Research Article

Advancing Cybersecurity Strategies: A Holistic Exploration of Operations, Data Systems, and Machine Intelligence

by  Akm Hasan
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Issue 12
Published: March 2024
Authors: Akm Hasan
10.5120/ijca2024923476
PDF

Akm Hasan . Advancing Cybersecurity Strategies: A Holistic Exploration of Operations, Data Systems, and Machine Intelligence. International Journal of Computer Applications. 186, 12 (March 2024), 12-16. DOI=10.5120/ijca2024923476

                        @article{ 10.5120/ijca2024923476,
                        author  = { Akm Hasan },
                        title   = { Advancing Cybersecurity Strategies: A Holistic Exploration of Operations, Data Systems, and Machine Intelligence },
                        journal = { International Journal of Computer Applications },
                        year    = { 2024 },
                        volume  = { 186 },
                        number  = { 12 },
                        pages   = { 12-16 },
                        doi     = { 10.5120/ijca2024923476 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2024
                        %A Akm Hasan
                        %T Advancing Cybersecurity Strategies: A Holistic Exploration of Operations, Data Systems, and Machine Intelligence%T 
                        %J International Journal of Computer Applications
                        %V 186
                        %N 12
                        %P 12-16
                        %R 10.5120/ijca2024923476
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

This research paper offers a comprehensive exploration of cybersecurity strategies implemented at Hays, with a focus on critical domains, including Information Security Management System (ISMS), Cybersecurity Operations, and Incident Response Management. Embracing the dynamic landscape of cybersecurity, our study delves into Machine Intelligence, Data and Information Systems, and Digital Forensics, addressing the evolving challenges faced by modern enterprises. Drawing on the author's extensive experience in the British Armed Forces and enriched by a Harvard education, the paper navigates the intricate realms of cybersecurity, providing valuable insights into cutting-edge practices for global IT security.

References
  • According to Hays Global Cyber and InfoSec Strategy (2022),” Akm Hasan, an author of the ”Hays Global Cyber and InfoSec Strategy,” published internally and also at https://www.hays.co.uk/ and https://github.com/AkmHasan/Hays-Global-Cyber-InfoSec-Strategy/blob/main/Hays%20Global%20Cyber%20%26%20InfoSec%20Strategy%20-%20For%20the%20C-Suite.pdf
  • According to Hays ISMS Policy, Nigel Gray, “Hays ISMS Policy,” published at Hays internally for 33 counties in Hays world, and also at https://www.hays.co.uk/
  • According to Harvard’s final project, Akm Hasan, ”Harvard Advanced Cybersecurity and Risk Management Project,” achieved at Harvard University’s e-library at https://www.harvard.edu/ and published at https://github.com/AkmHasan/Harvard-Final-Project-/blob/main/Final%20_Project-AKM%20HASAN.pdf
  • According to the Hays’ ISMS team’s function, “Information Security Management System” at www.hays.com
  • According to the MSc final Project at Coventry University from HAYS Technology,” achieved at Coventry University’s e-library at https://www.coventry.ac.uk/ and published at https://github.com/AkmHasan/MSc-Research-Project-Information-Security-Management-System-ISMS-of-Hays-Central-Services-IT/blob/main/Master%20of%20Science%2C%20Individual%20Research%20Project_ISMS_of%20Hays%20Central%20Services%20IT.pdf
  • According to the British Armed Forces Operational IT and Cyber Capabilities at https://www.army.mod.uk/
  • Based on the Industry Standards – ISO at https://www.iso.org/home.html
  • Based on the NIST at https://www.nist.gov/
  • According to the CyberEdBoard Community Appointment (July 2023) at https://cyberedboard.io/
  • Based on PWC - External Audit Services at https://www.pwc.co.uk/
  • Based on KPMG - External Audit Services at https://kpmg.com/uk/en/home.html
  • According to Wild, Peter. ”How Airline Business Models Impact Working Conditions of Flight Crew Members.” Aeronautics and Aerospace Open Access Journal, 2022, https://doi.org/10.15406/aaoaj.2022.06.00147.technology — 4freepeople.com and https://4freepeople.com/tag/technology/
  • Internal and External auditing section according to Hyas’ auditing system and https://www.deskera.com/industries/manufacturing/
  • Risk Assessment and Risk Management according to Hays’ regional and global Risk Management Matrix and https://silveroakauditing.com/risk-management-services-in-dubai/
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cybersecurity Strategy Information Security Management Incident Response Framework Global Collaboration in Cybersecurity Diagram Integration in Cybersecurity Machine Intelligence in Security

Powered by PhDFocusTM