CRITICAL SUCCESS FACTORS FOR INTEGRATING A CIRCULAR INTERACTION MODEL FOR SECURITY PROCESSES IN DIGITAL TRANSFORMATION

Authors

  • Georg Sven Lampe The Bucharest University of Economic Studies

Keywords:

Circularity, information security management, interaction model, risk management process, digitization

Abstract

A circularity of Information and Communication Systems (ICT) implies a sustainable design of associated management systems to comply with Cyber Security (CS), Information Security (IS) and Data Privacy (DP). Due to the rapidly changing of IT infrastructure and the variety of software systems, changes to the workflow processes in activities are becoming more complex in terms of content. At the same time, global and local threats to electronic information and data processing systems are increasing. An effective protection of the information to be protected for the business processes and business practices is of decisive importance for the success of the organization. Against this background, the strategic potential for a sustainable management of global and local risks in combination with a flexibly designed exchange of information within the management systems is largely unexplored. This paper proposes increasing the efficiency of the Risk Management Process (RMP) by adapting the management activities for IS, CS and DP. Through adapted risk management activities, the assessment of potential consequences or opportunities of risks can be quantified towards the application and management of measures. This includes the combination and expansion of implementing strategic elements for the categorization and group consolidation of management systems as well as the prioritization of secure and sustainable measures. Their dependencies are examined to show that the IS, in combination with the other management systems, plays a central role in the model-based standardization of the information elements. In addition, industry-independent and sustainable security disciplines are proposed in order to model the specific security processes or individual security-relevant process steps within existing company processes.

Author Biography

Georg Sven Lampe, The Bucharest University of Economic Studies

Rank: Chief Executive OfficerCurriculum VitaeI am highly motivated engineer on the one hand with several years of experience in the energy and telecommunications sectors and on the other hand with excellent organizational abilities and strategic thinking skills.I am accustomed in the complex project through my experience to focus directing and orderly resolution the company strategies, efficiently organize, implement and develop targeted. Through my professional and personal leadership skills I am used to make independent decisions and to act team-oriented. I am conscience team worker who enjoys taking initiative and can work very effectively on my own.I am very interested in studying new hardware and software for a better understanding of new communication systems. I am a very fast learner who welcome new challenges and open to new experience.PhD student07/2019 – 09/2023 part-time PhD student at ASE Bucharest (University of Economic Studies – Business Administration) Focus (eng): Business intelligence for asset management like business continuity, information and cyber security, quality and safety and other ones related to different technologies like smart meter, smart home and smart grid as elements of a smart market enables the necessary communication infrastructure over the internet towards the internet of things (IoT) by using intelligent hardware. IoT enabling the functionality as a service of smart market.2. Studies:09/2011 – 06/2014 occupational studies at the Deutsche Telekom Hochschule für Telekommunikation Leipzig (University of Telecommunications)Degree program: Master of Engineering in the field of Information and Communication Technology (1.9)Master Thesis Title: Technisches Konzept und Geschäftsplanentwicklung für die Anpassung der Infrastruktur des Energiedatenmanagements an den BSI-Grundschutz (1.7)(english): (Technical concept and business plan development for the adaptation of the infrastructure of energy data management to the BSI basic protection)Priorities: including IT-security, internetworking, IT-Law and business administration, project management (PMBOK, Scrum)University education1. Studies:09/2003 – 09/2007 Studies at the Hochschule für Telekommunikation Leipzig der Deutsche Telekom (University of Telecommunications)Degree program: Diploma - telecommunication engineering in the field of Electronic Science and Telecommunication Engineering (1.5)Diplom-title: Entwicklung von Software/Firmware für einen Mikroprozessor und Digitalen Signal Prozessor sowie Integration einer Anpassungsschaltung (Note: 1,0)(english): (Development of software / firmware for a microprocessor and digital signal processor and integration of adapter circuit)Priorities: IT Business Account Management including Marketing, project managementProject basedKnowledge: IT- Infrastructure Library mit dem Schwerpunkt Service Delivery (1.0)(english): IT Infrastructure Library with focus service deliverySocial engagement:Tutor:03/2004 – 09/2007 Responsibility in the area of power engineering and the area of Materials and Components- Preparing and conducting courses for undergraduate students- Coaching, Instruction and support of students in exercisesMembership of Student council:09/2004 – 09/2007 Responsibility of Unit technique and Sport

Downloads

Additional Files

Published

23.05.2023

Issue

Section

Accounting, Finance, Statistics and Economic informatics