Cyber Resilience Strategy: A Key guide to enterprise operations in digital age

Main Article Content

Jitsupa Rittipalin


The objectives of this academic article aimed to study and analyze cyber threats affecting the organization and study the framework and strategies for cyber resilience. This qualitative and applied research was methodology. This study is documentary research that reviews the literature and research on the subject of cyber security, cyber threats, and cyber resilience. This paper was found that organizations now have faced a variety of cyber threats and need to adopt cyber resilience, i.e. be able to anticipant, detect, withstand, recover, and evolve in the face of cyber incidents. The suggestions for Thai corporates to cope with cyber threats are to establish a dynamic strategy for investing in cyber resilience, focus on responding to cyber-attacks at the policy level which, cyber security must be aware of at all levels of personnel, and develop the cyber-attack response personnel with Red team and Blue team countermeasure skill by stimulating and practicing with an attack scenario periodically.


Download data is not yet available.

Article Details

How to Cite
จิตสุภา ฤทธิผลิน. (2021). Cyber Resilience Strategy: A Key guide to enterprise operations in digital age. NBTC Journal, 5(5), 161–181. Retrieved from
Academic article


จันทกานต์ ผลพล. (2563, 13 ธันวาคม). ทำความรู้จักกับ Cyber Resilience สิ่งที่ทำให้ไปต่อได้ในทุกสถานการณ์. ntcyfence.

ปริญญา หอมเอนก. (2561, 5 กันยายน). Cyber Resilience คืออะไร. กรุงเทพธุรกิจ. blog/detail/645457

ภัยคุกคามทางไซเบอร์สร้างความเสียหายองค์กรถึง 2 แสนกว่าล้านบาท. (2561). thumbsup. cyber-security-microsoft

วริยา คำชนะ. (2562, 22 ตุลาคม). ธุรกิจ: ภัยไซเบอร์ระบาดหนัก “ธุรกิจไทย”. กรุงเทพธุรกิจ. https://www.

สำนักข่าวอินโฟเควสท์. (2564, 9 มิถุนายน). Cyber Attack-คลื่นใต้น้ำแห่งยุคดิจิทัลที่ต้องจับตามอง. https://www.

Conklin, W. A., Shoemaker, D., & Kohnke, A. (2017). Cyber Resilience: Rethinking Cybersecurity Strategy to Build a Cyber Resilient Architecture. 12th International Conference on Cyber Warfare and Security (pp. 105-111).

=iXWQDgAAQBAJ&oi=f nd&pg=PA105&dq=cyber+resilience+strategy&ots

=HW6fnMSQw0&sig=4Red10ZTrhiJ908kba_ ibRUnn60&redir_esc=y#v=onepage&q


Crowdstrike. (2021). The 2021 Crowdstrike global Threat Report. global-threat-report-2021.html

Dickson, F., & Goodwin, P., (2020). Five Key Technologies for Enabling a Cyber-Resilience Framework. IBM. 924790111&p5=p&gclid=CjwKCAjwjJmIBhA4EiwAQdCbxhd9Ar_m8BXqz1W314hjnvzu2K- jQpMG4IJR5joQzNgXHqiPAeexyxoCCtoQAvD _BwE&gclsrc=aw.ds

Gaurav, B. (2020). 5 Cybersecurity Threats to Be Aware of in 2020. IEEE. publications/tech-news/trends/5-cybersecurity-threats-to-be-aware-of-in-2020

ISO/IEC. (2012), ISO/IEC/27043:2012 Information technology – Security techniques Guidelines for cybersecurity. (n.p.)

Khera, V. (2021, March 24). Red Team VS Blue Team. Linkedin. vs-blue-dr-varin-khera/?trackingId=yUCDstClsMUBW29dovQTWg%3D%3D

Mitre. (n.d.). Enterprise Matrix.

Shalamano, V. (2019). Organising for IT Effectiveness, Efficiency and Cyber Resilience in Academic Sector: National and Region Dimension. Information & Security, 21(42), 49-66. http://connections-qj. org/system/files/4203_it_academic_sector.pdf

Trend Micro Research. (2021). What We Know About the Darkside Ransomware and the US Pipeline Attack. ransomware-and-the-us-pipeline-attac.html