The Analysis of Cyber Risk: Vodafone
VerifiedAdded on 2023/06/06
|22
|5187
|433
AI Summary
This report summarizes the governance and management with context to Vodafone Company. The suitability for industry- Brazilian Industry sector and suitability for industry in general have been summarized. An overview has been provided for the different standards and frameworks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
The Analysis of Cyber Risk: Vodafone 0
Title: The Analysis of Cyber Risk: Vodafone
Assignment Name:
Student Name:
Professor:
Date:
Title: The Analysis of Cyber Risk: Vodafone
Assignment Name:
Student Name:
Professor:
Date:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The Analysis of Cyber Risk: Vodafone 1
Executive Summary
This report summarizes the governance and management with context to Vodafone Company.
The suitability for industry- Brazilian Industry sector and suitability for industry in general have
been summarized. An overview has been provided for the different standards and frameworks.
These are COSO, COBIT5, ISO31000, CSGM model and this is streamlined with governance
and management of business IT. A brief description has been provided on the Suitability of
CSGM model for Vodafone Company. Different variables like-shareholders, Cyber security
governance and cyber security management, Cyber environment and critical infrastructure has
been proposed. Recommendation of ERM framework for Vodafone has been given.
Establishment of context with respect to risk assessment, risk response, monitoring and review,
communication and consultation has been given.
A critical review has been presented of different cyber models that are streamlined with business
processes. The policy and process implication for the different cyber models have been provided.
The consistency of cyber models with COSO, ISO3 and COBIT 5 has been given. An overview
of corporate management and governance has also been given, followed by a conclusion.
Executive Summary
This report summarizes the governance and management with context to Vodafone Company.
The suitability for industry- Brazilian Industry sector and suitability for industry in general have
been summarized. An overview has been provided for the different standards and frameworks.
These are COSO, COBIT5, ISO31000, CSGM model and this is streamlined with governance
and management of business IT. A brief description has been provided on the Suitability of
CSGM model for Vodafone Company. Different variables like-shareholders, Cyber security
governance and cyber security management, Cyber environment and critical infrastructure has
been proposed. Recommendation of ERM framework for Vodafone has been given.
Establishment of context with respect to risk assessment, risk response, monitoring and review,
communication and consultation has been given.
A critical review has been presented of different cyber models that are streamlined with business
processes. The policy and process implication for the different cyber models have been provided.
The consistency of cyber models with COSO, ISO3 and COBIT 5 has been given. An overview
of corporate management and governance has also been given, followed by a conclusion.
The Analysis of Cyber Risk: Vodafone 2
Contents
Academic Journal Article Summary................................................................................................4
Governance.............................................................................................................................................4
Management...........................................................................................................................................4
Suitability for Industry.....................................................................................................................5
Brazilian Energy Sector............................................................................................................................5
Suitability for Industry in General............................................................................................................6
Standard and Frameworks...............................................................................................................6
ISO31000:2018 Guidelines written..........................................................................................................7
CSGM Model and ISO 31000....................................................................................................................7
COSO Enterprise Risk Management (ERM) Framework 2017..................................................................8
CSGM Model and COSO ERM Framework...............................................................................................8
COBIT 5- A Business Framework for the Governance and Management of Enterprise IT.......................9
CSGM Model and COBIT 5.......................................................................................................................9
Vodafone........................................................................................................................................10
Suitability of the CSGM Model for Vodafone.........................................................................................10
Stakeholders......................................................................................................................................11
Cyber Security Governance...............................................................................................................11
Cyber Security Management.............................................................................................................12
Contents
Academic Journal Article Summary................................................................................................4
Governance.............................................................................................................................................4
Management...........................................................................................................................................4
Suitability for Industry.....................................................................................................................5
Brazilian Energy Sector............................................................................................................................5
Suitability for Industry in General............................................................................................................6
Standard and Frameworks...............................................................................................................6
ISO31000:2018 Guidelines written..........................................................................................................7
CSGM Model and ISO 31000....................................................................................................................7
COSO Enterprise Risk Management (ERM) Framework 2017..................................................................8
CSGM Model and COSO ERM Framework...............................................................................................8
COBIT 5- A Business Framework for the Governance and Management of Enterprise IT.......................9
CSGM Model and COBIT 5.......................................................................................................................9
Vodafone........................................................................................................................................10
Suitability of the CSGM Model for Vodafone.........................................................................................10
Stakeholders......................................................................................................................................11
Cyber Security Governance...............................................................................................................11
Cyber Security Management.............................................................................................................12
The Analysis of Cyber Risk: Vodafone 3
Cyber Environment and Critical Infrastructure..................................................................................12
Recommendation of ERM Framework for Vodafone...................................................................13
Establishing the Context........................................................................................................................13
Risk Assessment....................................................................................................................................14
Risk Response........................................................................................................................................14
Monitoring and Review.........................................................................................................................15
Communication and Consultation.........................................................................................................15
References......................................................................................................................................16
Cyber Environment and Critical Infrastructure..................................................................................12
Recommendation of ERM Framework for Vodafone...................................................................13
Establishing the Context........................................................................................................................13
Risk Assessment....................................................................................................................................14
Risk Response........................................................................................................................................14
Monitoring and Review.........................................................................................................................15
Communication and Consultation.........................................................................................................15
References......................................................................................................................................16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The Analysis of Cyber Risk: Vodafone 4
Academic Journal Article Summary
Cyber security is essential for corporate bodies and it is interlinked with decision making.
The companies need to understand the business strategy model along with cyber. The success of
an organization not only lies in its innovation, but also with the strategic importance of cyber
Security. Vodafone is a multinational conglomerate, based out of London. It has centers in
Africa, Asia and Europe. It is a mobile operating company and has been ranked second because
of its high number of the customers.
Governance
According to the recent reports of 2018, there are 535 million customers (Tsoumas and
Gritzalis, 2012). Vodafone has been operating in more than 25 countries and has partnerships
with more than 45 countries. Its global enterprise corporate body arranges IT and
telecommunication services for more than 150 countries. Vodafone is the largest company listed
on the London Stock Exchange and comprises of market capitalization which is approximately
52 billion Euros (Horowitz and Lucero, 2016).
Management
The management team of Vodafone Company is making huge investments in Cyber
Security. The company is confident to strive growth in the business and create differentiation in
the market. Vodafone is acquiring new customers and prioritizing cyber security to a large
extent. Businesses need to focus on the transformation and improvement initiatives. This not
only includes digitalization, but also cyber security. The decision making body is significant for
the individual projects and must not be neglected at large. The companies need to emphasize on
Academic Journal Article Summary
Cyber security is essential for corporate bodies and it is interlinked with decision making.
The companies need to understand the business strategy model along with cyber. The success of
an organization not only lies in its innovation, but also with the strategic importance of cyber
Security. Vodafone is a multinational conglomerate, based out of London. It has centers in
Africa, Asia and Europe. It is a mobile operating company and has been ranked second because
of its high number of the customers.
Governance
According to the recent reports of 2018, there are 535 million customers (Tsoumas and
Gritzalis, 2012). Vodafone has been operating in more than 25 countries and has partnerships
with more than 45 countries. Its global enterprise corporate body arranges IT and
telecommunication services for more than 150 countries. Vodafone is the largest company listed
on the London Stock Exchange and comprises of market capitalization which is approximately
52 billion Euros (Horowitz and Lucero, 2016).
Management
The management team of Vodafone Company is making huge investments in Cyber
Security. The company is confident to strive growth in the business and create differentiation in
the market. Vodafone is acquiring new customers and prioritizing cyber security to a large
extent. Businesses need to focus on the transformation and improvement initiatives. This not
only includes digitalization, but also cyber security. The decision making body is significant for
the individual projects and must not be neglected at large. The companies need to emphasize on
The Analysis of Cyber Risk: Vodafone 5
the robust cyber security issues and this must be streamlined with networks. Another key aspect
which cannot be ignored is security budget.
Suitability for Industry
The energy sector is diverse and complicated. There is existing energy sources which are
using the ERP technology to be more effective and cost-efficient and all the new energy sources
must provide the energy customers with power choices. The innovation impact is bigger than the
choice as it brings changes in the economies of scale. Suppliers of the energy sector will be
required to meet with the different criteria’s to provide right supply to energy equipment owners.
The supplier must have these product characteristics-
1. High Quality
2. Compliance with the engineering specifications
3. Product documentation must be correct and implementing of instructions.
4. History of order requests and rapid availability.
5. Service maintenance record of vital equipment’s and machinery.
Brazilian Energy Sector
Brazilian Energy Sector is based on the renewable energy resources, this account for 80
percent of electricity generation. Brazil is dependent on the hydro generation of power; Energy
sources in Brazil include oil, minerals, hydropower and biofuels. The development of economic
activities, similarly, account energy issues are under the competitive and environmentally
sustainable conditions. Brazil has done its homework and has been frequently mentioned in the
oil production and hydroelectricity power generation. The massive use of wind energy and
interconnected transmission system and especially, the energy renewability and power mix.
the robust cyber security issues and this must be streamlined with networks. Another key aspect
which cannot be ignored is security budget.
Suitability for Industry
The energy sector is diverse and complicated. There is existing energy sources which are
using the ERP technology to be more effective and cost-efficient and all the new energy sources
must provide the energy customers with power choices. The innovation impact is bigger than the
choice as it brings changes in the economies of scale. Suppliers of the energy sector will be
required to meet with the different criteria’s to provide right supply to energy equipment owners.
The supplier must have these product characteristics-
1. High Quality
2. Compliance with the engineering specifications
3. Product documentation must be correct and implementing of instructions.
4. History of order requests and rapid availability.
5. Service maintenance record of vital equipment’s and machinery.
Brazilian Energy Sector
Brazilian Energy Sector is based on the renewable energy resources, this account for 80
percent of electricity generation. Brazil is dependent on the hydro generation of power; Energy
sources in Brazil include oil, minerals, hydropower and biofuels. The development of economic
activities, similarly, account energy issues are under the competitive and environmentally
sustainable conditions. Brazil has done its homework and has been frequently mentioned in the
oil production and hydroelectricity power generation. The massive use of wind energy and
interconnected transmission system and especially, the energy renewability and power mix.
The Analysis of Cyber Risk: Vodafone 6
The achievement of Brazilian industry is essentially through the institutional and
regulatory framework that ensures favorable conditions for the investments. Energy is one of the
sectors where in countries will have more significantly restoring the capabilities of decision
making and policy making and planned actions must be executed through integrated public-
private associations.
Suitability for Industry in General
The organizations need to have an awareness of the fact that there is no robust technology
available that can provide well-tested technical backup. The scheduling of a backup plan is
required and rapid recovery can ensure the decrease of cyber security crimes. There are different
principles applicable to the wide variety of operations. For instance- The sound and encyclopedic
governance must be in place to enjoy the privileges given to different users to perform the
necessitated jobs. An important key concern for CEOs and managing directors is the level of
compromise being made at the enterprise level to ensure protection to malicious systems or
inside actions. Here, the organizations need to adopt the unified corporate and risk governance.
Standard and Frameworks
Enterprise Resource Planning models have been evolved from integral business systems
towards large and medium organizations. The ERP strength is a computerized information
transactional system which is data repository. This allows the data availability and collaboration
among the different business functions. Realizing the associations of an ERP implementation is
challenging. The establishment of ERP system has forced the organization to critically review its
position. This study has identified some shortfalls in initial implementation of ERP and
introduces the ERP framework named COSO, COBIT 5, CSGM and ISO 31000. These will
assist in evaluating the ERP system evaluation results and support the organization with
The achievement of Brazilian industry is essentially through the institutional and
regulatory framework that ensures favorable conditions for the investments. Energy is one of the
sectors where in countries will have more significantly restoring the capabilities of decision
making and policy making and planned actions must be executed through integrated public-
private associations.
Suitability for Industry in General
The organizations need to have an awareness of the fact that there is no robust technology
available that can provide well-tested technical backup. The scheduling of a backup plan is
required and rapid recovery can ensure the decrease of cyber security crimes. There are different
principles applicable to the wide variety of operations. For instance- The sound and encyclopedic
governance must be in place to enjoy the privileges given to different users to perform the
necessitated jobs. An important key concern for CEOs and managing directors is the level of
compromise being made at the enterprise level to ensure protection to malicious systems or
inside actions. Here, the organizations need to adopt the unified corporate and risk governance.
