Cybersecurity operations systems management

Including including schemes for improving the efficiency of cyber security operations, for improving the protection and resilience of systems and data to cyber-attacks and the run-time adaptation of the protection and detection mechanisms of systems and processes while under attack as well as depending on risk and context of operation as well as to develop an improved understanding how cyber-attacks evolve including attacks that utilise new generations of malware, advanced evasion techniques and a fusion of computing and social engineering methods including those leveraging trust and influence in social networks.