<div>
<p paraeid=”{80643d30-40e9-4bc2-a7be-d78290cc9d9b}{226}” paraid=”111902967″><span style=”font-size: 12pt;”><span xml:lang=”EN-US” data-contrast=”auto”>Business leaders face daily threats to the security of their information systems – phishing attacks, DDoS attacks, viruses, ransomware and more. Many organizations have IT departments to address cybersecurity and manage threats to information systems, applications, websites networks and data. Larger enterprises likely have a security team or security operations center dedicated to preparing for, preventing and responding to cybersecurity incidents.</span> </span></p>
</div>
<div>
<p paraeid=”{6d0aeb53-3703-420a-9e7c-74e1d70a6379}{67}” paraid=”1659549940″><span style=”font-size: 12pt;”><span xml:lang=”EN-US” data-contrast=”auto”>But what happens in the aftermath of a cyberattack? How does the organization weather the intrusion? How well does it respond to the incident and then adapt and modify operations to better recover from future attacks?</span> </span></p>
</div>
<div>
<p paraeid=”{6d0aeb53-3703-420a-9e7c-74e1d70a6379}{135}” paraid=”971907450″><span style=”font-size: 12pt;”><span xml:lang=”EN-US” data-contrast=”auto”>Cyber-resilience is the ability to manage the outcomes of a cybersecurity incident and, more importantly, make changes to business and technology. Mature security operations have the data and insights to establish effective cyber-resilience programs that provide measurable value to the business.</span> </span></p>
<h2>Why CISOs need cyber-resilience metrics</h2>
</div>
<div>
<p paraeid=”{6d0aeb53-3703-420a-9e7c-74e1d70a6379}{215}” paraid=”1516154511″><span style=”font-size: 12pt;”><span xml:lang=”EN-US” data-contrast=”auto”>As with many aspects of cybersecurity management, metrics help CISOs measure the effectiveness of their cybersecurity initiatives, particularly from a business perspective. CISOs need to understand and employ these metrics to </span><a rel=”noreferrer noopener” target=”_blank” href=”https://www.techtarget.com/searchsecurity/tip/Calculating-the-ROI-of-AI-in-cybersecurity”><span xml:lang=”EN-US” data-contrast=”none”>demonstrate that cybersecurity investments</span></a><span xml:lang=”EN-US” data-contrast=”auto”> not only protect the organization, but also align with business strategies and leadership priorities.</span> </span></p>
</div>
<div>
<figure class=”main-article-image full-col” data-img-fullsize=”https://www.techtarget.com/rms/onlineimages/aligning_cybersecurity_and_cyber_resilience_plans-f.png”>
<img data-src=”https://www.techtarget.com/rms/onlineimages/aligning_cybersecurity_and_cyber_resilience_plans-f_mobile.png” class=”lazy” data-srcset=”https://www.techtarget.com/rms/onlineimages/aligning_cybersecurity_and_cyber_resilience_plans-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/aligning_cybersecurity_and_cyber_resilience_plans-f.png 1280w” alt=”A chart demonstrating the efforts a security team must undertake to achieve cyber-resilience.” height=”314″ width=”560″>
<figcaption>
<i class=”icon pictures” data-icon=”z”></i>A cybersecurity incident often prompts security teams to define a new normal to prevent similar occurrences in the future.
</figcaption>
<div class=”main-article-image-enlarge”>
<i class=”icon” data-icon=”w”></i>
</div>
</figure>
</div>
<div></div>
<div>
<div>
<ul style=”list-style-type: disc;” role=”list” class=”default-list”>
<li role=”listitem” data-aria-level=”1″ data-aria-posinset=”1″ data-list-defn-props=”{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}” data-listid=”4″ data-font=”Symbol” data-leveltext=”” aria-setsize=”-1″>
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: