<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jérôme de Lisle, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/jerome-de-lisle/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/jerome-de-lisle/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 23 Feb 2024 09:34:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Jérôme de Lisle, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/jerome-de-lisle/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Bug Bounty: Insight and benchmark on the banking and public sectors 2024</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/02/bug-bounty-insight-and-benchmark-on-the-banking-and-public-sectors-2024/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/02/bug-bounty-insight-and-benchmark-on-the-banking-and-public-sectors-2024/#respond</comments>
		
		<dc:creator><![CDATA[Jérôme de Lisle]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 09:34:52 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[BugBounty]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22539</guid>

					<description><![CDATA[<p>About the study: This study is based on publicly available data up to Q3 2023 and aims to outline the various active Vulnerability Disclosure initiatives within the 100 largest banks and the EU countries. Bug Bounty? A Bug Bounty program...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/02/bug-bounty-insight-and-benchmark-on-the-banking-and-public-sectors-2024/">Bug Bounty: Insight and benchmark on the banking and public sectors 2024</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><strong>About the study</strong>: This study is based on publicly available data up to Q3 2023 and aims to outline the various active Vulnerability Disclosure initiatives within the 100 largest banks and the EU countries.</p>
<p style="text-align: justify;"><strong>Bug Bounty?</strong> A Bug Bounty program is a crowdsourcing initiative wherein ethical hackers are rewarded by companies for finding and reporting vulnerabilities.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In the ever-evolving landscape of cybersecurity, the banking and public sectors have increasingly embraced various vulnerability disclosure initiatives. Reflecting on <a href="https://www.riskinsight-wavestone.com/en/2021/01/bug-bounty-insight-and-benchmark-on-the-banking-industry-2021/">Wavestone&#8217;s 2021 report</a>, it&#8217;s crucial to understand the three key approaches that shaped the previous research:</p>
<ul style="text-align: justify;">
<li><strong>Vulnerability Report Channels</strong> (VRCs): These are the first step toward a bug bounty program, a web page providing basic instructions to hackers and a reporting channel.</li>
<li><strong>Vulnerability Disclosure Policies</strong> (VDPs): These policies outline how an organization receives and responds to disclosed vulnerabilities from external parties. The existence of a VDP implies the presence of a VRC as part of its framework.</li>
<li><strong>Bug Bounty Programs</strong> (BBPs): An advanced form of VDPs, and alongside the policy, BBPs offer financial rewards for reporting security vulnerabilities, incentivizing the discovery and disclosure of security issues. It can be accessible to anyone (public) or a small number of hackers (private).</li>
</ul>
<p style="text-align: justify;">These initiatives are not just procedural but bring significant benefits. They enable earlier detection of vulnerabilities, foster a culture of transparency and continuous improvement, and leverage the global cybersecurity community&#8217;s expertise to enhance security measures. By incentivizing ethical hacking, organizations can stay one step ahead of potential threats, protecting their data and systems more effectively.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>Overview of Research</strong></h2>
<p style="text-align: justify;">This study, leveraging data up to Q3 2023, examines the adoption and impact of these cybersecurity measures in the banking and public sectors. The research methodology involves a thorough analysis of current trends, regulatory landscapes, and the effectiveness of BBPs in enhancing digital security.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>Banking sector insights</strong></h2>
<p style="text-align: justify;">The banking sector, serving as the backbone of the global financial system, has shown a remarkable transformation in its approach to cybersecurity. The analysis of the world’s top 100 banks between <a href="https://www.riskinsight-wavestone.com/en/2021/01/bug-bounty-insight-and-benchmark-on-the-banking-industry-2021/">2020</a> and 2023 reveals significant developments in the adoption of cybersecurity measures. Here are some key insights:</p>
<ul style="text-align: justify;">
<li><strong>Increase of VRCs and VDPs</strong>: There was a marked increase in the implementation of VRCs and VDPs, by 2023, 34% of the top 100 banks had at least one active VRC, and 26% had implemented a VDP.</li>
<li><strong>Geographical Trends</strong>:
<ul style="text-align: justify;">
<li><strong>Dominance in Europe and North America</strong>: Banks located in the United States and European countries demonstrated higher adoption rates of VRCs and VDPs. Delving deeper into the continent analysis, Figure 1 shows that North America, with 72% of banks implementing VRCs against Europe’s 49%, continues to be ahead in adopting cybersecurity initiatives.</li>
</ul>
</li>
</ul>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-22522 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image1.png" alt="" width="481" height="167" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image1.png 481w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image1-437x152.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image1-71x25.png 71w" sizes="(max-width: 481px) 100vw, 481px" /></p>
<ul style="text-align: justify;">
<li style="list-style-type: none;">
<ul style="text-align: justify;">
<li><strong>Asia and South America</strong>: Despite managing 46% of the assets across 43 banks, only one implemented a VDP, indicating a slower pace of adopting for these kinds of programs.</li>
</ul>
</li>
<li><strong>Stale number of Public BBPs:</strong> The data showed a stagnation in the number of public BBPs, with only 5% of the banks operating a public BBP as of 2023. This suggests a cautious approach towards publicly inviting vulnerability disclosures.</li>
<li><strong>Notable Countries</strong>: The Netherlands stands out with a 100% adoption rate of vulnerability disclosure programs among its top banks. This demonstrates a strong national commitment to cybersecurity.</li>
<li><strong>Platform Utilization</strong>: Most banks preferred developing in-house programs for vulnerability disclosure, with a few opting for external platforms like BugCrowd, Synack, and HackerOne.</li>
</ul>
<p> </p>
<h2 style="text-align: justify;"><strong>Luxembourg: A Case Study</strong></h2>
<p style="text-align: justify;">Luxembourg&#8217;s banking sector case study focused on 5 retail and 17 private banks, provides a snapshot of current cybersecurity practices:</p>
<ul style="text-align: justify;">
<li><strong>Overall low Adoption Rates:</strong> Only a minority of the 22 banks have embraced structured cybersecurity programs. Specifically, only 7 out of 22 banks have established VRCs, including only 5 banks which adopted VDPs and just 1 bank which implemented a Public BBP.</li>
<li><strong>External hacker Interest</strong>: Some banks received external reports through OpenBugBounty.org, demonstrating hackers&#8217; interest in showing vulnerabilities, despite not having a formal active program.</li>
<li><strong>Overall Trend</strong>: The sector shows a need for more consistent adoption of structured cybersecurity strategies, especially considering the high stakes in private banking.</li>
</ul>
<p> </p>
<h2 style="text-align: justify;"><strong>Public Sector Analysis and Regulation</strong></h2>
<p style="text-align: justify;">The public sector&#8217;s approach to cybersecurity, especially within the EU27, shows a complex and evolving landscape. Key aspects of this analysis include:<img decoding="async" class="wp-image-22524  alignright" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image2.png" alt="" width="342" height="353" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image2.png 525w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image2-185x191.png 185w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image2-38x39.png 38w" sizes="(max-width: 342px) 100vw, 342px" /></p>
<ul style="text-align: justify;">
<li><strong>Growth in Coordinated Vulnerability Disclosure (CVD): </strong>Compared with <a href="https://www.enisa.europa.eu/news/enisa-news/coordinated-vulnerability-disclosure-policies-in-the-eu">ENISA&#8217;s 2021 study</a>, there has been a significant increase in the adoption of active CVD policies. The number of EU27 Member States with active CVD has risen from 4 to 11, indicating a growing emphasis on structured cybersecurity strategies.</li>
<li><strong>The UK&#8217;s Proactive Stance</strong>: Despite being outside the EU27, the United Kingdom has made remarkable efforts in implementing active CVD. This highlights the UK&#8217;s commitment to maintaining robust cybersecurity standards.</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Conclusion and Future Outlook</strong></h2>
<p style="text-align: justify;">As the digital world advances, the significance of vulnerability disclosure programs is increasingly clear. They represent not just a trend, but a fundamental shift in how organizations approach cybersecurity:</p>
<ul style="text-align: justify;">
<li><strong>The Rise of Vulnerability Disclosure</strong>: A dynamic and rapidly expanding area, these programs are becoming essential in the banking and public sectors.</li>
<li><strong>European Regulatory Momentum</strong>: With the EU&#8217;s NIS2 directive and forthcoming legislations like the CRA, there is a robust push for national CVD policies and organizational VDPs/BBPs.</li>
</ul>
<p style="text-align: justify;">At <strong>Wavestone</strong>, we understand the importance of staying ahead in this evolving scenario. We are here to help you navigate these changes effectively. Reach out to us for expert guidance in strengthening your cybersecurity position.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/02/bug-bounty-insight-and-benchmark-on-the-banking-and-public-sectors-2024/">Bug Bounty: Insight and benchmark on the banking and public sectors 2024</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/02/bug-bounty-insight-and-benchmark-on-the-banking-and-public-sectors-2024/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Improving Incident Response through Automation: An overview of SOAR platforms</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/11/improving-incident-response-through-automation-an-overview-of-soar-platforms/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/11/improving-incident-response-through-automation-an-overview-of-soar-platforms/#respond</comments>
		
		<dc:creator><![CDATA[Jérôme de Lisle]]></dc:creator>
		<pubDate>Fri, 18 Nov 2022 09:00:00 +0000</pubDate>
				<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[CSIRT]]></category>
		<category><![CDATA[SOAR]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19051</guid>

					<description><![CDATA[<p>The increase in cyberattacks witnessed over the last few years can be partially attributed to the evolution and spread of automation tools, which are leveraged to perform wider attacks with fewer resources. Many steps of an attack can be automated...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/11/improving-incident-response-through-automation-an-overview-of-soar-platforms/">Improving Incident Response through Automation: An overview of SOAR platforms</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The increase in cyberattacks witnessed over the last few years can be partially attributed to the evolution and spread of automation tools, which are leveraged to perform wider attacks with fewer resources. Many steps of an attack can be automated today, – for instance, exploration and lateral movements can be automated with Mimikatz – enabling even entry-level attackers to attempt malicious actions and sometimes succeed.</p>
<p style="text-align: justify;">To fight this growing threat on equal terms, incident response teams – Security Operations Centres (SOCs) and Computer Security Incident Response Team (CSIRTs) – can benefit from a wide range of automated security tools. A type of solutions gradually gaining more attention are Security Orchestration, Automation and Response (SOAR) platforms. These tools combine together incident response, orchestration and automation, and threat intelligence platform management capabilities.</p>
<p style="text-align: justify;">Notwithstanding the ultimate benefits, <strong>introducing any automated tool in existing incident response processes is no easy task. It presents new challenges to the teams, especially to define what tasks and decisions should be automated and which require human expertise instead. </strong></p>
<p style="text-align: justify;">This article aims to present an overview of SOAR platforms and provide best practices and recommendations on how to address some challenges faced by incident response teams as they approach SOAR solutions. First, it breaks down the potential uses of SOAR platforms in support of all incident response phases. Then, it dives deeper into some of the considerations and decisions that teams have to make, offering concrete recommendations as well. Last, it briefly looks into the of role of humans as opposed to AI-enhanced platforms.</p>
<h1> </h1>
<h1 style="text-align: justify;">Supporting the incident response process</h1>
<p> </p>
<p style="text-align: justify;">Bringing together all security tools, a SOAR platform can work as the conductor of the security ecosystem in an organisation, streamlining the incident response process. It can indeed support and facilitate all key phases of the incident response, including triage and prequalification, investigation and analysis, and last response and remediation.</p>
<p><img decoding="async" class="aligncenter wp-image-19037 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Image1-1.png" alt="" width="465" height="234" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Image1-1.png 465w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Image1-1-380x191.png 380w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Image1-1-71x36.png 71w" sizes="(max-width: 465px) 100vw, 465px" /></p>
<p style="text-align: center;"><em>Figure 1 &#8211; High level SOAR integration model</em></p>
<p style="text-align: justify;">During the triage and prequalification phase, a SOAR platform can collect alerts coming from specialized incident detection tools, like Security Information and Event Management (SIEM) tools. While this is a consolidated activity run by well-established tools, two major issues remain, concerning false positives detection and threat prioritisation based on contextual information.</p>
<p style="text-align: justify;">This is where SOAR platforms can be helpful, by automatically enriching incidents, filtering out false positives and then highlighting critical security incidents. On one hand, relevant Indicators of Compromise (IoCs) can be automatically from reputable sources, such as cyber threat intelligence (CTI) providers offering highly tailored data from recent breaches occurred to similar organisations. On the other hand, internal knowledge can be ingested as well, drawing from predefined assets classification or machine-readable business impact analysis (BIA) results. This enables analysts to save time and directly tackle critical incidents, having all the information needed to focus on incident response.</p>
<p style="text-align: justify;">In the incident investigation and qualification phase, a CSIRT can benefit from SOAR support by automating basic use cases management. While the first phase concerned more automated actions triggered from systems alerts, for instance CTI enrichment based on SIEM alerts, in the investigation phase the value added of a SOAR platform consists mostly of supporting the team’s analysis. For example, when a phishing email is reported, the SOAR platform can facilitate the collection of information needed to perform the investigation and qualification of the incident, thus making it more efficient. However, the expert’s assessment can hardly be automated for more complex tasks, like thorough analysis and qualification of complex incidents.</p>
