A “Boom” Model for Cyber Resilience

True cyber resilience requires pairing pre-boom threat prevention and detection with post-boom disaster recovery.

Every organization is at risk of a boom — an incident involving IT resources that could lead to security breaches or service disruptions. The example that typically leaps to mind is a deliberate attack, such as a hacker who compromises an Active Directory (AD) user account and uses various lateral movement and privilege escalation tactics to steal sensitive data, unleash malware or disrupt operations. But a boom can also result from a non-malicious event like an overworked IT admin misconfiguring an application or a careless user clicking on a phishing email, or even a power outage or equipment failure.

Download now!


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.