A glimpse of our power panelists who led future-ready conversation!
What is the relevance of resilience in the current cyber landscape? Join our #Tweetchat “Cyber resilience: Building future-ready organizations” on April 7, 2022 at 5 PM CET to learn more. Save the date: https://t.co/PZjh8Ojwkt #STinsights pic.twitter.com/Buh9KcYRbJ— CIO Straight Talk (@CIOStraightTalk) April 2, 2022
And now let’s begin with the first question!
Follow #STinsights to join a Twitter discussion with leaders on “#Cyberresilience: Building future-ready organizations.” Tune in at 5 PM CET today at https://t.co/Xbo5NaTJzd to join the discussion. #Tweetchat pic.twitter.com/1DC7D9HlPh— CIO Straight Talk (@CIOStraightTalk) April 7, 2022
Let’s hear from our experts to know how organizations can survive the evolving threat landscape!
We are going live with the #Tweetchat. Join using #STinsights.— CIO Straight Talk (@CIOStraightTalk) April 7, 2022
How can organizations create the right balance between protecting and recovering business critical data after a breach? pic.twitter.com/rICbReti43
Q1 They need a clear strategy & buy in from the execs. They must know their assets, how they’re inter-connected & inter-dependent, which ones are mission critical so they can isolate them when malware enters the network or a breach occurs @CIOStraightTalk #STinsights— Jane Frankland (@JaneFrankland) April 7, 2022
To start on this one, I'd say that for some orgs the first step is to REALIZE they need this balance (rather then naively pile most/all resources into prevention) - a major mind shift for some #STinsights— Dr. Anton Chuvakin (@anton_chuvakin) April 7, 2022
Some interesting POVs on cybersecurity and cyber resilience! Let’s move on to our next question…
Q1- #cybersecurity & #CyberResilience need to go in sync. Security focuses on detection,containment, prevention and eradication of threat vectors; resiliency will focus more on recover, investigation and restoration so that business is back to normal @CIOStraightTalk #STinsights https://t.co/QwEuUjJG7J— Jatin Arora (@ja_arora) April 7, 2022
Q2. 1/5 They must start with a risk assessment & I recommend using FAIR [Factor Analysis of Information Risk]. It’s a model built by a CISO that codifies & monetizes risk. @CIOStraightTalk #STinsights https://t.co/PLFPctwpM5— Jane Frankland (@JaneFrankland) April 7, 2022
The answer to our next question will determine the success of your organization!
Q2 With many employees still working from home, the threat surface has dramatically increased. Having the right tools, configurations, access controls and clear procedures. @CIOStraightTalk #Stinsights pic.twitter.com/XfceTl9lpz— 🟣Tyler Cohen Wood (@TylerCohenWood) April 7, 2022
Some important points to keep in mind while building a cyber-resilience program!
Time for our third question. Join the conversation using #STinsights. Keep the questions coming! #Tweetchat— CIO Straight Talk (@CIOStraightTalk) April 7, 2022
What are the top 5 practices for building a cyber-resiliency program? pic.twitter.com/tKcPbgE3we
(d) Automation and orchestration for recovery of platforms and application data. (e) Air-gapping sensitive data & systems and have a incident response plan in place(f) Most important, make your employee awareness program strong @CIOStraightTalk #STinsights https://t.co/wyXLyLCSSl— Jatin Arora (@ja_arora) April 7, 2022
Only a preventative cybersecurity program isn’t enough! Scroll for more insights on the power of cyber resilience…
Q3.c It’s important to keep in mind that cybersecurity is a living, breathing thing. It’s not something that you set up once and forget, it has to be organic and periodically updated.@CIOStraightTalk #Stinsights @JaneFrankland @ja_arora @SarahBurnett @sarbjeetjohal pic.twitter.com/qF5VkQ3yTk— 🟣Tyler Cohen Wood (@TylerCohenWood) April 7, 2022
Let’s hear from our experts on creating resilient ecosystems!
A big shoutout to everyone on our panel. Join the conversation using #STinsights. Here’s our fourth question. #Tweetchat— CIO Straight Talk (@CIOStraightTalk) April 7, 2022
How can cyber resiliency strategy be extended to third party business partners and supply chains? pic.twitter.com/6S6fpw4YNj
Q4: It’s about securing the whole network of users and third parties with protection against human error and vulnerabilities. Using policy to provide authentication and appropriate levels of access @CIOStraightTalk #STinsights— Sarah Burnett (@SarahBurnett) April 7, 2022
Cyber resilience is a lifeline for businesses! Wouldn’t you agree?
Q4. 1/2 Supply chain attacks grew 300% in 2021 so enterprises must ensure adequate engagement policies & audits. Schemes like #CyberEssentials can help especially for smaller companies & those in the UK @CIOStraightTalk #STinsights https://t.co/ZNHwz7U8iN— Jane Frankland (@JaneFrankland) April 7, 2022
Here’s how you can measure the true impact of your cyber-resilience program!
Keep shooting YOUR questions using #STinsights. Here’s our final formal question to the panel. #Tweetchat— CIO Straight Talk (@CIOStraightTalk) April 7, 2022
What are the key technical and business measures of a cyber-resiliency program? pic.twitter.com/NCcjeYJmUf
Q5: I’ve come across businesses that were running very old systems. They were no longer supported by their vendors. Ensuring that systems are updated and upgraded, and patches are applied is so important. @CIOStraightTalk #STinsights— Sarah Burnett (@SarahBurnett) April 7, 2022
Q5 Good key technical & business measures 4 cyber-resiliency programs are threat protection, recoverability, adaptability & durability. These components will assure that a cyber-resiliency program has what it takes 2 work successfully. @CIOStraightTalk #Stinsights @SarahBurnett pic.twitter.com/rvIC4bYHem— 🟣Tyler Cohen Wood (@TylerCohenWood) April 7, 2022
We hope you take away these valuable inputs to prepare your organizations for the future! A big thank you to our panel of experts for this engaging tweet chat. Do follow our Twitter account @CIOStraightTalk for more updates and insights.
(a)Eradicate the risk to ensure the attacker cannot regain access by patching, closing network access and resetting passwords of compromised accounts.(b)Do a root cause identification to determine the attack path used so that controls can be improved @CIOStraightTalk #STinsights https://t.co/bLOQ9IIGLi— Jatin Arora (@ja_arora) April 7, 2022
A big thank you to our Power Panel for their #STinsights and those who joined us for this exclusive #Tweetchat @anton_chuvakin @JaneFrankland @ja_arora @LisaForteUK @SarahBurnett @sarbjeetjohal @TylerCohenWood pic.twitter.com/k8KiUy7RFY— CIO Straight Talk (@CIOStraightTalk) April 7, 2022