CINXE.COM

What does resilience in the cyber world look like in 2025 and beyond?

<!doctype html> <html lang="en-US"> <head> <meta charset="UTF-8"> <link rel="shortcut icon" type="image/x-icon" href="https://securityintelligence.com/wp-content/themes/sapphire/images/favicon.ico" sizes="32x32" /> <meta name="viewport" content="width=device-width,minimum-scale=1,initial-scale=1,maximum-scale=1"> <!-- DEFINITIONS --> <title>What does resilience in the cyber world look like in 2025 and beyond?</title> <!--<meta name="description" content="">--> <!-- THEME COLOR --> <meta name="theme-color" content="#000000"> <!-- REFERRER POLICY --> <meta name="referrer" content="no-referrer-when-downgrade"> <script src="https://1.www.s81c.com/common/stats/ibm-common.js" type="text/javascript" async="async"></script> <!-- LANGUAGE/TRANSLATIONS --> <!-- AMP SCRIPTS --> <script async src="https://cdn.ampproject.org/v0.js"></script> <script async custom-element="amp-list" src="https://cdn.ampproject.org/v0/amp-list-0.1.js"></script> <script async custom-template="amp-mustache" src="https://cdn.ampproject.org/v0/amp-mustache-0.2.js"></script> <script async custom-element="amp-accordion" src="https://cdn.ampproject.org/v0/amp-accordion-0.1.js"></script> <script custom-element="amp-animation" src="https://cdn.ampproject.org/v0/amp-animation-0.1.js" async></script> <script custom-element="amp-position-observer" src="https://cdn.ampproject.org/v0/amp-position-observer-0.1.js" async></script> <script async custom-element="amp-bind" src="https://cdn.ampproject.org/v0/amp-bind-0.1.js"></script> <script async custom-element="amp-autocomplete" src="https://cdn.ampproject.org/v0/amp-autocomplete-0.1.js"></script> <script async custom-element="amp-social-share" src="https://cdn.ampproject.org/v0/amp-social-share-0.1.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.35.0/card-section-simple.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/latest/card-section-simple.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/next/card-section-simple.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v2.11.0/card.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v2.11.0/image.min.js"></script> <script async custom-element="amp-lightbox-gallery" src="https://cdn.ampproject.org/v0/amp-lightbox-gallery-0.1.js"></script> <script src="https://unpkg.com/swiper/swiper-bundle.min.js"></script> <script async custom-element="amp-video" src="https://cdn.ampproject.org/v0/amp-video-0.1.js"></script> <script async custom-element="amp-youtube" src="https://cdn.ampproject.org/v0/amp-youtube-0.1.js"></script> <link rel="preload" as="image" href="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Phishing.-financial-concept.-Digital-payments-300x158.jpeg.webp" media="(max-width: 300px)"> <link rel="preload" as="image" href="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Phishing.-financial-concept.-Digital-payments-630x330.jpeg.webp" media="(max-width: 1200px) and (min-width: 301px)"> <link rel="preload" as="image" href="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Phishing.-financial-concept.-Digital-payments.jpeg.webp" media="(max-width: 2400px) and (min-width: 631px)"> <link rel="preload" as="image" href="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Phishing.-financial-concept.-Digital-payments.jpeg.webp" media="(max-width: 2400px) and (min-width: 1201px)"> <!-- FONTS --> <!-- <link rel="preload" href="https://fonts.googleapis.com/css?family=IBM+Plex+Sans+Condensed:300,400,500|IBM+Plex+Sans:300,400,500&display=swap" rel="stylesheet"> --> <!-- ANALYTICS --> <script> // Digital Registry digitalData = { "page": { "category": { "primaryCategory": "Risk Management" }, "pageInfo": { "language": "en-US", "country": "US", "version": "custom", "effectiveDate": "2024-11-22", "publishDate": "2024-11-22", "optimizely": { "enabled": "false", }, "ibm": { "contentDelivery": "WordPress", "contentProducer": "Hand coded", "owner": "", "siteID": "SECURITYINTELLIGENCE", "type": "Externals", } } } } // Custom Click Tagging // Collect and send clicks not detectable by ida_stats.js function sendClickTag(section, feature, destination) { console.log(section + " " + feature) var config = { type: 'ELEMENT', primaryCategory: section, // e_a1 - Element Category eventName: feature, // e_a2 - Element Name targetURL: destination, // e_a7 - Element Attribute: ibmEvTarget }; ibmStats.event(config); } // Custom Click Tagging // Collect and send clicks not detectable by ida_stats.js // function sendClickConversion(feature, title) { // var config = { // type : 'pageclick', // primaryCategory : 'PAGE CLICK', // eventCategoryGroup : "TIMELINE - SECURITY INTELLIGENCE", // eventName : feature, // targetTitle : title // }; // ibmStats.event(config); // } // Custom Link Event // Add clicktag event on every link inside the element function tagAllLinks(element, section, feature) { var element = document.querySelectorAll(element); if (typeof(element) != 'undefined' && element != null) { for (var i = 0; i < element.length; i++) { var elements = element[i].querySelectorAll("a:not(.btn)"); for (var o = 0; o < elements.length; o++) { if (elements[o].getAttribute('listener') !== 'true') { var destination = elements[o].getAttribute('href'); elements[o].addEventListener('click', function() { if (this.getAttribute('listener') === 'true') { sendClickTag(section, feature, this.getAttribute('href')); this.setAttribute('listener', 'false'); } }, false); elements[o].setAttribute('listener', 'true'); } } } } } window.onload = function() { // Call to action click tag var ctaButton = document.querySelectorAll(".single__content a"); if (typeof(ctaButton) != 'undefined' && ctaButton != null && ctaButton.length !== 0) { for (var i = 0; i < ctaButton.length; i++) { ctaButton[i].addEventListener('click', function() { if (this.getAttribute('listener') === 'true') { sendClickTag("BODY", "CALL TO ACTION"); this.setAttribute('listener', 'false'); } }, false); ctaButton[i].setAttribute('listener', 'true'); } } // Read more click tag var readButton = document.querySelectorAll(".continue-reading button"); if (typeof(readButton) != 'undefined' && readButton != null && readButton.length !== 0) { for (var i = 0; i < readButton.length; i++) { readButton[i].addEventListener('click', function() { if (this.getAttribute('listener') === 'true') { sendClickTag("BODY", "READ-MORE"); this.setAttribute('listener', 'false'); } }, false); readButton[i].setAttribute('listener', 'true'); } } // LISTICLES tag - Arrows //left arrow var leftArrow = document.getElementById("prev"); if (typeof(leftArrow) != 'undefined' && leftArrow != null) { //for (var i = 0; i < leftArrow.length; i++) { leftArrow.addEventListener('click', function() { if (this.getAttribute('listener') === 'true' && leftArrow.id == "prev") { sendClickTag("BODY", "LISTICLE-LEFT-ARROW"); this.setAttribute('listener', 'false'); } }, false); leftArrow.setAttribute('listener', 'true'); //} } //right arrow var rightArrow = document.getElementById("next"); if (typeof(rightArrow) != 'undefined' && rightArrow != null) { //for (var i = 0; i < rightArrow.length; i++) { rightArrow.addEventListener('click', function() { if (this.getAttribute('listener') === 'true' && rightArrow.id == "next") { sendClickTag("BODY", "LISTICLE-RIGHT-ARROW"); this.setAttribute('listener', 'false'); } }, false); rightArrow.setAttribute('listener', 'true'); //} } // LISTICLES tag - numbers var listicleTopButton = document.querySelectorAll(".listicle__pagination__numbers"); if (typeof(listicleTopButton) != 'undefined' && listicleTopButton != null && listicleTopButton.length !== 0) { for (var i = 0; i < listicleTopButton.length; i++) { var currentSlide = 1; listicleTopButton[i].addEventListener('click', function() { if (this.getAttribute('listener') === 'true') { currentSlide++; var total = i; // var clickedSlides=currentSlide/2; // console.log(clickedSlides.toFixed()); //I'm removing 2 because 2 arrows on the listicle are unclickable, but present on the DOM // clickableArrows = i-2; // clickableArrows = i-1; // I'm deviding by 2 because on each slide we have 2 arrows, so we were actually sendind the double of tags // clickableArrows= clickableArrows/2; // console.log(i); // clickableArrows.toFixed(); if (currentSlide <= total) { sendClickTag("PAGE CLICK", "LISTICLE-NAVIGATION-SLIDE" + currentSlide); this.setAttribute('listener', 'false'); } else { sendClickTag("PAGE CLICK", "LISTICLE-NAVIGATION-END"); this.setAttribute('listener', 'false'); } } }, false); listicleTopButton[i].setAttribute('listener', 'true'); } } // // Timeline box click tag // var boxButton = document.querySelectorAll(".timeline__content .box"); // if (typeof(boxButton) != 'undefined' && boxButton != null && boxButton.length !== 0) { // for (var i = 0; i < boxButton.length; i++) { // boxButton[i].addEventListener('click', function(){ // if (this.getAttribute('listener') === 'true') { // sendClickConversion("DETAILED VIEW", this.getAttribute('data-title')); // this.setAttribute('listener', 'false'); // } // }, false); // boxButton[i].setAttribute('listener', 'true'); // } // } }; </script> <!-- COREMETRICS --> <script defer src="https://1.www.s81c.com/common/stats/ida_stats.js" type="text/javascript"></script> <!-- AMP DEFAULT CSS --> <style amp-boilerplate> body { -webkit-animation: -amp-start 8s steps(1, end) 0s 1 normal both; -moz-animation: -amp-start 8s steps(1, end) 0s 1 normal both; -ms-animation: -amp-start 8s steps(1, end) 0s 1 normal both; animation: -amp-start 8s steps(1, end) 0s 1 normal both } @-webkit-keyframes -amp-start { from { visibility: hidden } to { visibility: visible } } @-moz-keyframes -amp-start { from { visibility: hidden } to { visibility: visible } } @-ms-keyframes -amp-start { from { visibility: hidden } to { visibility: visible } } @-o-keyframes -amp-start { from { visibility: hidden } to { visibility: visible } } @keyframes -amp-start { from { visibility: hidden } to { visibility: visible } } </style><noscript> <style amp-boilerplate> body { -webkit-animation: none; -moz-animation: none; -ms-animation: none; animation: none } </style> </noscript> <link rel="stylesheet" href="https://securityintelligence.com/wp-content/themes/sapphire/minifications/modules.css?v=1715191630"> <!-- CUSTOM CSS --> <meta name='robots' content='max-image-preview:large' /> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/securityintelligence.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.2"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://securityintelligence.com/wp-includes/css/dist/block-library/style.min.css?ver=6.6.2' type='text/css' media='all' /> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='taxonomy-image-plugin-public-css' href='https://securityintelligence.com/wp-content/plugins/taxonomy-images/css/style.css?ver=0.9.6' type='text/css' media='screen' /> <script type="text/javascript" src="https://securityintelligence.com/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://securityintelligence.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://securityintelligence.com/wp-content/themes/sapphire/app/javascript/si-theme-cookie.js?ver=6.6.2" id="si-cookie-consent-js"></script> <link rel="https://api.w.org/" href="https://securityintelligence.com/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://securityintelligence.com/wp-json/wp/v2/ibm_externals/448429" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://securityintelligence.com/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress 6.6.2" /> <link rel='shortlink' href='https://securityintelligence.com/?p=448429' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://securityintelligence.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fsecurityintelligence.com%2Farticles%2Fwhat-does-cyber-resilience-looks-like-in-2025-and-beyond%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://securityintelligence.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fsecurityintelligence.com%2Farticles%2Fwhat-does-cyber-resilience-looks-like-in-2025-and-beyond%2F&#038;format=xml" /> <link rel="icon" href="https://securityintelligence.com/wp-content/uploads/2016/04/SI_primary_rgb-80x80.png" sizes="32x32" /> <link rel="icon" href="https://securityintelligence.com/wp-content/uploads/2016/04/SI_primary_rgb.png" sizes="192x192" /> <link rel="apple-touch-icon" href="https://securityintelligence.com/wp-content/uploads/2016/04/SI_primary_rgb.png" /> <meta name="msapplication-TileImage" content="https://securityintelligence.com/wp-content/uploads/2016/04/SI_primary_rgb.png" /> <style amp-custom>@import url('https://fonts.googleapis.com/css?family=IBM+Plex+Sans:200,300,400,500,600');@import url('https://fonts.googleapis.com/css?family=IBM+Plex+Sans+Condensed:300,400,500,600,700');@import url('https://fonts.googleapis.com/css2?family=IBM+Plex+Serif&display=swap')</style><link rel="stylesheet" href="https://unpkg.com/swiper/swiper-bundle.min.css"><link rel="stylesheet" href="https://securityintelligence.com/wp-content/themes/sapphire/minifications/single.css?v=1722279696"> <!