McIntyre, A. (2018). Developing a cybersecurity protocol for your operational environment. Natural Gas & Electricity, 34(9), 23–27. https://doi.org/10.1002/gas.22048 This journal article explains the importance of developing a cybersecurity protocol for the operational environment and the relevance of prioritizing cybersecurity and daily operations, evolving technologies, and perceived vague return on investment.
Ganin, A. A., Quach, P., Panwar, M., Collier, Z. A., Keisler, J. M., Marchese, D., & Linkov, I. (2020). Multicriteria decision framework for cybersecurity risk assessment and management. Risk Analysis: An International Journal, 40(1), 183–199. This journal article explores a proposed framework that bridges the gap between risk assessment and risk management, allowing an analyst to ensure a structured and transparent process of selecting risk management alternatives. Among the highlighted challenges are the constantly changing nature of cyber systems caused by technical advances, their distribution across the physical, information, and sociocognitive domains, and the complex network structures often including thousands of nodes.
Moyle, E., & Kelley, D. (2020, November). Practical cybersecurity architecture. Packt Publishing. This book describes the importance of cybersecurity architects working with others to develop a comprehensive understanding of the business' requirements. Working with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy and infrastructure solutions of the organization is emphasized.