{"id":22801,"date":"2023-08-01T18:23:33","date_gmt":"2023-08-01T16:23:33","guid":{"rendered":"https:\/\/www.eurotechconseil.com\/en\/?p=22801"},"modified":"2023-08-22T18:25:09","modified_gmt":"2023-08-22T16:25:09","slug":"difference-between-cyber-security-and-cyber-resilience","status":"publish","type":"post","link":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/","title":{"rendered":"Cyber-resilience and cyber-security: what is the difference?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 class=\"heading\" style=\"text-align: center;\">Cyber resilience and cybersecurity:<br \/>\nWhat is the difference?<\/h1>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/Sans-titre-3.webp&#8221; alt=&#8221;Cyber-security-vs-Cyber -Resilience&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;Texte&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\">Experts on the subject will say that cybersecurity consists of protection against computer hackers who connect to a company\u2019s network or attempt hacked access to its information system and data. Regarding cyber-resilience, experts define it as the reaction of a company following a cyber-attack and how it will recover. At this stage, cyber-security And cyber Resilience are presented as two separate operations. However, in reality, things are much more complex than they seem. Indeed, cyber-security can be appreciated as being the first phase of cyber resilience, in the sense that any company must integrate into its cyber-resilience strategy a cyber security stage.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>What is cybersecurity ?<\/h2>\n<p style=\"text-align: left;\">The concept of cyber-security is based on a range of different processes, devices, technologies, human operations and modes of governance which are implemented in order to ensure the protection of computer networks,digital assets as well as the digital systems of a company.<\/p>\n<p style=\"text-align: left;\"><strong>As such, cybersecurity measures are implemented to prevent access by hackers to the network and computer systems of a company. These measures are part of a so-called proactive action plan and which may include the following elements:<\/strong><\/p>\n<ul style=\"text-align: left;\">\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Installation of antivirus and firewalls in addition to updates of all software.<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Meeting all compliance standards \u00a0to ensure\u00a0 the\u00a0protection\u00a0of\u00a0user sensitive data.<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Ensuring the security of services and devices against multiple malicious activities such as theft or viruses.<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Locking all computer screens.<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Promoting awareness and providing training to employees regarding the obligation to ensure the security of their daily tasks.<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Protective installation supported around company premises.<\/li>\n<\/ul>\n<p style=\"text-align: left;\">\u2794 Through the whole of this cybersecurity package, an organization is guaranteed to have a very good position which would allow it to act as a barrier against pirates and prevent them from attempting to infiltrate its computer systems.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>What is cyber resilience?<\/h2>\n<p style=\"text-align: left;\">Faced with the proliferation of cyber-attacks, not all security measures are completely infallible. This is where cyber resilience plays a key role by implementing improved preventive measures so as to minimize, to the best of its ability, the negative impact of cyber-attacks. These include in particular<strong>:\u00a0\u00a0 <\/strong><\/p>\n<ul style=\"text-align: left;\">\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Making sure there are offline backup features.<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Intervening at the level of staff skills improving them in the sense of prevention against internal problems.<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Considering recovery plans following public relations issues caused by the impact of a cyber attack suffered by a third party.<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Performing on a regular basis exercises of attack simulation to improve business readiness in the event of a cyber attack.<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: justify;\">Establishing a business continuity plan.<\/li>\n<\/ul>\n<p style=\"text-align: left;\">\u2794 Cyber-resilience is an essential and indispensable concept for any organization because it allows it to ensure optimal protection against possible vulnerabilities in the future as well as to limit as much as possible damage and losses caused by cyber attacks. Added to this is the possibility of producing an exhaustive report dealing with the post-attack phase which allows a better grasping\u00a0and understanding of the impact of a cyber-attack.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>What is the difference between cybersecurity and cyber resilience ?<\/h2>\n<p style=\"text-align: left;\">While \u00a0cybersecurity focuses on proactive dispositions with the aim of helping and supporting the company in its fight against the growing proliferation of cyberattacks such as \u00a0ransomware and malicious software and applications, \u00a0cyber-resilience, for its part, \u00a0refers to the capacity that a company can have to limit as much as possible damage and losses while resuming business as usual following a cyber-attack. Moreover, what distinguishes cyber-security from cyber resilience is that the first \u00a0focuses its action on limiting threats from the outside, whereascyber-resilience intervenes on external threats such as ransomwares as well as <em>on<\/em> threats from within that comes in the form of human error.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: left;\">Which arrangements should be decided to apply for both cybersecurity and cyber resilience ?<\/h2>\n<p style=\"text-align: left;\">In order to be able to seamlessly integrate two concepts at once, namely, cyber-security and cyber resilience, it is possible to apply some good practices:<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: left;\"><strong>Performing simulation tests:<\/strong> this practice is relevant within the framework of prevention and above all good preparation to deal with a possible real cyber attack. It allows the company to anticipate the actions to be taken in the event of an attack through simulations of security incidents and makes it possible also to improve the company\u2019s cyber-security and cyber-resilience strategy.<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: left;\"><strong>Performing regular data backups: \u00a0<\/strong>Following a cyber-attack, a company necessarily needs to restore its normal\u00a0activity and resume business as usual in a short time. In order to be able to achieve this, it is essential that it backs up its data on a regular and permanent basis. Of course, in order for these backups to be reliable, it is important to do them on a separate network in order to protect them from the hands of pirates. If the data were stolen or lost, it would be much easier for the company to recover them and therefore to undertake its cyber-resilience more efficiently and more quickly.<\/li>\n<li style=\"list-style: url('https:\/\/www.eurotechconseil.com\/wp-content\/uploads\/2022\/03\/seblog.webp'); text-align: left;\"><strong>Emphasizing cyber-security and cyber-resilience in discussion with its board of directors:<\/strong> the proper preparation of all staff within a company in the event of a cyber-attack is a crucial step that needs to be taken. Employees must be on the lookout for all means allowing the protection of the company\u2019s data against potential cyber-attacks. It is important to know that all staff are concerned, including the board of directors which is most often in some kind of break with the technical and technological aspects. It is necessary to ensure that all employees have understood in-depth the security measures and that they know how to implement them in the event of a cyber-attack. Both concepts, whether cyber-security or cyber-resilience pursue the same objective, namely: the protection of a company&#8217;s data against possible malicious cyber attacks.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.0&#8243; _dynamic_attributes=&#8221;content&#8221; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; global_colors_info=&#8221;{}&#8221;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF90YWdzIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJsaW5rX3RvX3Rlcm1fcGFnZSI6Im9uIiwic2VwYXJhdG9yIjoiIHwgIiwiY2F0ZWdvcnlfdHlwZSI6InBvc3RfdGFnIn19@[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The concept of cyber-security is based on a range of different processes, devices, technologies..<\/p>\n","protected":false},"author":1,"featured_media":22809,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[61],"tags":[42,110],"class_list":["post-22801","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-application","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity and Cyber Resilience: What&#039;s the difference ?<\/title>\n<meta name=\"description\" content=\"What is the difference between security and resilience? What is cyber security and resilience ? How do you build cybersecurity resilience?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and Cyber Resilience: What&#039;s the difference ?\" \/>\n<meta property=\"og:description\" content=\"What is the difference between security and resilience? What is cyber security and resilience ? How do you build cybersecurity resilience?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Eurotechconseil\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eurotechconseilfrance\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-01T16:23:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-22T16:25:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyber-securityjpg.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Eurotechconseil\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eurotechconseil\" \/>\n<meta name=\"twitter:site\" content=\"@eurotechconseil\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eurotechconseil\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/\"},\"author\":{\"name\":\"Eurotechconseil\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#\\\/schema\\\/person\\\/7e817c65e51afd1a598ebefb45995b2b\"},\"headline\":\"Cyber-resilience and cyber-security: what is the difference?\",\"datePublished\":\"2023-08-01T16:23:33+00:00\",\"dateModified\":\"2023-08-22T16:25:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/\"},\"wordCount\":1181,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cyber-securityjpg.webp\",\"keywords\":[\"#Application\",\"#Security\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/\",\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/\",\"name\":\"Cybersecurity and Cyber Resilience: What's the difference ?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cyber-securityjpg.webp\",\"datePublished\":\"2023-08-01T16:23:33+00:00\",\"dateModified\":\"2023-08-22T16:25:09+00:00\",\"description\":\"What is the difference between security and resilience? What is cyber security and resilience ? How do you build cybersecurity resilience?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cyber-securityjpg.webp\",\"contentUrl\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cyber-securityjpg.webp\",\"width\":400,\"height\":250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/difference-between-cyber-security-and-cyber-resilience\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-resilience and cyber-security: what is the difference?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/\",\"name\":\"Euro Tech Conseil\",\"description\":\"Software development company\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#organization\"},\"alternateName\":\"Euro Tech Conseil\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#organization\",\"name\":\"Euro Tech Conseil\",\"alternateName\":\"Euro Tech Conseil\",\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/logo-etc-en.webp\",\"contentUrl\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/logo-etc-en.webp\",\"width\":88,\"height\":35,\"caption\":\"Euro Tech Conseil\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/eurotechconseilfrance\\\/\",\"https:\\\/\\\/x.com\\\/eurotechconseil\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/#\\\/schema\\\/person\\\/7e817c65e51afd1a598ebefb45995b2b\",\"name\":\"Eurotechconseil\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g\",\"caption\":\"Eurotechconseil\"},\"sameAs\":[\"https:\\\/\\\/www.eurotechconseil.com\\\/en\"],\"url\":\"https:\\\/\\\/www.eurotechconseil.com\\\/en\\\/blog\\\/author\\\/admin00\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity and Cyber Resilience: What's the difference ?","description":"What is the difference between security and resilience? What is cyber security and resilience ? How do you build cybersecurity resilience?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity and Cyber Resilience: What's the difference ?","og_description":"What is the difference between security and resilience? What is cyber security and resilience ? How do you build cybersecurity resilience?","og_url":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/","og_site_name":"Eurotechconseil","article_publisher":"https:\/\/www.facebook.com\/eurotechconseilfrance\/","article_published_time":"2023-08-01T16:23:33+00:00","article_modified_time":"2023-08-22T16:25:09+00:00","og_image":[{"width":400,"height":250,"url":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyber-securityjpg.webp","type":"image\/webp"}],"author":"Eurotechconseil","twitter_card":"summary_large_image","twitter_creator":"@eurotechconseil","twitter_site":"@eurotechconseil","twitter_misc":{"Written by":"Eurotechconseil","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/#article","isPartOf":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/"},"author":{"name":"Eurotechconseil","@id":"https:\/\/www.eurotechconseil.com\/en\/#\/schema\/person\/7e817c65e51afd1a598ebefb45995b2b"},"headline":"Cyber-resilience and cyber-security: what is the difference?","datePublished":"2023-08-01T16:23:33+00:00","dateModified":"2023-08-22T16:25:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/"},"wordCount":1181,"commentCount":0,"publisher":{"@id":"https:\/\/www.eurotechconseil.com\/en\/#organization"},"image":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyber-securityjpg.webp","keywords":["#Application","#Security"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/","url":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/","name":"Cybersecurity and Cyber Resilience: What's the difference ?","isPartOf":{"@id":"https:\/\/www.eurotechconseil.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/#primaryimage"},"image":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyber-securityjpg.webp","datePublished":"2023-08-01T16:23:33+00:00","dateModified":"2023-08-22T16:25:09+00:00","description":"What is the difference between security and resilience? What is cyber security and resilience ? How do you build cybersecurity resilience?","breadcrumb":{"@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/#primaryimage","url":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyber-securityjpg.webp","contentUrl":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2023\/08\/cyber-securityjpg.webp","width":400,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.eurotechconseil.com\/en\/blog\/difference-between-cyber-security-and-cyber-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eurotechconseil.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber-resilience and cyber-security: what is the difference?"}]},{"@type":"WebSite","@id":"https:\/\/www.eurotechconseil.com\/en\/#website","url":"https:\/\/www.eurotechconseil.com\/en\/","name":"Euro Tech Conseil","description":"Software development company","publisher":{"@id":"https:\/\/www.eurotechconseil.com\/en\/#organization"},"alternateName":"Euro Tech Conseil","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eurotechconseil.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eurotechconseil.com\/en\/#organization","name":"Euro Tech Conseil","alternateName":"Euro Tech Conseil","url":"https:\/\/www.eurotechconseil.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eurotechconseil.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2026\/04\/logo-etc-en.webp","contentUrl":"https:\/\/www.eurotechconseil.com\/en\/wp-content\/uploads\/2026\/04\/logo-etc-en.webp","width":88,"height":35,"caption":"Euro Tech Conseil"},"image":{"@id":"https:\/\/www.eurotechconseil.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eurotechconseilfrance\/","https:\/\/x.com\/eurotechconseil"]},{"@type":"Person","@id":"https:\/\/www.eurotechconseil.com\/en\/#\/schema\/person\/7e817c65e51afd1a598ebefb45995b2b","name":"Eurotechconseil","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d3182bb9b74af92755e7d6b83fe4ce97d1f45f082632bc795d6b69a35d7bf19?s=96&d=mm&r=g","caption":"Eurotechconseil"},"sameAs":["https:\/\/www.eurotechconseil.com\/en"],"url":"https:\/\/www.eurotechconseil.com\/en\/blog\/author\/admin00\/"}]}},"_links":{"self":[{"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/posts\/22801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/comments?post=22801"}],"version-history":[{"count":0,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/posts\/22801\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/media\/22809"}],"wp:attachment":[{"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/media?parent=22801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/categories?post=22801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eurotechconseil.com\/en\/wp-json\/wp\/v2\/tags?post=22801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}