Jaromir PITAS
Department of Military Management and Tactics, University of Defence
Brno, Czech republic
and
Vladimir NEMEC
Department of Air Transport, Czech Technical University in Prague
Prague, Czech Republic
and
Radovan Sousek
Transport Technology Unit, University of Pardubice
Pardubice, Czech Republic
ABSTRACT business and their private lives. We, as stakeholders, use these
technologies to enter the cyber environment. This means,
The objective of the stakeholders’ management is to find out however, that we also encounter the risks of the cyber
promoters who can significantly help us at problem solving in environment.
cyber security environment (including those who must be
integrated into the risk management). On one side there is a As well as we manage everyday risks connected to our daily
necessity to find opponents who can become partakers of routines (e.g. driving a car or riding a bike) we have to
generated threat and who make an effort to prevent the set purposely manage the risks connected to information and
objectives to be achieved/or to inflict a significant damage by communication technologies (both from the supplier’s and
way of found vulnerabilities of critical assets (risk scenario). customer’s points of view). However, the problem of today is to
Knowledge of the stake holders according to their interests, manage the right risks in an adequate way making use of active
objectives, influence on the objective set, and their knowledge participation of stakeholders that have corresponding abilities to
in the field of cyber management belong to the key knowledge participate in risk management.
to be able define the attitude strategies towards stake holders in
cyber security environment. During further monitoring the Companies should see risk management as a process that helps
implementation of attitude strategy it is possible to assess the create values for stakeholders using their own resources to
success of realized activities towards stake holders. optimize costs towards the realizing value (creating added
Risk management of cyber security comes out from value). On the other hand, organizations also have to know
identification and analyses of human resources assets those stakeholders that try to impede meeting the targets via
(stakeholders), that must be protected against the threat impacts generated threats. That is why the stakeholder management
of cyber security. It also comes out from identification of should be seen as a process that helps with the risk
promoters who generate the threats of cyber security (stake management; thus create required value for stakeholders.
holders – opponents). After a risk judgment the stake holders
who are crucial from the point of controlling the risk
(implementation of proposed activities to control and monitor 2. RISK MANAGEMENT AND STAKEHOLDER
risks) are identified. MANAGEMENT PROCESSES
Keywords: Asset, Human resources, Risk management, The process of risk management consists of 5 sub-processes –
Stakeholder management, Supporter, Opponent, Process, establishing the context, risk assessment, risk management,
Threat. monitoring and review, communication and consultation (see
Figure 1). Establishing the context as the first sub-process plays
an important role during the process of setting up the risk
1. INTRODUCTION management criteria based on understanding the specified goal,
defined activities and resources needed to achieve this goal.
Information and communication technologies are currently Required outputs coming out of the process of establishing the
a part of all organizations. Management without these context include the list of participants (stakeholders –
technologies is virtually impossible. People (citizens, managers, opponents) and threats, the list of evaluated assets (including
politicians) have become dependent on information and human resources – stakeholders), critical factors and
communication infrastructure when managing the society, vulnerability. The output from the risk assessment and risk
management analysis is a risk register or a risk managing plan. processes of establishing the context, risk assessment and risk
These documents contain the risk owners and human resources management. Communication and consultation sub-processes
needed to manage the risks (stakeholders). Monitoring and (parallel sub-process) serve as information transfer between
review sub-processes (parallel sub-process) is feedback, output individual sub-processes. Both sub-processes are realized by
of which are updated documents coming out of the sub- stakeholders. [1, 2]
4. CONCLUSIONS 5. REFERENCES
Cyber security is not only technical means and information. [1] ČSN ISO/IEC 27005 - Informační technologie -
Cyber security is controlled by people (stakeholders) who Bezpečnostní techniky - Řízení rizik bezpečnosti
cooperate or try to make use of the vulnerability of assets to informací.
their own benefit (to achieve their own goals). These are the
[2] ČSN ISO/IEC 31000 - Management rizik – Principy a
people who control the technical means and create information
that is shared by them. Cyber security risk management thus směrnice.
cannot be realized independently on stakeholder management [3] GRASSEOVÁ, Monika et al. Efektivní rozhodování –
because people actively participate in this process and are analyzování, rozhodování, implementace a hodnocení.
influenced by it. 1st ed. Brno: Edika. 2013. ISBN 978-80-266-0179-1.
[4] HRŮZA, Petr et al. Kybernetická bezpečnost II. 1st ed.
The process of stakeholder management must be cyclically Brno: Univerzita obrany. 2013. ISBN 978-80-7231-931-2.
repeated. It is necessary to realize the first cycle of the
stakeholder management process in a sub-process of [5] SOUŠEK, R. et al. Doprava a krizový management.
establishing the context of risk management in order to Pardubice: IJP. 2010. ISBN 978-80-86530-64-2.
recognize own assets (human resources within an organization)
as well as assets outside an organization (customers,
subcontractors). The point is to recognize the stakeholders that
we need to achieve our goal (activities realization) and protect
them. These stakeholders can significantly help with risk
identification, analysis and generation of risk management
variants. As for the first cycle we have to focus on stakeholders’
identification – actors (identification of actors). Actors can
generate threats (ability and intention) and affect the
vulnerability of assets (make use of an opportunity).