Resiliency. Are you ready?
The best time to test your emergency plans is not during an actual emergency. Make sure you’re ready for the inevitable business-impacting cyber incident.
Is your business ready for a cyber event? Do you know what you need to do to get ready?
We can help no matter where you are in your resilience journey.
Is your business ready for a cyber event? Do you know what you need to do to get ready?
We can help no matter where you are in your resilience journey.
The rate and complexity of cyber attacks are increasing
Response and recovery
It’s important to have good measures in place to prevent cyber incidents, but also to have strong response and recovery mechanisms in place.
Increased cyber risk
Business continuity planning doesn’t normally include cyber as an input, however many businesses disrupting events are caused by cyber-attacks.
Prepare for the unexpected
Business resilience planning helps to identify critical assets, understand threats, uncover risks and test your business continuity and response plans.
Assessing business resilience in six steps
Interactive’s Business Resilience Roadmap offering is aimed at assessing your ability to respond to and recover from cyber-related incidents that materially impact business operations.

01_
Identify your business-critical assets
This is typically done as part of the business continuity planning process and results in the production of a Business Impact Assessment (BIA).
Consider the most important people, processes, and technology that keep your business moving.
Consider the most important people, processes, and technology that keep your business moving.

02_
Conduct a threat assessment
Perform threat modelling to identify and assess the potential threats that could compromise your business-critical assets.
While many of these threats may be non-cyber related, the key focus of this process will be assessing the cyber-related threats which are often overlooked during business continuity planning.
While many of these threats may be non-cyber related, the key focus of this process will be assessing the cyber-related threats which are often overlooked during business continuity planning.

03_
Risk assessment
The risk assessment consolidates the outputs of the previous two steps and focuses on identifying the risks to your assets and understanding the likelihood and impact of each.
The threat assessment determines the likelihood of a risk occurring and the BIA helps with identifying the impact that would result from a risk materialising.
The threat assessment determines the likelihood of a risk occurring and the BIA helps with identifying the impact that would result from a risk materialising.

04_
Update Business Continuity Plan
The updated BCP would detail the steps required to minimise the risk of business disruption arising from a cyber security-related incident.
At this time it is also important to review the Security Incident Response (IR) Plan which details the steps involved in responding to a cyber security incident that may involve invoking elements of the BCP.
At this time it is also important to review the Security Incident Response (IR) Plan which details the steps involved in responding to a cyber security incident that may involve invoking elements of the BCP.

05_
Test BCP & Incident Response Plan
Once the BCP and Incident Response plans have been updated and socialised, Interactive will perform table-top exercises to test the BCP and IR plan. Cyber security-specific scenarios would be used to simulate a crisis, test and validate each step in the BCP and IR plans, and evaluate your ability to respond to and recover from a cyber-related incident that impacted critical business operations.

06_
Revise BCP and IR Process
Interactive would review the key learnings with you and assist you with updating the BCP and IR processes.
Interactive would then work with you to repeat this process regularly to track and manage your progress to improve your resilience over time, and to assess any impacts to your resiliency due to changes in your environment and the evolving threat landscape.
Interactive would then work with you to repeat this process regularly to track and manage your progress to improve your resilience over time, and to assess any impacts to your resiliency due to changes in your environment and the evolving threat landscape.
Why Interactive?
Secure, compliant
The vendor of choice for regulated industries. ISO 9001 Quality and ISO 27001 Data Security accredited, and PCI DSS compliant.
Local cyber experts
We have a dedicated 24x7 Cyber Security Centre based onshore in Australia backed up by our 24x7 help desk. We are always available to support you, no matter the time.
Resilient infrastructure
All our facilities are power protected with N+1 Power, UPS generators and fire suppression systems ensure that in the event of a natural disaster, power outages or other unexpected events that we’ll still be online.
Managed replication
We can tailor our cloud server and data replication services for improved recovery. We manage everything for you, so you can focus on other matters.
Technical experts on-site
We have experts on-site, 24/7 that can offer technical support or practical guidance on your office set-up, business continuity testing, and much more.
Rapid recovery
Speed is a critical factor. Within 20 minutes of alerting us, we can have your business continuity suite ready to welcome your people. We’re staffed 24/7 and have sophisticated software deployment technology to ensure your systems are ready when needed.




