コンテンツにスキップ
サイバー回復力を描いたイラスト

イラスト by iStock,Security Management

カジノポケットマネー

When Dealing with Cyber Incidents, Speed Is Key

When it comes to a highly disruptive cyber attack—one that renders mobile, remote, and hybrid endpoint devices inoperable—time has become a critical factor.

Most incidents that fall into that category result in three to six days of operational downtime and cost the company between $1 million and $2 million. Those are findings from cybersecurity firm Absolute’s survey of more than 750 chief information security officers (CISOs) in the United States and United Kingdom, and published in the report,。調査に回答した CISO の合計 55% が、重大な混乱を引き起こしたサイバー攻撃を経験しました。

サイバーインシデント後の復元操作.PNG

サイバーインシデントの復旧コスト.PNG

“Not a single CISO reported being able to fully recover from a disruptive cybersecurity incident within a day,” the report said. “This level of downtime has far-reaching consequences — every minute impacts operations and revenue, erodes trust, and disrupts critical services. …The ability to recover quickly is the new benchmark for security success.”

さらに、CISO の期待と、CISO が企業幹部や取締役会が期待していると考えているものの間には、大きな乖離があります。 When asked if their organization is likely to experience a cyber attack that would result in significant downtime, more than half said yes (53 percent) and roughly a quarter said no (23 percent), with the rest falling the middle.

However, 61 percent of CISOs say their top leadership expects that cybersecurity investments the company has made will guarantee zero breaches or ransomware incidents. (Twenty percent said top leaders did not have such an expectation and 19 percent fell in the middle.) 11086_11093|Cyber 63946_64042|カジノサイト Awards & Scholarships Now Open!財団助成金受領者にスポットライトを当てる

“CISOs and savvy executive leaders know cyberattacks, data breaches, ransomware, and other forms of compromise and failure are inevitable,” the report said. “They are also aware that strategies and solutions proven to quickly resolve incidents and reduce downtime are readily available.”

そのためには、避けられない攻撃の成功に備えた計画が不可欠です。そう語るのは、スタンテック社のシニア テクニカル セキュリティ コンサルタント兼スタジオ リーダーである CPP、CISSP のコールマン ウルフ氏です。

「回復を促進するには、システムに関する適切な文書と計画をすでに策定しておくことが重要です」と Wolf 氏は言います。 「すべての事態に対応する計画を立てるのは難しいですが、たとえ 100% 完了または完璧ではなかったとしても、回復プロセスの良い道しるべにはなります。」

The documentation should include anything that can help identify the organization’s IT systems and how they are configured, he says. This can include system architecture, network diagrams, component inventory lists, component details (such as hardware model, operating system, firmware version, and similar attributes), and how those components are configured.

“Plans should include not only step-by-step procedures to recover systems,” Wolf says, “but should also include a list of resources needed, any points-of-contact needed, and communication plans, to communicate with employees, clients, customers, contractors, management, legal, insurance, media, and others. Vendor service agreements should be established to define recovery plans and requirements.”

カジノサイト には認定コースがあります。コンバージェンスの要点: 物理セキュリティとサイバーセキュリティの間のギャップを埋める, that explains the fundamentals of physical and cyber philosophies and concepts and describes how they can work together for a holistic security solution.

さらに、セキュリティ管理サイバーセキュリティに関する最近の記事パッケージが 2 つあります: 1 つは重要なインフラストラクチャの統合(2024 年 7 月) および重点を置いたセキュリティ テクノロジーサイバー ID 管理(2025 年 10 月)。

arrow_upward