<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Florian Pouchet, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/florian-pouchet/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/florian-pouchet/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 27 Nov 2024 08:30:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Florian Pouchet, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/florian-pouchet/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Practical use of MITRE ATLAS framework for CISO teams</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/11/practical-use-of-mitre-atlas-framework-for-ciso-teams/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/11/practical-use-of-mitre-atlas-framework-for-ciso-teams/#respond</comments>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Wed, 27 Nov 2024 08:30:58 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[atlas]]></category>
		<category><![CDATA[ATT&CK]]></category>
		<category><![CDATA[LLM]]></category>
		<category><![CDATA[mitre]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24703</guid>

					<description><![CDATA[<p>Since the boom of Large Language Models (LLMs) and surge of AI use cases in organisations, understanding how to protect your AI systems and applications is key to maintaining the security of your ecosystem and optimising the use for the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/11/practical-use-of-mitre-atlas-framework-for-ciso-teams/">Practical use of MITRE ATLAS framework for CISO teams</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Since the boom of Large Language Models (LLMs) and surge of AI use cases in organisations, understanding how to protect your AI systems and applications is key to maintaining the security of your ecosystem and optimising the use for the business. MITRE, the organisation famous for the ATT&amp;CK framework, a taxonomy for adversarial actions widely used by the Security Operations Centre (SOC) and threat intelligence teams, has released a framework called MITRE ATLAS. The MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) is a knowledge base of adversary tactics and techniques against AI-enabled systems. It can be used as a tool to categorise attacks or threats and provides a system to consistently assess threats.</p>
<p style="text-align: justify;">However, the AI threat landscape is complex, and it’s not always clear what specific teams need to do to protect an AI system. The MITRE ATLAS framework has 56 techniques available to adversaries, with mitigation being made more complex due to need to apply controls across the kill chain. Teams will require controls or mitigating measures to implement against multiple phases from reconnaissance to exfiltration and impact assessment.</p>
<p> </p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-24692" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-1.png" alt="" width="1035" height="95" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-1.png 1035w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-1-437x40.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-1-71x7.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-1-768x70.png 768w" sizes="(max-width: 1035px) 100vw, 1035px" /></p>
<p style="text-align: center;"><em>Fig 1. MITRE ATLAS Kill Chain.</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">This complexity has led many of our clients to ask, ‘I’m the head of Identity and Access Management what do I need to know, and more importantly what do I need to do above and beyond what I’m currently doing?’.</p>
<p style="text-align: justify;">We’ve broken down MITRE ATLAS to understand what types of controls different teams need to consider mitigating against each technique. This allows us to assess whether existing controls are sufficient and whether new controls need to be developed and implemented to secure AI systems or applications. We estimate that to assess the threat’s posed against AI systems, mitigating controls consist of 70% existing controls, and 30% new controls.</p>
<p style="text-align: justify;">To help articulate, we’ve broken it down into three categories:</p>
<ul style="text-align: justify;">
<li><strong>Green domains:</strong> existing controls will cover some threats posed by AI. There may be some nuance, but the principle of the control is the same and no material adjustments need to be made.</li>
<li><strong>Yellow domains:</strong> controls will require some adaptation to confidently cover the threat posed by AI.</li>
<li><strong>Red domains:</strong> completely new controls need to be developed and implemented.</li>
</ul>
<p style="text-align: justify;"> </p>
<p><img decoding="async" class="aligncenter size-full wp-image-24694" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-2.png" alt="" width="774" height="226" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-2.png 774w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-2-437x128.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-2-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-2-768x224.png 768w" sizes="(max-width: 774px) 100vw, 774px" /></p>
<p style="text-align: center;"><em>Fig 2. RAG analysis of mitigating controls for MITRE ATLAS techniques.</em></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Green domains</strong></h3>
<p style="text-align: justify;">Green domains are those for which existing controls will cover the risk. Three domains fall into this category: <strong>Identity &amp; Access Management</strong>, <strong>Network Security</strong>, and <strong>Physical Security</strong>.</p>
<p>For <strong>IAM</strong> teams, the core principle remains ensuring the right people have access to the right things. For an AI application there is a slight nuance, as we need to consider the application itself (i.e., who can use it, who can access the source code and environment), the data used to train the model, and the input data that is used to create the output.</p>
<p><strong>Network Detection and Response</strong> flags unusual activity on the network, for example the location of the request or exfiltration of large amounts of data. The <strong>network security</strong> team needs to remain vigilant and raise alerts for the same type of activity for an AI application, although it may indicate a different type of attack. Many requests to a traditional application may be indicative of a brute force attack, whereas for an AI application, it could be cost harvesting, a technique where attackers send useless queries to increase the cost of running the application, it can be mitigated through limiting the number of model queries. It is important to note that detection on the application level, and for forensics on an AI system it more complicated than a traditional application, however at the network level, the process remains the same. As with traditional applications, APIs that are integrated with the model need to be secured to ensure network interactions with public applications are secure.</p>
<p><strong>Physical Security</strong> controls remain the same; secure who has physical access to key infrastructure.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Yellow domains</strong></h3>
<p style="text-align: justify;">Controls and mitigating measures that fall into the yellow domains will follow the same principles as for traditional software but will need to be adapted to secure against the threat posed by AI. The teams that fall into this category are <strong>Education &amp; Awareness</strong>, <strong>Resilience</strong>, and <strong>Security Operations Centre</strong> &amp; <strong>Threat Intelligence</strong>.</p>
<p>For <strong>awareness</strong> teams, the techniques will remain the same, awareness campaigns, phishing tests, etc. However, they need to ensure they are updated to sufficiently reflect the new threat. For example, including deepfakes in phishing tests and ensuring new threats are covered in specific training for development teams.</p>
<p>While there are limited changes for the <strong>resilience</strong> team to consider, there will be some adjustments to existing processes. If an IBS is hosted or reliant on an application that utilises AI, then any testing scenarios need to include AI-specific threats.</p>
<p style="text-align: justify;">Impacts from an attack on AI need to be added to any <strong>crisis/ incident management</strong> documentation and communication guidelines updated to reflect the possible outcomes of an AI attack, for example unexpected or offensive outputs from a customer facing Chatbot.</p>
<p>For a <strong>Security Operations Centre</strong> or <strong>threat intelligence</strong> team, the principle behind the controls is the same: gathering intelligence about threats and vulnerabilities and monitoring the systems for unexpected traffic or behaviour, with the addition of AI-specific threats. For AI applications, additional layers and categories of monitoring are needed to monitor for information about the model online and what other information attackers may be able to utilise to leverage access to the model. This is especially pertinent if the model is based on open-source software, for instance ChatGPT.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Red domains</strong></h3>
<p style="text-align: justify;">Controls and techniques that fall into the red domains are totally new controls that need to be introduced to face the new threats of AI. Many sit within the data and application security team’s remit. It’s important to note that we are not referencing the data protection teams, who are largely dealing with the same issues of GDPR etc., but rather the team responsible for the security of the data, which may be the same team. The application security team have many controls within this domain, indicating the importance of building AI-enabled applications according to secure-by-design principles. There are also some AI specific controls that do not fit within existing teams. The team responsible for them is to be determined by the individual organisation, but at our more mature clients we see these owned by an AI Centre of Excellence.</p>
<p><strong>Data security</strong> teams are crucial in ensuring that the training and input datasets have not been poisoned and that the data is free from bias, is trustworthy, and is reliable. These controls may be similar to existing techniques but there are nuances to consider, for instance, poisoning checks will be very similar to data quality checks. Quality data is the foundational component of a secure AI application, so it is key for teams to go beyond standard sanitization or filtering. There are many ways to do this, for example utilising an additional layer of AI to analyse the training or input data for malicious inputs. Alternatively, data tokenisation can have dual benefits: it can reduce the risk of exposing potentially private data during model training or inference and as tokenised data is in its raw form (often ACSII or Unicode characters) it becomes more difficult for attackers to introduce poisoned data into the system. Tokenisation algorithms such as Byte Pair Encoding (BPE) was used by OpenAI when pretraining the GPT model to tokenise large datasets. It is key to remember that we are not just securing the data as an artifact but assessing its content and how it could be utilised with malicious intent to create specific outputs.</p>
<p style="text-align: justify;">Beyond securing the data as an input, data security measures should be implemented throughout the application lifecycle; when designing and building an application, while processing the inputs, and the output of the model.</p>
<p style="text-align: justify;">Where the application is using a continuously learning model, controls around data security need to be implemented continuously while the application is running to ensure the model remains robust. Securing the training and input data provides a secure foundation, but to add an additional layer of security, continuous AI red teaming should be rolled out. This consists of continuously testing a model against adversarial inputs while it’s running. A further layer of security can be implemented by putting parameter guardrails on the type of output the model can produce.</p>
<p>As well as continuously testing to identify vulnerabilities in the model, <strong>application security</strong> teams must ensure the system is built according to secure-by-design principles with specific AI measures put in place. For example, when building an application internally, ensuring security requirements are applied to all components. This includes traditional software components such as the host infrastructure and AI-specific components including model configuration, training data, or, if utilising open-source models, testing the reliability of the code to identify potential security weaknesses, design flaws and alignment with secure coding standards<em>. </em><strong>Application security</strong> teams need to ensure no backdoors can be built into the model. For instance, systems can be modified to enable attackers to get a predetermined output from a model using a specific trigger.</p>
<p style="text-align: justify;">There are some <strong>application security</strong> controls that will remain the same but with an AI twist; monitoring for public vulnerabilities on software as usual, and on the model, if it’s open source.</p>
<p style="text-align: justify;">Training for developers must continue, and the message will remain the same with some adjustments – as with traditional software, where you do not publish the version of the software that you are running, you shouldn’t publish the model or input parameters you’re using. Developers should follow the existing <em>and</em> <em>updated</em> security guidelines, understand the new threats, and build accordingly.</p>
<p><strong>AI </strong>applications bring their own <strong>inherent risks</strong> that need specific controls. These need to be implemented across the lifecycle of the application to ensure it remains secure throughout. These are new controls that do not sit within an existing team. At our more mature clients, we see them managed by an AI Centre of Excellence, however for some they are the responsibility of the security team but executed by data scientists.</p>
<p>Specific controls need to be used in the build of the model, to ensure the model design is appropriate, the source code is secure, the learning techniques used are secure and free from bias, and there are parameters around the input and output of the model. For example, techniques such as bagging can be used to improve the resiliency of the model. This involves splitting the model into several independent sub-models during the learning phase, with the main model choosing the most frequent predictions from the sub-models. If a sub-model is poisoned, the other sub-models will compensate. Utilising techniques such as Trigger Reconstruction during the build phase can also help protect against data poisoning attacks. Trigger Reconstruction identifies events in a data stream, like looking for a needle in a haystack. For predictive models, it detects backdoors by analysing the results of a model, its architecture, and its training data. The most advanced triggers detect, understand, and mitigate backdoors by identifying a potential pain point in a deep neural network, analysing the data path to detect unusual prediction triggers (systematically erroneous results, overly rapid decision times, etc), assess back door activation by studying the behaviour of suspect data, and respond to the backdoor (filtering of problematic neurons, etc), effectively ‘closing’ it.</p>
<p> </p>
<p><img decoding="async" class="aligncenter size-full wp-image-24696" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-3.png" alt="" width="752" height="286" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-3.png 752w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-3-437x166.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/11/MITRE-Figure-3-71x27.png 71w" sizes="(max-width: 752px) 100vw, 752px" /></p>
<p style="text-align: center;"><em>Fig 3. Bagging, a build technique for improving the reliability and accuracy of a model.</em></p>
<p style="text-align: justify;"> </p>
