Understanding Cyber Resilience with the World Economic Forum

Why Is It So Hard To Be Cyber Resilient?

For years, organisations have invested in cyber security, building digital fortresses to keep threats at bay. Yet, the relentless pace of innovation, coupled with the rise of sophisticated adversaries and the emergence of Agentic AI, demands a new paradigm: Cyber Resilience. It's no longer enough to simply prevent attacks; the focus must shift to anticipating, withstanding, and rapidly recovering from them. That’s the key difference between cyber security and cyber resilience.

The Evolution: Moving Beyond Cyber Security

The journey from data security to information security, then to cyber security, and now to cyber resilience, reflects a profound shift in how we perceive and combat digital threats. We’ve known for a long time that preventing 100% of incidents is a completely unattainable goal, and we’ve said to judge us more on our response to an incident, than on whether an incident occurs in the first place. Cyber resilience acknowledges this reality, emphasizing an organisation's ability “to minimize the impact of significant cyber incidents on its primary goals and objectives,” as it is defined by the World Economic Forum. It’s about ensuring business continuity, having robust and exercised plans that can adapt when something goes wrong, and protecting strategic value, even when a breach occurs.

The WEF, in collaboration with The University of Oxford and Splunk, has been advancing this crucial mindset shift in its work on Cyber Resilience. We know that true cyber resilience goes beyond technical solutions; it demands comprehensive strategies across a range of teams, all aligned with overarching business objectives, and those emergency “break-the-glass” fallbacks for true black swan events.

“The Cyber Resilience Compass: Journeys Towards Resilience”, published by the World Economic Forum, is a paper built by collecting real-world experiences from dozens of experts, providing practical insights and best practices to help organisations to build their robust cyber resilience roadmaps.

The Compass outlines seven categories that are essential for fostering resilience:

  1. Leadership: identifying the “crown jewels” and prioritizing their resilience, defining and owning the organization’s risk tolerance and embedding a cyber resilience culture.
  2. Governance, Risk, and Compliance: Defining the organization’s risk profile, establishing clear ownership and accountability structures and ensuring compliance with legislative and regulatory requirements.
  3. People and Culture: Growing and retaining talent, implementing training and awareness programmes to build employee ownership and engagement, and building a culture of psychological safety.
  4. Business Processes: Prioritizing and tiering business services, preparing for worst-case scenarios and building adaptability and resilience into business operations.
  5. Technical Systems: Understanding business prioritization of services, using data to prevent and predict incidents and implementing technical controls as preventive measures and to minimize the impact of incidents.
  6. Crisis Management: Building and training crisis response teams, designing and reviewing plans and defining decision-making protocols.
  7. Ecosystem Engagement: Building visibility of upstream and downstream dependencies with external parties, consistently assessing risk bidirectionally with dependent parties and responding in partnership with external actors.

These pathways underscore that cyber resilience is a continuous practice, not a static state. Organisations must operate under the assumption that significant cyber incidents will occur, and their ability to recover from them is what really counts.

Measuring And Testing Resilience

How can an organisation know if it's resilient? We need to measure; to find what needs fixing and how effective our improvements are to bolster our cyber resilience. But existing measurement systems fall short: traditional security audits can overfocus on preventative controls, and technical measurement misses the holistic approach that measuring cyber resilience requires. How can you measure the resilience of your crisis management function? It’s not only about time to contain, but also about the well-being of your teams.

Cyber resilience is a continuous journey, not a destination. It requires a commitment to ongoing learning, adaptation, and collaboration. Best practices from the World Economic Forum, The University of Oxford and Splunk, are just the start. We’re continuing the work on measuring cyber resilience to improve the baseline for everyone.

Are you ready to strengthen your organisation's cyber resilience? Join leading experts from Splunk and the World Economic Forum for some insights and expert discussion. Register for EMEA’s Digital Resilience Week 2025 here!

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.