Organizations today face unprecedented risk from cyberattacks, which can lead to significant financial and reputational loss, inconvenience customers and employees, severely compromise private and proprietary information, cripple the operations of an organization or the economy, and even cause physical harm. All levels of an organization -- especially senior managers both in the private and public sectors -- must be more vigilant than ever before in order to mitigate the risk caused by cyberattacks and data breaches, whether it is a direct attack on an enterprise or the risks brought to it by personal employee devices.
Several evolving technical solutions partially mitigate these risks for organizations. These solutions are continuously adapting as the nature of cyberattacks change over time, and multiple technical solutions are used in parallel to provide “defense in depth.” The role of technology managers, especially those with cybersecurity responsibilities, is to manage the deployment of such technical solutions, countermeasures, policies and procedures to meet the risk objectives of senior management within the limited resources available. The research focus of the Risk Management area of the Institute for Information Security & Privacy is on this middle layer that deploys the technical solutions available to meet the risk objectives of senior management, with special emphasis on policies, procedures and end-user training in order to create a safer computing environment. In addition, the research focus is also on public policy issues that provide the right incentives to various stakeholders within the ecosystem to minimize risk for participants.
Broad research themes for Risk Management are:
- Controls and Countermeasures – understanding the best practices and security management processes to reduce risk for the organization. These include business continuity and disaster recovery, software vulnerability management, audit controls, human resource policies, employee training, data, software and device usage policies, traffic and activity monitoring processes, access control methods, customer, vendor and user credentialing, and various other organizational processes that minimize risk from cyber attacks.
- Financial Analysis and Metrics – understanding the cost-benefits of information security, the financial and reputational impact of security breaches on the organization, cybersecurity insurance, risk analytics, and metrics to evaluate and quantify cybersecurity risk.
- Cybersecurity Ecosystem – understanding public policy approaches that pose incentives for stakeholders and facilitate optimal information sharing among participants, creating a more secure ecosystem for commerce.
Research Updates & News
Mar. 20, 2017
Sudheer Chava of the Georgia Tech Scheller College of Business co-authors the Technology Association of Georgia's 2017 FinTech Data Analytics & Big Data Research Report.
Jan. 31, 2017
U.S. businesses need to prepare now to align with EU Privacy Law, explains Holly Dragoo of the Georgia Tech Research Institute.
May 23, 2016
Stopping malicious domain registration and memory corruption are among the new research outcomes presented at IEEE Security & Privacy '16.
May 19, 2016
Researchers in the School of Electrical & Computer Engineering examine how to take illicit ads off business websites via the SEISE Tool.
May 3, 2016
Georgia Tech researchers in the School of Computer Science led by Taesoo Kim launch "ROKI" -- a study to dismantle pervasive cyberattacks in 10 seconds or less.
Oct. 8, 2015
Research by Russ Clark in the Georgia Tech School of Computer Science aims to help Internet Service Providers solve the Internet's identity crisis with new Resource Public Key infrastructure.
Aug. 13, 2015
Georgia Tech researchers led by professors Wenke Lee and Taesoo Kim find 11 security flaws in a popular browser and are awarded the Internet Defense Prize by Facebook, in partnership with USENIX Security, to continue their work.