{"id":1621,"date":"2025-04-29T09:20:17","date_gmt":"2025-04-29T09:20:17","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=1621"},"modified":"2025-04-29T12:39:11","modified_gmt":"2025-04-29T12:39:11","slug":"why-our-industry-must-shift-from-prevention-to-cyber-resilience","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/","title":{"rendered":"Why Our Industry Must Shift From Prevention to Cyber Resilience"},"content":{"rendered":"<p>COMMENTARY: Over the past year, cyber operations by foreign adversaries, including the <a href=\"https:\/\/www.scworld.com\/brief\/novel-malware-leveraged-in-salt-typhoon-attacks-against-us-telcos\">People\u2019s Republic of China (PRC),<\/a> have moved away from traditional espionage and data theft to developing strategic plans that could infiltrate and cripple critical U.S. infrastructure.<\/p>\n<p>Moreover, the strategic exploitation of vulnerabilities by foreign adversaries at critical U.S. infrastructure locations could be remotely activated with very severe consequences. An &#8220;all at once&#8221; cyberattack could devastate numerous public and private organizations. In such a case, many organizations that are not thoroughly prepared may just have to rebuild.<\/p>\n<p><a href=\"https:\/\/us-east-2.protection.sophos.com\/?d=proofpoint.com&amp;u=aHR0cHM6Ly91cmxkZWZlbnNlLnByb29mcG9pbnQuY29tL3YyL3VybD91PWh0dHBzLTNBX191cy0yRGVhc3QtMkQyLnByb3RlY3Rpb24uc29waG9zLmNvbS0zRmQtM0RpbmR1c3RyaWFsY3liZXIuY28tMjZ1LTNEYUhSMGNITTZMeTlwYm1SMWMzUnlhV0ZzWTNsaVpYSXVZMjh2WTNKcGRHbGpZV3d0YVc1bWNtRnpkSEoxWTNSMWNtVXZZM0pwZEdsallXd3RhVzVtY21GemRISjFZM1IxY21VdFptRmpaWE10TXpBdGNHVnlZMlZ1ZEMxemRYSm5aUzFwYmkxamVXSmxjaTFoZEhSaFkydHpMV3R1YjNkaVpUUXRjbVZ3YjNKMExXaHBaMmhzYVdkb2RITXYtMjZpLTNETldZNU1XUXhPVEkyTUdFeE1qWXdaVEJtWlRVME5USTQtMjZ0LTNEWkZCeVJFcDVTVFU1TVROWlJqVktVMlUxWlc5cFoyMDRkRXgzTUc1bFRUQllhMXBGUkc5ak0zcDFaejAtM0QtMjZoLTNEOWM1Zjc2YzhmMGY5NDQ4NGJkYzdiZDQ2MWNlZTVmNWYtMjZzLTNEQVZOUFVFaFVUME5GVGtOU1dWQlVTVmJpMUxpcWwzUGNveGlNY2pCbHp0eS01RmlSamE2TFZnQktIMkRCU3pMZ3RPWHcmZD1Ed01GLWcmYz1ldUdac3RjYVREbGx2aW1FTjhiN2pYcndxT2YtdjVBX0NkcGduVmZpaU1NJnI9YzgxNDdsZ1Q0dTR1dTFlSWdIOXBOaS1BM2tqN2x3eUJoaDloNC1UNFo4RSZtPTl3UjV0YWtaLVc4U0haRm94NElIUEI4dHVLQnFBSFM5d09OOWpNc3h2TG1aZHRJdFMxdTZabFV1V1ZFRXNSQU8mcz1aRU12VmJNcFBIMUNUQk5nVmtYbVRVbWpMaGpGZVExcDVTMU5sU0ZNa2U0JmU9&amp;i=NWY5MWQxOTI2MGExMjYwZTBmZTU0NTI4&amp;t=TjNwY1NLR2gvY2dKRWxHakQ3VDc2TVNTU1lVM2lid1FualR3M1B4NkszOD0=&amp;h=994145236ff146db9e7362e9c0fe7bb0&amp;s=AVNPUEhUT0NFTkNSWVBUSVbi1Liql3PcoxiMcjBlzty_iRja6LVgBKH2DBSzLgtOXw\" target=\"_blank\" rel=\"noreferrer noopener\">Both domestic and foreign cyberattacks against critical infrastructure are increasing each year<\/a>.\u00a0So, government and industry must make a fundamental shift in how it protects critical infrastructure, data, and operations.<\/p>\n<p><strong>Prioritize resilience over prevention<\/strong><\/p>\n<p>Organizations must shift their approach as modern cyber risks demonstrate that breaches remain unavoidable. By shifting to a resilience mindset, this means teams must decide how they will prepare for, respond to, and recover from a cyberattack. This shift in mindset should include the following:<\/p>\n<div>\n<ul>\n<li><strong>Identify and protect<\/strong> critical functions that must continue during incidents.<\/li>\n<li><strong>Develop<\/strong> rapid data recovery capabilities for when attacks succeed.<\/li>\n<li><strong>Leverage<\/strong> emerging technologies like artificial intelligence (AI) to build resilience.<\/li>\n<li><strong>Make<\/strong> practical guidance accessible to resource-constrained organizations, such as those at the state and local levels.<\/li>\n<li><strong>Regularly test <\/strong>cyber resilience capabilities\u2014no organization should assume any level of confidence without being able to demonstrate it.<\/li>\n<\/ul>\n<\/div>\n<p><strong>Adopt a \u2018minimal viable operations\u2019 concept<\/strong><\/p>\n<p>Define the essential services to protect national security, public safety, and economic stability. For example, healthcare organizations must preserve their emergency response capabilities and patient care delivery when cyberattacks and other disruptions occur.<\/p>\n<p><a href=\"https:\/\/www.scworld.com\/perspective\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\">Read the Full Story Here<\/a><\/p>\n<p>Source: SC World<\/p>\n","protected":false},"excerpt":{"rendered":"<p>COMMENTARY: Over the past year, cyber operations by foreign adversaries, including the People\u2019s Republic of China (PRC), have moved away from traditional espionage and data theft to developing strategic plans that could infiltrate and cripple critical U.S. infrastructure. Moreover, the strategic exploitation of vulnerabilities by foreign adversaries at critical U.S. infrastructure locations could be remotely [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1124,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Our Industry Must Shift From Prevention to Cyber Resilience - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Our Industry Must Shift From Prevention to Cyber Resilience - Community\" \/>\n<meta property=\"og:description\" content=\"COMMENTARY: Over the past year, cyber operations by foreign adversaries, including the People\u2019s Republic of China (PRC), have moved away from traditional espionage and data theft to developing strategic plans that could infiltrate and cripple critical U.S. infrastructure. Moreover, the strategic exploitation of vulnerabilities by foreign adversaries at critical U.S. infrastructure locations could be remotely [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-29T09:20:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-29T12:39:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/emailforwardhacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1916\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/\",\"name\":\"Why Our Industry Must Shift From Prevention to Cyber Resilience - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/emailforwardhacker.jpg\",\"datePublished\":\"2025-04-29T09:20:17+00:00\",\"dateModified\":\"2025-04-29T12:39:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/emailforwardhacker.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/emailforwardhacker.jpg\",\"width\":1280,\"height\":1916},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Our Industry Must Shift From Prevention to Cyber Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Our Industry Must Shift From Prevention to Cyber Resilience - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/","og_locale":"en_US","og_type":"article","og_title":"Why Our Industry Must Shift From Prevention to Cyber Resilience - Community","og_description":"COMMENTARY: Over the past year, cyber operations by foreign adversaries, including the People\u2019s Republic of China (PRC), have moved away from traditional espionage and data theft to developing strategic plans that could infiltrate and cripple critical U.S. infrastructure. Moreover, the strategic exploitation of vulnerabilities by foreign adversaries at critical U.S. infrastructure locations could be remotely [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2025-04-29T09:20:17+00:00","article_modified_time":"2025-04-29T12:39:11+00:00","og_image":[{"width":1280,"height":1916,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/emailforwardhacker.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/","name":"Why Our Industry Must Shift From Prevention to Cyber Resilience - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/emailforwardhacker.jpg","datePublished":"2025-04-29T09:20:17+00:00","dateModified":"2025-04-29T12:39:11+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/emailforwardhacker.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/11\/emailforwardhacker.jpg","width":1280,"height":1916},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-our-industry-must-shift-from-prevention-to-cyber-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Why Our Industry Must Shift From Prevention to Cyber Resilience"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=1621"}],"version-history":[{"count":2,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1621\/revisions"}],"predecessor-version":[{"id":1624,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1621\/revisions\/1624"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/1124"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=1621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=1621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=1621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}