classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Can you survive a cyber attack?
July 2017, Cyber Security, Security Services & Risk Management

In today’s networked, digital world, the ability to detect, prevent and recover from a cyber-attack is critical. Cyber resilience is thus key to organisational sustainability, says Al de Brito, senior technical analyst at ContinuitySA.

Al de Brito, senior technical analyst, ContinuitySA.
Al de Brito, senior technical analyst, ContinuitySA.

“Cyber resilience – the ability to recover fully from any cyber disaster – has many moving parts. Organisations need to approach it methodically, and the Cyber Resilience Framework provides a comprehensive, flexible structure to ensure that all bases are covered,” he argues.

De Brito says that a number of trends are increasing organisations’ vulnerability to cybercrime. They include growing dependence on cloud computing, the increasing number of industrial devices connected to the Internet, the use of personal devices on corporate networks and the storage of sensitive personal information online. Data has become a valuable corporate asset, and criminal syndicates are devoting huge resources to access it.

The growing importance of ICT systems and the information they contain, and their subsequent vulnerability, has meant that responsibility for ICT governance has moved upwards to the board and C-suite.

To build a cyber resilient organisation capable of withstanding or recovering from cyber attacks, De Brito says that five inter-connected domains need to be used to guide a concerted programme. These domains or pillars make up a comprehensive Cyber Resilience Framework, each with several functions:

Identify. The aim is to develop an organisation’s understanding and management of the risks to systems, assets, data and capabilities. Key functional areas in this domain are:

• The management of all ICT assets, including personnel, devices, systems and facilities.

• Governance, which covers the creation of an information security policy, and ensuring that all legal and regulatory requirements are met.

• Assessment of the cyber risk, including the organisation’s vulnerabilities. Care must be taken to monitor the threat landscape continuously, and to understand the business impacts. The latter will assist in prioritising risk responses.

• Development of a risk management strategy, including establishing relevant processes and obtaining the buy-in of all stakeholders.

Protect. This is perhaps the most important domain area, and covers activities that will develop/ update and implement effective precautions to ensure that all critical infrastructure services can deliver their business purpose. Key functional areas are:

• Controlling access to all ICT assets and facilities. The principle of ‘least privilege’ will inform these measures.

• Implement the right technology (hardware and software) to protect systems and data.

• Motivating and educating everybody within the organisation’s value chain, including partners and suppliers, to create a solid security culture.

• Ensuring data security based on basic considerations of confidentiality, integrity and availability.

• Protection of all information – probably the most important function within the domain.

• Regular maintenance of all access control systems as well as the ICT system components to ensure protection measures are current.

Detect. In this domain, the focus is on activities to identify cybersecurity events. This includes the ability to detect suspicious activity rapidly and assess its impact. Continuous monitoring of all systems, networks and assets is essential, along with vulnerability and penetration testing. Initiatives to maintain, test and improve these detection procedures should also be in place.

Respond. This domain covers all activities required to respond to a detected cybersecurity event. Functional areas include response planning, communications, analysis, mitigation and improvement.

Recover. As important as the Protect phase, this domain covers how to plan a strategy to recover fully from a cybersecurity event. It should include continuous improvement, and communications with the public, customers and all other stakeholders.

“Cyber resilience basically determines how well your organisation can defend its vital ICT systems and assets from attack, and how quickly it can recover when an attack succeeds,” De Brito concludes. “The Framework offers a tried-and-trusted methodology for getting it right.”

For more information contact ContinuitySA, +27 (0)11 554 8050, cindy.bodenstein@continuitysa.co.za, www.continuitysa.co.za


Credit(s)
Supplied By: ContinuitySA
Tel: +27 11 554 8000
Fax: +27 11 554 8150
Email: info@continuitysa.co.za
www: www.continuitysa.co.za
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Crest launches SkillsGrid
    July 2017, News, Security Services & Risk Management
    Crest Advisory Arica has announced its appointment as certified consultants for SkillsGrid, an intelligent system designed to assist in deploying people optimally in the workplace.
  • Stallion hosts open day
    July 2017, This Week's Editor's Pick, News, Security Services & Risk Management
    Stallion Security hosted an open day in June in which clients and potential clients were invited to the company’s Johannesburg headquarters to learn more about the company and the various services it ...
  • Email is the weak link
    July 2017, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    Email remains any firm’s most important business tool and 43-trillion emails are sent annually The problem with email is that it was not designed to be secure.
  • Biggest threat to industrial systems
    July 2017, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management, Industrial (Industry)
    The biggest threat to industrial control systems since Stuxnet is Industroyer, a sophisticated and extremely dangerous malware designed to disrupt critical industrial processes.
  • Universal control of power management systems
    July 2017, IT infrastructure, Security Services & Risk Management
    The Universal Controller is installed on a site and monitors power management systems 24x7, raising an alarm as soon as it detects something is out of the norm.
  • Cybersecurity for access control
    July 2017, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security, Asset Management, EAS, RFID
    Farpointe provides cybersecurity vulnerability checklist for contactless cards and readers.
  • Biometrics at risk of hacking?
    July 2017, Access Control & Identity Management, Security Services & Risk Management
    The past few years have seen an increasing trend in the implementation of biometric clocking systems to monitor and control employees’ access to the workplace.
  • Don’t ignore the mobile threat
    July 2017, Cyber Security
    50% of all mobile and tablet devices are not protected against cybercrime and malicious threats, that equates to about 40 million entry points into corporations and company networks.
  • Data governance and the security industry
    June 2017, Technews Publishing, Cyber Security, IT infrastructure, Security Services & Risk Management
    So how does all the talk about data governance and data protection impact the security industry? Or does it?
  • Physical security is from Mars, IT is from Venus
    June 2017, Axis Communications SA, Cyber Security
    The days of separating physical and digital security are over. Today we need a collaborative approach to succeed in preventing and/or dealing with cyber attacks.
  • Card fraud stats 2016
    June 2017, This Week's Editor's Pick, Cyber Security, News, Security Services & Risk Management
    Credit card fraud increased by 13% from R331.4m in 2015 to R374.4m in 2016, with debit card fraud increasing by 3.1% for the same period.
  • Partnership to streamline metallurgical security risk management in mines
    June 2017, News, Security Services & Risk Management, Mining (Industry)
    GC Consultancy Services and Crest Advisory Africa have announced a partnership designed to improve the risk management processes of the security metallurgical standards in mines.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.