SlideShare a Scribd company logo
What is cyber
resilience?
Aaron Clark-Ginsberg
Center for International Security and Cooperation,
Stanford University
2017 Frontiers in Resilience Symposium
This material is based upon work supported by the U.S. Department of Homeland Security. The views and conclusions contained in this material
are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S.
Department of Homeland Security. The author would like to thank the U.S. Department of Homeland Security for its support.
Word cloud created from texts analyzed for this study
Resilience is everywhere
Is resilience “the organizing principle in
contemporary political life”? (Brasset et al., 2013)
• Resilience has been described as:
• A useful method for managing risk in the face of
complexity
• A buzzword
• A disastrous technique that normalizes insecurity
and state withdrawal
• Instead of a priori praising, damning, or
dismissing resilience, we need empirically
examine how resilience - like other forms of
risk management - is practiced (Cutter, 2016;
Douglas and Wildavsky, 1983)
http://www.noladefender.com/content/dont-call-me-resilient
Case study: cyber resilience
• Cybersecurity is crucial for society:
• Critical infrastructure (2003 Northeast blackout, 2015/16 Ukraine blackouts)
• Economy (2014 Sony hacks)
• Democracy (2016/17 US, France, Germany election hacks)
• …and resilience is crucial for cybersecurity (Vugrin and Turgeon, 2014)
• Thus, the cyber resilience turn is potentially a major shift in how we
conceptualize and govern society
• Research objective: systematically review how cyber resilience is understood
Methods
• Documentary and survey data:
• 157 documents from Google Scholar (50)
Web of Science (57) Google (50)
• Semi-structured survey modified from
Kelly and Kelly (2017)
• Link: www.aaroncg.me/current-projects/
• Coding: origin, definitions, rationale, methods
• Current progress: finalized initial analysis of
documentary data, gathering survey responses
Is it cybersecurity or cyber resilience?
Cyber security Cyber resilience
How are cyber systems
conceptualized?
Siloed and static technical component
of a broader system
Dynamic sociotechnical processes
imbedded within a system
Who is responsible for
managing cyber risks?
IT department Everyone
How do you manage
cyber threats?
Prevention: harden systems using
new technologies
Improve governance structures to align
incentives
Promote dynamic adaption and response
Why is cyber risk
management important?
Failure can compromise organizations Failure can compromise organizations and
societies
How are risks predicted? Traditional risk assessment tools (e.g.
P/I ranking)—backward
Combination of historical data and trend
analysis—backward and forward
Source: Clark-Ginsberg, A. (2017). Participatory risk network analysis: A
tool for disaster reduction practitioners. International Journal of Disaster
Risk Reduction, 21, 430-437.
Cyber resilience: it’s
the network
Origins of cyber resilience
• Cyber resilience originated after 2010, primarily in practitioner circles:
• 154 of 157 surveyed documents were written after 2010
• World Economic Forum’s 2012 Cyber Resilience Initiative
• Hurricane Katrina, September 11th, Foot and Mouth Disease
• Holling (1973). Minimal academic engagement (Bjorck et al., 2015)
• Similar time scale to resilience in other fields including:
• Sustainable development and environmental policy (Evans and Reid, 2014)
• International disaster management (Hilhorst, 2003; Manyena, 2006)
• Security and civil protection (Bourcart, 2015).
Definition:
the ability of systems and organizations to withstand cyber events
What’s in it:
Who cyber resilience refers to
How to determine/achieve resilience
cyber resilience threats
What’s in a definition?
