dc.contributor.author | Simola, Jussi | |
dc.contributor.author | Takala, Arttu | |
dc.contributor.author | Lehkonen, Riku | |
dc.contributor.author | Frantti, Tapio | |
dc.contributor.author | Savola, Reijo | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Karjalainen, Mika | |
dc.date.accessioned | 2024-06-27T12:27:56Z | |
dc.date.available | 2024-06-27T12:27:56Z | |
dc.date.issued | 2024 | |
dc.identifier.citation | Simola, J., Takala, A., Lehkonen, R., Frantti, T., & Savola, R. (2024). The Importance of Cybersecurity Governance Model in Operational Technology Environments. In M. Lehto, & M. Karjalainen (Eds.), <i>Proceedings of the 23rd European Conference on Cyber Warfare and Security</i> (23, pp. 506-515). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.23.1.2272" target="_blank">https://doi.org/10.34190/eccws.23.1.2272</a> | |
dc.identifier.other | CONVID_220823484 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/96215 | |
dc.description.abstract | There is a common will to unify regulation in the Western world regarding overall security, including cybersecurity. European cyber security regulations aim to create a foundation and guidelines for international standards in various industries and the operation of critical infrastructure. Protected critical infrastructure is a common goal for Western allies. Allies of NATO and EU member states mainly support the anti-aggression policy in Europe. The unstable situation in the world forces states to find solutions that represent the thoughts of the allies. Defending common values is crucial when the purpose is to protect critical infrastructure and vital functions in societies. The research will demonstrate the industrial needs of IT/OT-related cybersecurity governance. The study analyzes EU-level cybersecurity requirements and how those requirements affect standardization regarding cybersecurity governance in the operational technology environment. There will be four primary governance levels: Political, Strategical, Operational and Tactical. Many criminal state-linked operators do not care about international agreements or contracts. Some rogue states have even taken to inciting violations of international agreements. We cannot trust the loose contracts between states anymore. The research will find the main challenges concerning the cybersecurity governance of the industrial organizations that use operational technology-related technology in their daily businesses. We have seen that Information and Operational Technology are based on something other than similar threats and risk basements. Operational Technology-related threats threaten the cyber-physical ecosystem where anomalies affect the physical world, so operational functions of equipment, devices, sensors, components, and production lines are interrupted. As a result, continuity management and supply chain management are compromised. The study's primary purpose is to describe the cybersecurity governance elements of the OT environment for enhancing situational awareness. Standardizing the cybersecurity level among industrial stakeholders requires EU member states to have a national cybersecurity strategy that follows main EU-level guidelines. Despite the EU member states' implementation level of the regulation, the EU-level cybersecurity requirements obligate companies to take steps to solve future cybersecurity challenges. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International Ltd | |
dc.relation.ispartof | Proceedings of the 23rd European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European Conference on Cyber Warfare and Security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | governance model | |
dc.subject.other | cybersecurity strategy | |
dc.subject.other | supply chain management | |
dc.subject.other | continuity management | |
dc.title | The Importance of Cybersecurity Governance Model in Operational Technology Environments | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-202406275057 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 506-515 | |
dc.relation.issn | 2048-8602 | |
dc.relation.numberinseries | 1 | |
dc.relation.volume | 23 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2024 European Conference on Cyber Warfare and Security | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.relation.grantnumber | 10/31/2022 | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | tietoturva | |
dc.subject.yso | toimitusketjut | |
dc.subject.yso | tietoturvapolitiikka | |
dc.subject.yso | infrastruktuurit | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p19415 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25795 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p17539 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.34190/eccws.23.1.2272 | |
dc.relation.funder | Business Finland | en |
dc.relation.funder | Business Finland | fi |
jyx.fundingprogram | Co-Innovation, BF | en |
jyx.fundingprogram | Co-Innovation, BF | fi |
jyx.fundinginformation | The research was supported by Business Finland (grant number 10/31/2022) and the University of Jyväskylä. | |
dc.type.okm | A4 | |