Continuously redefine mitigations around critical assets
Identify the impacts and risks emerging from the attack surface and the external threat landscape, then adjust defensive architecture to keep protecting what matters most.
A state-of-the-art cyber-resilient enterprise can achieve a small number of high-value outcomes that prove resilience is operational, not rhetorical.
Complexity is the enemy of good resilience.
Each outcome describes a visible organizational state that strong resilience programs should be able to produce.
Identify the impacts and risks emerging from the attack surface and the external threat landscape, then adjust defensive architecture to keep protecting what matters most.
Build risk, architecture, and operating processes so resilience is embedded by default instead of added only after a major event.
Protect the systems and dependencies the enterprise would need if it had to endure a sustained campaign from an advanced adversary.
Identify assets that could be turned against the company and maintain the emergency capabilities required to recover from broad compromise.
Prepare personnel with the tested resources, clear responsibilities, and practiced behaviors required to respond effectively during real incidents.
Use lessons from peers that appeared resilient but were still operationally incapacitated by advanced adversaries.
Track capabilities, compare against peers, and turn resilience into business intelligence early enough to act before damage becomes existential.
Manifesto Navigation
Use the back and forward buttons to read in order, or jump directly to any chapter.