Virtual Event: Threat Detection & Incident Response Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

Cyber Resilience is the New Business Continuity Plan

The organizations best prepared to face disruption are those that align security, continuity and risk management around what the business cannot afford to lose.

Cyber Resilience

The contours of business disruption are changing. It can start with a ransomware incident, an identity compromise, a supplier outage, or a prolonged cloud failure in one unit, then spread across connected systems. Disruption can simultaneously affect operations, customer access, compliance and supplier relations.

This is why the backbone of business continuity is cyber resilience.

At its core, business continuity is also a risk management issue, as it also depends on how well an organization understands its critical processes, information dependencies, supplier exposure, cloud reliance, risk appetite, recovery priorities, and ability to operate when systems or data cannot be fully trusted.

The ISF Standard of Good Practice (SOGP) 2026 is an information security framework that covers this shift. It asks organizations to connect business continuity with governance, information risk, system resilience, security incident management, and testing to sufficiently align continuity with risk management.

Continuity Starts with Governance

When a security incident occurs, all functions have to get their act together. Security teams will need to contain the spread of this incident. IT will have its eyes on restoring systems. The legal team will scramble to understand legal repercussions. Communications have to be tasked with sharing updates with customers, analysts, and key stakeholders. The board must understand the incident’s impact on revenue, operations, service delivery, and reputation.

Advertisement. Scroll to continue reading.

Decision rights, escalation paths, risk appetite, and recovery priorities become the foundation of governance.

What is Your Minimum Viable Business?

You must have heard of an MVP or a minimum viable product. A minimum viable business works in the same way, but at the level of business operations. It identifies the business-critical processes, information assets, people, suppliers, and infrastructure that must remain available for an organization to operate, despite facing a disruptive incident. Organizations must focus on specifics rather than creating a generic list. Every aspect, every dependency should be mapped to ensure continuity in practice.

For instance, a payment process can depend on elements such as identity and access management, fraud monitoring, customer support, and cloud infrastructure; all these are non-negotiable. You want this process to remain operational no matter what.

System Resilience is the New Business Resilience

System backup, restoration timelines, SLAs, capacity planning, and change management are the building blocks of business continuity. The mistake is to see these merely as technical rather than as business resilience issues.

Continuity becomes an unfulfilled promise if critical systems cannot be restarted within agreed-upon timeframes. Also, continuity shouldn’t just look reassuring on paper, but must be battle-tested, that is, work under pressure.

More importantly, critical business infrastructure and applications need alternatives in place; a single failure can cause a daisy chain of interruptions. Their performance and capacity should be monitored and reviewed regularly to ensure issues are identified and addressed before they become bigger issues.

These steps are the very essence of risk management, enabling leaders to ensure that systems can support the business when conditions become hostile or uncertain.

Convergence of Incident Response and Business Continuity

A sophisticated, constantly evolving threat landscape demands a blend of incident response and business continuity. When a major cyber incident occurs, many things should happen simultaneously and seamlessly, including containment, investigation, legal assessment, customer communication, operational workarounds, supplier coordination, and system recovery.

Continuity cannot wait for the security incident to finish.

You therefore need a framework that brings together various disciplines, including security, IT, legal, communications, operations, supplier management, and the board, to respond in accordance with a shared response structure.

Do Not Forget Supplier and Cloud Dependencies

An organization’s processes depend on a diverse supply chain comprising cloud platforms, SaaS tools, managed providers, software suppliers, AI tools, data processors, and external partners. If even one of them fails, continuity can be affected almost immediately; therefore, supplier and cloud dependencies should also be integral to continuity planning.

Any contract signed with an external vendor should clearly outline realistic expectations regarding resilience and security, aligned with the continuity and risk management framework.

Continuous assessment and monitoring should ensure that suppliers meet expectations. From the cloud perspective, every integration, platform, and tool should be thoroughly reviewed for recovery, access, monitoring, and control. And finally, business continuity demands a rethink in how an organization sees external vendors. These critical third parties should be included in the continuity scenario rather than treated as peripheral dependencies.

Realizing Resilience with Testing

The best-laid plans come to naught if they have not been tested against realistic scenarios. The real taste of the pudding is in whether the continuity plan can help take actionable decisions at the right time, ensure better coordination amongst different departments, maintain critical operations, and ensure recovery within acceptable timelines.

Testing should include all factors that can contribute to a loss of business continuity, including ransomware, prolonged cloud outages, supplier disruptions, identity compromises, data integrity uncertainty, and customer-facing service disruptions. The list is long. The emphasis should be on testing crisis management capabilities, the resilience of technical infrastructure, and the operational ability to resume critical processes within the predetermined timeframe.

Closing Thoughts

Business continuity is about the business holding up when the odds are stacked against it. It’s about having an actionable plan that keeps operations running when systems fail, when data cannot be trusted, and when suppliers become chokepoints. This is why cyber resilience and risk management are front and center of continuity planning and must be treated as such.

Related: Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest Exercise

Related: WEF Report Reveals Growing Cyber Resilience Divide Between Public and Private Sectors

Written By

Steve Durbin is Chief Executive of the Information Security Forum, an independent association dedicated to investigating, clarifying, and resolving key issues in information security and risk management by developing best practice methodologies, processes, and solutions that meet the business needs of its members. ISF membership comprises the Fortune 500 and Forbes 2000.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing for the latest cybersecurity threats, trends, and expert insights.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

People on the Move

Joe Chen has become Chief Technology Officer at Trellix.

Usercentrics has named Pawan Hegde as COO and Elena Ignatova as CPTO.

SecureAuth has named Mark van Oppen as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.