Cyber Resilience Building Organizations That Survive and Thrive Under Attack
In an era where digital transformation accelerates at an unprecedented pace, the question is no longer whether your organization will face a cyberattack – it is when. The global cybersecurity landscape has fundamentally shifted from a prevention-only mindset to one that embraces resilience as the cornerstone of organizational survival.
This book was born from over a decade of frontline experience in cybersecurity governance, risk management, and compliance across the Middle East and beyond. Working with government entities, financial institutions, and critical infrastructure operators, I have witnessed firsthand how organizations crumble under pressure – and how the best ones emerge from attacks stronger, more agile, and more prepared than ever before.
Cyber Resilience is not merely a technical concept. It is a strategic imperative that touches every aspect of an organization: from the boardroom to the server room, from human psychology to artificial intelligence, from regulatory compliance to operational continuity. This book provides a comprehensive, actionable framework for building organizations that do not just survive cyberattacks but thrive in their aftermath.
Whether you are a CISO navigating complex threat landscapes, a board member seeking to understand cyber risk, or a security practitioner building defenses from the ground up, this book offers the knowledge, frameworks, and real-world insights you need to build true cyber resilience.
References
IBM Security. (2024). Cost of a Data Breach Report 2024. IBM Corporation.
Verizon. (2024). Data Breach Investigations Report (DBIR). Verizon Communications Inc.
NIST. (2024). NIST Cybersecurity Framework 2.0 (CSF 2.0). National Institute of Standards and Technology.
NIST. (2021). SP 800-160 Vol. 2 Rev. 1: Developing Cyber-Resilient Systems. National Institute of Standards and Technology.
NIST. (2012). SP 800-61 Rev. 2: Computer Security Incident Handling Guide. National Institute of Standards and Technology.
ISO/IEC. (2022). ISO/IEC 27001:2022 Information Security Management Systems. International Organization for Standardization.
ISO/IEC. (2022). ISO/IEC 27005:2022 Information Security Risk Management. International Organization for Standardization.
MITRE Corporation. (2024). ATT&CK Framework v14. The MITRE Corporation.
CIS. (2023). CIS Controls v8.1. Center for Internet Security.
NCA. (2024). Essential Cybersecurity Controls (ECC-1:2024). National Cybersecurity Authority, Saudi Arabia.
SAMA. (2024). Cyber Security Framework v2.0. Saudi Central Bank.
Ponemon Institute. (2024). Global Cost of Ransomware Study. Ponemon Institute LLC.
Sophos. (2024). The State of Ransomware 2024. Sophos Group plc.
Chainalysis. (2024). The 2024 Crypto Crime Report: Ransomware Payments. Chainalysis Inc.
Coveware. (2024). Quarterly Ransomware Report Q4 2024. Coveware Inc.
SonicWall. (2024). SonicWall Cyber Threat Report 2024. SonicWall Inc.
World Economic Forum. (2024). Global Cybersecurity Outlook 2024. World Economic Forum.
Gartner. (2024). Top Cybersecurity Trends 2024. Gartner Inc.
McKinsey & Company. (2024). Cybersecurity in a Digital World: Building Organizational Resilience. McKinsey & Company.
European Union. (2023). Digital Operational Resilience Act (DORA). Official Journal of the European Union.
Ross, R. et al. (2021). Zero Trust Architecture. NIST SP 800-207. National Institute of Standards and Technology.
FAIR Institute. (2024). Factor Analysis of Information Risk. FAIR Institute.
Hubbard, D. & Seiersen, R. (2023). How to Measure Anything in Cybersecurity Risk (2nd ed.). Wiley.
Schneier, B. (2024). A Hacker's Mind: How the Powerful Bend Society's Rules. W.W. Norton & Company.
SDAIA. (2023). Personal Data Protection Law (PDPL) Implementing Regulations. Saudi Data and Artificial Intelligence Authority.
Got a question about the product? Email us at support@flevy.com or ask the author directly by using the "Ask the Author a Question" form. If you cannot view the preview above this document description, go here to view the large preview instead.
Source: Best Practices in Cyber Security, Business Resilience PDF: Cyber Resilience Building Organizations PDF (PDF) Document, g51286802e84
|
Download our FREE Digital Transformation Templates
Download our free compilation of 50+ Digital Transformation slides and templates. DX concepts covered include Digital Leadership, Digital Maturity, Digital Value Chain, Customer Experience, Customer Journey, RPA, etc. |