Academic literature on the topic 'Cybersecurity maturity model'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity maturity model.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity maturity model"
Kour, Ravdeep, Ramin Karim, and Adithya Thaduri. "Cybersecurity for railways – A maturity model." Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit 234, no. 10 (2019): 1129–48. http://dx.doi.org/10.1177/0954409719881849.
Full textYigit Ozkan, Bilge, Sonny van Lingen, and Marco Spruit. "The Cybersecurity Focus Area Maturity (CYSFAM) Model." Journal of Cybersecurity and Privacy 1, no. 1 (2021): 119–39. http://dx.doi.org/10.3390/jcp1010007.
Full textP, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40065.
Full textPrincess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Eseoghene Kokogho, and Obianuju Clement Onwuzulike. "Developing a cybersecurity maturity model for fintech firms using predictive analytics." International Journal of Science and Technology Research Archive 8, no. 1 (2025): 023–49. https://doi.org/10.53771/ijstra.2025.8.1.0021.
Full textZwarts, Hendrik, Jaco Du Toit, and Basie Von Solms. "Augmenting Cybersecurity Awareness at Critical Infrastructures in Developing Countries Through a Cybersecurity Governance Maturity Model." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 726–33. https://doi.org/10.34190/eccws.24.1.3708.
Full textBüyüközkan, Gülçin, and Merve Güler. "Cybersecurity maturity model: Systematic literature review and a proposed model." Technological Forecasting and Social Change 213 (April 2025): 123996. https://doi.org/10.1016/j.techfore.2025.123996.
Full textDotsenko, T. V., and M. V. Kuzmenko. "Maturity of the country's cybersecurity system in the conditions of war: assessment trends." Economic Bulletin of Dnipro University of Technology 87 (September 2024): 34–43. http://dx.doi.org/10.33271/ebdut/87.034.
Full textAliyu, Aliyu, Leandros Maglaras, Ying He, et al. "A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom." Applied Sciences 10, no. 10 (2020): 3660. http://dx.doi.org/10.3390/app10103660.
Full textPeliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "CERT-UA assessment based on the CSIRT ENISA Maturity Model." Radiotekhnika, no. 213 (June 16, 2023): 41–48. http://dx.doi.org/10.30837/rt.2023.2.213.04.
Full textAbdullahi Garba, Adamu, Aliyu Musa Bade, Muktar Yahuza, and Ya’u Nuhu. "Cybersecurity capability maturity models review and application domain." International Journal of Engineering & Technology 9, no. 3 (2020): 779. http://dx.doi.org/10.14419/ijet.v9i3.30719.
Full textDissertations / Theses on the topic "Cybersecurity maturity model"
Murray, Glenn Kristian. "Managing cybersecurity risk for critical infrastructure: A framework to secure critical infrastructure." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2864.
Full textSantos, Ricardo Meléndez, Anthony Aguilar Gallardo, and Jimmy Armas Aguirre. "Reference Model to Identify the Maturity Level of Cyber Threat Intelligence on the Dark Web." Repositorio Academico - UPC, 2021. http://hdl.handle.net/10757/653788.
Full textPérez, Navarro Henry Bryan, and Jara Humberto Luis Salcedo. "Modelo de madurez en ciberseguridad para empresas que manejan datos de salud." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/655801.
Full textAguilar, Gallardo Anthony Josue, and Santos Ricardo Alfonso Meléndez. "Modelo de referencia para identificar el nivel de madurez de ciberinteligencia de amenazas en la dark web." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/653512.
Full textBooks on the topic "Cybersecurity maturity model"
Cybersecurity Maturity Model Certification (CMMC) - a Pocket Guide. IT Governance Ltd, 2020.
Find full textVoice), Maxwell (Male Synthesized. Cybersecurity Maturity Model Certification (CMMC) - a Pocket Guide. de Gruyter GmbH, Walter, 2020.
Find full textMARK A RUSSO CISSP-ISSAP CISO. Cybersecurity Maturity Model Certification ~ 2ND EDITION: CUI Classification, Marking, and Storage Guide. Independently Published, 2019.
Find full textMARK A RUSSO CISSP-ISSAP CISO. Cybersecurity Maturity Model Certification : Levels 1-3 Manual: Detailed Security Control Implementation Guidance. Independently Published, 2019.
Find full textGovernment, U. S., and Department of Homeland Security. Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning. Independently Published, 2018.
Find full textCybersecurity Maturity Model Certification Handbook: A Complete Guide for Preparing for Levels 1-3 CMMC Certification. Repose Reading, 2021.
Find full textCybersecurity Maturity Model Certification CMMC 2. 0 Assessment Handbook: An Implementation and Self-Assessment Guide for CUI, NIST SP 800-171, and CMMC 2. 0. Independently Published, 2022.
Find full textBook chapters on the topic "Cybersecurity maturity model"
Donalds, Charlette, Corlane Barclay, and Kweku-Muata Osei-Bryson. "The Cybersecurity Capability Maturity Model for Sustainable Security Advantage." In Cybercrime and Cybersecurity in the Global South. Routledge, 2022. http://dx.doi.org/10.1201/9781003028710-12.
Full textKreppein, Alexander, Alexander Kies, and Robert H. Schmitt. "Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0." In Communications in Computer and Information Science. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-8059-5_12.
Full textYigit Ozkan, Bilge, and Marco Spruit. "A Questionnaire Model for Cybersecurity Maturity Assessment of Critical Infrastructures." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12085-6_5.
