Incident Recovery, Step 1: Stop the BleedingForbes Technology Council's Fene Osakwe on Cyber Resilience, Breach Recovery
What motivated Fene Osakwe to get into cybersecurity? "I got hacked," he said. That led him to find out more about cybersecurity, become a pen tester, move into management, and then go on to maturing cybersecurity for a company that is planning to be listed in the New York Stock Exchange.
Osakwe said cybersecurity strategy starts with "identify and protect," which means knowing all the assets of the organization and what processes, policies and technologies you have in place to protect them - since you can't protect what you don't know. Today, he said, we have moved from cybersecurity to cyber resilience strategy, so it's not just about preventing the opposition from scoring a goal but ensuring that - even if they do - you can still win the match.
In this video interview with Information Security Media Group at Infosecurity Europe 2023, Osakwe discussed:
- The key elements of a cybersecurity strategy;
- Practical responses to a breach - i.e., "how to stop the bleeding";
- The importance of strength in depth to help the recovery process.
Osakwe is an information technology and business advisory professional with more than a decade of experience in the sector. His core competencies are in cybersecurity, IT governance, IT strategy, risk management and Sarbanes-Oxley implementations, and he has consulted for financial institutions, telecoms and fintech companies, state governments and universities in these areas. Osakwe is a best-selling author and a board member on the Forbes Technology Council.