Standard and Frameworks
Enterprise Resource Planning models have been evolved from integral business systems
towards large and medium organizations. The ERP strength is a computerized information
transactional system which is data repository. This allows the data availability and collaboration
among the different business functions. Realizing the associations of an ERP implementation is
challenging. The establishment of ERP system has forced the organization to critically review its
position. This study has identified some shortfalls in initial implementation of ERP and
introduces the ERP framework named COSO, COBIT 5, CSGM and ISO 31000. These will
assist in evaluating the ERP system evaluation results and support the organization with
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The Analysis of Cyber Risk: Vodafone 7
evaluation results. These are based on the organizational fit. These models and frameworks can
effectively decrease the product cost, enhance customer satisfaction and increase the
competitiveness for most of the enterprises. The successful implementation of ERP system
requires initial planning and achievement of intended goals is possible. Aiming at the different
issues, the IT governance ERP framework has been prepared and this is based on IT governance
methodology which includes strategy and enterprise organization, governance arrangements,
ERP related performance goals, related accountabilities and metrics.
Image Source: - www.coolblue.com
evaluation results. These are based on the organizational fit. These models and frameworks can
effectively decrease the product cost, enhance customer satisfaction and increase the
competitiveness for most of the enterprises. The successful implementation of ERP system
requires initial planning and achievement of intended goals is possible. Aiming at the different
issues, the IT governance ERP framework has been prepared and this is based on IT governance
methodology which includes strategy and enterprise organization, governance arrangements,
ERP related performance goals, related accountabilities and metrics.
Image Source: - www.coolblue.com
The Analysis of Cyber Risk: Vodafone 8
ISO31000:2018 Guidelines written
The consistency of a strategic road map and cyber security plan must take into the legal
framework of ISO 31000:2018 and controlling the information objectives and related
technology. The detection of fraud and internal control at the enterprise level is relevant within
the information framework of ISO 31000. The Indian Standard Organization 31000 has been
formed with the aim of protecting the frauds and effective allocation of resources and
comparison of risk practices at different levels. The expected computational loss can be
advocated through the implementation of ISO 31000 frameworks.
CSGM Model and ISO 31000
CSGM Model and ISO 31000 are intended for organizations to protect the value and risk
management in any organization which can manage the risks, decision taking management and
setting up of objectives and working on improving the performance. The CSGM model discovers
keeping the risk management simple. Risk management guidelines have moved forward and it is
now available for the public comments. This is a revision work which will follow the distinct
objective of making the riskier things clear and easy. This is achievable by simple language
techniques and expressing the risk fundamentals wich are understandable to the users. There are
certain standard policies and guidelines on the values and benefits of efficient and effective risk
management and can help the organizations to understand the uncertainties and accomplish the
objectives. The major task is finding the right balance detailed guidance and complete textbook.
The text has been shortened to the fundamental concepts and has created the clearer, concise
statement which can be read easily and remains widely applicable. In order to avoid weighing the
ISO31000:2018 Guidelines written
The consistency of a strategic road map and cyber security plan must take into the legal
framework of ISO 31000:2018 and controlling the information objectives and related
technology. The detection of fraud and internal control at the enterprise level is relevant within
the information framework of ISO 31000. The Indian Standard Organization 31000 has been
formed with the aim of protecting the frauds and effective allocation of resources and
comparison of risk practices at different levels. The expected computational loss can be
advocated through the implementation of ISO 31000 frameworks.
CSGM Model and ISO 31000
CSGM Model and ISO 31000 are intended for organizations to protect the value and risk
management in any organization which can manage the risks, decision taking management and
setting up of objectives and working on improving the performance. The CSGM model discovers
keeping the risk management simple. Risk management guidelines have moved forward and it is
now available for the public comments. This is a revision work which will follow the distinct
objective of making the riskier things clear and easy. This is achievable by simple language
techniques and expressing the risk fundamentals wich are understandable to the users. There are
certain standard policies and guidelines on the values and benefits of efficient and effective risk
management and can help the organizations to understand the uncertainties and accomplish the
objectives. The major task is finding the right balance detailed guidance and complete textbook.
The text has been shortened to the fundamental concepts and has created the clearer, concise
statement which can be read easily and remains widely applicable. In order to avoid weighing the
The Analysis of Cyber Risk: Vodafone 9
security risk standards and making the process too complex, the ISO 31000 terminologies will be
reduced. This is strengthened by generic quality and provides the renewed basis for experts and
end users. These are the users who will be facing the challenges to determine risk and
communication with different stakeholders. There must be a risk management framework which
comprises of guidance and is relevant for end users and must be augmented with different
concept. This must be in relevance with different countries and industries.
COSO Enterprise Risk Management (ERM) Framework 2017
Cyber security is gaining huge importance and business organizations must embed the
networks from the very beginning. The companies will be required to heavily focus on the
investment plans. There is a young team of decision makers that believe in the complete
automation of the IT industry. More than 70 percent of the people are of the belief that business
security is necessary due to the increase number of internet threats. The humans are not capable
alone to handle the cyber security issues (Lehto, 2013). The COSO Enterprise Risk Management
is a cross-market data format that has separate IT guidelines. The model provides a framework
for the collection of cyber exposures. The companies need to plan a detailed analysis of their
organization and note responses demographically, industrial units, revenue plans and recovery
plans. .
CSGM Model and COSO ERM Framework
The Vodafone Company assesses the nightmare occurring due to cybercrime. These are
increasingly rising in cost and numbers. The company needs to implement the CSGM Model and
COSO ERM framework. The legal protection is very costly and there is no specific software that
can perform the cyber risk governance and management. The best methodology adopted for the
security risk standards and making the process too complex, the ISO 31000 terminologies will be
reduced. This is strengthened by generic quality and provides the renewed basis for experts and
end users. These are the users who will be facing the challenges to determine risk and
communication with different stakeholders. There must be a risk management framework which
comprises of guidance and is relevant for end users and must be augmented with different
concept. This must be in relevance with different countries and industries.
