<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Charline MILOT GABRIEL, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/charline-milot-gabriel/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 27 Jun 2025 11:19:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Charline MILOT GABRIEL, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity Resilience: A Key Pillar to Protect Our Industrial Systems</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-resilience-a-key-pillar-to-protect-our-industrial-systems/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-resilience-a-key-pillar-to-protect-our-industrial-systems/#respond</comments>
		
		<dc:creator><![CDATA[Charline MILOT GABRIEL]]></dc:creator>
		<pubDate>Wed, 25 Jun 2025 07:56:58 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26319</guid>

					<description><![CDATA[<p>Faced with an ever-increasing number of sophisticated cyber threats, the industry has been hard hit, and it is expected to become the 2nd most affected sector by ransomware in 2024. Industrial information systems, the very nerve centres of production, have...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-resilience-a-key-pillar-to-protect-our-industrial-systems/">Cybersecurity Resilience: A Key Pillar to Protect Our Industrial Systems</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span data-contrast="auto">Faced with an ever-increasing number of sophisticated cyber threats, the industry has been hard hit, and it is expected to become the 2nd most affected sector by ransomware in 2024</span><span data-contrast="auto">. Industrial information systems, the very nerve centres of production, have become one of the most attractive and preferred targets for attackers seeking to paralyse or degrade their operation. There is no shortage of examples of business stoppages caused by ransomware: The paralysis of Colonial Pipeline in 2021 in the United States, the shutdown of the DSB rail company in Denmark, which had to stop all its trains in 2022, or the cybersecurity incidents affecting the London transport network in 2024.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Beyond the simple interruption of operations and financial loss, the consequences on the physical integrity of people and the environment are major HSE (Health, Safety and Environment) impacts that imply critical risks to be considered for the industrial sector.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Faced with these growing threats and impacts, manufacturers have, until now, invested in protecting their industrial information systems. Resilience is now being taken into account, and resilience projects are being incorporated into cyber IoT roadmaps. Depending on the sector and industrial entity, investing in effective recovery may be more worthwhile than excessive protection. By combining resilience and protection, businesses can safely resume most of their industrial activities as quickly as possible, reducing damage and financial losses</span></p>
<p><b><span data-contrast="auto">In this context, cyber-resilience is an absolute necessity.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img fetchpriority="high" decoding="async" class="wp-image-26301 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_1.png" alt="" width="674" height="379" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_1.png 837w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_1-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_1-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_1-800x450.png 800w" sizes="(max-width: 674px) 100vw, 674px" /></p>
<p><b><span data-contrast="auto">What are the keys to building this resilience and meeting the challenges of tomorrow? Let&#8217;s find out together.</span></b></p>
<h1>Cyber-resilience challenges for organizations</h1>
<p><span data-contrast="auto">Cyber resilience is now a strategic priority for industry. The stakes go far beyond the simple security of systems:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Ensuring the safety of people and the environment:</span></b><span data-contrast="auto"> In some sectors (hospitals, energy, nuclear, water treatment, etc.), the priority is to secure installations, even at the detriment of production. The human and environmental impact of a cyber-attack can be far more serious than simply stopping production.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Protecting critical installations:</span></b><span data-contrast="auto"> The security of critical production installations must be assessed. An impact on these systems will have major repercussions on the company&#8217;s activity and turnover.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Preserving sensitive data:</span></b><span data-contrast="auto"> Some industrial information is crucial for competitiveness and security. Any leak or alteration can seriously harm the company and, in some cases, national security.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Resuming operations quickly and safely:</span></b><span data-contrast="auto"> Cyber resilience aims to restart operations quickly, while guaranteeing the safety of installations and people.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><span data-contrast="auto">The challenges also extend beyond the organization&#8217;s internal security, with increasing geopolitical and regulatory impacts:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Geopolitical risks:</span></b><span data-contrast="auto"> Cyber-attacks on critical infrastructures, such as those in the energy or water sectors, have significant political and societal consequences.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Regulatory pressure:</span></b><span data-contrast="auto"> Legislation such as the NIS Directive, the LPM and the Cyber Resilience Act impose strict requirements, forcing businesses to continuously strengthen their cybersecurity.</span></li>
</ul>
<h1>What are the main resilience activities? </h1>
<p aria-level="2"><span data-contrast="auto">The main activities of cyber resilience are based on three main areas, each of which is essential for guaranteeing the continuity of operations in the face of incidents.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></p>
<ol>
<li><b><span data-contrast="auto">Maintain critical activities in downgraded mode:</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span>
<ul style="list-style-type: disc;">
<li><span data-contrast="auto">Identify critical activities to be restored as a priority</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></li>
<li><span data-contrast="auto">Industrialising operations in degraded mode to enable partial business continuity pending full recovery</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></li>
<li><span data-contrast="auto">Contain the spread of incidents to limit their impact</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></li>
</ul>
</li>
<li><b><span data-contrast="auto">Test its crisis management:</span></b>
<ul style="list-style-type: disc;">
<li><span data-contrast="auto">this includes setting up regular exercises to identify areas for improvement and strengthen the organization&#8217;s resilience against cyber-attacks.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></li>
</ul>
</li>
<li><b><span data-contrast="auto">Industrializing reconstruction: rebuilding and restoring a healthy IS</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span>
<ul style="list-style-type: disc;">
<li><span data-contrast="auto">This is not simply about restoring services, but about checking and reinforcing each component of the system to ensure its long-term security. This phase helps regain stakeholders’ confidence and ensure a robust infrastructure, ready to prevent future threats.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:2160,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;335559991&quot;:360}"> </span></li>
</ul>
</li>
</ol>
<h1>Setting up an Industrial IT Disaster Recovery Plan: the cornerstone of IT recovery </h1>
<p><span data-contrast="auto">The </span><b><span data-contrast="auto">IIRP</span></b><span data-contrast="auto"> (Industrial IT Disaster Recovery Plan) is the key element of the cyber-resilience strategy for industry. This document brings together all the technical, organisational and security procedures needed to rebuild and restart an IoT information system after a disaster or major incident. The IIRP is activated during or after a disaster or crisis. Its role is to ensure the rapid and reliable resumption of industrial activities.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">The IIRP generally contains the following elements:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">Clear responsibility matrix</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Schedule for efficient reconstruction</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Detailed procedures for restoring information systems and IoT IS assets</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Information on appropriate means of communication</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Recommendations on the frequency of tests to validate the resumption of activities</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><span data-contrast="auto">The main objective of the IIRP is to </span><b><span data-contrast="auto">minimize recovery time</span></b><span data-contrast="auto"> while ensuring a </span><b><span data-contrast="auto">high level of confidence in its IIS</span></b><span data-contrast="auto">. It also protects sensitive data and helps limit the financial losses associated with business interruptions. By guaranteeing a high level of security, the IIRP minimizes physical, environmental and legislative impacts, while preserving the company&#8217;s image and facilitating the work of operational teams.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p><span data-contrast="auto">The recovery documentation architecture must be adapted to the size and structure of the company. It is essential to correctly choose the reconstruction granularity and the appropriate format for each information system (IS) and industrial entity.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<h2><span data-contrast="none">Example</span></h2>
<p><br /><img decoding="async" class="wp-image-26323 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_4.png" alt="" width="540" height="498" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_4.png 882w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_4-207x191.png 207w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_4-42x39.png 42w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_4-768x709.png 768w" sizes="(max-width: 540px) 100vw, 540px" /></p>
<ul>
<li><b><span data-contrast="auto">IIRP Group (Group Industrial IT Recovery Plan):</span></b><span data-contrast="auto"> Main document defining the principles, responsibilities and processes for business resumption at the group level. It refers to the specific IIRP for each site.</span> <i style="font-size: revert; color: initial;"><span data-contrast="auto">Review: Every 5 years or in the event of a major change.</span></i><span style="font-size: revert; color: initial;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559740&quot;:259}"> </span></li>
<li><b><span data-contrast="auto">IIRP Site (Site Industrial IT Recovery Plan): </span></b><span data-contrast="auto">Document detailing the recovery principles and responsibilities for a specific site. It also defines the recovery order of systems in the event of an incident affecting multiple IS and refers to the IIS reconstruction sheets.</span> <i style="font-size: revert; color: initial;"><span data-contrast="auto">Review: every 5 years or in the event of a major change.</span></i><span style="font-size: revert; color: initial;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559740&quot;:259}"> </span></li>
<li><b><span data-contrast="auto">Plant/IIS rebuild sheets: </span></b><span data-contrast="auto">Operational documents detailing the scheduling and actions required for the recovery of each IIS, including architecture diagrams and asset inventories.</span> <i style="font-size: revert; color: initial;"><span data-contrast="auto">Review: annually or when there are changes to the IIS.</span></i><span style="font-size: revert; color: initial;" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720}"> </span></li>
</ul>
<h1>The keys to a successful takeover: the importance of properly framing your takeover project </h1>
<p><span data-ccp-props="{}"> <img decoding="async" class="size-full wp-image-26297 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_2.png" alt="" width="1651" height="736" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_2.png 1651w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_2-428x191.png 428w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_2-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_2-768x342.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_2-1536x685.png 1536w" sizes="(max-width: 1651px) 100vw, 1651px" /></span></p>
<h1>Focus | Defining the use of files upstream for optimum recovery</h1>
<p><span data-contrast="auto">Before going on to write and implement the IIS reconstruction sheets, it is important to take several aspects into account in order to facilitate their drafting and ensure that they reflect the reality and requirements of the business.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-26326 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_5.png" alt="" width="1513" height="736" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_5.png 1513w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_5-393x191.png 393w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_5-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/cyber_resilience_vo_5-768x374.png 768w" sizes="auto, (max-width: 1513px) 100vw, 1513px" /></p>
<h1>The essential prerequisites for writing an industrial IT recovery plan: why well-structured IIS documentation is crucial </h1>
<p><span data-contrast="auto">It is necessary to formalise the essential documentary prerequisites for guaranteeing the effective recovery of the industrial IT system (IIS), focusing on the following key elements:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Mastery of IIS:</span></b><span data-contrast="auto"> In-depth knowledge of IIS is essential. This includes a clear view of the systems, a detailed inventory of assets, as well as mapping and architecture diagrams (logical and physical). It is also crucial to identify the IIS referents who hold the key knowledge of these systems and to ensure that their information is regularly updated.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Backup plan:</span></b><span data-contrast="auto"> A comprehensive backup plan, including data critical to the plant&#8217;s smooth operation, is essential to ensure a rapid and complete resumption of activity. This includes elements such as the backup of PLC programs and configurations, administrative PCs, SCADA systems and historians.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Business knowledge:</span></b><span data-contrast="auto"> The presence of a Business Continuity Plan (BCP) or business correspondent is a major asset in defining effective scheduling. It ensures that the recovery plan is not only applicable, but also operational and in line with the specific needs of the business.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><span data-contrast="auto">These three fundamental elements are essential if we are to initiate an effective IT recovery process that is aligned with the real needs of the business. The project cannot get off the ground without them, and without adequate funding for the site.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1>Further information | Recovery: A major stage in IIS compliance </h1>
<p><span data-contrast="auto">The business recovery project provides an in-depth inventory of the IIS, which serves as the basis for drawing up a pragmatic action plan to bring it into compliance. This process includes identifying obsolescence in the industrial estate, missing backups and other points of weakness. Thanks to the recovery tests, numerous recommendations and improvements can be put in place to strengthen the security of the IIS and make it more resilient in the face of crises.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">The resulting action plan highlights several key points (not exhaustive):</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Obsolescence management:</span></b><span data-contrast="auto"> The obsolescence of IT infrastructures must be taken into account in the disaster recovery strategy. Aging equipment can seriously compromise the effectiveness of recovery plans.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Unmaintained software on obsolete PCs:</span></b><span data-contrast="auto"> The use of monitoring software not maintained by the publisher, installed on obsolete PCs (hardware and operating system), and difficult to replace, presents a major risk. In the event of a crisis, this could prevent the plant from operating properly due to a lack of supervision.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Lack of back-up for critical data:</span></b><span data-contrast="auto"> The absence of back-up for a key server, essential for the resumption of activity at several sites, jeopardises the continuity of the entity&#8217;s operations.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Lack of documentation and failure to comply with contracts:</span></b><span data-contrast="auto"> The lack of documentation on certain equipment (configurations, installation procedures) and the absence of architecture diagrams for certain IS show a failure to comply with contractual requirements. These shortcomings will complicate the reconstruction of the IS in the event of a crisis.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><b><span data-contrast="auto">In conclusion</span></b><span data-contrast="auto">, the success of an industrial disaster recovery project depends on rigorous preparation, including defining the </span><b><span data-contrast="auto">sizing</span></b><span data-contrast="auto"> and </span><b><span data-contrast="auto">requirements of the plants</span></b><span data-contrast="auto">, drawing up a </span><b><span data-contrast="auto">roadmap</span></b><span data-contrast="auto"> prioritising </span><b><span data-contrast="auto">critical activities</span></b><span data-contrast="auto">, and setting up a </span><b><span data-contrast="auto">project team</span></b><span data-contrast="auto"> with the </span><b><span data-contrast="auto">necessary dedicated resources</span></b><span data-contrast="auto">. These steps ensure a smooth recovery, on time and on budget, while strengthening resilience in the face of cyber risks.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-resilience-a-key-pillar-to-protect-our-industrial-systems/">Cybersecurity Resilience: A Key Pillar to Protect Our Industrial Systems</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-resilience-a-key-pillar-to-protect-our-industrial-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
