Fostering Digital Resilience: Strategies for Building Robust Cybersecurity in an Evolving Threat Landscape

By Rahul Guhathakurta

Fostering Digital Resilience: Strategies for Building Robust Cybersecurity in an Evolving Threat Landscape

With relentless technological advancement and digital transformation, safeguarding an organization's digital assets has never been more critical. The cornerstone of an efficient cybersecurity strategy lies in acknowledging the exceptional value certain assets hold for a company. In an age where the digital landscape is continually expanding, striving to provide uniform protection to every facet of an organization's digital realm is simply unattainable. Yet, within this intricate web of interconnected systems and data, trust stands as the bedrock of the digital business model.

Over the past five years, there has been a more than twofold increase in minor and significant system breaches, and these attacks have become more sophisticated and intricate. Although most large enterprises now acknowledge the seriousness of this issue, they still view it primarily as a technical and control problem, even though they admit that their defenses are unlikely to keep pace with future attacks. Furthermore, these defenses often focus on safeguarding business operations' outer boundaries and must be more consistently applied across various parts of the organization.

The upcoming surge in innovation, spanning customer applications, business operations, technological frameworks, and cybersecurity safeguards, should revolve around a business and technical strategy that places paramount importance on safeguarding vital information assets. We refer to this approach as "digital resilience," a multifaceted strategy encompassing identifying and evaluating vulnerabilities, establishing enterprise-wide objectives, and formulating optimal delivery methods. A crucial component of digital resilience involves recognizing and securing an organization's digital assets of utmost importance—these encompass the data, systems, and software applications essential for its operations.

Increasing Vulnerabilities, Limited Resources, and Divergent Priorities


When determining which assets should take precedence in protection, organizations encounter a range of external and internal challenges. Within these entities, business interests, IT departments, and risk management functions often find themselves at odds, grappling with unclear working relationships and conflicting agendas. Consequently, many organizations attempt a one-size-fits-all approach to cyber-risk controls, which can lead to the inefficient allocation of resources—sometimes spending too much in some areas and too little in others. Alternatively, some organizations employ compartmentalized protection measures, inadvertently exposing crucial information assets while concentrating on less critical ones. Moreover, cybersecurity budgets vie for limited funding against technology investments designed to enhance the organization's competitive edge, often introducing new vulnerabilities.

The process of prioritizing assets and risks, evaluating control measures, and formulating remediation plans is time-consuming and labor-intensive. Specialists are tasked with meticulously reviewing a multitude of risks and control mechanisms, assigning ratings based on their individual judgments. Unfortunately, some organizations mistakenly view this work as a mere compliance exercise rather than a vital business process. However, organizations need proper prioritization to deploy their resources effectively to mitigate information security risks. As these risks mount, boards of directors need help to assess the enterprise's overall security or gauge the return on their additional security investments.

Not All Data and Systems Are Equal


The critical assets and their respective sensitivity levels differ significantly across various industries. For instance, in healthcare systems, patient information is typically the most sensitive asset, while information about the functioning of the emergency room may be publicly accessible. The primary risks to these critical data include breaches, theft, and, in some cases, ransom demands, as illustrated by the situation where a top-tier hospital in New Delhi experienced a ransomware attack. Hackers demanded a payment of ₹200 crore ($267 million in December 2022) in cryptocurrency to restore control over its systems following a hacker's intrusion.

Conversely, a semiconductor systems design and fabrication laboratory prioritizes safeguarding intellectual property, encompassing everything from system designs to proprietary methodologies. In contrast, a financial services company may require fewer security measures for its marketing materials but faces vulnerability to fraudulent transactions. Additionally, its M&A (Mergers and Acquisitions) database necessitates the highest level of protection available.

Potential attackers can range from individuals to organizations, including criminal syndicates or governments with substantial resources. These attacks can vary in complexity, with objectives spanning from immediate financial gain to gaining a competitive edge or even pursuing geopolitical advantages.

The Cost of Cybersecurity Solutions: The Paradox of More vs. Less


Faced with many diverse threats, organizations often need a clear direction to increase their cybersecurity expenditures.
  • A defense contractor may focus on protecting its weapons systems from cyberattacks while failing to protect its supply chain from malware infections sufficiently. This could lead to compromised components being used in critical systems. For example, in 2020, the defense contractor Lockheed Martin was hit by a cyberattack that compromised the supply chain of its F-35 fighter jet program. The attack is believed to have been carried out by a Chinese hacking group, which stole sensitive data about the aircraft's design and performance.
  • A government agency may prioritize protecting its classified intelligence data while failing to adequately secure its public-facing websites and applications, which cyber criminals could exploit to steal personal data or launch denial-of-service attacks. In 2019, the US government was hit by a "major cyberattack" that compromised the systems of several federal agencies, including the Department of Homeland Security and the Department of State. The attack is believed to have been by a Russian hacking group, which stole sensitive data about US government operations.
  • A global pharmaceutical giant might emphasize safeguarding its drug discovery and development data, potentially overlooking the need for robust security measures for its manufacturing facilities and clinical trial information. Unfortunately, this oversight could render these areas susceptible to exploitation by cybercriminals, who may seek to pilfer valuable trade secrets or disrupt essential operations. In 2020, IQVIA, a contract research organization helping manage AstraZeneca’s COVID-19 vaccine trial, was hit by a cyberattack that compromised its clinical trial data. The attack is believed to have been carried out by an Iranian hacking group, which stole data about AstraZeneca's experimental cancer drugs.
  • A healthcare provider prioritizes the protection of patient data while neglecting other areas, such as safeguarding confidential financial data crucial for substantial negotiations and defenses against various internal data-related risks. In August 2023, multiple US hospitals were hit by a ransomware attack that disrupted their operations for several days. The attack is believed to have been carried out by the Russia-based Conti ransomware gang, which demanded a $50 million ransom payment. The group is known for using a type of attack called double extortion. In a double extortion attack, the attackers encrypt the victim's files and steal sensitive data. The attackers then threaten to publish the stolen data if the victim does not pay a ransom.
These illustrative cases underscore the need for a unified, enterprise-wide approach to addressing cyber risks. Such an approach should involve collaboration among business, risk, IT, and cybersecurity teams. The leaders of these groups must come together to identify and prioritize the protection of the organization's critical digital assets. Furthermore, addressing cyber risk must incorporate technological enablement through the implementation of workflow management systems. Integrating cybersecurity investment into the business budget cycle and making investment decisions more evidence-based and responsive to changing circumstances is paramount.

An Enterprise-Wide Approach Anchored in Business Priorities


The crucial step is to commence by addressing the business issue, necessitating a holistic assessment of the entire organization, followed by the prioritization of significant risks. This undertaking should be carried out by a cross-functional team representing various facets of the business, including individuals from product development, cybersecurity, IT, and risk management. The primary responsibilities of this team include identifying which information assets require top-tier protection, assessing the likelihood of potential attacks, and devising protective measures.

To be effective, this team must engage leaders from multiple domains, working collaboratively to ascertain what holds the highest importance—a challenge in its own right. The optimal approach for initiating this process is to establish the team's foundation on the agreement that cyber risks will be assessed and ranked with a focus on the overall needs of the enterprise. In essence, the team's primary mission is to serve the enterprise's interests. Critical risks, encompassing the potential impact of various threats and their likelihood of occurrence, will be evaluated based on the risks they pose to the organization.

The following principles can serve as guidance to keep companies aligned when adopting a unified approach to prioritize digital assets and assess risks:

1. Commence with a business-oriented perspective and its value chain. It's essential to base this effort on understanding the business and how it operates within its value chain. Often, the CISO's team, particularly when part of the IT department, initiates the process with a list of applications, systems, and databases and subsequently evaluates risks. However, this approach has two major areas for improvement. Firstly, it may overlook significant risks that arise from the interplay between systems. Secondly, the technical jargon can hinder effective engagement with the business for decision-making regarding changes and investments. By starting with a business-centric approach, the team naturally encourages stakeholder involvement, increasing the chances of identifying systemic vulnerabilities.

2. The CISO must take an active leadership role. In addition to facilitating the business's perspective, the CISO should bring their own insights into the company's most vital assets and risks. Through active collaboration with business leaders and other stakeholders as equal partners in thought, the CISO can establish critical relationships for well-informed investments and resource allocation decisions. This shift may lead to a significant transformation in the CISO's role, necessitating adjustments to their role description and skill set.

3. Concentrate on understanding how an information asset could be compromised. Even if a system's primary purpose is unrelated to a particular information asset, assessing the vulnerability of that system in the event of a breach is crucial.

4. Prioritize over pursuing precise quantification. The team only requires sufficient information to make decisions regarding priority assets. Excessively precise risk quantification is often challenging and doesn't significantly impact the decision-making process when selecting investment options.

5. Dive deeper when necessary. Not all risks demand the same level of analysis. Deeper analyses should be reserved for exceptionally high-impact or complex risks. The team should determine the necessary information to make more informed investment decisions in such cases.

6. Adopt the perspective of potential attackers. During risk reviews and vulnerability assessments, it's essential to broaden the focus beyond just the value of the information to the company and the identifiable gaps in its defenses. Consider the profiles of potential attackers: Who seeks the organization's data? What skills do they possess? Evaluating likely attackers can help identify new vulnerabilities and guide investments to protect the information most valuable to the most capable adversaries.

A Systematically Adaptable Approach with a Well-structured Framework


The enterprise-wide strategy aims to pinpoint and address deficiencies within current control and security systems that impact crucial assets. Based on our experience, the solution will likely involve a comprehensive process, potentially requiring multiple developmental iterations. This process would entail a thorough assessment of numerous assets. An ideal tool for supporting this intricate process would be a workflow system coupled with an asset database, enabling a focus on risk prioritization. An online application that is flexible, scalable, and secure can facilitate ease of use while effectively managing inventory and data mapping, rigorous risk and control evaluations, sector-specific methodologies, and justifications for each risk level. Additionally, this platform can provide in-depth data when the team analyses high-priority assets and gaps, subsequently making recommendations that will shape remediation efforts.

In crafting this approach for clients, McKinsey experts in 2019 outlined the following five crucial stages:

1. Determine and chart digital assets, encompassing data, systems, and applications, throughout the entire business value chain. This process can be expedited by employing a generalized-sector value chain and a shared classification system for information assets, tailoring them to fit the organization's unique context.

2. Evaluate risks associated with each asset, utilizing surveys and executive workshops. This analysis is guided by the asset's significance to the business, effectively identifying its critical components.

3. Identify potential threat actors, assess the accessibility of assets to authorized users, and review the existing controls and security measures safeguarding the systems that grant access to these assets. This step also relies on surveys and workshops similar to step two.

4. Pinpoint areas of vulnerability surrounding the most critical assets (often referred to as "crown jewels") and establish the necessary protective measures by comparing the findings from these assessments using dashboards.

5. Develop a series of actions to mitigate the most critical risks and address control deficiencies. Executing these measures will require a multi-year strategy with established schedules for subsequent evaluations. Following the initial assessment, this strategy evolves into a dynamic document routinely updated to incorporate fresh information, new systems, applications, emerging risks, and their assessments, along with advancements in resolving known vulnerabilities.

Conclusion


The above-suggested process fosters cyber-risk clarity, addressing stakeholders' fundamental inquiries: What are our inherent information-related risks? Where are the vulnerabilities in our organization? What is the remaining exposure, how extensive is it, and in which areas? Which remedial actions should we give precedence to? How can we determine the effectiveness of our efforts? The notion of trading information risks can be delineated by considering the perspective of the value put at risk across the entire company. This facilitates discussions on information security risks at the executive and board levels. It enables a transparent examination of the risks they are willing to tolerate and the reasons behind these decisions.

The outcomes of this process influence budgeting and investment choices, ensuring alignment with regulatory requirements and shareholder expectations. Costs are effectively managed by concentrating investments on safeguarding the most sensitive digital assets while enhancing the organization's digital resilience. Additionally, this process can aid organizations in integrating digital resilience into their day-to-day operations by establishing periodic assessments to highlight emerging trends and identify new vulnerabilities. Subsequently, risk managers can formulate new initiatives that prioritize the global needs of the enterprise.

NOTE: Organizations characterized by advanced digital capabilities, such as financial services, manufacturing, and healthcare, stand to gain the greatest advantages from this methodology. They grapple with the formidable challenge of safeguarding their utmost critical resources without impeding the progress of business innovation. Striking this equilibrium necessitates collaborative efforts from various organizational domains, including business operations, IT, risk management, and others.

About the Author:

Rahul Guhathakurta (ORCID: 0000-0002-6400-6423) is a strategic management consultant. A primary investor in IndraStra Global — a US-based publishing company.

IndraStra Global is now available on
Apple NewsGoogle News, Flipboard, RSS, and Feedly.

COPYRIGHT: This article is published under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. https://creativecommons.org/licenses/by-nc-nd/4.0/

REPUBLISH: Republish our articles online or in print for free if you follow these guidelines. https://www.indrastra.com/p/republish-us.html
Name

-51,1,3D Technology,2,5G,10,Abkhazia,2,Abortion Laws,1,Academics,10,Accidents,21,Activism,1,Adani Group,5,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,113,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,3,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,83,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,70,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,8,Australia,57,Austria,1,Automation,13,Automotive,131,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,4,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,105,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1213,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,56,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,581,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,25,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,44,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,13,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,2,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,17,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Exeperience,1,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,116,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,2,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,2,Digital Economy,11,Digital Marketing,7,Digital Transformation,11,Diplomacy,14,Diplomatic Row,4,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,48,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,4,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,109,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,54,Education,67,EFTA,1,Egypt,27,Election Disinformation,1,Elections,44,Electric Vehicle,15,Electricity,7,Electronics,9,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,14,European Union,234,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1382,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,59,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,2,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,33,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,22,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,8,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,9,Georgia,12,Georgian,1,geospatial,9,Geothermal,2,Germany,71,Ghana,3,Gibratar,1,Gig economy,1,Global Perception,1,Global Trade,96,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,GPS,1,Greater Asia,175,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,1,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,2,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,5,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,664,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,27,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,7,Indonesia,20,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,35,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,205,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,91,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,82,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,8,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,16,Marijuana,1,Marine Biology,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medical,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,10,Military Service,2,Military-Industrial Complex,3,Mining,16,Missile Launching Facilities,6,Missile Systems,57,Mobile Apps,3,Mobile Communications,12,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,2,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,16,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1276,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,54,North Korea,59,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,4,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,383,Oil Gas,7,Oil Price,73,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,129,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,695,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,13,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,7,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,4,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,6,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,50,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,25,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,318,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,6,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,396,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,20,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Smartphones,1,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,16,Somalia,5,South Africa,20,South America,48,South Asia,473,South China Sea,36,South East Asia,77,South Korea,63,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Education,1,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,32,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,654,Think Tank,317,Tibet,3,TikTok,2,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,20,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,140,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,26,Ummah,1,UNCLOS,7,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,83,United Nations,28,United States,765,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,22,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,Whales,1,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,38,World Economy,32,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: Fostering Digital Resilience: Strategies for Building Robust Cybersecurity in an Evolving Threat Landscape
Fostering Digital Resilience: Strategies for Building Robust Cybersecurity in an Evolving Threat Landscape
By Rahul Guhathakurta
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3gNTPoZ61K8ZPmj8iIKYg_N8IjaLsJgH0NWX8UrWFE-G-BfrzUKE6TZBnckjWwDfFq9JjjOGYzS69kX_V4tfk2AIcR2-gs6c-HYaWwTRAOY9-NBfoxehTQaJAvTd_CXVA6cZ6mZq3ymnW_9d-TTMD3cKQ5Khbt0Tkee2PQHiAIzkCO2aJtSPOWX6IhEI/w640-h392/critical-infrastructure-freepik.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3gNTPoZ61K8ZPmj8iIKYg_N8IjaLsJgH0NWX8UrWFE-G-BfrzUKE6TZBnckjWwDfFq9JjjOGYzS69kX_V4tfk2AIcR2-gs6c-HYaWwTRAOY9-NBfoxehTQaJAvTd_CXVA6cZ6mZq3ymnW_9d-TTMD3cKQ5Khbt0Tkee2PQHiAIzkCO2aJtSPOWX6IhEI/s72-w640-c-h392/critical-infrastructure-freepik.jpg
IndraStra Global
https://www.indrastra.com/2023/09/fostering-digital-resilience-strategies.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2023/09/fostering-digital-resilience-strategies.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content