0% found this document useful (0 votes)
8 views

Building Resiliency For Times of Disruption

Uploaded by

2000.pradeep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Building Resiliency For Times of Disruption

Uploaded by

2000.pradeep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

BUILDING RESILIENCY FOR

TIMES OF DISRUPTION
Five Ways to Take Action

BUILDING RESILIENCY FOR TIMES OF DISRUPTION: FIVE WAYS TO TAKE ACTION | 1


Business disruptions can catch us off guard. In a time of

crisis, many organizations may not be entirely sure how to

respond. After all, global and prolonged disruptions don’t


“The time for action is now.
come along every day. And when they do, they rarely have It’s never too late to do
the profound personal and global implications we’ve seen something.”
Antoine de Saint-Exupéry
in 2020. But whatever the nature of the disruption, it’s

never too late to take action. Here are five steps you can

take to reduce the impacts on your organization, people,

customers and business objectives.

BUILDING RESILIENCY FOR TIMES OF DISRUPTION: FIVE WAYS TO TAKE ACTION | 2


STEP 1: Now, more than ever, is the time to have response and recovery plans that enable your
organization to react, adapt and recover from disruption. Response and recovery plans
IMPLEMENT should be designed to:

RESPONSE AND
RECOVERY Protect your people and enable them to do their jobs and support recovery
of the business
PLANS
Maintain (and recover, if needed) critical functions and supporting systems,
locations and data

Ensure critical third parties are providing the level of service your organization
needs, or make alternative plans if possible

Case in Point: CDC Resources for Pandemic Planning

If you don’t have response and recovery plans for large-scale disruptions such as
a pandemic, take a look at this pandemic planning template from the Centers
for Disease Control and Prevention (CDC). You can input this content into the
RSA Archer Business Continuity & IT Disaster Recovery Planning use case,
®

adapt the plans and activities to your organization’s situation, and begin to
manage your response and recovery right away.

BUILDING RESILIENCY FOR TIMES OF DISRUPTION: FIVE WAYS TO TAKE ACTION | 3


STEP 2: Crisis response teams are responsible for leading their organizations successfully through business
disruptions – quickly making response decisions, enabling the organization to take appropriate
EFFECTIVELY action, communicating efficiently and coordinating with business recovery teams. It’s vital to keep

MANAGE THE the organization and extended ecosystem informed and acting in lockstep with each other. Follow
these guidelines to help ensure effective crisis management:
CRISIS EVENT
Use technology with a standards-based and best-practices approach to
coordinate activities, so crisis teams can focus on actions requiring their
expertise and judgment

Quickly establish the crisis team and executive leadership as a source of


truth and guidance

Use communication methods that make information easy to consume (such as


mobile devices) and that support real-time back-and-forth messaging between
resiliency leaders and response and recovery teams

Provide leadership with real-time status updates so they can communicate timely
information to the larger community

“For every 10% that a team outscored other teams on virtual communication
effectiveness, they also outscored those teams by 13% on overall
performance.”

“Five Ways to Improve Communication in Virtual Teams,” MIT Sloan Management Review 1

BUILDING RESILIENCY FOR TIMES OF DISRUPTION: FIVE WAYS TO TAKE ACTION | 4


STEP 3: Disruptions can necessitate that your workforce work remotely, potentially creating stress for
employees, contractors and others who are not accustomed to working from home. Remote work
EMPOWER can also create security risks if they are using their own devices to log in or using corporate laptops
at home where they’re not likely to have the security protocols required in the office. As you work
YOUR DYNAMIC to balance empowering your dynamic workforce to work independently with keeping your online

WORKFORCE resources secure, there are several things you can do to smooth the transition:

Develop straightforward, concise work-from-home policies and procedures

Ramp up help desk operations and ensure procedures include


work-from-home support

Ensure you have adequate secure access and authentication technologies


and controls in place

Support mental and emotional well-being with an employee assistance program


or wellness program

45% of professionals who handle confidential data at work admitted to


using public Wi-Fi and personal email to do so.

Dell End-User Security Survey 2

BUILDING RESILIENCY FOR TIMES OF DISRUPTION: FIVE WAYS TO TAKE ACTION | 5


STEP 4: Third parties are partners, vendors, contractors and supply chains your organization engages
to achieve your strategic objectives. Your third parties become an integral extension of your
DRIVE organization and enable you to support customers, innovate, implement technologies and more.
However, disruptions that impact your organization may affect your third parties’ ability to
RESILIENCY perform, and vice versa. It’s a symbiotic relationship that carries risk, so it’s important to build

ACROSS YOUR resiliency across your broader business ecosystem. In the midst of a business disruption, it
is critical to:
THIRD PARTIES
Work with your third-party risk teams to understand the continuity status of
your most critical third parties

Understand supply chain exposures, prioritize them and address gaps as


soon as possible

Coordinate your response and recovery plans with those of your most
critical third parties

Automate and orchestrate policies across data security tools, and adapt rules
and controls based on changing workforce needs and observed behaviors

70% of risk management professionals characterize their organization as


moderately to highly dependent on external entities.

“Reestablishing the perimeter: Extending the risk management ecosystem,” DeLoitte 3

BUILDING RESILIENCY FOR TIMES OF DISRUPTION: FIVE WAYS TO TAKE ACTION | 6


STEP 5: During disruptions, other risks your organization is dealing with don’t stop. In fact, they may even
escalate as bad actors try to take advantage through cyber attacks or fraud. Regulatory compliance
DON’T FORGET can receive less attention as teams change their focus to current business impacts. Disruptions
demand everyone’s attention, and if they extend over a long period of time, the risk of not achieving
OTHER RISKS business objectives can create strategic risk.

It is critical to ensure your risk management program enables you to continue to identify new
risks, evaluate and measure critical risks, take appropriate steps to manage the risks within
acceptable tolerance levels, and advise executives on decisions they need to make.

Planning for the Next Time


When the disruption ends – as disruptions always do – that’s the ideal time to evaluate your
organization’s response. This should include:

• Assessment of the effectiveness of response and recovery plans,


third-party engagements and contracts and service agreements
• A look at how your workforce responded, using performance measures,
employee turnover statistics and other metrics
• Evaluation of overall resiliency capabilities

Consider engaging experts who have helped many other organizations mature their resiliency
capabilities. Now is the time to act, and RSA stands ready to support your organization.

BUILDING RESILIENCY FOR TIMES OF DISRUPTION: FIVE WAYS TO TAKE ACTION | 7


RSA HELPS YOU COORDINATE BUSINESS RESILIENCY
While other vendors focus on disaster recovery, RSA approaches resiliency for the digital age more strategically by integrating it with your
organization’s integrated risk management program and by addressing a range of use cases geared toward digital business, with a strong focus
on cybersecurity. The RSA solution for business resiliency is designed to help your organization unify disparate teams, understand business
impact and coordinate activities to build resiliency.

HOW WE HELP
ASSESS BUSINESS SECURE, RISK- BUSINESS EVOLVED SIEM/ OMNI-CHANNEL
RESILIENCY BASED ACCESS & RESILIENCY ADVANCED THREAT FRAUD PREVENTION
CAPABILITIES AUTHENTICATION DETECTION &
RESPONSE

Engagement Risk-Based Authentication Business Context Security Platform Omni-Channel Fraud


Detection
Assessment Authentication Anomaly Criticality & Priority Logs & Packets
Detection Advanced Adaptive
Risk Quantification Risk Assessment Endpoint Authentication
Identity, Governance &
Governance Lifecycle Management Recovery & Testing UEBA Real-Time Risk Assessment
Benchmark Report Access Policy Incident & Crisis Orchestration & Fraud Intelligence
Violation Detection Automation
Anti-Phishing Threat
Management

To see how RSA can help you take action to make your organization more resilient, contact us to request a demo

BUILDING RESILIENCY FOR TIMES OF DISRUPTION: FIVE WAYS TO TAKE ACTION | 8


DIGITAL RISK IS EVERYONE’S BUSINESS
HELPING YOU MANAGE IT IS OURS
RSA offers business-driven security solutions that provide organizations with a unified
approach to managing digital risk that hinges on integrated visibility, automated insights and
coordinated actions. RSA solutions are designed to effectively detect and respond to advanced
attacks; manage user access control; and reduce business risk, fraud and cybercrime. RSA
protects millions of users around the world and helps more than 90 percent of the Fortune
500 companies thrive and continuously adapt to transformational change.

Find out how to thrive in a dynamic, high-risk digital world at rsa.com

1. N. Sharon Hill and Kathryn M. Bartol, “Five Ways to Improve Communication in Virtual Teams,”
MIT Sloan Management Review, Fall 2018 Issue

2. End User Security Survey 2017, Dell

3. “Reestablishing the perimeter: Extending the risk management ecosystem,” Deloitte, October 2018

© 2020 Dell Inc. or its subsidiaries. All Rights Reserved. RSA and the RSA logo are trademarks of Dell Inc. or its subsidiaries in the United
States and other countries. All other trademarks are the property of their respective owners. RSA believes the information in this
document is accurate. The information is subject to change without notice. Published in the USA, 4/20 eBook H18243 W353671

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy