The Cyber Resilience Compass 2025
Page 16 of 26 · WEF_The_Cyber_Resilience_Compass_2025.pdf
Account compromise provides cybercriminals with a
straightforward method of generating profit. By bypassing
traditional security measures such as passwords and
multifactor authentication (MFA), hackers can steal sensitive
information, including personal details, financial data and log-
in credentials. To address this concern, IMD Business School
enforces strong password hygiene, number matching and
context-based MFA prompts. It also strengthens phishing
protection through security awareness training, advanced
email filtering and risk-based access controls that block
suspicious log-ins.
However, acknowledging that not all compromises can
be prevented, IMD Business School has established key
damage control measures:
–Limit email exposure: Restrict the number of emails an
employee can send within a set time frame to reduce
phishing risks.
–Block self-service MFA registration: To prevent
attackers from adding their own devices during an
account compromise, users must contact IT Support to
register new MFA devices. –Restrict uploads of “IMD Confidential” files:
Documents labelled “IMD Confidential” cannot be
uploaded to unsanctioned cloud storage or external USB
devices. Automatic labelling identifies sensitive files based
on patterns such as files including 20+ email addresses.
–Block downloads to personal devices (“bring your
own device” – BYOD): Prevents sensitive documents
from being saved on unmanaged devices, reducing
insider threats and data leaks.
Through its proactive security practices, IMD Business
School effectively reduces the number of successful account
compromises. Equally important, IMD Business School’s
robust damage control measures – restriction of certain
functions – ensure that even if an incident does occur, the
impact is minimized, safeguarding the organization’s sensitive
data and systems.CASE STUDY 8
IMD Business School – A step ahead: Reducing account
compromises and minimizing their impact
Technical systems describe an organization’s
approach to designing, deploying and maintaining
IT, OT, cloud and cybersecurity tools and controls,
whether in-house, outsourced or hybrid. This involves:
–Understanding business prioritization of
services
–Using data to prevent and predict incidents
–Implementing technical controls as
preventive measures and to minimize the
impact of incidents
–Evaluating tooling based on problems,
outcomes and organizational context
Examples of front-line practices that organizations
are applying:
–CISOs build awareness among the
organization’s technical teams of how the
business operates, so these teams understand
the best ways to protect the most important
services and assets. Organizations train
technical teams on risk assessments and impact analyses, ensuring that technical
staff gain a clear understanding of business
priorities and align their security efforts with the
organization’s strategic objectives.
–Technical teams use data as a key differentiator
in crises to enable faster response, thorough
investigation and detection of minor issues
before they escalate into major disruptions. This
includes collecting and integrating real-time
information from various sources and applying
advanced analytics and AI models to identify
emerging issues early, coordinate responses
quickly and prevent minor problems from
escalating into much more significant issues.
–Technical teams implement and periodically
review hardening techniques, contingent
technology and fundamental technical controls
to prevent incidents, create redundancy
during crises and minimize impact. Those
techniques include infrastructure segmentation
and segregation, MFA, secure back-ups, log
management, leveraging threat intelligence,
adherence to standards and consistent cyber
hygiene practices. 3.5 Technical systems
The Cyber Resilience Compass: Journeys Towards Resilience
16
Ask AI what this page says about a topic: