{"id":25803,"date":"2022-11-17T22:24:56","date_gmt":"2022-11-17T22:24:56","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25803"},"modified":"2023-05-09T20:35:49","modified_gmt":"2023-05-09T20:35:49","slug":"resiliencycon-you-will-be-breached-so-be-ready","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/","title":{"rendered":"MITRE ResilienCyCon: You Will Be Breached So Be Ready"},"content":{"rendered":"\n<p>Speakers at last week&#8217;s MITRE ResilienCyCon conference had a surprisingly candid message for attendees: You will likely be breached at some point so focus on the controls and response capabilities your organization needs to survive a cyber attack.<\/p>\n\n\n\n<p>The conference&#8217;s focus on cyber resilience doesn&#8217;t mean that organizations should abandon core security defenses like <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">EDR<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">access control<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\" target=\"_blank\" rel=\"noreferrer noopener\">firewalls<\/a>, but they should be prepared for the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">advanced threats<\/a> that will, at some point, get past them. That also means making sure that systems will be able to continue to function, even at a reduced capacity, during an attack.<\/p>\n\n\n\n<p>The general lack of focus on resilience, response and recovery is largely reflected in vendor offerings too. JupiterOne CISO Sounil Yu, creator of a Cyber Defense Matrix adopted by OWASP, noted the concentration of security products in protection and detection and wondered, &#8220;Is our industry actually solving the right problems?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"552\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/11\/security-response-products-1024x552.jpg\" alt=\"\" class=\"wp-image-25805\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/security-response-products-1024x552.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/security-response-products-300x162.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/security-response-products-768x414.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/security-response-products-1536x828.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/security-response-products-2048x1103.jpg 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/security-response-products-150x81.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/security-response-products-696x375.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/security-response-products-1068x575.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/security-response-products-1920x1035.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Sounil Yu: Lack of security response &amp; recovery products<\/figcaption><\/figure>\n\n\n\n<p>How to build in that cyber resiliency was the focus of a number of talks at the conference.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Patching Is Hard. Real Hard.<\/h2>\n\n\n\n<p>Unpatched vulnerabilities are at fault in anywhere from a third to more than half of all data breaches, depending on the study, so it&#8217;s natural to wonder why organizations don&#8217;t do a better job of <a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">patch management<\/a>. The answer, based on a couple of presentations at the conference, is that patching is incredibly difficult to get right, requiring way more attention than most companies can afford to give it.<\/p>\n\n\n\n<p>Art Ocain, VP for Cybersecurity and Incident Response at Airiam, noted that patching should be approached with a continuous deployment mindset, so teams should be able to patch 10 times a day.<\/p>\n\n\n\n<p>Phil Venables, CISO of Google Cloud, said Google Cloud treats patching like another company might treat its top revenue-generating applications, with continuous updates similar to what a development team would use (see slides below).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"485\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/11\/google-cloud-sdi-1024x485.jpg\" alt=\"\" class=\"wp-image-25806\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-sdi-1024x485.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-sdi-300x142.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-sdi-768x364.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-sdi-1536x728.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-sdi-2048x970.jpg 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-sdi-150x71.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-sdi-696x330.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-sdi-1068x506.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-sdi-1920x910.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"485\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/11\/google-cloud-patching-1024x485.jpg\" alt=\"\" class=\"wp-image-25807\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-patching-1024x485.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-patching-300x142.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-patching-768x364.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-patching-1536x728.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-patching-2048x970.jpg 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-patching-150x71.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-patching-696x330.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-patching-1068x506.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-cloud-patching-1920x910.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In addition to keeping up with patches, fixes and mitigations across applications, operating systems and endpoint and network hardware \u2014 there are roughly 20,000 new vulnerabilities a year, and several hundred of those are actively exploited by hackers \u2014 many organizations don&#8217;t even know everything they own, so <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-it-asset-management-tools-for-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">asset management<\/a> is part of the problem too.<\/p>\n\n\n\n<p>The sheer difficulty is one reason that <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management-as-a-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability management as a service (VMaaS)<\/a> and similar <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-service-providers\/\" target=\"_blank\" rel=\"noreferrer noopener\">services<\/a> have been gaining traction among security buyers.<\/p>\n\n\n\n<p>Google&#8217;s cloud security is well regarded (and the company has shared some <a href=\"https:\/\/cloud.google.com\/docs\/security\/overview\/whitepaper\" target=\"_blank\" rel=\"noreferrer noopener\">documentation<\/a> of its security architecture and practices too). Venables spent much of his presentation discussing the many ways Google Cloud reduces concentration risk (see slide below).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/11\/google-reducing-cloud-risk-1024x574.jpg\" alt=\"\" class=\"wp-image-25808\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-reducing-cloud-risk-1024x574.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-reducing-cloud-risk-300x168.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-reducing-cloud-risk-768x431.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-reducing-cloud-risk-1536x861.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-reducing-cloud-risk-2048x1149.jpg 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-reducing-cloud-risk-150x84.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-reducing-cloud-risk-696x390.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-reducing-cloud-risk-1068x599.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/google-reducing-cloud-risk-1920x1077.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Also read<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/patch-management-as-a-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">Is the Answer to Vulnerabilities Patch Management as a Service?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/cloud\/mitre-mssp-tests\/\" target=\"_blank\" rel=\"noreferrer noopener\">MSSPs Fare Well in First MITRE Evaluations<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Backup Is Hard. Really Hard.<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware<\/a> is the most feared cybersecurity threat, and with good reason: Its ability to destroy and steal data is almost without peer.<\/p>\n\n\n\n<p>That double threat \u2014 <a href=\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/\" target=\"_blank\" rel=\"noreferrer noopener\">exfiltration and destruction\/encryption<\/a> \u2014 makes <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">backup<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">encryption<\/a> of data critically important for recovery and to avoid extortion when hackers threaten to release sensitive data.<\/p>\n\n\n\n<p>&#8220;<a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Immutable backups<\/a>&#8221; are often touted as the answer here. But even that needs to be incredibly secure \u2014 Ocain said Airiam has to take extra steps to protect even the laptop of the backup manager because hackers will find it. And keys and credentials are stored in a key vault so admins don&#8217;t keep them. The slide below shows the controls the <a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp\/\" target=\"_blank\" rel=\"noreferrer noopener\">MSSP<\/a> has built into its backup and <a href=\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">disaster recovery<\/a> systems to keep customer data safe.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/11\/immutable-backup-1024x574.jpg\" alt=\"\" class=\"wp-image-25809\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup-1024x574.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup-300x168.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup-768x430.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup-1536x861.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup-2048x1147.jpg 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup-150x84.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup-696x390.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup-1068x598.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup-1920x1076.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Continuous <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\" target=\"_blank\" rel=\"noreferrer noopener\">pentesting<\/a> and ransomware simulations are among Airiam&#8217;s many controls. As Ocain put it, the company&#8217;s evolution &#8220;from good MSP to good resilience provider&#8221; was borne of necessity, and the company is now called in to consult on high-profile ransomware cases.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/building-a-ransomware-resilient-architecture\/\" target=\"_blank\" rel=\"noreferrer noopener\">Building a Ransomware Resilient Architecture<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Prepare Now<\/h2>\n\n\n\n<p>The conference \u2014 held in McLean, Va., and virtually \u2014 had a strong government and financial services focus, two sectors with high security needs that understand the <a href=\"https:\/\/www.esecurityplanet.com\/trends\/security-buyers-struggle-to-evaluate-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">limits of security tools<\/a> and the need for resilience. That element gave the conference an air of realism: No one was claiming that they could stop every threat, and the focus was on the layers of defense that can keep an attack from spiraling out of control.<\/p>\n\n\n\n<p>Government agencies and industries with high security needs have faced attacks and know they will continue, but most smaller businesses and non-IT companies don\u2019t have the time or money to focus on cyber attacks until they happen. ResilienCyCon showed the error of that thinking. Those secondary layers of defense and response are critical, and are far cheaper than dealing with the consequences of an attack. They can make the difference between bending and breaking, so businesses would be wise to prepare now.