I graduated from the University of Wisconsin-Madison in 2010 with a Bachelor of Business Administration in Finance and Management & Human Resources. During my university years I found a true passion f...
Marcus Holzer, Consultant
View Marcus now
It's the people that make Berkeley different to other consultancies.
Bright, friendly, down-to-earth people who are both thinkers and doers. Working by your side, as consultants and colleagues, to get the right results.
We’re about being there for our clients when it really matters. When it absolutely has to be right. Doing the right thing is both our ethos and sweet spot. And it’s why clients turn to us again and again.
Whatever your long term career goals, we’re here to support you. Through an open dialogue, we help our people to build the capabilities, experiences and networks they need to boost their careers.
Our Partners and consultants share their perspectives and thinking on topical issues.
Home > News & Views > Highlighted Articles > Cyber Security and Operational Resilience
Our recent assignments in operational resilience consulting range from upfront strategy and risk management assessments, such as: Operational resilience is the capability of organisations to continue to deliver critical services in the face of evolving threats. Cyber security is a key mechanism by which organisations achieve this. The range and sophistication of cyber threats, from nation states, hacktivists and organised criminals, was already having a profound effect on how organisations achieve operational resilience - even before Covid-19.
The current pandemic means that companies need to be more vigilant than ever. According to the National Cyber Security Centre, cyber criminals are exploiting coronavirus fears and using the pandemic as bait in phishing attacks. Phishing emails are increasingly citing topical reasons for quick action - such as furlough or home working - to get people to follow instructions in the belief that they have been legitimately requested. Organisations are having to rapidly respond to ensure that their employees and customers remain vigilant to these emerging threats. For example, customer guidance from banks is already being revised in response to this latest surge, and over a dozen NHS organisations have had to respond to ransomware attacks.
At the same time, companies are suddenly more reliant on technology than ever before. Working from home has become the norm, leading to an increase in ‘shadow IT’ as employees eager to collaborate with their colleagues are turning to popular applications and services that may not be approved, or appropriate, for company use. This has the potential to put company data at risk: employees may use home equipment that is less secure – wifi routers with default passwords or no access control; PCs or mobile devices with no endpoint protection; or they may email sensitive HR or financial information to their personal email accounts for convenience, increasing the risk of data leakage. Often organisations have no other option but to sanction the use of technology they have not yet been able to secure, or are only now becoming aware of vulnerabilities because they are being exploited by new threat actors.
In addition, some businesses are hastily standing up increased online operations, with the need for speed often meaning security is an afterthought. The change has happened so quickly that few companies have had a chance to adjust their policies or provide any additional training. While speed may be of the essence in the immediate response to the pandemic, there is the risk that many of these new ways of working will stay in place even as lockdown restriction are lifted. The cyber security skills gap may widen as companies are forced to act. However, everyone in the company needs to be aware that they have an important role to play in cyber security – it’s not something that can simply be handed to a team of cyber security professionals.
The best response to the growing cyber security threat is not to simply bolt a cyber security function next to existing capabilities. Instead, organisations should use cyber security as a lens through which to improve overall operational resilience. For example, the tools, techniques and cultural responses to cyber security can also be used to strengthen traditional business continuity capabilities.
A pragmatic way of approaching this in our view is a structured review of current cyber strategies and roadmaps to ensure new risks are identified and mitigated, and longer-term changes to ways of working are incorporated into existing business plans. Good cyber security practices should permeate everything technology related in a company and need to span the ‘three Ps’: policy, people and process, as well as the technology itself. It is important not to forget the supply chain – e.g. assessing third parties for their approach to securing their ‘Software as a Service’ products. Creating a cyber-aware culture within IT departments themselves is vital but it’s important not to forget end-user awareness through communications and training.
Achieving operational resilience requires a broad spectrum of interventions, from initial strategy definition through to delivering change and continuous improvement. Berkeley has worked with clients across this spectrum. We have set a cyber and resilience strategy, conducted health checks of ongoing resilience change projects and helped our clients execute cyber security-driven change initiatives.
Cyber security fears have bred a proliferation of frameworks and point solutions such as the NIST Cybersecurity Framework provided by the US Department of Commerce and MITRE ATT&CK - a globally accessible knowledge base for tactics and techniques to combat cyber threats. In the UK, the National Cyber Security Centre has provided a Cyber Assessment Framework providing guidance for organisations. Too often, however, these are perceived as silver bullets. Frameworks and technology alone cannot be relied upon to deliver true operational resilience to cyber threats. When providing cyber security consulting to clients, from formulating resilience strategies through to delivering tangible change to their cyber security capabilities, our advice is:
3. Judgement over theory – with cyber security, it’s impossible to analyse your way to success. True operational resilience is achieved by being pragmatic, iterating through focused thinking and delivering meaningful change in manageable steps.
4. People are as important as machines – too often cyber security is characterised as a technology arms race, but developing operational resilience relies as much on cultural and behavioural change within your business (see the “three P”s referenced above):
5. Get in to the heads of the decision makers – governance, organisation and ownership are everything. Effective operational resilience should come from the top down, not the side in.
By adopting these principles, which contextualise cyber security interventions, organisations will maximise the value they get from frameworks and point solutions.
For the last thirty years, we have been supporting our clients with their most complex, critical and legacy leaving challenges, by deploying small teams of highly experienced people. Over the last five years, an increasing number of our clients have been turning to us to support them with their cyber security and resilience challenges. As a result, we have developed a breadth of experience in the financial services, logistics, consumer goods and media sectors where we have set cyber strategy and delivered associated change programmes.
We offer our clients a range of services to tackle cyber security and operational resilience challenges:
Our recent assignments in operational resilience consulting range from upfront strategy and risk management assessments, such as:
Through to existing change portfolio assessments and delivery:
If you’d like to hear more about how we’re supporting our clients in this space or if you are interested in learning more about any topics raised in this article, please contact partner Dave Machin.
Download this article
We have placed cookies on your computer to help make this website better. You can change your cookie settings at any time. Otherwise, we'll assume you're OK to continue.