-- YOAST SEO --> <!-- This site is optimized with the Yoast SEO Premium plugin v13.1 - https://yoast.com/wordpress/plugins/seo/ --> <meta name="description" content="True cyber resilience demands more than just adapting to gen AI and data breaches: In the modern world, organizations must be ready to bounce back stronger."/> <meta name="robots" content="max-snippet:-1, max-image-preview:large, max-video-preview:-1"/> <link rel="canonical" href="https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="What does resilience in the cyber world look like in 2025 and beyond?" /> <meta property="og:description" content="True cyber resilience demands more than just adapting to gen AI and data breaches: In the modern world, organizations must be ready to bounce back stronger." /> <meta property="og:url" content="https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/" /> <meta property="og:site_name" content="Security Intelligence" /> <meta property="article:tag" content="generative ai" /> <meta property="article:tag" content="genai" /> <meta property="article:tag" content="breach data" /> <meta property="article:tag" content="cyber resilience" /> <meta property="article:section" content="Risk Management" /> <meta property="fb:app_id" content="3703311399714818" /> <meta property="og:image" content="https://securityintelligence.com/wp-content/uploads/2024/11/Banking.jpeg" /> <meta property="og:image:secure_url" content="https://securityintelligence.com/wp-content/uploads/2024/11/Banking.jpeg" /> <meta property="og:image:width" content="1200" /> <meta property="og:image:height" content="630" /> <meta name="twitter:card" content="summary" /> <meta name="twitter:description" content="True cyber resilience demands more than just adapting to gen AI and data breaches: In the modern world, organizations must be ready to bounce back stronger." /> <meta name="twitter:title" content="What does resilience in the cyber world look like in 2025 and beyond?" /> <meta name="twitter:image" content="https://securityintelligence.com/wp-content/uploads/2024/11/Banking.jpeg" /> <meta name="twitter:creator" content="@gplatsis" /> <script type='application/ld+json' class='yoast-schema-graph yoast-schema-graph--main'>{"@context":"https://schema.org","@graph":[{"@type":"WebSite","@id":"https://securityintelligence.com/#website","url":"https://securityintelligence.com/","name":"Security Intelligence","inLanguage":"en-US","description":"Analysis and Insight for Information Security Professionals","potentialAction":{"@type":"SearchAction","target":"https://securityintelligence.com/?s={search_term_string}","query-input":"required name=search_term_string"}},{"@type":"ImageObject","@id":"https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/#primaryimage","inLanguage":"en-US","url":"https://securityintelligence.com/wp-content/uploads/2024/11/Banking.jpeg","width":1200,"height":630,"caption":"A businessman walking through an office talking on a smartphone and carrying a folder"},{"@type":"WebPage","@id":"https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/#webpage","url":"https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/","name":"What does resilience in the cyber world look like in 2025 and beyond?","isPartOf":{"@id":"https://securityintelligence.com/#website"},"inLanguage":"en-US","primaryImageOfPage":{"@id":"https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/#primaryimage"},"datePublished":"2024-11-22T14:00:00+00:00","dateModified":"2024-11-22T14:05:24+00:00","description":"True cyber resilience demands more than just adapting to gen AI and data breaches: In the modern world, organizations must be ready to bounce back stronger."}]}</script> <!-- / Yoast SEO Premium plugin. --> </head> <body class="si_body" > <nav id="navigation" class="navigation navigation--homepage " aria-label="Security Intelligence"> <div class="container"> <div class="row"> <!-- LOGO --> <div class="navigation__brand"> <a href="https://securityintelligence.com" title="Security Intelligence" tabindex="1"> <amp-img width="280" height="31" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/logo-white.svg" alt="Security Intelligence Logo"> <div fallback> <h6>Security Intelligence</h6> </div> </amp-img> </a> </div> <!-- DESKTOP MENU - HOVER --> <div class="navigation__menu" onmouseleave="delete localStorage['megamenu-status']"> <a tabindex="2" id="nav-news" href="/news/" class="navigation__button " data-menu="megamenu__news" onclick="localStorage['megamenu-status'] = 'first-interaction';">News</a> <a tabindex="4" id="nav-topics" href="/category/topics/" class="navigation__button " data-menu="megamenu__topics" onclick="localStorage['megamenu-status'] = 'first-interaction';">Topics</a> <a tabindex="5" id="nav-x-force" href="/x-force/" class="navigation__button " data-menu="megamenu__threat" onclick="localStorage['megamenu-status'] = 'first-interaction';">X-Force</a> <a tabindex="6" id="nav-media" href="/media/" class="navigation__button " data-menu="megamenu__podcast" onclick="localStorage['megamenu-status'] = 'first-interaction';">Podcast</a> <button aria-label="search Button" class="navigation__search" onclick="document.getElementById('search__input').focus()" on="tap:search.toggleClass(class='megamenu__open')" role="link" tabindex="-1" type="button"> <amp-img tabindex="7" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" alt="Click to open the search bar"></amp-img> </button> </div> <!-- TABLET MENU - TAP/CLICK --> <div id="search-tablet" class="navigation__menu navigation__menu--tablet" tabindex="-1"> <button type="button" class="navigation__button " data-menu="megamenu__news">News</button> <button type="button" class="navigation__button " data-menu="megamenu__topics" on="tap:megamenu__news.hide, megamenu__series.hide, megamenu__topics.show, megamenu__industries.hide, megamenu__threat.hide, megamenu__podcast.hide, megamenu__events.hide, megamenu__mask.show" role="link" tabindex="0">Topics</button> <button type="button" class="navigation__button " data-menu="megamenu__threat" on="tap:megamenu__news.hide, megamenu__series.hide, megamenu__topics.hide, megamenu__industries.hide, megamenu__threat.show, megamenu__podcast.hide, megamenu__events.hide, megamenu__mask.show" role="link" tabindex="0">Threat Research</button> <button type="button" class="navigation__button " data-menu="megamenu__podcast" on="tap:megamenu__news.hide, megamenu__series.hide, megamenu__topics.hide, megamenu__industries.hide, megamenu__threat.hide, megamenu__podcast.show, megamenu__events.hide, megamenu__mask.show" role="link" tabindex="0">Podcast</button> <button type="button" aria-labelledby="search-tablet" class="navigation__search" onclick="document.getElementById('search__input').focus()" on="tap:search.toggleClass(class='megamenu__open')" role="link" tabindex="0"> <amp-img width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" alt="Search"></amp-img> </button> </div> <!-- SEARCH --> <form id="search" class="search " method="GET" action="/" target="_top" tabindex="-1"> <amp-autocomplete filter="prefix" src="https://securityintelligence.com/wp-content/themes/sapphire/app/jsons/suggestions.json" suggest-first submit-on-enter on="select:search.submit" tabindex="-1"> <input id="search__input" tabindex="-1" type="text" name="s" autocomplete="on" placeholder="What would you like to search for?" aria-label="Search" oninput="validateInput(this)" required> </amp-autocomplete> <button tabindex="-1" value="submit" type="submit" class="search__submit" aria-label="Click to search"> <amp-img width="20" height="20" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" alt="Search"></amp-img> <span>Search</span> </button> <button tabindex="-1" value="reset" class="search__close" type="reset" aria-labelledby="search" on="tap:search.toggleClass(class='megamenu__open')" role="link"> <amp-img width="14" height="14" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/close.svg" alt="Close"></amp-img> </button> </form> <!-- MEGAMENU --> <div id="navigation__mega"> <!-- NEWS --> <section id="megamenu__news" class="megamenu" data-menu="nav-news" on="tap:megamenu__news.show, megamenu__mask.show" role="link" tabindex="0"> <amp-list layout="responsive" width="1440" height="248" credentials="include" src="https://securityintelligence.com/wp-content/themes/sapphire/app/jsons/posts.php?quantity=4&type=ibm_news" binding="no"> <template type="amp-mustache"> <div class="row"> <!-- ARTICLES --> {{#articles}} <article class="megamenu__article"> <a href="{{permalink}}" class="megamenu__link"> <div class="megamenu__image"> <amp-img width="630" height="330" layout="responsive" src="{{image}}" alt="{{image_alt}}"></amp-img> </div> <h3 class="megamenu__title">{{title}}</h3> </a> </article> {{/articles}} <!-- VIEW MORE --> <a href="/news/" class="megamenu__more"> <amp-img width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/post-type-icons/news.svg" alt="News"></amp-img> <span>View All News</span> </a> </div> </template> </amp-list> </section> <!-- SERIES --> <!-- TOPICS --> <section id="megamenu__topics" class="megamenu" data-menu="nav-topics" on="tap: megamenu__topics.show, megamenu__mask.show" role="link" tabindex="0"> <div class="row"> <!-- LISTS --> <div class="megamenu__list"> <a href="/category/app-security/">Application Security</a> <a href="/category/artificial-intelligence/">Artificial Intelligence</a> <a href="/category/ciso-corner/">CISO</a> <a href="/category/cloud-protection/">Cloud Security</a> <a href="/category/data-protection/">Data Protection</a> <a href="/category/endpoint/">Endpoint</a> </div> <div class="megamenu__list"> <a href="/category/fraud-protection/">Fraud Protection</a> <a href="/category/identity-access/">Identity & Access</a> <a href="/category/incident-response/">Incident Response</a> <a href="/category/mainframe/">Mainframe</a> <a href="/category/network/">Network</a> <a href="/category/risk-management/">Risk Management</a> </div> <div class="megamenu__list"> <a href="/category/security-intelligence-analytics/">Intelligence & Analytics</a> <a href="/category/security-services/">Security Services</a> <a href="/category/threat-hunting/">Threat Hunting</a> <a href="/category/topics/zero-trust/">Zero Trust</a> <a href="/infographic-zero-trust-policy/">Infographic: Zero trust policy</a> <a href="/timeline/state-local-government-cyberattacks/">Timeline: Local Government Cyberattacks</a> </div> <div class="megamenu__list"> <span>Industries</span> <a href="/category/banking-financial-services-industry/">Banking & Finance</a> <a href="/category/energy-utility-industry/">Energy & Utility</a> <a href="/category/government/">Government</a> <a href="/category/health-care-industry/">Healthcare</a> </div> <!-- VIEW MORE --> <a href="/category/topics/" class="megamenu__more"> <amp-img width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/post-type-icons/topics.svg" alt="Topics"></amp-img> <span>View All Topics</span> </a> </div> </section> <!-- THREAT RESEARCH --> <section id="megamenu__threat" class="megamenu" data-menu="nav-x-force" on="tap:megamenu__threat.show, megamenu__mask.show" role="link" tabindex="0"> <amp-list layout="responsive" width="1440" height="248" credentials="include" src="https://securityintelligence.com/wp-content/themes/sapphire/app/jsons/posts.php?quantity=4&category=x-force" binding="no"> <template type="amp-mustache"> <div class="row"> <!-- ARTICLES --> {{#articles}} <article class="megamenu__article"> <a href="{{permalink}}" class="megamenu__link"> <div class="megamenu__image"> <amp-img width="630" height="330" layout="responsive" src="{{image}}" alt="{{image_alt}}"></amp-img> </div> <h3 class="megamenu__title">{{title}}</h3> </a> </article> {{/articles}} <!-- VIEW MORE --> <a href="/x-force/" class="megamenu__more"> <amp-img width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/post-type-icons/threat-research.svg" alt="Threat Research"></amp-img> <span>View More From X-Force</span> </a> </div> </template> </amp-list> </section> <!-- PODCAST --> <section id="megamenu__podcast" class="megamenu" data-menu="nav-media" on="tap:megamenu__podcast.show, megamenu__mask.show" role="link" tabindex="0"> <amp-list layout="responsive" width="1440" height="248" credentials="include" src="https://securityintelligence.com/wp-content/themes/sapphire/app/jsons/posts.php?quantity=4&type=ibm_media" binding="no"> <template type="amp-mustache"> <div class="row"> <!-- ARTICLES --> {{#articles}} <article class="megamenu__article"> <a href="{{permalink}}" class="megamenu__link"> <div class="megamenu__image"> <amp-img width="630" height="330" layout="responsive" src="{{image}}" alt="{{image_alt}}"></amp-img> </div> <h3 class="megamenu__title">{{title}}</h3> </a> </article> {{/articles}} <!-- VIEW MORE --> <a href="/media/" class="megamenu__more"> <amp-img width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/post-type-icons/podcast.svg" alt="Podcast"></amp-img> <span>View All Episodes</span> </a> </div> </template> </amp-list> </section> </div> <!-- MASK --> <div id="megamenu__mask" class="navigation__mask " hidden></div> <!-- MEGAMENU SCRIPTS --> <script type="text/javascript"> function validateInput(inputElement) { // Regular expression to allow only letters (both uppercase and lowercase) and numbers var regex = /^[A-Za-z0-9 ]*$/; // Get the current value of the input field var inputValue = inputElement.value; // Check if the input value matches the allowed pattern if (!regex.test(inputValue)) { // If the input contains special characters, remove them inputElement.value = inputValue.replace(/[^A-Za-z0-9 ]/g, ''); } } // DESKTOP MENU LINKS - HOVER ACTION var elementList = document.querySelectorAll('.navigation__menu .navigation__button'); for (i = 0; i < elementList.length; i++) { elementList[i].addEventListener('mouseenter', function() { if (localStorage['megamenu-status'] !== 'first-interaction') { var mega = document.getElementById("navigation__mega"); var menu_elements = document.getElementById(this.dataset.menu); var mask = document.getElementById("megamenu__mask"); menu_elements.click(); mega.classList.add('amp-open'); menu_elements.classList.add('amp-open'); mask.classList.add('amp-open'); } }); elementList[i].addEventListener('mouseleave', function() { if (localStorage['megamenu-status'] !== 'first-interaction') { var mega = document.getElementById("navigation__mega"); var menu_elements = document.getElementById(this.dataset.menu); var mask = document.getElementById("megamenu__mask"); mega.classList.remove('amp-open'); menu_elements.classList.remove('amp-open'); mask.classList.remove('amp-open'); } }); } // TABLET MENU LINKS - CLICK ACTION var elementList = document.querySelectorAll('.navigation__menu--tablet .navigation__button'); for (i = 0; i < elementList.length; i++) { elementList[i].addEventListener('click', function() { var mega = document.getElementById("navigation__mega"); var menu_elements = document.getElementById(this.dataset.menu); var mask = document.getElementById("megamenu__mask"); menu_elements.click(); mega.classList.add('amp-open'); menu_elements.classList.add('amp-open'); mask.classList.add('amp-open'); }); } // OPPENED MEGAMENU - HOVER ACTION var elementList = document.querySelectorAll('.megamenu'); for (i = 0; i < elementList.length; i++) { elementList[i].addEventListener('mouseenter', function() { var mega = document.getElementById("navigation__mega"); var nav_elements = document.getElementById(this.dataset.menu); var mask = document.getElementById("megamenu__mask"); this.classList.add('amp-open'); mega.classList.add('amp-open'); mask.classList.add('amp-open'); nav_elements.classList.add('amp-open'); }); elementList[i].addEventListener('mouseleave', function() { var mega = document.getElementById("navigation__mega"); var nav_elements = document.getElementById(this.dataset.menu); var mask = document.getElementById("megamenu__mask"); this.classList.remove('amp-open'); mega.classList.remove('amp-open'); mask.classList.remove('amp-open'); nav_elements.classList.remove('amp-open'); }); } </script> <!-- MOBILE ICON --> <button type="button" aria-labelledby="search-tablet" class="search__mobile__icon" onclick="document.getElementById('search__input').focus()" on="tap:search.toggleClass(class='megamenu__open')" role="link" tabindex="0"> <amp-img width="18" height="18" layout="fixed" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" alt="Search"></amp-img> </button> <div class="navigation__mobile-icon" on="tap:navigation__mobile.toggleVisibility, navigation__hamburguer.toggleVisibility, navigation__close.toggleVisibility " role="link" tabindex="0"> <amp-img id="navigation__hamburguer" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/hamburguer.svg" alt="Menu"></amp-img> <amp-img id="navigation__close" width="24" height="24" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/close.svg" alt="Close" hidden></amp-img> </div> <!-- MOBILE LIST --> <section id="navigation__mobile" class="navigation__mobile-list" hidden> <div class="container"> <a href="/news/">News</a> <!-- ACCORDIONS --> <amp-accordion disable-session-states> <!-- TOPICS --> <section class="navigation__accordion"> <h2>Topics</h2> <div class="navigation__accordion-content"> <div class="row"> <a href="/category/topics/">All Categories</a> <a href="/category/app-security/">Application Security</a> <a href="/category/identity-access/">Identity & Access</a> <a href="/category/artificial-intelligence/">Artificial Intelligence</a> <a href="/category/incident-response/">Incident Response</a> <a href="/category/ciso-corner/">CISO</a> <a href="/category/mainframe/">Mainframe</a> <a href="/category/cloud-protection/">Cloud Security</a> <a href="/category/mobile-security-podcasts/">Mobile Security</a> <a href="/category/data-protection/">Data Protection</a> <a href="/category/network/">Network</a> <a href="/category/endpoint/">Endpoint</a> <a href="/category/risk-management/">Risk Management</a> <a href="/category/fraud-protection/">Fraud Protection</a> <a href="/category/threat-hunting/">Threat Hunting</a> <a href="/category/security-services/">Security Services</a> <a href="/category/security-intelligence-analytics/">Security Intelligence & Analytics</a> </div> <div class="row"> <span>Industries</span> <a href="/category/industries/banking-financial-services-industry/">Banking & Finance</a> <a href="/category/energy-utility-industry/">Energy & Utility</a> <a href="/category/government/">Government</a> <a href="/category/health-care-industry/">Healthcare</a> </div> </div> </section> </amp-accordion> <a href="/x-force/">X-Force</a> <a href="/media/">Podcast</a> </section> </div> </div> </nav> <!-- BACK TO TOP --> <div class="scroll-to-top "> <!-- TOP VIEWER TRIGGER --> <div id="top-viewer" class="scroll-to-top__viewer"></div> <!-- BUTTON --> <div class="sticky" style="height: 100%;"> <button id="scrollToTopButton" on="tap:top-viewer.scrollTo(duration=200, position=bottom)" class="tap_target "> <div class="scroll-to-top__button"> <amp-img width="12" height="16" layout="fixed" alt="Back-to-top" src="https://securityintelligence.com/wp-content/themes/sapphire/images/scroll-to-top.svg"></amp-img> </div> </button> </div> <!-- SCROLL SHOW/HIDE ANIMATION --> <amp-animation id="showAnim" layout="nodisplay"> <script type="application/json"> { "duration": "200ms", "fill": "both", "iterations": "1", "direction": "alternate", "animations": [{ "selector": "#scrollToTopButton", "keyframes": [{ "opacity": "1", "visibility": "visible" }] }] } </script> </amp-animation> <amp-animation id="hideAnim" layout="nodisplay"> <script type="application/json"> { "duration": "200ms", "fill": "both", "iterations": "1", "direction": "alternate", "animations": [{ "selector": "#scrollToTopButton", "keyframes": [{ "opacity": "0", "visibility": "hidden" }] }] } </script> </amp-animation> </div> <!-- CHECK PAGE POSITION --> <amp-position-observer target="top-viewer" intersection-ratios="0" on="enter:hideAnim.start; exit:showAnim.start" layout="nodisplay"></amp-position-observer> <!-- SCHEMA --> <script id="post-schema" type="application/ld+json"> { "@context": "http://schema.org", "@type": "Article", "headline": "What does resilience in the cyber world look like in 2025 and beyond?", "mainEntityOfPage": "https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/", "author": { "@type": "Person", "name": "George Platsis" }, "datePublished": "2024-11-22T09:00:00-05:00", "dateModified": "2024-11-22T09:05:24-05:00", "publisher": { "@type": "Organization", "name": "Security Intelligence", "logo":{ "@type": "ImageObject", "url": "https://securityintelligence.com/wp-content/themes/security-intelligence/assets/img/logo.png" } }, "image": [ "https://securityintelligence.com/wp-content/uploads/2024/11/Banking-630x330.jpeg" ], "articleBody": "&lt;p&gt; &lt;/p&gt;&lt;p&gt;Back in 2021, we ran a series called “&lt;a href=&quot;https://www.securityintelligence.com/series/a-journey-in-organizational-resilience/&quot;&gt;A Journey in Organizational Resilience&lt;/a&gt;.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term &quot;resilience&quot; can be difficult to define, and when we define it, we may limit its scope, missing the big picture.&lt;/p&gt;&lt;p&gt;In the age of&lt;a href=&quot;https://newsroom.ibm.com/2024-08-05-ibm-introduces-new-generative-ai-powered-cybersecurity-assistant-for-threat-detection-and-response-services&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt; generative artificial intelligence&lt;/a&gt; (gen AI), the prevalence of &lt;a href=&quot;https://www.ibm.com/reports/data-breach?utm_content=SRCWW&amp;p1=Search&amp;p4=43700080542405598&amp;p5=e&amp;p9=58700008751471960&amp;gclid=CjwKCAjw5Ky1BhAgEiwA5jGujmdJZVXVeOpTMI3--fndHMKNDCPDH_VtDozyDsGH3IMpdSXDgnqUVhoC_ysQAvD_BwE&amp;gclsrc=aw.ds&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;breach data&lt;/a&gt; from infostealers and the near-constant demands on &lt;a href=&quot;https://www.ibm.com/services/incident-response&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;incident response&lt;/a&gt; teams, resilience (and, in a narrower scope, &lt;a href=&quot;https://www.ibm.com/topics/cyber-resilience&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;cyber resilience&lt;/a&gt;) will require significant attention due to the complexity of our systems.&lt;/p&gt;&lt;p&gt;We achieve this by &quot;working outside of our little sandbox&quot; and reducing the fragility that comes with complex systems.&lt;/p&gt;&lt;h2&gt;What does “resilience” mean to you?&lt;/h2&gt;&lt;p&gt;Resilience includes a wide variety of issues, including but not limited to resilient technology (&lt;a href=&quot;https://www.ibm.com/topics/backup-disaster-recovery&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;disaster recovery&lt;/a&gt; and backups), attitudes or coping capabilities on an individual or organizational level and the financial bottom line. Moreover, having the &lt;a href=&quot;https://securityintelligence.com/articles/ciso-success-more-than-tech-skills/&quot;&gt;management skills&lt;/a&gt; to accurately and convincingly communicate &lt;a href=&quot;https://securityintelligence.com/the-language-of-business-where-the-board-of-directors-and-security-leaders-can-meet/&quot;&gt;financial impacts&lt;/a&gt; or &lt;a href=&quot;https://securityintelligence.com/articles/mental-health-of-cybersecurity-risk-management/&quot;&gt;impacts on personnel&lt;/a&gt; after a technical shock or interruption, are also crucial elements of resilient behavior.&lt;/p&gt;&lt;p&gt;Therefore, let us widen the lens of “resilience” to mean something more closely related to the ability to manage and adapt to rapid changes, regardless of what causes them.&lt;/p&gt;&lt;p&gt;Using this framework, we can focus on three major emergent technology and data-focused issues impacting cyber resilience today:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.ibm.com/topics/generative-ai&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Generative AI&lt;/a&gt;: &lt;/strong&gt;a rapid change in technology and industry.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Breach data: &lt;/strong&gt;examples of mishaps and misfortunes, regardless of how they occurred (e.g., innocuous yet impactful losses of data versus nefarious acts of fraud and theft).&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.ibm.com/topics/incident-response&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Incident response&lt;/a&gt;:&lt;/strong&gt; an event that causes an immediate and impactful shock to business and operations.&lt;/li&gt;&lt;/ol&gt;&lt;h2&gt;Generative AI: A case of rapid change&lt;/h2&gt;&lt;p&gt;There are few better current-day examples that demonstrate the impact of an industry innovation than the &lt;a href=&quot;https://securityintelligence.com/x-force/are-you-prepared-for-genai-disruption/&quot;&gt;disruptiveness of gen AI&lt;/a&gt;. Its benefits are already employed by actors &lt;a href=&quot;https://securityintelligence.com/articles/chatgpt4-exploit-87-percent-vulnerabilities-really-impressive/&quot;&gt;both good and bad&lt;/a&gt;. Good implementation of gen AI (or similarly related AI tools) can result in increased productivity through &lt;a href=&quot;https://securityintelligence.com/articles/ai-cybersecurity-threat-detection-ransomware/&quot;&gt;better response to security events&lt;/a&gt;, whereas &lt;a href=&quot;https://securityintelligence.com/posts/how-to-embrace-secure-by-design-while-adopting-ai/&quot;&gt;poor implementation&lt;/a&gt; can result in financial loss, operational disruption and reputational damage — at minimum.&lt;/p&gt;&lt;p&gt;But with the most exciting innovations, adoption almost always outpaces adaptation. Visualize two acceleration curves: the top one, accelerating at a greater rate, represents adoption, while the lower one, accelerating at a lesser rate, represents adaptation. That gap between the curves represents the risk, or threat to resilience, being incurred.&lt;/p&gt;&lt;p&gt;In the gen AI space, business pressures demand adoption — almost any technology or service solution today comes with the “we use artificial intelligence” tag somewhere. But &lt;a href=&quot;https://securityintelligence.com/articles/gen-ai-next-ai-security-threat/&quot;&gt;security measures are consistently outpaced&lt;/a&gt; by adoption, especially when nefarious actors are using that same technology to help give themselves a &lt;a href=&quot;https://securityintelligence.com/articles/what-can-businesses-learn-from-rise-of-cyber-espionage/&quot;&gt;competitive advantage&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;So, what is a method to bridge that gap?&lt;/p&gt;&lt;p&gt;Determining &lt;a href=&quot;https://securityintelligence.com/articles/risk-management-building-fort-around-worlds-most-valuable-currency/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;risk tolerance&lt;/a&gt; is always the first step to maximizing your organization&#039;s resilience. In the case of gen AI&#039;s high-speed adoption, where there is a “build it while flying it” mantra, frameworks are particularly helpful. For example, IBM’s &lt;a href=&quot;https://www.ibm.com/blog/announcement/ibm-framework-for-securing-generative-ai/&quot;&gt;Framework for Securing Generative AI&lt;/a&gt; helps outline key principles, including:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Securing data&lt;/li&gt;&lt;li&gt;Securing models&lt;/li&gt;&lt;li&gt;Securing usage&lt;/li&gt;&lt;li&gt;Securing infrastructure&lt;/li&gt;&lt;li&gt;Establishing governance&lt;/li&gt;&lt;li&gt;Managing the pipeline&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;So far, this framework looks very much security-focused, and that would be a correct assessment. But to shift the focus back to the bigger picture, start by asking some of these questions:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Can we secure the data, models, usage and infrastructure in a timely and cost-effective manner?&lt;/li&gt;&lt;li&gt;Do we have the necessary controls and processes to establish and implement governance and manage the influx of data?&lt;/li&gt;&lt;li&gt;Is &lt;a href=&quot;https://securityintelligence.com/articles/cost-of-data-breaches-business-case-for-security-ai-automation/&quot;&gt;there a business case for adoption&lt;/a&gt;?&lt;/li&gt;&lt;li&gt;Have we considered the consequences of “too early” versus “too late” adoption?&lt;/li&gt;&lt;li&gt;Can we manage and recover from a gen AI failure, regardless of the source?&lt;/li&gt;&lt;li&gt;If it does fail, how do we get stronger from that lesson after recovery?&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;These types of questions can be useful during any type of rapid change. In the course of working towards the answers to your organizational needs, using the rule of “perfect is the enemy of good enough” can help move towards practical solutions. Moreover, in the case of a &lt;a href=&quot;https://www.ibm.com/topics/data-breach&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;data breach&lt;/a&gt; or other incident, answering these questions in advance can dramatically impact strategic and tactical response and recovery efforts.&lt;/p&gt;&lt;p&gt;[button link=&quot;https://www.ibm.com/account/reg/us-en/signup?formid=urx-52506&quot; color=&quot;orange1&quot; size=&quot;large&quot;]Understand cybersecurity and generative AI better[/button]&lt;/p&gt;&lt;h2&gt;Breach data: A case of mishaps and misfortunes&lt;/h2&gt;&lt;p&gt;The amount of data in the wild is concerning. While data has historically been thought of as an asset, it is now becoming a liability. The tendency to “hold on to everything” (e.g., for marketing or longer-term business prospects) can backfire long before the return is ever realized, which is all the more reason to implement better &lt;a href=&quot;https://securityintelligence.com/articles/data-destruction-importance-and-best-practices/&quot;&gt;data destruction&lt;/a&gt; policies and practices.&lt;/p&gt;&lt;p&gt;To give us a glimpse of the future, let us combine the cases of rapid change (gen AI) with mishaps and misfortune (breach data) to illustrate how your resilience will be tested. Tactics, techniques and procedures (TTPs) are changing because the breached data can be processed through artificial intelligence and &lt;a href=&quot;https://www.ibm.com/topics/machine-learning&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;machine learning&lt;/a&gt; capabilities, allowing the &lt;a href=&quot;https://www.ibm.com/topics/threat-actor&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;threat actor&lt;/a&gt; to create &lt;a href=&quot;https://www.ibm.com/topics/social-engineering&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;social engineering&lt;/a&gt; attacks that &lt;a href=&quot;https://securityintelligence.com/articles/ransomware-attacks-2021-information-meets-emotion/&quot;&gt;prey on emotions&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Why go through the difficult technical challenge of trying to break into a network when the easier route of duping an unsuspecting user can be even more effective? &lt;a href=&quot;https://securityintelligence.com/x-force/2024-x-force-threat-intelligence-index/&quot;&gt;As IBM’s 2024 X-Force Threat Intelligence Index identified&lt;/a&gt;, stolen credentials are the top threat for this year, which are being facilitated through the rise of infostealers.&lt;/p&gt;&lt;p&gt;If steps are not taken to clean up an individual’s and organization’s digital footprint, successful attacks can result in possible personal loss, privacy violations, financial costs, reputational costs, regulatory penalties and loss of confidence. In short, breach data in the wild becomes death by a thousand paper cuts. Can you recover from that?&lt;/p&gt;&lt;p&gt;The real resilience lesson in the case of a data breach is simple: How do you bounce back? One of the best tactics is to work backward from a worst-case scenario to identify gaps and consider the unthinkable. Questions worth asking:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;If all valuable data – personal information, intellectual property, trade secrets, sales information, strategy documents, etc. – made it out of their safe spaces for any reason, what would the immediate response look like?&lt;/li&gt;&lt;li&gt;What would the near-term and longer-term responses look like? Would a fundamental change in business be required?&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The reason to plan for a worst-case scenario is not to spread doom and gloom, nor is it worth obsessing over. Instead, working backward from a worst-case scenario challenges assumptions. There are many historical cases where organizations faced a “near death” situation (e.g., reputational damage, product recalls, customer confidence shattered, etc.). Still, these organizations turned the crisis into an opportunity to bounce back. Would you be able to survive a “near death” data situation? Ask that hard question.&lt;/p&gt;&lt;h2&gt;Incident response: A case of shock&lt;/h2&gt;&lt;p&gt;Even during the “quiet times,” incident responders &lt;a href=&quot;https://securityintelligence.com/articles/cyber-incident-response-day-in-the-life/&quot;&gt;do not have an easy work day&lt;/a&gt;. And even the best of them will not be able to &lt;a href=&quot;https://securityintelligence.com/articles/alert-fatigue-a-911-cyber-call-center-that-never-sleeps/&quot;&gt;push through the fatigue&lt;/a&gt; that can come with a significant shock, which worsens over time. That is the key, over time.&lt;/p&gt;&lt;p&gt;Unless faced with a catastrophic scenario that does not permit any bounce back at all, there will be a period when responders can attempt to respond, remediate and recover, even with minimal impact. But an organization cannot do that if it is already stretched thin, fatigued and unprepared for difficult disruptions. Do not underestimate fatigue and its impacts on &lt;a href=&quot;https://securityintelligence.com/articles/what-cybersecurity-pros-can-learn-from-first-responders/&quot;&gt;operations and mental health&lt;/a&gt;, especially when a &lt;a href=&quot;https://www.ibm.com/topics/security-operations-center&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;security operations center (SOC)&lt;/a&gt; sometimes &lt;a href=&quot;https://securityintelligence.com/articles/socs-spend-32-percent-day-incidents-pose-no-threat/&quot;&gt;spends up to a third of its time on incidents that pose no threat&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Effectively, even in the worst-case scenarios, the plan should be to survive the day, take it one step at a time and, if applicable, outlast the competition. Therefore, in the &lt;a href=&quot;https://securityintelligence.com/articles/incident-response-trifecta/&quot;&gt;people, process and technology trifecta&lt;/a&gt;, remaining resilient is very much part of the people and processes domains.&lt;/p&gt;&lt;h2&gt;2025 and beyond&lt;/h2&gt;&lt;p&gt;Moving into the future, it is not unreasonable to assume that technological dependency on others will increase. What that dependency looks like though will drive your resilience strategy. For example, will your organization invest in reasonable redundancies to quickly absorb disruptions? Or will the investment choice be focused on innovation, hoping that there is a greater return?&lt;/p&gt;&lt;p&gt;Ultimately, effectively practicing resilience strategies comes down to the ability to master the probable and manage the unpredictable.&lt;/p&gt;&lt;p&gt;It will always circle back to risk tolerance. Moreover, risk tolerance will be driven by business decisions that no longer can be made in isolation. If the executive, management, finance, delivery and technology teams are not talking to each other, along with any other vital stakeholders, any resilience strategy planned is doomed to failure.&lt;/p&gt;&lt;p&gt;In closing, here are a few key considerations if you and your organization wish to employ an effective resilience strategy:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Think big picture. If the “resilience strategy” is to make one area of the business resilient (e.g., high availability of information technology systems), that will not cut it for the future.&lt;/li&gt;&lt;li&gt;Just like cybersecurity, resilience planning will be &lt;a href=&quot;https://securityintelligence.com/articles/creating-culture-cybersecurity-at-work/&quot;&gt;driven by culture&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Which way are you going? Will your strategy move away from risk inheritance strategies (e.g., depending on others to facilitate delivery of mission-critical services), or will you ramp up the adoption of technologies designed to increase efficiency (e.g., higher dependency on third parties and services)? There is a trade-off. Choose wisely.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Resources for your cyber resilience strategy&lt;/h2&gt;&lt;p&gt;For more resources on how to improve your resilience strategy, the 2021 series covered:&lt;/p&gt;&lt;ul type=&quot;disc&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/articles/journey-organizational-resilience-part-1-human-factor/&quot;&gt;The human factor&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/articles/organizational-cyber-resilience-part-2-business-continuity/&quot;&gt;Business continuity&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/articles/organizational-cyber-resilience-part-3-disaster-recovery/&quot;&gt;Disaster recovery&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/articles/journey-organizational-resilience-crisis-management/&quot;&gt;Crisis management&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/articles/journey-organizational-resilience-governance/&quot;&gt;Governance&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/articles/journey-organizational-resilience-training-testing/&quot;&gt;Testing and training&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/articles/journey-organizational-resilience-privacy/&quot;&gt;Privacy&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/articles/journey-organizational-resilience-security-by-design/&quot;&gt;Security By design&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/posts/journey-organizational-resilience-supply-chain-third-parties/&quot;&gt;Supply chain and third parties&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/articles/organizational-resilience-data-life-cycle/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;The data lifecycle&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/articles/organizational-resilience-insider-threats/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Insider threats&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://securityintelligence.com/articles/organizational-resilience-geopolitical-socio-economic-trends-threats/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Socio-economic trends and threats&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Do not get caught up in minutia until you miss the big picture. Start asking the tough questions about your organization&#039;s overall resilience and cyber resilience strategies now, and you will be on the right path to a safer, stronger and more secure future.&lt;/p&gt;" } </script> <!-- BREADCRUMB SCHEMA --> <script id="post-schema" type="application/ld+json"> { "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Home", "item": "https://securityintelligence.com/" }, ] } </script> <div id="progressbar"> <amp-animation id="progress-animation" layout="nodisplay"> <script type="application/json"> { "duration": "1s", "iterations": "1", "fill": "both", "direction": "alternate", "animations": [{ "selector": "#progressbar", "keyframes": [{ "transform": "translateX(0)" }] }] } </script> </amp-animation> </div> <amp-position-observer target="post__content" intersection-ratios="0" viewport-margins="25vh 75vh" on="scroll:progress-animation.seekTo(percent=event.percent)" layout="nodisplay"></amp-position-observer> <div class="dark_background" style="background:black;"></div> <div class="container grid" style="background:black;"> <!-- Breadcrumbs --> <aside class="breadcrumbs "> <h1 class="breadcrumbs__page_title">What does resilience in the cyber world look like in 2025 and beyond?</h1> </aside> </div> <div class="container grid hero_background "> <div class="grid__content post "> <div class="post__thumbnail"> <amp-img alt="A businessman walking through an office talking on a smartphone and carrying a folder" width="1200" height="630" layout="responsive" src="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Banking-630x330.jpeg.webp" srcset="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Banking-300x158.jpeg.webp 300w, /wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Banking-630x330.jpeg.webp 630w, /wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Banking.jpeg.webp 1200w, /wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Banking.jpeg.webp 2400w"> <amp-img fallback alt="A businessman walking through an office talking on a smartphone and carrying a folder" width="1200" height="630" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Banking-630x330.jpeg" srcset="https://securityintelligence.com/wp-content/uploads/2024/11/Banking-300x158.jpeg 300w, https://securityintelligence.com/wp-content/uploads/2024/11/Banking-630x330.jpeg 630w, https://securityintelligence.com/wp-content/uploads/2024/11/Banking.jpeg 1200w, https://securityintelligence.com/wp-content/uploads/2024/11/Banking.jpeg 2400w"> </amp-img> </amp-img> </div> <div class="new_categoy"> <div class="category-container"> <div class="category"> <div class="theme"> <div class="form-check form-switch"> <div class="link-container"> <a href="#" class="theme-link" id="light-theme-link">Light</a> <a href="#" class="theme-link" id="dark-theme-link">Dark</a> </div> </div> </div> <hr class="separator"> <div class="author_date"> <div class="information"> <span class="date">November 22, 2024</span> <span class="author_category">By <a href="https://securityintelligence.com/author/george-platsis-2/" >George Platsis</a> </span> <span class="author_category"><span class="span-reading-time rt-reading-time"><span class="rt-label rt-prefix"></span> <span class="rt-time"> 6</span> <span class="rt-label rt-postfix">min read</span></span></span> </div> </div> <hr class="separator"> <div class="title"> <a href="https://securityintelligence.com/category/topics/risk-management/"><span class="name_category">Risk Management<br> </span></a> </div> <div class="social-container" style="visibility: hidden;"> <hr class="separator"> <div class="social"> <!-- Social ICONS --> <a href="https://twitter.com/intent/tweet?text=What does resilience in the cyber world look like in 2025 and beyond?&url=https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/" target="_blank" rel="noopener noreferrer"><amp-img class="arrow" layout="fixed" height="26" width="26" src="https://securityintelligence.com/wp-content/themes/sapphire/images/social-icons/twitter.svg" alt="twitter"></amp-img></a> <a href="https://www.linkedin.com/shareArticle?url=https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/" target="_blank" rel="noopener noreferrer"><amp-img class="arrow" layout="fixed" height="26" width="26" src="https://securityintelligence.com/wp-content/themes/sapphire/images/social-icons/linkedin.svg" alt="Linkedin" ></amp-img></a> <a href="https://www.facebook.com/sharer/sharer.php?u=https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/" target="_blank" rel="noopener noreferrer"><amp-img class="arrow" layout="fixed" height="26" width="26" src="https://securityintelligence.com/wp-content/themes/sapphire/images/social-icons/facebook.svg" alt="facebook"></amp-img></a> <a href="https://securityintelligence.com/articles/what-does-cyber-resilience-looks-like-in-2025-and-beyond/" target="_blank" rel="noopener noreferrer"><amp-img class="arrow" layout="fixed" height="26" width="26" src="https://securityintelligence.com/wp-content/themes/sapphire/images/social-icons/link.svg" alt="An arrow pointing up"></amp-img></a> </div> </div> </div> <script> window.addEventListener('scroll', function() { var category = document.querySelector('.category'); var scrollPosition = window.scrollY; if (scrollPosition >= 0) { category.classList.add('sticky'); } else { category.classList.remove('sticky'); } }); // Function to set the light theme function setLightTheme(event, toSaveLocalStorage = true) { event.preventDefault(); const body = document.body; body.classList.remove('dark-theme'); // Save the user's theme preference in localStorage if (toSaveLocalStorage && !location.href.includes("/x-force/")) { setSiTheme('light'); } } // Function to set the dark theme function setDarkTheme(event, toSaveLocalStorage = true) { event.preventDefault(); const body = document.body; body.classList.add('dark-theme'); // Save the user's theme preference in localStorage if (toSaveLocalStorage && !location.href.includes("/x-force/")) { setSiTheme('dark'); } } // Add click event listeners to the theme links document.getElementById('light-theme-link').addEventListener('click', (event) => setLightTheme(event)); document.getElementById('dark-theme-link').addEventListener('click', (event) => setDarkTheme(event)); // Check localStorage to set the initial theme preference const themePreference = localStorage.getItem('si-theme-mode'); // Function to simulate a click event function simulateClick(handler, toSaveLocalStorage) { const event = new Event('click'); handler(event, toSaveLocalStorage); } // Apply the correct theme based on URL and preference if (location.href.includes("/x-force/")) { simulateClick(setDarkTheme, false); // Apply the dark theme for all x-force posts } else if (themePreference === 'dark') { simulateClick(setDarkTheme, true); // Apply the dark theme based on user preference } else if (themePreference === 'light') { simulateClick(setLightTheme, true); // Apply the light theme based on user preference (default) } else { simulateClick(setLightTheme, true); // Apply the light theme by default } </script> <script> const cookies = JSON.parse(localStorage.getItem("truste.eu.cookie.notice_preferences")); if (cookies && cookies.value === '2:') { document.querySelector('.social-container').style.visibility = 'visible'; } </script> </div> <main class="post__content post__content--continue_reading" id="post__content"> <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd"> <html><body><p>&nbsp;</p> <p>Back in 2021, we ran a series called &ldquo;<a href="https://www.securityintelligence.com/series/a-journey-in-organizational-resilience/" >A Journey in Organizational Resilience</a>.&rdquo; These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term &ldquo;resilience&rdquo; can be difficult to define, and when we define it, we may limit its scope, missing the big picture.</p> <p>In the age of<a href="https://newsroom.ibm.com/2024-08-05-ibm-introduces-new-generative-ai-powered-cybersecurity-assistant-for-threat-detection-and-response-services" target="_blank" rel="noopener nofollow" > generative artificial intelligence</a> (gen AI), the prevalence of <a href="https://www.ibm.com/reports/data-breach?utm_content=SRCWW&amp;p1=Search&amp;p4=43700080542405598&amp;p5=e&amp;p9=58700008751471960&amp;gclid=CjwKCAjw5Ky1BhAgEiwA5jGujmdJZVXVeOpTMI3--fndHMKNDCPDH_VtDozyDsGH3IMpdSXDgnqUVhoC_ysQAvD_BwE&amp;gclsrc=aw.ds" target="_blank" rel="noopener nofollow" >breach data</a> from infostealers and the near-constant demands on <a href="https://www.ibm.com/services/incident-response" target="_blank" rel="noopener nofollow" >incident response</a> teams, resilience (and, in a narrower scope, <a href="https://www.ibm.com/topics/cyber-resilience" target="_blank" rel="noopener nofollow" >cyber resilience</a>) will require significant attention due to the complexity of our systems.</p> <p>We achieve this by &ldquo;working outside of our little sandbox&rdquo; and reducing the fragility that comes with complex systems.</p> <h2>What does &ldquo;resilience&rdquo; mean to you?</h2> <p>Resilience includes a wide variety of issues, including but not limited to resilient technology (<a href="https://www.ibm.com/topics/backup-disaster-recovery" target="_blank" rel="noopener nofollow" >disaster recovery</a> and backups), attitudes or coping capabilities on an individual or organizational level and the financial bottom line. Moreover, having the <a href="https://securityintelligence.com/articles/ciso-success-more-than-tech-skills/" >management skills</a> to accurately and convincingly communicate <a href="https://securityintelligence.com/the-language-of-business-where-the-board-of-directors-and-security-leaders-can-meet/" >financial impacts</a>&nbsp;or <a href="https://securityintelligence.com/articles/mental-health-of-cybersecurity-risk-management/" >impacts on personnel</a> after a technical shock or interruption, are also&nbsp;crucial elements of resilient behavior.</p> <p>Therefore, let us&nbsp;widen the lens of &ldquo;resilience&rdquo; to mean something more closely related to the ability to manage and adapt to rapid changes, regardless of what causes them.</p> <p>Using this framework, we can&nbsp;focus on three major&nbsp;emergent technology and data-focused issues impacting cyber resilience today:</p> <ol> <li><strong><a href="https://www.ibm.com/topics/generative-ai" target="_blank" rel="noopener nofollow" >Generative AI</a>: </strong>a rapid change in technology and industry.</li> <li><strong>Breach data: </strong>examples of mishaps and misfortunes, regardless of how they occurred (e.g., innocuous yet impactful losses of data versus nefarious acts of fraud and theft).</li> <li><strong><a href="https://www.ibm.com/topics/incident-response" target="_blank" rel="noopener nofollow" >Incident response</a>:</strong> an event that causes an immediate and impactful shock to business and operations.</li> </ol> <h2>Generative AI: A case of rapid change</h2> <p>There are few better current-day examples that demonstrate the impact of an industry innovation than the <a href="https://securityintelligence.com/x-force/are-you-prepared-for-genai-disruption/" >disruptiveness of gen AI</a>. Its benefits are already employed by actors <a href="https://securityintelligence.com/articles/chatgpt4-exploit-87-percent-vulnerabilities-really-impressive/" >both good and bad</a>. Good implementation of gen AI (or similarly related AI tools) can result in increased productivity through <a href="https://securityintelligence.com/articles/ai-cybersecurity-threat-detection-ransomware/" >better response to security events</a>, whereas <a href="https://securityintelligence.com/posts/how-to-embrace-secure-by-design-while-adopting-ai/" >poor implementation</a> can result in financial loss, operational disruption and reputational damage &mdash; at minimum.</p> <p>But&nbsp;with the most exciting innovations, adoption almost always outpaces adaptation. Visualize two acceleration curves: the top one, accelerating at a greater rate, represents adoption, while the lower one, accelerating at a lesser rate, represents adaptation. That gap between the curves represents the risk, or threat to resilience, being incurred.</p> <p>In the gen AI space, business pressures demand adoption &mdash; almost any technology or service solution today comes with the &ldquo;we use artificial intelligence&rdquo; tag somewhere. But <a href="https://securityintelligence.com/articles/gen-ai-next-ai-security-threat/" >security measures are consistently outpaced</a> by adoption, especially when nefarious actors are using that same technology to help give themselves a <a href="https://securityintelligence.com/articles/what-can-businesses-learn-from-rise-of-cyber-espionage/" >competitive advantage</a>.</p> <p>So, what is a method to bridge that gap?</p> <p>Determining <a href="https://securityintelligence.com/articles/risk-management-building-fort-around-worlds-most-valuable-currency/" target="_blank" rel="noopener nofollow" >risk tolerance</a> is always the first step to maximizing your organization&rsquo;s resilience. In the case of gen AI&rsquo;s high-speed adoption, where there is a &ldquo;build it while flying it&rdquo; mantra, frameworks are particularly helpful. For example, IBM&rsquo;s <a href="https://www.ibm.com/blog/announcement/ibm-framework-for-securing-generative-ai/" >Framework for Securing Generative AI</a> helps outline key principles, including:</p> <ul> <li>Securing data</li> <li>Securing models</li> <li>Securing usage</li> <li>Securing infrastructure</li> <li>Establishing governance</li> <li>Managing the pipeline</li> </ul> <p>So far, this framework looks very much security-focused, and that would be a correct assessment. But to shift the focus back to the bigger picture, start by asking some of these questions:</p> <ul> <li>Can we secure the data, models, usage and infrastructure in a timely and cost-effective manner?</li> <li>Do we have the necessary controls and processes to establish and implement governance and manage the influx of data?</li> <li>Is <a href="https://securityintelligence.com/articles/cost-of-data-breaches-business-case-for-security-ai-automation/" >there a business case for adoption</a>?</li> <li>Have we considered the consequences of &ldquo;too early&rdquo; versus &ldquo;too late&rdquo; adoption?</li> <li>Can we manage and recover from a gen AI failure, regardless of the source?</li> <li>If it does fail, how do we get stronger from that lesson after recovery?</li> </ul> <p>These types of questions can be useful during any type of rapid change. In the course of working towards the answers to your organizational needs, using the rule of &ldquo;perfect is the enemy of good enough&rdquo; can help move towards practical solutions. Moreover, in the case of a <a href="https://www.ibm.com/topics/data-breach" target="_blank" rel="noopener nofollow" >data breach</a> or other incident, answering these questions in advance can dramatically impact strategic and tactical response and recovery efforts.</p> <a class="btn orange1 large" href="https://www.ibm.com/account/reg/us-en/signup?formid=urx-52506" >Understand cybersecurity and generative AI better</a> <h2>Breach data: A case of mishaps and misfortunes</h2> <p>The amount of data in the wild is concerning. While data has historically been thought of as an asset, it is now becoming a liability. The tendency to &ldquo;hold on to everything&rdquo; (e.g., for marketing or longer-term business prospects) can backfire long before the return is ever realized, which is all the more reason to implement better <a href="https://securityintelligence.com/articles/data-destruction-importance-and-best-practices/" >data destruction</a> policies and practices.</p> <p>To give us a glimpse of the future, let us combine the cases of rapid change (gen AI) with mishaps and misfortune (breach data) to illustrate how your resilience will be tested. Tactics, techniques and procedures (TTPs) are changing because the breached data can be processed through artificial intelligence and <a href="https://www.ibm.com/topics/machine-learning" target="_blank" rel="noopener nofollow" >machine learning</a> capabilities, allowing the <a href="https://www.ibm.com/topics/threat-actor" target="_blank" rel="noopener nofollow" >threat actor</a> to create <a href="https://www.ibm.com/topics/social-engineering" target="_blank" rel="noopener nofollow" >social engineering</a> attacks that <a href="https://securityintelligence.com/articles/ransomware-attacks-2021-information-meets-emotion/" >prey on emotions</a>.</p> <p>Why go through the difficult technical challenge of trying to break into a network when the easier route of duping an unsuspecting user can be even more effective? <a href="https://securityintelligence.com/x-force/2024-x-force-threat-intelligence-index/" >As IBM&rsquo;s 2024 X-Force Threat Intelligence Index identified</a>, stolen credentials are the top threat for this year, which are being facilitated through the rise of infostealers.</p> <p>If steps are not taken to clean up an individual&rsquo;s and organization&rsquo;s digital footprint, successful attacks can result in possible personal loss, privacy violations, financial costs, reputational costs, regulatory penalties and loss of confidence. In short, breach data in the wild becomes death by a thousand paper cuts. Can you recover from that?</p> <p>The real resilience lesson in the case of a data breach is simple: How do you bounce back? One of the best tactics is to work backward from a worst-case scenario to identify gaps and consider the unthinkable. Questions worth asking:</p> <ul> <li>If all valuable data &ndash; personal information, intellectual property, trade secrets, sales information, strategy documents, etc. &ndash; made it out of their safe spaces for any reason, what would the immediate response look like?</li> <li>What would the near-term and longer-term responses look like? Would a fundamental change in business be required?</li> </ul> <p>The reason to plan&nbsp;for a worst-case scenario is not to spread doom and gloom, nor is it worth obsessing over. Instead, working backward from a worst-case scenario challenges assumptions. There are many historical cases where organizations faced a &ldquo;near death&rdquo; situation (e.g., reputational damage, product recalls, customer confidence shattered, etc.). Still, these organizations turned the crisis into an opportunity to bounce back. Would you be able to survive a &ldquo;near death&rdquo; data situation? Ask that hard question.</p> <h2>Incident response: A case of shock</h2> <p>Even during the &ldquo;quiet times,&rdquo; incident responders <a href="https://securityintelligence.com/articles/cyber-incident-response-day-in-the-life/" >do not have an easy work day</a>. And even the best of them will not be able to <a href="https://securityintelligence.com/articles/alert-fatigue-a-911-cyber-call-center-that-never-sleeps/" >push through the fatigue</a> that can come with a significant shock, which worsens&nbsp;over time. That is the key, over time.</p> <p>Unless faced with a catastrophic scenario that does not permit any bounce back at all, there will be a period when responders can attempt to respond, remediate and recover, even with minimal impact. But an organization cannot do that if it is already stretched thin, fatigued and unprepared for difficult disruptions. Do not underestimate fatigue and its impacts on <a href="https://securityintelligence.com/articles/what-cybersecurity-pros-can-learn-from-first-responders/" >operations and mental health</a>, especially when a <a href="https://www.ibm.com/topics/security-operations-center" target="_blank" rel="noopener nofollow" >security operations center (SOC)</a> sometimes <a href="https://securityintelligence.com/articles/socs-spend-32-percent-day-incidents-pose-no-threat/" >spends up to a third of its time on incidents that pose no threat</a>.</p> <p>Effectively, even in the worst-case scenarios, the plan should be to survive the day, take it one step at a time and, if applicable, outlast the competition. Therefore, in the <a href="https://securityintelligence.com/articles/incident-response-trifecta/" >people, process and technology trifecta</a>, remaining resilient is very much part of the people and processes domains.</p> <h2>2025 and beyond</h2> <p>Moving into the future, it is not unreasonable to assume that technological dependency on others will increase. What that dependency looks like though will drive your resilience strategy. For example, will your organization invest in reasonable redundancies to quickly absorb disruptions? Or will the investment choice be focused on innovation, hoping that there is a greater return?</p> <p>Ultimately, effectively practicing resilience strategies comes down to the ability to master the probable and manage the unpredictable.</p> <p>It will always circle back to risk tolerance. Moreover, risk tolerance will be driven by business decisions that no longer can be made in isolation. If the executive, management, finance, delivery and technology teams are not talking to each other, along with any other vital stakeholders, any resilience strategy planned is doomed to failure.</p> <p>In closing, here are a few key considerations if you and your organization wish to employ an effective resilience strategy:</p> <ul> <li>Think big picture. If the &ldquo;resilience strategy&rdquo; is to make one area of the business resilient (e.g., high availability of information technology&nbsp;systems), that will not cut it for the future.</li> <li>Just like cybersecurity, resilience planning will be <a href="https://securityintelligence.com/articles/creating-culture-cybersecurity-at-work/" >driven by culture</a>.</li> <li>Which way are you going? Will your strategy move away from risk inheritance strategies (e.g., depending on others to facilitate delivery of mission-critical services), or will you ramp up the adoption of technologies designed to increase efficiency (e.g., higher dependency on third parties and services)? There is a trade-off. Choose wisely.</li> </ul> <h2>Resources for your cyber resilience strategy</h2> <p>For more resources on how to improve your resilience strategy, the 2021&nbsp;series covered:</p> <ul type="disc"> <li><a href="https://securityintelligence.com/articles/journey-organizational-resilience-part-1-human-factor/" >The human factor</a></li> <li><a href="https://securityintelligence.com/articles/organizational-cyber-resilience-part-2-business-continuity/" >Business continuity</a></li> <li><a href="https://securityintelligence.com/articles/organizational-cyber-resilience-part-3-disaster-recovery/" >Disaster recovery</a></li> <li><a href="https://securityintelligence.com/articles/journey-organizational-resilience-crisis-management/" >Crisis management</a></li> <li><a href="https://securityintelligence.com/articles/journey-organizational-resilience-governance/" >Governance</a></li> <li><a href="https://securityintelligence.com/articles/journey-organizational-resilience-training-testing/" >Testing and training</a></li> <li><a href="https://securityintelligence.com/articles/journey-organizational-resilience-privacy/" >Privacy</a></li> <li><a href="https://securityintelligence.com/articles/journey-organizational-resilience-security-by-design/" >Security By design</a></li> <li><a href="https://securityintelligence.com/posts/journey-organizational-resilience-supply-chain-third-parties/" >Supply chain and third parties</a></li> <li><a href="https://securityintelligence.com/articles/organizational-resilience-data-life-cycle/" target="_blank" rel="noopener nofollow" >The data lifecycle</a></li> <li><a href="https://securityintelligence.com/articles/organizational-resilience-insider-threats/" target="_blank" rel="noopener nofollow" >Insider threats</a></li> <li><a href="https://securityintelligence.com/articles/organizational-resilience-geopolitical-socio-economic-trends-threats/" target="_blank" rel="noopener nofollow" >Socio-economic trends and threats</a></li> </ul> <p>Do not get caught up in minutia until you miss the big picture. Start asking the tough questions about your organization&rsquo;s overall resilience and cyber resilience strategies now, and you will be on the right path to a safer, stronger and more secure future.</p> </body></html> <div id="nc_pixel"></div><div class="post__tags"> <a href="https://securityintelligence.com/tag/generative-ai/" rel="tag">generative ai</a><span>&nbsp;|&nbsp;</span><a href="https://securityintelligence.com/tag/genai/" rel="tag">genai</a><span>&nbsp;|&nbsp;</span><a href="https://securityintelligence.com/tag/breach-data/" rel="tag">breach data</a><span>&nbsp;|&nbsp;</span><a href="https://securityintelligence.com/tag/cyber-resilience/" rel="tag">cyber resilience</a></div> <div class="post__author author "> <div class="author__box"> <div class="author__photo" style="background-image: url(https://securityintelligence.com/wp-content/uploads/2019/08/hills20190627-fti-400_square-crop.jpg);"></div> <div class="author__infos"> <div class="author__name"><a href="https://securityintelligence.com/author/george-platsis-2/" >George Platsis</a></div> <div class="author__role">Senior Director, Educator and Author</div> </div> </div> </div> <!-- CONTINUE READING --> <style type="text/css"> .post__content--continue_reading{ max-height: 725px; overflow:hidden; transition: max-height cubic-bezier(0.9, 0, 1, 1) 2s; } @media (max-width: 768px) { .post__content--continue_reading{ max-height: 1225px; } } </style> <div class="continue_reading_wrapper" id="continue_reading"> <button on="tap: post__content.toggleClass(class=post__content--continue_reading), continue_reading.toggleClass(class=continue_reading_wrapper--clicked)" tabindex="0" role="button">Continue Reading</button> </div> </main> </div> </div> <aside class="grid__sidebar post__sidebar "> <div class="mobile_divider"></div> <header class="post__sidebar__header">POPULAR</header> <!-- ARTICLES --> <article class="article article_grid article__mobile--card"> <!-- IMG --> <a class="exclusive_article__category_link" href="https://securityintelligence.com/articles/what-telegrams-recent-policy-shift-means-for-cyber-crime/" aria-label="What Telegram’s recent policy shift means for cyber crime"> <div class="article__img"> <amp-img alt="" width="1200" height="630" layout="responsive" src="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/A-dark-mystery-hand-typing-on-a-laptop-computer-at-night-630x330.jpeg.webp"> <amp-img fallback alt="" width="1200" height="630" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/A-dark-mystery-hand-typing-on-a-laptop-computer-at-night-630x330.jpeg"> </amp-img> </amp-img> </div> </a> <!-- TXT --> <div class="article__text_container" style="-webkit-box-orient: vertical;"> <!-- CAT --> <a class="article__category_link" href="https://securityintelligence.com/category/topics/risk-management/" aria-label="https://securityintelligence.com/category/topics/risk-management/"> Risk Management </a> <!-- DATE --> <span class="article__date"> November 6, 2024 </span> <!-- TITLE & EXCERPT --> <a href="https://securityintelligence.com/articles/what-telegrams-recent-policy-shift-means-for-cyber-crime/" class="article__content_link" aria-label="What Telegram’s recent policy shift means for cyber crime"> <h2 class="article__title">What Telegram’s recent policy shift means for cyber crime</h2> <p class="article__excerpt" style="-webkit-box-orient: vertical;"> <span class="article__read_time"><span class="span-reading-time rt-reading-time"><span class="rt-label rt-prefix"></span> <span class="rt-time"> 4</span> <span class="rt-label rt-postfix">min read</span></span> - </span>Since its launch in August 2013, Telegram has become the go-to messaging app for privacy-focused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain&hellip; </p> </a> </div> </article> <article class="article article_grid article__mobile--card"> <!-- IMG --> <a class="exclusive_article__category_link" href="https://securityintelligence.com/articles/cybersecurity-dominates-concerns-c-suite-small-businesses-nation/" aria-label="Cybersecurity dominates concerns among the C-suite, small businesses and the nation"> <div class="article__img"> <amp-img alt="A young man & woman working behind the counter in a music store" width="1200" height="630" layout="responsive" src="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Young-couple-working-behind-counter-in-music-store-630x330.jpeg.webp"> <amp-img fallback alt="A young man & woman working behind the counter in a music store" width="1200" height="630" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Young-couple-working-behind-counter-in-music-store-630x330.jpeg"> </amp-img> </amp-img> </div> </a> <!-- TXT --> <div class="article__text_container" style="-webkit-box-orient: vertical;"> <!-- CAT --> <a class="article__category_link" href="https://securityintelligence.com/category/topics/risk-management/" aria-label="https://securityintelligence.com/category/topics/risk-management/"> Risk Management </a> <!-- DATE --> <span class="article__date"> November 15, 2024 </span> <!-- TITLE & EXCERPT --> <a href="https://securityintelligence.com/articles/cybersecurity-dominates-concerns-c-suite-small-businesses-nation/" class="article__content_link" aria-label="Cybersecurity dominates concerns among the C-suite, small businesses and the nation"> <h2 class="article__title">Cybersecurity dominates concerns among the C-suite, small businesses and the nation</h2> <p class="article__excerpt" style="-webkit-box-orient: vertical;"> <span class="article__read_time"><span class="span-reading-time rt-reading-time"><span class="rt-label rt-prefix"></span> <span class="rt-time"> 4</span> <span class="rt-label rt-postfix">min read</span></span> - </span>Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise&hellip; </p> </a> </div> </article> <article class="article article_grid article__mobile--card"> <!-- IMG --> <a class="exclusive_article__category_link" href="https://securityintelligence.com/x-force/strela-stealer-todays-invoice-tomorrows-phish/" aria-label="Strela Stealer: Today&#8217;s invoice is tomorrow&#8217;s phish"> <div class="article__img"> <amp-img alt="closeup on a digital screen with a red envelope & the word phishing in yellow & 2 yellow warning symbols" width="1200" height="630" layout="responsive" src="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Phishing.-financial-concept.-Digital-payments-630x330.jpeg.webp"> <amp-img fallback alt="closeup on a digital screen with a red envelope & the word phishing in yellow & 2 yellow warning symbols" width="1200" height="630" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Phishing.-financial-concept.-Digital-payments-630x330.jpeg"> </amp-img> </amp-img> </div> </a> <!-- TXT --> <div class="article__text_container" style="-webkit-box-orient: vertical;"> <!-- CAT --> <a class="article__category_link" href="https://securityintelligence.com/category/x-force/threat-intelligence/" aria-label="https://securityintelligence.com/category/x-force/threat-intelligence/"> Threat Intelligence </a> <!-- DATE --> <span class="article__date"> November 12, 2024 </span> <!-- TITLE & EXCERPT --> <a href="https://securityintelligence.com/x-force/strela-stealer-todays-invoice-tomorrows-phish/" class="article__content_link" aria-label="Strela Stealer: Today&#8217;s invoice is tomorrow&#8217;s phish"> <h2 class="article__title">Strela Stealer: Today&#8217;s invoice is tomorrow&#8217;s phish</h2> <p class="article__excerpt" style="-webkit-box-orient: vertical;"> <span class="article__read_time"><span class="span-reading-time rt-reading-time"><span class="rt-label rt-prefix"></span> <span class="rt-time"> 12</span> <span class="rt-label rt-postfix">min read</span></span> - </span>As of November 2024, IBM X-Force has tracked ongoing Hive0145 campaigns delivering Strela Stealer malware to victims throughout Europe &ndash; primarily Spain, Germany and Ukraine. The phishing emails used in these campaigns are real invoice notifications, which have been stolen&hellip; </p> </a> </div> </article> <!-- ADVERTISEMENT --> <div class="billboard_wrapper"> <a href="https://www.ibm.com/reports/data-breach?utm_medium=OSocial&utm_source=Blog&utm_content=RSRWW&utm_id=si-blog-right-rail " aria-label="A SPONSORED flag "> <amp-img layout='responsive' widht='300' height='250' src="https://securityintelligence.com/wp-content/uploads/2024/07/SIB_CODB_rightrail_banners2024-think_600x1200.png" alt="CODB right rail banner with red, blue, &amp; purple lines in a wide circular pattern"> </amp-img> </a> </div> </aside> </div> <script> const kaltura = document.querySelectorAll("[data-widget=\"videoplayer\"]") if (kaltura != null) { kaltura.forEach(function(item){ const kId = item.id + '--' + item.dataset.videoid; document.getElementById(item.id).id = kId; getKalturaVideo(item); }) } </script> <div class="card_container_background "> <section class="container cards"> <h3>More from Risk Management</h3> <div class="cards__wrapper"> <article class="article article--card cards__article_grid "> <!-- IMG --> <a class="exclusive_article__category_link" href="https://securityintelligence.com/articles/airplane-cybersecurity-past-present-future/"> <div class="article__img"> <amp-img alt="In the cockpit of a commercial airplane a pilot is switching on controls" width="1200" height="630" layout="responsive" src="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Pilot-Switching-a-Control-in-the-Cockpit-of-a-Commercial-Aeroplane-630x330.jpeg.webp"> <amp-img fallback alt="In the cockpit of a commercial airplane a pilot is switching on controls" width="1200" height="630" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Pilot-Switching-a-Control-in-the-Cockpit-of-a-Commercial-Aeroplane-630x330.jpeg"> </amp-img> </amp-img> </div> </a> <!-- TXT --> <div class="article__text_container" style="-webkit-box-orient: vertical;"> <!-- CAT AND DATE --> <div class="article__eyebrow"> <span class="article__date"> November 21, 2024 </span> </div> <!-- TITLE & EXCERPT --> <a href="https://securityintelligence.com/articles/airplane-cybersecurity-past-present-future/" class="article__content_link"> <div class="article__direction"> <h2 class="article__title"> Airplane cybersecurity: Past, present, future </h2> <p class="article__excerpt" style="-webkit-box-orient: vertical;"> <span class="article__read_time"><span class="span-reading-time rt-reading-time"><span class="rt-label rt-prefix"></span> <span class="rt-time"> 4</span> <span class="rt-label rt-postfix">min read</span></span> - </span>With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport&hellip; </p> </div> </a> </div> </article> <article class="article article--card cards__article_grid "> <!-- IMG --> <a class="exclusive_article__category_link" href="https://securityintelligence.com/articles/protecting-digital-assets-non-human-identity-attacks/"> <div class="article__img"> <amp-img alt="Closeup on a blue circuit board with a fingerprint inside of a dotted square" width="1200" height="630" layout="responsive" src="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Backdrop-with-icons-and-an-electronic-circuit-board.-Fingerprint-identification-is-used-to-get-access-to-a-secure-computer-network-and-digital-system.-Biometrics-technology-for-cyb-630x330.jpeg.webp"> <amp-img fallback alt="Closeup on a blue circuit board with a fingerprint inside of a dotted square" width="1200" height="630" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Backdrop-with-icons-and-an-electronic-circuit-board.-Fingerprint-identification-is-used-to-get-access-to-a-secure-computer-network-and-digital-system.-Biometrics-technology-for-cyb-630x330.jpeg"> </amp-img> </amp-img> </div> </a> <!-- TXT --> <div class="article__text_container" style="-webkit-box-orient: vertical;"> <!-- CAT AND DATE --> <div class="article__eyebrow"> <span class="article__date"> November 20, 2024 </span> </div> <!-- TITLE & EXCERPT --> <a href="https://securityintelligence.com/articles/protecting-digital-assets-non-human-identity-attacks/" class="article__content_link"> <div class="article__direction"> <h2 class="article__title"> Protecting your digital assets from non-human identity attacks </h2> <p class="article__excerpt" style="-webkit-box-orient: vertical;"> <span class="article__read_time"><span class="span-reading-time rt-reading-time"><span class="rt-label rt-prefix"></span> <span class="rt-time"> 4</span> <span class="rt-label rt-postfix">min read</span></span> - </span>Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the&hellip; </p> </div> </a> </div> </article> <article class="article article--card cards__article_grid "> <!-- IMG --> <a class="exclusive_article__category_link" href="https://securityintelligence.com/articles/cybersecurity-dominates-concerns-c-suite-small-businesses-nation/"> <div class="article__img"> <amp-img alt="A young man & woman working behind the counter in a music store" width="1200" height="630" layout="responsive" src="/wp-content/webp-express/webp-images/doc-root/wp-content/uploads/2024/11/Young-couple-working-behind-counter-in-music-store-630x330.jpeg.webp"> <amp-img fallback alt="A young man & woman working behind the counter in a music store" width="1200" height="630" layout="responsive" src="https://securityintelligence.com/wp-content/uploads/2024/11/Young-couple-working-behind-counter-in-music-store-630x330.jpeg"> </amp-img> </amp-img> </div> </a> <!-- TXT --> <div class="article__text_container" style="-webkit-box-orient: vertical;"> <!-- CAT AND DATE --> <div class="article__eyebrow"> <span class="article__date"> November 15, 2024 </span> </div> <!-- TITLE & EXCERPT --> <a href="https://securityintelligence.com/articles/cybersecurity-dominates-concerns-c-suite-small-businesses-nation/" class="article__content_link"> <div class="article__direction"> <h2 class="article__title"> Cybersecurity dominates concerns among the C-suite, small businesses and the nation </h2> <p class="article__excerpt" style="-webkit-box-orient: vertical;"> <span class="article__read_time"><span class="span-reading-time rt-reading-time"><span class="rt-label rt-prefix"></span> <span class="rt-time"> 4</span> <span class="rt-label rt-postfix">min read</span></span> - </span>Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk&hellip; </p> </div> </a> </div> </article> </div> </section> </div> <!--SI Newsletters --> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/version/v1.31.0-rc.0/cta-section.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/latest/cta-section.min.js"></script> <script type="module" src="https://1.www.s81c.com/common/carbon-for-ibm-dotcom/tag/v1/next/cta-section.min.js"></script> <div style="background-color: #161616;"> <dds-cta-section data-autoid="dds--cta-section" children-custom-class="" class="container SI_padding"> <dds-cta-block no-border="" data-autoid="dds--cta-block"> <dds-content-block-heading class="copy" role="heading" aria-level="2" data-autoid="dds--content-block__heading" slot="heading"> <h2 >Topic updates</h2> </dds-content-block-heading> <dds-content-block-copy data-autoid="dds--content-block__copy" size="md" slot="copy"> <dds-content-block-paragraph data-autoid="dds--content-block-paragraph" class="copy"> Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research. </dds-content-block-paragraph> <div role="list" class="list_newletter"> <dds-button-cta data-autoid="dds-cta" cta-style="button" class="copy" cta-type="local" href="https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-51966" kind="primary" icon-layout="" size=""> Subscribe today </dds-button-cta> </div> </dds-content-block-copy> </dds-cta-block> </dds-cta-section> </div> <dds-footer-container></dds-footer-container> <script> document.addEventListener('DOMContentLoaded', () => { const boxstyle = document.querySelector('.button2'); const removePadding = document.querySelector('dds-cta-section'); if (boxstyle) { const shadowRoot = boxstyle.shadowRoot; const bxContentSsectionDOM = shadowRoot.querySelector('.bx--btn'); if (bxContentSsectionDOM) { bxContentSsectionDOM.style.color = 'white'; bxContentSsectionDOM.style.borderColor = 'white'; bxContentSsectionDOM.addEventListener('mouseover', () => { bxContentSsectionDOM.style.color = 'white'; bxContentSsectionDOM.style.borderColor = 'white'; bxContentSsectionDOM.style.backgroundColor = 'rgba(141, 141, 141, 0.16)'; // }); // when mouse leave the element bxContentSsectionDOM.addEventListener('mouseout', () => { bxContentSsectionDOM.style.color = 'white'; bxContentSsectionDOM.style.borderColor = 'white'; bxContentSsectionDOM.style.backgroundColor = 'transparent'; // Reset background color }); } } if(removePadding){ const shadowRoot = removePadding.shadowRoot; const removespace = shadowRoot.querySelector('.bx--content-section__leading'); if(removespace){ removespace.style.display = 'none'; } } }); document.querySelector("dds-footer-container").size = 'default'; //Uncomment this to add a custom links. // document.querySelector("dds-footer-container").adjunctLinks = [{ // 'title': 'IBM Custom Link', // 'link': 'https://ibm.com' // }, // { // 'title': 'IBM Custom Link2', // 'link': 'https://ibm.com' // } // ]; </script> <!--SI close Newsletters--> <div style="background-color: #13171a;"> <div class="container"> <!-- FOOTER --> <section id="footer" class="footer"> <!-- LOGO --> <div class="footer__logo"> <amp-img width="280" height="31" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/logo-white.svg" alt="Security Intelligence"></amp-img> </div> <!-- COPY --> <div class="footer__copy"><p>Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.</p> </div> <!-- LINKS --> <div class="footer__list"> <a href="/news/" class="footer__link">Cybersecurity News</a> <a href="/category/topics/" class="footer__link">By Topic</a> <a href="/category/industries/" class="footer__link">By Industry</a> <a href="/series/" class="footer__link">Exclusive Series</a> <a href="/x-force/" class="footer__link">X-Force</a> <a href="/media/" class="footer__link">Podcast</a> <a href="/events/" class="footer__link">Events</a> <a href="/about-us/" class="footer__link">Contact</a> <a href="/about-us/" class="footer__link">About Us</a> </div> <!-- SOCIAL NETWORKS --> <div class="footer__social-networks"> <div class="headline">Follow us on social</div> <a href="http://www.twitter.com/ibmsecurity" aria-label="Twitter" class="footer__icon" style="left:-4px;"> <svg xmlns="http://www.w3.org/2000/svg" width="28" height="28" viewBox="0 0 28 28" fill="#FFFFFF"> <path d="M24 4.557c-.883.392-1.832.656-2.828.775 1.017-.609 1.798-1.574 2.165-2.724-.951.564-2.005.974-3.127 1.195-.897-.957-2.178-1.555-3.594-1.555-3.179 0-5.515 2.966-4.797 6.045-4.091-.205-7.719-2.165-10.148-5.144-1.29 2.213-.669 5.108 1.523 6.574-.806-.026-1.566-.247-2.229-.616-.054 2.281 1.581 4.415 3.949 4.89-.693.188-1.452.232-2.224.084.626 1.956 2.444 3.379 4.6 3.419-2.07 1.623-4.678 2.348-7.29 2.04 2.179 1.397 4.768 2.212 7.548 2.212 9.142 0 14.307-7.721 13.995-14.646.962-.695 1.797-1.562 2.457-2.549z" /> </svg> </a> <a href="http://www.linkedin.com/company/ibm-security" aria-label="LinkedIn" class="footer__icon" style="justify-self: center;"> <svg xmlns="http://www.w3.org/2000/svg" width="28" height="28" viewBox="0 0 28 28" fill="#FFFFFF"> <path d="M4.98 3.5c0 1.381-1.11 2.5-2.48 2.5s-2.48-1.119-2.48-2.5c0-1.38 1.11-2.5 2.48-2.5s2.48 1.12 2.48 2.5zm.02 4.5h-5v16h5v-16zm7.982 0h-4.968v16h4.969v-8.399c0-4.67 6.029-5.052 6.029 0v8.399h4.988v-10.131c0-7.88-8.922-7.593-11.018-3.714v-2.155z" /> </svg> </a> <a href="https://www.youtube.com/@IBMTechnology" aria-label="YouTube" class="footer__icon" style="justify-self: end;"> <svg xmlns="http://www.w3.org/2000/svg" width="28" height="28" viewBox="0 0 28 28" fill="#FFFFFF"> <path d="M19.615 3.184c-3.604-.246-11.631-.245-15.23 0-3.897.266-4.356 2.62-4.385 8.816.029 6.185.484 8.549 4.385 8.816 3.6.245 11.626.246 15.23 0 3.897-.266 4.356-2.62 4.385-8.816-.029-6.185-.484-8.549-4.385-8.816zm-10.615 12.816v-8l8 3.993-8 4.007z" /> </svg> </a> </div> </section> </div> </div> <div style="background-color:black"> <div class="container"> <!-- UTILITIES BAR --> <section class="utility_bar"> <!-- LINKS --> <div class="utility_bar__links" aria-label="Footer Navigation"> <a href="http://www.ibm.com?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US" target="_blank" rel="noopener, noreferrer">© 2024 IBM</a> <a href="https://www.ibm.com/contact/?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US" target="_blank" rel="noopener, noreferrer">Contact</a> <a href="https://www.ibm.com/privacy/?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US" target="_blank" rel="noopener, noreferrer">Privacy</a> <a href="https://www.ibm.com/legal/?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US&cm_mc_uid=03001744655915532865554&cm_mc_sid_50200000=84159441565120380187" target="_blank" rel="noopener, noreferrer">Terms of use</a> <a href="https://www.ibm.com/accessibility/?ce=ISM0484&ct=SWG&cmp=IBMSocial&cm=h&cr=Security&ccy=US" target="_blank" rel="noopener, noreferrer">Accessibility</a> <a href="#" onclick="truste.eu.clickListener();return false;" target="_blank" rel="noopener, noreferrer">Cookie Preferences</a> </div> <!-- Sponsor credits --> <div class="utility_bar__sponsor"> <a href="http://ibm.com/security?ce=ISM0484&amp;ct=SWG&amp;cmp=IBMSocial&amp;cm=h&amp;cr=Security&amp;ccy=US" target="_blank" data-icon="B" class="icon ibm" rel="noopener, noreferrer" style="padding-right:0px"> <span>Sponsored by <svg id="Layer_1" data-name="Layer 1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 31.97 14.06"> <defs> <style> .cls-1 { fill: #fff; } </style> </defs> <title>si-icon-eightbarfeature</title> <path class="cls-1" d="M27.17,12.6h4.21v.84H27.17Zm0-1.68h4.21v.84H27.17Zm0-1.68h2.52v.84H27.17Zm0-1.69h2.52V8.4H27.17Zm0-1.68h2.52v.84H27.17Zm-.84-4.2.28-.85h4.77v.85Zm-.56,1.68.29-.84h5.32v.84ZM25.22,5l.28-.84h4.19V5Zm-.56,1.68L25,5.87h2.22l-.27.84Zm0,6.73-.28-.84H25Zm-.55-1.68-.29-.84H25.5l-.28.84Zm-.56-1.68-.27-.84H26l-.27.84ZM23,8.4l-.29-.85h3.9l-.28.85Zm-.57-1.69-.27-.84h2.22l.28.84Zm-2.8,2.53h2.53v.84H19.63Zm0-1.69h2.53V8.4H19.63Zm0-1.68h2.53v.84H19.63Zm0-.84V4.19h4.19l.29.84ZM18,12.6h4.21v.84H18Zm0-1.68h4.21v.84H18Zm0-7.57V2.51h5.32l.28.84Zm0-1.68V.82h4.76l.29.85ZM14.16,9.24H17a2.23,2.23,0,0,1,.07.37,2.49,2.49,0,0,1,0,.47H14.16Zm0-5h2.95a2.38,2.38,0,0,1,0,.46A2.18,2.18,0,0,1,17,5H14.16ZM9.11,9.24h2.52v.84H9.11Zm0-1.69H16a5,5,0,0,1,.4.4,2,2,0,0,1,.32.45H9.11Zm0-1.68h7.57a2,2,0,0,1-.32.45,4.89,4.89,0,0,1-.4.39H9.11Zm0-1.68h2.52V5H9.11ZM7.42,12.6H16a3.09,3.09,0,0,1-1,.62,3.73,3.73,0,0,1-1.32.22H7.42Zm0-1.68H17a2.47,2.47,0,0,1-.15.46,2.24,2.24,0,0,1-.21.38H7.42Zm0-8.41h9.22a1.91,1.91,0,0,1,.21.38,2.47,2.47,0,0,1,.15.46H7.42Zm0-1.69H13.6a3.73,3.73,0,0,1,1.32.23,3.09,3.09,0,0,1,1,.62H7.42Zm-5,8.42H4.9v.84H2.38Zm0-1.69H4.9V8.4H2.38Zm0-1.68H4.9v.84H2.38Zm0-1.68H4.9V5H2.38ZM.69,12.6H6.58v.84H.69Zm0-1.68H6.58v.84H.69Zm0-8.41H6.58v.84H.69ZM.69.82H6.58v.85H.69Z" /> </svg> </span> </a> </div> </section> </div> </div> <script> window._appInfo = window._appInfo || {}; window._appInfo.newsCredAPIKey = "YXJ0aWNsZT1jZjRhNDcxNDczYzExMWVmYjRjYmZlNDBmNWI2MzY1Mg=="; </script> <!-- FOOTER SCRIPTS --> <script type="text/javascript" id="qppr_frontend_scripts-js-extra"> /* <![CDATA[ */ var qpprFrontData = {"linkData":{"https:\/\/securityintelligence.com\/defining-security-intelligence\/":[0,0,"https:\/\/securityintelligence.com\/defintion-security-intelligence\/#.VS_NwpNnuZA"],"https:\/\/securityintelligence.com\/security-vulnerability-management-its-about-outcomes-not-activity\/":[0,0,""]},"siteURL":"https:\/\/securityintelligence.com","siteURLq":"https:\/\/securityintelligence.com"}; /* ]]> */ </script> <script type="text/javascript" src="https://securityintelligence.com/wp-content/plugins/quick-pagepost-redirect-plugin/js/qppr_frontend_script.min.js?ver=5.2.4" id="qppr_frontend_scripts-js"></script> <script> setTimeout(() => { document.querySelector(".related_content").style.visibility = 'visible'; document.querySelector(".related_content.article.article_grid.article__mobile--card.article--IBM_blog > c4d-card > c4d-card-footer").shadowRoot.querySelector("#link").style.justifyContent = 'flex-start'; }, 100); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10