Project management features in the cybersecurity area

Main Article Content

Mariia Stadnyk
Andriy Palamar

Abstract

This paper has presented detailed comparative analysis of the project manager work on IT and cybersecurity projects by each PMI project management process group: initiating, planning, executing, monitoring and controlling, and closing. Based on the results, a list of project management peculiarities in cyber security was obtained, and a list of industry knowledge and requirements for a cyber security manager was presented. Proposals for the application of tools and techniques for each process of the cyber security project were formed in accordance with the features.

Article Details

Section

Articles

References

1. PMI (2022). PMBOK Guide [Online]. URL: https://www.pmi.org/pmbok-guide-standards/foundational/PMBOK.

2. Andreichenko A. V., Horbachenko S. A., Dykyi O. V. Osoblyvosti upravlinnia proiektamy u sferi kiberzakhystu. Cybersecurity. Vol. 2 (10). 2020. P. 45–51. DOI: https://doi.org/10.28925/2663-4023.2020.10.4553

3. ISO-ISO/IEC 27001:2013. Information Technology. Security Techniques. Information Security Management Systems. Requirements. 2022. URL: https://www.iso.org/standard/54534.html.

4. Information Security Management System ISMS. 2022. URL: https://www.isms.online/information-security-management-system-isms/.

5. ISO-ISO/IEC 27037:2012. Information Technology. Security Techniques. Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence. 2022. URL: https://www.iso.org/standard/44381.html.

6. Antunes M., Maximiano M., Gomes R. J., Pinto D. Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal, Journal of cybersecurity and privacy. Vol. 1. 2021. P. 219–238. DOI: https://doi.org/10.3390/jcp1020012

7. Mubarak S., Heyasat H., Wibowo S. Information Security Models are a Solution or Puzzle for SMEs? A Systematic Literature Review. In Proceedings of the Australasian Conference on Information Systems. 2019. P. 148–154.

8. Ozkan B. Y, Spruit M. Cybersecurity Standardisation for SMEs: The Stakeholders’ Perspectives and a research agenda. Int. J. Stand. Res. Vol. 17. P. 41–72. DOI: https://doi.org/10.4018/IJSR.20190701.oa1

9. Weaver P. (2010). Understanding Programs and Projects Oh, There's a Difference! Paper presented at PMI® Global Congress. URL: https://www.pmi.org/learning/library/understanding-difference-programs-versus-projects-6896.

10. Luke Irwin (2019) The 8 CISSP domains explained. URL: https://www.itgovernance.co.uk/blog/the-8-cissp-domains-explained.

11. Pro osnovni zasady zabezpechennia kiberbezpeky Ukrainy: Zakon Ukrainy № 2163-VIII, redaktsiia vid 03.07.2020. 2020. URL: https://zakon.rada.gov.ua/laws/show/2163-19#Text.