Advertisment

Resilience also means recovery and restoration

Cyber resilience goes beyond prevention—focus on incident response, data backup, and business continuity to recover swiftly from inevitable cyber threats.

author-image
DQI Bureau
New Update
CYBER
Listen to this article
0.75x 1x 1.5x
00:00 / 00:00

With a cyberattack occurring every 39 seconds, building cyber resilience is never far from our thoughts. Threat intelligence and detection, zero-trust security, and regulations are all striving to predict and catch incidents early. However cyber threats are evolving as fast, maybe faster, than security technologies, challenging them at every step, and frequently winning.  Hence cyber resilience cannot only be about stopping attacks at the door; organisations which are built-to-last  should focus equally on responding, recovering and rebuilding after the inevitable disaster. With multiple industries considered as critical to national/global security and stability, there has been an increased focus from national governments and regulators to bring in systems and practices to improve cyber resilience, backed by accountability at board and exce-level. This has in fact gained more traction also due to the geo-political developments we keep seeing.

Advertisment

This piece highlights three essentials in a robust recovery strategy:

Incident Response

An incident response mechanism enables organisations to respond swiftly to cybersecurity attacks by listing the protocols and procedures to identify, investigate and address cyber events in real-time. Since every minute counts, security teams need to act with speed to block the attacker from causing further damage. A comprehensive incident response plan (IRP) enables this through a well-defined and maintained call-tree by assigning clear roles and responsibilities to the incident response team, for example, who should be alerted first in the event of an attack, what they should do immediately thereafter, and which leader will provide sponsorship. A business impact analysis and cybersecurity maturity assessment identifies among other things, the key assets (crown jewels) to be protected, and the reporting, compliance and insurance requirements that must be taken care of through a risk based approach

Advertisment

The list of attack vectors is growing day-by-day. By outlining different attack scenarios and the right response for each, an IRP helps organisations prioritise their actions based on the specific threat they are encountering; it also trains their focus on the most  important threats in their business – for example, OT (operational technology) risks in manufacturing, or phishing in financial  services. An IRP also brings clarity to enterprises’ understanding of security incidents to accelerate response. But to be effective against evolving threats, it needs to be revisited, modified and improved regularly; also required is a coordinated effort across functions, from IT to legal to communications.

Data backup 

In 2024, the global average cost of a data breach reached an all-time high of $4.88 million.

Advertisment

One contributor is weak data backup practices: only 41 percent of enterprises did a daily backup, said a 2020 report; another report says 60 percent of data backups fail in times of need and 50  percent of data recovery efforts are found wanting. In a darkly humorous twist, 31st March is designated World Backup Day, perhaps as a timely reminder to guard against cyber pranks on April 1st.

But this is no laughing matter.  Alongside incident response, data backup (and regular testing) determines how fast an organisation can get back to business after being cyberattacked. Specifically, sound data backup practices minimise downtime by quickly restoring data and operations to normalcy after a breach,  ransomware attack (organisations can fall back on the copy and avoid paying ransom), or wrong deletion; they are also required for regulatory compliance, balancing across security and privacy expectations.

Business continuity 

Advertisment

While nearly 90 percent of organisations list resilience among their top priorities, only 70 percent are confident that they can handle disruptions. A business continuity plan (BCP) improves an enterprise’s ability to maintain essential operations, or at least rebuild them quickly, when struck by a disruptive force of any kind, including cyberattack. Like an IRP, a BCP provides clear processes and procedures, as well as roles and responsibilities, to keep the business running during an adverse event, and make a quick recovery; it is tightly coupled with the disaster recovery plan, which is aimed at getting IT systems and services up and running after an incident.

With a scope that may also include maintenance of communication, data protection, and employee safety, a comprehensive BCP reduces downtime, and financial and reputational loss to the organisation. Accordingly, its components include risk assessment, communication plans, backup and recovery strategies, and a program for testing and updating protocols.

Incident response, data backup and business continuity are key aspects of cyber resilience. However, they should be viewed through a long-term perspective to remain effective against evolving cybersecurity threats. 

Advertisment

Authored by Brijesh Balakrishnan, Vice President & Global Head of CyberSecurity Practice, Infosys

Advertisment