<p style="text-align: justify;">The response and remediation phase remains the most complicated to automate, due to both the nature of the actions required and the risk of negatively impacting the business if a remediation is executed poorly. Automating a response action must allow to capitalise on the efficiency gains, while keeping into consideration the cost-benefits assessment. </p>
<p style="text-align: justify;">SOAR platforms therefore can significantly facilitate the work of cybersecurity analysts, who do not have to process every incident, from tool to tool, manually, at each step of the incident response process, but can rather rely on automated tasks involving several security tools working together. After seeing different possible applications, the following question concerns how to choose what to automate.</p>
<h1> </h1>
<h1 style="text-align: justify;">Deciding when to automate based on the low-regret impact principle</h1>
<p> </p>
<p style="text-align: justify;">For each IR task, there exist three different approaches for SOAR platforms:</p>
<ul style="text-align: justify;">
<li>Full automation,</li>
<li>Semi automation,</li>
<li>No automation.</li>
</ul>
<p style="text-align: justify;">In full automation cases, multiple steps are pre-defined and automated in sequence, based on pre-set triggers or manual activation. Simple use cases, like the previously mentioned phishing emails, can build on full automation and provide substantial benefits to minimise time-consuming and repetitive tasks.</p>
<p style="text-align: justify;">In semi automation cases, some steps – e.g., initial analysis, evidence collection, or information enrichment – are automated to enable the analyst to choose the best course of action. This might indeed be the most common usage of SOAR platform at the moment.</p>
<p style="text-align: justify;">Last, some situations just do not allow for automation and will continue to require and be performed by human operators.</p>
<p style="text-align: justify;">As IR teams explore the functionalities and potential of SOAR platforms, it is common to wonder how to choose what use cases can and should be automated. Besides a feasibility assessment, a fundamental driver to adopt is the low-regret impact principle. Considering that security is always a supporting function of business objectives, a careful risk-analysis is needed when there is the risk to affect business units or services. A benefit-versus-regret assessment leads organisations to change their perspective on the problem by making them choose <em>when</em> certain actions can be automated instead of <em>whether</em> they can be automated.</p>
<p style="text-align: justify;">To provide a more sophisticated and realistic picture, two observations are in order. First, this choice is usually non-binary (e.g., high-regret vs. low-regret), since there should be growing levels of risks and reasonable confidence, based on an organisation’s risk appetite. Regret is better quantified on a scale. Second, such cost-benefit analysis is necessarily contextual, meaning that it has to take into account the situational conditions in which it is taken. During an ongoing crisis, automated actions might become more or less appealing, given the evolving risk calculation.</p>
<p style="text-align: justify;">In concrete, actions with very little chance to disrupt business operations are to be considered low-regret actions, allowing for greater automation. Actions with the potential to cause widespread or impactful disruptions when carried out incorrectly can be assessed as medium-regret actions, requiring human confirmation to complete the workflow. Finally, actions that would disrupt business activities in an unacceptable way (e.g., disruption of highly-critical assets) are seen as high-regret actions, discouraging automation. Nevertheless, in particular circumstances, such scale can be revised and adapted.</p>
<h1> </h1>
<h1 style="text-align: justify;">Adopting a progressive approach</h1>
<p> </p>
<p style="text-align: justify;">Once the basic concepts about SOAR solutions are defined, IR teams face another major challenge related to change management. Switching from manual playbooks to automated workflows entails a burdensome process that require careful prioritisation. An increasing degree of automation can be reached through a gradual and progressive approach.</p>
<p style="text-align: justify;">Simple tasks that are time-consuming and present a low-regret risk can be automated first, reducing the low added-value workload of IR analysts and increasing their efficiency. This can be set up quickly, given the technical feasibility of such actions (e.g., existing API). In addition, standardising tasks can accelerate further automation stages by making them reusable in different playbooks or branches. Indeed, it is better to start automating easy playbooks’ branches, like clearing-out false positive, before extending the automation to the whole playbook where all possibilities of an alert have to be considered.</p>
<h1> </h1>
<h1 style="text-align: justify;">AI supporting humans’ activities</h1>
<p> </p>
<p style="text-align: justify;">Some SOAR solutions rely on and benefit from Artificial Intelligence (AI), whereby a machine learning (ML) model can be trained on specific data fed to it. For example, a dataset of phishing emails classified according to different values (e.g., legitimate, malicious, spam) can train the ML model.</p>
<p style="text-align: justify;">AI-enhanced SOAR solutions can help to quickly resolve simple incidents or easily identify automatable actions, yet the human reasoning will better contextualise choices based on business and operational considerations. Ultimately, no automated solution can work without the intervention and supervision of analysts yet. Instead, AI is mostly meant to perform a specialized single task efficiently by processing large amounts of data. This highly improves the team’s efficiency, working alongside humans, rather than replacing them.</p>
<h1> </h1>
<h1 style="text-align: justify;">Conclusion</h1>
<p> </p>
<p style="text-align: justify;">All considered, SOAR platforms are powerful tools. While they can support IR teams throughout all stages of their everyday work, including information collection, analysis and active response, it should be emphasised that SOARs are not magic tools capable of solving all issues and problems teams face today. On the contrary, purchases not followed by well-defined implementation projects will likely result in ineffective outcomes and low returns on investments. On the technical side, SOARs cannot perform tasks that backend systems do not allow; on the organisational side, they will always rely on well-established, standardised, and tested processes and procedures. As organisations evaluate their adoption and consequently navigate the steps to integrate them and capitalise on their potential, driving principles like low-regret impact and a progressive approach determine the ultimate result and benefits teams are aiming to gain.</p>
<p> </p>
<p style="text-align: justify;"><em>Thanks to Fabien Leclerc for the research and writing support</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/11/improving-incident-response-through-automation-an-overview-of-soar-platforms/">Improving Incident Response through Automation: An overview of SOAR platforms</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/11/improving-incident-response-through-automation-an-overview-of-soar-platforms/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Bug Bounty: insight and benchmark on the banking industry 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/01/bug-bounty-insight-and-benchmark-on-the-banking-industry-2021/</link>
		
		<dc:creator><![CDATA[Jérôme de Lisle]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 07:00:43 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[bug bounty]]></category>
		<category><![CDATA[program]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14940</guid>

					<description><![CDATA[<p>&#160; What is a bug bounty and what is it used for? Mere buzzwords a few years ago, bug bounty programmes and vulnerability disclosure initiatives have since permeated the cyber-related vocabularies of a wide range of organisations, whether it be...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/bug-bounty-insight-and-benchmark-on-the-banking-industry-2021/">Bug Bounty: insight and benchmark on the banking industry 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-14941 media-14941" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14941 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-1.png" alt="" width="1375" height="508" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-1.png 1375w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-1-437x161.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-1-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-1-768x284.png 768w" sizes="auto, (max-width: 1375px) 100vw, 1375px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">What is a bug bounty and what is it used for?</h2>
<p style="text-align: justify;">Mere buzzwords a few years ago, bug bounty programmes and vulnerability disclosure initiatives have since permeated the cyber-related vocabularies of a wide range of organisations, whether it be digital giants, top investment banks, or government bodies. The basic principle is the following: companies provide a financial incentive or reward for well-intentioned hackers to find and report vulnerabilities discovered in their assets. The catch is that the company behind the initiative sets a fixed window of opportunity for hackers to discover and fix these vulnerabilities. Wavestone has studied the adoption of these initiatives within the banking sector and the good practices to be drawn from such initiatives.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">3 levels of maturity: Reporting Channel, Vulnerability Disclosure Policy and Bug Bounty Programmes</h2>
<p style="text-align: justify;">When it comes to vulnerability disclosure, the initiatives are various and the terminology is broad, whether it is Coordinated Vulnerability Disclosure, Responsible Vulnerability Disclosure or Vulnerability Disclosure Policy. All of these initiatives aim at providing researchers with a safe way to report vulnerabilities, yet the level of detail regarding the reporting process, rules for searching for vulnerabilities and the expectations of the organisation in question varies greatly from one programme to another. In the light of these observations, we identified 3 levels of maturity as follows: Reporting Channel, Vulnerability Disclosure Policy (VDP) and Bug Bounty Programmes (BBP).</p>
<p style="text-align: justify;">The first level of maturity, <em>Reporting Channel, </em>generally consists of a simple web page providing very basic instructions and a dedicated channel to report vulnerabilities. This first step toward vulnerability disclosure acts as a safety net in case someone discovers a vulnerability, but it doesn’t actively attract hackers, particularly due to the lack of monetary incentive. Reporting Channel is the second most common type of initiative, accounting for 28% of the identified initiatives.</p>
<p style="text-align: justify;">The second level of maturity, <em>Vulnerability Disclosure Policies,</em> also takes the format of a dedicated web page but this time with much more detail. It contains advanced information on reporting processes, the assets in scope, and the preferences, rules and exceptions for vulnerability researching. Furthermore, in most cases (90%), information regarding the expectations that hackers may have after submitting a report in terms of both service-level agreements (SLAs) and public recognition for their work are outlined. In many of these initiatives (77%), companies commit to providing hackers with safe harbour and not pursuing legal action against hackers if they follow the rules and act in good faith. This kind of initiative can be managed internally or by a third-party platform (HackerOne, BugCrowd, Synack…) that will communicate with hackers and oversee bug triage.</p>
<p style="text-align: justify;">Finally, <em>Bug Bounty Programmes </em>represent the highest level of maturity, as it features the same level of information as <em>Vulnerability Disclosure Policy</em> but this time, hackers are financially rewarded for reporting vulnerabilities. This aims to attract talented hackers and make bug bounties a fully-fledged tool in banks’ cyber-ecosystems. Third-party platforms can either manage these programmes or set up private programmes to which only vetted hackers will have access (following a background and skills check). In many cases, private programmes are used as a steppingstone to bug bounty, allowing companies to gain experience with the concept before moving on to a public programme. They also make it possible to implement advanced security features (full research monitoring through VPNs, Non-Disclosure Agreements, advanced vetting, on-location research&#8230;) which make it easier to comply with the security and confidentiality standards that are common in the banking sector.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">The banking industry is not outdistanced by other industries</h2>
<p style="text-align: justify;">These initiatives were implemented by 18% of the studied banks, which is 2.5 times higher than the average reported in the Forbes Global 2000<em>.</em> Therefore, it can be said that the banking sector has well-integrated vulnerability disclosure processes as part of its cyber ecosystem, with the banking and insurance sector ranking in 3rd position in terms of number of programmes for Internet and online services and computer software. However, it is not the most attractive from a financial point of view, ranking in 12th place in terms of the average remuneration for a critical vulnerability, with blockchains and crypto currencies offering an average remuneration that is almost 3 times higher (source: HackerOne’s Hacker Powered Security Report 2019).</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Western banks are more confident about engaging in vulnerability disclosure processes</h2>
<p style="text-align: justify;">Although the adoption of vulnerability disclosure processes in the banking sector seems to be global, this research found that initiatives are mainly adopted by European and American banks with some specificities. These observations can be explained by several factors.</p>
<p style="text-align: justify;">In the US, vulnerability disclosure has long been part of the culture of tech industry giants such as Google and Facebook which, among other companies, launched their own programmes before 2012. The US are also home to players that now rank among the world&#8217;s leading bug bounty platforms, including BugCrowd (2011), HackerOne (2012) and Synack (2013). It is therefore not a surprise to see that these platforms are managing most of the American banks&#8217; vulnerability disclosure programmes.</p>
<p style="text-align: justify;">In Europe, the situation is different and there are fewer key players. After several major cyber incidents, the Netherlands was the first country in Europe to launch a national initiative by publishing the <em>Guidelines for Coordinated Vulnerability Disclosure (2013)</em> &#8211; a collaborative effort between the Dutch Government&#8217;s National Cyber Security Centrum (NCSC) and various private sector companies. Today, nearly 70% of the major Dutch banks have a self-managed bug bounty programme and the country has played a key role in the construction of EU guidelines on the subject matter. It is also regularly referred to as an example to be followed by several European authorities. Other initiatives and platforms have also emerged elsewhere in Europe, such as YesWeHack, Intigriti, HackenProof, Yogosha, etc. However, it is difficult to precisely assess the emergence of bug bounty programmes across Europe, as more than half of them are private and lack publicly available information for the purpose of confidentiality.</p>
<p style="text-align: justify;">In Asia, banks are less proactive on vulnerability disclosure on account of reservations about private programmes and other cultural factors. However, the last few years have seen growing initiatives from both Asian technology giants and government institutions, notably in Singapore and Japan. This is not surprising, as many government institutions have launched this type of initiative in the past (for example, Hack The Pentagon in the USA or the recent StopCovid application&#8217;s bug bounty that is managed by YesWeHack in France).</p>
<p>&nbsp;</p>
<figure id="post-14943 media-14943" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-14943" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-2-1.png" alt="" width="1369" height="822" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-2-1.png 1369w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-2-1-318x191.png 318w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-2-1-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-2-1-768x461.png 768w" sizes="auto, (max-width: 1369px) 100vw, 1369px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Getting into vulnerability disclosure will require truly effective preparation</h2>
<p style="text-align: justify;">With many success stories and a growing number of companies from all sectors launching vulnerability disclosure programmes, it is tempting to follow the trend. However, to ensure the success of this type of initiative, it is crucial to address a few points. First, a vulnerability or bug bounty disclosure programme should be part of a global cyber security approach and be complementary to more traditional measures such as regular code reviews, security by design and security/pentest audits. Reporting bugs and flaws is only the first step of the process. The company must then have the in-house skills to analyse the provided reports and remediate the vulnerabilities as soon as possible. Second, to avoid wasting both the hackers’ and the company’s time, the scope of the programme must be carefully designed in order to maximize its effectiveness and prevent intrusion on unwanted assets. The same rules apply when it comes to the rules for searching and reporting. Finally, it is crucial to address hackers’ motivations to ensure the success of a bug bounty programme. Expectations for submitting a report must be clearly specified and address the process, response time and reward. Constant communication with the hacker community as well as an evolution of the programme or the rewards are some key elements that can ensure the sustainability of the programme and the motivation of hackers, thus contributing to the programme’s success.</p>
<p>&nbsp;</p>
<figure id="post-14945 media-14945" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14945 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-3-1.png" alt="" width="1369" height="686" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-3-1.png 1369w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-3-1-381x191.png 381w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-3-1-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-3-1-768x385.png 768w" sizes="auto, (max-width: 1369px) 100vw, 1369px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">The image of hackers is still often associated with criminal actions&#8230;</h2>
<p style="text-align: justify;">When it comes to bug bounty, one of the main concerns is security, with organisations questioning whether exposing their platforms to hackers might lead to exploitation of any discovered vulnerabilities through the sale of user data or the vulnerabilities themselves directly on the black market.</p>
<p style="text-align: justify;">These fears are partly justified, as user data can now easily be sold on the black market: credit cards, passports, medical records or authentication information can be sold for less than EUR 15 and targeted phishing using this information can generate even more profit. A critical flaw can also be exploited and result in a much larger cyber-attack, as demonstrated by the havoc wreaked by cryptolockers in recent years. However, these incidents are rarely linked to bug bounty programmes, as malicious hackers do not wait for organisations to launch bug bounty programmes in order to attack them. Rather, these attacks can occur at any time.</p>
<p style="text-align: justify;">Secondly, different skills and levels of preparation are required to find vulnerabilities and exploit them.</p>
<p style="text-align: justify;">Finally, money is the primary motivation for hackers participating in these programmes in less than 15% of cases, according to HackerOne. For the majority of hackers, hacking is a passion and they are mostly looking for challenges and opportunities to improve their skills and make the web more secure &#8211; in this case, financial rewards are just a small bonus and getting on the wrong side of the law is not worth it.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Vulnerability Disclosure Policy: a first step to improve cyber security</h2>
<p style="text-align: justify;">Vulnerability disclosure and bug bounty initiatives are now a mainstream topic in the cyber security field, and the banking sector is no exception. Although bug bounty programmes are not miracle solutions and some effort is required in order to ensure that they are really effective, implementing a Vulnerability Disclosure Policy appears to add a great additional layer of security for a low investment. We can therefore only recommend implementing such a policy as soon as an organisation’s cyber maturity allows for it.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/bug-bounty-insight-and-benchmark-on-the-banking-industry-2021/">Bug Bounty: insight and benchmark on the banking industry 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
