Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Improving Metrics in Cyber Resiliency
Improving Metrics in Cyber Resiliency

Improving Metrics in Cyber Resiliency

Release Date: 08/30/2017

Cyber resiliency is important as it gives us “the ability to prepare and plan for, absorb, recover from, or more successfully adapt to actual or potential adverse effects.” Despite billions of dollars being spent on cybersecurity, information systems data breaches are increasing year after year. To reverse this trend, it is essential to develop metrics and processes to measure (1) threats before they become cyberattacks, (2) recovery of lost functionality after a cyberattack. This paper introduces two essential metrics: Elapsed Time to Identify Failure (ETIF) and Elapsed Time to Identify Threat (ETIT). Measuring them and developing processes to lower the values of ETIF and ETIT would improve the resiliency of an information system. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Bernd Jaeger
Bernd Jaeger
Colt (Germany)

Bernd Jaeger

Colt (Germany)

Working for more than 20 years within the ICT industry, focussing on information security, Bernd’s scope ranges from security management related activities down to a deep, “hands-on” level of understanding of today’s threats and countermeasures.

Working for Telecommunication-, Internet-, Cloud and Technology Service provider, Bernd designed and implemented highly customized security solutions, developed technical blueprints and produc...

Read more

Paul Lanois Headshot Missing
Paul Lanois

Paul Lanois

This person does not have a biography listed with CSA.

Ramon Codina Headshot Missing
Ramon Codina

Ramon Codina

This person does not have a biography listed with CSA.

Josep Bardallo Headshot Missing
Josep Bardallo

Josep Bardallo

This person does not have a biography listed with CSA.

Courtney Keogh
Courtney Keogh
Membership Coordinator, CSA

Courtney Keogh

Membership Coordinator, CSA

This person does not have a biography listed with CSA.

Senthil Arul Headshot Missing
Senthil Arul

Senthil Arul

This person does not have a biography listed with CSA.

Shimon Modi Headshot Missing
Shimon Modi

Shimon Modi

This person does not have a biography listed with CSA.

Daniel Miller Headshot Missing
Daniel Miller

Daniel Miller

This person does not have a biography listed with CSA.

Duncan Sparrell Headshot Missing
Duncan Sparrell

Duncan Sparrell

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training