With cyberattacks now the norm, companies have yet another challenge to deal with. The ‘superpower’ they need here is resilience – in cybersecurity and other parts of their business.
1 december 2025, Text Andreas Heer, Image: Swiss Cyber Storm 4 min
Imagine your business is judged not only by how impenetrable its walls are, but also by how quickly it can get back on its feet after a cyberattack. This ability – resilience – is the hidden superpower of cybersecurity. While often underestimated, it is crucial when cyber incidents occur or new security loopholes are discovered – such as the Log4J and xz vulnerabilities. The 2025 Swiss Cyber Storm(opens in new tab) cybersecurity conference showed that organisations that think strategically about resilience can remain effective even in turbulent times.
Resilience is more than just defence. It is the ability to not only prevent attacks, but also survive them and emerge stronger. For companies of all sizes, this means that resilience is not a state – it is a continuous process involving technology, organisation and people. It requires us to be able to prepare for the unexpected and to react flexibly.
Swisscom’s B2B CSIRT has developed an incident response framework for Microsoft 365. It can uncover attackers’ activity based on rules and helps companies to define measures to stop attacks. For example, the framework detects ‘impossible journeys’, such as logins from different regions within a short period of time, attackers’ newly registered MFA devices and mass downloads for business data exfiltration.
Angelo Violetti, an incident responder at Swisscom’s B2B CSIRT, also presented actionable recommendations for how companies can increase the resilience of their M365 environments. These included:
Not everything can be prevented with this IR framework, but much can be mitigated
and quickly contained.
Gone are the days when software providers could wash their hands of a product after a sale. New regulations and reporting obligations, such as the EU’s Cyber Resilience Act (CRA), aim to improve cybersecurity, especially in the software supply chain. From September 2026, providers will have to report actively exploited vulnerabilities in their products within specified deadlines. This requires knowing exactly which components and libraries are in the software in order to detect, for example, tampered packages from the NPM or PyPi repositories. An SBOM (software bill of materials) is essential for this. But while the approach is clear, there are challenges when it comes to implementation:
Providers that want to be resilient will therefore need to upgrade not only technically, but also in terms of organisation and regulation – and be prepared to take responsibility for the entire supply chain.
Dependence on US cloud providers poses geopolitical and legal risks to data security in terms of data confidentiality and availability. There are technical and organisational options for staying or becoming resilient. The disadvantages of each must be taken into account:
Companies must understand and be able to control their data streams to actively shape their resilience.
Can AI help in cybersecurity to strengthen defences and thus resilience? A meta-study by ETH Zurich has revealed that teamwork isn’t always better than people or AI alone. What matters is distributing tasks in a way that plays to the respective strengths of humans and machines:
Resilience is not just a nice-to-have, but the decisive factor for surviving in an uncertain world. Organisations that view resilience as a strategic superpower can not only fend off attacks, but also seize opportunities – and remain effective even when the unexpected occurs. The 2025 Swiss Cyber Storm showed that resilience is teamwork, technology, organisation and attitude all at once. It is the superpower that no one sees – but that decides everything.