<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Marcin Niemiec</style></author><author><style face="normal" font="default" size="100%">Salvatore Marco Pappalardo</style></author><author><style face="normal" font="default" size="100%">Maya Bozhilova</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author><author><style face="normal" font="default" size="100%">Andrzej Dziech</style></author><author><style face="normal" font="default" size="100%">Burkhard Stiller</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Multimedia Communications, Services and Security, MCSS 2022: Multimedia Communications, Services and Security </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham</style></pub-location><volume><style face="normal" font="default" size="100%">1689</style></volume><pages><style face="normal" font="default" size="100%"> 49–65</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Salvatore Marco Pappalardo</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Logical Model for Multi-Sector Cyber Risk Management</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber risk assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">E-MAF</style></keyword><keyword><style  face="normal" font="default" size="100%">ECHO project</style></keyword><keyword><style  face="normal" font="default" size="100%">essential services</style></keyword><keyword><style  face="normal" font="default" size="100%">interdependencies</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">13-26</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The increasing reliance on digital infrastructures makes whole sectors of the economy and public services vulnerable to attacks through cyberspace. Some progress has been made in understanding vulnerabilities and ways of reducing cyber risk at the sub-sectoral level. While the sectoral level remains a significant challenge, this study goes beyond, also addressing cyber risk resulting from the cross- and multi-sectoral interdependencies in a consistent logical model. The paper presents the scope of this logical model, outlines the problem of risk assessment, structured around the triplet &amp;ldquo;Threats &amp;ndash; Vulnerabilities &amp;ndash; Impact,&amp;rdquo; and the structuring of risk mitigation around types of risk reduction measures, the objective of decision-making on risk treatment, and the modalities of application. We provide examples of the implementation of the logical model, underlying the ECHO Multi-sector Assessment Framework, and conclude by emphasising the advantages the logical model and the framework provide.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">13</style></section></record></records></xml>