Intelligent CISO Issue 27 | Page 39

FEATURE Even with the most robust protection capabilities, successful attacks on data are a reality. Not all data assets are vital to an organisation and in turn, they can’t all economically be given the same level of enhanced recovery risk mitigation. Identification of which data assets qualify for extra duty-of-care should be based on organisationally defined criteria. Organisations need to identify and justify their Vital Data Assets (VDAs) and for each, define the relevant maximum loss and downtime requirements. These requirements can be used to determine a go forward VDA protection and recovery risk reduction strategy and the supporting technical architecture – much like RTOs and RPOs drive Disaster Recovery strategies and capabilities. As with any Disaster Recovery programme, a Cyber-Compromised Data Recovery programme should be formally established and tested regularly to assure people, processes and capabilities are well understood and will enable a successful recovery when needed. Organisations should establish a discipline of frequent testing with varying scope and situational parameters that would include participation from various business disciplines and stakeholders. A data-compromising cyberattack can happen to any organisation, so it is imperative to establish plans and capabilities in advance that reduce data loss risk and enable timely recovery of the most current data possible. u www.intelligentciso.com | Issue 27 39