A NEW TYPE OF PLAN
A study of how Russia attacks companies today may offer some practical guidance for actions you can be taking now to be better prepared and help fortify your collective cyber defenses. This is very different than current incident response planning. Engage the Cyber Defense Center for additional assistance.
START ON YOUR OWN
Russian tactics for cyber warfare include a well-prepared battlefield. Therefore, we advise that you plan using an "Assume Compromise" approach. Expect that Russia or a hostile nation state has the tactical advantage and has already compromised your network with a dormant or an otherwise ready cyber weapon. This will get you and your company in the right mindset to prepare and respond to a wartime nation-state sponsored attack.
The CYBER DEFENSE CENTER advises that you consider taking an “Assume Compromise” posture in your wartime preparedness because it is simply not reasonable to think that a company standing alone on the front lines of a cyberwar can stop a nation-state like Russia from successfully infiltrating their systems. Additionally, it is not reasonable to think that individual companies can move from peacetime readiness to wartime readiness overnight.
Wartime Cyber-War preparedness should be considered an all-hands-on deck situation for your company. Since we have transitioned to a wartime defense posture, it may be time to set aside product development, transformation projects, or compliance requirements. This effort may require your entire IT department to shift priorities and support your defense efforts. It is time to prepare for a wartime attack with potential outcomes that your company has likely never planned for.
We recommend you use the following scenarios for preparedness to continue conducting electronic commerce and maintain critical infrastructure operations during times of geo-political unrest and wartime:
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.