Treasury cyber response – planning a quick recovery

Euromoney Limited, Registered in England & Wales, Company number 15236090

4 Bouverie Street, London, EC4Y 8AX

Copyright © Euromoney Limited 2024

Accessibility | Terms of Use | Privacy Policy | Modern Slavery Statement

Treasury cyber response – planning a quick recovery

Sponsored by

ps-citibank-01.jpg

A regularly-tested clear, robust recovery plan is essential if companies are to meet the challenge of an increasing number and variety of cyber threats

600x400cybersec3

Cybersecurity threats are becoming increasingly frequent and sophisticated: WannaCry and Not-Petya ransomware alone were responsible for over a billion dollars of losses in 2017. For treasurers, it’s important to prepare and plan for when, not if, the next cyber attack happens.

Traditionally, cybersecurity has taken a three-layered approach – protect (in order to prevent access), detect (using technological tools and specialists to identify problems as early as possible), and respond. The third of these components – the response process – often receives less attention than protection and detection. However, having a robust and well thought-out response process is critical should a company face a cyber attack and need to respond rapidly and appropriately.

Managing cyber-related risks can be daunting given the technological jargon involved. However, conventional risk management principles can largely be applied. Just as every office has water sprinklers to prevent fire damage but still practices fire drills, so all companies need to consider what will happen if their protection fails. To develop a strategic contingency plan, corporates need to consider following best practices encompassing their planning, testing and recovery.

To read the full cybersecurity report, head to Citi.com 

Topics covered in the full report include: 

Back to basics

Planning – identifying general principles

Determining acceptable alternatives

Recovering from crisis

Developing a strategic contingency plan — best practices to consider

More on Cybersecurity

You can also listen to our recent Cybersecurity podcast where we speak to people in charge of organising cyber defence at some of the world’s biggest corporations, and the ex-hackers they are paying to break into their systems.

cyber

Gift this article