Abstract
When Deutsche Bahn CEO Rüdiger Grube in 2013 was quoted as saying that cybersecurity at his company was a management-board issue, not something left to the system administrators (see van Zütphen 2013), this was something out of the ordinary as cybersecurity did not count as a traditional board issue at the time. These days Grube is in the best of company, because the topic of cybersecurity is now on the management board agenda of an increasing number of enterprises. A group of CEOs from 23 German blue chips even discussed it at length at the 2014 Munich Security Conference (see Gercke et al. 2014).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bürgers, T., & Israel, A. (2014). Kommentar zum AktG, 2998, § 91, Rn 12, in Bürgers, Tobias; Körber, Torsten: Heidelberger Kommentar zum AktG, 2998. C.F. Müller.
CSO (2008). Red team versus blue team: How to run an effective simulation. Accessed June 20, 2016, from http://www.csoonline.com/article/2122440/emergency-preparedness/red-team-versus-blue-team--how-to-run-an-effective-simulation.html
Fryer-Biggs, Z. (2012). Building better cyber red teams. Accessed June 20, 2016, from http://www.thecre.com/fnews/?p=944
Furtuna, A., Patriciu, V.-V., & Bica, I. (2010). Considerations about red teaming usage in assessing information assurance. Bucharest.
Gercke, M. (2013). Cybersecurity strategy, why it is necessary to move from cybersecurity philosophies to true cybersecurity strategies. CRI 5, 15 ff.; 136–142.
Gercke, M. (2014). “Red Teaming” Ansätze zur Effektivierung von Gesetzgebungsprozessen? Die Übertragbarkeit einer klassischen, militärischen Methodik auf Gesetzgebungsprozesse im IT-Bereich. CR 5, 344–348.
Gercke, M., Laschet, C., & Schweinsberg, K. (2014). Cyber-Risiken als Teil unternehmerischer Leistungsverantwortung. PHI, 76.
Herman, M., Frost, M., & Kurz, R. (2009). Wargaming for leaders: Strategic decision making from the battlefield to the boardroom. New York: McGraw-Hill Education.
IBM (2005). Red teams: Towards radical innovation. Accessed June 3, 2016, from http://www-935.ibm.com/services/us/imc/pdf/gt510-6190-red-teams.pdf
Lauder, M. (2009). Red dawn: The emergence of a red teaming capability in the Canadian forces. Canadian Army Journal, 12(2), 25–36.
Longbine, D. F. (2008). Red teaming: Past and present. Fort Leavenworth: Kansas.
Oriesek, D., & Schwarz, J. O. (2009). Business Wargaming: Unternehmenswert schaffen und schützen. Wiesbaden: Gabler Verlag.
Perla, P. P. (1990). The art of wargaming: A guide for professionals and hobbyists. Annapolis: US Naval Institute Press.
Sabin, P. (2012). Simulating war: Studying conflict through simulation games. New York: Bloomsbury Academic.
Securitymagazine (2013). $1.5 Million Cyberheist Ruins Escrow Firm. Accessed June 3, 2016, from http://www.securitymagazine.com/articles/84617-15-million-cyberheist-ruins-escrow-firm
Trappehl, B. (2009). Arbeitsrechtliche Konsequenzen von IT-Sicherheitsverstößen. NZA, 18, 986.
Tsukayama, H. (2012). Report: Chinese hackers breach Nortel networks. Accessed June 3, 2016, from https://www.washingtonpost.com/business/technology/report-chinese-hackers-breach-nortel-networks/2012/02/14/gIQApXsRDR_story.html
University of Foreign Military and Cultural Studies (2002). Red team handbook. Accessed June 6, 2016, from http://www.au.af.mil/au/awc/awcgate/army/ufmcs_red_team_handbook_apr2011.pdf
van Zütphen, T. (2013). Vorstandsthema Cyber Crime? So sicher wie der nächste Angriff. Best Practice, 3, 45.
von der Gathen, A. (2014). Das große Handbuch der Strategie Instrumente. New York: Campus Verlag.
von Holleben, K. M., & Menz, M. (2010). IT-Risikomanagement – Pflichten der Geschäftsleitung. CR, 1, 63–68.
Wood, B., & Duggan, R. (2002). Red teaming of advanced information assurance concepts. In DARPA Information Survivability Conference and Exposition, 2002. DISCEX 00 Proceedings (Vol 2, p. 112 ff).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Gercke, M. (2017). Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity?. In: Abolhassan, F. (eds) Cyber Security. Simply. Make it Happen.. Management for Professionals. Springer, Cham. https://doi.org/10.1007/978-3-319-46529-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-46529-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46528-9
Online ISBN: 978-3-319-46529-6
eBook Packages: Business and ManagementBusiness and Management (R0)