This is the introductory blog for implementing Risk Analysis and Review (RAR) and Business Impact Analysis (BIA) with Cybersecurity Incident Response (CIR).
It discusses the importance of knowing what information assets within an organization require protection against cyber security threats. It is part of the Risk Analysis and Review phase.
This includes the understanding of the types of cyber security threats and the assets that are affected. It also provides an understanding of the cyber criminals' techniques utilized to exploit vulnerabilities within the organization that sabotaged the assets, affecting the smooth continuity of business functions. |
||
Guidelines are provided on how organizations can plan for appropriate response and mitigation strategies through the following processes to recover the Critical Business Functions or CBFs quickly and efficiently during CIR. The business function categorisation and its impact are further discussed in the Business Impact Analysis phase. |
According to a BCI annual report, 88% of respondents mentioned they are either “extremely concerned” or “concerned” about the possibility of a cyber security attack.
As technological development progresses, the likelihood of cyber security issues intensifying continues to grow. Some areas (BCI, 2010) organizations are concerned about are as follows.
IT systems and networks are becoming increasingly complex, creating more issues and challenges for organizations utilizing them.
As the telecommunications infrastructure evolves, the traditional phone system and IT networks converge into a more unified structure.
Difficulty in establishing physical and logical boundaries of the network as wireless connectivity continues to expand, increasing an organization’s exposure to cyber security attacks
Here are a few reasons why organizations are so worried about cyber security attacks:
The detailed step of the RAR and BIA phases using the BCM planning methodology for Cybersecurity Incident Response (CIR) is shown below, together with the RAR and RAR Process for Cyber Security Risk.
RAR and BIA process for Cybersecurity Incident Response (CIR) | Guidelines for CIR Risk Analysis and Review (RAR) | Guidelines for CIR Business Impact Analysis (BIA) | Risk Treatment Strategy | Back To: Overview of RAR and BIA |
Competency-based Course |
Certification Course | ||
Goh, M. H. (2017). A Manager's Guide to Business Continuity Management for Cyber Security Incidents, 2nd Edition. GMH Pte Ltd.
Reference: Chapter 6 Risk Analysis and Review and Business Impact Analysis 6.1 Introduction to 6.5 Overall Process
Note: This version was the draft 2nd Edition being updated in 2022. The numeric in the square bracket [X-X] cross-refers to the actual chapter and section in the 1st Edition.