Mistroni, Riccardo
(2024)
Implementing Security Governance Processes in corporate environments: Compliance, Awareness and Risk Management.
[Laurea magistrale], Università di Bologna, Corso di Studio in
Digital transformation management [LM-DM270] - Cesena, Documento full-text non disponibile
Il full-text non è disponibile per scelta dell'autore.
(
Contatta l'autore)
Abstract
The following work focuses on the optimization of cybersecurity governance and
compliance processes, a critical aspect for organizations navigating today’s evolving
threat landscape. Inefficient or fragmented approaches to cybersecurity increase
risks, hinder operational effectiveness, and pose challenges to regulatory
compliance. This work explores the integration of global frameworks, such as
NIST CSF 2.0, into strategies that align with organizational structures, resources,
and objectives. It examines the development of tailored structured processes for
cybersecurity compliance and focuses on three key processes: compliance workflows,
cybersecurity awareness, and risk management strategies. A methodology
was developed to map controls, schedule tasks, and integrate activities. Tailored elearning
and the role of risk management in third-party assessments are analyzed,
and a custom model for third-party risk assessment is discussed in order to provide
effective implementation and adaptation to specific organizational contexts.
Abstract
The following work focuses on the optimization of cybersecurity governance and
compliance processes, a critical aspect for organizations navigating today’s evolving
threat landscape. Inefficient or fragmented approaches to cybersecurity increase
risks, hinder operational effectiveness, and pose challenges to regulatory
compliance. This work explores the integration of global frameworks, such as
NIST CSF 2.0, into strategies that align with organizational structures, resources,
and objectives. It examines the development of tailored structured processes for
cybersecurity compliance and focuses on three key processes: compliance workflows,
cybersecurity awareness, and risk management strategies. A methodology
was developed to map controls, schedule tasks, and integrate activities. Tailored elearning
and the role of risk management in third-party assessments are analyzed,
and a custom model for third-party risk assessment is discussed in order to provide
effective implementation and adaptation to specific organizational contexts.
Tipologia del documento
Tesi di laurea
(Laurea magistrale)
Autore della tesi
Mistroni, Riccardo
Relatore della tesi
Scuola
Corso di studio
Ordinamento Cds
DM270
Parole chiave
cybersecurity,security,governance,risk,assessment,risk management,awareness,compliance
Data di discussione della Tesi
18 Dicembre 2024
URI
Altri metadati
Tipologia del documento
Tesi di laurea
(NON SPECIFICATO)
Autore della tesi
Mistroni, Riccardo
Relatore della tesi
Scuola
Corso di studio
Ordinamento Cds
DM270
Parole chiave
cybersecurity,security,governance,risk,assessment,risk management,awareness,compliance
Data di discussione della Tesi
18 Dicembre 2024
URI
Gestione del documento: