{"id":35717,"date":"2026-03-03T11:16:27","date_gmt":"2026-03-03T10:16:27","guid":{"rendered":"https:\/\/stage-fp.webenv.pl\/blog\/?p=35717"},"modified":"2026-03-04T11:52:03","modified_gmt":"2026-03-04T10:52:03","slug":"cyber-resilience-media-strategy-execution","status":"publish","type":"post","link":"https:\/\/www.future-processing.com\/blog\/cyber-resilience-media-strategy-execution\/","title":{"rendered":"Cyber resilience in media: from strategy to execution"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"35717\" class=\"elementor elementor-35717\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f907c6d e-con-full e-flex e-con e-parent\" data-id=\"6f907c6d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a30ae3 elementor-widget elementor-widget-fp_breadcrumbs\" data-id=\"4a30ae3\" data-element_type=\"widget\" data-widget_type=\"fp_breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"o-breadcrumbs  o-margin--first-section\">\n    <div class=\"o-container\">\n        <a\n            href=\"https:\/\/www.future-processing.com\"\n            class=\"o-breadcrumbs__link o-breadcrumbs__link--home\"\n            aria-label=\"Home\"\n            data-elementclick=\"Breadcrumbs link\"\n            data-elementname=\"Breadcrumbs Home\"\n        >\n            Home        <\/a>\n        <a\n            href=\"https:\/\/www.future-processing.com\/blog\"\n            class=\"o-breadcrumbs__link\"\n            aria-label=\"Blog\"\n            data-elementclick=\"Breadcrumbs link\"\n            data-elementname=\"Breadcrumbs Blog\"\n        >\n            Blog        <\/a>\n                                                                <span aria-current=\"page\" class=\"o-breadcrumbs__title\">Cyber resilience in media: from strategy to execution<\/span>\n            <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a138b47 toc-ignore elementor-widget elementor-widget-fp_banner-post\" data-id=\"2a138b47\" data-element_type=\"widget\" data-widget_type=\"fp_banner-post.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"s-banner-post o-margin__top--standard  o-margin__bottom--standard  m-gradient-light\" >\n    <div class=\"s-banner-post__background\">\n                    <img fetchpriority=\"high\" decoding=\"async\" width=\"1156\" height=\"603\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/bg_banner_single_post.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/bg_banner_single_post.png 1156w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/bg_banner_single_post-300x156.png 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/bg_banner_single_post-1024x534.png 1024w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/bg_banner_single_post-768x401.png 768w\" sizes=\"(max-width: 1156px) 100vw, 1156px\" \/>            <\/div>\n    <div class=\"o-container\">\n        <div class=\"row\">\n            <div\n                class=\"s-banner-post__categories col-small-24 col-tablet-22 col-medium-14 col-big-15 col-laptop-14 col-fullhd-13 col-qhd-15\"\n            >\n                                    <a\n                        href=\"https:\/\/www.future-processing.com\/blog\/?category=security\"\n                        class=\"s-banner-post__categories-button o-button o-button--secondary o-button--rounded o-button--s\"\n                    >\n                        Security                    <\/a>\n                            <\/div>\n            <div\n                class=\"s-banner-post__content col-small-24 col-tablet-22 col-medium-14 col-big-15 col-laptop-14 col-fullhd-13 col-qhd-15\"\n            >\n                <h1 class=\"f-headline-semi-huge f-line\">\n                    Cyber resilience in media: from strategy to execution                <\/h1>\n                <div class=\"s-banner-post__description f-headline-extra-big\">\n                    As cyber threats intensify, cyber resilience is now a board-level concern for UK media organisations. For broadcasters, publishers, and streaming platforms operating under constant public scrutiny, preparedness is critical. Here\u2019s what cyber resilience means in the UK media context and how to achieve it.                <\/div>\n                <div class=\"s-banner-post__details\">\n                    <div class=\"s-banner-post__date f-paragraph\">\n                        <svg class='o-icon o-icon--16 o-icon--calendar '>\n            <use xlink:href='#icon-16_calendar'><\/use>\n          <\/svg>                        <b>Last update date: <\/b>\n                        04 March 2026                    <\/div>\n                                        \n<div class=\"o-social-media  f-paragraph\">\n    <b>Share on: <\/b>\n            <a href=\"http:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.future-processing.com%2Fblog%2Fcyber-resilience-media-strategy-execution%2F\" aria-label=\"Share on Facebook\" target=\"_blank\" rel=\"noopener noreferrer\" data-elementclick=\"social-media-link\" data-elementname=\"Facebook\">\n            <svg class='o-icon o-icon--16 o-icon--facebook '>\n            <use xlink:href='#icon-16_facebook'><\/use>\n          <\/svg>        <\/a>\n            <a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.future-processing.com%2Fblog%2Fcyber-resilience-media-strategy-execution%2F\" aria-label=\"Share on Twitter\" target=\"_blank\" rel=\"noopener noreferrer\" data-elementclick=\"social-media-link\" data-elementname=\"Twitter\">\n            <svg class='o-icon o-icon--16 o-icon--x '>\n            <use xlink:href='#icon-16_x'><\/use>\n          <\/svg>        <\/a>\n            <a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https%3A%2F%2Fwww.future-processing.com%2Fblog%2Fcyber-resilience-media-strategy-execution%2F\" aria-label=\"Share on LinkedIn\" target=\"_blank\" rel=\"noopener noreferrer\" data-elementclick=\"social-media-link\" data-elementname=\"LinkedIn\">\n            <svg class='o-icon o-icon--16 o-icon--linkedin2 '>\n            <use xlink:href='#icon-16_linkedin-2'><\/use>\n          <\/svg>        <\/a>\n    <\/div>\n                <\/div>\n            <\/div>\n            <div\n                class=\"s-banner-post__authors-wrapper col-small-24 col-tablet-22 off-medium-1 col-medium-8 off-big-2 col-big-7 off-laptop-4 col-laptop-6 off-fullhd-5 off-qhd-2 col-qhd-7\"\n            >\n                <div class=\"o-pill o-pill--brand o-pill--circle\"><\/div>\n                <h2 class=\"s-banner-post__authors-header f-headline-semi-large f-line\">\n                    <strong>Written by:<\/strong>\n                <\/h2>\n                <div class=\"s-banner-post__authors\">\n                                                                    <div class=\"s-banner-post__author\">\n                            \n<div class=\"o-person-linkedin o-pill o-pill--image  o-person-linkedin--no-shadow o-person-linkedin--has-link\">\n            <img decoding=\"async\" width=\"240\" height=\"480\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2026\/03\/adabrowski_blog_240_480.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2026\/03\/adabrowski_blog_240_480.jpg 240w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2026\/03\/adabrowski_blog_240_480-150x300.jpg 150w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/>                <a class=\"o-person-linkedin__linkedin\" href=\"https:\/\/www.linkedin.com\/in\/art-dabrowski\/\" target=\"_blank\" aria-label=\"LinkedIn\" data-elementclick=\"person-linkedin-url\" rel=\"noopener\">\n            <svg class='o-icon o-icon--16 o-icon--linkedin '>\n            <use xlink:href='#icon-16_linkedin'><\/use>\n          <\/svg>        <\/a>\n    <\/div>\n                            <p class=\"f-paragraph s-banner-post__author-name\">\n                                Artur D\u0105browski                            <\/p>\n                                                            <p class=\"f-paragraph s-banner-post__author-position\">\n                                    Security Consultant                                <\/p>\n                                                                                        <a href=\"https:\/\/www.future-processing.com\/blog\/author\/adabrowski\/\" class=\"o-button o-button--tertiary o-button--arrow o-button--icon-right o-button--m\">\n                                    More from this author                                    <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                                    <svg class='o-icon o-icon--24 o-icon--arrow '>\n            <use xlink:href='#icon-24_arrow'><\/use>\n          <\/svg>                                <\/a>\n                                                    <\/div>\n                                                                    <div class=\"s-banner-post__author\">\n                            \n<div class=\"o-person-linkedin o-pill o-pill--image  o-person-linkedin--no-shadow o-person-linkedin--has-link\">\n            <img decoding=\"async\" width=\"240\" height=\"480\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/amleczko_blog_240_480.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/amleczko_blog_240_480.jpg 240w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/amleczko_blog_240_480-150x300.jpg 150w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/>                <a class=\"o-person-linkedin__linkedin\" href=\"https:\/\/www.linkedin.com\/in\/anna-mleczko\/\" target=\"_blank\" aria-label=\"LinkedIn\" data-elementclick=\"person-linkedin-url\" rel=\"noopener\">\n            <svg class='o-icon o-icon--16 o-icon--linkedin '>\n            <use xlink:href='#icon-16_linkedin'><\/use>\n          <\/svg>        <\/a>\n    <\/div>\n                            <p class=\"f-paragraph s-banner-post__author-name\">\n                                Anna Mleczko                            <\/p>\n                                                            <p class=\"f-paragraph s-banner-post__author-position\">\n                                    Head of Media and Advertising Practice                                <\/p>\n                                                                                        <a href=\"https:\/\/www.future-processing.com\/blog\/author\/amleczko\/\" class=\"o-button o-button--tertiary o-button--arrow o-button--icon-right o-button--m\">\n                                    More from this author                                    <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                                    <svg class='o-icon o-icon--24 o-icon--arrow '>\n            <use xlink:href='#icon-24_arrow'><\/use>\n          <\/svg>                                <\/a>\n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a7eac6a e-flex e-con-boxed e-con e-child\" data-id=\"1a7eac6a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-28029f3 e-con-full e-flex e-con e-child\" data-id=\"28029f3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b006b9b elementor-widget elementor-widget-table-of-contents\" data-id=\"b006b9b\" data-element_type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;],&quot;exclude_headings_by_selector&quot;:&quot;.toc-ignore&quot;,&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h2 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of contents\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__b006b9b\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-119e25e8 elementor-widget elementor-widget-fp_social-media\" data-id=\"119e25e8\" data-element_type=\"widget\" data-widget_type=\"fp_social-media.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"o-social-media o-social-media--border f-paragraph\">\n    <b>Share on: <\/b>\n            <a href=\"http:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.future-processing.com%2Fblog%2Fcyber-resilience-media-strategy-execution%2F\" aria-label=\"Share on Facebook\" target=\"_blank\" rel=\"noopener noreferrer\" data-elementclick=\"social-media-link\" data-elementname=\"Facebook\">\n            <svg class='o-icon o-icon--16 o-icon--facebook '>\n            <use xlink:href='#icon-16_facebook'><\/use>\n          <\/svg>        <\/a>\n            <a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.future-processing.com%2Fblog%2Fcyber-resilience-media-strategy-execution%2F\" aria-label=\"Share on Twitter\" target=\"_blank\" rel=\"noopener noreferrer\" data-elementclick=\"social-media-link\" data-elementname=\"Twitter\">\n            <svg class='o-icon o-icon--16 o-icon--x '>\n            <use xlink:href='#icon-16_x'><\/use>\n          <\/svg>        <\/a>\n            <a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https%3A%2F%2Fwww.future-processing.com%2Fblog%2Fcyber-resilience-media-strategy-execution%2F\" aria-label=\"Share on LinkedIn\" target=\"_blank\" rel=\"noopener noreferrer\" data-elementclick=\"social-media-link\" data-elementname=\"LinkedIn\">\n            <svg class='o-icon o-icon--16 o-icon--linkedin2 '>\n            <use xlink:href='#icon-16_linkedin-2'><\/use>\n          <\/svg>        <\/a>\n    <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4dec7213 e-con-full js-post-content s-post-content e-flex e-con e-child\" data-id=\"4dec7213\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45275c4 elementor-widget elementor-widget-fp_text_box\" data-id=\"45275c4\" data-element_type=\"widget\" data-widget_type=\"fp_text_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"o-text-box m-gradient-light o-text-box--shadow\">\n                    <div class=\"f-paragraph o-text-box__text\"><p>A <strong>single ransomware attack on a major US TV network caused $74 million<\/strong> in total damage. Even after the cyber insurance payout, the company was left with $24 million in losses it couldn\u2019t recover.<\/p><p><strong>Would your organisation be able to absorb a hit like that?<\/strong><\/p><\/div>\n    <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19fb4674 elementor-widget elementor-widget-heading\" data-id=\"19fb4674\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Cyber resilience: what it is and why it matters<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff9bd59 elementor-widget elementor-widget-image\" data-id=\"ff9bd59\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"182\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/08\/cyber_resilience_definition.jpg\" class=\"attachment-large size-large wp-image-26222\" alt=\"cyber resilience definition future processing\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/08\/cyber_resilience_definition.jpg 960w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/08\/cyber_resilience_definition-300x68.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/08\/cyber_resilience_definition-768x174.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f37e6b6 elementor-widget elementor-widget-text-editor\" data-id=\"f37e6b6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cyber resilience\u00a0encompasses a<strong> set of proactive cybersecurity strategies, practices, and technologies <\/strong>aimed at<strong> minimising the impact of adverse cyber events and ensuring business continuity <\/strong>in the face of disruptions.<\/p><p>Today, security incidents are a major concern for organisations of all sizes and across all industries. This is true for the media sector as well.<\/p><p>These<strong> threats come in various forms<\/strong>, such as data breaches, ransomware attacks, network outages, or even natural disasters that affect digital infrastructure. The <strong>consequences<\/strong> of these incidents can be severe, leading to financial losses, reputational damage, legal liabilities, and compromised customer data.<\/p><p>In the media sector, the risk landscape goes further. Content platforms themselves are targets. Attackers may <strong>attempt to publish false news, manipulate headlines or alter content<\/strong> on homepages and social channels. A fabricated story appearing on the front page of a major broadcaster would not only trigger an immediate PR crisis, but could also be used as a powerful tool for political or market manipulation.<\/p><p>There is also the issue of <strong>protecting sensitive information<\/strong> related to sources, investigative journalists, correspondents, and employees operating in high-risk environments. <strong>For media organisations, cyber resilience is therefore closely tied to safeguarding not just systems and revenue, but also editorial integrity and the personal safety of their people<\/strong>.<\/p><p>These are<strong>\u00a0the reasons why<\/strong>\u00a0<strong><a href=\"https:\/\/www.future-processing.com\/services\/cybersecurity\/\">cybersecurity services<\/a> and cyber resilience really matter<\/strong>.\u00a0They ensure business continuity allowing organisations to continue their operations and deliver critical services even in the face of a cyber attack or disruption. They <strong>ensure protection<\/strong> of sensitive data and critical infrastructure, <strong>enhance the organisation\u2019s reputation<\/strong> and trust and help meeting <strong>regulatory requirements<\/strong>. They also give a great advantage when it comes to <strong>cost savings<\/strong> and adaption to changing threat landscape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-839ae3e elementor-widget elementor-widget-heading\" data-id=\"839ae3e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Cyber Resilience Act \u2013 an EU legal framework<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83a6a15 elementor-widget elementor-widget-text-editor\" data-id=\"83a6a15\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Adopted in 2024, <a href=\"https:\/\/www.future-processing.com\/blog\/eu-the-new-cyber-resilience-act\/\">the Cyber Resilience Act (CRA)<\/a> introduces <strong>mandatory cybersecurity requirements for digital products sold within the EU<\/strong>. It sets out clear obligations for manufacturers and software providers to design, develop, and maintain products that are secure by default and by design.<\/p><p>Crucially, the <strong>regulation covers the entire product lifecycle<\/strong>, from initial development and conformity assessment through to vulnerability handling and post-market monitoring, with the aim of improving the overall security and reliability of IT solutions across the European market.<\/p><p>For <strong>UK media organisations, this is particularly relevant when working with EU partners<\/strong>, distributors or technology providers. Digital platforms, content management systems, and broadcast technologies often operate across borders, meaning <strong>security and compliance expectations do not stop at the UK boundary<\/strong>.<\/p><p>Stronger product-level security reduces the risk of IP theft, service disruption and data breaches that could affect editorial credibility, audience trust and commercial relationships with EU-based businesses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e609b84 elementor-widget elementor-widget-fp_cta\" data-id=\"e609b84\" data-element_type=\"widget\" data-widget_type=\"fp_cta.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"o-cta\">\n    <div class=\"o-cta__pill-container\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"260\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/01\/pill-security-1.jpg\" class=\"attachment-full size-full\" alt=\"\" \/>            <\/div>\n    <div class=\"o-cta__text-container\">\n                                    <div class=\"f-paragraph\"><p>Head to a post about <strong>Cyber Resilience Act<\/strong> and learn about its aims, key components, reasons why it is crucial for every software development company to plan the actions regarding CRA, and more.<\/p><\/div>\n                                    <div class=\"o-cta__buttons-container\">\n                                    <a class=\"o-button o-button--primary o-button--xs o-button--arrow o-button--icon-right\" href=\"http:\/\/future-processing.com\/blog\/eu-the-new-cyber-resilience-act\/?utm_source=blogbanner\" target=\"_self\">\n                        <span>Read more about CRA<\/span>\n                        <svg class='o-icon o-icon--10 o-icon--arrow '>\n            <use xlink:href='#icon-10_arrow'><\/use>\n          <\/svg>                        <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                    <\/a>\n                                            <\/div>\n            <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-403587b elementor-widget elementor-widget-heading\" data-id=\"403587b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Cyber threats and the key components of a cyber resilience strategy<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b42e9d elementor-widget elementor-widget-text-editor\" data-id=\"8b42e9d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cyber threats<\/strong>\u00a0are\u00a0<strong>malicious activities or attacks that exploit vulnerabilities in computer systems, network or digital infrastructure<\/strong>.\u00a0They can have a wide range of objectives, including unauthorised access to sensitive information, disruption of services and business operations, financial gain, or sabotage.<\/p><p>To counter these threats effectively, media organisations need a <strong>cyber resilience strategy <\/strong>that links technology decisions directly to business impact.<\/p><p>The core components should include:<\/p><h3><strong>Business impact and threat mapping<\/strong><\/h3><p>Resilience starts with understanding what is truly at stake. This means identifying critical assets such as live broadcast systems, content management platforms, and streaming infrastructure, calculating the cost of a single minute of \u201cdead air\u201d, and mapping Single Points of Failure that could trigger disruption.<\/p><h3><strong>Media-grade architecture and segmentation<\/strong><\/h3><p>Network design must prevent lateral movement. A ransomware attack affecting finance or HR systems should not compromise production environments or content delivery networks. Proper segmentation and secure architecture limit blast radius and protect on-air operations.<\/p><h3><strong>Early warning systems<\/strong><\/h3><p>Continuous, targeted monitoring enables rapid detection of anomalies before they escalate into operational crises. A tailored, SOC-lite approach focused on media workflows helps identify unusual activity in real time, reducing the risk of public-facing failures.<\/p><h3><strong>Executive war room and playbooks<\/strong><\/h3><p>When incidents occur, response must be structured. Pre-tested runbooks, clear decision-making paths, and defined communication protocols ensure that both Board and IT teams act quickly and consistently, particularly during high-pressure live scenarios.<\/p><h3><strong>Zero-downtime recovery<\/strong><\/h3><p>Business continuity and disaster recovery plans should guarantee that if primary systems are compromised, secure fallback infrastructure such as immutable backups and redundant environments keeps content flowing to audiences.<\/p><h3><strong>Continuous cyber resilience<\/strong><\/h3><p>Resilience is not a one-off audit. It requires ongoing vulnerability management, patching, third-party risk oversight and adaptation to emerging attack vectors targeting the broadcasting and media sector. Governance and leadership support remain critical to sustaining this long-term approach.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9294860 elementor-widget elementor-widget-heading\" data-id=\"9294860\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>What may happen if you are not cyber resilient enough?<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b93f36 elementor-widget elementor-widget-text-editor\" data-id=\"9b93f36\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In the media sector, a <strong>cyber incident is rarely confined to the IT department<\/strong>. It quickly becomes a public, operational, and financial crisis.<\/p><p>In 2021, a <a href=\"https:\/\/www.cybersecuritydive.com\/news\/sinclair-ransomware-attack-costs-insurance\/619926\/\" rel=\"noopener\">ransomware attack on Sinclair Broadcast Group<\/a> disrupted live transmissions across multiple US stations. News programmes could not air, advertising slots were lost and operations were severely affected. <strong>The incident demonstrated how quickly a technical breach can translate into sustained revenue loss and reputational impact<\/strong>. The attack cost Sinclair $63 million in lost advertising revenue, with a further $11 million spent on mitigation and recovery, resulting in $24 million in net losses beyond its insurance coverage.<\/p><p>That same year, <a href=\"https:\/\/www.bbc.com\/news\/world-australia-56554641\" rel=\"noopener\">Australia\u2019s Channel 9 was forced off air<\/a> following a cyber attack that paralysed its systems. Live news bulletins from Sydney were cancelled, production workflows were interrupted, and broadcasting capability was significantly reduced. <strong>A single breach was enough to halt a national broadcaster\u2019s core operations.<\/strong><\/p><p>The risks extend beyond traditional broadcasters. <a href=\"https:\/\/www.theguardian.com\/media\/2023\/jan\/11\/guardian-confirms-it-was-hit-by-ransomware-attack\" rel=\"noopener\">The Guardian experienced a ransomware attack<\/a> in 2022 that disrupted internal systems and affected staff access to critical tools. Even when publishing continues, the <strong>operational strain, recovery costs and reputational scrutiny are considerable<\/strong>.<\/p><p>Outside media, <strong>incidents at organisations such as Marks &amp; Spencer and Jaguar Land Rover illustrate the broader pattern<\/strong>: cyber attacks lead to operational shutdowns, supply chain disruption and prolonged recovery efforts. For media companies, the equivalent impact may include leaked pre-release content, compromised subscriber data, missed publishing windows, or cancelled live events.<\/p><p>Without cyber resilience, the <strong>consequences are not limited to data loss<\/strong>. They include dead air during prime time, breached editorial systems, public loss of trust and escalating financial damage. In a sector where visibility is high and credibility is core to the business model, the absence of resilience can quickly become front-page news.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7226e4c elementor-widget elementor-widget-heading\" data-id=\"7226e4c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>The benefits of cyber resilience for the media industry<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f092a7 elementor-widget elementor-widget-image\" data-id=\"2f092a7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"713\" height=\"1024\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/08\/The-Benefits-of-Cyber-Resilience-713x1024.jpg\" class=\"attachment-large size-large wp-image-26223\" alt=\"The Benefits of Cyber Resilience Future Processing\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/08\/The-Benefits-of-Cyber-Resilience-713x1024.jpg 713w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/08\/The-Benefits-of-Cyber-Resilience-209x300.jpg 209w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/08\/The-Benefits-of-Cyber-Resilience-768x1102.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/08\/The-Benefits-of-Cyber-Resilience-279x400.jpg 279w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/08\/The-Benefits-of-Cyber-Resilience.jpg 960w\" sizes=\"(max-width: 713px) 100vw, 713px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eaa6aa2 elementor-widget elementor-widget-text-editor\" data-id=\"eaa6aa2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cyber resilience delivers <strong>measurable business value<\/strong>, particularly in sectors where digital assets are core to operations.<\/p><h3><strong>Minimised financial losses linked to attacks<\/strong><\/h3><p>Cyber attacks generate costs that extend well beyond the initial breach. Incident response, forensic investigations, legal advice, regulatory fines, and operational downtime can significantly affect revenue.<\/p><p><strong>A mature cyber resilience approach reduces the scale and duration of disruption, helping organisations limit financial exposure. <\/strong><\/p><p>In the media sector, where outages can interrupt live broadcasts or streaming services, every hour of downtime directly translates into lost advertising revenue and contractual penalties.<\/p><h3><strong>Enhanced business continuity<\/strong><\/h3><p><strong>Cyber resilience enables organisations to maintain essential operations even during an incident<\/strong>. With tested disaster recovery plans and clearly defined escalation paths, critical services can continue while threats are contained.<\/p><p>For media companies, this may mean keeping publishing platforms, broadcast infrastructure, or subscription services operational despite ongoing security challenges.<\/p><h3><strong>Protection of reputation and trust<\/strong><\/h3><p>A cyber attack can severely damage an organisation\u2019s reputation and erode customer confidence. In media, breaches often become headline news themselves, amplifying public scrutiny.<\/p><p><strong>Protecting subscriber data, internal communications, and editorial systems<\/strong> is therefore not only a technical priority but a business imperative tied directly to audience trust and brand credibility.<\/p><h3><strong>Compliance with regulations<\/strong><\/h3><p>An increasing number of industries are subject to strict data protection and <a href=\"https:\/\/www.future-processing.com\/blog\/cybersecurity-in-the-eu-tighter-regulations-are-coming-are-you-ready\/\">cybersecurity regulations<\/a>, including the Cyber Resilience Act and data privacy frameworks.<\/p><p><strong>Implementing a cyber resilience strategy supports compliance by embedding security controls<\/strong> throughout systems and processes. For media organisations operating across borders, this structured approach helps manage regulatory complexity while protecting user data.<\/p><h3><strong>Safeguarding intellectual property<\/strong><\/h3><p>Cyber attacks targeting intellectual property can have serious commercial consequences. In the media sector, stolen scripts, leaked footage, or compromised investigative materials can undermine exclusivity and competitive advantage.<\/p><p><strong>Cyber resilience measures reduce the risk of unauthorised access or manipulation, ensuring that valuable content assets remain protected.<\/strong><\/p><h3><strong>Improved incident response and recovery<\/strong><\/h3><p>Well-defined processes, clear roles and <a href=\"https:\/\/www.future-processing.com\/blog\/cyber-incident-response-plan\/\">regular testing of response plans<\/a> allow organisations to react quickly and effectively to cyber incidents. <strong>Faster containment limits operational disruption and accelerates system restoration. <\/strong><\/p><p>In time-sensitive media environments, this responsiveness can prevent missed publication deadlines or cancelled live events.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-025c38b elementor-widget elementor-widget-image\" data-id=\"025c38b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"681\" height=\"1024\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2026\/03\/Stages-of-an-incident-response-plan-681x1024.jpg\" class=\"attachment-large size-large wp-image-35722\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2026\/03\/Stages-of-an-incident-response-plan-681x1024.jpg 681w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2026\/03\/Stages-of-an-incident-response-plan-199x300.jpg 199w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2026\/03\/Stages-of-an-incident-response-plan-768x1155.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2026\/03\/Stages-of-an-incident-response-plan.jpg 869w\" sizes=\"(max-width: 681px) 100vw, 681px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5803ec8 elementor-widget elementor-widget-text-editor\" data-id=\"5803ec8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3><strong>Proactive risk management system<\/strong><\/h3><p>By identifying and assessing vulnerabilities across systems and supply chains, organisations can <strong>mitigate risks before they are exploited<\/strong>.<\/p><p>This proactive stance is particularly important in media, where content passes through multiple production, post-production and distribution partners, increasing exposure to third-party risks.<\/p><h3><strong>Stronger suppliers\u2019 and customers\u2019 relationships<\/strong><\/h3><p><strong>Organisations that prioritise cybersecurity demonstrate responsibility in handling shared data and digital assets<\/strong>.<\/p><p>In media ecosystems that rely on collaboration between studios, agencies, technology providers and distributors, strong cyber resilience builds trust and supports long-term partnerships.<\/p><h3><strong>Competitive advantage<\/strong><\/h3><p>A strong cyber resilience posture<strong> enhances credibility with customers, partners and investors<\/strong>. In media markets where brand perception and reliability influence subscriber growth and advertising deals, demonstrable security maturity can become a differentiating factor.<\/p><h3><strong>Long-term savings<\/strong><\/h3><p>Although investing in cyber resilience requires upfront resources, it <strong>reduces the likelihood and severity of future incidents<\/strong>.<\/p><p>Avoiding repeated crises, extended downtime and reputational recovery costs leads to more stable financial performance over time, particularly in a sector where visibility and public trust are central to success.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16f4353 elementor-widget elementor-widget-text-editor\" data-id=\"16f4353\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Read more about cybersecurity best practices:<\/p><ul><li><a href=\"https:\/\/www.future-processing.com\/blog\/cybersecurity-best-practices-and-tips\/\">Cybersecurity best practices and tips for your business<\/a><\/li><li><a href=\"https:\/\/www.future-processing.com\/blog\/cybersecurity-audit\/\">Cybersecurity audit: what it is and why you need one?<\/a><\/li><li><a href=\"https:\/\/www.future-processing.com\/blog\/how-to-develop-a-cybersecurity-strategy-in-6-steps\/\">How to develop a cybersecurity strategy in 6 steps?<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-457b719 elementor-widget elementor-widget-heading\" data-id=\"457b719\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Is my organisation cyber resilient?<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98a8781 elementor-widget elementor-widget-text-editor\" data-id=\"98a8781\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>For media organisations, <strong>cyber resilience goes beyond protecting IT systems<\/strong>. It directly affects content delivery, audience trust, and commercial stability.<\/p><p>Use the questions below as a <strong>short self-assessment checklist<\/strong>:<\/p><ul><li>Do we have a <strong>clear inventory<\/strong> of our most critical assets, including editorial systems, content archives, broadcast infrastructure, streaming platforms and subscriber databases?<\/li><li>Can we <strong>quantify the financial and reputational impact<\/strong> of a 24-hour disruption to live broadcasts, publishing platforms or on-demand services?<\/li><li>Do we <strong>regularly test incident response scenarios<\/strong> that reflect media-specific threats, such as content leaks, ransomware during live production or compromise of internal communications?<\/li><li>Are our production and post-production <strong>partners subject to defined cybersecurity requirements<\/strong> and third-party risk assessments?<\/li><li>Do we have a <strong>documented, board-approved cyber resilience strategy<\/strong> aligned with regulatory obligations, including the Cyber Resilience Act where applicable?<\/li><li>Can we <strong>restore critical systems and content repositories<\/strong> within defined RTO and RPO targets, and have these targets been validated through testing?<\/li><\/ul><p>Any \u201cno\u201d or uncertain answer should be treated as a <strong>strategic risk<\/strong>. In the media sector, cyber incidents rarely remain internal issues, but they quickly become public events with operational, financial, and reputational consequences.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7aeb098 elementor-widget elementor-widget-fp_cta\" data-id=\"7aeb098\" data-element_type=\"widget\" data-widget_type=\"fp_cta.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"o-cta\">\n    <div class=\"o-cta__pill-container\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"120\" height=\"260\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/01\/pill-security-1.jpg\" class=\"attachment-full size-full\" alt=\"\" \/>            <\/div>\n    <div class=\"o-cta__text-container\">\n                            <h3 class=\"o-cta__header f-headline-semi-large\"><p><strong>Identify potential risks and vulnerabilities in your systems to protect your organisation from all angles.<\/strong><\/p><\/h3>\n                                            <div class=\"o-cta__buttons-container\">\n                                    <a class=\"o-button o-button--primary o-button--xs o-button--arrow o-button--icon-right\" href=\"https:\/\/www.future-processing.com\/services\/cybersecurity\/?utm_source=blogbanner\" target=\"_self\">\n                        <span>See our offer<\/span>\n                        <svg class='o-icon o-icon--10 o-icon--arrow '>\n            <use xlink:href='#icon-10_arrow'><\/use>\n          <\/svg>                        <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                    <\/a>\n                                                    <a class=\"o-button o-button--secondary o-button--xs o-button--arrow o-button--icon-right\"\n                       href=\"#contact-form\" target=\"_self\">\n                        <span>Let&#039;s work together<\/span>\n                        <svg class='o-icon o-icon--10 o-icon--arrow '>\n            <use xlink:href='#icon-10_arrow'><\/use>\n          <\/svg>                        <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                    <\/a>\n                            <\/div>\n            <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f9cfb7 elementor-widget elementor-widget-heading\" data-id=\"8f9cfb7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>FAQ<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-306426e elementor-widget elementor-widget-n-accordion\" data-id=\"306426e\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5070\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-5070\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Is cyber resilience the same as cybersecurity? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5070\" class=\"elementor-element elementor-element-ddbfd02 e-con-full e-flex e-con e-child\" data-id=\"ddbfd02\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05c79ed elementor-widget elementor-widget-text-editor\" data-id=\"05c79ed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>No. Cybersecurity focuses primarily on prevention and protection. Cyber resilience goes further, covering detection, response, recovery, and the ability to maintain operations, for example keeping broadcasts or publishing platforms running during an incident.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5071\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-5071\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Does the Cyber Resilience Act apply to UK media organisations? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5071\" class=\"elementor-element elementor-element-9f4769a e-con-full e-flex e-con e-child\" data-id=\"9f4769a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13c7a61 elementor-widget elementor-widget-text-editor\" data-id=\"13c7a61\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The Act directly applies to manufacturers, importers and distributors of products with digital elements placed on the EU market. However, UK media organisations that develop in-house tools, customise digital products or rely on EU-based technology providers must ensure their systems and processes align with CRA requirements, particularly around vulnerability management and incident reporting, if they operate or collaborate within the EU market.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5072\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-5072\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How can a media company measure cyber resilience? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5072\" class=\"elementor-element elementor-element-9608466 e-con-full e-flex e-con e-child\" data-id=\"9608466\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ac597b elementor-widget elementor-widget-text-editor\" data-id=\"8ac597b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>By tracking metrics such as mean time to detect (MTTD), mean time to recover (MTTR), validated RTO and RPO targets, frequency of incident simulations, patching timelines, and the resilience of live production and content delivery systems under stress testing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5073\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-5073\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Is cyber resilience only relevant for large broadcasters? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5073\" class=\"elementor-element elementor-element-1ecd5fa e-flex e-con-boxed e-con e-child\" data-id=\"1ecd5fa\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9a0527 elementor-widget elementor-widget-text-editor\" data-id=\"f9a0527\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>No. Smaller publishers, regional stations and digital media platforms are often more exposed due to limited internal resources and complex supplier networks. At the same time, regulatory expectations and audience scrutiny apply across the entire media value chain.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f0e6aaf e-con-full elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile e-flex e-con e-child\" data-id=\"7f0e6aaf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d0b9c3 toc-ignore elementor-widget elementor-widget-fp_sidebar\" data-id=\"1d0b9c3\" data-element_type=\"widget\" data-widget_type=\"fp_sidebar.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"o-sidebar\">\n                            \n    <div class=\"o-sidebar__related-articles\">\n                    <h3 class=\"o-sidebar__title f-headline-semi-large\">Related articles<\/h3>\n                            <div class=\"o-sidebar__items\">\n                                    <div class=\"o-sidebar__item\">\n                                                    <div class=\"o-sidebar__item-photo\">\n                                <img loading=\"lazy\" decoding=\"async\" width=\"1290\" height=\"400\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/03\/NIST-CSF-audit_cover.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/03\/NIST-CSF-audit_cover.jpg 1290w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/03\/NIST-CSF-audit_cover-300x93.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/03\/NIST-CSF-audit_cover-1024x318.jpg 1024w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/03\/NIST-CSF-audit_cover-768x238.jpg 768w\" sizes=\"(max-width: 1290px) 100vw, 1290px\" \/>                            <\/div>\n                                                <div class=\"o-sidebar__item-text\">\n                                                            <div class=\"f-paragraph\">NIST CSF audit: ensuring compliance across borders<\/div>\n                            \n                                                            <a href=\"https:\/\/www.future-processing.com\/blog\/nist-audit-guide-for-businesses\/\" class=\"o-button o-button--tertiary o-button--xs o-button--icon-right o-button--arrow\" data-elementname=\"sidebar\" data-elementtype=\"Read more\">\n                                    Read more                                    <svg class='o-icon o-icon--10 o-icon--arrow '>\n            <use xlink:href='#icon-10_arrow'><\/use>\n          <\/svg>                                    <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                                <\/a>\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"o-sidebar__item\">\n                                                    <div class=\"o-sidebar__item-photo\">\n                                <img loading=\"lazy\" decoding=\"async\" width=\"1290\" height=\"400\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/07\/cover-security-1.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/07\/cover-security-1.jpg 1290w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/07\/cover-security-1-300x93.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/07\/cover-security-1-1024x318.jpg 1024w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/07\/cover-security-1-768x238.jpg 768w\" sizes=\"(max-width: 1290px) 100vw, 1290px\" \/>                            <\/div>\n                                                <div class=\"o-sidebar__item-text\">\n                                                            <div class=\"f-paragraph\">Security by Design: how to build systems that are secure from the start?<\/div>\n                            \n                                                            <a href=\"https:\/\/www.future-processing.com\/blog\/security-by-design\/\" class=\"o-button o-button--tertiary o-button--xs o-button--icon-right o-button--arrow\" data-elementname=\"sidebar\" data-elementtype=\"Read more\">\n                                    Read more                                    <svg class='o-icon o-icon--10 o-icon--arrow '>\n            <use xlink:href='#icon-10_arrow'><\/use>\n          <\/svg>                                    <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                                <\/a>\n                                                    <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n            \n                            <div class=\"o-sidebar__value\">\n                                            <h3 class=\"o-sidebar__title f-headline-semi-large\">Value we delivered<\/h3>\n                                                                                            <div class=\"o-sidebar__value-item\">\n                                                                    <div class=\"o-sidebar__number\">\n                                        <span class=\"o-sidebar__number-content\">\n                                                                                        <div class=\"f-grid-number\">AI agent<\/div>\n                                                                                    <\/span>\n                                                                            <\/div>\n                                                                                                    <div class=\"o-sidebar__text f-paragraph\"><p>Unique AI agent promoting knowledge and answering complex questions about <strong>EU security regulations<\/strong><\/p><\/div>\n                                                                                                    <div class=\"o-sidebar__link\">\n                                        <a href=\"https:\/\/www.future-processing.com\/case-studies\/security-ai-agent\/\" class=\"o-button o-button--tertiary o-button--s o-button--icon-right o-button--arrow\" data-elementname=\"sidebar\" data-elementtype=\"Read the case study\">\n                                            Read the case study                                            <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                                        <\/a>\n                                    <\/div>\n                                                            <\/div>\n                                                            <\/div>\n                    <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f1caf7d e-con-full e-flex e-con e-parent\" data-id=\"4f1caf7d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27e7da9d toc-ignore elementor-widget elementor-widget-fp_post_authors\" data-id=\"27e7da9d\" data-element_type=\"widget\" data-widget_type=\"fp_post_authors.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div\n    class=\"s-post-authors  o-margin__bottom--standard o-margin__top--standard  m-gradient-light\"\n    >\n            <img loading=\"lazy\" decoding=\"async\" width=\"1278\" height=\"871\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/authors_bg.png\" class=\"s-post-authors__background-image\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/authors_bg.png 1278w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/authors_bg-300x204.png 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/authors_bg-1024x698.png 1024w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/authors_bg-768x523.png 768w\" sizes=\"(max-width: 1278px) 100vw, 1278px\" \/>        <div class=\"o-container\">\n                                <h2 class=\"f-headline-semi-large f-line s-post-authors__header\">\n                <p><strong>About the authors:<\/strong><\/p>            <\/h2>\n                            <div class=\"s-post-authors__list\">\n                                            <div class=\"s-post-authors__author\">\n                    <div class=\"o-pill o-pill--circle o-pill--brand\"><\/div>\n                    \n<div class=\"o-person-linkedin o-pill o-pill--image  o-person-linkedin--no-shadow o-person-linkedin--has-link\">\n            <img decoding=\"async\" width=\"240\" height=\"480\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2026\/03\/adabrowski_blog_240_480.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2026\/03\/adabrowski_blog_240_480.jpg 240w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2026\/03\/adabrowski_blog_240_480-150x300.jpg 150w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/>                <a class=\"o-person-linkedin__linkedin\" href=\"https:\/\/www.linkedin.com\/in\/art-dabrowski\/\" target=\"_blank\" aria-label=\"LinkedIn\" data-elementclick=\"person-linkedin-url\" rel=\"noopener\">\n            <svg class='o-icon o-icon--16 o-icon--linkedin '>\n            <use xlink:href='#icon-16_linkedin'><\/use>\n          <\/svg>        <\/a>\n    <\/div>\n                    <div class=\"s-post-authors__background\">\n                        <div class=\"s-post-authors__text\">\n                            <h3 class=\"f-line\">\n                                <span class=\"f-headline-semi-large\"><b>Artur D\u0105browski<\/b><\/span>\n                                                                    <p class=\"s-post-authors__position f-paragraph\">\n                                        Security Consultant                                    <\/p>\n                                                            <\/h3>\n                                                            <div class=\"s-post-authors__description f-paragraph\">\n                                    <p>I help companies move from regulatory requirements to actionable plans. I focus on building security programs that work in practice and drive growth &#8211; not just cover your back. I also help teams translate regulator expectations into operational controls and evidence (so you can prove what you do not just describe it).<\/p>\n<p>Unlike most cybersecurity consultants who focus on either IT, OT or physical security in silos, I take a total security approach. Through proven partnerships at Future Processing, we address the full context: converged IT\/OT environments, supply chain dependencies and physical assets &#8211; all in one cohesive program.<\/p>\n<p>I work with enterprises across the full journey: from maturity assessments and real risk mapping, through policies and procedures (ones people actually follow) to incident management, third-party risk and secure SDLC.<\/p>\n                                <\/div>\n                                                    <\/div>\n                        <div class=\"s-post-authors__buttons\">\n                            <a href=\"https:\/\/www.future-processing.com\/blog\/author\/adabrowski\/\" class=\"o-button o-button--xs o-button--tertiary o-button-arrow o-button--icon-right\">\n                                View more posts by&nbsp;Artur                                <svg class='o-icon o-icon--10 o-icon--arrow '>\n            <use xlink:href='#icon-10_arrow'><\/use>\n          <\/svg>                                <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                            <\/a>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                                            <div class=\"s-post-authors__author\">\n                    <div class=\"o-pill o-pill--circle o-pill--brand\"><\/div>\n                    \n<div class=\"o-person-linkedin o-pill o-pill--image  o-person-linkedin--no-shadow o-person-linkedin--has-link\">\n            <img decoding=\"async\" width=\"240\" height=\"480\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/amleczko_blog_240_480.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/amleczko_blog_240_480.jpg 240w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/10\/amleczko_blog_240_480-150x300.jpg 150w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/>                <a class=\"o-person-linkedin__linkedin\" href=\"https:\/\/www.linkedin.com\/in\/anna-mleczko\/\" target=\"_blank\" aria-label=\"LinkedIn\" data-elementclick=\"person-linkedin-url\" rel=\"noopener\">\n            <svg class='o-icon o-icon--16 o-icon--linkedin '>\n            <use xlink:href='#icon-16_linkedin'><\/use>\n          <\/svg>        <\/a>\n    <\/div>\n                    <div class=\"s-post-authors__background\">\n                        <div class=\"s-post-authors__text\">\n                            <h3 class=\"f-line\">\n                                <span class=\"f-headline-semi-large\"><b>Anna Mleczko<\/b><\/span>\n                                                                    <p class=\"s-post-authors__position f-paragraph\">\n                                        Head of Media and Advertising Practice                                    <\/p>\n                                                            <\/h3>\n                                                            <div class=\"s-post-authors__description f-paragraph\">\n                                    <p>I manage sales initiatives for modern technologies &#8211; AI, data, cybersecurity, product design, and software development &#8211; supporting clients in the media and advertising sector, from large enterprises to smaller firms. My work is focused on the UK market, where I also run a series of dedicated events for C-level executives. I am responsible for acquiring new clients (inbound &amp; outbound), developing proposals, and shaping the sales strategy for the entire sector. My goal is to build relationships that translate directly into business success.<\/p>\n                                <\/div>\n                                                    <\/div>\n                        <div class=\"s-post-authors__buttons\">\n                            <a href=\"https:\/\/www.future-processing.com\/blog\/author\/amleczko\/\" class=\"o-button o-button--xs o-button--tertiary o-button-arrow o-button--icon-right\">\n                                View more posts by&nbsp;Anna                                <svg class='o-icon o-icon--10 o-icon--arrow '>\n            <use xlink:href='#icon-10_arrow'><\/use>\n          <\/svg>                                <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                            <\/a>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                    <\/div>\n    <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49d7be74 toc-ignore elementor-widget elementor-widget-fp_contact_form\" data-id=\"49d7be74\" data-element_type=\"widget\" id=\"contact-form\" data-widget_type=\"fp_contact_form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"s-contact-form js-form  o-margin__top--standard o-margin__bottom--standard s-contact-form--white\"  id=\"contact-form\">\n    <div class=\"o-container\">\n        <div class=\"row\">\n            <div class=\"s-contact-form__intro col-small-24 col-big-8 col-qhd-9\">\n                                    <h2 class=\"f-headline-extra-large f-line s-contact-form--hide-when-sent\">\n                        <p><b>Let&#8217;s talk<\/b><\/p>\n                    <\/h2>\n                                                                    <div class=\"s-contact-form__text f-headline-extra-big s-contact-form--hide-when-sent\">\n                        <p>Contact us and transform your business with our comprehensive services.<\/p>                    <\/div>\n                                                                    <div class=\"s-contact-form__email-wrapper js-copy\">\n                        <a class=\"s-contact-form__email js-copied-element f-headline-extra-big\"\n                           href=\"mailto:contact@future-processing.com\"\n                           data-elementclick=\"contact-email-click\"\n                           data-elementname=\"Email - click\">\n                            contact@future-processing.com                        <\/a>\n                        <button\n    class=\"o-button-copy js-copy-element o-button o-button--tertiary o-button--m\"\n    type=\"button\"\n>\n    <span class=\"o-button-copy__copy\">\n        <svg class='o-icon o-icon--16 o-icon--copy '>\n            <use xlink:href='#icon-16_copy'><\/use>\n          <\/svg>        <svg class='o-icon o-icon--24 o-icon--documents '>\n            <use xlink:href='#icon-24_documents'><\/use>\n          <\/svg>    <\/span>\n    <span class=\"o-button-copy__copied\">\n        <svg class='o-icon o-icon--16 o-icon--checkcircle '>\n            <use xlink:href='#icon-16_check-circle'><\/use>\n          <\/svg>        <svg class='o-icon o-icon--24 o-icon--checkcircle '>\n            <use xlink:href='#icon-24_check-circle'><\/use>\n          <\/svg>    <\/span>\n<\/button>                    <\/div>\n                                <div class=\"col-small-24\">\n                    <div class=\"s-contact-form__contact s-contact-form__contact--no-contacts\">\n                                                    <div\n                                class=\"s-contact-form__photo col-tablet-13 col-medium-11 col-big-24 s-contact-form--hide-when-sent\">\n                                <img loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"523\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/09\/contact_form_photo.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/09\/contact_form_photo.png 720w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/09\/contact_form_photo-300x218.png 300w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/>                            <\/div>\n                                                                    <\/div>\n                <\/div>\n            <\/div>\n            <div class=\"s-contact-form__form col-small-24 off-big-1 col-big-15 off-qhd-2 col-qhd-13\">\n                <div class=\"o-contact-form o-contact-form__checkbox-list s-contact-form--hide-when-sent  o-contact-form__button--bottom-right o-contact-form__checkbox-list--horizontal\">\n                    \n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n    document.addEventListener('DOMContentLoaded', function () {\n        hbspt.forms.create({\n            region: \"na1\",\n            portalId: \"421670\",\n            formId: \"00c65ebb-1f2a-4a78-9640-5a838ca4e4ee\",\n            onFormReady: function () {\n                const placeholder = document.querySelector('.js-elementor-form-placeholder');\n                if (placeholder) {\n                    placeholder.style.display = 'none';\n                }\n            }\n        });\n    });\n<\/script>\n                <\/div>\n                            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21133413 elementor-widget elementor-widget-fp_progress-bar\" data-id=\"21133413\" data-element_type=\"widget\" data-widget_type=\"fp_progress-bar.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"o-progress-bar js-progress-bar\"><\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As cyber threats intensify, cyber resilience is now a board-level concern for UK media organisations. For broadcasters, publishers, and streaming platforms operating under constant public scrutiny, preparedness is critical. Here\u2019s what cyber resilience means in the UK media context and how to achieve it.<\/p>\n","protected":false},"author":276,"featured_media":35718,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2110],"tags":[],"coauthors":[2185,1949],"class_list":["post-35717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":{"reading-time":0,"show-toc-sublists":false,"image":"","logo":"","button1":{"button1_type":"none","button":""},"button2":{"button2_type":"none","button":""},"person":{"person_photo":"","person_name":"","person_position":""}},"_links":{"self":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts\/35717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/users\/276"}],"replies":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/comments?post=35717"}],"version-history":[{"count":11,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts\/35717\/revisions"}],"predecessor-version":[{"id":35894,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts\/35717\/revisions\/35894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/media\/35718"}],"wp:attachment":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/media?parent=35717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/categories?post=35717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/tags?post=35717"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/coauthors?post=35717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}