{"id":6530,"date":"2023-02-24T21:46:37","date_gmt":"2023-02-24T21:46:37","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/target\/new-report-highlights-value-of-digital-resilience\/"},"modified":"2023-03-27T08:14:07","modified_gmt":"2023-03-27T08:14:07","slug":"new-report-highlights-value-of-digital-resilience","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/","title":{"rendered":"Report Highlights Value Of Digital Resilience"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<p>There has been an evolution over the years in the mindset or philosophy of cybersecurity. From the early castle-and-moat approach with perimeter security, to the notion of prevention, and the concept of detection and response. Organizations today, for the most part, recognize and accept that impenetrable security does not exist and you can\u2019t stop every attack. Prevention and detection are still objectives, but perhaps the most crucial element of cybersecurity is resilience.<\/p>\n<p>Put simply\u2014can your business continue to function, rebound effectively, and survive cyberattacks with minimal disruption or impact? A new report from <a href=\"https:\/\/www.splunk.com\/\" data-ga-track=\"ExternalLink:https:\/\/www.splunk.com\/\">Splunk<\/a>, \u201c<a href=\"https:\/\/www.splunk.com\/en_us\/campaigns\/digital-resilience-pays-off.html\" data-ga-track=\"ExternalLink:https:\/\/www.splunk.com\/en_us\/campaigns\/digital-resilience-pays-off.html\">Digital Resilience Pays Off<\/a>,\u201d shares research and insights on what it takes to be resilient and how digital resilience benefits organizations.<\/p>\n<h2>Prevention, Detection, and Resilience<\/h2>\n<p>Cyberattacks are becoming increasingly common, sophisticated, and damaging. With the proliferation of technology and the increasing digitization of business operations, cybercriminals have more entry points and opportunities to infiltrate and exploit vulnerabilities. Despite the best efforts of organizations to prevent and detect cyberattacks, it is not possible to eliminate the risk entirely.<\/p>\n<p>One of the reasons why it is not possible to prevent or detect every cyberattack is that cybercriminals are constantly evolving their tactics and techniques. They are constantly finding new vulnerabilities to exploit, and they are becoming more skilled at evading detection. Cybercriminals are also using more sophisticated tools, such as artificial intelligence and machine learning, to carry out their attacks.<\/p>\n<p>The key to surviving cyberattacks with minimal impact or disruption lies in digital resilience. Digital resilience is the ability of an organization to maintain productivity and recover from cyberattacks. It is the ability to detect and respond to cyber threats, mitigate the damage, and continue business operations as usual. Digital resilience is not just about preventing cyberattacks; it is about being prepared for them and having a plan in place to recover quickly.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/malcolmharkins\/\" data-ga-track=\"ExternalLink:https:\/\/www.linkedin.com\/in\/malcolmharkins\/\">Malcolm Harkins<\/a>, Chief Security and Trust Officer for <a href=\"https:\/\/epiphanysys.com\/\" data-ga-track=\"ExternalLink:https:\/\/epiphanysys.com\/\">Epiphany Systems<\/a>, emphasized the importance of preparation for improved resilience. \u201cResilience requires having resistance to cyberattacks. Without understanding your cyber exposure to material risk and taking measures to reduce attacker opportunities to prevent as much risk as possible\u2014your detection measures will generate voluminous alerts causing the proverbial alert fatigue, and your response controls will be overwhelmed. In this case, your resilience plan will be fragile and inevitably lead to defeat. &#8220;<\/p>\n<h2>Doing Resilience Right<\/h2>\n<p>Even with the best security measures in place, there is always a risk of cyberattacks. This is why digital resilience is crucial. Digital resilience is not just about technology; it is also about people and processes. It requires a holistic approach that considers all aspects of an organization&#8217;s operations, including technology, people, processes, and culture.<\/p>\n<p>\u201cThe biggest mistake companies make when approaching IT resilience, and spending much money on resilience initiatives, is that they have never defined and formally documented what exactly resilience means to them,\u201d explained <a href=\"https:\/\/www.linkedin.com\/in\/benrothke\/\" data-ga-track=\"ExternalLink:https:\/\/www.linkedin.com\/in\/benrothke\/\">Ben Rothke<\/a>, Senior Information Security Manager at <a href=\"https:\/\/www.tapad.com\/\" data-ga-track=\"ExternalLink:https:\/\/www.tapad.com\/\">Tapad<\/a>.<\/p>\n<p>\u201cYes, resilience is all the rage with Gartner. But a Gartner report alone won\u2019t help a company. They can expect it to work only after they have fully documented and defined the resilience lackings in their critical IT processes, service levels, security and privacy needs, applications, and much more.\u201d<\/p>\n<p>Rothke summed up, \u201cIf that is not done, and sadly, too often that is the case, they won\u2019t have much to show for it at the project conclusion besides expensive consultant invoices.\u201d<\/p>\n<h2>Digital Resilience Pays Off<\/h2>\n<p>Splunk was founded 20 years ago to harness data for organizations. The mission and focus has shifted over the last 20 years as the ecosystem of technology has evolved and the threat landscape has expanded. Data is the lifeblood of an organization\u2014which means it is also a primary target for cyberattacks, and explains Splunk\u2019s focus on resilient digital systems.<\/p>\n<p>Splunk conducted a survey of 2,100 SecOps, ITOps, and DevOps leaders around the world to learn more about how prepared organizations are to withstand and survive cyberattacks or other disruptions. A blog post from Patrick Coughlin, VP of Strategy &amp; Specialization at Splunk, <a href=\"https:\/\/www.splunk.com\/en_us\/blog\/leadership\/new-research-on-digital-resilience-unveils-massive-opportunity-for-organizations.html\" data-ga-track=\"ExternalLink:https:\/\/www.splunk.com\/en_us\/blog\/leadership\/new-research-on-digital-resilience-unveils-massive-opportunity-for-organizations.html\">shared some of the key findings<\/a> from the report:<\/p>\n<ul>\n<li>Organizations report an average of 10 days of unplanned downtime per year that negatively impacts revenue, customer experience or productivity<\/li>\n<li>Organizations with advanced digital resilience capabilities save an average of $48 million per year on downtime costs compared to beginning organizations<\/li>\n<li>Only half of all organizations are fully prepared to change how they operate and engage with customers during times of major disruption, either to address the demands of a recession (52%) or in response to competitors (50%).