In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing operating environment.” We will construct an information structure architecture model to support the strategy implementation process. The purpose is to provide a platform to take account of the relevant selection of various functions and their junctions to evaluate the balance of strategy implementation compared to the defined operating environment.
CITATION STYLE
Kuusisto, R., & Kuusisto, T. (2018). Cyber security strategy implementation architecture in a value system. In Intelligent Systems, Control and Automation: Science and Engineering (Vol. 93, pp. 49–62). Springer Netherlands. https://doi.org/10.1007/978-3-319-75307-2_4
Mendeley helps you to discover research relevant for your work.