Cyber Resilience Strategy: A Key guide to enterprise operations in digital age

Authors

  • Jitsupa Rittipalin Information Technology Bureau, Office of the National Broadcasting and Telecommunications Commission

Keywords:

Cyber Threat, Cyber Attack, Cyber Resilience

Abstract

The objectives of this academic article aimed to study and analyze cyber threats affecting the organization and study the framework and strategies for cyber resilience. This qualitative and applied research was methodology. This study is documentary research that reviews the literature and research on the subject of cyber security, cyber threats, and cyber resilience. This paper was found that organizations now have faced a variety of cyber threats and need to adopt cyber resilience, i.e. be able to anticipant, detect, withstand, recover, and evolve in the face of cyber incidents. The suggestions for Thai corporates to cope with cyber threats are to establish a dynamic strategy for investing in cyber resilience, focus on responding to cyber-attacks at the policy level which, cyber security must be aware of at all levels of personnel, and develop the cyber-attack response personnel with Red team and Blue team countermeasure skill by stimulating and practicing with an attack scenario periodically.

References

จันทกานต์ ผลพล. (2563, 13 ธันวาคม). ทำความรู้จักกับ Cyber Resilience สิ่งที่ทำให้ไปต่อได้ในทุกสถานการณ์. ntcyfence. https://www.catcyfence.com/it-security/article/what-is-cyber-resilience/

ปริญญา หอมเอนก. (2561, 5 กันยายน). Cyber Resilience คืออะไร. กรุงเทพธุรกิจ. https://www.bangkokbiznews.com/ blog/detail/645457

ภัยคุกคามทางไซเบอร์สร้างความเสียหายองค์กรถึง 2 แสนกว่าล้านบาท. (2561). thumbsup. https://www.thumbsup.in.th/ cyber-security-microsoft

วริยา คำชนะ. (2562, 22 ตุลาคม). ธุรกิจ: ภัยไซเบอร์ระบาดหนัก “ธุรกิจไทย”. กรุงเทพธุรกิจ. https://www. bangkokbiznews.com/news/detail/851637.

สำนักข่าวอินโฟเควสท์. (2564, 9 มิถุนายน). Cyber Attack-คลื่นใต้น้ำแห่งยุคดิจิทัลที่ต้องจับตามอง. https://www. infoquest.co.th/2021/94874

Conklin, W. A., Shoemaker, D., & Kohnke, A. (2017). Cyber Resilience: Rethinking Cybersecurity Strategy to Build a Cyber Resilient Architecture. 12th International Conference on Cyber Warfare and Security (pp. 105-111). https://books.google.co.th/books?hl=en&lr=&id

=iXWQDgAAQBAJ&oi=f nd&pg=PA105&dq=cyber+resilience+strategy&ots

=HW6fnMSQw0&sig=4Red10ZTrhiJ908kba_ ibRUnn60&redir_esc=y#v=onepage&q

=cyber%20resilience%20strategy&f=false

Crowdstrike. (2021). The 2021 Crowdstrike global Threat Report. https://go.crowdstrike.com/crowdstrike- global-threat-report-2021.html

Dickson, F., & Goodwin, P., (2020). Five Key Technologies for Enabling a Cyber-Resilience Framework. IBM. https://www.ibm.com/services/business-continuity/cyber-resilience?p1=Search&p4=43700064 924790111&p5=p&gclid=CjwKCAjwjJmIBhA4EiwAQdCbxhd9Ar_m8BXqz1W314hjnvzu2K- jQpMG4IJR5joQzNgXHqiPAeexyxoCCtoQAvD _BwE&gclsrc=aw.ds

Gaurav, B. (2020). 5 Cybersecurity Threats to Be Aware of in 2020. IEEE. https://www.computer.org/ publications/tech-news/trends/5-cybersecurity-threats-to-be-aware-of-in-2020

ISO/IEC. (2012), ISO/IEC/27043:2012 Information technology – Security techniques Guidelines for cybersecurity. (n.p.)

Khera, V. (2021, March 24). Red Team VS Blue Team. Linkedin. https://www.linkedin.com/pulse/red-team- vs-blue-dr-varin-khera/?trackingId=yUCDstClsMUBW29dovQTWg%3D%3D

Mitre. (n.d.). Enterprise Matrix. https://attack.mitre.org/matrices/enterprise/

Shalamano, V. (2019). Organising for IT Effectiveness, Efficiency and Cyber Resilience in Academic Sector: National and Region Dimension. Information & Security, 21(42), 49-66. http://connections-qj. org/system/files/4203_it_academic_sector.pdf

Trend Micro Research. (2021). What We Know About the Darkside Ransomware and the US Pipeline Attack. https://www.trendmicro.com/en_th/research/21/e/what-we-know-about-darkside- ransomware-and-the-us-pipeline-attac.html

Downloads

Published

25-11-2021

How to Cite

Jitsupa Rittipalin. (2021). Cyber Resilience Strategy: A Key guide to enterprise operations in digital age. Journal of Digital Communications, 5(5), 161–181. Retrieved from https://so04.tci-thaijo.org/index.php/NBTC_Journal/article/view/253664

Issue

Section

Academic article