{"id":10399,"date":"2021-05-29T17:12:18","date_gmt":"2021-05-29T07:12:18","guid":{"rendered":"https:\/\/nsrd.info\/blog\/?p=10399"},"modified":"2021-05-29T17:12:21","modified_gmt":"2021-05-29T07:12:21","slug":"understanding-cyber-resilience","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2021\/05\/29\/understanding-cyber-resilience\/","title":{"rendered":"Understanding Cyber Resilience"},"content":{"rendered":"\n<p>It used to be that topics like cyber resilience were dropped in the IT security bucket. And it&#8217;s true that security will always play a part in a robust cyber resilience strategy.<\/p>\n\n\n\n<p>But these days there&#8217;s a lot more involved. In the video below, I&#8217;ll explain another key consideration.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"epyt-video-wrapper\"><iframe loading=\"lazy\"  id=\"_ytid_52693\"  width=\"688\" height=\"387\"  data-origwidth=\"688\" data-origheight=\"387\"  data-relstop=\"1\" src=\"https:\/\/www.youtube.com\/embed\/gvOmv-gmPwY?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;cc_lang_pref=&#038;iv_load_policy=1&#038;loop=0&#038;rel=0&#038;fs=1&#038;playsinline=0&#038;autohide=2&#038;theme=dark&#038;color=red&#038;controls=1&#038;\" class=\"__youtube_prefs__  epyt-is-override  no-lazyload\" title=\"YouTube player\"  allow=\"fullscreen; accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen data-no-lazy=\"1\" data-skipgform_ajax_framebjll=\"\"><\/iframe><\/div>\n<\/div><figcaption><strong><a href=\"https:\/\/youtu.be\/gvOmv-gmPwY\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Cyber Resilience<\/a><\/strong><\/figcaption><\/figure>\n\n\n\n<p>The links at the end of the video are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Dell&#8217;s <strong><a href=\"https:\/\/www.delltechnologies.com\/en-au\/data-protection\/cyber-recovery-solution.htm\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Recovery page<\/a><\/strong><\/li><li><strong><a href=\"https:\/\/nsrd.info\/blog\/?s=cyber\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber-related links<\/a><\/strong> on this blog<\/li><li>My book, <strong><a href=\"https:\/\/www.routledge.com\/Data-Protection-Ensuring-Data-Availability\/Guise\/p\/book\/9780367256777\" target=\"_blank\" rel=\"noreferrer noopener\">Data Protection: Ensuring Data Availability<\/a><\/strong>.<\/li><\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It used to be that topics like cyber resilience were dropped in the IT security bucket. And it&#8217;s true that&hellip;<\/p>\n","protected":false},"author":1,"featured_media":8476,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1443,8,1442],"tags":[1608,1596,1610,1584],"class_list":["post-10399","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-continuity","category-data-loss","category-disaster-recovery","tag-cyber","tag-cyber-recovery","tag-cyber-resilience","tag-cyber-vault"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2019\/10\/bigStock-Data-Security.jpg","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-2HJ","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/10399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=10399"}],"version-history":[{"count":2,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/10399\/revisions"}],"predecessor-version":[{"id":10401,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/10399\/revisions\/10401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media\/8476"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=10399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=10399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=10399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}