• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Big Data, Analytics & Intelligence

Navigating data resilience in an age of cyberwarfare

Joe Ong by Joe Ong
September 19, 2024
Photo by Mikhail Nilov: https://www.pexels.com/photo/person-s-hand-reaching-out-to-a-light-7709020/

Photo by Mikhail Nilov: https://www.pexels.com/photo/person-s-hand-reaching-out-to-a-light-7709020/

The term “cyberwarfare” historically conjures up images of state-sponsored hackers, ransomware gangs, and rogue insiders.

A recent high-profile example can be found in Indonesia: in July, the country’s national data centre was compromised by Lockbit 3.0, disrupting immigration checks at airports and permanently losing population data, affecting 239 institutions including 30 government ministries and agencies.

However, a more unexpected risk has entered the spotlight. The recent global IT incident caused by a vulnerability in software provided by CrowdStrike highlighted that threats can also come from trusted vendors and partners.

While the intention behind the incident may not have been malicious, the outcome was no less devastating, impacting countless organisations worldwide. Amid the chaos, IT departments everywhere must have felt like they were just as much in a war zone even with no hackers in the mix.

To make matters worse, business data today spans diverse environments and locations, from centralised databases to cloud environments and personal devices. Storing, securing, and making this data available to those who need it, when they need it, can be a mammoth task.

Against this backdrop, building a resilient data infrastructure can feel like a pipe dream. Given the dizzying repertoire of technologies ranging from replication to redundancy, from snapshots to backups, and from firewalls to erasure coding, how can enterprises determine whether their data infrastructure and data protection policies are adequate?


Forging a multi-layered shield for data resilience

Data resilience is the ability of an organisation to withstand and quickly recover from disruptions — whether caused by cyberattacks, system failures, or human error. Data is often described as the “new oil,” and ensuring data resilience is crucial to maintaining business continuity and protecting against reputational and financial damage.

For a modern organisation, data resilience is multifaceted. It involves not only robust cybersecurity measures but also a holistic approach to data management that includes redundancy, failover capabilities, real-time monitoring, and more. In the event of a cyber incident, the goal is to ensure that operations can continue with minimal disruption and that data can be restored to its original state as quickly as possible.

Building a robust and secure data infrastructure requires a layered defence system, thoughtfully designed to address technical and strategic concerns. Implementing strong technical safeguards is the first layer of defence.

Just as how steel can be strengthened through the forging of multiple layers, the following virtual layers form a crucial defensive digital shield against data incidents:

  • Replication: Maintains seamless operation of essential applications by keeping synchronised copies of data in varying geographical locations.
  • Backup and recovery: Ensures a dependable safeguard with regular backups at the source, making quick restoration possible in case of data loss or corruption.
  • Immutable storage: Protects data by preventing alterations, guaranteeing an unchangeable copy for recovery, and reducing the impact of ransomware or unintentional changes.
  • Data encryption: Makes data unreadable to unauthorised users, thereby protecting sensitive information.
  • Access controls: Implements rigid access restrictions based on user roles and permissions, reducing the risk of unauthorised data access.
  • Network security: Engages firewalls, intrusion detection systems, and other protective measures to defend against unauthorised access attempts and malicious activities.

Even the strongest shield must be armed and wielded by skilled warriors for it to be truly effective. To build a strong data foundation, CIOs must not forget that a human-centric approach should be at the heart of their strategy.

By cultivating a culture of awareness and accountability, such as continuous learning and knowledge sharing practice, executive leadership can promote cross-functional collaboration between IT, security and business units to achieve organisation-wide alignment on data resilience strategies.

The role of AI and hybrid clouds

Artificial intelligence and hybrid cloud environments are becoming indispensable tools in the quest for data resilience.

For example, AI's ability to process and analyse vast amounts of data in real time is revolutionising the way organizations detect and respond to cyber threats. By leveraging machine learning algorithms, organizations can identify patterns and anomalies that would be impossible for human analysts to detect. This proactive approach allows for early intervention, reducing the likelihood of a successful attack and minimising the damage should one occur.

Additionally, hybrid cloud environments offer a flexible and resilient infrastructure for managing data across multiple locations and platforms. By combining public and private cloud resources, organisations can achieve the best of both worlds: the scalability and cost-effectiveness of public clouds, and the control and security of private clouds.

This approach enhances data resilience by reducing dependency on a single provider or geographic location. Should one cloud provider experience an outage or a security breach, data can be swiftly rerouted to an alternative environment, ensuring continuous access and minimal disruption.

However, the integration of technologies like AI and hybrid cloud also introduces new complexities. As data flows between different environments and AI systems, ensuring the consistency, privacy, security, and integrity of that data becomes more challenging.

This is where a comprehensive data management strategy comes into play — one that includes robust encryption, access controls, and continuous monitoring across all platforms.

Looking ahead:

As the lines between adversaries and allies blur, so must our data resilience approach. The threats we face today are more complex and varied than ever before, often originating from unexpected sources like trusted vendors.

In this challenging environment, CIOs must adopt a proactive, multi-layered strategy to safeguard their data infrastructure. By rethinking traditional cybersecurity models and prioritising data resilience, organizations can not only survive but potentially thrive in the face of adversity.

The stakes are high, but with the right approach and the right integration of technologies like AI and hybrid cloud, organisations can navigate this turbulent landscape and emerge stronger on the other side.

Related:  Google Cloud reimagines graph databases with Spanner Graph
Tags: cyberwarfaredata resilienceHitachi Vantara
Joe Ong

Joe Ong

Joe Ong is the VP and GM for ASEAN at Hitachi Vantara. Based in Singapore, he provides overall leadership and guidance on business direction, including go-to-market strategies for the ASEAN region. Ong possesses close to three decades of experience in the IT industry, a substantial number of those years in the storage solutions business. Prior to joining Hitachi Data Systems in 2012, he was the Country Manager for Singapore, Brunei at EMC, where he managed the Singapore team (Direct Sales and Channel team) Ong graduated with a Bachelor of Science in Information Systems and Computer Science from the National University of Singapore. Outside of work, he enjoys a good round of golf. He is also an avid reader, diving into business, economic and strategic management.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe
OSZAR »