Papers by Marc-Andre Leger
International Journal of Organizational and Collective Intelligence, Jul 1, 2019
In the ever-expanding domain of cybersecurity, risk management remains a critical concern for org... more In the ever-expanding domain of cybersecurity, risk management remains a critical concern for organizations. Traditional methods are increasingly unable to address the complex nature of modern threats, leading to an urgent need for innovative methodologies. This article elaborates on a methodology that utilizes a sequence of R scripts in tandem with the OpenAI API to perform automated generation of cybersecurity risk scenarios. The framework presented herein is meticulously designed to cover every stage of risk assessment, from scenario creation to Key Risk Indicator (KRI) calculations, thereby contributing to an organization's robust cybersecurity posture.
Draft article on Maker-entrepreneurship and the project many Makers that I have met have to creat... more Draft article on Maker-entrepreneurship and the project many Makers that I have met have to create a business from their Maker activities.
This article presents the competencies and competency elements that are required of cybersecurity... more This article presents the competencies and competency elements that are required of cybersecurity professionals that were identified during a study on cybersecurity competencies in Canadian financial institutions, between 2019 and 2021. The main goal of this article is to help financial institutions and educational institutions design and implement competency-based continuous education programs. Financial institutions can use this article and the data that supports the recommendations to help them to increase the expertise of cybersecurity workers. Colleges and Universities may find this article interesting to assist them in the design of new programs or the improvement of existing programs.
En 2009, l'ISACA a lancé un premier référentiel de risque informationnel : Risk IT. Risk IT s'app... more En 2009, l'ISACA a lancé un premier référentiel de risque informationnel : Risk IT. Risk IT s'appuie alors sur COBIT 4, le référentiel de gouvernance TI offrant, selon ISACA, le maillon manquant entre la gestion traditionnelle du risque d'entreprise et la gestion et le contrôle du risque informationnel. Une des idées principales derrière l'approche de l'ISACA est que les entreprises obtiennent un retour sur investissement (ROI) en prenant des risques, mais que parfois elles tentent d'éliminer des risques qui contribuent réellement à la création d'un profit.
Books by Marc-Andre Leger
Dans ce texte, je propose une technique pour appliquer COBIT 5GR afin de réaliser une analyse de ... more Dans ce texte, je propose une technique pour appliquer COBIT 5GR afin de réaliser une analyse de risque dans une organisation. Cette technique est basée sur l’utilisation d’indicateurs de risque (KRI) génériques qui devront être adaptés pour une utilisation dans un contexte spécifique. Ce texte est présenté ici à des fins de formation et pour susciter la discussion auprès de membres de l’ISACA et des gestionnaires de risque informationnels. Le texte complet sera présenté dans la prochaine édition de mon livre sur la gestion de risque informationnel. Si vous avez des commentaires: [email protected]
Drafts by Marc-Andre Leger
Introduction to Cybersecurity Governance for Business Technology Management, 2023
This chapter presents cybersecurity risk management, a vital aspect of cybersecurity governance. ... more This chapter presents cybersecurity risk management, a vital aspect of cybersecurity governance. As mentioned previously, cybersecurity governance is a continuum of three activities, called GRC, Governance, Risk Management and Compliance. Cybersecurity governance sets the framework, risk management helps support the decision-making process, and compliance is used to demonstrate that obligations are met, and that controls and risk mitigation activities are working. This chapter investigates the second activity, or the R in GRC, more specifically, risk management and risk assessments. The next chapter presents a scenario-based approach to implement was is discussed in this chapter.
Introduction to Cybersecurity Governance for Business Technology Management, 2023
This chapter presents cybersecurity compliance, a vital aspect of cybersecurity governance. As me... more This chapter presents cybersecurity compliance, a vital aspect of cybersecurity governance. As mentioned previously, cybersecurity governance is a continuum of three activities, called GRC. In the cybersecurity context, the acronym GRC refers to Governance, Risk Management and Compliance. Cybersecurity governance sets the framework and tone for cybersecurity in the organization, while identifying the cybersecurity goals and obligations. From there, risk management helps support the decision-making process, arbitrage, and identification of potential strategies to deal with unacceptable risks. However, cybersecurity also depends on the ability of demonstrating the organization's compliance with its obligations, the efficiency of controls and risk mitigation activities. Compliance is essential for the cybersecurity of an organization's systems, networks, and data. It helps ensure that the organization follows the applicable laws, regulations, and standards. It is important to keep up to date with the latest compliance requirements. Governance was presented in chapter 2. In this chapter, we go in-depth on, compliance. Risk management is presented in a later chapter, along with a later chapter on risk assessments.
Cybersecurity Governance coursebook, 2023
In this chapter, we examine cybersecurity governance. Chapter 1 discussed cybersecurity fundament... more In this chapter, we examine cybersecurity governance. Chapter 1 discussed cybersecurity fundamentals, which are expanded in this chapter to examine how organizations can plan cybersecurity based on strategic needs. Strategic perspective will apply cybersecurity risk management to Business Technology Management. This allows for a variety of solutions selected and implemented to deal with unacceptable risks based on this information.
Uploads
Papers by Marc-Andre Leger
Books by Marc-Andre Leger
Drafts by Marc-Andre Leger