Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCyber Tactics ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity Education & Training

Cyber Tactics

Reflections in the wake of RSA 2021: Cyber resiliency

By John McClurg
SEC0621-cyber-Feat-slide1_900px

da-kuk / E+ via Getty Images

SEC0621-cyber-slide2_900px
SEC0621-cyber-Feat-slide1_900px
SEC0621-cyber-slide2_900px
June 1, 2021

The first RSA Conference took place 30 years ago. It was conceived by the then-CEO Jim Bidzos, and consisted of roughly 50 people in a room discussing cryptography – the focus area of that first assembly. By the turn of the millennium, the conference expanded internationally, reaching audiences in Europe, China, Singapore and Abu Dhabi. Ten years later in 2011, the RSA Conference boasted an impressive 18,500 attendees in the United States alone.

While the cybersecurity community has been awed by the sheer growth in attendance, the RSA Conference has also evolved in many more qualitative ways. From initially a niche gathering in the corners of the cybersecurity world, it has developed into a more inclusive collective with a keen focus on business objectives.

“Over time, the conference became more business oriented. It had broader themes and a broader focus. We really see ourselves now at the intersection of business, policy and technology. The conference’s growth is a real testament to how the cybersecurity industry has grown in visibility; it touches all of our lives," said Linda Gray Martin, VP, RSA Conference.

The headlines of daily living punctuates Martin’s observation that cybersecurity “touches all of our lives.” Each year brings new threats and different challenges, all of which require rethinking our approach to cybersecurity. Large and small businesses alike are at potential risk and, therefore, it’s of paramount importance that all organizations, in an evermore connected world, are armed with the right tools.

 

A Focus on Cyber Resiliency

We’ve reached a point in time where having strong, reliable cybersecurity is more than just a nicety – it’s a well-touted and accepted necessity. No business can operate safely without it. The topic, itself, has been discussed, debated and written about countless times over the past decade. Of growing collateral interest and practicality, as illustrated by its having attracted attention as last month’s RSA 2021 Conference topic, is cyber resilience.

So, what exactly is cyber resilience and its relationship to cybersecurity? Essentially, cybersecurity describes the ability to protect against and avoid threats, mitigating vulnerabilities and their potential impact. Impact is where cyber resilience – a business’s ability to mitigate damage – and cybersecurity overlap.

The entire concept of cybersecurity as historically conceived – constructing an impenetrable perimeter against which any predatory actors stood no chance – is of little use today. It’s as outdated now as the paradigm of “reactive dection” has become in light of the emerging paradigm of AI-supported “proactive protection.”

If merely protecting against the threat is not enough, what defines adequate cyber resilience? A strong cyber resiliency program ensures continuity of operations with minimum impact to a business despite an incident. It is an iterative process providing the means of recovering from a successful attack. While the specific measures to ensure cyber resilience will most likely vary from business to business, a good starting point is to work out where cyber events and incidents could have the most damaging effects.

This is where the concept of a “digital twin” can play an important role. A digital, simulated model of your organization or its processes can help you understand the impact of an event on overall output and efficiency.

 

Final Thoughts

Technology continually offers new opportunities for businesses to grow and put strategic imperatives into action. As a seasoned member of the cybersecurity community, I have experienced first-hand the unprecedented new threats that come concurrently with the incredible benefits of technological advancement. These advancements are seen as an opportunity, as a new door to be explored and through which bad actors can advance their attacks, attacks that become concomitantly more sophisticated by the hour.

While it may seem pessimistic to accept the fact that cyberattacks, even in the wake of AI advancements, are going to occur – it’s our reality today. As a cybersecurity community, it is imperative that we continue to iterate and improve upon our cyber resilience strategies to ensure they provide an effective – and realistic – approach to addressing nefarious behavior.

Because at the end of the day, as the old adage reminds us, “We have to be right every time to win; Hackers only have to get it right once.” But by minimizing the fall-out and loss tied to these successful exploits, organizations can both protect themselves and reduce the value of cybercriminal activities.

KEYWORDS: cyber security information security risk management RSA Conference supply chain security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security

    Reflections on 35 years in the trenches

    See More
  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
  • Cyber

    Have we declared “open season” on CISOs?

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing