TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/tip/How-to-conduct-a-cyber-resilience-assessment

How to conduct a cyber-resilience assessment

By Paul Kirvan

Periodic assessments of cybersecurity plans, policies and procedures ensure cybersecurity programs meet their objectives and are ready for use in the event of an attack.

Referred to as cyber resilience, these assessments define an organization's ability to recover and resume operations following a disruptive event. Modifying the assessment process to determine an organization's resilience, however, goes beyond a simple "do we have it" or "don't we have it" approach.

Read on to learn how to prepare and conduct a cyber-resilience assessment, and review activities that help improve an organization's cybersecurity risk posture.

Questions to ask when conducting a cyber-resilience assessment

The following questions help guide a cyber-resilience assessment:

Cyber-resilience assessments provide timely knowledge on the state of an organization's preparedness for a cyber attack, as well as its ability to adapt and overcome the disruption caused by an attack. If the above questions identify areas for improvement, the organization can make those changes before the next attack occurs.

Cybersecurity resilience assessment checklist

Considering the previous recommended activities, the following checklist can be used to prepare a cyber-resilience assessment:

      1. Identify risks. Create a list of risks and threats that could facilitate cyber attacks and the systems that must be protected.
      2. Identify potential cyber attacks. Create a list of potential cyber attacks, such as phishing or ransomware.
      3. Examine how the organization currently responds to attacks. Create a list of current plans, policies, procedures, systems and technologies.
      4. Protect current systems, software and networks. Ensure current IT assets and resources are protected from attacks.
      5. Test for cyberthreats and vulnerabilities. Conduct periodic forensic activities, such as pen tests, to identify vulnerabilities.
      6. Test cybersecurity plans and procedures. Validate plans and procedures to ensure they address and mitigate the impact of a cyber attack.
      7. Train cybersecurity team members. Ensure cybersecurity team members know how to deal with threats, as well as cybersecurity systems and software in use.
      8. Train employees and senior management about cybersecurity. Conduct security awareness trainings so employees and senior managers are aware of cyber attacks and their roles during an attack.
      9. Conduct post-cyber attack activities. Identify the activities that worked and those that didn't, and then identify steps to remediate policies, plans, procedures, systems and technology in preparation for future attacks.

This is a relatively simple assessment checklist. More detailed cybersecurity assessment tools are available, including the following:

17 Oct 2023

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement