Building resilience in the public sector: a strategic guide

25/07/25 Martin Clews
Building resilience in the public sector: a strategic guide placeholder thumbnail

Beyond traditional cyber security: how to create an effective cyber resilience plan

In an era where cyber threats are growing in scale and sophistication, public sector organisations must go beyond traditional cyber security. While many may feel like they are too small a target to fall victim to the headline-grabbing attacks we see in the news, it is the unfortunate truth that all organisations are at risk, whether they turn over vast amounts of money or not. Therefore, the ability not only to defend against attacks, but also to recover quickly and continue delivering essential services is of paramount importance.

Public sector organisations like your own are prime targets for cyber-attacks due to the sensitive data they hold and the critical services they provide. A successful attack can disrupt operations, erode public trust, and even endanger lives. Cyber resilience ensures that even in the face of an incident, essential functions can continue with minimal disruption.

In this blog, we’ll explore the key components of a cyber resilience plan tailored for public sector bodies, covering both proactive and reactive strategies. Cyber security rests on three core pillars, people, processes and technology – so its vital that we consider each of them when defining our strategy.

While not covered in detail in this blog, other important elements to consider are risk, policy and compliance. A strong cyber resilience plan starts with clear governance, which helps define roles and responsibilities, establish leadership accountability and ensure alignment with national cyber security strategies. This aligns with carrying out regular risk assessments to identify critical assets, evaluate threats, and determine your organisation’s risk appetite. The result is that it is easier to prioritise resources and focus on what matters most.

 

Firstly, let’s look at the proactive aspects of a cyber resilience plan, based on five key areas.

 

1. Penetration testing

As the saying goes, you don’t know what you don’t know! So, it is absolutely essential that you carry out not only initial testing (if this is something that has not been done before), but continuous testing on at least an annual basis to understand what vulnerabilities exist within a given system, as until these are surfaced, it is impossible to know where to start.


2. Network segmentation and zero trust

If we work on the principle that regular penetration testing is being carried out, the next proactive step to look at with the how systems are architected.

In order to reduce your organisations attack surface, it is vital to implement layered security controls such as network segmentation and move toward a “zero trust” , endpoint protection, and encryption—to reduce attack surfaces.

 

3. Identity and access management 

The importance of multi-factor authentication cannot be overstated. Countless cyber incidents that CyberGuard has assisted with could have been mitigated, had this one control been in place. We live in a world now where most people access their banking online etc, and in almost every case, some form of MFA will be needed to log into this, but many users still don’t see the need to have MFA on their work accounts and systems.

In addition to this, administration rights and user privileges are very often leveraged by cybercriminals for malicious purposes. Implementing strategies such as role-based access control (RBAC) and privileged access management will not only increase your organisations overall security posture, by applying tighter controls to what users can and can’t access, it also can mean that should a user account be compromised, the damage that a threat actor is able to do could be lessened.


4. Security awareness training

With the rise of social engineering and phishing, the users of a system are becoming the conduit for so many attacks these days. Therefore, it is absolutely vital that your organisation trains its staff regularly and continuously. Similarly, human error can also be a leading cause of breaches, so awareness is your first line of defence.

 

5. Threat monitoring

Once we have our systems and infrastructure set out in the most optimum way possible, we then need to ensure that things are actively defended around the clock. This is where an you should look to deploy tools like security information and event management (SIEM) and security orchestration automation and response (SOAR)  to monitor systems in real time on a 24/7/365 basis, and integrate threat intelligence for early warning. Your organisation might not have the personnel to man a security operations centre (SOC) 24/7, so outsourcing this to a third party Managed Security Services Provider (MSSP) should be considered.

 

Let’s move on now and look at the reactive side of things, specifically, how to respond when things go wrong.


Have a clear incident response plan. Define your response team, escalation paths, and communication strategies. Additionally, it is vital that these plans are rigorously tested on a regular basis (often referred to as an “IR tabletop exercise”) to ensure that, in the event of a real incident, your plan is executed correctly and effectively.

 

Ensure you can restore critical services quickly. Regularly test your backup and recovery processes. Use the 3-2-1-1-0 backup rule to ensure that your backup and recovery strategies are as effective as possible, should the worst happen:

3 – there should be at least 3 copies of your data

2 - on two different storage media types (e.g. HDD and Cloud)

1 – at least one copy of your data is kept offsite/separate to your primary location

1 – at least one copy of your data is kept air-gapped/immutable

0 – verify that your backup contains zero errors

 

Enlist incident response expertise

While it may be tempting to try to recover as soon as possible in the heat of a cyber incident, this can sometimes cause more problems (especially if regulatory or data protection standards have been affected. Additionally, todays sophisticated threat actor groups have many ways to maintain access to a system (also called persistence) even after full system recovery.

Therefore, it is vital to have a professional team of incident responders ensure that threats have been investigated, contained and properly eradicated - before the recovery process begins, as this can save time and effort in the long run.

After an incident, IR responders can also conduct root cause analyses that will enable you to learn from the event and update your defences accordingly.

Final thoughts

Cyber resilience is not a one-time project - it’s a continuous journey. By combining proactive defences with robust response capabilities, public sector organisations like your own can protect their missions and maintain public trust in an increasingly digital world.

Remember that collaboration is key. Cyber resilience isn’t a solo effort. Collaborate with national cyber security centres (like the UK’s NCSC), participate in sector-specific information sharing groups (ISACs), and engage in public-private partnerships. It can also be beneficial to investigate cyber insurance, as this can make a difference and be the backbone of your incident response planning.

Lastly, set clear metrics and KPIs to track your progress. Conduct regular audits and use feedback loops to continuously improve your resilience posture.

If you'd like to learn more about how our solutions can help your organisation build cyber resilience, get in touch with one of our cyber security specialists. You can also explore how CHECK strengthens public sector cyber security, including our case study with the Birmingham Community Healthcare NHS Foundation Trust, where we strengthened and future-proofed their defences while improving usability and reliability.

 

Martin Clews - Cyber security specialistMC DealHub Pic - Feb 2024 (1)

Martyn has over 25 years experience in IT and eight years experience in cyber security. He holds over 30 cyber security accreditations including Microsoft Identity & Security, M365 and the XDR Defender Suite, CrowdStrike, Darktrace, Qualys, AWS Security Fundamentals, KnowBe4, and ISC2.

 

Public Sector, Cyber Security, SOC, Penetration Testing, SIEM, Cyber Resilience

Latest blogs

See all posts
wavenet IT support
How we support our customers | Managed IT services UK

We support organisations by bringing together the core building blocks of modern IT - secure, resilient networking; flexible cloud and data platforms; and collaboration tools that help people work from anywhere. As the UK’s most trusted managed service and security provider, we combine a broad portfolio across connectivity, cloud, communications and cyber security with deep technical expertise to design solutions that fit each customer’s goals, not a one-size-fits-all template. From connecting people and places to applications and data, to optimising Microsoft services and costs, enabling AI-driven productivity, and protecting environments with proactive security and incident response, We help customers stay secure, agile and focused - while building the operational resilience needed to anticipate, respond to, and recover from disruption. Watch this video to find out more Transcript: 0:05 Wavenet is the UK's most trusted managed service and security provider with a broad portfolio in connectivity, cloud, communications and cybersecurity. 0:15 We employ 1700 brilliant people with over 950 of those being highly skilled technologists. 0:22 So how do we use our broad portfolio, market leading partnerships and deep technical expertise to support our customers? 0:30 Intelligent networks are the foundation upon which everything else is built. 0:34 If the network is not robust, secure and scalable then anything that's connected to it will be affected. 0:40 From supplying broadband to designing networks from scratch, we connect people and places to data and applications. 0:46 As an ISP, we know there is no one-size-fits-all when it comes to network connectivity, so we take the time to assess the situation and goals before making a recommendation. 0:56 With the intelligent network in place, we make applications and data accessible. 1:00 These can reside anywhere within the Wavenet cloud, whether that be public, private, community or SAS based services unique to the market on demand. 1:09 Azure provides you with access to technical change and run squads for transformation, engineering and support, aligned with your own initiatives and priorities and as scalable as you need. 1:21 In public services such as Azure and Microsoft 365, financial management is a critical component and we have the tools that can effectively review consumption and make recommendations to streamline costs by effective use of licences, application of Azure services and 365 subscriptions. 1:39 Modern Workplace provides secure access for colleagues to the applications and data they need, regardless of location, whether they're in the office, at home, or working remotely. 1:49 They can access their apps and data from the Wavenet cloud, or they can be delivered as SAS services over the Intelligent network. 1:56 Our Copilot adoption and readiness packages unlock productivity, making your people more efficient. 2:02 Our Desktop as a service offering manages the full life cycle of consumer devices from provision, iMac management, recovery and recycle. 2:10 Bundled with complementary services such as End User Service Desk and Customer Site Tech Desk to support your staff and colleagues, ensuring that they're able to use the technology efficiently. 2:20 Our mobile services offer cost effective connectivity and airtime plans from all the UK's mobile network providers. 2:28 IoT services can be described as modern workplace with cameras, sensors, scanners and other devices providing data and insight over the foundation network. 2:37 Once we have connected users to your business applications and data, we help them communicate and collaborate with colleagues, suppliers and customers. 2:45 We empower sales and contact centre users with generative and agentic AI tools, pulling real time data information from your systems before, during and after customer interactions to deliver outstanding customer experiences. 2:59 We protect your environment with a range of proactive security services including security testing, managed detection and response. 3:06 Seem security awareness training and cyber certifications. 3:10 Providing reassurance in the event of an attack through fast and effective cyber incident response. 3:16 Underpinned by our highly skilled people, modern platforms and ITIL aligned processes. 3:22 Our advisory, monitoring, support and manage services simplify technology management, enhance user experience and control complex environments. 3:31 Helping you stay secure, agile and focused. 3:35 From supporting your in house IT teams to fully outsourced infrastructure and end user support across connectivity, cloud, communications and cybersecurity, we scale our services to support your business needs. 3:48 Wavenet has a long heritage in delivering operational resilience services and business continuity management consultancy. 3:54 With services that have evolved to meet the growing demands of UK organisations and new technology, we deliver the ability to anticipate, prepare for, respond to and recover from disruptive events or challenges that could impact your operations. 4:09 The goal is not just to survive disruptions, but to be able to maintain critical operations and recover quickly when things go wrong. 4:16 This is especially important in a fast-paced, interconnected world where businesses faced increased vulnerabilities. 4:23 As you can see, using our economies of scale, diverse vendor relationships and cutting edge expertise, we empower customers to make their technology work smarter.

Read more

Stay service-savvy

Get all the latest news and insights straight to your inbox.