Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations


View Sample PDF
Copyright: 2021
Pages: 20
Source title: Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)
Source Author(s)/Editor(s): Gregory B. White (CIAS, The University of Texas at San Antonio, USA) and Natalie Sjelin (CIAS, The University of Texas at San Antonio, USA)
DOI: 10.4018/978-1-7998-4471-6.ch006


View Policies on the publisher's website for pricing and purchasing information.


Local governments provide public services including police, fire departments, emergency services, and others. Operations are accomplished by following policies, laws, and regulations. Communities will need to integrate cybersecurity concepts into established community policies. Existing policies need to be reviewed for cybersecurity evaluating them for cyber integration and identifying critical services that could be disrupted or impacted by a cyber incident. Communities need to identify an authorization hierarchy that will makes decisions in regard to critical services being impacted by a cyber-attack. Roles need to be established and integrated into policies to identify existing capabilities to address cyber incidents and ultimately who will respond if needed. Public-private partnerships need to be reviewed and legal agreements crafted and signed before an incident occurs. These considerations are initial steps that can be taken as the community strives to improve its cybersecurity posture where community policies are concerned.

Related Content

. © 2021. 31 pages.
. © 2021. 23 pages.
. © 2021. 20 pages.
. © 2021. 29 pages.
. © 2021. 27 pages.
. © 2021. 20 pages.
. © 2021. 20 pages.
Body Bottom