Eduardo Gelbstein

Dr. Eduardo Gelbstein, Adjunct Professor, Webster University Geneva, former advisor to the United Nations Board of (external) Auditors, former Director, United Nations International Computing Centre and I.T. Strategy Manager, British Railways Network South East. Author of numerous articles and publications on Information Security and auditing and frequent speaker at international conferences on security and governance in Europe, the Middle East and Africa.

Publications

Attackers: Internal and External
Eduardo Gelbstein. © 2014. 18 pages.
Of the three groups of components of information security – tools, processes, and people- the last one should be considered as the weakest link. People range from the tired or...
Designing a Security Audit Plan for a Critical Information Infrastructure (CII)
Eduardo E. Gelbstein. © 2013. 24 pages.
Critical Information Infrastructure Infrastructures (CII) have been recognized as potential targets for cyber-attacks since the late 1990s and many have already been successfully...
Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
Pauline C. Reich, Eduardo Gelbstein. © 2012. 496 pages.
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive...
The Security Practitioners’ Perspective
Eduardo Gelbstein. © 2012. 16 pages.
This chapter reviews the assumptions on which this section of the book is based, explores the irreversible dependency of society on information and communications technologies...
Economic, Political and Social Threats in the Information Age
Eduardo Gelbstein, Marcus Wuest, Stephen Fridakis. © 2012. 14 pages.
There does not appear to be a common framework for quantifying the impact of information security business disruption events resulting in the loss of availability...
Attackers: Internal and External
Eduardo Gelbstein. © 2012. 18 pages.
Of the three groups of components of information security – tools, processes, and people- the last one should be considered as the weakest link. People range from the tired or...
Threats, Vulnerability, Uncertainty and Information Risk
Eduardo Gelbstein. © 2012. 15 pages.
Two other matters complicate this topic: the lack of statistical data relating to cyber-attacks and the vulnerabilities inherent in hardware, software and networks, many of which...
ICT and Security Governance: Doing the Right Things the Right Way (and Well Enough)
Eduardo Gelbstein, Tom Kellermann. © 2012. 18 pages.
This chapter examines in summary form those standards and best practices that have been widely accepted as being the “right things the right way” and also discusses how to...
Concerns About What Will Happen Next: Should These Things Keep You Awake at Night?
Eduardo Gelbstein. © 2012. 20 pages.
This chapter discusses vulnerabilities that should be considered by decision makers as they could be seen as the soft underbelly of a society that has an irreversible and deep...