How can I ensure business continuity after a cyber attack?​

In today's hyperconnected world, cybersecurity concerns and business continuity are inseparable. Every year cyberattacks and data breaches significantly disrupt an organisation—or even put it out of business—due to lost data, compromised personal or financial information, unplanned downtime, and other challenges. How can cyber-resilience and business continuity work together to minimise costs, protect data, and streamline a timely and effective response to any attacks or data breaches?

Bianca Wirth
Deputy CISO at TabCorp
Dali Kaafar
Executive Director at Optus Cyber Security Hub at Macquarie University
Patrick Scolyer- Gray
Champion: Cyber Security @460degrees

Mini Sessions From This Episode

Companies now realise that security is not just a technology issue; it's a problem for everyone in the business and even the board of directors. Simply being security-conscious is no longer enough, nor is having a prevention-only strategy. Companies must become cyber-resilient—capable of surviving attacks, maintaining operations, and embracing new technologies in the face of evolving threats. This means establishing policies and processes that strike a balance between protecting critical assets, detecting compromises, and responding to incidents.

1m

The most innovative organisations and their employees are adopting a cyber-resilient mindset. This starts with recognising that EVERY EMPLOYEE is the first line of defense against threats, so it is essential to make sure everyone knows this. Learn the steps you can take to reinforce your culture by constantly providing training on security awareness. Resiliency can't be achieved just by creating processes and controls – companies must embed cyber-resilient behaviours throughout every level, especially in those in charge of assets and data

14m

The Zero Trust model completely rethinks how we should be thinking about data, networks and what it means when a breach occurs versus being breached. Instead of assuming things are safe behind corporate firewalls or within internal network perimeters, this new approach assumes that everything has been compromised. Instilling a Zero Trust mindset throughout your organisation will ensure access to sensitive information is based only on specific policies and within the proper context.

13m
 

Related Resources

 

SHIELD AGAINST PHISHING ATTACKS

Phishing attacks can happen whether you’re working onsite or at home.

 
Find more

BROWSE WITH CONFIDENCE

Malicious downloads can originate from many sources, and once clicked, they can enter your organisation through a variety of ways.

 
Find more

SECURE YOUR CREDENTIALS

Virtualisation-based security keeps usernames and passwords safe by removing the element of human error.

 
Find more
 

Back to browse