{"id":89872,"date":"2019-09-17T09:00:37","date_gmt":"2019-09-17T16:00:37","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89872"},"modified":"2023-05-15T23:07:37","modified_gmt":"2023-05-16T06:07:37","slug":"operational-resilience-commitment-investment-cyber-resilience","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/09\/17\/operational-resilience-commitment-investment-cyber-resilience\/","title":{"rendered":"Operational resilience begins with your commitment to and investment in cyber resilience"},"content":{"rendered":"

Operational resilience cannot be achieved without a true commitment to and investment in cyber resilience. Global organizations need to reach the state where their core operations and services won\u2019t be disrupted by geopolitical or socioeconomic events, natural disasters, and cyber events if they are to weather such events.<\/p>\n

To help increase stability and lessen the impact to their citizens, an increasing number of government entities have drafted regulations requiring the largest organizations to achieve a true state of operational resilience: where both individual organizations and their industry absorb and adapt to shocks, rather than contributing to them. There are many phenomena that have led to this increased governance, including high-profile cyberattacks like NotPetya, WannaCrypt, and the proliferation of ransomware.<\/p>\n

The rise in nation state and cybercrime attacks focusing on critical infrastructure and financial sectors, and the rapid growth of tech innovation pervading more and more industries, join an alarming increase in severe natural disasters, an unstable global geopolitical environment, and global financial market instability on the list of threats organizations should prepare for.<\/p>\n

Potential impact of cybercrime attacks<\/h3>\n

Taken individually, any of these events can cripple critical business and government operations. A lightning strike this summer caused the UK\u2019s National Grid to suffer the biggest blackout in decades. It affected homes across the country, shut down traffic signals, and closed some of the busiest train stations in the middle of the Friday evening rush hour. With trains needing to be manually rebooted, the rhythm of everyday work life was disrupted. The impact of cybercrime attacks can be as significant, and often longer term.<\/p>\n

NotPetya cost businesses more than $10 billion; pharmaceutical giant Merck put its bill at $870 million alone. For more than a week, the malware shut down cranes and security gates at Maersk shipping terminals, as well as most of the company\u2019s IT network\u2014from the booking site to systems handling cargo manifests. It took two months to rebuild all the software systems, and three months before all cargo in transit was tracked down\u2014with recovery dependent on a single server having been accidently offline during the attack due to the power being cut off.<\/p>\n

The combination of all these threats will cause disruption to businesses and government services on a scale that hasn\u2019t been seen before. Cyber events will also undermine the ability to respond to other types of events, so they need to be treated holistically as part of planning and response.<\/p>\n

Extending operational resiliency to cover your cybersecurity program should not mean applying different principles to attacks, outages, and third-party failures than you would to physical attacks and natural hazards. In all cases, the emphasis is on having plans in place to deliver essential services whatever the cause of the disruption. Organizations are responding by rushing to purchase cyber-insurance policies and increasing their spending on cybersecurity. I encourage them to take a step back and have a critical understanding of what those policies actually cover, and to target the investment, so the approach supports operational resilience.<\/p>\n

As we continue to witness an unparalleled increase in cyber-related attacks, we should take note that a large majority of the attacks have many factors in common. At Microsoft, we\u2019ve written at length on the controls that best position an organization to defend against and respond to a cyber event.<\/p>\n