Can you survive a cyber attack?

July 2017 Information Security, Security Services & Risk Management

In today’s networked, digital world, the ability to detect, prevent and recover from a cyber-attack is critical. Cyber resilience is thus key to organisational sustainability, says Al de Brito, senior technical analyst at ContinuitySA.

Al de Brito, senior technical analyst, ContinuitySA.
Al de Brito, senior technical analyst, ContinuitySA.

“Cyber resilience – the ability to recover fully from any cyber disaster – has many moving parts. Organisations need to approach it methodically, and the Cyber Resilience Framework provides a comprehensive, flexible structure to ensure that all bases are covered,” he argues.

De Brito says that a number of trends are increasing organisations’ vulnerability to cybercrime. They include growing dependence on cloud computing, the increasing number of industrial devices connected to the Internet, the use of personal devices on corporate networks and the storage of sensitive personal information online. Data has become a valuable corporate asset, and criminal syndicates are devoting huge resources to access it.

The growing importance of ICT systems and the information they contain, and their subsequent vulnerability, has meant that responsibility for ICT governance has moved upwards to the board and C-suite.

To build a cyber resilient organisation capable of withstanding or recovering from cyber attacks, De Brito says that five inter-connected domains need to be used to guide a concerted programme. These domains or pillars make up a comprehensive Cyber Resilience Framework, each with several functions:

Identify. The aim is to develop an organisation’s understanding and management of the risks to systems, assets, data and capabilities. Key functional areas in this domain are:

• The management of all ICT assets, including personnel, devices, systems and facilities.

• Governance, which covers the creation of an information security policy, and ensuring that all legal and regulatory requirements are met.

• Assessment of the cyber risk, including the organisation’s vulnerabilities. Care must be taken to monitor the threat landscape continuously, and to understand the business impacts. The latter will assist in prioritising risk responses.

• Development of a risk management strategy, including establishing relevant processes and obtaining the buy-in of all stakeholders.

Protect. This is perhaps the most important domain area, and covers activities that will develop/ update and implement effective precautions to ensure that all critical infrastructure services can deliver their business purpose. Key functional areas are:

• Controlling access to all ICT assets and facilities. The principle of ‘least privilege’ will inform these measures.

• Implement the right technology (hardware and software) to protect systems and data.

• Motivating and educating everybody within the organisation’s value chain, including partners and suppliers, to create a solid security culture.

• Ensuring data security based on basic considerations of confidentiality, integrity and availability.

• Protection of all information – probably the most important function within the domain.

• Regular maintenance of all access control systems as well as the ICT system components to ensure protection measures are current.

Detect. In this domain, the focus is on activities to identify cybersecurity events. This includes the ability to detect suspicious activity rapidly and assess its impact. Continuous monitoring of all systems, networks and assets is essential, along with vulnerability and penetration testing. Initiatives to maintain, test and improve these detection procedures should also be in place.

Respond. This domain covers all activities required to respond to a detected cybersecurity event. Functional areas include response planning, communications, analysis, mitigation and improvement.

Recover. As important as the Protect phase, this domain covers how to plan a strategy to recover fully from a cybersecurity event. It should include continuous improvement, and communications with the public, customers and all other stakeholders.

“Cyber resilience basically determines how well your organisation can defend its vital ICT systems and assets from attack, and how quickly it can recover when an attack succeeds,” De Brito concludes. “The Framework offers a tried-and-trusted methodology for getting it right.”

For more information contact ContinuitySA, +27 (0)11 554 8050, cindy.bodenstein@continuitysa.co.za, www.continuitysa.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
What you can expect from digital identity in 2024
Access Control & Identity Management Security Services & Risk Management
As biometric identity becomes a central tenet in secure access to finance, government, telecommunications, healthcare services and more, 2024 is expected to be a year where biometrics evolve and important regulatory conversations occur.

Read more...
Prepare for cyber-physical attacks
Gallagher Information Security Access Control & Identity Management
As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity.

Read more...
Zero Trust and user fatigue
Access Control & Identity Management Information Security
Paul Meyer, Security Solutions Executive, iOCO OpenText, says implementing Zero Trust and enforcing it can create user fatigue, which only leads to carelessness and a couldn’t care attitude.

Read more...
Passwordless, unphishable web browsers
Access Control & Identity Management Information Security
Passkey technology is proving to be an easily deployed way to bring unphishable, biometric-based security to browsers; making identification and authentication much more secure and reliable for all parties.

Read more...
Time is of the essence
Information Security
Ransomware attacks are becoming increasingly common. Yet, many individuals and organisations still lack a clear understanding of how these attacks occur and what can be done to secure their data.

Read more...
All aspects of data protection
Technews Publishing Editor's Choice Information Security Infrastructure AI & Data Analytics
SMART Security Solutions spoke to Kate Mollett, Senior Director, Commvault Africa, about the company and its evolution from a backup specialist to a full data protection specialist, as well as the latest announcements from the company.

Read more...
The song remains the same
Sophos Information Security
Sophos report found that telemetry logs were missing in nearly 42% of the attack cases studied. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide their tracks.

Read more...
How hackers exploit our vulnerabilities
Information Security Risk Management & Resilience
Distractions, multi-tasking, and emotional responses increase individuals’ vulnerability to social engineering, manipulation, and various forms of digital attacks; 74% of all data breaches included a human element.

Read more...