{"id":108905,"date":"2023-06-06T09:26:47","date_gmt":"2023-06-06T16:26:47","guid":{"rendered":"https:\/\/www.backblaze.com\/blog\/?p=108905"},"modified":"2023-06-13T19:46:14","modified_gmt":"2023-06-14T02:46:14","slug":"from-response-to-recovery-developing-a-cyber-resilience-framework","status":"publish","type":"post","link":"https:\/\/www.backblaze.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/","title":{"rendered":"From Response to Recovery: Developing a Cyber Resilience Framework"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"6000\" height=\"3417\" src=\"https:\/\/www.backblaze.com\/blog\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience-.png\" alt=\"A decorative image showing a globe icon surrounded by a search icon, a backup icon, a cog, a shield with a checkmark, and a checklist. \" class=\"wp-image-108906\" srcset=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience-.png 6000w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience--300x171.png 300w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience--1024x583.png 1024w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience--768x437.png 768w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience--1536x875.png 1536w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience--2048x1166.png 2048w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience--560x319.png 560w\" sizes=\"auto, (max-width: 6000px) 100vw, 6000px\" \/><\/figure>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-drop-cap\">If you\u2019re responsible for securing your company\u2019s data, you\u2019re likely well-acquainted with the basics of backups. You may be following the <a href=\"\/blog\/3-2-1-backup-best-practices-using-the-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">3-2-1 rule<\/a> and may even be using cloud storage for off-site backup of essential data.<\/p>\n\n\n\n<p>But there\u2019s a new model of iterative, process-improvement driven outcomes to improve business continuity, and it\u2019s called cyber resilience. What is cyber resilience and why does it matter to your business? That\u2019s what we\u2019ll talk about today.<\/p>\n\n\n\n<div class=\"abstract\" style=\"line-height: 1.8; margin: 24px 12px; padding: 24px 12px 10px 12px;\">\n<h4>Join Us for Our Upcoming Webinar<\/h4>\n<p>Learn more about how to strengthen your organization\u2019s cyber resilience by protecting systems, responding to incidents, and recovering with minimal disruption at our upcoming webinar \u201cBuild Your Company\u2019s Cyber Resilience: Protect, Respond, and Recover from Security Incidents\u201d on Friday, June 9 at 10 a.m. PT\/noon CT. <\/p>\n\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-53a00b30-f65d-4c7c-875e-213ece519760\"><span class=\"hs-cta-node hs-cta-53a00b30-f65d-4c7c-875e-213ece519760\" id=\"hs-cta-53a00b30-f65d-4c7c-875e-213ece519760\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/2832298\/53a00b30-f65d-4c7c-875e-213ece519760\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-53a00b30-f65d-4c7c-875e-213ece519760\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/2832298\/53a00b30-f65d-4c7c-875e-213ece519760.png\"  alt=\"Join Us June 9 \u2794\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(2832298, '53a00b30-f65d-4c7c-875e-213ece519760', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\n<br \/><br \/>\n<p>Plus, see a demo of <a href=\"\/blog\/announcing-instant-business-recovery-a-joint-solution-by-continuity-centers\/\" rel=\"noopener\" target=\"_blank\">Instant Business Recovery<\/a>, an on-demand, fully managed disaster recovery as a service (DRaaS) solution that works seamlessly with Veeam. Deploy and recover via a simple web interface or a phone call to instantly begin recovering critical servers and Veeam backups.<\/p><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Case for Cyber Resilience<\/h2>\n\n\n\n<p>The advance of artificial intelligence (AI) technologies, geopolitical tensions, and the ever-present threat of ransomware have all fundamentally changed the approach businesses must take to data security. In fact, the White House has prioritized cybersecurity by announcing a <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2023\/03\/02\/fact-sheet-biden-harris-administration-announces-national-cybersecurity-strategy\/\" target=\"_blank\" rel=\"noreferrer noopener\">new cybersecurity strategy<\/a> because of the increased risks of cyberattacks and the threat to critical infrastructure. And, according to the World Economic Forum\u2019s <a href=\"https:\/\/www3.weforum.org\/docs\/WEF_Global_Security_Outlook_Report_2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Global Cybersecurity Outlook 2023<\/a>, business continuity (67%) and reputational damage (65%) concern organization leaders more than any other cyber risk.<\/p>\n\n\n\n<p>Cyber resilience assumes that it\u2019s not <em>if<\/em> a security incident will occur, but <em>when<\/em>.&nbsp;<\/p>\n\n\n\n<p>Being cyber resilient means that a business is able to not only identify threats and protect against them, but also withstand attacks as they\u2019re happening, respond effectively, and bounce back better\u2014so that the business is better fortified against future incidents.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Cyber Resilience?<\/h2>\n\n\n\n<p>Cyber resilience is ultimately a holistic and continuous view of data protection; it implies that businesses can build more robust security practices, embed those throughout the organization, and put processes into place to learn from security threats and incidents in order to continuously shore up defenses. In the cyber resilience model, improving data security is no longer a finite series of checkbox items; it is not something that is ever \u201cdone.\u201d<\/p>\n\n\n\n<p>Unlike common backup strategies like <a href=\"\/blog\/3-2-1-backup-best-practices-using-the-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">3-2-1<\/a> or <a href=\"\/blog\/better-backup-practices-what-is-the-grandfather-father-son-approach\/\" target=\"_blank\" rel=\"noreferrer noopener\">grandfather-father-son<\/a> that are well defined and understood, there is no singular model for cyber resilience. The National Institute of Standards and Technology defines <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/cyber_resiliency\" target=\"_blank\" rel=\"noreferrer noopener\">cyber resiliency<\/a> as the ability to anticipate, withstand, recover from, and adapt to incidents that compromise systems. You\u2019ll often see the cyber resilience model depicted in a circular fashion because it is a cycle of continuous improvement. While cyber resilience frameworks may vary slightly from one another, they all typically focus on similar stages, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identify:<\/strong> Stay informed about emerging security threats, especially those that your systems are most vulnerable to. Share information throughout the organization when employees need to install critical updates and patches.&nbsp;<\/li>\n\n\n\n<li><strong>Protect:<\/strong> Ensure systems are adequately protected with cybersecurity best practices like multi-factor authentication (MFA), encryption at rest and in transit, and by applying the <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/least_privilege\" target=\"_blank\" rel=\"noreferrer noopener\">principle of least privilege<\/a>. For more information on how to shore up your data protection, including data protected in cloud storage, check out our comprehensive <a href=\"\/blog\/a-cyber-insurance-checklist-learn-how-to-lower-risk-to-better-secure-coverage\/\" target=\"_blank\" rel=\"noreferrer noopener\">checklist on cyber insurance best practices<\/a>. Even if you\u2019re not interested in <a href=\"\/blog\/what-is-cyber-insurance\/\" target=\"_blank\" rel=\"noreferrer noopener\">cyber insurance<\/a>, this checklist still provides a thorough resource for improving your cyber resilience.<\/li>\n\n\n\n<li><strong>Detect:<\/strong> Proactively monitor your network and system to ensure you can detect any threats as soon as possible.<\/li>\n\n\n\n<li><strong>Respond and Recover:<\/strong> Respond to incidents in the most effective way and ensure you can sustain critical business operations even while an incident is occurring. Plan your recovery in advance so your executive and IT teams are prepared to execute on it when the time comes.<\/li>\n\n\n\n<li><strong>Adapt:<\/strong> This is the key part. Run postmortems to understand what happened, what worked and what didn\u2019t, and how it can be prevented in the future. This is how you truly build resilience.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Why Is Cyber Resilience Important?<\/h2>\n\n\n\n<p>Traditionally, IT leaders have excelled at thinking through backup strategy, and more and more IT administrators understand the value of next level techniques like using <a href=\"\/blog\/object-lock-101-protecting-data-from-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Object Lock<\/a> to protect copies of data from ransomware. But, it\u2019s less common to give attention to creating a <a href=\"\/blog\/server-backup-101-disaster-recovery-planning\/\" target=\"_blank\" rel=\"noreferrer noopener\">disaster recovery (DR) plan<\/a>, or thinking through how to ensure business continuity during and after an incident.&nbsp;<\/p>\n\n\n\n<p>In other words, we\u2019ve been focusing too much on the time <strong>before<\/strong> an incident occurs and not enough on time on what to do <strong>during<\/strong> and <strong>after<\/strong> an incident. Consider the <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/zero_trust\" target=\"_blank\" rel=\"noreferrer noopener\">zero trust principle<\/a>, which assumes that a breach is happening and it\u2019s happening right now: taking such a viewpoint may seem negative, but it\u2019s actually a proactive, not reactive, way to increase your business\u2019 cyber resilience. When you assume you\u2019re under attack, then your responsibility is to prove you\u2019re not, which means actively monitoring your systems\u2014and if you happen to discover that you are under attack, then your cybersecurity readiness measures kick in.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Is Cyber Resilience Different From Cybersecurity?<\/h2>\n\n\n\n<p>Cybersecurity is a set of practices on what to do <em>before<\/em> an incident occurs. Cyber resilience asks businesses to think more thoroughly about recovery processes and what comes <em>after<\/em>. Hence, cybersecurity is a component of cyber resilience, but cyber resilience is a much bigger framework through which to think about your business.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Can I Improve My Business\u2019 Cyber Resilience?<\/h2>\n\n\n\n<p>Besides establishing a sound backup strategy and following cybersecurity best practices, the biggest improvement that data security leaders can make is likely in helping the organization to shift its <em>culture<\/em> around cyber resilience.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reframe cyber resilience.<\/strong> It is not solely a function of IT. Ensuring business continuity in the face of cyber threats can and should involve operations, legal, compliance, finance teams, and more.