Interested in hearing how folks define “cyber resilience” for their current org – is it mainly about minimizing risk/potential losses for you, minimizing MTTR, or something else altogether?

3.9k views27 Upvotes16 Comments
Sort By:
Oldest
Director of IT in Educationa year ago
From an high level perspective, I look at cyber resilience from the lens of three lines of defense, management controls, risk management, and internal audit. Management controls must include the monitoring process (cybersecurity framework (NIST), Identify, protect, detect,respond and recover). Risk management, aggregate risks across the entire organization and prioritized risk. The third line of defense is internal/external audits, which are independent assurance that evaluates the overall process of cyber risk governance (resilience) for the entire organization. It ensures that the organization’s internal control framework is adequate for dealing with the risks the organization faces.
2
Head of Cyber Security in Manufacturinga year ago
Biggest risk reduction you get out of cyber hygiene/life cycle management, mixed with strong identity and sse for prevention/redirection to official acceptable tools and sandboxing in all file transfer/sharing tools plus edr/mdr
1
Senior Information Security Manager in Softwarea year ago
Cyber resilience is just a fancy way of saying DR/BCP.

It is defined as: the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.

So it is just a matter of building IT systems so they can deal with things like downtime, ransomware, natural disasters, hardware/software failures and more.
3 1 Reply
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Director of IT in Educationa year ago

NIST - The ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.
Source(s):
NIST SP 800-172

2
Director of Network Transformationa year ago
Good question.  Leading a discussion on this topic tonight here in Portland Oregon.  To me it is about putting together the foundations of a long term security program from a 360 perspective.  Understand the business, learn how a $ is made, determine what you must protect and then create a program based on that.  If you don't really know what to protect, how can you recover?  And are you protecting/recovering the right part of the business?  All that said, will be interesting to see what the group has to say.  
3 1 Reply
Director of IT in Educationa year ago

I agree, and your program must involve categorization of your systems based on (information types and information systems) and allocate appropriate protection on the system assigned category (low, moderate, high).

1
CISO in Healthcare and Biotecha year ago
Cyber resilience is an organization's ability to resist, respond to, and recover from cyber threats and incidents, combining risk management, cybersecurity, business continuity, and organizational resilience. It's not only about preventing and defending against cyber attacks but also maintaining the integrity, confidentiality, and availability of data, as well as the capacity to minimize the impact of successful attacks, recover quickly, and adapt by learning from these incidents. Cyber resilience aims to ensure the continuity of operations and minimize disruption and damage to the organization's reputation.
1

Content you might like

TCO19%

Pricing26%

Integrations21%

Alignment with Cloud Provider7%

Security10%

Alignment with Existing IT Skills4%

Product / Feature Set7%

Vendor Relationship / Reputation

Other (comment)

View Results
5.7k views3 Upvotes1 Comment
VP of IT in Retail3 days ago
My previous organization implemented a strict one-strike policy for lost or damaged devices. While the first incident was considered an accident, repeat offenders were required to reimburse the company for the lost or damaged ...read more
82 views1 Comment
Information Security Analyst in Manufacturing6 days ago
I have experience with a couple of different phishing simulation solutions, from the earlier Wombat phishing simulation platform (now Proofpoint ThreatSim) to KnowBe4.  Wombat was always a good solution, but I haven't used ...read more
1 Reply
314 views2 Comments

No Increase16%

1-5% increase47%

6-25% increase24%

26-50% increase6%

51-75% increase1%

76%+1%

Other2%

View Results
1.7k views1 Upvote
IT Manager in Constructiona month ago
Hello,
the topic is so broad, what are you focused on?
Read More Comments
4.8k views2 Upvotes5 Comments