Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 72615
Cybersecurity Policy Recommendations for Public and Private Sector

Authors: Bradley Fowler, Kennedy Maranga


The purpose of this research is to share qualitative results of a document study deployed to comprehend how to improve cybersecurity public policy and compliance in public and private sector. Government published documents were collected from 43 countries, who publicly share a cybersecurity public policy or national cyber security strategy. Attaining these official documents enables the opportunity to analyze the strengths, weaknesses, opportunities, and threats enveloped in each one of these 43 countries cybersecurity public policy or national cybersecurity strategy. Utilizing a SWOT analysis helped comprehend the strengths embedded in the current policy to outweigh the threats. Evaluating opportunities engulfed in each policy helps define methods to diminish weaknesses. This strategy benefits all countries; enabling any country to mirror the methodologies deployed by these 43 countries to achieve optimal resilience against cyber-attacks, cyber-crime, cyber-terrorism, cyber warfare, cyber stalking, cyber sabotaging, and cyber-espionage The increasing reliance on information systems, software, APIs (Application Programming Interfaces), cloud computing architecture, Internet of Things, and technology tools enhanced or infused in public and private sector, requires an increased knowledge of cybersecurity public policy and the benefits of public private sector partnership, to enhance cybersecurity policy compliance. Thus, this research conveys what the U.S. Department of Homeland Security, National Security Agency, The White House, and industry practitioners are wrestling with regarding cybersecurity public policy and how these policies play a role in helping public and private sector effectively safeguard against cyberattack victimization. This research also shares details regarding global leadership and how invaluable effective leadership is in establishing resolutions to improve cybersecurity public policy development, implementation, and compliance in alignment with domestic and international cybersecurity laws. Furthermore, this research enables public and private sector to attain access to open-source information to increase knowledge of cybersecurity public policy and law worldwide. Additionally, this research delivers chronological events of cybercrimes that continues impacting decisions on what type of cybersecurity public policy can be useful to help private sector integrate cybersecurity public policy into the fabric of workplace cyber policy, to deter and decrease the number of successful cyber incidences incurred by human error. Finally, this research introduces cybersecurity policy-i.e., NIST SP 800 series publications, to improve policy modifications to meet the needs of public or private sector who rely on information technology, computer and information systems, cloud computing architecture, hardware, software, the Internet, or WIFI, for data collection, development, storage, and transmission. Data collection for this qualitative document research study, derives from official government published open sources that provides comprehension of this central phenomena. These official documents offer valid information to implement effective cybersecurity policy design and workplace compliance education and awareness training resolutions.

Keywords: cloud security policy, cybersecurity public policy, cybersecurity SWOT analysis, foreign cyber policy, information security policy, public policy

Procedia PDF Downloads 16