<\/li>\n\n\n\n<li><strong>Secure executive support <em>now<\/em>. Don\u2019t wait until an incident occurs. <\/strong>Consider meeting on a regular basis with stakeholders to inform them about potential threats. Present if\/then scenarios in terms that executives can understand: impact of risks, potential trade-offs, how incidents might affect customers or external partners, expected costs for mitigation and recovery, and timelines.<\/li>\n\n\n\n<li><strong>Practice your <\/strong><a href=\"\/blog\/server-backup-101-disaster-recovery-planning\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>disaster recovery<\/strong><\/a><strong> scenarios. <\/strong>Your business continuity plans should be run as fire drills. Ensure you have all stakeholders\u2019 emergency\/after hours contact information. Run tabletop exercises with any teams that need to be involved and conduct hypothetical retrospectives to determine how you can respond more efficiently if a given incident should occur.<\/li>\n<\/ul>\n\n\n\n<p>It may seem overwhelming to try and adopt a cyber resiliency framework for your business, but you can start to move your organization in this direction by helping your internal stakeholders first shift their thinking. Acknowledging that a cyber incident <em>will<\/em> occur is a powerful way to realign priorities and support for data security leaders, and you\u2019ll find that the momentum behind the effort will naturally help advance your security agenda.<\/p>\n\n\n\n<div class=\"abstract\" style=\"line-height: 1.8; margin: 24px 12px; padding: 24px 12px 10px 12px;\">\n<h4>Cyber Resilience Resources<\/h4>\n<p>Interested in learning more about how to improve business cyber resilience? Check out the free Backblaze resources below.<\/p>\n<ul><li><a href=\"\/blog\/cisos-guide-to-ransomware\/\" rel=\"noopener\" target=\"_blank\">CISO\u2019s Guide to Ransomware<\/a><\/li>\n<li><a href=\"https:\/\/www.brighttalk.com\/webcast\/14807\/551937?utm_source=brighttalk-portal&#038;utm_medium=web&#038;utm_campaign=channel-page&#038;utm_content=recorded\" rel=\"noopener\" target=\"_blank\">Cybersecurity and the Public Cloud: Cloud Backup Best Practices webinar recording<\/a><\/li>\n<li><a href=\"https:\/\/hub.backblaze.com\/server-backup-ebook\" rel=\"noopener\" target=\"_blank\">Server Backup: A Comprehensive Guide to Protecting the Data on Your Servers<\/a><\/li>\n<br \/>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-8a341850-8a10-47df-915e-68a20860d249\"><span class=\"hs-cta-node hs-cta-8a341850-8a10-47df-915e-68a20860d249\" id=\"hs-cta-8a341850-8a10-47df-915e-68a20860d249\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/2832298\/8a341850-8a10-47df-915e-68a20860d249\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-8a341850-8a10-47df-915e-68a20860d249\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/2832298\/8a341850-8a10-47df-915e-68a20860d249.png\"  alt=\"Download the Ransomware Guide \u2794\u00a0\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(2832298, '8a341850-8a10-47df-915e-68a20860d249', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\n\n<\/ul><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Looking for Support to Help Achieve Your Cyber Resilience Goals?<\/h2>\n\n\n\n<p>Backblaze provides end-to-end security and recovery solutions to ensure you can safeguard your systems with enterprise-grade security, immutability, and options for redundancy, plus fully-managed, on-demand disaster recovery as a service (DRaaS)\u2014all at one-fifth the cost of AWS. <a href=\"https:\/\/www.backblaze.com\/b2\/sign-up.html?referrer=nopref\" target=\"_blank\" rel=\"noreferrer noopener\">Get started today<\/a> or <a href=\"https:\/\/www.backblaze.com\/b2\/contact-sales.html\" target=\"_blank\" rel=\"noreferrer noopener\">contact Sales<\/a> for more information on <a href=\"https:\/\/www.backblaze.com\/cloud-storage\/reserve-capacity-storage\" target=\"_blank\" rel=\"noreferrer noopener\">B2 Reserve<\/a>, our all-inclusive capacity-based pricing that includes premium support and no egress fees.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber resilience is an iterative, process-driven model designed to help you lower cyber risk. Let&#8217;s talk about how it can improve your business&#8217; cybersecurity. <\/p>\n","protected":false},"author":175,"featured_media":108906,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7,434,475,478],"tags":[468],"class_list":["post-108905","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-storage","category-featured-1","category-ransomware","category-server-backup","tag-b2cloud","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From Response to Recovery: Developing a Cyber Resilience Framework<\/title>\n<meta name=\"description\" content=\"Cyber resilience is an iterative, process-driven model to combat cyber risk. Let&#039;s talk about how it can improve your business&#039; cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backblaze.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Response to Recovery: Developing a Cyber Resilience Framework\" \/>\n<meta property=\"og:description\" content=\"Cyber resilience is an iterative, process-driven model to combat cyber risk. Let&#039;s talk about how it can improve your business&#039; cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Backblaze Blog | Cloud Storage &amp; Cloud Backup\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/backblaze\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-06T16:26:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-14T02:46:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"6000\" \/>\n\t<meta property=\"og:image:height\" content=\"3417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kari Rivas\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@backblaze\" \/>\n<meta name=\"twitter:site\" content=\"@backblaze\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kari Rivas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Response to Recovery: Developing a Cyber Resilience Framework","description":"Cyber resilience is an iterative, process-driven model to combat cyber risk. Let's talk about how it can improve your business' cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backblaze.