Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Articles

11:05 AM
Pam Baker
Pam Baker
Edge Features
Connect Directly

9 Cyber Disaster-Recovery Planning Tips for a Disaster-Prone Time

This year has been the ultimate test of business resilience, and if anything is now clear, it's this: It's time for security pros to rewrite their playbooks in preparation for a more dangerous wave of attacks.

(Image: Michael Traitov via Adobe Stock)
(Image: Michael Traitov via Adobe Stock)

Cybersecurity threats and disaster recovery planning are not new business concepts. Neither is the need to change the game plan to keep up with current events. Certainly, recent ransomware attacks have driven those points home with a multimillion-dollar sledgehammer.

Related Content:

8 New and Hot Cybersecurity Certifications for 2020

Cybercriminals Could be Coming After Your Coffee

Why Defense, Not Offense, Will Determine Global Cyber Powers

"Businesses in 2020 have seen an incredible amount of disruption, from dealing with a global pandemic response, to accelerated digital transformation efforts, more advanced business intelligence initiatives, and IoT proliferation," says Jason Albuquerque, CSO and CIO at Carousel Industries, an IT and managed services firm. "Now couple this with an intense level of geo-political, natural disasters, and social unrest, and you now have the makings of an apocalypse movie script or Nostradamus prediction."  

Suffice to say, there's a good chance your security plans are in need of some level of overhaul.

"If the pandemic has proven anything, it is that security professionals need a new playbook," says Peter Margaris, head of product marketing at Skybox Security. "This requires a mind-set shift from the traditional detect-and-response approach to a proactive offense."

Resilience should also be the goal, adds Bindu Sundaresan, director at AT&T Cybersecurity – "meaning rewritten to not just focus on textbook attack scenarios such as DDoS, ransomware, phishing, cloud misconfiguration attack, and human error, but to also focus on achieving cyber resilience against multilayered attacks, which involves several threat vectors in cohesion."  

How do you start with such a major rewrite in your organization? Here are some tips from security pros on the front line.

A prolific writer and analyst, Pam Baker's published work appears in many leading publications. She's also the author of several books, the most recent of which is "Data Divination: Big Data Strategies." Baker is also a popular speaker at technology conferences and a member ... View Full Bio
1 of 10

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
11/21/2020 | 8:38:38 PM
10 pages (actually 10 paragraphs) with a lot of words that don't say anything.

Waste of time.

Had to login to read them, then login again to leave a comment. Poor.
Flash Poll