[the ability] to recover and resume
operations within acceptable levels of service
a cyber system’s ability to function properly
and securely despite disruptions to that
system
a holistic view of cyber risk, which looks at
culture, people and processes, as well as
technology
A system’s ability to withstand cyber attacks
or failures and then quickly reestablish itself
ability of systems and organizations to
withstand cyber events
ability to withstand and recover quickly from
unknown and known threats
an organization’s ability to respond to and
recover from a cybersecurity incident
Cyber resilience = cyber security + business
resilience
the persistence of service delivery that can
be justifiably be trusted, when facing
changes and mainly regarded as fault
tolerance
maintaining the system’s critical functionality
by preparing for adverse events, absorbing
stress, recovering the critical functionality,
and adapting to future threats
the ability of a system that is dependent on
cyberspace in some manner to return to its
original [or desired] state after being
disturbed
the ability of systems and organizations to
withstand cyber events
Similarities in definitions
• Focus on managing rather than preventing threats, mainly
because complexity and change made prevention impossible
• Traditional security measures are “failing” and “less realistic” (Symantec,
2014) than cyber resilience, an approach that goes beyond the traditional
security/insecurity “binary” (World Economic Forum, 2012)
• Cyber systems framed as central to organizations and to society
Differences in the threats
• Cyber and non-cyber threats (24) or cyber specific threats (13)
• ‘Cyber’ is foundational to cyber resilience, so generic definitions may be
overly-broad
• Cyber attacks and incidents (29) or cyber attacks (11)
• Cyber attacks require different forms of risk management than cyber
incidents (probabilistic non probabilistic) but have some commonalities.
Limited definitions may be too narrow
Differences in who cyber resilience refers to
• Organizations (9), systems (8), businesses (4), nation (1), business
process (1), substance or object (1) mission (1), not specified (19)
• Cyber resilience is multi sector and stakeholder
• Identifying a sector or stakeholder provides specificity
• Focus on organizations and businesses
Differences in core components required for
resilience
• Identify/anticipate (6), prepare (4),
withstand (15), respond (4), recover (20),
adapt (7)
• Suggests different system views
• Adaptive ecological (sociotechnical system)
• Static engineering (technical system)
Cyber resilience as a
sociotechnical problem
• Risk and risk management is considered
product of interactions between
multiple stakeholders and systems
• Staff as “the greatest asset” and “the
greatest liability” (Symantec, 2014).
Executives key
• Beyond organizations: cyber breaches
affect everyone, and risks must be
managed jointly
• Responsibility is uncertain
Word tree of sentences using the phrase ‘work together’
Source: author, created with NVivo
Responsibility and cyber risk
• Responsibility structures are not well established. Instead of regulations
there is “an acute awareness that technological innovation and market
potential should not be stifled” (de Goede, 2015)
• Voluntary frameworks like NIST CSF, CERT RRM are promoted
• Cyber resilience is a choice that requires executive support
• Competing inter- and intra- organizational interests potentially stifle cyber
resilience
• Lack of regulations and changing technologies make responsibility difficult
to assign
• New role of the private sector and individuals in managing national
security. Pragmatic necessity or governmental responsibility shirking?
Industry: technical and organizational
dimensions
https://www.mimecast.com/content/cyber-resilience/
From World Economic Forum 2012 ‘Risk and Responsibility in
a Hyperconnected World’
Academia: primarily technically oriented
• Problematic given the
novel and debated
organizational and
institutional configurations
cyber resilience presents
Organizing for cyber resilience: what works?
Analysis and conclusions
• Cyber resilience conceptualizes the world as inherently insecure,
and provides a new organizational orientation for managing
insecurity
• Cyber resilience makes managing cyber risks central to society
• We lack knowledge on how to organize for cyber resilience
• Some define cyber resilience from an engineering, not
ecosystem, perspective
Redefining cyber resilience
• Current common definition: the ability to withstand and recover
from threats
• Proposed common definition: the ability to anticipate, withstand,
prepare for, respond to, recover from, and adapt to cyber
incidents and attacks
Reorienting cyber resilience
• Practice:
• Engage with the adaptive elements of cyber resilience
• Articulate cyber risk and resilience from a societal, not individual or
organizational, risk perspective
• Focus on organizing for resilience
• Research:
• Empirical studies on organizational and transboundary dimensions of
risk management
Questions/comments?
Email: aaroncg@stanford.edu
Cyber resilience survey: www.aaroncg.me/current-projects/
1 [the ability] to recover and resume operations within acceptable levels of service.
