IT in Manufacturing


Cybersecurity and cyber resilience – the integrated components of a robust cyber risk management strategy

November 2024 IT in Manufacturing

Organisations continuously face numerous cyberthreats in today’s digital landscape, and while many prioritise cybersecurity to safeguard digital assets, their strategies for cyber resilience often become neglected.

Yet, understanding the distinction between the two and how they complement each other as integrated components is key to developing a comprehensive and robust cyber risk management strategy. It is important to understand that while cyber resilience and cybersecurity are related to a degree, they are also distinct concepts.

Cybersecurity relates to the operational side of an IT environment and focuses on protecting systems, networks and data from unauthorised access and unauthorised use. It also emphasises the prevention and detection of cyberthreats to minimise the risk of cyberattacks or breaches before they occur.

Cyber resilience, on the other hand, speaks to the ability of an organisation to withstand or respond to a cyberattack or breach, and is therefore focused on the preparation, the response and the subsequent learnings from a cyber incident.

Cyber resilience builds on cybersecurity by ensuring an organisation can continue delivering outcomes despite adverse cyber events. It involves preparation, response, recovery, and adaptation to maintain continuity and quickly recover from incidents.

Critical component

A critical component of cyber resilience is the Survival Time Objective (STO), which is the maximum amount of time in which an organisation must detect, respond to and recover from a cyberattack.

There are three basic metrics against which an STO is measured – the time it takes to identify and detect an attack, the time it takes to respond to the incident, and the time it takes to recover to a functional state so that the business can continue operating.

So, while cybersecurity aims to prevent cyberattacks and safeguard sensitive information through prevention, detection and response measures, cyber resilience goes beyond this to ensure organisational continuity and swift recovery from cyber incidents. Cyber resilience must be developed around an organisation’s incident response plans, and must incorporate disaster recovery strategies, smart backup or data protection strategies and rigorous testing.

So, while cybersecurity looks after the perimeter, cyber resilience goes far beyond that and plugs in all the bigger parts on top of cybersecurity to foster a culture of resilience and continuous improvement. Ultimately, cyber resilience is an organic living, breathing component of an organisation that changes and evolves in response to the dynamic cyberthreat landscape.

However, by working together, cybersecurity and cyber resilience can significantly enhance an organisation’s overall cyber risk management strategy. By working together, cybersecurity and cyber resilience can help an organisation to better understand the risks and loopholes that bad actors are likely to exploit. This should inform the organisation’s decisions in terms of which mitigation strategies and tools to use in the early stages of an attack cycle.


View of the environment

Furthermore, by leveraging cybersecurity and cyber resilience, companies can successfully implement detection technology and anomalous detection platforms that provide a real-time view of the IT environment. Finally, ensuring organisational continuity is about recovering the data, irrespective of where it lives (on-premises, in the cloud or between clouds).

Thus, to develop a comprehensive risk management strategy, organisations should integrate both cybersecurity and cyber resilience into their plans. In this way, it becomes easier for organisations to understand the threat actors, the threat surface, and what deception technologies and decoys they should be implementing to create a robust strategy. This can ensure swift recovery and minimal impact in the event of a cyberattack.

Organisations that want to do this successfully should balance their investment between cybersecurity and cyber resilience, in other words, between prevention and response. At the same time, it is also about prioritising risk assessments and vulnerability management, and also developing a culture of resilience and continuous improvement.

Together, cybersecurity and cyber resilience create a robust strategy for managing cyber risks, and organisations should view both as integrated components of their overall risk management strategy. By investing in both, they can protect digital assets and ensure swift recovery in the face of cyberthreats.

For more information contact Commvault, +27 86 111 4625, [email protected], www.comvault.com




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Buildings in Africa’s urban evolution
Schneider Electric South Africa IT in Manufacturing
Africa is now an urban continent. How does the continent mobilise to accommodate urban dwellers and maintain and implement critical infrastructure that allows for this expansion? Building management systems provide a tangible solution to optimise resource use, lower operations costs and ultimately contribute to a growing continent that also employs green practices.

Read more...
Black Rock Mining centralises mining operations with AVEVA
IT in Manufacturing
Black Rock Mine Operations replaced and upgraded its existing infrastructure, and installed additional capacity to expand production from 3 to 4,6 million tons in three years. The new system is powered by a suite of AVEVA solutions.

Read more...
The strategic role of technology in today’s economy
IT in Manufacturing
In an era of economic uncertainty and persistent market volatility, businesses are under immense pressure to manage costs while maintaining operational effectiveness. The role of chief information officers and chief technology officers has never been more critical, as they are tasked with leveraging technology not just as a tool for efficiency but as a strategic asset in navigating these turbulent times.

Read more...
Minutes to meltdown: surviving a cyber attack
IT in Manufacturing
Commvault recently hosted its Minutes to Meltdown event. Led by the company’s security experts, this was an interactive and detailed ransomware attack simulation designed to help companies understand how to respond in the event of a cyber attack.

Read more...
Siemens elevates automotive and aerospace simulation
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software has announced the latest update to its Simcenter portfolio, delivering advancements in aerostructure analysis, electric motor design, gear optimisation and smart virtual sensing. These enhancements are designed to streamline workflows, accelerate certification and provide deeper insights into system performance.

Read more...
Automation in 2025: Navigating manufacturing innovation without the risk
IT in Manufacturing
During 2025, a wave of innovative technologies is expected to disrupt and change the way IT is applied to automation systems. The challenge lies in balancing the reliability of proven techniques with the potential of new technologies, all while minimising and controlling risk. This article explores ways to approach the latest information technologies effectively in a manufacturing context.

Read more...
South Africa’s AI revolution is here – but are we secure?
IT in Manufacturing
South African businesses are sprinting to embrace generative AI, lured by its potential to drive efficiency, productivity and innovation. But here’s the stark reality: without a rock-solid cybersecurity foundation, AI will become a Trojan horse, opening the floodgates to sophisticated cyber threats.

Read more...
Shaping data resilience strategies with AI and hybrid cloud solutions
IT in Manufacturing
In today’s rapidly evolving digital landscape, organisations are under growing pressure to secure their operations against increasingly sophisticated cyberthreats, including those that leverage AI to enhance the success rate of attacks. In this landscape, it has become essential to ‘fight fire with fire’ – harnessing AI as a means to counter these threats.

Read more...
Cloud or on-prem? Decoding the choices for South African enterprises
IT in Manufacturing
The debate between on-premise and cloud computing architectures remains a prominent topic among businesses, particularly in South Africa.

Read more...
Advancements in wire rope testing
IT in Manufacturing
Being able to get instant, real-time and portable detection of wire rope flaws can make a significant difference for operational teams. There have been a number of significant technological advancements and tools entering the market that help wire rope operators detect and resolve problems faster.

Read more...