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-incident-response-tools-services\/\">Best Incident Response Tools and Software<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6e53c7152e-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e53c7152e\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e53c7152e\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e53c7152e\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e53c7152e\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e53c7152e\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e53c7152e\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Speakers at last week&#8217;s MITRE ResilienCyCon conference had a surprisingly candid message for attendees: You will likely be breached at some point so focus on the controls and response capabilities your organization needs to survive a cyber attack. The conference&#8217;s focus on cyber resilience doesn&#8217;t mean that organizations should abandon core security defenses like EDR, [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":25809,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[4517,2369,3790,860,1146,3414,23006,2478,730,22929,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[31788,382,225,385,403,383,378,395,404,389,381,31780,31790,31776,31775],"class_list":["post-25803","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-backup","tag-cloud-security","tag-cybersecurity","tag-encryption","tag-malware","tag-network-security","tag-patch-management","tag-ransomware","tag-security","tag-vulnerability-management","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-advanced-persistent-threats","b2b_product-application-security-vulnerability-management","b2b_product-cloud-security","b2b_product-cloud-saas-and-hosted-security-services","b2b_product-cyber-terrorists-and-cyber-crime","b2b_product-encryption-data-loss-prevention","b2b_product-endpoint-security","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-hackers","b2b_product-managed-security-services","b2b_product-network-access-control-nac","b2b_product-patch-management","b2b_product-ransomware","b2b_product-siem","b2b_product-web-applications-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>MITRE ResilienCyCon: You Will Be Breached So Be Ready | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"MITRE&#039;s cyber resiliency conference was candid and illuminating: Security is hard &amp; you will be breached, so focus on resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MITRE ResilienCyCon: You Will Be Breached So Be Ready | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"MITRE&#039;s cyber resiliency conference was candid and illuminating: Security is hard &amp; you will be breached, so focus on resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-17T22:24:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-09T20:35:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2547\" \/>\n\t<meta property=\"og:image:height\" content=\"1427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"MITRE ResilienCyCon: You Will Be Breached So Be Ready\",\"datePublished\":\"2022-11-17T22:24:56+00:00\",\"dateModified\":\"2023-05-09T20:35:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/\"},\"wordCount\":810,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup.jpg\",\"keywords\":[\"backup\",\"cloud security\",\"cybersecurity\",\"encryption\",\"malware\",\"network security\",\"Patch Management\",\"ransomware\",\"security\",\"Vulnerability Management\",\"Web security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/\",\"name\":\"MITRE ResilienCyCon: You Will Be Breached So Be Ready | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup.jpg\",\"datePublished\":\"2022-11-17T22:24:56+00:00\",\"dateModified\":\"2023-05-09T20:35:49+00:00\",\"description\":\"MITRE's cyber resiliency conference was candid and illuminating: Security is hard & you will be breached, so focus on resilience.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup.jpg\",\"width\":2547,\"height\":1427,\"caption\":\"immutable backup design architecture\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MITRE ResilienCyCon: You Will Be Breached So Be Ready\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MITRE ResilienCyCon: You Will Be Breached So Be Ready | eSecurity Planet","description":"MITRE's cyber resiliency conference was candid and illuminating: Security is hard & you will be breached, so focus on resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/","og_locale":"en_US","og_type":"article","og_title":"MITRE ResilienCyCon: You Will Be Breached So Be Ready | eSecurity Planet","og_description":"MITRE's cyber resiliency conference was candid and illuminating: Security is hard & you will be breached, so focus on resilience.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/","og_site_name":"eSecurity Planet","article_published_time":"2022-11-17T22:24:56+00:00","article_modified_time":"2023-05-09T20:35:49+00:00","og_image":[{"width":2547,"height":1427,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup.jpg","type":"image\/jpeg"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"MITRE ResilienCyCon: You Will Be Breached So Be Ready","datePublished":"2022-11-17T22:24:56+00:00","dateModified":"2023-05-09T20:35:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/"},"wordCount":810,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup.jpg","keywords":["backup","cloud security","cybersecurity","encryption","malware","network security","Patch Management","ransomware","security","Vulnerability Management","Web security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/","url":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/","name":"MITRE ResilienCyCon: You Will Be Breached So Be Ready | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup.jpg","datePublished":"2022-11-17T22:24:56+00:00","dateModified":"2023-05-09T20:35:49+00:00","description":"MITRE's cyber resiliency conference was candid and illuminating: Security is hard & you will be breached, so focus on resilience.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/immutable-backup.jpg","width":2547,"height":1427,"caption":"immutable backup design architecture"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/resiliencycon-you-will-be-breached-so-be-ready\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"MITRE ResilienCyCon: You Will Be Breached So Be Ready"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25803"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25803"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25803\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25809"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25803"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25803"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25803"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}