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/","og_locale":"en_US","og_type":"article","og_title":"From Response to Recovery: Developing a Cyber Resilience Framework","og_description":"Cyber resilience is an iterative, process-driven model to combat cyber risk. Let's talk about how it can improve your business' cybersecurity.","og_url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/","og_site_name":"Backblaze Blog | Cloud Storage &amp; Cloud Backup","article_publisher":"https:\/\/www.facebook.com\/backblaze","article_published_time":"2023-06-06T16:26:47+00:00","article_modified_time":"2023-06-14T02:46:14+00:00","og_image":[{"width":6000,"height":3417,"url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience-.png","type":"image\/png"}],"author":"Kari Rivas","twitter_card":"summary_large_image","twitter_creator":"@backblaze","twitter_site":"@backblaze","twitter_misc":{"Written by":"Kari Rivas","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/#article","isPartOf":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/"},"author":{"name":"Kari Rivas","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/cd16e363fb44fc4234121fca85ded1d2"},"headline":"From Response to Recovery: Developing a Cyber Resilience Framework","datePublished":"2023-06-06T16:26:47+00:00","dateModified":"2023-06-14T02:46:14+00:00","mainEntityOfPage":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/"},"wordCount":1312,"commentCount":0,"publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"image":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience-.png","keywords":["B2Cloud"],"articleSection":["Cloud Storage","Featured","Ransomware","Server Backup"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/","name":"From Response to Recovery: Developing a Cyber Resilience Framework","isPartOf":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/#primaryimage"},"image":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience-.png","datePublished":"2023-06-06T16:26:47+00:00","dateModified":"2023-06-14T02:46:14+00:00","description":"Cyber resilience is an iterative, process-driven model to combat cyber risk. Let's talk about how it can improve your business' cybersecurity.","breadcrumb":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/#primaryimage","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience-.png","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience-.png","width":6000,"height":3417,"caption":"A decorative image showing a globe icon surrounded by a search icon, a backup icon, a cog, a shield with a checkmark, and a checklist."},{"@type":"BreadcrumbList","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/"},{"@type":"ListItem","position":2,"name":"From Response to Recovery: Developing a Cyber Resilience Framework"}]},{"@type":"WebSite","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","name":"Backblaze Cloud Solutions Blog","description":"Cloud Storage &amp; Cloud Backup","publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization","name":"Backblaze","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"Backblaze"},"image":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/backblaze","https:\/\/x.com\/backblaze","https:\/\/www.youtube.com\/user\/Backblaze","https:\/\/en.wikipedia.org\/wiki\/Backblaze"]},{"@type":"Person","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/cd16e363fb44fc4234121fca85ded1d2","name":"Kari Rivas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/02\/Kari-Rivas-150x150.jpg","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/02\/Kari-Rivas-150x150.jpg","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/02\/Kari-Rivas-150x150.jpg","caption":"Kari Rivas"},"description":"As a Senior Product Marketing Manager, Kari Rivas leads backup and archive marketing at Backblaze, the leading cloud storage innovator delivering a modern alternative to traditional cloud providers. She works closely with IT professionals, managed service providers, and other businesses to ensure they never lose their valuable data. She received her MBA in 2010 and has spent 15 years in marketing, most notably in the education and SaaS spaces. Connect with her on LinkedIn.","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/author\/kari\/"}]}},"jetpack_featured_media_url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2023\/06\/bb-bh-What-Is-Cyber-Resilience-.png","_links":{"self":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/108905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/users\/175"}],"replies":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/comments?post=108905"}],"version-history":[{"count":0,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/108905\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media\/108906"}],"wp:attachment":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media?parent=108905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/categories?post=108905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/tags?post=108905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}