The Cyber Resilience Compass 2025

Page 5 of 26 · WEF_The_Cyber_Resilience_Compass_2025.pdf

Unpacking cyber resilience1 Cyber resilience goes beyond traditional cybersecurity; it is an organization’s ability to minimize the impact of significant cyber incidents on its primary business goals and objectives. The term “cyber resilience” does not diminish the importance of cybersecurity but recognizes that where 100% cybersecurity cannot be achieved, further measures are required (both pre- and post-incident) to protect the organization from the impacts of severe cyber events. When considering cyber resilience, it is important to take a broad view of what cyber risk encompasses. Cyber risk can refer to any risk that arises from an organization’s use of information services and digital technology or from their use by others in the supply chain or within the wider business environment. Organizations need to consider the many ways in which they are exposed to cyber risks and how they can limit potential impacts – whether by investing in operational cybersecurity controls, by adapting business processes or by taking steps to reduce legal or regulatory liability. This might involve ensuring that business-as-usual operations can continue when system outages occur or limiting the harm that could arise from a compromise to the confidentiality of data. Cyber resilience focuses on limiting the impact, which could be short-term or long-term, operational or strategic, financial, legal or reputational – or a combination of these factors.Preparing for cyber incidents Organizations advise acting on the assumption that significant cyber incidents will occur. To ensure that they can continue to achieve their primary goals and objectives, organizations need to be able to: –Anticipate and plan for incidents, based on an understanding of the threats to which they are exposed and the potential harms that could arise. –Design processes and establish contingent capabilities that will place the organization in a good position to absorb and recover from events. –Adopt information governance practices that can limit the impact arising from confidentiality breaches and data integrity compromises. –Learn from incidents affecting their own organization and peers and adapt to strengthen their resilience posture – and perhaps find even better ways to deliver business value. –Take a broad view of cyber risk and the many ways in which malign actors could exploit cyberspace to cause harm to their operations, profitability or reputation. The Cyber Resilience Compass: Journeys Towards Resilience 5
Ask AI what this page says about a topic: