Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

5 steps to conducting a cyber resilience review

By Yogesh Badwe
cyber business resilience

Image from Unsplash

July 21, 2022

Cyber threats are escalating and unlikely to adhere to sectoral or geographical boundaries. Any organization can be a target.

Of particular concern is the scourge of ransomware. The latest ransomware threat report from Sophos found that ransomware attacks on organizations have increased by 66% in the last year alone, demonstrating that threat adversaries have become considerably more capable at executing large-scale attacks.

While there will never be a silver bullet to stop cyberattacks from happening altogether, every organization should be taking proactive steps to minimize the impact of an attack once it does inevitably occur. Ultimately, security leaders must feel confident in their organization’s ability to anticipate, withstand and recover quickly with minimal downtime and impact to business-critical services.

To do so, there are comprehensive measures every security leader can take, starting with conducting a resilience review of the organization.

1. Build a real-time inventory of the most valuable data and ensure it is always protected. 

This is a good first step for those starting out in their security journeys. In many cases, organizations store a vast amount of data within cloud services and Software as a Service (SaaS) applications such as Salesforce, Microsoft 365 and Google Workspace. However, these cloud vendors offer limited to no data protection services. Most abide by a shared responsibility model in which the vendor is responsible for maintaining platform uptime while the organization is responsible for the protection, resiliency, and long-term retention of data. Do not overlook protecting end user data on endpoints as well, which are critical entry points where ransomware can attack.

2. Next, evaluate the backup system. 

The organization’s system should offer unmodifiable, truly immutable backups, deletion prevention and breach-resistant architecture. If backup system cannot meet these capabilities, it may be time to select another vendor. In addition, for enhanced protection, security leaders should segregate the backup system as much as possible from the organization’s primary environment — with separate passwords, separate access, separate monitoring and air-gapping. 

3. Review the organization’s zero trust security posture. 

Organizations that operate with a mature zero trust mentality are more resilient and responsive to cyberattacks. While many recognize the importance of zero trust, a substantial 32% of security teams lack an understanding of how zero trust should be implemented within their organization.

At a minimum, the organization should already be requiring single sign-on (SSO) and multi-factor authentication (MFA). Assess MFA coverage and choose strong second factors that are resilient to phishing and other attack methods. 

4. Assess and improve organizational cybersecurity awareness.

All employees should already be required to complete fundamental security and compliance training courses throughout the year, but these programs will never be the golden ticket to ensure a 100% cyber aware workforce. The reality is, there will always be some employees that are better than others at identifying and reporting malicious activity.

To get ahead of this, implement intelligence-driven training for a targeted and personalized training experience. Intelligence-driven training can identify the areas employees need to strengthen in order to maintain stronger cybersecurity hygiene habits. This will help increase organizational awareness against cyber threats. 

5. Lastly, dust off the incident response playbook. 

A robust incident response plan is essential to acting and responding to a threat quickly and becoming more resilient in the future. If the organization hasn’t revisited their incident response plan in the last year, do so now.

The playbook should include a list of predefined steps that span across multiple teams such as IT, PR, legal and customer support. Run through several scenarios of different incidents to test its efficacy. This will also be an opportunity to see how teams work together and what might need to be changed before an event occurs.

In today’s highly turbulent cyber landscape, organizations need to be extra vigilant. New malware strains continue to emerge every day, so cyber preparedness should be a top priority.

Taking the proactive steps now to advance organizational resilience will help improve security’s ability to secure and recover data swiftly when that time does come. Act with urgency now before it’s too late.

KEYWORDS: cyber resilience cyber security education cyber security threat data protection employee training incident response ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Yogesh badwe 1080x1320 01002

As Druva’s Chief Security Officer (CSO), Yogesh Badwe is responsible for overseeing all facets of Druva’s cybersecurity program and driving initiatives to help the company and its users achieve cyber and data resilience. Badwe brings 15 years of strong cybersecurity leadership experience to Druva, having held senior positions at high-growth organizations. Most recently, Badwe served as Senior Director of Information Security at Okta, where he was instrumental in helping build and lead the security function through a period of significant business growth from $40M to $1.2B in ARR, and securing the company’s journey through a successful IPO in 2017.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Startup employees

    5 steps to creating a security-first culture in startups

    See More
  • Vertical green numbers on black screen

    5 key elements of cyber simulation exercises to boost cyber resilience

    See More
  • Business meeting

    5 commitments CISOs can make to boost cyber resilience

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing