Already an ISF Member? You can download the Extinction Level Attacks report from your ISF Live account here

Extinction level attacks present an almost insurmountable challenge as the digital world becomes weaponised. They are difficult to predict and very likely to overcome technical preventative controls.  The devastation that they can cause is profound and business threatening. Accepting the reality of extinction level attacks and planning for survival represents a cost-effective and pragmatic approach.

This report details an approach that can help an organisation to be better prepared, and ultimately survive an extinction level attack, by focusing on the role of the information security function in three key stages:

  • Prepare – tasks to complete before an attack, to ensure that the organisation is better prepared to respond to the attack when it happens.
  • Respond – tasks to execute during an attack, in order to lessen its impact and to speed the recovery.
  • Resume – tasks that are instrumental in returning to a stable and secure organisational state as quickly as possible.

Members of the ISF can access the Extinction Level Attacks report through your ISF Live Account.

If you are not a Member of the ISF but are interested in reading this report or finding out more, please fill out the form below