The Role of Program Managers in Ensuring Successful Cybersecurity Initiatives

Adetayo Adeyinka1

1

Publication Date: 2024/06/15

Abstract: This study examines the multifaceted role of cybersecurity program managers through a survey of 50 professionals working in this domain. As organizations increasingly rely on technology, implementing comprehensive cybersecurity programs is critical for robust defenses, yet poses unique coordination challenges across complex initiatives. Program managers play an important role in guiding these efforts from planning through implementation, but their specific skills and attributes that define success have not been well explored. The research aims to address this gap by investigating the core competencies of effective cybersecurity program managers through a survey collecting both qualitative and quantitative data on responsibilities, skills, challenges, and best practices. The results indicate strong communication abilities combined with project planning and stakeholder management skills are vital for navigating organizational dynamics within this emerging management discipline. The findings offer guidance for structuring optimal cybersecurity program functions and selection criteria to strengthen defenses through strategic delivery. Further research in this area can help develop cybersecurity programs that effectively mitigate evolving threats.

Keywords: Cybersecurity, Program Management, Project Management, Skills, Best Practices

DOI: https://doi.org/10.38124/ijisrt/IJISRT24MAY2350

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT24MAY2350.pdf

REFERENCES

  1. Boyson, S. (2014). Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems. Technovation, 34(7), 342-353.
  2. Chowdhury, N., & Gkioulos, V. (2021). Key competencies for critical infrastructure cyber-security: A systematic literature review. Information & Computer Security, 29(5), 697-723.
  3. Crane, A., & Glozer, S. (2016). Researching corporate social responsibility communication: Themes, opportunities and challenges. Journal of management studies, 53(7), 1223-1252.
  4. Department of Homeland Security, (. (2009). A roadmap for cybersecurity research.
  5. Donaldson, S., Siegel, S., Williams, C. K., & Aslam, A. (2015). Enterprise cybersecurity: how to build a successful cyberdefense program against advanced threats. Apress.
  6. Larson, E., & Gray, C. (2014). Project Management: The Managerial Process 6e. McGraw Hill.
  7. Morsing, M., & Schultz, M. (2006). Corporate social responsibility communication: stakeholder information, response and involvement strategies. Business ethics: A European review, 15(4), 323-338.
  8. Moschovitis, C. (2018). Cybersecurity program development for business: the essential planning guide. John Wiley & Sons.
  9. Romero, L. D. (2020). Security Architecture Components Cybersecurity Specialists Need to Establish a Limited-Budget Cybersecurity Program: A Qualitative Study. Doctoral dissertation, Colorado Technical University.
  10. Staheli, D., Yu, T., Crouser, R. J., Damodaran, S., Nam, K., O'Gwynn, D., . . . Harrison, L. (2014). Visualization evaluation for cyber security: Trends and future directions. Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 49-56.
  11. Todorovic, R. (2023). A Framework for Leveraging Artificial Intelligence in Project Management. Doctoral dissertation.
  12. Trim, P., & Lee, Y. I. (2016). Cyber security management: a governance, risk and compliance framework. Routledge.