FEATURE
Even with the most
robust protection
capabilities,
successful attacks
on data are
a reality.
Not all data assets are vital to an
organisation and in turn, they can’t all
economically be given the same level
of enhanced recovery risk mitigation.
Identification of which data assets qualify
for extra duty-of-care should be based
on organisationally defined criteria.
Organisations need to identify and justify
their Vital Data Assets (VDAs) and for
each, define the relevant maximum loss
and downtime requirements. These
requirements can be used to determine
a go forward VDA protection and
recovery risk reduction strategy and
the supporting technical architecture –
much like RTOs and RPOs drive Disaster
Recovery strategies and capabilities.
As with any Disaster Recovery
programme, a Cyber-Compromised
Data Recovery programme should
be formally established and tested
regularly to assure people, processes
and capabilities are well understood and
will enable a successful recovery when
needed. Organisations should establish a
discipline of frequent testing with varying
scope and situational parameters that
would include participation from various
business disciplines and stakeholders.
A data-compromising cyberattack
can happen to any organisation, so
it is imperative to establish plans and
capabilities in advance that reduce data
loss risk and enable timely recovery of
the most current data possible. u
www.intelligentciso.com | Issue 27
39