From Static Defenses To Dynamic Systems

Cybersecurity today isn’t just about prevention – it’s about ensuring continuity and recovery in the face of inevitable breaches or outages. Take a moment to look at your organization: If your systems went down, how long would it take for you to be fully operating again?

Building a truly resilient defense requires multi-layered strategies that protect against evolving threats and ensure systems can endure.

This past summer, CrowdStrike learned the hard way that its systems were not resilient enough. One small mistake in an update pushed out to users caused systems to crash across the globe, halting operations for airports, banks and more. 

This incident highlights how a single error can cascade through interconnected systems and underscores the need for cybersecurity leaders to map and manage dependencies proactively today. While CrowdStrike resolved the issue quickly, the ripple effect left many customers struggling to restore operations for weeks. Conducting regular recovery timeline tests – both for internal systems and those dependent on them – could have significantly reduced downtime and disruption for their customers.

Resilience goes beyond defense though, too; it’s about planning for worst-case scenarios and ensuring systems bounce back stronger. In 2025, hyper-vigilant proactivity and resilience will be essential for effective cybersecurity strategies across the world.

Human Error Remains The Achilles’ Heel

Attackers are increasingly exploiting the gaps between technical defenses and human behavior, making human error one of the greatest vulnerabilities in cybersecurity. Advanced training must continue to evolve alongside attackers' tactics to combat this – moving beyond simple simulation exercises. Incorporating adaptive training environments that use AI to generate evolving attack scenarios for instance ensures employees regularly face novel threats.

The more exposure they have to these dynamic challenges, the better equipped they will be to better protect their organization.

Meaningful metrics matter too. Tracking phishing training participation rates isn’t enough anymore. Instead, measuring post-training improvement rates, like how often employees correctly identify and report phishing attempts, is much more impactful. Additionally, analyzing response times – how quickly employees report incidents and how fast teams mitigate them – provides valuable insights into real-world preparedness and confirms that employees can successfully avert more advanced threats like APTs. 

Proactive System Analysis 

The interdependencies in today’s digital systems mean failures in one area can cascade across an entire organization. As the CrowdStrike incident demonstrated, organizations fall short when critical dependencies go unnoticed until a failure occurs. To prevent this, cybersecurity teams must move beyond siloed testing and adopt proactive system analysis.

Siloed testing overlooks how systems as a whole interact under real-world pressure. To build greater resilience, organizations need to map their interdependencies dynamically by asking themselves questions like “Which of our systems rely on others and how will any failures propagate as a result of an attack on one?” Continuous “war game” simulations can help stress-test resilience, exposing weak links before they become points of failure and allowing organizations to build fail-safes directly into system design. 

Rethinking Ransomware-Resistant Backups As A Strategic Asset

Backups are often treated as an afterthought when they should be seen as a cornerstone of any ransomware strategy, as they’re critical for restoring operations quickly in the event of an attack. Offline and air-gapped backups are essential to ensure isolation from compromised systems and unauthorized access. Automating integrity checks also ensures backups remain uncorrupted and accessible under pressure.

Simulating recovery through drills prepares teams for worst-case scenarios. Every minute counts, and end-to-end scenarios can highlight interdependencies or bottlenecks that slow recovery.

Organizations shouldn’t assume that backups are a silver bullet, however. The only way backups remain effective is through proper recovery workflow testing and the right processes and team support in place to restore operations quickly.

Ethical Considerations In AI & Decentralized Systems

The risks of unchecked AI are immense and as the technology becomes a core cybersecurity tool, organizations must grapple with ethical and operational questions about its use to uphold resilience in 2025 and beyond.

To minimize risk, organizations should first establish clear governance frameworks to ensure transparency in decision-making. This reduces the risk of the AI performing unintended actions and helps limit the impact of adversarial attacks. Next, they should implement oversight mechanisms for high-stakes actions and identify those responsible for intervening when the AI makes an error. Finally, they need to stay ahead of compliance challenges by aligning AI practices with emerging regulations and legal frameworks. 

When integrating AI into cybersecurity systems, it will be essential to ensure that AI-driven decisions are explainable rather than relying on black-box models.

Organizations should also assess the human impact of AI errors. Mistakes in automated decision-making can have far-reaching consequences, so balancing automation with human oversight is key to ethical AI deployment.

Resilience As The Ccornerstone Of Cybersecurity In 2025

Resilience isn’t just about enduring threats – it’s about maintaining the ability to operate and recover under any circumstances. Building dynamic systems requires multi-layered strategies, including adaptive training, AI-driven defenses, proactive system analysis, and robust backup solutions. Continuous testing and refinement ensures systems can keep pace with evolving threats.

By adopting these practices, cybersecurity leaders can shift from static defense to truly resilient systems, capable of mitigating risks and ensuring long-term operational strength in 2025 and beyond.

Engin Kirda is a program co-chair of ACM’s CCS and Professor at Northeastern University

Image: Andrii Yalanskyi

You Might Also Read:

Are Any Of Your Suppliers A Security Risk Waiting To Happen?:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Medusa Ransomware Attacks Focus On Critical Infrastructure
Guidance Is Coming, But Hackers Aren’t Waiting »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

Cybil

Cybil

Cybil is a publicly-available portal where members of the international cyber capacity building community can find and share information to support the design and delivery of programs and projects.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

The Citadel Department of Defense Cyber Institute (CDCI)

The Citadel Department of Defense Cyber Institute (CDCI)

CDCI is established to address the critical national security needed for a skilled cybersecurity workforce.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

nandin Innovation Centre

nandin Innovation Centre

nandin is ANSTO’s Innovation Centre (Australian Nuclear Science and Technology Organisation) where science and technology entrepreneurs, startups and graduates come together.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.

Cloudbrink

Cloudbrink

Cloudbrink is purpose-built to deliver the industry’s highest performance connectivity to remote and hybrid workers, anywhere in the world.