Tweet Cybersecurity

BSA Member CEOs Speak Out on Resilience Through Recovery

In new CEO Perspectives videos shared with BSA, Cohesity CEO Sanjay Poonen and Veeam CEO Eswaran, both leaders in this space, offer their thoughts on cyber resilience. Read More >>

Incorporating backup and recovery practices to mitigate disruption after a cyberattack has become an especially important facet of cybersecurity.

Backups of key information like customer records, financial systems, or operational data are an integral part of cyber preparedness, the new BSA document, “Resilience Through Recovery,” makes clear.

In new CEO Perspectives videos shared with BSA, Cohesity CEO Sanjay Poonen and Veeam CEO Eswaran, both leaders in this space, offer their thoughts on cyber resilience.

Cohesity CEO Sanjay Poonen on Resilience Through Recovery

“We advise our clients to assume they’re going to get attacked. All of the detection and prevention that you do on security is important, but what becomes more important is recovery and remediation,” said Cohesity CEO Sanjay Poonen, who shared that Cohesity helps companies simulate the time to recovery in hours, days, or weeks.

Veeam CEO Anand Eswaran on Resilience Through Recovery

“The old model of ‘protect and hope’ is just done,” said Veeam CEO Ananad Eswaran, pointing to the Data Resilience Maturity Model developed by the company to assess resilience. “The new model is data resilience as a living defensive system, where backup, recovery, security, privacy, and compliance all work together as one intelligence system.”

Author:

Henry Young is Senior Director, Policy for BSA | The Software Alliance. Prior to joining BSA, Young was Senior Counsel and Senior Policy Advisor first to Secretary of Commerce Ross and then Secretary of Commerce Raimondo. In that role he was trusted to develop and oversee high-level policy and strategy for the U.S. Department of Commerce and its bureaus and collaborate with senior White House and interagency officials, to design, advocate, and implement critical policies and strategies that shape national and foreign policy related to technology including cybersecurity, 5G, and standards.

Leave a Reply

Your email address will not be published. Required fields are marked *

4 × five =