01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How to strengthen cyber resilience with Unified BCDR<br />

By Joe Noonan, General Manager, Unitrends and Spanning<br />

<strong>Cyber</strong>crime and hybrid work environments prompted by the pandemic have significantly impacted the<br />

way organizations protect and store their data. Data is living in multiple places, and backups now must<br />

protect data centers, endpoints, multiple clouds and SaaS. More than ever, IT professionals need to<br />

incorporate unified business continuity and disaster recovery (BCDR) plans into their cyber resilience<br />

strategy to protect the organizations they serve.<br />

<strong>Cyber</strong> resilience goes beyond firewall and patching. It refers to how well an organization responds to<br />

cyber threats and involves a strategy that accounts <strong>for</strong> planning, detecting, defending and responding in<br />

case of an attack. There is also a clear process in place <strong>for</strong> recovery and business continuity.<br />

It is difficult <strong>for</strong> IT professionals to find time <strong>for</strong> cyber resilience planning when they’re juggling so many<br />

other responsibilities. But not having a strategy in place can be disastrous <strong>for</strong> an organization.<br />

Terms to Know<br />

When it comes to BCDR, there are two terms that will guide your cyber resilience strategy – recovery<br />

time objective (RTO) and recovery point objective (RPO). RTO is the amount of time it will take to have<br />

the business back online. RPO refers to how much data an organization can af<strong>for</strong>d to lose as it pertains<br />

to time or amount of in<strong>for</strong>mation. The RPO <strong>for</strong> a bank, <strong>for</strong> example, would be close to zero because as<br />

soon as the system goes down, hundreds, even thousands of transactions can take place. A bank cannot<br />

af<strong>for</strong>d to lose this in<strong>for</strong>mation and it would be difficult to recover if the IT environment is non-operational.<br />

One way to think about RPO is the more difficult it is to recover data, or create it from scratch, the shorter<br />

RPO an organization will need to have. Once both RTO and RPO are established, it’s time to look <strong>for</strong> a<br />

unified BCDR tool.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 47<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!