Meaningful metrics demonstrate the value of cyber-resiliency

<div>
<p paraeid=”{80643d30-40e9-4bc2-a7be-d78290cc9d9b}{226}” paraid=”111902967″><span style=”font-size: 12pt;”><span xml:lang=”EN-US” data-contrast=”auto”>Business leaders face daily threats to the security of their information systems&nbsp;–&nbsp;phishing attacks,&nbsp;DDoS&nbsp;attacks, viruses,&nbsp;ransomware&nbsp;and more.&nbsp;Many organizations&nbsp;have&nbsp;IT departments&nbsp;to&nbsp;address&nbsp;cybersecurity&nbsp;and&nbsp;manage&nbsp;threats to information systems, applications,&nbsp;websites networks&nbsp;and data.&nbsp;Larger enterprises&nbsp;likely&nbsp;have&nbsp;a security team or&nbsp;security operations center&nbsp;dedicated&nbsp;to preparing for,&nbsp;preventing&nbsp;and responding to cybersecurity&nbsp;incidents.</span>&nbsp;</span></p>
</div>
<div>
<p paraeid=”{6d0aeb53-3703-420a-9e7c-74e1d70a6379}{67}” paraid=”1659549940″><span style=”font-size: 12pt;”><span xml:lang=”EN-US” data-contrast=”auto”>But what happens in the aftermath of a cyberattack? How&nbsp;does the organization weather&nbsp;the intrusion? How well does&nbsp;it&nbsp;respond to&nbsp;the&nbsp;incident&nbsp;and&nbsp;then adapt&nbsp;and&nbsp;modify&nbsp;operations to better&nbsp;recover from&nbsp;future&nbsp;attacks?</span>&nbsp;</span></p>
</div>
<div>
<p paraeid=”{6d0aeb53-3703-420a-9e7c-74e1d70a6379}{135}” paraid=”971907450″><span style=”font-size: 12pt;”><span xml:lang=”EN-US” data-contrast=”auto”>Cyber-resilience is the&nbsp;ability to&nbsp;manage&nbsp;the outcomes of&nbsp;a cybersecurity&nbsp;incident and, more importantly, make changes to business and technology. Mature security&nbsp;operations have the data and insights to&nbsp;establish&nbsp;effective&nbsp;cyber-resilience programs&nbsp;that&nbsp;provide measurable value to the business.</span>&nbsp;</span></p>
<h2>Why CISOs need cyber-resilience metrics</h2>
</div>
<div>
<p paraeid=”{6d0aeb53-3703-420a-9e7c-74e1d70a6379}{215}” paraid=”1516154511″><span style=”font-size: 12pt;”><span xml:lang=”EN-US” data-contrast=”auto”>As with&nbsp;many&nbsp;aspects of cybersecurity management,&nbsp;metrics&nbsp;help&nbsp;CISOs&nbsp;measure the effectiveness of their cybersecurity initiatives, particularly from a business perspective.&nbsp;CISOs need to understand and employ these metrics&nbsp;to&nbsp;</span><a rel=”noreferrer noopener” target=”_blank” href=”https://www.techtarget.com/searchsecurity/tip/Calculating-the-ROI-of-AI-in-cybersecurity”><span xml:lang=”EN-US” data-contrast=”none”>demonstrate&nbsp;that cybersecurity&nbsp;investments</span></a><span xml:lang=”EN-US” data-contrast=”auto”>&nbsp;not only protect the&nbsp;organization, but&nbsp;also align with business strategies and&nbsp;leadership&nbsp;priorities.</span>&nbsp;</span></p>
</div>
<div>
<figure class=”main-article-image full-col” data-img-fullsize=”https://www.techtarget.com/rms/onlineimages/aligning_cybersecurity_and_cyber_resilience_plans-f.png”>
<img data-src=”https://www.techtarget.com/rms/onlineimages/aligning_cybersecurity_and_cyber_resilience_plans-f_mobile.png” class=”lazy” data-srcset=”https://www.techtarget.com/rms/onlineimages/aligning_cybersecurity_and_cyber_resilience_plans-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/aligning_cybersecurity_and_cyber_resilience_plans-f.png 1280w” alt=”A chart demonstrating the efforts a security team must undertake to achieve cyber-resilience.” height=”314″ width=”560″>
<figcaption>
<i class=”icon pictures” data-icon=”z”></i>A cybersecurity incident often prompts security teams to define a new normal to prevent similar occurrences in the future.
</figcaption>
<div class=”main-article-image-enlarge”>
<i class=”icon” data-icon=”w”></i>
</div>
</figure>
</div>
<div></div>
<div>
<div>
<ul style=”list-style-type: disc;” role=”list” class=”default-list”>
<li role=”listitem” data-aria-level=”1″ data-aria-posinset=”1″ data-list-defn-props=”{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}” data-listid=”4″ data-font=”Symbol” data-leveltext=”” aria-setsize=”-1″>

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: