<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jouni Pöyhönen</style></author><author><style face="normal" font="default" size="100%">Jyri Rajamäki</style></author><author><style face="normal" font="default" size="100%">Harri Ruoslahti</style></author><author><style face="normal" font="default" size="100%">Martti Lehto</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Situational Awareness in Critical Infrastructure Protection</style></title><secondary-title><style face="normal" font="default" size="100%">Disaster Risk Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><volume><style face="normal" font="default" size="100%">3</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jouni Pöyhönen</style></author><author><style face="normal" font="default" size="100%">Viivi Nuojua</style></author><author><style face="normal" font="default" size="100%">Martti Lehto</style></author><author><style face="normal" font="default" size="100%">Jyri Rajamäki</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">information sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">Situational awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">vital societal functions</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">236-256</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Cybersecurity-related capabilities play an ever-growing role in national security, as well as securing the functions vital to society. The national cyber capability includes the resilience of companies running critical infrastructures, their cyber situational awareness (SA) and the sharing of cybersecurity information required for cyber SA. As critical infrastructures become more complex and interdependent, ramifications of incidents multiply. The EU Network and Information Security Directive calls for cybersecurity collaboration between EU member states regarding critical infrastructures and places the most crucial service providers and digital service providers under security-related obligations. Developing better SA requires information sharing between the different interest groups and enhances the preparation for and management of incidents. The arrangement is based on drawing correct situation-specific conclusions and, when needed, on sharing critical knowledge in the cyber networks. The target state is achieved with an efficient process that includes a three-level—strategic, operational and technical/tactical—operating model to support decision-making by utilizing national and international strengths. In the dynamic cyber environment strategic agility and speed are needed to prepare for incidents. </style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">236</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Martti Lehto</style></author><author><style face="normal" font="default" size="100%">Jarno Limnéll</style></author><author><style face="normal" font="default" size="100%">Tuomas Kokkomäki</style></author><author><style face="normal" font="default" size="100%">Jouni Pöyhönen</style></author><author><style face="normal" font="default" size="100%">Mirva Salminen</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Kyberturvallisuuden strateginen johtaminen Suomessa</style></title><secondary-title><style face="normal" font="default" size="100%">Julkaisusarja</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><number><style face="normal" font="default" size="100%">28/2018</style></number><publisher><style face="normal" font="default" size="100%">Valtioneuvoston kanslia</style></publisher><pub-location><style face="normal" font="default" size="100%">Helsinki</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jouni Pöyhönen</style></author><author><style face="normal" font="default" size="100%">Martti Lehto</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security Creation as Part of the Management of an Energy Company</style></title><secondary-title><style face="normal" font="default" size="100%">16th European Conference on Cyber Warfare and Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><pub-location><style face="normal" font="default" size="100%">Dublin</style></pub-location><pages><style face="normal" font="default" size="100%">332-340</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>