Abstract
Nowadays, the security threats faced by society in general, and organizations in particular, are reaching unprecedented highs in terms of complexity and sophistication. Organizations must face up to new challenges in order to protect their assets (e.g., personnel, goods, information, or reputation, among others), so they need new solutions for the immediate future to achieve their business objectives efficiently and effectively. Right now, corporate security and cybersecurity within organizations are dependent on themselves and complementary at the same time, so the coordination of their activities is crucial. This joint action for a comprehensive security requires a training and educational process that provides necessary knowledge and skills. This article highlights the limitations of the current master's degrees in cybersecurity from the perspective of comprehensive security and proposes a new master's degree focused on it as a solution, which takes advantage of the skills of current degrees, and is aligned with the needs of the European Higher Education Area. This master’s degree promotes sustainability through efficiency and rationalization on the general asset protection process, improving the security culture inside the organization, reducing the number of security incidents, and increasing the reputation and image of the organization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Data Never Sleeps 8.0: https://www.domo.com/learn/data-never-sleeps-8. Accessed 18 May 2021
World Economic Forum: The global risks report 2021. http://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2021.pdf. Accessed 18 May 2021
Kledt, F., Evers, P., Benson, D.: Section II.2 - Organizational Complexity. In: Contemporary Theory and Practice of Organizations. Part I. Understanding the Organization. Ibidem-Verlag, Stuttgart, pp. 95–116 (2016). https://cup.columbia.edu/book/contemporary-theory-and-practice-of-organizations/9783838267470
Rahman, S.M., Donahue, S.E.: Convergence of corporate and information security. Int. J. Comput. Sci. Inform. Sec. 7(1), 63–68 (2010). https://arxiv.org/abs/1002.1950v1
Cabric, M.: From Corporate Security to Commercial Force: A Business Leader's Guide to Security Economics. Butterworth-Heinemann, Boston (2017). https://www.sciencedirect.com/book/9780128051498/from-corporate-security-to-commercial-force
Cabric, M.: Corporate Security Management. Challenges, Risks, and Strategies. Butterworth-Heinemann, Boston (2015). https://doi.org/10.1016/C2014-0-04011-7
Kinslow, J.: Physical and IT security: the case for convergence. J. Sec. Educ. 75–91 (2006). https://doi.org/10.1300/j460v02n01_06
Jovanovic, M., Burbiel, J.: The evolving concept of security: a critical evaluation across four dimensions. In: Proceedings of the 9th Security Research Conference Future Security, pp. 502–506 (2014). https://www.researchgate.net/publication/278033393_THE_EVOLVING_CONCEPT_OF_SECURITY_A_CRITICAL_EVALUATION_ACROSS_FOUR_DIMENSIONS
Purpura, P.P.: Security: An Introduction. CRC Press, Boca Raton (2016). https://doi.org/10.1201/9781439894569
Halibozek, E.P., Kovacich, G.L.: The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, 2nd edn. Butterworth-Heinemann, Boston (2017). https://www.sciencedirect.com/book/9780128046043/the-managers-handbook-for-corporate-security\#book-info
Stackpole, B., Oksendahl, E.: Security Strategy: From Requirements to Reality. Auerbach Publications, New York (2010). https://doi.org/10.1201/EBK1439827338
Masters Programs in Cybersecurity: https://www.masterstudies.com/Masters-Degree/Cyber-Security/. Accessed 18 May 2021
Masters Programs in Security: https://www.masterstudies.com/Masters-Degree/Security/. Accessed 18 May 2021
Masters Programs in Safety Management: https://www.masterstudies.com/Masters-Degree/Safety-Management/. Accessed 18 May 2021
ANECA, Listado de titulaciones: https://srv.aneca.es/ListadoTitulos/busqueda-titulaciones. Accessed 7 Jun 2021
ISACA’s Certified Information Security Manager – CISM. https://www.isaca.org/credentialing/cism. Accessed 18 May 2021
ISC2’s Certified Information Systems Security Professional – CISSP: https://www.isc2.org/Certifications/CISSP. Accessed 18 May 2021
Gartner’s Top 10 Security Predictions 2016: https://www.gartner.com/smarterwithgartner/top-10-security-predictions-2016/. Accessed 18 May 2021
Microsoft Corporation, Accenture LLP: Future of physical security whitepaper-Extending converged digital capabilities across logical & physical environments, 2018. https://www.accenture.com/_acnmedia/PDF-100/Accenture-Future-of-Physical-Security-Whitepaper.pdf
Acknowledgement
This research has been partially supported by the Department of Information and Communication Technologies (TIC) at Institute of Physical and Information Technologies (ITEFI), Spanish National Research Council (CSIC).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Espinosa García, J., Encinas, L.H., Domínguez, A.P. (2022). Challenges and Competences in Master Degrees from a Comprehensive Security Perspective. In: Gude Prego, J.J., de la Puerta, J.G., García Bringas, P., Quintián, H., Corchado, E. (eds) 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400. Springer, Cham. https://doi.org/10.1007/978-3-030-87872-6_40
Download citation
DOI: https://doi.org/10.1007/978-3-030-87872-6_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-87871-9
Online ISBN: 978-3-030-87872-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)