<p>While running, it is key to ensure that the data being fed into the model is secure and not poisoned. This can be achieved through adding an additional layer of AI that has been trained to detect malicious data to filter and supervise of all the data inputs and detect if there is an adversarial attack.</p>
<p>Teams need oversight about how the model fits into the wider AI security ecosystem during the build, run, and test phases. Understanding the availability of information about the model, any new vulnerabilities, and new specific AI threats will allow them to sufficiently patch the model and conduct the appropriate tests. Especially if the model is a continuous learning model, and designed to adapt to new inputs, it needs to be tested regularly. This can be achieved in many ways, including a meta-vulnerability scan of the model, where the model’s behaviour can be modelled by formal specifications and analysed on the bases of previously identified compromise scenarios. Further adversarial learning techniques (or equivalent) should be used to ensure the continued reliability of the models.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Conclusion</strong></h3>
<p style="text-align: justify;">We have demonstrated that despite the new threats that AI poses, existing security measures continue to provide the foundation of a secure ecosystem. Across the whole CISO function, we see a balance between existing controls that will protect AI applications in the same way they protect traditional software and the domains that need to adapt or add to what they are currently doing to protect against new threats.</p>
<p style="text-align: justify;">From our analysis, we can conclude that to fully secure your wider ecosystem, including AI applications, your controls will be 70% existing ones, and 30% new.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/11/practical-use-of-mitre-atlas-framework-for-ciso-teams/">Practical use of MITRE ATLAS framework for CISO teams</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/11/practical-use-of-mitre-atlas-framework-for-ciso-teams/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI: Discover the 5 most frequent questions asked by our clients!</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/#respond</comments>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Wed, 08 Nov 2023 11:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[chatgpt]]></category>
		<category><![CDATA[Regulations]]></category>
		<category><![CDATA[risks]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=21818</guid>

					<description><![CDATA[<p>The dawn of generative Artificial Intelligence (GenAI) in the corporate sphere signals a turning point in the digital narrative. It is exemplified by pioneering tools like OpenAI’s ChatGPT (which found its way into Bing as “Bing Chat, leveraging the GPT-4...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/">AI: Discover the 5 most frequent questions asked by our clients!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The dawn of generative Artificial Intelligence (GenAI) in the corporate sphere signals a turning point in the digital narrative. It is exemplified by pioneering tools like OpenAI’s ChatGPT (which found its way into Bing as “Bing Chat, leveraging the GPT-4 language model) and Microsoft 365’s Copilot. These technologies have graduated from being mere experimental subjects or media fodder. Today, they lie at the heart of businesses, redefining workflows and outlining the future trajectory of entire industries.</p>
<p style="text-align: justify;">While there have been significant advancements, there are also challenges. For instance, Samsung’s sensitive data was exposed on ChatGPT by employees (the entire source code of a database download program)<a href="#_ftn1" name="_ftnref1">[1]</a>. Compounding these challenges, ChatGPT [OpenAI] itself underwent a security breach that affected over 100 000 users between June 2022 and May 2023, with those compromised credentials now being traded on the Dark web<a href="#_ftn2" name="_ftnref2">[2]</a>.</p>
<p style="text-align: justify;">At this digital crossroad, it’s no wonder that there’s both enthusiasm and caution about embracing the potential of generative AI. Given these complexities, it’s understandable why many grapple with determining the optimal approach to AI. With that in mind, the article aims to address the most representative questions asked by our clients.</p>
<h2 style="text-align: justify;"><span style="color: #732196;">Question 1: Is Generative AI just a buzz?</span></h2>
<p style="text-align: justify;">AI is a collection of theories and techniques implemented with the aim of creating machines capable of simulating the cognitive functions of human intelligence (vision, writing, moving&#8230;). A particularly captivating subfield of AI is “Generative AI”. This can be defined as a discipline that employs advanced algorithms, including artificial neural networks, to <strong>autonomously craft content</strong>, whether it’s text, images, or music. Moving on from your basic banking chatbot answering aside all your question, GenAI not only just mimics capabilities in a remarkable way, but in some cases, enhances them.</p>
<p style="text-align: justify;">Our observation on the market: the reach of generative AI is broad and profound. It contributes to diverse areas such as content creation, data analysis, decision-making, customer support and even cybersecurity (for example, by identifying abnormal data patterns to counter threats). We’ve observed 3 fields where GenAI is particularly useful.</p>
<p> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-21820" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1.png" alt="" width="605" height="341" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1-69x39.png 69w" sizes="auto, (max-width: 605px) 100vw, 605px" /></p>
<h3> </h3>
<h3>Marketing and customer experience personalisation</h3>
<p style="text-align: justify;">GenAI offers insights into customer behaviours and preferences. By analysing data patterns, it allows businesses to craft tailored messages and visuals, enhancing engagement, and ensuring personalized interactions.</p>
<h3>No-code solutions and enhanced customer support</h3>
<p style="text-align: justify;">In today’s rapidly changing digital world, the ideas of no-code solutions and improved customer service are increasingly at the forefront. Bouygues Telecom is a good example of a leveraging advanced tools. They are actively analysing voice interactions from recorded conversations between advisors and customers, aiming to improve customer relationships<a href="#_ftn3" name="_ftnref3">[3]</a>. On a similar note, Tesla employs the AI tool “<a href="https://www.youtube.com/watch?v=1mP5e5-dujg">Air AI</a>” for seamless customer interaction, handling sales calls with potential customers, even going so far as to schedule test drives.</p>
<p style="text-align: justify;">As for coding, an interesting experiment from one of our clients stands out. Involving 50 developers, the test found that 25% of the AI-generated code suggestions were accepted, leading to a significant 10% boost in productivity. It is still early to conclude on the actual efficiency of GenAI for coding, but the first results are promising and should be improved. However, the intricate issue of intellectual property rights concerning this AI-generated code continues to be a topic of discussion.</p>
<h3>Documentary watch and research tool</h3>
<p style="text-align: justify;">Using AI as a research tool can help save hours in domains where regulatory and documentary corpus are very extensive (e.g.: financial sector). At Wavestone, we internally developed two AI tools. The first, CISO GPT, allows users to ask specific security questions in their native language. Once a question is asked, the tool scans through extensive security documentation, efficiently extracting and presenting relevant information. The second one, a Library and credential GPT, provides specific CVs from Wavestone employees, as well as references from previous engagements for the writing of commercial proposals.</p>
<p style="text-align: justify;">However, while tools like ChatGPT (which draws data from public databases) are undeniably beneficial, the game-changing potential emerges when companies tap into their proprietary data. For this, companies need to implement GenAI capabilities internally or setup systems that ensure the protection of their data (cloud-based solution like Azure OpenAI or proprietary models). <strong>From our standpoint, GenAI is worth more than just the buzz around it and is here to stay. </strong>There are real business applications and true added value, but also security risks. Your company needs to kick-off the dynamic to be able to implement GenAI projects in a secure way.</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #9727b3;"><span style="color: #732196;">Question 2: What is the market reaction to the use of ChatGPT?</span></span></h2>
<p style="text-align: justify;">To delve deeper into the perspective of those at the forefront of cybersecurity, we’ve asked our client’s CISO’s, their opinions on the implications and opportunities of GenAI. Therefore, the following graph illustrates the opinions of CISOs on this subject.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-21822" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2.png" alt="" width="601" height="279" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2.png 601w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2-411x191.png 411w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2-71x33.png 71w" sizes="auto, (max-width: 601px) 100vw, 601px" /></p>
<p style="text-align: justify;">Based on our survey, the feedback from the CISOs can be grouped into three distinct categories:</p>
<h3>The Pragmatists (65%)</h3>
<p style="text-align: justify;">Most of our respondents recognize the potential data leakage risks with ChatGPT, but they equate them to risk encountered on forums or during exchanges on platforms or forums such as Stack Overflow (for developers). They believe that the risk of data leaks hasn’t significantly changed with ChatGPT. However, the current buzz justifies dedicated sensibilization campaigns to emphasize the importance of not using company-specific or sensitive data.</p>
<h3>The Visionaries (25%)</h3>
<p style="text-align: justify;">A quarter of the respondents view ChatGPT as a ground-breaking tool. They’ve noticed its adoption in departments such as communication and legal. They’ve taken proactive steps to understanding its use (which data, which use cases) and have subsequently established a set of guidelines. This is a more collaborative approach to define a use case framework.</p>
<h3>The Sceptics (10%)</h3>
<p style="text-align: justify;">A segment of the market has reservations about ChatGPT. To them, it’s a tool that’s too easy to misuse, receives excessive media attention and carries inherent risks, according to various business sectors. Depending on your activity, this can be relevant when judging that the risk of data leakage and loss of intellectual property is too high compared to the potential benefits.</p>
<p> </p>
<h2><span style="color: #9727b3;"><span style="color: #732196;">Question 3: What are the risks of Generative AI?</span></span></h2>
<p style="text-align: justify;">In evaluating the diverse perspectives on generative AI within organizations, we’ve classified the concerns into four distinct categories of risks, presented from the least severe to the most critical:</p>
<h3>Content alteration and misrepresentation</h3>
<p style="text-align: justify;">Organizations using generative AI must safeguard the integrity of their integrated systems. When AI is maliciously tampered with, it can distort genuine content, leading to misinformation. This can produce biased outputs, undermining the reliability and effectiveness of AI-driven solutions. Specifically, for Large Language Models (LLMs) like GenAI, there’s a notable concern of prompt injections. To mitigate this, organizations should:</p>
<ol style="text-align: justify;">
<li>Develop a malicious input classification system that assesses the legitimacy of a user’s input, ensuring that only genuine prompts are processed.</li>
<li>Limit the size and change the format of user inputs. By adjusting these parameters, the chances of successful prompt injection are significantly reduced.</li>
</ol>
<h3>Deceptive and manipulative threats</h3>
<p style="text-align: justify;">Even if an organization decides to prohibit the use of generative AI, it must remain vigilant about the potential surge in phishing, scams and deepfake attacks. While one might argue that these threats have been around in the cybersecurity realm for some time, the introduction of generative AI intensifies both their frequency and sophistication.</p>
<p style="text-align: justify;">This potential is vividly illustrated through a range of compelling examples. For instance, Deutsche Telekom released an awareness <a href="https://www.youtube.com/watch?v=F4WZ_k0vUDM">video</a> that demonstrates the ability, by using GenAI, to age a young girl’s image from photos/videos available on social media.</p>
<p style="text-align: justify;">Furthermore, HeyGen is a generative AI software capable of dubbing <a href="https://www.youtube.com/watch?v=gQYm_aia5No">videos</a> into multiple languages while retaining the original voice. It’s now feasible to hear Donald Trump articulating in French or Charles de Gaulle conversing in Portuguese.</p>
<p style="text-align: justify;">These instances highlight the potential for attackers to use these tools to mimic a CEO’s voice, create convincing phishing emails, or produce realistic video deepfakes, intensifying detection and defence challenges.</p>
<p style="text-align: justify;">For more information on the use of GenAI by cybercriminals, consult the dedicated RiskInsight <a href="https://www.riskinsight-wavestone.com/en/2023/10/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried/">article</a>.</p>
<h3>Data confidentiality and privacy concerns</h3>
<p style="text-align: justify;">If organizations choose to allow the use of generative AI, they must consider that the vast data processing capabilities of this technology can pose unintended confidentiality and privacy risks. First, while these models excel in generating content, they might leak sensitive training data or replicate copyrighted content.</p>
<p style="text-align: justify;">Furthermore, concerning data privacy rights, if we examine ChatGPT’s privacy policy, the chatbot can gather information such as account details, identification data extracted from your device or browser, and information entered in the chatbot (that can be used to train the generative AI)<a href="#_ftn4" name="_ftnref4">[4]</a>. According to article 3 (a) of OpenAI’s general terms and conditions, input and output belong to the user. However, since these data are stored and recorded by Open AI, it poses risks related to intellectual property and potential data breaches (as previously noted in the Samsung case). Such risks can have significant reputational and commercial impact on your organization.</p>
<p style="text-align: justify;">Precisely for these reasons, OpenAI developed the ChatGPT Business subscription, which provides enhanced control over organizational data (such as AES-256 encryption for data at rest, TLS 1.2+ for data in transit, SSO SAML authentication, and a dedicated administration console)<a href="#_ftn5" name="_ftnref5">[5]</a>. But in reality, it&#8217;s all about the trust you have in your provider and the respect of contractual commitments. Additionally, there&#8217;s the option to develop or train internal AI models using one&#8217;s own data for a more tailored solution.</p>
<h3>Model vulnerabilities and attacks</h3>
<p style="text-align: justify;">As more organizations use machine learning models, it’s crucial to understand that these models aren’t fool proof. They can face threats that affect their reliability, accuracy or confidentiality, as it will be explained in the following section.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span style="color: #9727b3;"><span style="color: #732196;">Question 4: How can an AI model be attacked?</span></span></h2>
<p style="text-align: justify;">AI introduces added complexities atop existing network and infrastructure vulnerabilities. It’s crucial to note that these complexities are not specific to generative AI, but they are present in various AI models. Understanding these attack models is essential to reinforcing defences and ensuring the secure deployment of AI. There are three main attack models (non-exhaustive list):</p>
<p style="text-align: justify;">For detailed insights on vulnerabilities in Large Language Models and generative AI, refer to the <a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/assets/PDF/OWASP-Top-10-for-LLMs-2023-v05.pdf">“OWASP Top 10 for LLM”</a> by the Open Web Application Security Project (OWASP).</p>
<h3>Evasion attacks</h3>
<p style="text-align: justify;">These attacks target AI by manipulating the inputs of machine learning algorithms to introduce minor disturbances that result in significant alterations to the outputs. Such manipulations can cause the AI model to classify inaccurately or overlook certain inputs. A classic example would be altering signs to deceive AI self-driving cars (have identify a “stop” sign into a “priority” sign). However, evasion attacks can also apply to facial recognition. One might use subtle makeup patterns, strategically placed stickers, special glasses, or specific lighting conditions to confuse the system, leading to misidentification.</p>
<p style="text-align: justify;">Moreover, evasion attacks extend beyond visual manipulation. In voice command systems, attackers can embed malicious commands within regular audio content in such a way that they’re imperceptible to humans but recognizable by voice assistants. For instance, researchers have demonstrated adversarial audio techniques targeting speech recognition systems, like those in voice-activated smart speaker systems such as Amazon’s Alexa. In one scenario, a seemingly ordinary song or commercial could contain a concealed command instructing the voice assistant to make an unauthorized purchase or divulge personal information, all without the user’s awareness<a href="#_ftn6" name="_ftnref6">[6]</a>.</p>
<h3>Poisoning</h3>
<p style="text-align: justify;">Poisoning is a type of attack in which the attacker altered data or model to modify the ML algorithm’s behaviour in a chosen direction (e.g to sabotage its results, to insert a backdoor). It is as if the attacker conditioned the algorithm according to its motivations. Such attacks are also called causative attacks.</p>
<p style="text-align: justify;">In line with this definition, attackers use causative attacks to guide a machine learning algorithm towards their intended outcome. They introduced malicious samples into the training dataset, leading the algorithm to behave in unpredictable ways. A notorious example is Microsoft’s chatbot, TAY, that was unveiled on Twitter in 2016. Designed to emulate and converse with American teenagers, it soon began acting like a far-right activist<a href="#_ftn7" name="_ftnref7">[7]</a>. This highlights the fact that, in their early learning stages, AI systems are susceptible to the data they encounter. 4Chan users intentionally poisoned TAY’s data with their controversial humour and conversations.</p>
<p style="text-align: justify;">However, data poisoning can also be unintentional, stemming from biases inherent in the data sources or the unconscious prejudices of those curating the datasets. This became evident when early facial recognition technology had difficulties identifying darker skin tones. This underscores the need for diverse and unbiased training data to guard against both deliberate and inadvertent data distortions.</p>
<p style="text-align: justify;">Finally, the proliferation of open-source AI algorithms online, such as those on platforms like Hugging Face, presents another risk. Malicious actors could modify and poison these algorithms to favour specific biases, leading unsuspecting developers to inadvertently integrate tainted algorithms into their projects, further perpetuating biases or malicious intents.</p>
<h3>Oracle attacks</h3>
<p style="text-align: justify;">This type of attack involves probing a model with a sequence of meticulously designed inputs while analysing the outputs. Through the application of diverse optimization strategies and repeated querying, attackers can deduce confidential information, thereby jeopardizing both user privacy, overall system security, or internal operating rules.</p>
<p style="text-align: justify;">A pertinent example is the case of Microsoft’s AI-powered Bing chatbot. Shortly after its unveiling, a Stanford student, Kevin Liu, exploited the chatbot using a prompt injection attack, leading it to reveal its internal guidelines and code name “Sidney”, even though one of the fundamental internal operating rules of the system was to never reveal such information<a href="#_ftn8" name="_ftnref8">[8]</a>.</p>
<p style="text-align: justify;">A previous RiskInsight <a href="https://www.riskinsight-wavestone.com/en/2023/06/attacking-ai-a-real-life-example/">article</a> showed an example of Evasion and Oracle attacks and explained other attack models that are not specific to AI, but that are nonetheless an important risk for these technologies.</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #732196;">Question 5: What is the status of regulations? How is generative AI regulated?</span></h2>
<p style="text-align: justify;">Since our <a href="https://www.riskinsight-wavestone.com/en/2022/06/artificial-intelligence-soon-to-be-regulated/">2022 article</a>, there has been significant development in AI regulations across the globe.</p>
<h3 style="text-align: justify;">EU</h3>
<p style="text-align: justify;">The EU’s digital strategy aims to regulate AI, ensuring its innovative development and use, as well as the safety and fundamental rights of individuals and businesses regarding AI. On June 14, 2023, the European Parliament adopted and amended the proposal for a regulation on Artificial Intelligence, categorizing AI risks into four distinct levels: unacceptable, high, limited, and minimal<a href="#_ftn9" name="_ftnref9">[9]</a>.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-21824" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3.png" alt="" width="605" height="322" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3-359x191.png 359w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3-71x39.png 71w" sizes="auto, (max-width: 605px) 100vw, 605px" /></p>
<h3 style="text-align: justify;">US</h3>
<p style="text-align: justify;">The White House Office of Science and Technology Policy, guided by diverse stakeholder insights, presented the “Blueprint for an AI Bill of Rights”<a href="#_ftn10" name="_ftnref10">[10]</a>. Although non-binding, it underscores a commitment to civil rights and democratic values in AI’s governance and deployment.</p>
<h3 style="text-align: justify;">China</h3>
<p style="text-align: justify;">China’s Cyberspace Administration, considering rising AI concerns, proposed the Administrative Measures for Generative Artificial Intelligence Services. Aimed at securing national interests and upholding user rights, these measures offer a holistic approach to AI governance. Additionally, the measures seek to mitigate potential risks associated with Generative AI services, such as the spread of misinformation, privacy violations, intellectual property infringement, and discrimination. However, its territorial reach might pose challenges for foreign AI service providers in China<a href="#_ftn11" name="_ftnref11">[11]</a>.</p>
<h3 style="text-align: justify;">UK</h3>
<p style="text-align: justify;">The United Kingdom is charting a distinct path, emphasizing a pro-innovation approach in its National AI Strategy. The Department for Science, Innovation &amp; Technology released a white paper titled “AI Regulation: A Pro-Innovation Approach”, with a focus on fostering growth through minimal regulations and increased AI investments. The UK framework doesn’t prescribe rules or risk levels to specific sectors or technologies. Instead, it focuses on regulating the outcomes AI produces in specific applications. This approach is guided by five core principles: safety &amp; security, transparency, fairness, accountability &amp; governance, and contestability &amp; redress<a href="#_ftn12" name="_ftnref12">[12]</a>.</p>
<h3 style="text-align: justify;">Frameworks</h3>
<p style="text-align: justify;">Besides formal regulations, there are several guidance documents, such as NIST’s AI Risk Management Framework and ISO/IEC 23894, that provide recommendations to manage AI-associated risks. They focus on criteria aimed at trusting the algorithms in fine, and this is not just about cybersecurity! It’s about trust.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-21826" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4.png" alt="" width="605" height="340" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4-69x39.png 69w" sizes="auto, (max-width: 605px) 100vw, 605px" /></p>
<p> </p>
<p style="text-align: justify;">With such a broad regulatory landscape, organizations might feel overwhelmed. To assist, we suggest focusing on key considerations when integrating AI into operations, in order to setup the roadmap towards being compliant.</p>
<ul style="text-align: justify;">
<li><strong>Identify all existing AI systems</strong> within the organization and establish a procedure/protocol to identify new AI endeavours.</li>
<li><strong>Evaluate AI systems</strong> using criteria derived from reference frameworks, such as NIST.</li>
<li><strong>Categorize AI systems according to the AI Act’s classification</strong> (unacceptable, high, low or minimal).</li>
<li><strong>Determine the tailored risk management approach</strong> for each category.</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span style="color: #732196;">Bonus Question: This being said, what can I do right now?</span></h2>
<p style="text-align: justify;">As the digital landscape evolves, Wavestone emphasizes a comprehensive approach to generative AI integration. We advocate that every AI deployment undergo a rigorous sensitivity analysis, ranging from outright prohibition to guided implementation and stringent compliance. For systems classified as high risk, it’s paramount to apply a detailed risk analysis anchored in the standards set by ENISA and NIST. While AI introduces a sophisticated layer, foundational IT hygiene should never be side lined. We recommend the following approach:</p>
<ul style="text-align: justify;">
<li><span style="color: #732196;"><strong><em>Pilot &amp; Validate:</em></strong></span> Begin by gauging the transformative potential of generative AI within your organizational context. Moreover, it’s essential to understand the tools at your disposal, navigate the array of available choices, and make informed decisions based on specific needs and use cases.</li>
<li><span style="color: #732196;"><strong><em>Strategic Insight:</em></strong> </span>Based on our client CISO survey, ascertain your ideal AI adoption intensity. Do you resonate with the 10%, 65% or 25% adoption benchmarks shared by your industry peers?</li>
<li><span style="color: #732196;"><strong><em>Risk Mitigation: </em></strong></span>Ground your strategy in a comprehensive risk assessment, proportional to your intended adoption intensity.</li>
<li><span style="color: #732196;"><strong><em>Policy Formulation:</em> </strong></span>Use your risk-benefit analysis as a foundation to craft AI policies that are both robust and agile.</li>
<li><span style="color: #732196;"><strong><em>Continuous Learning &amp; Regulatory Vigilance:</em> </strong></span>Maintain an unwavering commitment to staying updated with the evolving regulatory landscape. Both locally and globally, it’s crucial to stay informed about the latest tools, attack methods, and defensive strategies.</li>
</ul>
<p style="text-align: justify;"><a href="#_ftnref1" name="_ftn1">[1]</a>  <a href="https://www.rfi.fr/fr/technologies/20230409-des-donn%C3%A9es-sensibles-de-samsung-divulgu%C3%A9s-sur-chatgpt-par-des-employ%C3%A9s">Des données sensibles de Samsung divulgués sur ChatGPT par des employés (rfi.fr)</a></p>
<p style="text-align: justify;"><a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://www.phonandroid.com/chatgpt-100-000-comptes-pirates-se-retrouvent-en-vente-sur-le-dark-web.html">https://www.phonandroid.com/chatgpt-100-000-comptes-pirates-se-retrouvent-en-vente-sur-le-dark-web.html</a></p>
<p style="text-align: justify;"><a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://www.cio-online.com/actualites/lire-bouygues-telecom-mise-sur-l-ia-generative-pour-transformer-sa-relation-client-14869.html">Bouygues Telecom mise sur l&#8217;IA générative pour transformer sa relation client (cio-online.com)</a></p>
<p style="text-align: justify;"><a href="#_ftnref4" name="_ftn4">[4]</a> <a href="https://www.bitdefender.fr/blog/hotforsecurity/quelles-donnees-chat-gpt-collecte-a-votre-sujet-et-pourquoi-est-ce-important-pour-votre-confidentialite-numerique/">Quelles données Chat GPT collecte à votre sujet et pourquoi est-ce important pour votre vie privée en ligne ? (bitdefender.fr)</a></p>
<p style="text-align: justify;"><a href="#_ftnref5" name="_ftn5">[5]</a> <a href="https://www.lemondeinformatique.fr/actualites/lire-openai-lance-un-chatgpt-plus-securise-pour-les-entreprises-91387.html">OpenAI lance un ChatGPT plus sécurisé pour les entreprises &#8211; Le Monde Informatique</a></p>
<p style="text-align: justify;"><a href="#_ftnref6" name="_ftn6">[6]</a> <a href="https://ieeexplore.ieee.org/document/8747397">Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System | IEEE Journals &amp; Magazine | IEEE Xplore</a></p>
<p style="text-align: justify;"><a href="#_ftnref7" name="_ftn7">[7]</a> <a href="https://www.washingtonpost.com/news/the-intersect/wp/2016/03/25/not-just-tay-a-recent-history-of-the-internets-racist-bots/">Not just Tay: A recent history of the Internet’s racist bots &#8211; The Washington Post</a></p>
<p style="text-align: justify;"><a href="#_ftnref8" name="_ftn8">[8]</a> <a href="https://www.phonandroid.com/microsoft-comment-un-etudiant-a-oblige-lia-de-bing-a-reveler-ses-secrets.html">Microsoft : comment un étudiant a obligé l&#8217;IA de Bing à révéler ses secrets (phonandroid.com)</a></p>
<p style="text-align: justify;"><a href="#_ftnref9" name="_ftn9">[9]</a> <a href="https://www.europarl.europa.eu/RegData/etudes/BRIE/2021/698792/EPRS_BRI(2021)698792_EN.pdf">Artificial intelligence act (europa.eu)</a></p>
<p style="text-align: justify;"><a href="#_ftnref10" name="_ftn10">[10]</a> <a href="https://www.whitehouse.gov/wp-content/uploads/2022/10/Blueprint-for-an-AI-Bill-of-Rights.pdf">https://www.whitehouse.gov/wp-content/uploads/2022/10/Blueprint-for-an-AI-Bill-of-Rights.pdf</a></p>
<p style="text-align: left;"><a href="#_ftnref11" name="_ftn11">[11]</a> <a href="https://www.china-briefing.com/news/china-to-regulate-deep-synthesis-deep-fake-technology-starting-january-2023/">https://www.china-briefing.com/news/china-to-regulate-deep-synthesis-deep-fake-technology-starting-january-2023/</a></p>
<p style="text-align: justify;"><a href="#_ftnref12" name="_ftn12">[12]</a> <a href="https://www.gov.uk/government/publications/ai-regulation-a-pro-innovation-approach/white-paper">A pro-innovation approach to AI regulation &#8211; GOV.UK (www.gov.uk)</a></p>
<p style="text-align: justify;"> </p>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/">AI: Discover the 5 most frequent questions asked by our clients!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Identity and Access Management: keys to a successful transformation programme</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/09/identity-and-access-management-keys-to-a-successful-transformation-programme/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Thu, 02 Sep 2021 13:47:00 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">http://riskinsight-prepro.s189758.zephyr32.atester.fr/?p=16634</guid>

					<description><![CDATA[<p>In this second article on Identity and Access Management (IAM) we look at why many organisation face difficulties transforming their IAM ecosystem, and how IAM programmes should be approached and structured. In our previous article – Identity and Access Management:...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/09/identity-and-access-management-keys-to-a-successful-transformation-programme/">Identity and Access Management: keys to a successful transformation programme</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><em>In this second article on Identity and Access Management (IAM) we look at why many organisation face difficulties transforming their IAM ecosystem, and how IAM programmes should be approached and structured. In our previous article – Identity and Access Management: back in the spotlight – we identified the main drivers of IAM improvement and four key maturity levels. We established that <strong>dedicated, proactive programmes are essential</strong> in climbing up this maturity ladder.</em></p>
<p style="text-align: justify;"><em><strong>IAM is a far-reaching concept</strong>. This understanding must be put into practice when running such a programme, to avoid quickly falling into common pain points. Let’s take a closer look.</em></p>
<h2 style="text-align: justify;">IAM programme challenges: <em>some typical examples</em></h2>
<p style="text-align: justify;">Three main drivers which are putting demands on IAM are business change, cyber security, and user experience. However, organisations often undertake IAM programmes driven, exclusively or primarily, by the desire to migrate to a new solution. With technical debt or tooling the only real concern, IAM programmes can face issues very quickly.</p>
<h3>1/ Broad impacts of migrating to a new solution</h3>
<p style="text-align: justify;">Often the desire is to simply migrate to a new tool or perform a major upgrade of the existing technical asset, whilst leaving all other elements of the IAM service unchanged. This can have unwanted effects on these other aspects. For example, a new tool will likely bring about new approval processes, which will require staff training on a new user interface. It could even require entirely new leavers and joiners’ processes for HR. This pain point ultimately boils down to a <strong>lack of assessment of the impact of the technology change</strong>, in the context of wider IAM ecosystem.</p>
<h3 style="text-align: justify;">2/ An ever-growing list of requirements</h3>
<p style="text-align: justify;">When an organisation realises that IAM change is not limited to the tooling, this can often open the floodgates to an unrealistic number of new objectives. Stakeholders end up demanding more of the programme (such as better user experience and increased ITSM integration) – despite these new objectives not being originally identified and catered for. The programme can become a vehicle to voice dissatisfaction with the existing end-to-end IAM service, causing <strong>scope creep</strong>. This dynamic can quickly bring pain to the programme across change management, budget, and solution architecture.</p>
<h3 style="text-align: justify;">3/ Forcing a like-for-like implementation</h3>
<p style="text-align: justify;">Once interactions between the new IAM solution and its perimeter services are fully functioning, you still need to consider differences in design philosophies between the new and the old tool. Key product design differences must be catered for. If not, organisations can end up requiring custom code and complex configurations on the new solution, simply to match the previous setup. This can impact on vendor support, maintenance, overall performance – and not to mention the need to retain a huge body of knowledge on the complex customisation. By going down this road, you can cause more trouble than that you are trying fix. <strong>A true butterfly effect of issues can be on the cards when trying to force a like-for-like on different tools</strong>.</p>
<p style="text-align: justify;">The key to avoiding these common pain points is to acknowledge that<strong> IAM must be viewed as a transversal topic, which impacts technology, people, and processes</strong>.</p>
<h2 style="text-align: justify;" aria-level="2">What is the recommended approach then?</h2>
<p style="text-align: justify;">Key to success is the acknowledgement that <strong>IAM improvement is a far-reaching programme</strong>. The implementation of new solutions is only the tip of the iceberg, and key <strong>impacts should not be underestimated</strong>. Under the covers, we believe the key streams of the transformation are:</p>
<p style="text-align: justify;"><strong>/ IAM solution renewal</strong>: the deployment (or upgrade) of the new IAM solution. This includes solution architecture, engineering, and technical migration.</p>
<p><strong>/ Modelling of rights</strong>: existing access rights must be translated into the new IAM ecosystem, such as business roles and application profiles.</p>
<p><strong>/ IAM data cleansing</strong>: the stream to review, cleanse, and validate reliability and correctness of existing user data. For example, recertifying the role of a user and validating their line manager to ensure the correct person is approving access requests.</p>
<p><strong>/ New processes and change management</strong>: this includes new ways to request and review access to applications, new processes to manage leavers and joiners, and training staff.</p>
<p><strong>/ Interoperability</strong> <strong>with other services and assets in the IS</strong>: for example, integrating the new IAM tooling with the SOC may require re-engineering the log ingestion into the SIEM and API calls. Another typical piece of work is to coordinate with concurrent AD migrations or upgrades.</p>
<p>We recommend structuring the IAM programme such that <strong>each of these topics is covered by an individual project</strong>. The design authority of IAM policies should operate at the programme level, with clear inputs to help guide all streams.</p>
<p>Critical to success is also <strong>strong sponsorship and a publicized vision of the objectives</strong>. Because IAM programmes touch so many organisational domains, it is essential that the programme manager and PMO function are supported at the executive level.</p>
<p>Finally, flexibility is key to manage changing circumstances and constraints. Here’s other tips to ensure the programme can remain on track to meet its intended objectives:</p>
<p><strong>/ </strong>Find a <strong>good middle ground between legacy assets, the ideal target state &amp; the capabilities of the new solution</strong>: the target state should be based on what best helps deliver the end-to-end IAM service to the business.</p>
<p><strong>/ </strong>Evaluate the possibility of <strong>integrating new solutions with existing services</strong>, even if not originally envisaged in the ideal target state. Simplify and rationalise where possible. This will help in both the short term and the long term.</p>
<p><strong>/ </strong>Do not rule out the possibility of retaining existing tools which were originally due for decommission, if it supports the overarching IAM objectives: sometimes it is best to maintain some existing assets, rather than decommission and migrate for the sake of IT modernisation.</p>
<p>In this article we have seen how defining key objectives is vital for the success of the programme. Understanding the breadth of IAM change is crucial, both for structuring the programme, and delivering on time and on budget. This approach will also allow programme managers and each stream lead to implement flexible measures to migrate from a legacy ecosystem and legacy applications to the new sol</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/09/identity-and-access-management-keys-to-a-successful-transformation-programme/">Identity and Access Management: keys to a successful transformation programme</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identity and Access Management: back in the spotlight</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/07/identity-and-access-management-back-in-the-spotlight/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Sat, 31 Jul 2021 13:34:00 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">http://riskinsight-prepro.s189758.zephyr32.atester.fr/?p=16628</guid>

					<description><![CDATA[<p>Large organisations are facing unprecedented change, such as adapting to remote working and managing operational risk in a post-pandemic world. Identity &#38; access management (IAM) – the provision and verification of identities and their access rights – is once again...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/07/identity-and-access-management-back-in-the-spotlight/">Identity and Access Management: back in the spotlight</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><em>Large organisations are facing unprecedented change, such as adapting to remote working and managing operational risk in a post-pandemic world. Identity &amp; access management (IAM) – the provision and verification of identities and their access rights – is once again at the centre of major transformation programmes. <strong>But why is the concept of identity back in the spotlight exactly?</strong></em></p>
<p>&nbsp;</p>
<h2>IAM transformation: what are the main drivers?</h2>
<p style="text-align: justify;">Businesses are changing at pace, and speed-to-market is strongly dependant on IT systems built on robust and scalable identity services. Whether it’s new a web service available to customers, a significant expansion, or a back-office merger – the requirement to scale IAM services quickly and efficiently is ever-present.</p>
<p style="text-align: justify;">At Wavestone, <strong>we witness three drivers</strong>, often in combination, which demand more from Identity &amp; Access Management:</p>
<ol>
<li style="text-align: left;"><strong>Cybersecurity risks</strong></li>
<li style="text-align: left;"><strong>Business change</strong></li>
<li style="text-align: left;"><strong>End user experience</strong></li>
</ol>
<p>Let’s dive into each of these in more detail:</p>
<p>&nbsp;</p>
<h3>1/ Evolving cybersecurity and information system models</h3>
<p style="text-align: justify;">Information systems are increasingly open and fragmented. Cloud adoption and distributed architectures are contributing to this fundamental shift. Security is adapting its principles and the notion of <em>zero trust</em> is now well established. <strong>Identity and access management is a key enabler for <em>zero trust</em>.</strong></p>
<p style="text-align: justify;">Information systems are consumed by thirds parties, customers, and employees. Identity is central to critical data exchange and confidentiality amongst diverse entities. It is therefore necessary to have a <strong>unique identity for each entity</strong> across the entire information system. While architectures evolve – the ultimate IAM objective does not: the right person or entity, with the appropriate level of rights, to access the right resource, in the right context. Crucially, this principle must be met on an ongoing basis.</p>
<p style="text-align: justify;">Each machine and user’s unique identity is also critical for traceability. An organisation should be able to identify, authenticate and authorise any user, from any other entity, when accessing a resource. The <strong>ability to centrally log, audit and monitor</strong> these events from across the information system is essential.</p>
<p>&nbsp;</p>
<h3 style="text-align: justify;" aria-level="3">2/ Identity-as-a-service to the business</h3>
<p style="text-align: justify;">Businesses are experiencing core transformation which require more agility &amp; shorter time-to-market. For example, several retailers are seeking new digital avenues to market due to an evolving e-commerce landscape and operational challenges brought about by the COVID-19 pandemic. Identity services must be able to support large business initiatives and cater for innovation at scale.</p>
<p style="text-align: justify;">Complex business change cannot be slowed down by extended security or infrastructure delivery times. <strong>Identity must be an enabler, and not synonymous with delay</strong>. Any project must be able to rely on identity services which are provided as <strong>an available commodity</strong> to the business, and not newly designed and deployed for each initiative.</p>
<p style="text-align: justify;">Consolidation and standardisation of IAM solutions and processes is critical to implementing this model. This includes consistent and robust management and is dependent on technology-agnostic methods and protocols – <strong>based on</strong> the latest, secure, <strong>industry standards</strong> (such as SAML, OIDC and OAuth).</p>
<p style="text-align: justify;">The provision of identity services must become embedded in the organisation’s operating model and practices such as <em>Agile</em>, <em>DevOps @ scale</em> and <em>innovation @ scale</em>: <strong>IAM delivered as a service to the business</strong>.</p>
<p>&nbsp;</p>
<h3 style="text-align: justify;" aria-level="3">3/ User experience demands are now centre stage</h3>
<p style="text-align: justify;">The third, crucial, driver of IAM transformation is user experience. The focus is on organisations to provide employees with the same quality of authentication and authorisation services that external customers have often enjoyed in the past. The objective is to allow end users to prove their identity <strong>easily and effortlessly</strong>, and access required services, from anywhere, and from any device. This forms the basis for a genuine continuous experience that supports new ways of collaborating, also accelerated by remote working.</p>
<p style="text-align: justify;"><strong>Easy and smooth registration processes</strong>, as well as consistent authentication across different applications, should be provided to customers to simplify their experience and build brand loyalty. This same principle holds for employees and third parties.</p>
<p style="text-align: justify;"><strong>Passwordless technologies and unique application logins</strong> are examples of solutions on the rise; Innovative risk-based and contextual approaches can streamline accesses, which can have a significant, positive, impact on user experience by <strong>reducing authentication requests</strong>.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;" aria-level="2">What steps to IAM transformation?</h2>
<p style="text-align: justify;">Understanding your current maturity is a key step towards delivering on the above. Over years of supporting IAM initiatives with clients, we have built our <strong>IAM maturity improvement journey</strong>, which is comprised of <strong>4 maturity steps</strong>.</p>
<figure id="post-16287 media-16287" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-16617 size-full" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/09/IAM-768x377-1.png" alt="" width="768" height="377" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/IAM-768x377-1.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/IAM-768x377-1-389x191.png 389w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/IAM-768x377-1-71x35.png 71w" sizes="auto, (max-width: 768px) 100vw, 768px" /></figure>
<ul>
<li style="text-align: justify;"><strong>Fragmented: </strong>the organisation lacks a consolidated approach to IAM across solutions, governance, and standards.</li>
</ul>
<ul style="text-align: justify;">
<li><strong>Rationalized: </strong>the technology landscape supporting IAM is simplified and managed centrally to aid user experience across all applications and users. Consolidation provides satisfactory oversight capabilities.</li>
</ul>
<ul style="text-align: justify;">
<li><strong>Extended: </strong>the organisational IAM capabilities cater for an evolving information system: any user, any device, any service.</li>
</ul>
<p style="text-align: justify;"><em>Many organisations currently have elements of these capabilities, but rarely deployed globally.</em></p>
<ul style="text-align: justify;">
<li><strong>Mastered: </strong>the organisation has adopted next-gen solutions, which provide strong security benefits and a smooth user experience – all whist reducing the workload on IT operations thanks to intelligent automation.</li>
</ul>
<p style="text-align: justify;"><em>At the time of writing, these are adopted on a case-by-case basis or serve as an aspirational step on IAM roadmaps.</em></p>
<p>&nbsp;</p>
<p style="text-align: justify;">Each of the above steps <strong>requires a deep transformation</strong> of the environment: change of governance, change of processes, and deployment or migration of supporting technologies. To be a success, we believe it needs to be addressed as a dedicated <strong>IAM</strong> <strong>transformation programme.</strong></p>
<p style="text-align: justify;"><em>Stay tuned for our next publication, where we share what good looks like for an IAM transformation programme&#8230;</em></p>
<p style="text-align: justify;">&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/07/identity-and-access-management-back-in-the-spotlight/">Identity and Access Management: back in the spotlight</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Key Enablers in Creating a Seamless and Secure User Experience</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/key-enablers-in-creating-a-seamless-and-secure-user-experience/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Thu, 19 Nov 2020 08:00:16 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Identity Control Tower]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[model]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[user experience]]></category>
		<category><![CDATA[user side]]></category>
		<category><![CDATA[Workplace]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14632</guid>

					<description><![CDATA[<p>With remote working and digital interactions becoming more and more common, it is essential for businesses to offer the best possible experience for day-to-day digital activities and collaboration with suppliers and partners. One way of providing a seamless and yet...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/key-enablers-in-creating-a-seamless-and-secure-user-experience/">Key Enablers in Creating a Seamless and Secure User Experience</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With remote working and digital interactions becoming more and more common, it is essential for businesses to offer the best possible experience for day-to-day digital activities and collaboration with suppliers and partners. One way of providing a seamless and yet secure user experience is by employing and putting in place the necessary steps toward an <strong>Identity Control Tower</strong> model as described in this article.</p>
<p>&nbsp;</p>
<h2>The Workplace and its Collaboration Tools</h2>
<p>It’s great to be able to work from anywhere, any device and having the technology work when you need it. More than a luxury, it’s a <strong>necessity</strong> in the current intensified remote working situation, or for international organisations with very mobile, distributed, fluid users. While so many changes happen during the crisis, your workplace should support your business reconfiguration through enabling staff, partners, suppliers to work with different applications, different teams, etc.</p>
<p>The word “Workplace” used in this context refers to <strong>more than the workstations and collaboration tools</strong>. It extends to wider areas such as enterprise architecture, application security &amp; identity and access management. Arguably, we’re talking about the wider IT foundation/digital capabilities, to support and enable business needs –<strong> the workplace might just be the tip of the iceberg</strong>.</p>
<p>&nbsp;</p>
<h2>Legacy upon Legacy adds Complexity</h2>
<p>On the <strong>user side</strong>, as soon as you go through multiple use-cases, e.g. accessing a legacy system on premise or a Software as a Service application, you are likely to require multiple accounts and therefore a cumbersome user experience.</p>
<p>On the <strong>IT operation side</strong>, it is equally a burden to make it work: workstations are still most of the time a physical device bound to a rigid corporate domain; they need to be configured, then shipped to remote staff or external parties, and accounts still need to be provisioned in target environments, with access rights set appropriately. <strong>All the above usually being different processes which are repeated for each supplier or partner, leading to as many devices and set ups. </strong></p>
<p>More importantly, <strong>how secure is this</strong> disorganised and overlapping situation? Having visibility and control on who has access to what, end to end and for all environments, is a challenge because of the siloed use-cases. And as users join and leave, applications evolve, the security level likely decreases by lack of keeping accounts and rights accurate.</p>
<p>In our experience at Wavestone, all these challenges stem from the accumulation of new use-cases and technology, implemented in silo, for their own use or limited group of use-cases. The platform, which was first designed with one primary use, has now altered into a manifold use platform with an ill-fitting model and processes. Many organisations today can be proud to rely on a federated platform and modern access experience for cloud applications on one side – and a different, yet reasonably good, experience on internal applications side. However, often both are not integrated and therefore don’t get the benefits we described in the introduction. We believe this comes from the lack of a truly shared model/architecture to support a modern experience, <strong>across all use-cases</strong><em>.</em></p>
<p>.</p>
<figure id="post-14634 media-14634" class="align-center"><img loading="lazy" decoding="async" class=" wp-image-14634 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1.png" alt="" width="995" height="387" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1.png 812w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1-437x170.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image1-768x299.png 768w" sizes="auto, (max-width: 995px) 100vw, 995px" /></figure>
<p style="text-align: center;">Figure 1 &#8211; <em>Example of a corporate model in which each entity manages identities and their access separately: duplicating pro</em>cesses</p>
<p>&nbsp;</p>
<h2>One Model for a streamline experience</h2>
<p>For this reason and for the future of user experience, at Wavestone we believe in a <strong>model based on Identity Control Tower</strong>(s).</p>
<p>An Identity Control Tower is a platform to enforce your access policies. Its purpose is to <strong>verify access requests coming from trusted sources of identity and determine if that identity is allowed to access a target digital resource.</strong> For the metaphor, a pilot willing to get clearance for take-off will submit their flight plan using a trusted channel, and after its approval and other verification by controllers, the pilot can proceed to take-off. If we were to transpose this metaphor digitally, we would talk about a user: in order for said user to access X platform, (s)he would need to use a corporate process which itself is trusted by an Identity Control Tower. Said user would provide their “access plan” (e.g. session token) to the Identity Control Tower. After the Identity Control Tower has verified the authenticity of the “access plan” against its access policies it will perform other checks of context, such as: time of the request, location of origin of the access, trust level of the device etc, the user can then proceed to access the resources. Should these verifications highlight anything unusual or inconsistent in authenticating the user, additional requests can be made to allow the user in (re-authentication or step up).</p>
<p>The Identity Control Tower is under your control and holds the conditions of access i.e. access policies and accepts users from specific sources thanks to a pre-established trust relationship between organisations.</p>
<p>For instance, in the diagram below, imagine a situation in which a supplier is developing a new service in your cloud environment. Users from the supplier would keep their device and authentication process they use within their corporate environment, while the Identity Control Tower (ICT) would enforce access control to the cloud environment – without having to use and manage a different account and re-authenticate. For environments with very granular privileges like AWS, building a decoupled ICT is maybe not a realistic approach and the ICT is then probably the identity platform from Amazon that is managed by your organisation and linked to the identity provider of the supplier. The Identity Control Tower model is basically an extension of federation, implemented to cover all use-cases.</p>
<p>&nbsp;</p>
<figure id="post-14636 media-14636" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14636" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2.png" alt="" width="979" height="383" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2.png 874w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-437x171.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-768x301.png 768w" sizes="auto, (max-width: 979px) 100vw, 979px" /></figure>
<p style="text-align: center;">Figure 2 – <em>Access of a Partner user to a Cloud Provider resource through an Identity Control Tower</em></p>
<p>&nbsp;</p>
<p>In another scenario, as seen in this diagram, let’s consider an applicant applying for a job in your organisation, thanks to a recruitment portal you offer. They would initiate an application in your portal using their government-backed digital identity, and once they provide their consent to access their LinkedIn profile, you could obtain a digital CV. For the applicant, it is as simple as showing their ID and giving a copy of their CV, rather than filling-in registration form(s) asking once again for the same standard identity information and risking a typo in their contact details – or even having to send copies of sensitive documents like their passport.</p>
<p>&nbsp;</p>
<figure id="post-14638 media-14638" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14638" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5.png" alt="" width="986" height="377" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5.png 842w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5-437x167.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-3-5-768x294.png 768w" sizes="auto, (max-width: 986px) 100vw, 986px" /></figure>
<p style="text-align: center;">Figure 3 &#8211; <em>An alternative scenario presenting the trust relationship between a government ID platform and the corporate</em></p>
<p>&nbsp;</p>
<h2>One Model, Three Key Pillars</h2>
<p>Using our knowledge and experience, we believe that this model should be built upon three key pillars:<strong> a unique identity across all systems</strong>, a <strong>common</strong> and <strong>flexible</strong> model to access information and, the establishment of a <strong>360</strong>°<strong> trust relationship.</strong></p>
<p><strong>A Unique Identity Architecture: this</strong> is achieved by following a simple rule: don’t duplicate identity data. The less identity records you create for the same physical person, the more streamline the digital experience will be – as cumbersome steps start to appear when an additional account, device or authentication action is required for the user to access the target resource. The key behind a unique identity data is to <strong>try reusing the data from its (authoritative) source</strong> instead of duplicating/copying it in your own systems. For instance, the suppliers or partners working with your organisation likely already have professional digital identities for their own IT use – what would be the conditions to leverage them instead of re-creating them?<a href="#_ftn1" name="_ftnref1">[1]</a> The next two pillars contribute to answering this question.</p>
<p><strong>A Common and Flexible Model:</strong> The second pillar is to use a common and flexible model to allow/restrict access to information. To provide flexibility, an attribute-based access control (ABAC) model enables granular rules and is well suited to a risk-based and adaptive approach. To make it work though, it is essential to <strong>define the “grammar” of the authorisation model</strong>: what are the actual attributes used to provide accesses that make sense at the enterprise level? How do they translate into “privileges”? What are their formats/values? When the Identity Control Tower is provided by a cloud provider (e.g. from a Cloud provider as Azure or AWS), the grammar is often determined by the said service. Furthermore, to make this model as widespread as possible across use-cases, both on the identity source side and on providing access on the target service side, we recommend implementing your platform following market standards to maximise inter-operability (SAML, OpenID Connect, OAuth, FIDO, etc.).</p>
<p><strong>360° Trust Relationship: </strong>Finally, the last pillar is to ensure the establishment of a 360° Trust Relationship. In other words, <strong>perform due diligence and establish confidence thresholds</strong> to accept interconnection (“technical trust”) of identity platforms. The due diligence should extend to all upstream processes leading to feeding the platform with identities, for instance the HR/procurement processes to vet identities, up to the IT on-boarding process itself – because trusting an identity platform is a first step for these identities to access your digital resources, you need to be within tolerance of the risk it comes with. This trust relationship should then be implemented through security level expectations, auditability in contractual clauses, and enforced via the supplier service management governance. With such strong requirements, one organisation must be prepared to temporarily on-board suppliers or partners within the organisation’s own platform, while suppliers or partners remediate their processes and platforms to be compliant.</p>
<p>&nbsp;</p>
<h2>Two key success factors</h2>
<p>In order to implement these three key pillars, Wavestone has identified two key success factors: being <strong>sponsored by appropriate level of management</strong> and <strong>building resilience and privacy by design</strong>. A transformation programme to establish this model would have implications and requirements in several of your organisation’s departments (HR, sourcing, legal, IT, risk, security etc.), hence should be sponsored by top-management and driven with a pan-organisation approach.<br />
Additionally, as it should always be, the supporting platform should be designed and built with <strong>security</strong>, <strong>privacy</strong> and <strong>resilience</strong> considerations from the beginning.</p>
<p>&nbsp;</p>
<h3>Final Thoughts</h3>
<p>As you have been able to understand throughout this article, looking at the user experience end to end and across use-cases is key to really streamline digital services. This can be achieved with a pan-organisation shift to enforce a unique identity across all systems, a common and flexible model to access information and, the establishment of a 360° trust relationship with third parties.</p>
<p>To go further in your reflection on the subject and understand the current state of your organisation, think about these questions and try to answer them: <em>picking users from different departments, what does the typical day to day digital experience look like? How long does my organisation take to on-board contractors and third parties? How does my organisation actually give access to its data and resources for external users? How many duplicate identities exist across my IT estate?</em></p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> A technical entry might still exist within your systems, for reference purposes &#8211; but from the user perspective there is no new account, no duplicate, if they don’t have to register a new login, credentials etc.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/key-enablers-in-creating-a-seamless-and-secure-user-experience/">Key Enablers in Creating a Seamless and Secure User Experience</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Les facteurs clés pour créer une expérience utilisateur transparente et sécurisée</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/les-facteurs-cles-pour-creer-une-experience-utilisateur-transparente-et-securisee/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 08:00:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Eclairage]]></category>
		<category><![CDATA[côté utilisateur]]></category>
		<category><![CDATA[expérience utilisateur]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[modèle]]></category>
		<category><![CDATA[tour de contrôle d'identité]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14644</guid>

					<description><![CDATA[<p>Le travail à distance et les interactions numériques étant de plus en plus courants, il est essentiel que les entreprises offrent la meilleure expérience possible pour les activités numériques quotidiennes et la collaboration avec les fournisseurs et les partenaires. Une...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/les-facteurs-cles-pour-creer-une-experience-utilisateur-transparente-et-securisee/">Les facteurs clés pour créer une expérience utilisateur transparente et sécurisée</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Le travail à distance et les interactions numériques étant de plus en plus courants, il est essentiel que les entreprises offrent la meilleure expérience possible pour les activités numériques quotidiennes et la collaboration avec les fournisseurs et les partenaires. Une façon d&#8217;offrir une expérience utilisateur transparente et pourtant sécurisée est d&#8217;employer et de mettre en place les étapes nécessaires vers un modèle de <strong>Tour de Contrôle d&#8217;Identité</strong> tel que décrit dans cet article.</p>
<h2>Le lieu de travail et ses outils de collaboration</h2>
<p>C&#8217;est formidable de pouvoir travailler de n&#8217;importe où, avec n&#8217;importe quel appareil et de disposer de la technologie nécessaire quand on en a besoin. Plus qu&#8217;un luxe, c&#8217;est une <strong>nécessité</strong> dans la situation actuelle de travail à distance intensifié, ou pour les organisations internationales dont les utilisateurs sont très mobiles, répartis et fluides. Alors que tant de changements se produisent pendant la crise, votre lieu de travail devrait soutenir la reconfiguration de votre entreprise en permettant au personnel, aux partenaires, aux fournisseurs de travailler avec différentes applications, différentes équipes, etc.</p>
<p>Le mot &#8220;lieu de travail&#8221; utilisé dans ce contexte <strong>ne se limite pas aux postes de travail et aux outils de collaboration</strong>. Il s&#8217;étend à des domaines plus larges tels que l&#8217;architecture d&#8217;entreprise, la sécurité des applications et la gestion des identités et des accès. On peut dire que nous parlons de la base informatique plus large et des capacités numériques, pour soutenir et répondre aux besoins des entreprises &#8211; <strong>le lieu de travail n&#8217;est peut-être que la partie visible de l&#8217;iceberg</strong>.</p>
<h2>L&#8217;héritage sur l&#8217;héritage ajoute de la complexité</h2>
<p>Du <strong>côté</strong> de <strong>l&#8217;utilisateur</strong>, dès que vous passez par plusieurs cas d&#8217;utilisation, par exemple l&#8217;accès à un système existant sur place ou à une application Software as a Service, vous êtes susceptible d&#8217;avoir besoin de plusieurs comptes et donc d&#8217;une expérience utilisateur lourde.</p>
<p>Du <strong>côté de l&#8217;exploitation informatique</strong>, c&#8217;est également un fardeau de la faire fonctionner : les postes de travail sont encore la plupart du temps un dispositif physique lié à un domaine rigide de l&#8217;entreprise ; ils doivent être configurés, puis expédiés au personnel distant ou à des parties externes, et les comptes doivent encore être approvisionnés dans des environnements cibles, avec des droits d&#8217;accès définis de manière appropriée. <strong>Tous les éléments ci-dessus sont généralement des processus différents qui se répètent pour chaque fournisseur ou partenaire, ce qui entraîne autant de dispositifs et de configurations</strong>.</p>
<p>Plus important encore, <strong>dans quelle mesure</strong> cette situation désorganisée et chevauchante est-elle sûre ? Avoir une visibilité et un contrôle sur qui a accès à quoi, de bout en bout et pour tous les environnements, est un défi en raison des cas d&#8217;utilisation cloisonnés. Et à mesure que les utilisateurs rejoignent et quittent l&#8217;entreprise, que les applications évoluent, le niveau de sécurité diminue probablement en raison du manque de précision des comptes et des droits.</p>
<p>D&#8217;après notre expérience chez Wavestone, tous ces défis découlent de l&#8217;accumulation de nouveaux cas d&#8217;utilisation et de nouvelles technologies, mis en œuvre en silo, pour leur propre usage ou pour un groupe limité de cas d&#8217;utilisation. La plateforme, qui a d&#8217;abord été conçue pour une utilisation principale, s&#8217;est maintenant transformée en une plateforme à utilisations multiples avec un modèle et des processus mal adaptés. De nombreuses organisations peuvent aujourd&#8217;hui être fières de pouvoir compter sur une plate-forme fédérée et une expérience d&#8217;accès moderne pour les applications en nuage d&#8217;un côté &#8211; et sur une expérience différente, mais raisonnablement bonne, du côté des applications internes. Cependant, souvent, les deux ne sont pas intégrés et ne bénéficient donc pas des avantages que nous avons décrits dans l&#8217;introduction. Nous pensons que cela est dû à l&#8217;absence d&#8217;un modèle/architecture véritablement partagé pour soutenir une expérience moderne, <strong>dans tous les cas d&#8217;utilisation</strong>.</p>
<figure id="post-14687 media-14687" class="align-center">
<figure id="post-14693 media-14693" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14693" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-1-7.png" alt="" width="957" height="400" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-1-7.png 1171w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-1-7-437x182.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-1-7-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image-1-7-768x321.png 768w" sizes="auto, (max-width: 957px) 100vw, 957px" /></figure>
</figure>
<p style="text-align: center;"><em>Figure 1 &#8211; Exemple de modèle d&#8217;entreprise dans lequel chaque entité gère séparément les identités et leur accès : duplication des processus</em></p>
<h2>Un modèle pour une expérience de rationalisation</h2>
<p>Pour cette raison et pour l&#8217;avenir de l&#8217;expérience utilisateur, chez Wavestone, nous croyons en un <strong>modèle basé sur la ou les Tours de Contrôle d&#8217;Identité</strong>.</p>
<p>Une tour de contrôle d&#8217;identité est une plate-forme permettant de faire respecter vos politiques d&#8217;accès. Son but est de <strong>vérifier les demandes d&#8217;accès provenant de sources d&#8217;identité fiables et de déterminer si cette identité est autorisée à accéder à une ressource numérique cible</strong>. Pour reprendre la métaphore, un pilote désireux d&#8217;obtenir une autorisation de décollage soumettra son plan de vol en utilisant un canal de confiance, et après son approbation et d&#8217;autres vérifications par les contrôleurs, le pilote pourra procéder au décollage. Si nous devions transposer cette métaphore en numérique, nous parlerions d&#8217;un utilisateur : pour que ledit utilisateur puisse accéder à la plate-forme X, il devrait utiliser un processus d&#8217;entreprise qui est lui-même fiable par une tour de contrôle d&#8217;identité. Cet utilisateur fournit son &#8220;plan d&#8217;accès&#8221; (par exemple, un jeton de session) à la tour de contrôle d&#8217;identité. Après que la tour de contrôle d&#8217;identité a vérifié l&#8217;authenticité du &#8220;plan d&#8217;accès&#8221; par rapport à ses politiques d&#8217;accès, elle effectuera d&#8217;autres vérifications de contexte, telles que : l&#8217;heure de la demande, le lieu d&#8217;origine de l&#8217;accès, le niveau de confiance du dispositif, etc. Si ces vérifications mettent en évidence quelque chose d&#8217;inhabituel ou d&#8217;incohérent dans l&#8217;authentification de l&#8217;utilisateur, des demandes supplémentaires peuvent être faites pour permettre à l&#8217;utilisateur d&#8217;entrer (ré-authentification ou renforcement).</p>
<p>La tour de contrôle d&#8217;identité est sous votre contrôle et détient les conditions d&#8217;accès, c&#8217;est-à-dire les politiques d&#8217;accès et accepte les utilisateurs de sources spécifiques grâce à une relation de confiance préétablie entre les organisations.</p>
<p>Par exemple, dans le schéma ci-dessous, imaginez une situation dans laquelle un fournisseur développe un nouveau service dans votre environnement en nuage. Les utilisateurs du fournisseur conserveraient leur dispositif et le processus d&#8217;authentification qu&#8217;ils utilisent dans leur environnement d&#8217;entreprise, tandis que la tour de contrôle d&#8217;identité (TIC) imposerait un contrôle d&#8217;accès à l&#8217;environnement en nuage &#8211; sans avoir à utiliser et à gérer un compte différent et à se ré-authentifier. Pour les environnements avec des privilèges très granulaires comme AWS, construire une TIC découplée n&#8217;est peut-être pas une approche réaliste et la TIC est alors probablement la plateforme d&#8217;identité d&#8217;Amazon qui est gérée par votre organisation et liée au fournisseur d&#8217;identité du fournisseur. Le modèle de la tour de contrôle d&#8217;identité est essentiellement une extension de la fédération, mise en œuvre pour couvrir tous les cas d&#8217;utilisation.</p>
<figure id="post-14695 media-14695" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14695" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-1.png" alt="" width="967" height="407" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-1.png 1167w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-1-437x184.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-1-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image2-1-768x323.png 768w" sizes="auto, (max-width: 967px) 100vw, 967px" /></figure>
<p style="text-align: center;"><em>Figure 2 &#8211; Accès d&#8217;un utilisateur partenaire à une ressource du fournisseur de services dans le nuage via une tour de contrôle d&#8217;identité</em></p>
<p>Dans un autre scénario, comme le montre ce schéma, considérons un candidat qui postule à un emploi dans votre organisation, grâce à un portail de recrutement que vous proposez. Il déposerait une candidature sur votre portail en utilisant son identité numérique soutenue par le gouvernement, et une fois qu&#8217;il aurait donné son accord pour accéder à son profil LinkedIn, vous pourriez obtenir un CV numérique. Pour le candidat, il suffit de montrer sa pièce d&#8217;identité et de donner une copie de son CV, plutôt que de remplir le(s) formulaire(s) d&#8217;inscription en demandant une nouvelle fois les mêmes informations d&#8217;identité standard et en risquant de faire une faute de frappe dans ses coordonnées &#8211; ou même de devoir envoyer des copies de documents sensibles comme son passeport.</p>
<figure id="post-14698 media-14698" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-14698" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image3.png" alt="" width="1029" height="470" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image3.png 965w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image3-419x191.png 419w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image3-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/image3-768x350.png 768w" sizes="auto, (max-width: 1029px) 100vw, 1029px" /></figure>
<p style="text-align: center;"><em>Figure 3 &#8211; Un scénario alternatif présentant la relation de confiance entre une plateforme d&#8217;identification gouvernementale et l&#8217;entreprise</em></p>
<h2>Un modèle, trois piliers clés</h2>
<p>Forts de nos connaissances et de notre expérience, nous pensons que ce modèle devrait reposer sur trois piliers clés : une <strong>identité unique dans tous les systèmes</strong>, un modèle<strong> commun</strong> et <strong>flexible</strong> d&#8217;accès à l&#8217;information et l&#8217;établissement d&#8217;une <strong>relation de confiance à 360°.</strong></p>
<p>Une <strong>Architecture d&#8217;Identité Unique</strong> : elle est réalisée en suivant une règle simple : ne pas dupliquer les données d&#8217;identité. Moins vous créez de fiches d&#8217;identité pour une même personne physique, plus l&#8217;expérience numérique sera simplifiée &#8211; car des étapes lourdes commencent à apparaître lorsqu&#8217;un compte, un dispositif ou une action d&#8217;authentification supplémentaire est nécessaire pour que l&#8217;utilisateur accède à la ressource cible. La clé d&#8217;une donnée d&#8217;identité unique est <strong>d&#8217;essayer de réutiliser les données de sa source</strong> (qui fait autorité) au lieu de les dupliquer/copier dans vos propres systèmes. Par exemple, les fournisseurs ou partenaires travaillant avec votre organisation ont probablement déjà des identités numériques professionnelles pour leur propre usage informatique &#8211; quelles seraient les conditions pour les exploiter au lieu de les recréer ?  Les deux piliers suivants contribuent à répondre à cette question.</p>
<p><strong>Un modèle commun et flexible</strong> : Le deuxième pilier consiste à utiliser un modèle commun et flexible pour permettre/restreindre l&#8217;accès à l&#8217;information. Pour assurer la flexibilité, un modèle de contrôle d&#8217;accès basé sur les attributs (ABAC) permet des règles granulaires et est bien adapté à une approche adaptative et basée sur les risques. Pour que cela fonctionne, il est toutefois essentiel de <strong>définir la &#8220;grammaire&#8221; du modèle d&#8217;autorisation</strong> : quels sont les attributs réels utilisés pour fournir des accès qui ont un sens au niveau de l&#8217;entreprise ? Comment se traduisent-ils en &#8220;privilèges&#8221; ? Quels sont leurs formats/valeurs ? Lorsque la tour de contrôle d&#8217;identité est fournie par un fournisseur de cloud (par exemple, par un fournisseur de cloud comme Azure ou AWS), la grammaire est souvent déterminée par ledit service. En outre, pour que ce modèle soit le plus répandu possible dans les cas d&#8217;utilisation, tant du côté de la source d&#8217;identité que de la fourniture d&#8217;accès du côté du service cible, nous recommandons de mettre en œuvre votre plate-forme en suivant les normes du marché afin de maximiser l&#8217;interopérabilité (SAML, OpenID Connect, OAuth, FIDO, etc.).</p>
<p>Une <strong>relation de confiance à 360°</strong> : Enfin, le dernier pilier consiste à assurer l&#8217;établissement d&#8217;une relation de confiance à 360°. En d&#8217;autres termes, il faut <strong>faire preuve de diligence raisonnable et établir des seuils de confiance</strong> pour accepter l&#8217;interconnexion (&#8220;confiance technique&#8221;) des plateformes d&#8217;identité. La diligence raisonnable doit s&#8217;étendre à tous les processus en amont qui permettent d&#8217;alimenter la plateforme en identités, par exemple les processus RH/achats pour vérifier les identités, jusqu&#8217;au processus d&#8217;intégration informatique lui-même &#8211; parce que la confiance dans une plateforme d&#8217;identité est une première étape pour que ces identités puissent accéder à vos ressources numériques, vous devez être dans la tolérance du risque qu&#8217;elle comporte. Cette relation de confiance doit ensuite être mise en œuvre par le biais des attentes en matière de niveau de sécurité, de l&#8217;auditabilité des clauses contractuelles, et être appliquée par le biais de la gouvernance de la gestion des services des fournisseurs. Avec des exigences aussi strictes, une organisation doit être prête à intégrer temporairement des fournisseurs ou des partenaires au sein de sa propre plate-forme, pendant que les fournisseurs ou partenaires remettent leurs processus et plates-formes en conformité.</p>
<h2>Deux facteurs clés de succès</h2>
<p>Afin de mettre en œuvre ces trois piliers clés, Wavestone a identifié deux facteurs clés de succès : <strong>être parrainé par un niveau de gestion approprié</strong> et <strong>renforcer la résilience et la protection de la vie privée dès la conception</strong>. Un programme de transformation visant à établir ce modèle aurait des implications et des exigences dans plusieurs départements de votre organisation (RH, approvisionnement, juridique, informatique, risques, sécurité, etc.), et devrait donc être parrainé par la direction générale et mené avec une approche panorganisationnelle.</p>
<p>En outre, comme toujours, la plateforme de support doit être conçue et construite en tenant compte dès le départ des questions de <strong>sécurité</strong>, de <strong>confidentialité</strong> et de <strong>résilience</strong>.</p>
<h3>Réflexions finales</h3>
<p>Comme vous avez pu le comprendre tout au long de cet article, il est essentiel d&#8217;examiner l&#8217;expérience de l&#8217;utilisateur de bout en bout et d&#8217;un cas d&#8217;utilisation à l&#8217;autre pour vraiment rationaliser les services numériques. Cela peut être réalisé grâce à un changement d&#8217;organisation pour imposer une identité unique à tous les systèmes, un modèle commun et flexible d&#8217;accès à l&#8217;information et l&#8217;établissement d&#8217;une relation de confiance à 360° avec les tiers.</p>
<p>Pour aller plus loin dans votre réflexion sur le sujet et comprendre l&#8217;état actuel de votre organisation, réfléchissez à ces questions et essayez d&#8217;y répondre : <em>en choisissant des utilisateurs de différents services, à quoi ressemble l&#8217;expérience numérique quotidienne typique ? Combien de temps faut-il à mon organisation pour embarquer des sous-traitants et des tiers ? Comment mon organisation donne-t-elle effectivement accès à ses données et ressources aux utilisateurs externes ? Combien d&#8217;identités doubles existe-t-il dans mon parc informatique ?  </em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/les-facteurs-cles-pour-creer-une-experience-utilisateur-transparente-et-securisee/">Les facteurs clés pour créer une expérience utilisateur transparente et sécurisée</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>2019 UK Cybersecurity Startup Radar</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/11/2019-uk-cybersecurity-startup-radar/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Mon, 25 Nov 2019 04:49:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[booming]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[findings]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[market]]></category>
		<category><![CDATA[radar]]></category>
		<category><![CDATA[startup]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12211</guid>

					<description><![CDATA[<p>Cybersecurity remains a fast-evolving ecosystem that presents new threats to enterprises every day with hackers becoming increasingly innovative in their attempts to break into corporate networks and steal valuable data. As such, cybersecurity start-ups are playing an even more critical...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/11/2019-uk-cybersecurity-startup-radar/">2019 UK Cybersecurity Startup Radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="uncode_text_column">
<p>Cybersecurity remains a fast-evolving ecosystem that presents new threats to enterprises every day with hackers becoming increasingly innovative in their attempts to break into corporate networks and steal valuable data. As such, cybersecurity start-ups are playing an even more critical role in providing disruptive and innovative solutions to novel cybersecurity challenges.</p>
<p>Discover our infographic on the 2019 UK cybersecurity start-up landscape to find out the latest market trends, our key findings in this area and a booming UK market.</p>
</div>
<figure id="post-12213 media-12213" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-12213" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/11/Flyer-UK-1-_WEB_150dpi_1.png" alt="" width="1241" height="875" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/11/Flyer-UK-1-_WEB_150dpi_1.png 1241w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/11/Flyer-UK-1-_WEB_150dpi_1-271x191.png 271w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/11/Flyer-UK-1-_WEB_150dpi_1-768x541.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/11/Flyer-UK-1-_WEB_150dpi_1-55x39.png 55w" sizes="auto, (max-width: 1241px) 100vw, 1241px" /></figure>
<figure id="post-12215 media-12215" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-12215" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/11/Flyer-UK-1-_WEB_150dpi-2.png" alt="" width="1241" height="875" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/11/Flyer-UK-1-_WEB_150dpi-2.png 1241w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/11/Flyer-UK-1-_WEB_150dpi-2-271x191.png 271w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/11/Flyer-UK-1-_WEB_150dpi-2-768x541.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/11/Flyer-UK-1-_WEB_150dpi-2-55x39.png 55w" sizes="auto, (max-width: 1241px) 100vw, 1241px" /></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/11/2019-uk-cybersecurity-startup-radar/">2019 UK Cybersecurity Startup Radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber-resilience lessons learned: the latest UK developments</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/02/cyber-resilience-latest-uk-developments/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Wed, 20 Feb 2019 13:20:08 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyberresilience]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[UK regulation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11739</guid>

					<description><![CDATA[<p>Recent major cyberattacks, especially global destructive ones such as WannaCry and NotPetya in 2017, but also targeted ones, have shown how significantly business activities can be disrupted for affected organisations, resulting in huge financial losses. Consequently, organisations are looking for...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/02/cyber-resilience-latest-uk-developments/">Cyber-resilience lessons learned: the latest UK developments</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Recent major cyberattacks, especially global destructive ones such as WannaCry and NotPetya in 2017, but also targeted ones, have shown how significantly business activities can be disrupted for affected organisations, resulting in huge financial losses.</p>
<p>Consequently, organisations are looking for ways to become cyber-resilient and thus limit the impacts of such attacks. Besides this, more regulations related to cyber-resilience are emerging and pushing organisations to take appropriate action; particularly when incentivised by the threat of exposure to possible sanctions and fines for non-compliance.</p>
<p>How is the UK regulatory framework developing on this topic? What have we learned from recent major cyberattacks? How should organisations prepare to react promptly and effectively in case of such attacks?</p>
<h1>Cyber-resilience in the UK &#8211; An increasingly restrictive regulatory framework</h1>
<h2>NIS Regulations, the first implementation of cyber-resilience principles in UK law</h2>
<p>Following the European Union directive on the security of Networks and Information Systems (NIS directive) and despite Brexit, the NIS Regulations came into force in the UK on 10th May 2018. This regulation has marked a clear shift of the regulators’ role from a helpful supportive party to a more restrictive one.</p>
<p>As per this regulation, Operators of Essential Services (OES) and Digital Service providers (DSP) must consider cyber-security measures to manage the security of their systems and facilities, their existing processes and procedures to handle security breaches and maintain business continuity.</p>
<p>OES, who had to register to their Competent Authority (CA &#8211; i.e. regulator identified for sector) by the 20th August 2018, are considered as more critical than the DSPs in the event of an attack; and hence why they face much stricter requirements. Therefore, OES are subject to audits conducted by their CA’s. These controls will assess organisations against the 14 security principles outlined in the Cyber-assessment framework published by the UK National Cyber Security Centre (NCSC).</p>
<p>If there is non-compliance with the NIS Regulations, organisations are now exposed to sanctions that can go from notices for further information to monetary penalties (up to a maximum of £17 million).</p>
<p>DSP’s will not be audited, they will only face enquiries in case of incident. They have also been given more time to register to their CA with a deadline of the 1st November 2018. For organisations falling into the OES / DSP scope, not registering is considered as a blatant violation of the NIS Regulations, and could lead to severe disciplinary action.</p>
<h2>Cyber-resilience regulation for the UK financial sector</h2>
<p>Financial services have always been considered as ‘one-step-ahead’ when it comes to Cyber-resilience. Therefore, this market is a good indicator of the future trends related to this topic.</p>
<p>Surprisingly, the Banking and Financial Market infrastructure sectors are not listed as OES by the NIS Regulations – as opposed to the NIS Directive (the EU text) that includes these two sectors.</p>
<p>However, on 5th July 2018, the Bank of England (BoE), the Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) quickly reacted by publishing a Discussion Paper on the UK financial sector’s operational <a href="https://www.bankofengland.co.uk/-/media/boe/files/prudential-regulation/discussion-paper/2018/dp118.pdf">resilience</a>.</p>
<p>This initiative gave Financial Services organisations until 5<sup>th</sup> October to report on their exposure to risks and how they respond to outages.</p>
<p>One of the key aspects highlighted in this paper is the notion of cyber-tests. The structure of the paper clearly sets out the cyber-resilience aspects that will be tested by the regulators across the full incident lifecycle management: Preparation, Recovery, Governance and Communication.</p>
<figure id="post-11741 media-11741" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11741" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-1-2.png" alt="" width="847" height="607" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-1-2.png 847w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-1-2-267x191.png 267w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-1-2-768x550.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-1-2-54x39.png 54w" sizes="auto, (max-width: 847px) 100vw, 847px" /></figure>
<h2>Future of cyber-testing: the use of Red-Teaming by the regulators?</h2>
<p>The notion of cyber-resilience testing has also been put forward in the new testing framework published by the European Central Bank (ECB) in May 2018: the Threat Intelligence-based Ethical Red Teaming (TIBER) EU <a href="https://www.ecb.europa.eu/pub/pdf/other/ecb.tiber_eu_framework.en.pdf">Framework</a>. The objective of this framework is to facilitate an approach towards intelligence-led tests which mimic the tactics, techniques and procedures of real hackers posing a genuine threat.</p>
<p>Even if the UK regulators are not obliged to implement this framework, it could give them some ideas to use these types of tests across all industries (like they did for the NIS Directive).</p>
<p>We expect that failing these tests will expose financial services organisations to sanctions in a similar vein as the Financial stress tests conducted in the last couple of years.</p>
<h1>Cyber-resilience – Wavestone’s lessons learned</h1>
<p>Organisations affected by major cyberattacks cannot continue to use their IT as normal and must fully or partly stop them to clean or rebuild them. Indeed, in some cases, attackers destroy critical parts of the IT infrastructure whilst in other cases, they penetrate and propagate the IT system for weeks to steal data or corrupt internal systems (Advanced Persistent Threat), thus causing a loss of confidence in the IT system.</p>
<p>For an organisation, to be cyber-resilient means being able to maintain vital activities in a downgraded mode in the event of a major cyberattack, while taking actions to quickly regain confidence in the IT system to be able to operate it as usual.</p>
<p>At Wavestone, we have developed strong expertise in supporting major cyber-crisis and cyber-resilience programmes. You will find below what we have learned on the topic, and in particular the 3 key aspects we recommend working on to become cyber-resilient.</p>
<h2>Business Continuity Plans and Disaster Recovery Plans need to be reworked to face cyberthreats</h2>
<p>Today’s Business Continuity Plans and Disaster Recovery Plans aim to respond to scenarios like a pandemic or a datacentre physical destruction, but many have been built without taking into account major cyberattack scenarios and the possible loss of confidence in the organisation’s IT that could result from such cyberattacks.</p>
<p>Within an organisation, ‘everyday’ IT and ‘backup/recovery’ IT systems are close in many ways, especially to facilitate their operability. As a result, in the event of a major cyberattack, the recovery systems will most likely be compromised at the same time as the ‘everyday’ IT systems, for 3 main reasons:</p>
<ul>
<li>Replication systems could copy the malware between the main IT estate and the recovery systems; or</li>
<li>Attackers could exploit the administration infrastructure, common across both normal and recovery systems, to propagate within both; or</li>
<li>Finally, even if the recovery systems are fully isolated, attackers could still exploit vulnerabilities present within both. Then, triggering your recovery systems would open the door for the malware to spread.</li>
</ul>
<h2> 1. Prepare to contain the attack when it occurs</h2>
<p>Cyber-crises are specific:</p>
<ul>
<li>They last a long time (several weeks)</li>
<li>They are difficult to understand (what have the attackers been able to do? For how long? What are the impacts? etc.)</li>
<li>They involve third-parties who are often unprepared on the topic (lawyers, authorities, suppliers, clients, etc.)</li>
</ul>
<p>Therefore, current crisis management processes must be supplemented to cater for the various cyber threat aspects. In particular, it is necessary to carry out the organisational and technical actions below to contain the attack when it occurs.</p>
<h3>Organisational actions</h3>
<ul>
<li>Identify the necessary people to call upon during a crisis (management, forensic experts, IT department, business continuity staff, HR, communication team, etc.) and specify their roles and responsibilities, as well as what needs to be done to allow them to be rapidly mobilised when necessary
<ul>
<li>For instance, during the crisis, the IT department will have to prioritise its actions between the investigation, the definition and implementation of the defence plan, and business-as-usual (BAU) operations</li>
</ul>
</li>
<li>Define processes that allow quick decisions from operational teams for threat containment (systems shutdown, floodgate activation, etc.), without waiting for a decision from the Crisis Management Team (CMT)</li>
<li>Define appropriate processes to enable investigation activities and defence-plan-related activities in parallel, and to ensure 24/7 operations over a long time via rotations (logistics, HR, etc.)</li>
</ul>
<h3>Technical actions</h3>
<ul>
<li>Identify backup communication tools outside of normal IT to safely manage the crisis (alternative mail, website to oversee the decisions, directory, etc.), as the usual communication tools may be unavailable or no longer trusted</li>
<li>Make sure you have adequate investigation means to analyse and understand the attack (sufficient, safe and searchable logs, capability to analyse unknown malware, technical and functional cartography, detection processes based on business processes knowledge, etc.)</li>
<li>Define floodgates in your network to be able to limit the attack propagation by isolating the most sensitive systems from those already compromised</li>
<li>Make sure you have the right tools to protect the parts of the IT estate which are still safe once the threat has been isolated (quick patch deployment, etc.)</li>
</ul>
<p>That being so, it is essential to regularly test the cyber-crisis management process via crisis exercises using ambitious and realistic scenarios.</p>
<h2>2. Prepare to work without your IT</h2>
<p>Business teams need to learn how to work in a downgraded mode without IT to simulate it being unavailable or untrustworthy for a few days or weeks. This may seem a bit extreme, but is what impacted organisations had to overcome in 2017, so better being prepared than sorry.</p>
<p>At least, business teams should ask themselves the following key questions to define processes and tools accordingly:</p>
<ul>
<li>Can we work with manual workarounds? (paper, cash, etc.)
<ul>
<li>If not, how can we interrupt our business activities in a controlled manner?</li>
</ul>
</li>
<li>What data do we need? (client contracts, contractors or suppliers lists, business data, etc.)</li>
<li>What alternative tools do we need? (phones, applications like WhatsApp, applications like Gmail, etc.)</li>
</ul>
<p>As for the cyber-crisis management process, these alternative ways of working must be tested to ensure the continuity of essential activities in the event of a major cyberattack</p>
<h2>3. Prepare to rebuild your IT</h2>
<p>If the cyberattack is a destructive one or important parts of the IT estate cannot be cleaned of a malware infection, there may be a need to rebuild some workstations, applications or infrastructure to maintain vital business activities. This must be anticipated, and processes and tools must be defined and implemented accordingly.</p>
<p>Regarding workstations, a user-friendly package (USB key and documentation) can be created to allow end-users to rebuild their workstations themselves. Besides, mobile backup servers can be used to restore users’ data (drop-shipping), in case the network bandwidth is not sufficient to remotely restore it for example.</p>
<p>Regarding applications and infrastructure, the key to success relies on two points:</p>
<ul>
<li>Rebuilding must be prioritised according to business needs, which must be defined beforehand; and</li>
<li>Architectures must be standardised as much as possible to help automate and simplify their deployment in case they need to be rebuilt.</li>
</ul>
<figure id="post-11750 media-11750" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11750" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-2-2.png" alt="" width="915" height="464" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-2-2.png 915w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-2-2-377x191.png 377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-2-2-768x389.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-2-2-71x36.png 71w" sizes="auto, (max-width: 915px) 100vw, 915px" /></figure>
<p>&nbsp;</p>
<h2>Do not forget standard cybersecurity measures, without which cyber-resilience cannot be reached</h2>
<p>Implementing measures to address the 3 aforementioned cyber-resilience aspects will help you improve your cyber-resilience, but it is not sufficient. Efforts to do so must go hand-in-hand with efforts to ensure the appropriate protection and monitoring of your IT systems. Hopefully, this will help you avoid having to trigger these plans in the first place. So, keep up the hard work!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/02/cyber-resilience-latest-uk-developments/">Cyber-resilience lessons learned: the latest UK developments</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>2018 UK Cybersecurity Start-up Radar</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/02/2018-uk-cybersecurity-start-up-radar/</link>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Mon, 18 Feb 2019 08:54:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[radar]]></category>
		<category><![CDATA[startup]]></category>
		<category><![CDATA[thriving environment]]></category>
		<category><![CDATA[UK]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11709</guid>

					<description><![CDATA[<p>Cybersecurity remains a fast-evolving ecosystem that presents new threats to enterprises every day with hackers becoming increasingly innovative in their attempts to break into corporate networks and steal valuable data. As such, cybersecurity start-ups are playing an even more critical...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/02/2018-uk-cybersecurity-start-up-radar/">2018 UK Cybersecurity Start-up Radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Cybersecurity remains a fast-evolving ecosystem that presents new threats to enterprises every day with hackers becoming increasingly innovative in their attempts to break into corporate networks and steal valuable data. As such, cybersecurity start-ups are playing an even more critical role in providing disruptive and innovative solutions to novel cybersecurity challenges. </strong></p>
<p>Wavestone has created the 2018 UK cybersecurity start-up radar to capture this environment and will be updating this on an annual basis.</p>
<h1>A Thriving Start-up Environment</h1>
<p>The overall UK start-up landscape is booming, and the UK is certainly a European hub for cybersecurity start-ups to establish themselves. We found that a large number of them came from abroad to set-up in the UK; from far and wide locations such as Hong Kong to Israel and the US. Throughout our research, we analysed a total of 158 cybersecurity start-ups, narrowing this down to a final 78 cybersecurity start-ups based on our selection criteria (detailed later). Notably, in comparison to last year, we amended our selection criteria to be more UK-focused; catering for any start-ups that may have potentially overlapped with Wavestone’s US and French cybersecurity start-up radars.</p>
<figure id="post-11710 media-11710" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11710" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-1-1.png" alt="" width="1063" height="755" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-1-1.png 1063w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-1-1-269x191.png 269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-1-1-768x545.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-1-1-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-1-1-345x245.png 345w" sizes="auto, (max-width: 1063px) 100vw, 1063px" /></figure>
<p>&nbsp;</p>
<p>&nbsp;</p>
<figure id="post-11712 media-11712" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11712" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-2-1.png" alt="" width="1275" height="529" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-2-1.png 1275w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-2-1-437x181.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-2-1-768x319.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-2-1-71x29.png 71w" sizes="auto, (max-width: 1275px) 100vw, 1275px" /></figure>
<h1>Areas of Specialisation</h1>
<p>We chose the areas of specialisation ourselves and categorised the start-ups internally; as such, there is some element of subjection involved here. Our approach was to understand the essence of their offering and the field they are predominantly addressing. There was strong variety amongst the start-ups regarding their areas of specialisation, as the figures below show.</p>
<p>The top 3 most represented areas were:</p>
<ol>
<li><em> Identity &amp; Access Management (18%) </em></li>
<li><em> Data Security &amp; Collaboration (12%)</em></li>
<li><em> Application Security (9%)</em></li>
</ol>
<p>Conversely, the least represented areas were Physical Security, Anonymisation and Deception (each scoring 1%).</p>
<figure id="post-11714 media-11714" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11714" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-3.png" alt="" width="843" height="671" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-3.png 843w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-3-240x191.png 240w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-3-768x611.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-3-49x39.png 49w" sizes="auto, (max-width: 843px) 100vw, 843px" /></figure>
<p>Identity Access Management and Data Security &amp; Collaboration may have taken the top two spots given that they are both broad categories. Interestingly, some cloud security providers may have fallen into the two aforementioned categories and this may explain why there is a surprisingly low number of start-ups specialising in ‘Cloud Security’ (only 3%).</p>
<p>Overall, however, the above highlights that the cybersecurity start-ups are well-spread across all other categories; indicating that the market is healthy with a wide range of cybersecurity topics drawing entrepreneurial interest.</p>
<h1>Start-up distribution across the UK?</h1>
<p>&nbsp;</p>
<figure id="post-11717 media-11717" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11717" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-4.png" alt="" width="356" height="540" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-4.png 356w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-4-126x191.png 126w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-4-26x39.png 26w" sizes="auto, (max-width: 356px) 100vw, 356px" /></figure>
<p>Expectedly, the majority of these start-ups (65%) are London-based; perhaps explained by the growing demand from the UK’s financial services sector to secure their IT systems in the wake of several cyber-attacks over the last 3 years, such as the two-day DDoS attack on Lloyd’s Banking Group in January 2017.</p>
<p>Outside of London however, cybersecurity start-ups are looking to build out their operations from Research hubs across the UK. Cambridge was the second most popular location for start-ups in our radar (5%); a hotspot due to the strong pool of university students and knowledge-sharing, not to mention lower operating costs in comparison to London.</p>
<p>Other notable cities include Belfast (4%) and Manchester (3%); attractive candidates for young firms as these locations are hubs for growth and offer rich culture. Only one start-up located in Cheltenham, which is surprising given that this is the GCHQ’s primary location.</p>
<h1>Start-up development</h1>
<p>To gauge a sense of maturity, we looked at both foundation year and number of employees in parallel. As expected, our research found that the majority of our start-ups have 10 employees or less (62%) showing they are still very young and fittingly, most of these were also founded in the last 4 years. 2015 was the year that most of our start-ups (28%) were founded, with slightly more of the remaining population being established post-2015. This spike demonstrates the gathering momentum in the cybersecurity industry over recent years (particularly with cyber-attacks gaining more media coverage and increased demand for cybersecurity solutions amongst CIO agendas). In the last year, perhaps we haven’t seen as many start-ups because their solutions are not mature enough to be visible in the market yet.</p>
<p>Unsurprisingly, the 4 start-ups founded this year all have less than 10 employees each and it is not abnormal for these start-ups to remain small in employee size; for example, of those founded between 2012-2014 collectively, 10 out of 27 start-ups still only have 10 or less employees.</p>
<figure id="post-11719 media-11719" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11719" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-5.png" alt="" width="877" height="514" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-5.png 877w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-5-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-5-326x191.png 326w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-5-768x450.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-5-67x39.png 67w" sizes="auto, (max-width: 877px) 100vw, 877px" /></figure>
<p>&nbsp;</p>
<p><strong>Support for Start-Ups</strong></p>
<p>Numerous accelerators and incubators support the UK start-up ecosystem and play a critical role in its development by providing mentoring, courses and networking opportunities amongst other initiatives:</p>
<figure id="post-11732 media-11732" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11732" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-7.png" alt="" width="766" height="297" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-7.png 766w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-7-437x169.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-7-71x28.png 71w" sizes="auto, (max-width: 766px) 100vw, 766px" /></figure>
<p>Alongside these accelerators, it has been encouraging to see the UK Government casting more attention to the growing cybersecurity sector, not least driven by serious breaches to UK infrastructure e.g. the WannaCry attack on the NHS last year. In March this year for example, the Department for International Trade (DIT) launched a new Cybersecurity Export Strategy detailing how the Government aims to support UK cybersecurity firms in protecting overseas enterprises. This initiative, alongside others such as the National Cybersecurity Centre (NCSC), are all part of the <em>‘National Cyber Security Strategy 2016 to 2021’</em>, which was launched by the UK Government to outline how they will protect UK businesses through £1.9bn of investment into cybersecurity. These programmes combined are a real driving force behind the development of the UK cybersecurity sector and present a wealth of opportunities for start-ups to benefit from.</p>
<figure id="post-11721 media-11721" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11721" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6.png" alt="" width="719" height="715" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6.png 719w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6-192x191.png 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6-128x128.png 128w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6-175x175.png 175w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6-130x130.png 130w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6-115x115.png 115w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/02/Image-6-30x30.png 30w" sizes="auto, (max-width: 719px) 100vw, 719px" /></figure>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/02/2018-uk-cybersecurity-start-up-radar/">2018 UK Cybersecurity Start-up Radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
