Content of Figures
1 Executive Summary
Business continuity is the ability of an organization to maintain critical business functions during, as well as after, a disaster has occurred. Tradi ...Login Free 30-day Select Access Get full Access
- Cyber attacks and breaches of cyber defenses have become inevitable as attackers become increasingly well organized and funded, often with nation st ...
3 Cyber threats are becoming more destructive
The nature of cyber attacks is continually changing, but in recent years the most notable trend is that attacks are becoming increasingly destructive, ...Login Free 30-day Select Access Get full Access
4 Cyber attacks now a top risk to Business Continuity
Businesses need to adjust their approach to business continuity planning in the light of the fact that as business operations become increasingly depe ...Login Free 30-day Select Access Get full Access
4.1 Cyber Security and Business Continuity integration
A more integrated approach to Cyber Security and Business Continuity will ensure that IT technology and security investment/planning focus on resilien ...Login Free 30-day Select Access Get full Access
4.2 The Role of Privileged Access Management in Security and Continuity
NotPeya also highlighted that Privileged Access Management (PAM) is extremely important in the context of business continuity, underlining the importa ...Login Free 30-day Select Access Get full Access
4.3 The Role of People and Processes in Security and Continuity
Technology, however, is only one aspect of security/continuity. Policy, process, organization, and people need equal, if not greater attention. Everyo ...Login Free 30-day Select Access Get full Access
4.4 The Role of DevSecOps in Security and Continuity
This approach will also encourage and support the creation and maintenance of a DevSecOps environment, where security and continuity are integral to t ...Login Free 30-day Select Access Get full Access
4.5 The Role of Threat Detection and Response in Security and Continuity
Destructive cyber attacks underline the importance of detecting malicious activity as quickly as possible and launching an immediate response to ensur ...Login Free 30-day Select Access Get full Access
4.6 The Role of Artificial Intelligence in Security and Continuity
Organizations should evaluate technologies that are supported by AI (artificial intelligence) and ML to bolster security/continuity capability through ...Login Free 30-day Select Access Get full Access
In the digital era, the increasing reliance of IT and the increasingly destructive and disruptive impact of cyber attacks means businesses need to ado ...Login Free 30-day Select Access Get full Access
- Restructure BCM and cyber security teams to ensure greater integration and collaboration in terms of operations, processes, procedures, responsibili ...
- Plan for the worst in terms of detection, response, recovery and improvement of both security and continuity capabilities;
- Ensure data backups are ...
- Implement and enforce stringent Privileged Access Management controls.
- Enforce a policy of least privilege and consider allocating admin privilege ...
6 Related Research
Leadership Compass: Infrastructure as a Service - Global Providers - 80035
Leadership Brief: Responding to Cyber Incidents - 80209
Leadership Brief: Defending Against Ransomware - 80235
Advisory Note: Understanding and Countering Ransomware - 70282
Executive View: Akamai Zero Trust Security - 80054
Executive View: Micro Focus® Data Protector - 80193
Advisory Note: Maturity Level Matrix for Cyber Security - 72555
Buyer's Guide: Hybrid Cloud Services - 72562
Advisory Note: Security Organization Governance and the Cloud - 72564
Advisory Note: Cloud Services and Security - 72561
Advisory Note: How to Assure Cloud Services - 72563