Operational Resilience: More Than Disaster Recovery 

To contend with the explosion of cybercrime and its impact on business operations, many organisations are updating their disaster recovery plans to include cyber incident response. Many of the processes and guidelines in traditional disaster recovery plans have changed little in years, sometimes even in over a decade - making them ill-suited to address cyber disasters.

More important, at a business level, disaster recovery is just one aspect of a larger discipline: operational resilience.   
 
There is a need for organisations to view disaster recovery in the context of the overall viability of the business - including cyberattack prevention, detection, and response.  
 
Disaster recovery is fairly narrow in its definition and typically viewed in a small timeframe. Operational resilience is much broader, including aspects like the sort of governance you’ve put in place; how you manage operational risk management; your business continuity plans; and cyber, information, and third-party supplier risk management. 
 
In other words, disaster recovery plans are chiefly concerned with recovery. Operational resilience looks at the bigger picture: your entire ecosystem and what can be done to keep your business operational during disruptive events.   

 Mending A Broken Chain   

The broader focus of operational resilience requires organisation-wide participation. You cannot simply leave it to a single department or team. Instead, everyone needs to be involved, from executives and the board of directors to individual employees in multiple departments.   
 
In today’s climate, it’s not just your own organisation that’s under threat. Your suppliers, partners, and vendors are targets, too. If a major supplier is compromised or taken down, your business might go down with them.  
 
Leadership needs to understand risk and to know the risk tolerance and risk appetite of the company. That even includes things such as procurement functions and agreements with third-party suppliers. Resilience must be built into everything down to every-day workflows, and if a single supplier is insufficient to manage risk, then diversity of supply is a must. 
 
There are many cases where a cyber event at a supplier rendered multiple organisations unable to fulfil their business outcomes. For instance, consider a retail organisation that is using a logistics provider to get products to their stores and that logistics provider experiences disruption caused by a cyber incident, which lead to stockouts in the retail organisations’ stores. Avoiding such scenarios requires a broader perspective. In the context of operational resilience, every risk management scenario and process must consider the supply chain.  

Putting The “operation” In Operational Resilience   

The U.S. Department of Transportation proposed a $1 million fine against Colonial Pipeline for “control room management failures” in the 2021 cyberattack that disrupted gas delivery in the Eastern U.S., adding to the company’s revenue losses from the attack itself. The government’s take is that the company ignored operational resilience: Instead of planning how to manage and limit the scope of an incident, the organisation simply shut down its process control networks the instant malware hit its systems.   
 
Sadly, this is a scenario that’s not unique; many organisations don’t fully understand the impact of operational technology in a cyber incident.   
 
Ideally, organisations managing national infrastructure or critical supply would think much more about business continuity management and mitigating controls. Such thinking starts with knowing their risk profile and planning appropriately to manage it. Organisations must also test what they can do in terms of shutting down their networks, ensuring they have the capability to sever the connection between information technology and operational technology, so malware doesn’t bring everything to a grinding halt. 
 
Bridging The Gap Between IT And OT   

The technology running systems such as pipelines and refineries is distinctly different from that found in a typical office environment. Different network protocols, a different approach to the security stack, and a greater concern for critical safety issues exist. One of the biggest sources of friction for industrial businesses—and the reason operational resilience efforts so often fail - involves a disconnect between information technology (IT) and operational technology (OT).   
 
Neither department fully understands the other’s workflows and challenges. This disconnect needs to change. And that begins with a change in perception.  
 
Part of the issue is that cyber is still seen as special. The discussion always seems to conclude with the assumption that the security team or IT department is managing a particular risk, so no one else needs to worry about it. There is a need to demystify cybersecurity. It’s only with the proper business understanding and risk ownership that you can put proper resilience mechanisms in place.  
 
What worked well at BP was bringing engineering into cyber and cyber into engineering, giving each team expertise and perspective that it previously lacked. 
 
The truth is that different teams have different priorities. The engineering team might be aware of the importance of cybersecurity but needs to prioritise procedural elements and safety-critical matters. By encouraging interdepartmental collaboration, businesses can determine how to facilitate the rollout of controls and strategies across each environment.   
 
It’s ultimately all about context; what is the business trying to achieve, and what outcomes is it trying to fulfil? How does it support those outcomes? What technology does it use? What matters to it in terms of confidentiality, integrity, and availability?  

The Role Of Active Directory In Building Operational Resilience    

Active Directory (and Azure AD, in hybrid identity environments) has a central place in the quest for operational resilience.   
 
The single most important application across dimensions is Active Directory. Without it, you cannot fulfil any of your business outcomes. Active Directory is at the very core of your ability to operate and deliver business outcomes, and it needs to be part of your operational resilience strategy instead of being treated as an island.  

Take An Active Role In Operational Resilience   

Disaster recovery plans that focus on natural disasters are insufficient for dealing with modern threats to operational resilience. Because the organisation’s identity system is critical to keeping operations running - and is the prime target for cyberattacks - protecting it is paramount.

By prioritising the resilience of the identity system, organisations can address one of the most serious threats to operational resilience

Sean Deuby is Director of Services and Simon Hodgkinson is former Chief Information Security Officer at BP and Strategic Advisor for Semperis 

You Might Also Read: 

Securing Hybrid Identity:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

 

« UK Cyber Week - London - 4 and 5 April 2023
Security Is Key To Remaining Innovative Amid Recession »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

National Cybersecurity and Communications Integration Center (NCCIC) - USA

National Cybersecurity and Communications Integration Center (NCCIC) - USA

NCCIC is a cyber situational awareness, incident response, and management center for the US Government, intelligence community, and law enforcement.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Ingenio Global

Ingenio Global

Ingenio is a specialist recruitment business for SaaS companies. Our purpose is to source exceptional talent in areas including cyber security for leading SaaS companies in the UK and Ireland.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator for the North Atlantic (DIANA)

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.

Deimos

Deimos

Deimos is a technology, cloud, hybrid and multi-cloud focused, professional services company. Our expertise and focus is on cloud native Developer and Security Operations.

COcyber

COcyber

COcyber aims to enhance collaboration between the cybersecurity civilian and defence spheres. It is a two-year project funded by the European Union and it kicked off in July 2024.

Armilla AI

Armilla AI

Armilla is the world’s only MGA focused solely on AI insurance and offers third-party testing, compliance, risk mitigation, and warranty coverage for enterprises and AI vendors alike.

EU CyberNet

EU CyberNet

EU CyberNet – the bridge to cybersecurity expertise in the European Union. We establish a network and a practical learning platform with the goal to strengthen cybersecurity globally.