Combatting Privacy Information Warfare: A New Incident Response Framework
Abstract:
When nation-state actors weaponize information to harm individuals, communities, and societies, they erode civilian confidence in legitimate authorities, institutions, and defences to impact national security. This paper proposes new conceptual models and a methodology, the Privacy Incident Response Plan (PIRP). The methodology’s design prepares and mitigates privacy-related harms, tactics, techniques, and mitigation strategies to counter sophisticated threat actors. Using this methodology, contingency planners and incident responders can develop strategies to defend against the privacy harms of information warfare.
AUTHORS
Beacom College of Computer and Cyber Sciences Dakota State University
Madison, South Dakota, United States of America
Sean McElroy has been securing financial services solutions in the cloud for over 20 years. As a co-founder of Alkami Technology, he helped protect millions of consumers across online banking platforms. Currently, as the CSO of Lumin Digital, he is responsible for cybersecurity, risk management, and privacy programs to scale the next generation of cloud-based digital banking. McElroy is a data privacy researcher as part of Dakota State University’s Ph.D. in Cyber Defense program. He has a M.Sc. in Information Security Engineering from the SANS Technology Institute, a BBA in Management, and an MIS from the University of Oklahoma. He holds various certifications.
Beacom College of Computer and Cyber Sciences Dakota State University
Madison, South Dakota, United States of America
Dr. Lisa McKee, founding partner at American Security and Privacy, has over 20 years of industry experience. She provides services, assessments, training, program development, and leadership as a virtual Data Protection Officer (vDPO) for companies globally. Dr. McKee has a Ph.D. in Cyber Defense, with an emphasis in Privacy. She is a highly regarded privacy expert, an international speaker, and has been the keynote speaker at events. As a member of the Accredited Standards Committee X9, she provides input on industry standards and is an APMG ISACA Certified Trainer. She is passionate about privacy and volunteers on boards for several professional groups, mentors, and serves as an adjunct professor for graduate students. She has authored several publications, including a data privacy management textbook.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive