Fujitsu is urging businesses worldwide to prioritize cyber resilience over traditional defense strategies. The company highlights the shift from building defensive walls to developing the ability to withstand, recover, and adapt to cyber threats, particularly in the context of a borderless attack surface.
New Cybersecurity Measures
To foster resilience, Fujitsu suggests integrating security protocols early in the development process. This includes the use of automation and AI for threat detection and rapid response coordination. Immutable backups, continuous cyber simulations, and real-time data replication are also recommended to restore services quickly and test operational preparedness.
The role of AI has grown, not only for orchestrating responses but also to counteract sophisticated tactics used by adversaries. With AI's capability to analyze anomalies and act within seconds, organizations are better equipped to minimize disruption when breaches occur.
Preparedness and Automation
Fujitsu’s approach focuses on preparedness through AI-driven automation that can automatically isolate affected systems and restore data while notifying key stakeholders. A data-centric recovery model, supported by non-alterable backups, is crucial for reducing operational downtime. Additionally, clear governance and predefined communication channels ensure effective coordination across departments.
The company acknowledges that regulatory frameworks, including the UK's NIS2 directive and the EU's Cyber Resilience Act, are reinforcing the need for robust protection and transparent recovery protocols.
Building Cyber Resilience Culture
Leadership plays a vital role in embedding resilience into the corporate fabric. By fostering awareness, accountability, and secure behaviors, as well as establishing key performance indicators and training programs, cyber resilience transforms into a cultural asset. This focus not only fosters trust and innovation but also ensures preparations against future threats, such as the emerging quantum threat, by exploring quantum-safe cryptography solutions.