return to research
Research
Managing Cyber Threats During Periods of Instability
riskemerging threatsransomwaretechnologypeople
Managing Cyber Threats During Periods of Instability
Seven Proactive Steps Towards Stabilisation
The digital world is not immune from impact during periods of real-world instability and conflict. Indeed, many governments and defence think-tanks regard cyberspace as an emergent parallel battlefield in times of conflict.
As organisations continue to digitally transform, their dependency on cyberspace – and thus the impact of any disruption to it – continues to grow.
1. Determine if you are a target
2. Conduct regular testing
3. Monitor the developing situation
4. Do you have digital assets in the destabilised regions?
5. Build an asset isolation plan
6. Hone your extinction level attack preparation and planning
7. Maintain engagement with stakeholders
SUPPORTING CONTENT
DISCOVER HOW THE ISF
CAN HELP YOUR ORGANISATION
If you are not a Member of the ISF and are interested in finding out more about ISF Research or ISF Membership, then please get in touch today.
Managing Cyber Threats During Periods of Instability