2 a cyber system’s ability to function properly and securely despite disruptions to that system
3 a holistic view of cyber risk, which looks at culture, people and processes, as well as technology
4 A system’s ability to withstand cyber attacks or failures and then quickly reestablish itself
5 ability of systems and organizations to withstand cyber events
6 ability to withstand and recover quickly from unknown and known threats
7 an organization’s ability to recover and return to normal operations after a cyber attack
8 an organization’s ability to respond to and recover from a cybersecurity incident
9 the ability to provide and maintain an acceptable level of service when facing attacks and challenges to normal operation
10 Cyber resilience = cyber security + business resilience
11 the ability to operate the business processes in normal and adverse scenarios without adverse outcomes
12 identifying and responding to security breaches
13 the persistence of service delivery that can be justifiably be trusted, when facing changes and mainly regarded as fault tolerance
14 maintaining the system’s critical functionality by preparing for adverse events, absorbing stress, recovering the critical functionality, and adapting to future threats
15 withstand a major disruption because of unknown event
16 organizations capability to cope with cyber attacks
17 ‘robustness’ and ‘survivability’ measured in terms of performance and sustained availability. It also implies elements of both confidentiality and integrity
18 The ability of a nation, organization, or mission or business process to anticipate, withstand, recover from, and evolve to improve capabilities conditions, stresses, or attacks on the supporting cyber resources it needs to function
19 the ability of a substance or object to spring back into shape
20 the ability of a system that is dependent on cyberspace in some manner to return to its original [or desired] state after being disturbed
21 the ability of an organisation to understand the cyber threats it’s facing, to inform the known risks, to put in place proportionate protection, and to recover quickly from attack
22 the ability of an organization to continue to function, even though it is in a degraded manner, in the face of impediments that affect the proper operation of some of its components
23 the ability of cyber systems and cyberdependent missions to anticipate, continue to operate correctly in the face of, recover from, and evolve to better adapt to advanced cyber threats
24 the ability of systems and organizations to develop and execute long-term strategy to withstand cyber events
25 the ability of systems and organizations to withstand cyber events
26 the ability of systems to anticipate/withstand/ recover from attacks and failures
27 the ability to adapt and respond rapidly to disruptions and maintain continuity of operations
28 the ability to continuously deliver the intended outcome despite adverse cyber events
29 the ability to operate in the face of persistent attacks
30 the ability to prepare for and adapt to changing conditions and withstand and recover rapidly from disruptions
31 the ability to prepare for and adapt to changing threat conditions while withstanding and rapidly recovering from attacks to infrastructure availability
32 the ability to prepare for and recover quickly from both known and unknown threats
33 the ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation
34 the ability to recover from or easily adjust to misfortune or change
35 the ability to recover, returning to an original state, after some event that disrupts this state
36 the ability to withstand attacks and failures, as well as to mitigate harm more than in other domain
37 the capability of a supply chain to maintain its operational performance when faced with cyber-risk
38 the capacity to recover quickly from difficulties; toughness
39 the continuation of operations even when society faces a severe disturbance in its security environment, the capability to recover quickly from the shock, and the ability to either remount the temporarily halted functions or re-
engineer them
40 the ability of an information processing system’s ability to return to some level of desired performance after a degradation of that performance
41 the alignment of prevention, detection, and response capabilities to manage, mitigate, and move on from cyberattacks. It is the capacity of an enterprise to maintain its core purpose and integrity in the face of cyberattacks

More Related Content

PPTX
Understanding cyber resilience
PDF
Cyber Resilience
PPTX
Dragos S4x20: How to Build an OT Security Operations Center
PDF
Introduction to Cyber Resilience
PDF
Introducing Yourself And Your Capabilities Complete PowerPoint Deck
PDF
International Law of the Sea
PPTX
Computer security
PPTX
Information Security Governance and Strategy - 3
Understanding cyber resilience
Cyber Resilience
Dragos S4x20: How to Build an OT Security Operations Center
Introduction to Cyber Resilience
Introducing Yourself And Your Capabilities Complete PowerPoint Deck
International Law of the Sea
Computer security
Information Security Governance and Strategy - 3

What's hot (20)

PPTX
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Secure Design: Threat Modeling
PDF
Industrial_Cyber_Security
PPT
SOC presentation- Building a Security Operations Center
PPTX
Cyber Threat Hunting Workshop
PPT
Security patterns and model driven architecture
PPTX
NIST Critical Security Framework (CSF)
PPTX
Cyber Security 03
PDF
Introduction to Cybersecurity
ODP
Cyber security awareness
PDF
Microsoft Zero Trust
PPTX
PPT-Security-for-Management.pptx
PDF
Cybersecurity Employee Training
PPTX
PDF
NIST Cybersecurity Framework 101
PPTX
IBM Security QRadar
PPTX
Cyber kill chain
PDF
Threat Modeling Using STRIDE
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Secure Design: Threat Modeling
Industrial_Cyber_Security
SOC presentation- Building a Security Operations Center
Cyber Threat Hunting Workshop
Security patterns and model driven architecture
NIST Critical Security Framework (CSF)
Cyber Security 03
Introduction to Cybersecurity
Cyber security awareness
Microsoft Zero Trust
PPT-Security-for-Management.pptx
Cybersecurity Employee Training
NIST Cybersecurity Framework 101
IBM Security QRadar
Cyber kill chain
Threat Modeling Using STRIDE
Application Security | Application Security Tutorial | Cyber Security Certifi...
Ad

Similar to What is cyber resilience? (20)

PPT
Improving cyber security using biosecurity experience
PDF
Incident Response
PDF
Strategic Leadership for Managing Evolving Cybersecurity Risks
PPTX
Cyber Resilience
PPTX
Yours Anecdotally: Developing a Cybersecurity Problem Space
PDF
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
PPTX
Resilience Shift - overview of our programme
PDF
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
PPTX
Week 1&2 intro_ v2-upload
PDF
Articulo de Ciberseguridad IEC en formato pdf
PDF
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
PDF
Symantec cyber-resilience
PDF
Towards Quantification of Cyber Risk
PDF
The Cyber SwarmShield by Stéphane Nappo
PPT
information security management
PDF
Cyber Security Risk Mitigation Checklist
PPT
is_1_Introduction to Information Security
PDF
Biznesa infrastruktūras un datu drošības juridiskie aspekti
PDF
Cyber Resilience - Welcoming New Normal - Eryk
PDF
Application Threat Modeling In Risk Management
Improving cyber security using biosecurity experience
Incident Response
Strategic Leadership for Managing Evolving Cybersecurity Risks
Cyber Resilience
Yours Anecdotally: Developing a Cybersecurity Problem Space
Preparing for a Black Swan: Planning and Programming for Risk Mitigation in E...
Resilience Shift - overview of our programme
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
Week 1&2 intro_ v2-upload
Articulo de Ciberseguridad IEC en formato pdf
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Symantec cyber-resilience
Towards Quantification of Cyber Risk
The Cyber SwarmShield by Stéphane Nappo
information security management
Cyber Security Risk Mitigation Checklist
is_1_Introduction to Information Security
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Cyber Resilience - Welcoming New Normal - Eryk
Application Threat Modeling In Risk Management
Ad

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
A Presentation on Artificial Intelligence
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Modernizing your data center with Dell and AMD
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
A Presentation on Artificial Intelligence
Review of recent advances in non-invasive hemoglobin estimation
Modernizing your data center with Dell and AMD
Understanding_Digital_Forensics_Presentation.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

What is cyber resilience?

  • 1. What is cyber resilience? Aaron Clark-Ginsberg Center for International Security and Cooperation, Stanford University 2017 Frontiers in Resilience Symposium This material is based upon work supported by the U.S. Department of Homeland Security. The views and conclusions contained in this material are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security. The author would like to thank the U.S. Department of Homeland Security for its support. Word cloud created from texts analyzed for this study
  • 3. Is resilience “the organizing principle in contemporary political life”? (Brasset et al., 2013) • Resilience has been described as: • A useful method for managing risk in the face of complexity • A buzzword • A disastrous technique that normalizes insecurity and state withdrawal • Instead of a priori praising, damning, or dismissing resilience, we need empirically examine how resilience - like other forms of risk management - is practiced (Cutter, 2016; Douglas and Wildavsky, 1983) http://www.noladefender.com/content/dont-call-me-resilient
  • 4. Case study: cyber resilience • Cybersecurity is crucial for society: • Critical infrastructure (2003 Northeast blackout, 2015/16 Ukraine blackouts) • Economy (2014 Sony hacks) • Democracy (2016/17 US, France, Germany election hacks) • …and resilience is crucial for cybersecurity (Vugrin and Turgeon, 2014) • Thus, the cyber resilience turn is potentially a major shift in how we conceptualize and govern society • Research objective: systematically review how cyber resilience is understood
  • 5. Methods • Documentary and survey data: • 157 documents from Google Scholar (50) Web of Science (57) Google (50) • Semi-structured survey modified from Kelly and Kelly (2017) • Link: www.aaroncg.me/current-projects/ • Coding: origin, definitions, rationale, methods • Current progress: finalized initial analysis of documentary data, gathering survey responses
  • 6. Is it cybersecurity or cyber resilience? Cyber security Cyber resilience How are cyber systems conceptualized? Siloed and static technical component of a broader system Dynamic sociotechnical processes imbedded within a system Who is responsible for managing cyber risks? IT department Everyone How do you manage cyber threats? Prevention: harden systems using new technologies Improve governance structures to align incentives Promote dynamic adaption and response Why is cyber risk management important? Failure can compromise organizations Failure can compromise organizations and societies How are risks predicted? Traditional risk assessment tools (e.g. P/I ranking)—backward Combination of historical data and trend analysis—backward and forward
  • 7. Source: Clark-Ginsberg, A. (2017). Participatory risk network analysis: A tool for disaster reduction practitioners. International Journal of Disaster Risk Reduction, 21, 430-437. Cyber resilience: it’s the network
  • 8. Origins of cyber resilience • Cyber resilience originated after 2010, primarily in practitioner circles: • 154 of 157 surveyed documents were written after 2010 • World Economic Forum’s 2012 Cyber Resilience Initiative • Hurricane Katrina, September 11th, Foot and Mouth Disease • Holling (1973). Minimal academic engagement (Bjorck et al., 2015) • Similar time scale to resilience in other fields including: • Sustainable development and environmental policy (Evans and Reid, 2014) • International disaster management (Hilhorst, 2003; Manyena, 2006) • Security and civil protection (Bourcart, 2015).
  • 9. Definition: the ability of systems and organizations to withstand cyber events What’s in it: Who cyber resilience refers to How to determine/achieve resilience cyber resilience threats What’s in a definition?
  • 10. [the ability] to recover and resume operations within acceptable levels of service
  • 11. a cyber system’s ability to function properly and securely despite disruptions to that system
  • 12. a holistic view of cyber risk, which looks at culture, people and processes, as well as technology
  • 13. A system’s ability to withstand cyber attacks or failures and then quickly reestablish itself
  • 14. ability of systems and organizations to withstand cyber events
  • 15. ability to withstand and recover quickly from unknown and known threats
  • 16. an organization’s ability to respond to and recover from a cybersecurity incident
  • 17. Cyber resilience = cyber security + business resilience
  • 18. the persistence of service delivery that can be justifiably be trusted, when facing changes and mainly regarded as fault tolerance
  • 19. maintaining the system’s critical functionality by preparing for adverse events, absorbing stress, recovering the critical functionality, and adapting to future threats
  • 20. the ability of a system that is dependent on cyberspace in some manner to return to its original [or desired] state after being disturbed
  • 21. the ability of systems and organizations to withstand cyber events
  • 22. Similarities in definitions • Focus on managing rather than preventing threats, mainly because complexity and change made prevention impossible • Traditional security measures are “failing” and “less realistic” (Symantec, 2014) than cyber resilience, an approach that goes beyond the traditional security/insecurity “binary” (World Economic Forum, 2012) • Cyber systems framed as central to organizations and to society
  • 23. Differences in the threats • Cyber and non-cyber threats (24) or cyber specific threats (13) • ‘Cyber’ is foundational to cyber resilience, so generic definitions may be overly-broad • Cyber attacks and incidents (29) or cyber attacks (11) • Cyber attacks require different forms of risk management than cyber incidents (probabilistic non probabilistic) but have some commonalities. Limited definitions may be too narrow
  • 24. Differences in who cyber resilience refers to • Organizations (9), systems (8), businesses (4), nation (1), business process (1), substance or object (1) mission (1), not specified (19) • Cyber resilience is multi sector and stakeholder • Identifying a sector or stakeholder provides specificity • Focus on organizations and businesses
  • 25. Differences in core components required for resilience • Identify/anticipate (6), prepare (4), withstand (15), respond (4), recover (20), adapt (7) • Suggests different system views • Adaptive ecological (sociotechnical system) • Static engineering (technical system)
  • 26. Cyber resilience as a sociotechnical problem • Risk and risk management is considered product of interactions between multiple stakeholders and systems • Staff as “the greatest asset” and “the greatest liability” (Symantec, 2014). Executives key • Beyond organizations: cyber breaches affect everyone, and risks must be managed jointly • Responsibility is uncertain Word tree of sentences using the phrase ‘work together’ Source: author, created with NVivo
  • 27. Responsibility and cyber risk • Responsibility structures are not well established. Instead of regulations there is “an acute awareness that technological innovation and market potential should not be stifled” (de Goede, 2015) • Voluntary frameworks like NIST CSF, CERT RRM are promoted • Cyber resilience is a choice that requires executive support • Competing inter- and intra- organizational interests potentially stifle cyber resilience • Lack of regulations and changing technologies make responsibility difficult to assign • New role of the private sector and individuals in managing national security. Pragmatic necessity or governmental responsibility shirking?
  • 28. Industry: technical and organizational dimensions https://www.mimecast.com/content/cyber-resilience/ From World Economic Forum 2012 ‘Risk and Responsibility in a Hyperconnected World’
  • 29. Academia: primarily technically oriented • Problematic given the novel and debated organizational and institutional configurations cyber resilience presents
  • 30. Organizing for cyber resilience: what works?
  • 31. Analysis and conclusions • Cyber resilience conceptualizes the world as inherently insecure, and provides a new organizational orientation for managing insecurity • Cyber resilience makes managing cyber risks central to society • We lack knowledge on how to organize for cyber resilience • Some define cyber resilience from an engineering, not ecosystem, perspective
  • 32. Redefining cyber resilience • Current common definition: the ability to withstand and recover from threats • Proposed common definition: the ability to anticipate, withstand, prepare for, respond to, recover from, and adapt to cyber incidents and attacks
  • 33. Reorienting cyber resilience • Practice: • Engage with the adaptive elements of cyber resilience • Articulate cyber risk and resilience from a societal, not individual or organizational, risk perspective • Focus on organizing for resilience • Research: • Empirical studies on organizational and transboundary dimensions of risk management
  • 34. Questions/comments? Email: aaroncg@stanford.edu Cyber resilience survey: www.aaroncg.me/current-projects/
  • 35. 1 [the ability] to recover and resume operations within acceptable levels of service. 2 a cyber system’s ability to function properly and securely despite disruptions to that system 3 a holistic view of cyber risk, which looks at culture, people and processes, as well as technology 4 A system’s ability to withstand cyber attacks or failures and then quickly reestablish itself 5 ability of systems and organizations to withstand cyber events 6 ability to withstand and recover quickly from unknown and known threats 7 an organization’s ability to recover and return to normal operations after a cyber attack 8 an organization’s ability to respond to and recover from a cybersecurity incident 9 the ability to provide and maintain an acceptable level of service when facing attacks and challenges to normal operation 10 Cyber resilience = cyber security + business resilience 11 the ability to operate the business processes in normal and adverse scenarios without adverse outcomes 12 identifying and responding to security breaches 13 the persistence of service delivery that can be justifiably be trusted, when facing changes and mainly regarded as fault tolerance 14 maintaining the system’s critical functionality by preparing for adverse events, absorbing stress, recovering the critical functionality, and adapting to future threats 15 withstand a major disruption because of unknown event 16 organizations capability to cope with cyber attacks 17 ‘robustness’ and ‘survivability’ measured in terms of performance and sustained availability. It also implies elements of both confidentiality and integrity 18 The ability of a nation, organization, or mission or business process to anticipate, withstand, recover from, and evolve to improve capabilities conditions, stresses, or attacks on the supporting cyber resources it needs to function 19 the ability of a substance or object to spring back into shape 20 the ability of a system that is dependent on cyberspace in some manner to return to its original [or desired] state after being disturbed 21 the ability of an organisation to understand the cyber threats it’s facing, to inform the known risks, to put in place proportionate protection, and to recover quickly from attack 22 the ability of an organization to continue to function, even though it is in a degraded manner, in the face of impediments that affect the proper operation of some of its components 23 the ability of cyber systems and cyberdependent missions to anticipate, continue to operate correctly in the face of, recover from, and evolve to better adapt to advanced cyber threats 24 the ability of systems and organizations to develop and execute long-term strategy to withstand cyber events 25 the ability of systems and organizations to withstand cyber events 26 the ability of systems to anticipate/withstand/ recover from attacks and failures 27 the ability to adapt and respond rapidly to disruptions and maintain continuity of operations 28 the ability to continuously deliver the intended outcome despite adverse cyber events 29 the ability to operate in the face of persistent attacks 30 the ability to prepare for and adapt to changing conditions and withstand and recover rapidly from disruptions 31 the ability to prepare for and adapt to changing threat conditions while withstanding and rapidly recovering from attacks to infrastructure availability 32 the ability to prepare for and recover quickly from both known and unknown threats 33 the ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation 34 the ability to recover from or easily adjust to misfortune or change 35 the ability to recover, returning to an original state, after some event that disrupts this state 36 the ability to withstand attacks and failures, as well as to mitigate harm more than in other domain 37 the capability of a supply chain to maintain its operational performance when faced with cyber-risk 38 the capacity to recover quickly from difficulties; toughness 39 the continuation of operations even when society faces a severe disturbance in its security environment, the capability to recover quickly from the shock, and the ability to either remount the temporarily halted functions or re- engineer them 40 the ability of an information processing system’s ability to return to some level of desired performance after a degradation of that performance 41 the alignment of prevention, detection, and response capabilities to manage, mitigate, and move on from cyberattacks. It is the capacity of an enterprise to maintain its core purpose and integrity in the face of cyberattacks

Editor's Notes

  • #11: Example definitions
  • #23: 41 definitions in total, some from industry, some from academia, others generic. Only 4 were used more than once, these were all used twice In some cases variation is useful because it specifies a context e.g. supply chain cyber resilience: the capability of a supply chain to maintain its operational performance when faced with cyber-risk In other cases variation was not useful, indicating a lack of clarity on subject: withstand a major disruption compared to adapt and respond rapidly to disruptions --- Similarities: --ability to manage rather than prevent risks. two reasons for cyber resilience: cyber is central and impossible to completely protect. Mainly because traditional approaches to cybersecurity are ‘failing’ and ‘not realistic’. Other reasons were given including cost/benefit considerations, but these were rare --incredible complexity means that is not possible to manage risk [inter organizational and intra organizational] --changing or dynamic threat landscape means complexity is itself evolving, impossible to predict --internet of things and cloud cited as particularly challenging risk --past is not an indicator of the future --we are inherently insecure; all we can do is manage security
  • #36: Definitions of cyber resilience