July 18, 2022, 1:20 a.m. | Majid Mollaeefar, Silvio Ranise

cs.CR updates on arXiv.org arxiv.org

Cybersecurity risk management consists of several steps including the
selection of appropriate controls to minimize risks. This is a difficult task
that requires to search through all possible subsets of a set of available
controls and identify those that minimize the risks of all stakeholders. Since
stakeholders may have different perceptions of the risks (especially when
considering the impact of threats), conflicting goals may arise that require to
find the best possible trade-offs among the various needs. In this work, …

applications assessment data data protection data protection impact assessment gdpr impact protection risk trade

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Officer Level 1 (L1)

@ NTT DATA | Virginia, United States of America

Alternance - Analyste VOC - Cybersécurité - Île-De-France

@ Sopra Steria | Courbevoie, France

Senior Security Researcher, SIEM

@ Huntress | Remote US or Remote CAN

Cyber Security Engineer Lead

@ ASSYSTEM | Bridgwater, United Kingdom