Women In Security Magazine Issue 11

Page 85

ASTHA KESHARIYA

CYBER RESILIENCE IN THE CYBER WORLD By Dr Astha Keshariya, Information Science, University of Otago Cyber resilience is a combination of cybersecurity

organisations strive to achieve. Thus, a fair balance

and business continuity. It is the ability of a business

between offering customers compelling solutions

to prepare, protect, respond, recover and rapidly

whilst maintaining sustainability is necessary in a

reinstate normal operations during or after a cyber

dynamic cyber business.

disruption such as ransomware, a data breach, identity theft or natural disaster.

The paradoxical nature of the cyber-attacks is that the organisations with the most advanced cybersecurity

Cyber resilience comprises strategies, controls and

capabilities are most often attacked. Cyber attackers

planned activities to be taken in response to a cyber

are drawn to high-profile challenges, which often have

disruption, to anticipate the impacts of that disruption,

the potential to provide higher monetary rewards.

counter them and rapidly restore normal operations.

Multinational companies are tempting targets for ransomware attacks or intellectual property theft.

There are many components to an effective

Government organisations are targeted by rival

cyber resilience strategy: technical, functional,

nation states.

organisational, regional and national. Also, it must integrate many components and supply chain actors

It is impossible to accurately assess the global

that are part of the organisation’s ecosystem.

economic cost of cybercrime but experts suggest its dollar value is comparable to that of the global

Furthermore, the evaluation of the impacts of

drug trade.

disruption may vary depending on the sociotechnical nature and purpose of the organisation: the

Cyber resilience-by-design based on digital trust

requirements of a business in the financial sector

is a strategy organisations can adopt to minimise

would differ from one in healthcare and from one

the damage caused by cyber attack and to remain

in retail.

relevant in the digital world.

RESILIENCE BY DESIGN

ISACA defines digital trust as “the confidence in

Today no organisation exists in cyber isolation. There

the integrity of the relationships, interactions and

is no such thing as a perfectly secure environment,

transactions among providers and consumers within

service or product. It is a moving target that

an associated digital ecosystem.”

I S S U E 11

WOMEN IN SECURITY MAGAZINE

85


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Gabrielle Raymundo

5min
pages 128-129

Haicheur Ichrak Amani

3min
pages 130-133

Jack K

2min
page 127

Kao Hansell

7min
pages 124-126

Oorja Rungta

6min
pages 122-123

Out of the shadows: how cybersecurity has taken centre stage in the Australian business arena

3min
pages 118-121

Key themes from 2022 taking us forward

4min
pages 116-117

neural networks and cybersecurity

2min
pages 114-115

Reflections on malware

4min
pages 112-113

Sharing our inner voice stories

7min
pages 108-111

behind cryptocurrency

3min
pages 106-107

Improving security together

3min
pages 102-105

Meeting the security and privacy challenges of the metaverse

1min
page 101

How is the industry responding to the skills and talent squeeze?

4min
pages 98-100

Looking back to move forward: thirty years of experience guiding the way

2min
pages 92-93

Corporate layoffs: a perfect storm for insider risk and the imperative for holistic mitigation approaches

7min
pages 88-91

Cyber resilience in the cyber world

4min
pages 85-87

2022 has been a watershed year for cybersecurity, but what’s next?

5min
pages 82-84

not fill you with dread

4min
pages 80-81

The future of developer security maturity is bright, and these verticals are leading the charge

4min
pages 78-79

Australia’s cybersecurity sector: where are the women?

5min
pages 74-77

you need to reach your vision

12min
pages 54-59

Keep calm and carry on

10min
pages 68-73

Women in cyber security from a recruiters perspective

4min
pages 52-53

Changing the ‘change’ journey

4min
pages 50-51

to cybersecurity

4min
pages 48-49

A real hard look

3min
pages 46-47

Scarlett McDermott

4min
pages 34-35

Jessica Williams

4min
pages 32-33

Cybercrime in 2022

1min
pages 14-15

Emily Goodman

3min
pages 30-31

Dina Atwell

4min
pages 24-27

Joyce Tiwari

2min
pages 18-19

Tara Murphy

2min
pages 28-29

Ranjeeta Rani

2min
pages 20-21

Annelies Moens

3min
pages 16-17

Sandy Assaf

3min
pages 22-23
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.