<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Localism in cybersecurity – mission impossible</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">deterritorialization</style></keyword><keyword><style  face="normal" font="default" size="100%">localism</style></keyword><keyword><style  face="normal" font="default" size="100%">triangle of contradictions</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">148</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Broad concepts such as the concepts of localism and deterritorialization could be successfully used to study specific objects such as cyber security as a function of cybercrime. Using the methods for analysis and synthesis, the challenges that deterritorialization poses to the strategic management of cyber security are brought out in the study. Summarizing these challenges allows the construction of the triangle of contradictions, which explains the thesis for the modern characteristics of cyberspace, where localism becomes a mission impossible, and deterritorialization raises cybersecurity problems that still have no particular solution.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The ‘Balance’ As a Panacea for Achieving (Cyber)Security</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">balance</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">panacea</style></keyword><keyword><style  face="normal" font="default" size="100%">risks</style></keyword><keyword><style  face="normal" font="default" size="100%">Scenarios</style></keyword><keyword><style  face="normal" font="default" size="100%">security controls</style></keyword><keyword><style  face="normal" font="default" size="100%">threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">145</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Decision-making in a complex, complex, multi-layered and multifactorial environment, such as the security environment, requires a balance between threat factors and strategies to counter them. In this sense, the search for a single, simple solution, seen as a panacea, is an irrational management approach. The report presents the results of a study to develop a model for balancing cybersecurity solutions.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">benchmark</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">efficiency</style></keyword><keyword><style  face="normal" font="default" size="100%">maturity</style></keyword><keyword><style  face="normal" font="default" size="100%">model</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">146</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Measuring the maturity of cybersecurity capabilities is a key element of the overall concept of building and maintaining security in cyberspace. The report presents the results of the creation of a model for assessing the maturity of cybersecurity capabilities as a combination of the advantages of the balanced scorecard and benchmark model. The developed model has the strength of theoretical validity and practical applicability.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Comparative Analysis of Models for Assessing the Maturity of Cybersecurity Capabilities</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity areas</style></keyword><keyword><style  face="normal" font="default" size="100%">maturity level</style></keyword><keyword><style  face="normal" font="default" size="100%">measurement</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">138</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The examination of all issues of interest in the field of cybersecurity, cyber resilience and the fight against cybercrime can be focused on one term, and that is the term cybersecurity capabilities. Cybersecurity capabilities demonstrate the ability to implement policies, standards, guidelines, and operational procedures for the security of information systems, networks, applications, and information. In turn, cybersecurity capabilities are a dynamic object that is built, maintained, developed, modified and adapted to the changing security environment. The dynamics of security capabilities require measuring the degree of their maturity and comparing them with the target levels. This report provides a comparative analysis of existing models for assessing the maturity of cybersecurity capabilities, thus creating an opportunity for a reasonable choice of such a method for the needs of specific assessment.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Variety of University Cyber Security Programs - Is it Useful and Justified?</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">bachelor program</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">higher education</style></keyword><keyword><style  face="normal" font="default" size="100%">master program</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">41</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Cybersecurity capabilities have long been not a luxury but a real necessity stemming from the development of technology and the associated threats, vulnerabilities and risks. A key component of these capabilities are the cybersecurity experts, who contribute their knowledge, skills and experience. In this regard, universities&amp;#39; efforts to launch cybersecurity programs seem justified and understandable. Is it possible that competition between universities and oversaturation with the university programs in the field of cybersecurity will lead to an unjustified expansion of the portfolio of taught knowledge and a shift in the focus from building the required capabilities? This report seeks answer to this and related questions on the academic contribution to cybersecurity.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Levels of Cybersecurity Training and Education</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">attribution theory</style></keyword><keyword><style  face="normal" font="default" size="100%">awareness based training</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">organizational culture</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">risk appetite</style></keyword><keyword><style  face="normal" font="default" size="100%">„balance of consequences“</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">March 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">117</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The ambition of individuals and their organizations to achieve a desired level of cybersecurity may be subject to the application of different strategies. Known approaches to achieving cybersecurity involve the establishment of effective legal systems, innovative technical solutions, rational organizational structures, etc. The focus in discussions of cybersecurity remains on people and their training, which can lower the vulnerability to cyber attacks. Counting on such a strategy to build cybersecurity, it is important to properly understand that cybersecurity training can be constructed at several levels. Each of these levels has specific characteristics, such as the approach and methods used for training, and as a consequence is associated with different results in terms of the cybersecurity achieved.</style></abstract></record></records></xml>