no plan survives contact with the enemy.
Helmuth von Moltke
cyber resilience outcomes
A state-of-the-art cyber-resilient enterprise can achieve the following high-level outcomes:
- Identify (and develop contingencies for) impacts and risks that emerge from its attack surface and the external threat landscape, then dynamically redefine defensive architecture mitigations to protect its critical assets.
- Design its processes (risk, architecture, and more) to be resilient by default by identifying the goals, objectives, techniques, and approaches required.
- Identify and safeguard the assets critical for the Enterprise to endure an extended conflict with an advanced adversary, considering scenarios where the attacker might remain undetected or active within elements beyond the organization's oversight, such as suppliers or the software supply chain.
- Identify and protect assets at risk of being weaponized against the company itself due to the architectural nature of these systems and maintain break-glass capabilities to recover in case of broad compromise.
- Cultivate a resilience-conscious workforce and ensure personnel are prepared and equipped to respond to cyber threats, with the necessary resources tested, exercised, and readily accessible, fostering a workforce capable of effectively responding to and mitigating cyber incidents.
- Identify (and address) lessons learned from other organizations that were believed to be resilient but were rendered operationally incapacitated by advanced adversaries.
- Effectively measure capabilities and identify risks before they become material by tracking capabilities and developing business intelligence through information sharing and peer benchmarking.