return to research
Research

Managing Cyber Threats During Periods of Instability

riskemerging threatsransomwaretechnologypeople
Array
Managing Cyber Threats During Periods of Instability
Download to share with your network

Seven Proactive Steps Towards Stabilisation

The digital world is not immune from impact during periods of real-world instability and conflict. Indeed, many governments and defence think-tanks regard cyberspace as an emergent parallel battlefield in times of conflict.

As organisations continue to digitally transform, their dependency on cyberspace – and thus the impact of any disruption to it – continues to grow.

1. Determine if you are a target
2. Conduct regular testing
3. Monitor the developing situation
4. Do you have digital assets in the destabilised regions?
5. Build an asset isolation plan
6. Hone your extinction level attack preparation and planning
7. Maintain engagement with stakeholders