Developing cyber resilience through cyber incident response capability improvement: Presenting the cyber incident response capability development life cycle model
Murray Goldschmidt
Additional contact information
Murray Goldschmidt: CyberCX, Australia
Cyber Security: A Peer-Reviewed Journal, 2025, vol. 9, issue 1, 27-39
Abstract:
In the face of a deteriorating cyber threat landscape, it has never been more important for entities to prepare for a cyber incident. This paper presents the cyber incident response capability development life cycle, a cumulative and iterative approach to considering cyber threats from multiple dimensions to identify capability gaps and providing the opportunity for focused skill uplift. The life cycle addresses all aspects of cyber incidents and provides innovative approaches to accommodating the needs of all stakeholders across all roles in an entity, from simplified exercises to complex simulated events. Exercising incident response plans and the associated playbooks is a feature of all standards and frameworks, and consistently recommended through government and regulatory advice. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/.
Keywords: cyber resilience; incident response; threat actors; nation state threats; organised crime; ransomware; cyber extortion; insider threats; board and director duties; first responders; incident response plan; playbooks; runbooks; crisis communications; critical infrastructure; cross domain threat hunting; cyber security framework; cyber security incident; cyber security risk management; incident handling; incident management; incident response (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/9643/download/ (application/pdf)
https://hstalks.com/article/9643/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2025:v:9:i:1:p:27-39
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().