Full textGao, Zimeng, Fei Xing, and Guochao Peng. "Research on the Capability Maturity Model of Data Security in the Era of Digital Transformation." In HCI for Cybersecurity, Privacy and Trust. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35822-7_11.
Full textBaninemeh, Elena, Harold Toomey, Katsiaryna Labunets, Gerard Wagenaar, and Slinger Jansen. "An Evaluation of the Product Security Maturity Model Through Case Studies at 15 Software Producing Organizations." In Lecture Notes in Business Information Processing. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53227-6_23.
Full textZwarts, Hendrik, Jaco Du Toit, and Basie Von Solms. "Towards a Cybersecurity Governance Maturity Model for Critical Infrastructures in Developing Countries." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-92605-1_33.
Full textAhouanmenou, Steve. "Towards a Cybersecurity Maturity Model Specific for the Healthcare Sector: Focus on Hospitals." In Research Challenges in Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59468-7_16.
Full textKendzierskyj, Stefan, Hamid Jahankhani, Arshad Jamal, Osama Hussien, and Longzhi Yang. "The Role of Blockchain with a Cybersecurity Maturity Model in the Governance of Higher Education Supply Chains." In Advanced Sciences and Technologies for Security Applications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33627-0_1.
Full textAcosta, Mauricio Alexander Nieto, and Hamid Jahankhani. "An Empirical Study into Ransomware Campaigns Against the Education Sector and Adopting the Cybersecurity Maturity Model Certification Framework." In Advanced Sciences and Technologies for Security Applications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33627-0_4.
Full textMöller, Dietmar P. F. "Cybersecurity Maturity Models and SWOT Analysis." In Advances in Information Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_7.
Full textConference papers on the topic "Cybersecurity maturity model"
Cobos, Salvador, Armando Garayar, and David Mauricio. "Cybersecurity Maturity Model Against Ransomware Attacks for the Financial Sector." In 2024 IEEE ANDESCON. IEEE, 2024. http://dx.doi.org/10.1109/andescon61840.2024.10755867.
Full textGourisetti, Sri Nikhil Gupta, Scott Mix, Michael Mylrea, Christopher Bonebrake, and Md Touhiduzzaman. "Secure Design and Development Cybersecurity Capability Maturity Model (SD2-C2M2)." In NCS '19: Northwest Cybersecurity Symposium. ACM, 2019. http://dx.doi.org/10.1145/3332448.3332461.
Full textBhattacharya, Souradeep, Burhan Hyder, and Manimaran Govindarasu. "ICS-CTM2: Industrial Control System Cybersecurity Testbed Maturity Model." In 2022 Resilience Week (RWS). IEEE, 2022. http://dx.doi.org/10.1109/rws55399.2022.9984023.
Full textAzambuja, Antonio João, and João Souza Neto. "Modelo de maturidade de segurança cibernética para os órgãos da Administração Pública Federal." In II Workshop de Segurança Cibernética em Dispositivos Conectados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/wscdc.2019.7707.
Full textRojas, Aaron Joseph Serrano, Erick Fabrizzio Paniura Valencia, Jimmy Armas-Aguirre, and Juan Manuel Madrid Molina. "Cybersecurity maturity model for the protection and privacy of personal health data." In 2022 IEEE 2nd International Conference on Advanced Learning Technologies on Education & Research (ICALTER). IEEE, 2022. http://dx.doi.org/10.1109/icalter57193.2022.9964729.
Full textAlayo, Jorge Gutierrez, Paul Necochea Mendoza, Jimmy Armas-Aguirre, and Juan Madrid Molina. "Cybersecurity maturity model for providing services in the financial sector in Peru." In 2021 Congreso Internacional de Innovación y Tendencias en Ingeniería (CONIITI). IEEE, 2021. http://dx.doi.org/10.1109/coniiti53815.2021.9619733.
Full textArenas, Ethan, Juan Palomino, and Juan-Pablo Mansilla. "Cybersecurity Maturity Model to Prevent Cyberattacks on Web Applications Based on ISO 27032 and NIST." In 2023 IEEE XXX International Conference on Electronics, Electrical Engineering and Computing (INTERCON). IEEE, 2023. http://dx.doi.org/10.1109/intercon59652.2023.10326028.
Full textBarclay, Corlane. "Sustainable security advantage in a changing environment: The Cybersecurity Capability Maturity Model (CM2)." In 2014 ITU Kaleidoscope: Living in a Converged World - Impossible without Standards? (K-2014). IEEE, 2014. http://dx.doi.org/10.1109/kaleidoscope.2014.6858466.
Full textKioskli, Kitty, Spyridon Papastergiou, Theofanis Fotis, Stefano Silvestri, and Haralambos Mouratidis. "A Self-Organized Swarm Intelligence Solution for Healthcare ICT Security." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004780.
Full textRea-Guaman, A. M., I. D. Sanchez-Garcia, T. San Feliu, and J. A. Calvo-Manzano. "Maturity models in cybersecurity: A systematic review." In 2017 12th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2017. http://dx.doi.org/10.23919/cisti.2017.7975865.
Full textReports on the topic "Cybersecurity maturity model"
Lewis, James Andrew. Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0007970.
Full textGeorgiev, Venelin. Comparative Analysis of Models for Assessing the Maturity of Cybersecurity Capabilities. Procon, 2021. http://dx.doi.org/10.11610/it4sec.0138.
Full textCybersecurity: Are We Ready in Latin America and the Caribbean? Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0006517.
Full text