Operational resilience is the capability of organizations to continue to deliver critical services in the face of evolving threats. Cyber security is a key mechanism by which organizations achieve this. The range and sophistication of cyber threats, from nation states, hacktivists and organized criminals, were already having a profound effect on how organizations achieve operational resilience - even before the acceleration of digitization and new ways of working during and post-Covid-19.
Increasing cyber threats
Phishing emails are increasingly citing topical reasons for quick action - such as home working and shifting supplier landscapes - to get people to follow instructions in the belief that they have been legitimately requested. Organizations are continuing to rapidly respond to ensure that their employees and customers remain vigilant to these emerging threats. For example, customer guidance from banks is under constant revision.
Growing reliance on technology
Companies are more reliant on technology than ever before - and this trend is likely to ony continue. Working from home has become the norm, leading to an increase in ‘shadow IT’ as employees eager to collaborate with their colleagues are turning to popular applications and services that may not be approved, or appropriate, for company use.
This has the potential to put company data at risk: employees may use home equipment that is less secure – wifi routers with default passwords or no access control; PCs or mobile devices with no endpoint protection; or they may email sensitive HR or financial information to their personal email accounts for convenience, increasing the risk of data leakage. Often organizations have no other option but to sanction the use of technology they have not the foresight and/or capability to secure, or are only now becoming aware of vulnerabilities because they are being exploited by new threat actors.
In addition, some businesses hastily set up increased online operations, with the need for speed often meaning security was an afterthought. The change happened so quickly that few companies had a chance to adjust their policies or provide any additional training.
While speed may have been of the essence in the immediate response to the pandemic, there is the risk that many of these new ways of working will stay in place even as lockdown restriction are lifted. Everyone in the company must be made aware that they have an important role to play in cyber security – it’s not something that can simply be handed to a team of cyber security professionals.
Responding to the threat
The best response to the growing cyber security threat is not to simply bolt a cyber security function next to existing capabilities. Instead, organizations should use cyber security as a lens through which to improve overall operational resilience. For example, the tools, techniques and cultural responses to cyber security can also be used to strengthen traditional business continuity capabilities.
A pragmatic way of approaching this in our view is a structured review of current cyber strategies and roadmaps to ensure new risks are identified and mitigated, and longer-term changes to ways of working are incorporated into existing business plans. Good cyber security practices should permeate everything technology related in a company and need to span the ‘Three Ps’: policy, people and process, as well as the technology itself.
It is important not to forget the supply chain – e.g. assessing third parties for their approach to securing their ‘Software as a Service’ products. Creating a cyber-aware culture within IT departments themselves is vital but it’s important not to forget end-user awareness through communications and training.
Achieving operational resilience requires a broad spectrum of interventions, from initial strategy definition through to delivering change and continuous improvement. Berkeley has worked with clients across this spectrum. We have set a cyber and resilience strategy, conducted health checks of ongoing resilience change projects and helped our clients execute cyber security-driven change initiatives.
Developing operational resilience
Cyber security fears have bred a proliferation of frameworks and point solutions such as the NIST Cybersecurity Framework provided by the US Department of Commerce and MITRE ATT&CK - a globally accessible knowledge base for tactics and techniques to combat cyber threats.
Too often, however, these are perceived as silver bullets. Frameworks and technology alone cannot be relied upon to deliver true operational resilience to cyber threats. When providing cyber security consulting to clients, from formulating resilience strategies through to delivering tangible change to their cyber security capabilities, our advice is:
Know the business – what’s important versus what’s critical? What are the inherent organizational cyber security strengths and weaknesses?
Don’t let great be the enemy of good – it’s easy to be seduced into attempting a leap to the gold standard. Before attempting wholesale organizational change, first ask “How good are we at the basics of cyber security?” It’s not glamorous but it’s essential.
Do you understand the estate / what digital assets you have / what may be of value / who might attack and why?
Do you have good organizational risk management into which you can integrate cyber security?
Do you have plans in place for when things go wrong (incident response)?
3. Judgement over theory – with cyber security, it’s impossible to analyze your way to success. True operational resilience is achieved by being pragmatic, iterating through focused thinking and delivering meaningful change in manageable steps.
4. People are as important as machines – too often cyber security is characterized as a technology arms race, but developing operational resilience relies as much on cultural and behavioral change within your business (see the 'Three Ps' referenced above).
End-user awareness, to ensure they are less vulnerable to phishing and social engineering, is just as important as latest generation firewalls but that awareness needs to evolve as the threats evolve. For example, you might spot the email purporting to be from the 'Finance director”, but would you spot the latest deepfake phone call?
Elaborate information protection solutions are no substitute for a culture in which end users understand what constitutes sensitive or private information and respect how it should be handled
Buying extended support for software is of little use if your business stakeholders won’t accept the disruption that comes with installing the security patches that come with it.
5. Get in to the heads of the decision makers – governance, organization and ownership are everything. Effective operational resilience should come from the top down, not the side in.
By adopting these principles, which contextualize cyber security interventions, organizations will maximize the value they get from frameworks and point solutions.
How we can help?
Since we were established in 1990, we have been supporting our clients with their most complex, critical and legacy leaving challenges, by deploying small teams of highly experienced people. An increasing number of our clients have been turning to us to support them with their cyber security and resilience challenges. As a result, we have developed a breadth of experience in the financial services, logistics, consumer goods and media sectors where we have set cyber strategy and delivered associated change programs.
We offer our clients a range of services to tackle cyber security and operational resilience challenges.
Our recent assignments in operational resilience consulting range from upfront strategy and risk management assessments, such as:
Developing the recovery and resilience strategy for a central bank-operated piece of critical national infrastructure (and mobilizing the program to deliver this)
Working for a financial services regulator to develop a program that assessed the operational resilience of firms in a range of sectors.
Through to existing change portfolio assessments and delivery:
Leading significant information security programs for a global consumer goods company, and a financial services regulator