Cyber Resilience Strategy: A Key guide to enterprise operations in digital age
Keywords:
Cyber Threat, Cyber Attack, Cyber ResilienceAbstract
The objectives of this academic article aimed to study and analyze cyber threats affecting the organization and study the framework and strategies for cyber resilience. This qualitative and applied research was methodology. This study is documentary research that reviews the literature and research on the subject of cyber security, cyber threats, and cyber resilience. This paper was found that organizations now have faced a variety of cyber threats and need to adopt cyber resilience, i.e. be able to anticipant, detect, withstand, recover, and evolve in the face of cyber incidents. The suggestions for Thai corporates to cope with cyber threats are to establish a dynamic strategy for investing in cyber resilience, focus on responding to cyber-attacks at the policy level which, cyber security must be aware of at all levels of personnel, and develop the cyber-attack response personnel with Red team and Blue team countermeasure skill by stimulating and practicing with an attack scenario periodically.
References
จันทกานต์ ผลพล. (2563, 13 ธันวาคม). ทำความรู้จักกับ Cyber Resilience สิ่งที่ทำให้ไปต่อได้ในทุกสถานการณ์. ntcyfence. https://www.catcyfence.com/it-security/article/what-is-cyber-resilience/
ปริญญา หอมเอนก. (2561, 5 กันยายน). Cyber Resilience คืออะไร. กรุงเทพธุรกิจ. https://www.bangkokbiznews.com/ blog/detail/645457
ภัยคุกคามทางไซเบอร์สร้างความเสียหายองค์กรถึง 2 แสนกว่าล้านบาท. (2561). thumbsup. https://www.thumbsup.in.th/ cyber-security-microsoft
วริยา คำชนะ. (2562, 22 ตุลาคม). ธุรกิจ: ภัยไซเบอร์ระบาดหนัก “ธุรกิจไทย”. กรุงเทพธุรกิจ. https://www. bangkokbiznews.com/news/detail/851637.
สำนักข่าวอินโฟเควสท์. (2564, 9 มิถุนายน). Cyber Attack-คลื่นใต้น้ำแห่งยุคดิจิทัลที่ต้องจับตามอง. https://www. infoquest.co.th/2021/94874
Conklin, W. A., Shoemaker, D., & Kohnke, A. (2017). Cyber Resilience: Rethinking Cybersecurity Strategy to Build a Cyber Resilient Architecture. 12th International Conference on Cyber Warfare and Security (pp. 105-111). https://books.google.co.th/books?hl=en&lr=&id
=iXWQDgAAQBAJ&oi=f nd&pg=PA105&dq=cyber+resilience+strategy&ots
=HW6fnMSQw0&sig=4Red10ZTrhiJ908kba_ ibRUnn60&redir_esc=y#v=onepage&q
=cyber%20resilience%20strategy&f=false
Crowdstrike. (2021). The 2021 Crowdstrike global Threat Report. https://go.crowdstrike.com/crowdstrike- global-threat-report-2021.html
Dickson, F., & Goodwin, P., (2020). Five Key Technologies for Enabling a Cyber-Resilience Framework. IBM. https://www.ibm.com/services/business-continuity/cyber-resilience?p1=Search&p4=43700064 924790111&p5=p&gclid=CjwKCAjwjJmIBhA4EiwAQdCbxhd9Ar_m8BXqz1W314hjnvzu2K- jQpMG4IJR5joQzNgXHqiPAeexyxoCCtoQAvD _BwE&gclsrc=aw.ds
Gaurav, B. (2020). 5 Cybersecurity Threats to Be Aware of in 2020. IEEE. https://www.computer.org/ publications/tech-news/trends/5-cybersecurity-threats-to-be-aware-of-in-2020
ISO/IEC. (2012), ISO/IEC/27043:2012 Information technology – Security techniques Guidelines for cybersecurity. (n.p.)
Khera, V. (2021, March 24). Red Team VS Blue Team. Linkedin. https://www.linkedin.com/pulse/red-team- vs-blue-dr-varin-khera/?trackingId=yUCDstClsMUBW29dovQTWg%3D%3D
Mitre. (n.d.). Enterprise Matrix. https://attack.mitre.org/matrices/enterprise/
Shalamano, V. (2019). Organising for IT Effectiveness, Efficiency and Cyber Resilience in Academic Sector: National and Region Dimension. Information & Security, 21(42), 49-66. http://connections-qj. org/system/files/4203_it_academic_sector.pdf
Trend Micro Research. (2021). What We Know About the Darkside Ransomware and the US Pipeline Attack. https://www.trendmicro.com/en_th/research/21/e/what-we-know-about-darkside- ransomware-and-the-us-pipeline-attac.html
Downloads
Published
How to Cite
Issue
Section
License
The Office of the NBTC holds the copyright of articles appearing in the journal. The Office of the NBTC allows the public or individuals to distribute, copy, or republish the work under a Creative Commons license (CC), with attribution (BY), No Derivatives (ND) and NonCommercial (NC); unless written permission is received from the Office of the NBTC.
Text, tables, and figures that appear in articles accepted for publication in this journal are personal opinion and responsibility of the author, and not binding on the NBTC and the Office of the NBTC. In case of errors, each author is solely responsible for their own article, and not concerning the NBTC and the NBTC Office in any way.