Business continuity team: Are you ready for the next cyber-attack?

By: Mijee Briana Walker


Businesses and IT agree that cybersecurity is one of their top concerns. In many companies, the responsibility sits solely with the security team — but in reality, they’re not the only ones responsible for business continuity or disaster recovery. This organizational gap between the business, IT and security can result in gaps in strategy and plans — and, during a cyber-attack, can impede business activities and delay the recovery.

Cyber resiliency is a team sport. It’s in companies’ best interests to have the business continuity team, the security team and the disaster recovery team work together to develop a comprehensive strategy that helps the business prepare, protect, detect, respond and recover in the event of a cyber-attack. What role does your business continuity management team play in planning for cyber resiliency?

Now is the perfect time to review and integrate your plans into a cohesive cyber resiliency strategy. Here are three suggested areas to get started.

Are you prepared for a cyber event?

  1. Do your business users know how they can help prevent cyber-attack by not clicking on unknown links or opening unknown attachments?
  2. Do you have a workflow communication tool that is configured to alert and relay instructions to the business and IT if a cyber event happens?
  3. Does the business have manual procedures developed to keep critical business processes going if employees can’t access their usual IT-connected devices, such as computers, tablets and smartphones?
  4. When is the last time your business continuity plan (BCP) was tested end-to-end, including security responders, IT recovery teams and business users?

Are you ready to respond to cyber outbreaks?

  1. Have you selected cyber incident responders who can leverage threat intelligence to repel the attackers?
  2. What is your plan to remediate the damage during the attack?
  3. Do you have a plan to use network resources to reroute critical traffic and defend against outside threats?

Do you have a plan for recovery?

  1. Do you know which business applications are mission-critical?
  2. Does your disaster recovery team have a DR plan if the primary replica of data is corrupted in the attack?
  3. Is your disaster recovery orchestrated or automated?

Harness the full power of your core business applications

Cyber-attacks are no longer a matter of if — they’re now a matter of when. By working together, you can put your business in a better position to respond to and remediate the impact of the next attack. Wishing you all a cyber-safe year!

For more information about IBM solutions for business continuity, schedule a one-on-one consultation with an IBM business resiliency expert, and be sure to explore our demos and webinars at this year’s Business Continuity Awareness Week.

In depth: business continuity topics

Understand how to plan for and react when business disruptions are happening.

Adapt and respond to risks with a business continuity plan (BCP)

How to defend against cyber attacks

Do you have your disaster recovery plan (DRP)?

Defend against ransomware attacks?

What is data breach and how to defend against one?

What is a recovery time objective (RTO) and how does it affect disaster recovery for your enterprise?

What is an RPO (recovery point objectives)?

Topics: , ,

About The Author

Mijee Briana Walker

Asia Pacific Leader for IBM Resiliency Services

Mijee Briana Walker is the Asia Pacific Leader for IBM Resiliency Services. With 20 years in Information Technology, she has worked with companies around the world to help them determine how they can best achieve their availability and continuity goals - from both a business and technology perspective. She has consulted on resiliency programs for... Read more