asset protection
- Context
- Computer crime
- CM2 model
- CM2
- Capability maturity model