no code implementations • 27 Oct 2022 • Kevin Hu, Retsef Levi, Raphael Yahalom, El Ghali Zerhouni
The paper leverages outside-in cyber risk scores that aim to capture the quality of the enterprise internal cybersecurity management, but augment these with supply chain features that are inspired by observed third party cyberattack scenarios, as well as concepts from network science research.