COSO Enterprise Risk Management (ERM) Framework 2017
Cyber security is gaining huge importance and business organizations must embed the
networks from the very beginning. The companies will be required to heavily focus on the
investment plans. There is a young team of decision makers that believe in the complete
automation of the IT industry. More than 70 percent of the people are of the belief that business
security is necessary due to the increase number of internet threats. The humans are not capable
alone to handle the cyber security issues (Lehto, 2013). The COSO Enterprise Risk Management
is a cross-market data format that has separate IT guidelines. The model provides a framework
for the collection of cyber exposures. The companies need to plan a detailed analysis of their
organization and note responses demographically, industrial units, revenue plans and recovery
plans. .
CSGM Model and COSO ERM Framework
The Vodafone Company assesses the nightmare occurring due to cybercrime. These are
increasingly rising in cost and numbers. The company needs to implement the CSGM Model and
COSO ERM framework. The legal protection is very costly and there is no specific software that
can perform the cyber risk governance and management. The best methodology adopted for the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The Analysis of Cyber Risk: Vodafone 10
prevention of cybercrime attacks and minimal asset losses is defining the CSGM Model and
COSO ERM framework and principles that ensure active defense (Amin, 2017). The company
needs to adhere to certain critical steps for implementing the scheduled checks. This is done in
order to reduce the number of technical errors. The exploitation of IT Systems is mainly due to
unwanted or pending alerts. The corporate governance combined with security risk management
alerts must be addressed and systems must be up-to-date. The company needs to get prepared
and active CSGM Model and COSO ERM framework against the security breaches must be
taken into account. The minimization of cyber security crimes is required in the corporate bodies,
specifically when the companies are data flooded (Malhotra, 2015).
COBIT 5- A Business Framework for the Governance and Management of
Enterprise IT
COBIT 5 is in practice from past 2 decades and IT governance frameworks on audit,
management control and information security business model has been released (Haugen, 2005).
The roadway to provide customer satisfaction and direct monitoring of stakeholder transparency
lies within the framework of COBIT 5. The changing business environment is highlighted with
the use of Cyber security models and its alignment with COSO, COBIT 5 and ISO 31000. The
performance at different enterprise levels must be improvised with an approach highlighted as an
input. The companies need to attain leadership in addressing the enterprise risk and internally
recognizing the guidance given through body of individuals (Peters, Shevchenko and Cohen,
2018).
prevention of cybercrime attacks and minimal asset losses is defining the CSGM Model and
COSO ERM framework and principles that ensure active defense (Amin, 2017). The company
needs to adhere to certain critical steps for implementing the scheduled checks. This is done in
order to reduce the number of technical errors. The exploitation of IT Systems is mainly due to
unwanted or pending alerts. The corporate governance combined with security risk management
alerts must be addressed and systems must be up-to-date. The company needs to get prepared
and active CSGM Model and COSO ERM framework against the security breaches must be
taken into account. The minimization of cyber security crimes is required in the corporate bodies,
specifically when the companies are data flooded (Malhotra, 2015).
COBIT 5- A Business Framework for the Governance and Management of
Enterprise IT
COBIT 5 is in practice from past 2 decades and IT governance frameworks on audit,
management control and information security business model has been released (Haugen, 2005).
The roadway to provide customer satisfaction and direct monitoring of stakeholder transparency
lies within the framework of COBIT 5. The changing business environment is highlighted with
the use of Cyber security models and its alignment with COSO, COBIT 5 and ISO 31000. The
performance at different enterprise levels must be improvised with an approach highlighted as an
input. The companies need to attain leadership in addressing the enterprise risk and internally
recognizing the guidance given through body of individuals (Peters, Shevchenko and Cohen,
2018).
The Analysis of Cyber Risk: Vodafone 11
CSGM Model and COBIT 5
The companies lack the all-encompassing cyber risk models that can mitigate risks and
allocate solutions for a given event. The probabilistic cyber risk model must not be seen from the
stakeholder perspective, but develop a re-assurance towards the CSGM Model and COBIT 5.
The quantification of loss and individual accounts allows the companies to implement a new
model within its framework. The different industries with relevance to marine, energy, insurance
and property must be linked with the data portfolios and incorporated COBIT 5 or CSGM
structure (Olcott and Sills, 2014).
CSGM Model and COBIT 5
The companies lack the all-encompassing cyber risk models that can mitigate risks and
allocate solutions for a given event. The probabilistic cyber risk model must not be seen from the
stakeholder perspective, but develop a re-assurance towards the CSGM Model and COBIT 5.
The quantification of loss and individual accounts allows the companies to implement a new
model within its framework. The different industries with relevance to marine, energy, insurance
and property must be linked with the data portfolios and incorporated COBIT 5 or CSGM
structure (Olcott and Sills, 2014).
The Analysis of Cyber Risk: Vodafone 12
Image Source: - http://www.isaca.org
Vodafone
The Vodafone Company needs to focus on finding some of the limitations that are
associated with implementation of cyber security models. The evaluation of budgetary limits is
one of the key concerns of management. Hiring a legal team for the purpose of underwriting and
cyber security probability accumulation analysis is an increased cost in corporate’s. Regulatory
Image Source: - http://www.isaca.org
Vodafone
The Vodafone Company needs to focus on finding some of the limitations that are
associated with implementation of cyber security models. The evaluation of budgetary limits is
one of the key concerns of management. Hiring a legal team for the purpose of underwriting and
cyber security probability accumulation analysis is an increased cost in corporate’s. Regulatory
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The Analysis of Cyber Risk: Vodafone 13
compliance is another aspect of cyber security that requires different bodies to analyze the
legality of IT frameworks adopted by the corporate structure.
Suitability of the CSGM Model for Vodafone
Suitability of the CSGM Model for Vodafone is a lengthy task and requires retaining the
legal IT security team. A cost-benefit analysis is necessary to be conducted for the
implementation of CSGM Model (Malhotra, 2015). The cyber security products are aimed at
reducing the financial losses that happen through security breaches. The IT technology adopted
by the company must be compliant with the CSGM Model. The cyber risk can be assessed
through different models. The different models must be implemented into the corporate body
after assessing the different variables that have an impact over the returns or the revenue of the
firm. The profile of wealth firm needs to be insured by the legal bodies. In a scenario of a
security breach in an organization, the cyber risk assessment must be performed (Eling, 2018).
