Cyber-resilience: the new name for cybersecurity?

[Title] Cyber-resilience: the new name for cybersecurity? | Stormshield

Faced with the growing number of vulnerabilities and the increasing complexity of cyberattacks, the question is no longer whether your organisation will be attacked, but rather when... And, when under attack, whether it will be able to continue its work unimpeded. This is what cyber-resilience is all about. Let’s take a more detailed look.

Acknowledging the vulnerability of cyberspace...

For nearly twenty years, we have been using the term cybersecurity (and then cyberprotection), to refer to all the ways in which the company’s assets can be protected.

However, the landscape has changed a lot over this period. The Internet, which is becoming ever faster, has become more democratic and the digital transformation is permeating all organisations. These organisations are at greater systemic risk because of their dependence on many different service providers.

Every day, the discovery of new vulnerabilities makes this ecosystem more and more (cyber) fragile. Exhaustive monitoring would require a level of vigilance that is too costly in terms of human and financial resources. So, does this mean that cyberattacks are inevitable? And does this pave the way for a new paradigm, that of cyber-resilience.

...while not becoming resigned to our fate as a result

Far from being fatalistic, this “resilient” approach aims to act to minimize the impact of a cyberattack on the company’s operations. Cybersecurity remains an essential but integrated dimension in a genuinely systemic cyber-resilience approach. The aim is to ensure that the company can continue to operate, even in impaired mode, following a malfunction, failure or attack. This business continuity is ensured by five mainstays: identify, protect, detect, respond and recover.

The first steps towards creating a resilient cyber organisation

Becoming cyber-resilient is not an easy matter, however. First of all, the acknowledgement of the inevitability of a digital emergency must be shared and accepted within the company. This understanding of the environment is particularly important at the executive committee level, as it is the executive committee’s responsibility to allocate the necessary resources for the implementation of cyber-resilience. In addition to basic actions (such as performing regular data backups and storing them in environments disconnected from the company’s network), there are a number of possible approaches that should be considered.

> Check regulatory compliance

For a start, it is advisable to check the organisation’s regulatory compliance and to strengthen its existing Business Continuity Plan (BCP) with a cyber component.

A word of caution: this is not a one-off process – cyber-resilience mechanisms must be updated and tested regularly. On the one hand, threats are constantly changing and on the other, the company is also evolving: a new business project can, for example, increase cyber risk and, if it has not been identified as such, undermine cyber-resilience efforts.

> Take into account the human dimension

The human dimension is crucial. In addition to the technological choices focused on security by design and automation, the company must be able to count on teams that are aware and responsive. So as to avoid being forced to go back to working using pen and paper!

> Ensure that partners are accountable

It is also necessary to work with the right partners, who must also be made aware of the digital challenge. Or even better, they need to be made accountable: in the spirit of the General Data Protection Regulation (GDPR), the idea would be to formalise contractual arrangements for sharing the responsibility for cyber-resilience with their supply chain.

> Promote information sharing

Finally, it is essential to think about communication beyond what is legally required in the event of a cyberattack. It is not merely a matter of following the latest information from experts (like ANSSI and CERT in France), but also of engaging in exchanges with one’s peers. Talking about these topics within one’s ecosystem, investors and even customers helps to build trust. Today, being a well prepared company that invests in its cybersecurity and cyber-resilience is of real value.

 

As with any crisis management process, cyber-resilience must be implemented before the incidents it is intended to address occur. In line with a digital environment where more and more data is being exchanged every day, this new vision is based on a systemic approach, involving general awareness, information sharing between stakeholders and the selection of the right cybersecurity tools, which are essential as the first line of protection.

Share on

In addition to an organisational response, having the right equipment will help you to be cyber-resilient. Stormshield Endpoint Security monitors and audits all physical, logical and network access to terminals (USB devices, sharing, wireless network, etc.) and automatically adjusts authorised uses based on the context (at the workplace, on the move, after administrator rights have been activated, etc.).
Becoming a cyber-resilient company does not prevent you from seeking an ally to help you protect your networks. Stormshield Network Security protects your company’s data and ensures that your applications are installed securely.

About the author

mm
Florian Bonnet
Director of Product Management, Stormshield

With over 25 years of IT experience in Research & Development, Florian joined Stormshield in October 2018 as Product Manager Director. As someone who spent many years in the field on the front lines, he promotes that same team spirit on the Stormshield Product Manager teams. And whether with his teams or outside of work, he emphasises the strong values that unite hard work and fun: respect, team spirit, and dedication.