9 steps for IT leaders to chart a path toward cyber resilience
We undertook this study to benchmark how IT decision makers perceive the current state of IT risk, and what actions—across the four pillars of cyber resilience—their organizations take to mitigate those risks.
Anticipate: Actions to assess and understand IT risk posture to better mitigate potential threats and navigate potential regulations.
Protect: Actions to harden defenses of IT assets to ensure they remain protected from adverse events.
Withstand: Actions to handle disruptions and reduce the impact.
Recover: Actions to help mitigate the impact after any disruption and quickly recover critical IT environments.
Respondents consistently rated their organizations as performing well—hence the high confidence scores. On average, across all activities, 75% of respondents considered their performance very good to excellent. A nuance we found was respondents who reported strong executive buy-in for security investments were more likely to give themselves top marks for cyber resilience–related activities.
To help you garner that buy-in, as well, we offer nine foundational steps to chart a path toward cyber resilience.
Step 1: Engage the business from the start. IT organizations too often operate in a silo, separate from other parts of the business. The surest path for a cyber resilience strategy to succeed is to break the silo. Invite voices from outside IT to the table and anchor conversations about cyber resilience in the organization’s mission. Make it part of the organizational culture.
Step 2: Align on risk tolerance. A level of risk tolerance often is dictated by industry. For example, the tolerance level for a highly regulated financial institution likely would be very low. Whatever the level, define the risk tolerance for your organization and communicate it with your teams.
Step 3: Establish your minimum viable company. A minimum viable company represents the pieces of the organization that are critical to sustain operations and move business objectives. Your cyber resilience strategy not only should identify the critical pieces, but also the impact tolerances for how quickly the underlying data for these systems need to be back online.
Step 4: Take inventory. As demonstrated in the survey findings, many organizations are challenged by an ever-expanding IT footprint. Identify and map the IT assets that are critical to your minimum viable company. These assets will be top priority to protect and, in the worst case, recover following an adverse event.
Step 5: Move to a zero-trust framework. We recommend the deny-by-default standard to ensure only those who need to access systems can get it, while those who don’t need to, can’t.
Step 6: Establish a crisis management plan. Sometimes adverse events are unavoidable. (Case in point: human error as the most anticipated cause of disruptions.) Defining roles and responsibilities across teams, establishing a communication process, documenting processes, and improving transparency often helps reduce the impact of an adverse event.
Step 7: Practice for a disruption. Plans are too often created but then shelved and rarely practiced. When an adverse event occurs, an untested plan leads to confusion and slow response time, and the impact becomes more severe.
Step 8: Modernize your cyber resilience strategy—continuously. Organizations are living entities. Business pursuits shift, IT estates becomes more complex, and external forces (regulations, for example) can require changes. To ensure your cyber resilience strategy is effective, these steps must be part of a continual discussion.
Step 9: Build awareness at the board level. We end this survey report where we began—calling attention to the fact that cyber resilience has become a topic of board-level discussions worldwide.
Keeping your board informed about IT risks and plans to mitigate those risks can help drive top-down organizational alignment and provide air cover for changes necessary to ensure cyber-enabled systems can remain operational during adverse events.