{"id":1836,"date":"2019-07-20T03:41:42","date_gmt":"2019-07-20T03:41:42","guid":{"rendered":"http:\/\/kusuaks7\/?p=1441"},"modified":"2023-08-09T10:27:46","modified_gmt":"2023-08-09T10:27:46","slug":"what-cyber-resilience-is-not-about","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/what-cyber-resilience-is-not-about\/","title":{"rendered":"What Cyber Resilience is Not About \u2026"},"content":{"rendered":"<h3 style=\"color: #aaa; font-style: italic;\">Cyber resilience must not be used to legitimise window-dressing practices around cyber security<\/h3>\n<p>Although the theme is gaining momentum, there is a certain amount of confusion around what cyber resilience really means for organisations.<\/p>\n<p>For many, it is just another piece of consultant jargon: An abstract managerial concept with little real-life substance or meaning.<\/p>\n<p>As a matter of fact, it is very real and rooted in the \u201c<a href=\"https:\/\/corixpartners.com\/cyber-security-when-not-if\/\" rel=\"noopener\">When-Not-If<\/a>\u201d paradigm around cyber attacks which is changing completely the dynamics around cyber security in many firms.<\/p>\n<p>At the heart of cyber resilience lies a real application of \u201cdefence in depth\u201d principles which have been well established for decades: Acting at preventative, detective, mitigative AND reactive levels, AND across the real breadth of the enterprise \u2013 functionally and geographically. It is about the enterprise being enabled by the use of data and technology, whilst remaining protected from active threats.<\/p>\n<p>It requires managerial and governance practices to be active across corporate silos and the supply chain (once again, functionally and geographically), and it cannot be dissociated from a broader approach to operational and corporate resilience.<\/p>\n<p>It is hard to deliver at scale and presents many large organisations with significant cultural challenges. So the temptation is high for many to over simplify it and to focus only on alleged quick wins.<\/p>\n<p>Of course, the \u201cWhen-Not-If\u201d paradigm implies that security breaches are unavoidable. But it does not represent a licence to ignore all protective, detective and mitigative measures to focus only on the reactive ones. This is the type of simplistic approach to \u201cresilience\u201d which may put a few ticks in audit or compliance boxes, but in the long term, can only aggravate security postures and lead to regulatory issues, in particular in the face of a worldwide tightening of regulations around the protection of personal data.<\/p>\n<p>\u201cCyber resilience\u201d cannot be limited to an annual desktop exercise with board members and corporate functions during which they simulate how to react to a cyber-attack, in order to minimise the impact on the share price, media coverage or the reactions of customers.<\/p>\n<p>All those factors are important, but \u201ccyber resilience\u201d must not turn into an excuse to legitimise a top-down window-dressing culture around cyber security practices.<\/p>\n<p>Corporate resilience is the ability of an organisation to continue operating in the face of disruptive events, and to return to normal operations over time. It implies a deep knowledge of operational processes, their integration and their inter-dependencies. It also implies a deep knowledge of the supply chain and its actors.<\/p>\n<p>To operate efficiently in disrupted situations, it also requires a collaborative and positive culture, which needs to be created and fostered from the top down.<\/p>\n<p>All this is even more acute in cyber resilience scenarios, due to their relative novelty, the speed at which the organisation often needs to react and the technical complexity which may be involved.<\/p>\n<p>Instead of being treated as another box checking exercise and a quick win, cyber resilience must be embedded into the right corporate structures and used to channel a different <a href=\"https:\/\/corixpartners.com\/developing-organisational-cyber-resilience-a-core-process-for-digital-transformation-blog\/\" rel=\"noopener\">culture<\/a> from the top down around cyber security:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>A culture where cyber security (the need to protect the business from cyber threats) and the protection of individuals\u2019 privacy are not just matters of risk management or necessary evils imposed by compliance and regulations, but <a href=\"https:\/\/corixpartners.com\/cyber-security-governance-ethics\/\" rel=\"noopener\">key business concepts<\/a> and \u2013 increasingly \u2013matters of competitive advantage and of corporate social responsibility.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>A culture which fosters the transversal nature of many security problems in large firms (looking across corporate silos, and certainly much beyond the mere technology horizon), because the security measures needed to protect the firm are transversal in nature: Their execution is the only factor that will protect the business and it requires transversal capabilities<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Finally, a culture rooted in transparency around security breaches because trust is the cornerstone of the digital economy and transparency is its foundation<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cyber resilience must not be used to legitimise window-dressing practices around cyber security Although the theme is gaining momentum, there is a certain amount of confusion around what cyber resilience really means for organisations. For many, it is just another piece of consultant jargon: An abstract managerial concept with little real-life substance or meaning. As<\/p>\n","protected":false},"author":529,"featured_media":3387,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[3178],"class_list":["post-1836","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":3178,"user_id":529,"is_guest":0,"slug":"jean-christophe-gaillard","display_name":"Jean-Christophe Gaillard","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_b55e5afa-fb86-428a-a054-3be0451df2a4-150x150.jpg","user_url":"https:\/\/www.corixpartners.com","last_name":"Gaillard","first_name":"Jean-Christophe","job_title":"","description":"Jean-Christophe Gaillard\u00a0is Managing Director and Founder at Corix Partners. He is also a Non-Executive Director with\u00a0<a href=\"https:\/\/www.stratasecurity.co.uk\/\">Strata Security Solutions<\/a>, a specialized cybersecurity firm. He has been co-president of the Cyber Security group of the\u00a0<a href=\"https:\/\/www.telecom-paristech.org\/\">Telecom Paris Tech alumni association<\/a>\u00a0since May 2016. He is the author of \u201c<a href=\"http:\/\/www.blurb.co.uk\/b\/9015902-cyber-security-the-lost-decade-2018-edition\" target=\"_blank\" rel=\"noopener\">Cyber Security: The Lost Decade<\/a>\u00a0\u2013 A Security Governance Handbook for the CISO and the CIO\u201d, He contributes regularly to\u00a0<a href=\"http:\/\/www.thedigitaltransformationpeople.com\/authors\/jc-gaillard\">The Digital Transformation People<\/a>,\u00a0<a href=\"http:\/\/www.business2community.com\/author\/jc-gaillard\">Business 2 Community<\/a>, and\u00a0<a href=\"https:\/\/www.iotforall.com\/\">IoTforAll<\/a>\u00a0platforms, as well as the\u00a0<a href=\"https:\/\/www.thebtn.tv\/\">Business Transformation Network<\/a>. He is an expert contributor on the\u00a0<a href=\"https:\/\/ciowatercooler.co.uk\/members\/jean-christophe-gaillard\/activity\/\">CIO Water Cooler<\/a>\u00a0and has previously published articles on\u00a0<a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/bridging-gap-security-it-operations\/\">InfoSecurity<\/a>\u00a0Magazine, \u00a0<a href=\"http:\/\/www.computing.co.uk\/ctg\/opinion\/2396800\/how-to-achieve-effective-cyber-security-in-a-hyperconnected-world\">Computing<\/a>, the C-Suite.co.uk,\u00a0<a href=\"http:\/\/www.informationsecuritybuzz.com\/?s=gaillard\">Info Sec Buzz<\/a>\u00a0and the\u00a0<a href=\"http:\/\/www.director.co.uk\/blog-cyber-insurance-what-do-you-think-youre-buying-20323\/\">IoD Director<\/a>\u00a0websites."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/529"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=1836"}],"version-history":[{"count":3,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1836\/revisions"}],"predecessor-version":[{"id":30119,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1836\/revisions\/30119"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3387"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=1836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=1836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=1836"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=1836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}