\n<p>Coughlin notes, \u201cThe recent uptick in infrastructure outages and security breaches has shown us limiting resilience efforts to one off projects or disaster recovery and business continuity planning isn\u2019t nearly enough. Successful organizations are building a digital resilience strategy across these three functions, so they can get ahead of and overcome disruptions.\u201d<\/p>\n<p>Resilience is a competitive advantage. By all means, strive to block or prevent cyberattacks, and ensure you have the processes and technology in place to detect and respond when cyberattacks occur. Based on the findings and insights in the Splunk report, though, digital resilience is also essential. You can download \u201c<a href=\"https:\/\/www.splunk.com\/en_us\/campaigns\/digital-resilience-pays-off.html\" data-ga-track=\"ExternalLink:https:\/\/www.splunk.com\/en_us\/campaigns\/digital-resilience-pays-off.html\">Digital Resilience Pays Off<\/a>\u201d and review the full report for yourself.<\/p>\n<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6642,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26,23],"tags":[75,35],"class_list":{"0":"post-6530","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-audit-and-complaince","8":"category-cyber-attack","9":"tag-audit-and-compliance","10":"tag-cyber-attack"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Report Highlights Value Of Digital Resilience - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"There has been an evolution over the years in the mindset or philosophy of cybersecurity. From the early castle-and-moat approach with perimeter security,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Report Highlights Value Of Digital Resilience - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"There has been an evolution over the years in the mindset or philosophy of cybersecurity. From the early castle-and-moat approach with perimeter security,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-24T21:46:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:14:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/modern-data-security-technology-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Report Highlights Value Of Digital Resilience\",\"datePublished\":\"2023-02-24T21:46:37+00:00\",\"dateModified\":\"2023-03-27T08:14:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/\"},\"wordCount\":1038,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/modern-data-security-technology-2.jpg\",\"keywords\":[\"Audit and Compliance\",\"Cyber Attack\"],\"articleSection\":[\"Audit and Complaince\",\"Cyber Attack\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/\",\"name\":\"Report Highlights Value Of Digital Resilience - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/modern-data-security-technology-2.jpg\",\"datePublished\":\"2023-02-24T21:46:37+00:00\",\"dateModified\":\"2023-03-27T08:14:07+00:00\",\"description\":\"There has been an evolution over the years in the mindset or philosophy of cybersecurity. From the early castle-and-moat approach with perimeter security,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/modern-data-security-technology-2.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/modern-data-security-technology-2.jpg\",\"width\":1500,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/new-report-highlights-value-of-digital-resilience\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Report Highlights Value Of Digital Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Report Highlights Value Of Digital Resilience - Sajin Shivdas | Cybersecurity","description":"There has been an evolution over the years in the mindset or philosophy of cybersecurity. From the early castle-and-moat approach with perimeter security,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/","og_locale":"en_US","og_type":"article","og_title":"Report Highlights Value Of Digital Resilience - Sajin Shivdas | Cybersecurity","og_description":"There has been an evolution over the years in the mindset or philosophy of cybersecurity. From the early castle-and-moat approach with perimeter security,","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2023-02-24T21:46:37+00:00","article_modified_time":"2023-03-27T08:14:07+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/modern-data-security-technology-2.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Report Highlights Value Of Digital Resilience","datePublished":"2023-02-24T21:46:37+00:00","dateModified":"2023-03-27T08:14:07+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/"},"wordCount":1038,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/modern-data-security-technology-2.jpg","keywords":["Audit and Compliance","Cyber Attack"],"articleSection":["Audit and Complaince","Cyber Attack"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/","name":"Report Highlights Value Of Digital Resilience - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/modern-data-security-technology-2.jpg","datePublished":"2023-02-24T21:46:37+00:00","dateModified":"2023-03-27T08:14:07+00:00","description":"There has been an evolution over the years in the mindset or philosophy of cybersecurity. From the early castle-and-moat approach with perimeter security,","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/modern-data-security-technology-2.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/modern-data-security-technology-2.jpg","width":1500,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/new-report-highlights-value-of-digital-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Report Highlights Value Of Digital Resilience"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6530"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6530\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6642"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}