Stakeholders
The CEO may oversight the vulnerabilities of a department, but cyber security division
has a strong and robust view to effectively understand the risk governance. An appropriate cyber
security cell is guaranteed in upcoming years, in every enterprise. The board of directors and
must play a major role in assessment of cyber risk inputs and risk mitigation. The distinctive
corporate governance must encompass all the key domains of cyber risk and security. There are
no comprehensive solutions to a given IT governance problem. The IT surroundings in which a
corporate structure has been built requires a legal body and personnel trained service that can
deliver the cyber security at the enterprise level. The companies need to identify the complexity
that encompasses the cyber security. A need for the identification of employee skills, security
staff and appropriate body of individuals that can lead the pathway for global cyber security is
compliance is another aspect of cyber security that requires different bodies to analyze the
legality of IT frameworks adopted by the corporate structure.
Suitability of the CSGM Model for Vodafone
Suitability of the CSGM Model for Vodafone is a lengthy task and requires retaining the
legal IT security team. A cost-benefit analysis is necessary to be conducted for the
implementation of CSGM Model (Malhotra, 2015). The cyber security products are aimed at
reducing the financial losses that happen through security breaches. The IT technology adopted
by the company must be compliant with the CSGM Model. The cyber risk can be assessed
through different models. The different models must be implemented into the corporate body
after assessing the different variables that have an impact over the returns or the revenue of the
firm. The profile of wealth firm needs to be insured by the legal bodies. In a scenario of a
security breach in an organization, the cyber risk assessment must be performed (Eling, 2018).
Stakeholders
The CEO may oversight the vulnerabilities of a department, but cyber security division
has a strong and robust view to effectively understand the risk governance. An appropriate cyber
security cell is guaranteed in upcoming years, in every enterprise. The board of directors and
must play a major role in assessment of cyber risk inputs and risk mitigation. The distinctive
corporate governance must encompass all the key domains of cyber risk and security. There are
no comprehensive solutions to a given IT governance problem. The IT surroundings in which a
corporate structure has been built requires a legal body and personnel trained service that can
deliver the cyber security at the enterprise level. The companies need to identify the complexity
that encompasses the cyber security. A need for the identification of employee skills, security
staff and appropriate body of individuals that can lead the pathway for global cyber security is
The Analysis of Cyber Risk: Vodafone 14
significant in its own terms. The cyber resilience has been used synonymously with cyber
security (Paté-Cornell et al., 2017). The philosophy behind the cyber security is based on tested
IT processes which can encourage the subsistence of a corporate structure. When information or
a policy and/or guidelines are breached, the escalated matters must be responded appropriately
and simplified. The damage to a corporate repute/image must be emphasized with the juncture of
different processes, skills and re-occurrence of mishaps within a given span of time.
Cyber Security Governance
Cyber security is gaining huge importance and business organizations must embed the
networks from the very beginning. The companies will be required to heavily focus on the
investment plans. There is a young team of decision makers that believe in the complete
automation of the IT industry. More than 70 percent of the people are of the belief that business
security is necessary due to the increase number of internet threats. The humans are not capable
alone to handle the cyber security issues (Lehto, 2013). The Cyber Risk Exposure Model is a
cross-market data format that has separate IT guidelines. The model provides a framework for
the collection of cyber exposures. The companies need to plan a detailed analysis of their
organization and note responses demographically, industrial units, revenue plans and recovery
plans.
Cyber Security Management
The cyber market is enhanced and broad and risk mitigation options are always available
to organizations with respect to liabilities. The ability of Vodafone Company with its capability
to respond and detect behavioral analysis is in context of real time response. The cyber security
model extends with an enterprise capability and not only limited to the infrastructure. The
privacy and security regulation has been shaping the Vodafone Company from past 20 years.
significant in its own terms. The cyber resilience has been used synonymously with cyber
security (Paté-Cornell et al., 2017). The philosophy behind the cyber security is based on tested
IT processes which can encourage the subsistence of a corporate structure. When information or
a policy and/or guidelines are breached, the escalated matters must be responded appropriately
and simplified. The damage to a corporate repute/image must be emphasized with the juncture of
different processes, skills and re-occurrence of mishaps within a given span of time.
Cyber Security Governance
Cyber security is gaining huge importance and business organizations must embed the
networks from the very beginning. The companies will be required to heavily focus on the
investment plans. There is a young team of decision makers that believe in the complete
automation of the IT industry. More than 70 percent of the people are of the belief that business
security is necessary due to the increase number of internet threats. The humans are not capable
alone to handle the cyber security issues (Lehto, 2013). The Cyber Risk Exposure Model is a
cross-market data format that has separate IT guidelines. The model provides a framework for
the collection of cyber exposures. The companies need to plan a detailed analysis of their
organization and note responses demographically, industrial units, revenue plans and recovery
plans.
Cyber Security Management
The cyber market is enhanced and broad and risk mitigation options are always available
to organizations with respect to liabilities. The ability of Vodafone Company with its capability
to respond and detect behavioral analysis is in context of real time response. The cyber security
model extends with an enterprise capability and not only limited to the infrastructure. The
privacy and security regulation has been shaping the Vodafone Company from past 20 years.
The Analysis of Cyber Risk: Vodafone 15
The company has not only been involved with the significant investment, but control of critical
data to its users. The different legal and cyber security compliance bodies have highlighted the
important gap that exists between the enterprise and directed guidelines. The employees of an
organization must be cyber-aware and cyber security cell must be present at different levels.
However, the Vodafone Company has a long way to go with a price premium attached to its
credibility. This has become a part of customer proposition and accountable for core security
(Kosub, 2015).
Cyber Environment and Critical Infrastructure
The transference of data can enhance the vulnerabilities. The company needs to analyze
the causes of data-Extortion, physical and public relations, Programming omissions and errors,
Replacement of IT data and fines, the liability of website publishing and business interruption.
Another Cyber Security Model is accumulated approach for cyber scenario modeling (Sari,
2018). The company needs to prepare an uncorrelated view of portfolio exposures, The
organization of aggregation points, the identification of exposures that will be having an effect
on an aggregation scenario and last calculating the insures losses for a specific scenario.
Probabilistic cyber model is also a cyber-security model that evaluates the annual probability of
breach by revenue/ industries. The company needs to list down the breach done by an industry or
any records stolen and what is the estimated costs of breach done to X and Y and maintaining the
written records. Some of the cyber security characteristics that must be incorporated into
probabilistic model are- Antivirus effectiveness, intrusion detection, file sharing, security ratings,
firewall health and email filters.
The company has not only been involved with the significant investment, but control of critical
data to its users. The different legal and cyber security compliance bodies have highlighted the
important gap that exists between the enterprise and directed guidelines. The employees of an
organization must be cyber-aware and cyber security cell must be present at different levels.
However, the Vodafone Company has a long way to go with a price premium attached to its
credibility. This has become a part of customer proposition and accountable for core security
(Kosub, 2015).
Cyber Environment and Critical Infrastructure
The transference of data can enhance the vulnerabilities. The company needs to analyze
the causes of data-Extortion, physical and public relations, Programming omissions and errors,
Replacement of IT data and fines, the liability of website publishing and business interruption.
Another Cyber Security Model is accumulated approach for cyber scenario modeling (Sari,
2018). The company needs to prepare an uncorrelated view of portfolio exposures, The
organization of aggregation points, the identification of exposures that will be having an effect
on an aggregation scenario and last calculating the insures losses for a specific scenario.
Probabilistic cyber model is also a cyber-security model that evaluates the annual probability of
breach by revenue/ industries. The company needs to list down the breach done by an industry or
any records stolen and what is the estimated costs of breach done to X and Y and maintaining the
written records. Some of the cyber security characteristics that must be incorporated into
probabilistic model are- Antivirus effectiveness, intrusion detection, file sharing, security ratings,
firewall health and email filters.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The Analysis of Cyber Risk: Vodafone 16
Recommendation of ERM Framework for Vodafone
The cybercrime is still unknown in this era and request for elevated precedence over
other matters of concern manifested in a corporate body. The new elucidation lies in establishing
a platform that can assimilate Cyber security models with COBIT 5 and relevant frameworks.
What is the new way to respond to cybercrime? The capability of a company to exceed the
Enterprise resource systems and aligning with cyber security and risk models/frameworks must
be in a continuum. At the same time, triggering losses must be brought under the consideration
of management (Malhotra, 2017). The individuals that conceal the data or any information that is
in relevance to a corporate body must be limited.
Establishing the Context
The expansion in functionality of working people is possible only with the excursion of malware
present in the organization. The Determination of organization policies that can be streamlined with
cyber risk is essential. The data that is exposed to cybercrime must be recorded and maintained.
Evaluation of cyber scenarios that is frequent to happen. Estimation of cyber incidents that are
taking place in the IT surroundings is necessary with respect to cost-benefit analysis. Standalone
Cyber product offers first-party loss cover from cybercrime. The decrease of organizational
exposures to cyber events can be easily achieved by standalone cyber. This includes forensic
investigators, credit monitoring, public relations, breach coaches and many more (Eling and
Schnell, 2016). The cyber endorsement policy is provided for the commercials that includes the
liability coverage for the following products- Entertainment, educational and environmental,
Industry services, health industry, human services and outdoor products, sports and public
services. ate governance approach must be taken into account with major cyber processes. The deeper
understanding of ERP system and its alignment with cyber security models and relevant frameworks is a
Recommendation of ERM Framework for Vodafone
The cybercrime is still unknown in this era and request for elevated precedence over
other matters of concern manifested in a corporate body. The new elucidation lies in establishing
a platform that can assimilate Cyber security models with COBIT 5 and relevant frameworks.
What is the new way to respond to cybercrime? The capability of a company to exceed the
Enterprise resource systems and aligning with cyber security and risk models/frameworks must
be in a continuum. At the same time, triggering losses must be brought under the consideration
of management (Malhotra, 2017). The individuals that conceal the data or any information that is
in relevance to a corporate body must be limited.
Establishing the Context
The expansion in functionality of working people is possible only with the excursion of malware
present in the organization. The Determination of organization policies that can be streamlined with
cyber risk is essential. The data that is exposed to cybercrime must be recorded and maintained.
Evaluation of cyber scenarios that is frequent to happen. Estimation of cyber incidents that are
taking place in the IT surroundings is necessary with respect to cost-benefit analysis. Standalone
Cyber product offers first-party loss cover from cybercrime. The decrease of organizational
exposures to cyber events can be easily achieved by standalone cyber. This includes forensic
investigators, credit monitoring, public relations, breach coaches and many more (Eling and
Schnell, 2016). The cyber endorsement policy is provided for the commercials that includes the
liability coverage for the following products- Entertainment, educational and environmental,
Industry services, health industry, human services and outdoor products, sports and public
services. ate governance approach must be taken into account with major cyber processes. The deeper
understanding of ERP system and its alignment with cyber security models and relevant frameworks is a
The Analysis of Cyber Risk: Vodafone 17
concern for the majority. The companies need to plan an informed cyber risk strategy that can eliminate
the business interruption. Taking an insurance coverage for a cyber-risk issues is often accompanied with
corporate reputation (Camillo, 2017).
Risk Assessment
Recognition of cyber security risk with relation to the corporate body and critical
business processes- The acceptance level of risk and investment made for cyber security risk
must be reflected in the books of accounts. The company needs to understand the complexity of
frauds that are done within an organization. Incorporation of technical security services,
personnel services, physical services and IT services- The risk approach strategy must be
integrated with cyber security strategy. The dynamic system of combating with the inside threats
requires specific theoretical disciplines and intervention of bodies which enhance network
security software configuration in a protected way (Rao et al., 2015). The formulation of an
effective monitoring system for prevention and corporate threat- A comprehensive view of cyber
security issues across the different corporate bodies must embrace a culture that can counter-
effect the critical behavior of IT systems. At times, the company may undergo through the attack
or cybercrime, which requires regulations of the different bodies to deliver the guidance and
management of cyber risk.
Risk Response
Silent cyber is latent cybercrime comprised within the conventional property framework
and liability of which, is implicitly included or excluded cyber risk. Silent cyber refer to the
cyber losses that may occur in certain circumstances. The parameters of which are included in
cyber cover and conventional insurance policies. Silent cyber has been also referred to as non-
affirmative cyber in few cases. This is specifically relevant for the aviation industry, marine
concern for the majority. The companies need to plan an informed cyber risk strategy that can eliminate
the business interruption. Taking an insurance coverage for a cyber-risk issues is often accompanied with
corporate reputation (Camillo, 2017).
Risk Assessment
Recognition of cyber security risk with relation to the corporate body and critical
business processes- The acceptance level of risk and investment made for cyber security risk
must be reflected in the books of accounts. The company needs to understand the complexity of
frauds that are done within an organization. Incorporation of technical security services,
personnel services, physical services and IT services- The risk approach strategy must be
integrated with cyber security strategy. The dynamic system of combating with the inside threats
requires specific theoretical disciplines and intervention of bodies which enhance network
security software configuration in a protected way (Rao et al., 2015). The formulation of an
effective monitoring system for prevention and corporate threat- A comprehensive view of cyber
security issues across the different corporate bodies must embrace a culture that can counter-
effect the critical behavior of IT systems. At times, the company may undergo through the attack
or cybercrime, which requires regulations of the different bodies to deliver the guidance and
management of cyber risk.
Risk Response
Silent cyber is latent cybercrime comprised within the conventional property framework
and liability of which, is implicitly included or excluded cyber risk. Silent cyber refer to the
cyber losses that may occur in certain circumstances. The parameters of which are included in
cyber cover and conventional insurance policies. Silent cyber has been also referred to as non-
affirmative cyber in few cases. This is specifically relevant for the aviation industry, marine
The Analysis of Cyber Risk: Vodafone 18
industry, real estate and transport and few liability covers. There is no prevalent cyber
segregation in the real estate market. The underwriter’s experts need to analyze the future
prospects of cyber load resulting through the commercial cyber-attacks, targeting the industrial
bodies or smart cities (Ogut, Raghunathan and Menon, 2010).
Monitoring and Review
The Vodafone company acknowledges the need for cloud computing and IT security
issues. This is visible through the more than 55 percent of people who are aged above 35 have a
better decision making power with regard to cyber security issues. The strategies are well-
defined through the business owners and protection of organization data is on the priority list.
With context to above, a plan for cyber security model. Cyber Attack and review plan-The
identification of resources within the corporate structure is necessary to eliminate the problems.
The cyber response may vary from one company to another, but an emphasis must be on the
formulation of a cyber-plan (Peters et al., 2017).
Communication and Consultation
The cyber scenarios are inevitable for any corporate body. The cyber risks must be
critically analyzed and executing risk mitigation actions. The company needs to focus on having
the security budget and ensure about not suffering from business interruption or breach. The
complete elimination of risk is possible only through the deeper understanding of variables. The
process of cyber risk includes scenario planning for an event or a business. This can have a lot of
impact over the business and can be made available in many forms. Businesses may undertake
holistic view towards cyber risk and different programs (Mainelli, 2012).
industry, real estate and transport and few liability covers. There is no prevalent cyber
segregation in the real estate market. The underwriter’s experts need to analyze the future
prospects of cyber load resulting through the commercial cyber-attacks, targeting the industrial
bodies or smart cities (Ogut, Raghunathan and Menon, 2010).
Monitoring and Review
The Vodafone company acknowledges the need for cloud computing and IT security
issues. This is visible through the more than 55 percent of people who are aged above 35 have a
better decision making power with regard to cyber security issues. The strategies are well-
defined through the business owners and protection of organization data is on the priority list.
With context to above, a plan for cyber security model. Cyber Attack and review plan-The
identification of resources within the corporate structure is necessary to eliminate the problems.
The cyber response may vary from one company to another, but an emphasis must be on the
formulation of a cyber-plan (Peters et al., 2017).
Communication and Consultation
The cyber scenarios are inevitable for any corporate body. The cyber risks must be
critically analyzed and executing risk mitigation actions. The company needs to focus on having
the security budget and ensure about not suffering from business interruption or breach. The
complete elimination of risk is possible only through the deeper understanding of variables. The
process of cyber risk includes scenario planning for an event or a business. This can have a lot of
impact over the business and can be made available in many forms. Businesses may undertake
holistic view towards cyber risk and different programs (Mainelli, 2012).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The Analysis of Cyber Risk: Vodafone 19
References
Amin, Z. (2017). A practical road map for assessing cyber risk. Journal of Risk Research, pp.1-
12.
Camillo, M. (2017). Cyber risk and the changing role of insurance. Journal of Cyber Policy,
2(1), pp.53-63.
Eling, M. (2018). Cyber Risk and Cyber Risk Insurance: Status Quo and Future Research. The
Geneva Papers on Risk and Insurance - Issues and Practice, 43(2), pp.175-179.
Eling, M. and Schnell, W. (2016). What do we know about cyber risk and cyber risk
insurance?. The Journal of Risk Finance, 17(5), pp.474-491.
Haugen, S. (2005). E-government, cyber-crime and cyber-terrorism: a population at
risk. Electronic Government, an International Journal, 2(3), p.403.
Horowitz, B. and Lucero, D. (2016). System-Aware Cyber Security: A Systems Engineering
Approach For Enhancing Cyber Security. Insight, 19(2), pp.39-42.
Kosub, T. (2015). Components and Challenges of Integrated Cyber Risk Management. SSRN
Electronic Journal.
Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber Security
Strategies. International Journal of Cyber Warfare and Terrorism, 3(3), pp.1-18.
Mainelli, M. (2012). Learn from insurance: cyber bore. The Journal of Risk Finance, 14(1),
pp.100-102.
Malhotra, Y. (2015). Toward Integrated Enterprise Risk Management, Model Risk Management
& Cyber-Finance Risk Management: Bridging Networks, Systems and Controls
Frameworks. SSRN Electronic Journal.
References
Amin, Z. (2017). A practical road map for assessing cyber risk. Journal of Risk Research, pp.1-
12.
Camillo, M. (2017). Cyber risk and the changing role of insurance. Journal of Cyber Policy,
2(1), pp.53-63.
Eling, M. (2018). Cyber Risk and Cyber Risk Insurance: Status Quo and Future Research. The
Geneva Papers on Risk and Insurance - Issues and Practice, 43(2), pp.175-179.
Eling, M. and Schnell, W. (2016). What do we know about cyber risk and cyber risk
insurance?. The Journal of Risk Finance, 17(5), pp.474-491.
Haugen, S. (2005). E-government, cyber-crime and cyber-terrorism: a population at
risk. Electronic Government, an International Journal, 2(3), p.403.
Horowitz, B. and Lucero, D. (2016). System-Aware Cyber Security: A Systems Engineering
Approach For Enhancing Cyber Security. Insight, 19(2), pp.39-42.
Kosub, T. (2015). Components and Challenges of Integrated Cyber Risk Management. SSRN
Electronic Journal.
Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber Security
Strategies. International Journal of Cyber Warfare and Terrorism, 3(3), pp.1-18.
Mainelli, M. (2012). Learn from insurance: cyber bore. The Journal of Risk Finance, 14(1),
pp.100-102.
Malhotra, Y. (2015). Toward Integrated Enterprise Risk Management, Model Risk Management
& Cyber-Finance Risk Management: Bridging Networks, Systems and Controls
Frameworks. SSRN Electronic Journal.
The Analysis of Cyber Risk: Vodafone 20
Malhotra, Y. (2015). Stress Testing for Cyber Risks: Cyber Risk Insurance Modeling beyond
Value-at-Risk (VaR): Risk, Uncertainty, and, Profit for the Cyber Era. SSRN Electronic
Journal.
Malhotra, Y. (2017). Advancing Cyber Risk Insurance Underwriting Model Risk Management
beyond VaR to Pre-Empt and Prevent the Forthcoming Global Cyber Insurance
Crisis. SSRN Electronic Journal.
Ogut, H., Raghunathan, S. and Menon, N. (2010). Cyber Security Risk Management: Public
Policy Implications of Correlated Risk, Imperfect Ability to Prove Loss, and
Observability of Self-Protection. Risk Analysis, 31(3), pp.497-512.
Olcott, J. and Sills, E. (2014). Cybersecurity: Energy Industry Mobilizing for Cyber Risk
Control. Natural Gas & Electricity, 30(10), pp.20-24.
Paté-Cornell, M., Kuypers, M., Smith, M. and Keller, P. (2017). Cyber Risk Management for
Critical Infrastructure: A Risk Analysis Model and Three Case Studies. Risk Analysis,
38(2), pp.226-241.
Peters, G., Shevchenko, P. and Cohen, R. (2018). Understanding Cyber-Risk and Cyber-
Insurance. SSRN Electronic Journal.
Peters, G., Shevchenko, P., Cohen, R. and Maurice, D. (2017). Understanding Cyber Risk and
Cyber Insurance. SSRN Electronic Journal.
Rao, N., Poole, S., Ma, C., He, F., Zhuang, J. and Yau, D. (2015). Defense of Cyber
Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models. Risk
Analysis, 36(4), pp.694-710.
Sari, A. (2018). Countrywide virtual siege in the new era of cyberwarfare: remedies from the
cyber-firewall: Seddulbahir. Journal of Cyber Security Technology, 2(1), pp.14-36.
Malhotra, Y. (2015). Stress Testing for Cyber Risks: Cyber Risk Insurance Modeling beyond
Value-at-Risk (VaR): Risk, Uncertainty, and, Profit for the Cyber Era. SSRN Electronic
Journal.
Malhotra, Y. (2017). Advancing Cyber Risk Insurance Underwriting Model Risk Management
beyond VaR to Pre-Empt and Prevent the Forthcoming Global Cyber Insurance
Crisis. SSRN Electronic Journal.
Ogut, H., Raghunathan, S. and Menon, N. (2010). Cyber Security Risk Management: Public
Policy Implications of Correlated Risk, Imperfect Ability to Prove Loss, and
Observability of Self-Protection. Risk Analysis, 31(3), pp.497-512.
Olcott, J. and Sills, E. (2014). Cybersecurity: Energy Industry Mobilizing for Cyber Risk
Control. Natural Gas & Electricity, 30(10), pp.20-24.
Paté-Cornell, M., Kuypers, M., Smith, M. and Keller, P. (2017). Cyber Risk Management for
Critical Infrastructure: A Risk Analysis Model and Three Case Studies. Risk Analysis,
38(2), pp.226-241.
Peters, G., Shevchenko, P. and Cohen, R. (2018). Understanding Cyber-Risk and Cyber-
Insurance. SSRN Electronic Journal.
Peters, G., Shevchenko, P., Cohen, R. and Maurice, D. (2017). Understanding Cyber Risk and
Cyber Insurance. SSRN Electronic Journal.
Rao, N., Poole, S., Ma, C., He, F., Zhuang, J. and Yau, D. (2015). Defense of Cyber
Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models. Risk
Analysis, 36(4), pp.694-710.
Sari, A. (2018). Countrywide virtual siege in the new era of cyberwarfare: remedies from the
cyber-firewall: Seddulbahir. Journal of Cyber Security Technology, 2(1), pp.14-36.
The Analysis of Cyber Risk: Vodafone 21
Tsoumas, B. and Gritzalis, D. (2012). Inside Cyber Warfare: Mapping the Cyber
Underworld. Computers & Security, 31(6), p.801.
Image References-
Isaca.org. (2018). COBIT Case Study: Use of COBIT 5 for ISACA Strategy Implementation.
[online] Available at: http://www.isaca.org/COBIT/Pages/COBIT-Case-Study-Use-of-COBIT-5-
for-ISACA-Strategy-Implementation.aspx?utm_referrer= [Accessed 8 Oct. 2018].
Paroda, R. (2018). Battling the Mandate: ERP & EAM Integration Styles | Blue Mountain
Quality Resources. [online] Coolblue.com. Available at:
https://www.coolblue.com/blog/industry-insights/battling-the-mandate-erp-eam-integration-
styles/ [Accessed 8 Oct. 2018].
Tsoumas, B. and Gritzalis, D. (2012). Inside Cyber Warfare: Mapping the Cyber
Underworld. Computers & Security, 31(6), p.801.
Image References-
Isaca.org. (2018). COBIT Case Study: Use of COBIT 5 for ISACA Strategy Implementation.
[online] Available at: http://www.isaca.org/COBIT/Pages/COBIT-Case-Study-Use-of-COBIT-5-
for-ISACA-Strategy-Implementation.aspx?utm_referrer= [Accessed 8 Oct. 2018].
Paroda, R. (2018). Battling the Mandate: ERP & EAM Integration Styles | Blue Mountain
Quality Resources. [online] Coolblue.com. Available at:
https://www.coolblue.com/blog/industry-insights/battling-the-mandate-erp-eam-integration-
styles/ [Accessed 8 Oct. 2018].
1 out of 22
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.