Embracing Resilience in the Face of Rising Cyber Threats
The digital landscape is evolving rapidly, and with it comes an array of increasing cyber threats. Organizations are now recognizing that the traditional focus on prevention is no longer sufficient. Instead, they must cultivate resilience and a robust recovery capability. Alain Sanchez, the EMEA Chief Information Security Officer (CISO) at Fortinet, emphasizes the critical need for building resilient and sovereign infrastructure to effectively defend modern digital systems.
The Shift from Security to Resilience
As meetings and discussions unfold, it becomes increasingly clear that striving for 100% security is becoming an outdated notion. The intertwining complexities of digital systems, coupled with the exponential rise in AI-driven threats and sophisticated attacks from nation-states, reveal the futility of attempting to avoid all incidents. For today’s CISOs and their executive teams, this reality necessitates a transformative shift in strategy—from a narrow focus on security to a broader commitment to resilience.
Traditional security measures often foster a false sense of safety, creating a fortress mentality that aims to keep adversaries at bay. Resilience, on the other hand, embraces the understanding that breaches are not just possible, but likely. The true measure of success lies in the organization’s ability to maintain operational continuity and recover swiftly when breaches occur.
Core Capabilities of a Resilient Organization
In this new paradigm, organizations must focus on three essential capabilities that center their resilience efforts:
1. Anticipatory Response
This approach goes beyond merely identifying system vulnerabilities. It involves drawing lessons from live attacks in real-time. By analyzing the actions of an attacker as they unfold, organizations can gain insights into potential weak points and prepare recovery tools proactively, thereby minimizing damage.
2. Managed Degradation
Organizations need to adopt a mindset that accepts the possibility of some parts of their network being compromised. A critical strategy is to ensure that vital services—whether it’s financial transactions or healthcare functions—remain operational, albeit at a limited capacity. This acceptance of a ‘degraded state’ guarantees that essential activities can continue even when disruptions occur.
3. Rapid Restoration
The emphasis is shifting from ‘if we are attacked’ to ‘how quickly can we recover.’ The effectiveness of this capability is measured by the Recovery Time Objective (RTO), supported by reliable data backups and well-tested recovery plans that ensure a swift comeback.
Legal Imperatives for Critical Infrastructure
For organizations managing Critical Infrastructure (CI), embracing resilience is not just a strategic choice; it is fast becoming a legal and regulatory requisite. Critical Infrastructure includes the systems and assets essential for national security, public health, and economic stability. The rise of resilience mandates marks a watershed moment in the relationship between governments and the private sector. It underscores the government’s expectation that private operators are responsible for ensuring their systems can withstand and recover from disruptions, thereby enhancing national security.
The Evolution of Cloud Sovereignty
As resilience requirements become more stringent, innovative infrastructure models are emerging to support these changes:
Sovereign Cloud Partitions
Cloud providers are beginning to create environments that are both physically and logically isolated from foreign jurisdictions. For example, the AWS European Sovereign Cloud (ESC) guarantees that critical data management takes place entirely within the EU, ensuring compliance with legal frameworks and maintaining local control over sensitive information.
Sovereign Edge Computing
Telecommunications providers are integrating security and processing capabilities directly at the network’s edge. This approach allows for sensitive data to be processed locally before it ever reaches the public internet, enhancing both data sovereignty and the principles of Managed Degradation.
Market Responses to Changing Regulations
The regulatory atmosphere is shifting along with an evolving economic landscape. At the World Economic Forum’s annual gathering in Davos, Fortinet announced that a staggering 92% of CEOs now prioritize building ‘cyber-recovery capabilities’ over traditional perimeter defense spending. This transition will inevitably ripple through the market and prompt significant changes:
Insurance Transformation
Cyber insurers are responding by developing ‘Resilience Audits,’ which assess premiums based not only on breach occurrences but also on an organization’s RTO. This focus on measurable recovery capabilities incentivizes companies to invest in frameworks that can be validated and quantified.
The OECD Governance Framework
The Organisation for Economic Co-operation and Development (OECD) is advocating for new governance models to ensure CI resilience. These frameworks aim to curtail service disruptions through cross-sector collaboration, promoting redundancy and incident reporting.
Technological Innovations for Resilience
Emerging technologies are paving the way for what is being termed ‘Autonomous Resilience.’ This includes the development of ‘Self-Healing Networks,’ which can automatically adapt in response to attacks. These sophisticated systems leverage real-time threat data to enhance their defenses, embodying the philosophy of resilience.
New Paradigms for the CISO
The role of the CISO is in the midst of a profound transformation. No longer merely the gatekeeper of defenses, the CISO is now evolving into the architect of business continuity. The focus lies not on preventing every possible attack but on constructing systems designed to absorb shocks and ensure rapid recovery within defined legal boundaries. In this new landscape, the organizations that thrive are those that leverage the lessons of breaches to enhance their defenses, ensuring their operations endure with minimal disruption.


