Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » The Power of Resilience: Incident Response and Business Continuity
Cybersecurity

The Power of Resilience: Incident Response and Business Continuity

Security as an Enabler
Chris HughesBy Chris HughesOctober 15, 2021Updated:December 7, 20214 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Confidentiality, Integrity, and Availability — these are the three primary components of Cybersecurity. Today’s article focuses on the Availability pillar. Aside from traditional systems and business disruptions, COVID-19 brought the concept of being resilient as an organization to a new level. Organizations that didn’t have documented incident response and business continuity plans found themselves flat-footed and unable to provide availability to their key stakeholders. According to organizations, such as Gartner, the average cost of IT downtime is $5,600 per minute. In fact, it can average $300,000 an hour for large organizations.

Defining the Pillar of Availability

At a high level, availability essentially means that authorized users should be able to access data and services whenever they need to do so. Although this seems trivial on the surface, it is critical when discussing the business implications. Nowadays, business users and consumers expect systems and services to be available, on-demand, and with minimal to no downtime. When you have a customer-facing service or revenue-generating website, an impact on availability could be devastating from both a financial and customer trust perspective. If you fail to provide that availability, consumers will quickly find an alternative, possibly for good.

Downtime can impact your organization in a few ways. It can result in losses in productivity, revenue, and data. Additionally, it can have a brand impact. if you have service level agreements in place, there can even potentially be legal implications.

Understanding Incident Response & Business Continuity

The concepts of Incident Response and Business Continuity are within the domain of availability. From both a system and an organizational perspective, these activities and practices are key to maintaining availability. In the context of cybersecurity, NIST defines Incident Response as a “structured process used by organizations to detect and respond to cybersecurity incidents.” It is essentially having a plan and process in place to respond to incidents as they occur. It has a goal of avoiding or at least mitigating disruption to operations. Also, the concept of Business Continuity is closely related. This is the organization’s ability to continue to operate during an unplanned disruption in service.

The Approach of Implemention

Knowing that incident response and business continuity are key to maintaining availability. However, it is essential to follow through with actually implementing these practices, processes, and capabilities. The process of implementation is certainly different than simply knowing that these concepts are key.

Many organizations find themselves asking where to start. A couple of great things to start with is NIST’s widely utilized “Computer Security Incident Handling Guide.” This helps layout fundamentals. These fundamentals include understanding what incidents are, what incident response and business continuity are, and how to approach them.

Playbook Practices

Part of the approach should include things such as Business Continuity Plans and Incident Response Playbooks. These artifacts help guide your organizational stakeholders when incidents and disruptions occur. This could include key organizational points of contact, external stakeholders, contact trees, response steps and activities to perform, and more. Another great resource is industry leader SANS Incident Handler’s Handbook. This guidance helps IT processionals plan and prepare for the unexpected.

As many start working to implement incident response practices, one key activity is establishing playbooks. These are standard IR and industry best practices along with organizational-specific information. Organizations can apply the information and practices during incidents to mitigate the impact. For example, a great starting point is the Incident Response Consortium’s Playbooks Gallery. It includes several playbooks for common cybersecurity incidents such as malware, phishing, unauthorized access, and more.

One last thing worth emphasizing is how incident response and business continuity are much like a muscle. If you don’t exercise, it atrophies. You need to use these playbooks and plans and execute tabletop exercises. These are essentially dry runs of your incident response and business continuity plans. You don’t want the first time you use these Incident Response Plans (IRP) and Business Continuity Plans (BCP) to be when there is a real-world incident. Exercise helps keep things fresh, identify gaps, and lead to iterative improvement to ensure the plans are effective when needed.

Final Thoughts

In today’s digitally connected and driven environment, don’t let business disruption and system incidents compromise your organization’s ability to deliver value to those who rely on it. To do this, focus on implementing incident response and business continuity capabilities that are well oiled and exercised. If you solidify incident response and business continuity plans, your organization will be well equipped to respond accordingly when needed. Failing to prepare could have financial and reputational consequences, some of which your organization may never recover from.

Cybersecurity Cybersecurity channel featured Security as an Enabler
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Microsoft Adopts A2A Protocol, Agentic AI Era Begins

May 9, 2025

AI Agent & Copilot Podcast: Finastra Chief AI Officer Lays Out Range of Use Cases, Microsoft Collaboration

May 9, 2025

IBM Launches Microsoft Practice to Accelerate AI, Cloud, and Security Transformation

May 9, 2025

AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls

May 8, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft Adopts A2A Protocol, Agentic AI Era Begins
  • AI Agent & Copilot Podcast: Finastra Chief AI Officer Lays Out Range of Use Cases, Microsoft Collaboration
  • IBM Launches Microsoft Practice to Accelerate AI, Cloud, and Security Transformation
  • AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls
  • ServiceNow Re-Invents CRM for End-to-End Enterprise

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.