Combatting Privacy Information Warfare: A New Incident Response Framework

Abstract:

When nation-state actors weaponize information to harm individuals, communities, and societies, they erode civilian confidence in legitimate authorities, institutions, and defences to impact national security. This paper proposes new conceptual models and a methodology, the Privacy Incident Response Plan (PIRP). The methodology’s design prepares and mitigates privacy-related harms, tactics, techniques, and mitigation strategies to counter sophisticated threat actors. Using this methodology, contingency planners and incident responders can develop strategies to defend against the privacy harms of information warfare.


AUTHORS

Photo of Sean McElroy

Beacom College of Computer and Cyber Sciences Dakota State University
Madison, South Dakota, United States of America

Sean McElroy has been securing financial services solutions in the cloud for over 20 years. As a co-founder of Alkami Technology, he helped protect millions of consumers across online banking platforms. Currently, as the CSO of Lumin Digital, he is responsible for cybersecurity, risk management, and privacy programs to scale the next generation of cloud-based digital banking. McElroy is a data privacy researcher as part of Dakota State University’s Ph.D. in Cyber Defense program. He has a M.Sc. in Information Security Engineering from the SANS Technology Institute, a BBA in Management, and an MIS from the University of Oklahoma. He holds various certifications.

Photo of Dr. Lisa McKee

Beacom College of Computer and Cyber Sciences Dakota State University
Madison, South Dakota, United States of America

Dr. Lisa McKee, founding partner at American Security and Privacy, has over 20 years of industry experience. She provides services, assessments, training, program development, and leadership as a virtual Data Protection Officer (vDPO) for companies globally. Dr. McKee has a Ph.D. in Cyber Defense, with an emphasis in Privacy. She is a highly regarded privacy expert, an international speaker, and has been the keynote speaker at events. As a member of the Accredited Standards Committee X9, she provides input on industry standards and is an APMG ISACA Certified Trainer. She is passionate about privacy and volunteers on boards for several professional groups, mentors, and serves as an adjunct professor for graduate students. She has authored several publications, including a data privacy management textbook.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com