The Cyber Resilience Compass 2025
Page 20 of 26 · WEF_The_Cyber_Resilience_Compass_2025.pdf
Ecosystem engagement describes an organization’s
approach and practices in interacting with its wider
ecosystem, including its supply chain, customers,
competitors and regulators. This involves:
–Building visibility of upstream and downstream
dependencies with external parties
–Consistently assessing risk bidirectionally with
dependent parties
–Responding in partnership with external actors
–Sharing information in external forums
–Adapting to the changing technical, operational
and regulatory environment
Examples of front-line practices that organizations
are applying:
–CISOs, in collaboration with business units,
identify critical dependencies and single points
of failure by improving visibility and developing
an accurate mapping to evaluate third-party
risks. An accurate mapping recognizes that
supply chains are non-linear, that an issue
can propagate up or down the supply chain,
that organizations can be both a supplier and
customer, and that a single third party can hold
multiple roles.
–CISOs evaluate third-party cybersecurity
postures by establishing a consistent risk
assessment methodology and collaborating with
front-line business units and procurement teams
in establishing mitigation measures. Approaches
include using comprehensive questionnaires,
implementing contractual requirements and
collaborating with third parties to improve their
capacities to respond, continue operations and
mitigate impact in case of an incident.
–CISOs introduce playbooks that go beyond
the immediate organization to enable faster
and more effective remediation. This includes proactive collaboration with key partners,
cross-organizational exercising and building
relationships long before a crisis occurs.
–Organizations engage frequently and actively
in information-sharing networks to identify
threats faster, proactively mitigate vulnerabilities,
share resources and manage systemic risk.
These networks can include information
security and analysis centres (ISACs), computer
emergency response teams (CERTs) or other
forms of collaboration, involving partnerships
with governments and private-sector entities,
including competitors, customers and suppliers.
–CISOs and legal teams ensure the organization
remains adaptable to and engages with
developments in the wider ecosystem to
improve visibility of incoming changes and
capacity to adapt to the new environment.
This includes engagement with regulatory
bodies, policy-makers and industry bodies
to stay adaptable to regulatory, policy and
technology developments.
Experts agreed that while organizations can
take significant steps to enhance their own
cyber resilience, this individual posture can
depend heavily on the resilience of the broader
ecosystem, which requires collaborative action.
This collaboration should focus on: identifying
and addressing single points of failure; optimizing
the use of limited cyber talent while working to
expand this talent pool over time; engaging with
regulators to encourage cyber resilience throughout
the ecosystem; developing a more efficient and
effective systemic approach to supply assurance
than current practices; and proactively addressing
threats while finding ways to disrupt those who
seek to exploit cyber vulnerabilities.3.7 Ecosystem engagement
The industry has to be engaged in any solution. It can’t be sort
of a government in a vacuum or regulate errors without working
with industry to understand what a model would look like and
how they can do it.
Michele Mosca, Chief Executive Officer, evolutionQ
The Cyber Resilience Compass: Journeys Towards Resilience
20
Ask AI what this page says about a topic: