eBook OR

[OR] [P2] [S4] [ST] [C7] Cyber & Technology Resilience Testing

Written by Moh Heng Goh | Apr 22, 2026 6:22:27 AM

Chapter 7

Cyber & Technology Resilience Testing

Introduction

In a digitally driven environment, technology underpins nearly every Critical Business Service (CBS). As a result, cyber and technology disruptions—ranging from ransomware attacks and system outages to cloud failures—represent some of the most significant threats to organisational resilience.

Cyber & Technology Resilience Testing is the structured validation of an organisation’s ability to:

  • Prevent, detect, respond to, and recover from cyber incidents
  • Maintain the availability and integrity of critical systems and data
  • Continue delivering Critical Business Services within impact tolerance

Unlike traditional Disaster Recovery (DR) testing, which focuses on system recovery, cyber resilience testing must also address:

  • Active threats and adversarial behaviour
  • Decision-making under uncertainty (Crisis Management)
  • Integration with Business Continuity and Operational Resilience frameworks

Purpose of the Chapter

This chapter aims to:

  • Define cyber and technology resilience testing within BCM, Crisis Management, and OR
  • Provide a structured approach to designing and executing cyber resilience tests
  • Integrate cyber incident response, BCM recovery, and crisis management
  • Highlight key testing types, metrics, and best practices
  • Align testing with regulatory and operational resilience expectations

Understanding Cyber & Technology Resilience

Cyber Resilience vs Cybersecurity
  • Cybersecurity focuses on prevention and protection
  • Cyber Resilience focuses on continuity despite compromise

Cyber resilience assumes that:

Systems may be breached—but services must continue.

Technology Resilience

Technology resilience ensures:

  • System availability
  • Data integrity
  • Infrastructure reliability
  • Rapid recovery from failures
Integration with Operational Resilience

Cyber and technology resilience are critical enablers of:

  • Critical Business Services continuity
  • Impact tolerance compliance
  • Customer trust and regulatory assurance

Objectives of Cyber & Technology Resilience Testing

Core Objectives
  • Validate incident detection and response capability
  • Test system recovery and restoration (DR)
  • Assess data integrity and backup reliability
  • Evaluate decision-making and escalation
  • Ensure continuity of Critical Business Services
BCM Objectives
  • Validate recovery of IT systems supporting business processes
  • Confirm RTO and RPO achievement
  • Ensure alternate recovery strategies are effective
Crisis Management Objectives
  • Test Crisis Management Team (CMT) activation
  • Validate communication with regulators and stakeholders
  • Assess response to reputational impact

Types of Cyber & Technology Resilience Testing

Disaster Recovery (DR) Testing

Objective:

Validate system recovery and failover capability.

Scope:

  • Data centre failover
  • Application recovery
  • Backup restoration

Key Measures:

  • RTO and RPO achievement
  • System performance post-recovery
Cyber Incident Simulation Exercises

Objective:

Test response to cyberattacks.

Scope:

  • Detection and response processes
  • Incident containment
  • Coordination across IT, security, and business teams
Ransomware Simulation

Objective:

Test resilience against ransomware attacks.

Scope:

  • System compromise and encryption
  • Backup integrity validation
  • Recovery decision-making (restore vs rebuild)

Integration:

  • BCM: Recovery of systems
  • CM: Crisis communication and decision-making
Red Team / Blue Team Exercises

Objective:

Simulate adversarial attacks and defensive responses.

Scope:

  • Red Team: Simulates attackers
  • Blue Team: Defends and responds

Outcome:

  • Identification of vulnerabilities
  • Validation of detection and response capability
Tabletop Cyber Exercises

Objective:

Test decision-making in cyber crisis scenarios.

Focus:

  • Escalation and governance
  • Communication strategy
  • Regulatory response
Cloud and Third-Party Failure Testing

Objective:

Validate resilience against external technology dependencies.

Scope:

  • Cloud service outages
  • Vendor failures
  • Data access disruptions

Methodology for Cyber & Technology Resilience Testing

Step 1: Identify Critical Systems and CBS
  • Map systems supporting Critical Business Services
  • Prioritise based on impact and criticality
Step 2: Define Testing Objectives
  • Detection capability
  • Recovery performance
  • Decision-making effectiveness
Step 3: Design Scenarios

Use severe but plausible scenarios, such as:

  • Ransomware attack
  • Insider threat
  • Cloud provider outage
  • Data corruption incident
Step 4: Execute Testing
  • Simulate disruption or attack
  • Activate response and recovery processes
  • Engage the Crisis Management Team where required
Step 5: Measure Performance

Evaluate:

  • Detection time
  • Response time
  • Recovery time (RTO)
  • Data recovery (RPO)
Step 6: Improve and Enhance
  • Address identified vulnerabilities
  • Update response plans
  • Strengthen controls and processes

Integration with BCM and Crisis Management

BCM Integration
  • Recovery of IT systems
  • Continuity of business processes
  • Resource mobilisation
Crisis Management Integration
  • Strategic decision-making (e.g., system shutdown, public disclosure)
  • Communication with stakeholders
  • Regulatory reporting
Operational Resilience Integration
  • Ensure continuity of Critical Business Services
  • Validate alignment with impact tolerance
  • Test interdependencies across systems and vendors

Metrics and Performance Measurement

Key Metrics
  • Mean Time to Detect (MTTD)
  • Mean Time to Respond (MTTR)
  • Recovery Time Objective (RTO)
  • Recovery Point Objective (RPO)
  • Service downtime
Indicators of Weakness
  • Delayed detection of incidents
  • Ineffective containment
  • Backup failures
  • Poor coordination between teams

Common Challenges in Cyber Resilience Testing

Over-Reliance on DR Testing

Focusing only on recovery without testing active threats.

Lack of Integration

Cyber, BCM, and Crisis Management were tested separately.

Unrealistic Scenarios

Failure to simulate real-world cyber threats.

Limited Third-Party Testing

Ignoring dependencies on external providers.

Best Practices for Cyber & Technology Resilience Testing

  • Integrate cyber, BCM, and Crisis Management testing
  • Use realistic and evolving threat scenarios
  • Test both technical and decision-making capabilities
  • Include third-party and cloud providers
  • Validate backup integrity regularly
  • Continuously update testing based on threat intelligence

Case Illustration

Scenario: Ransomware Attack on Core Banking System

Event:

  • Systems encrypted
  • Customer transactions disrupted

BCM Response:

  • Activate DR systems
  • Restore from backups

Crisis Management Response:

  • Notify regulators
  • Communicate with customers
  • Manage reputational impact

Testing Outcome:

    • Evaluate recovery time
    • Assess decision-making effectiveness
    • Identify gaps in backup and response processes

Cyber & Technology Resilience Testing is essential for ensuring that organisations can operate in an environment where cyber threats are inevitable. It extends beyond traditional IT recovery to encompass detection, response, decision-making, and service continuity.

By integrating cyber resilience with BCM and Crisis Management, organisations can:

  • Strengthen their ability to withstand cyber disruptions
  • Protect critical systems and data
  • Maintain delivery of Critical Business Services
  • Enhance overall operational resilience

Ultimately, cyber resilience is not about avoiding incidents—it is about ensuring that the organisation can continue to function effectively, even when systems are under attack.

 

C1 C2 C3 C4 C5 C6 C7
C8 C9 C10 C11 C12 C13  
 

More Information About OR-5000 [OR-5] or OR-300 [OR-3]

To learn more about the course and schedule, click the buttons below for the OR-300 Operational Resilience Implementer course and the OR-5000 Operational Resilience Expert Implementer course.

If you have any questions, click to contact us.