Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Improving Metrics in Cyber Resiliency
Improving Metrics in Cyber Resiliency

Improving Metrics in Cyber Resiliency

Release Date: 08/30/2017

Cyber resiliency is important as it gives us “the ability to prepare and plan for, absorb, recover from, or more successfully adapt to actual or potential adverse effects.” Despite billions of dollars being spent on cybersecurity, information systems data breaches are increasing year after year. To reverse this trend, it is essential to develop metrics and processes to measure (1) threats before they become cyberattacks, (2) recovery of lost functionality after a cyberattack. This paper introduces two essential metrics: Elapsed Time to Identify Failure (ETIF) and Elapsed Time to Identify Threat (ETIT). Measuring them and developing processes to lower the values of ETIF and ETIT would improve the resiliency of an information system. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Bernd Jaeger
Bernd Jaeger
Colt (Germany)

Bernd Jaeger

Colt (Germany)

Working for more than 20 years within the ICT industry, focussing on information security, Bernd’s scope ranges from security management related activities down to a deep, “hands-on” level of understanding of today’s threats and countermeasures.

Working for Telecommunication-, Internet-, Cloud and Technology Service provider, Bernd designed and implemented highly customized security solutions, developed technical blueprints and produc...

Read more

Paul Lanois Headshot Missing
Paul Lanois

Paul Lanois

Ramon Codina Headshot Missing
Ramon Codina

Ramon Codina

Josep Bardallo Headshot Missing
Josep Bardallo

Josep Bardallo

Courtney Keogh
Courtney Keogh
Membership Coordinator, CSA

Courtney Keogh

Membership Coordinator, CSA

Senthil Arul Headshot Missing
Senthil Arul

Senthil Arul

Shimon Modi Headshot Missing
Shimon Modi

Shimon Modi

Daniel Miller Headshot Missing
Daniel Miller

Daniel Miller

Duncan Sparrell Headshot Missing
Duncan Sparrell

Duncan Sparrell

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training