<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Matthieu Garin, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/matthieu-garin/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/matthieu-garin/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 25 Oct 2021 13:34:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Matthieu Garin, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/matthieu-garin/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Assises 2021: fighting back against ransomware: how the CAC40 is reacting?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/10/fighting-back-against-ransomware-how-the-cac40-is-reacting/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/10/fighting-back-against-ransomware-how-the-cac40-is-reacting/#respond</comments>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Mon, 25 Oct 2021 10:44:32 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17186</guid>

					<description><![CDATA[<p>Attacks are multiplying and diversifying in terms of both their technical development and the methods of extortion. Despite recent arrests and diplomatic moves, these Ransomware attacks will remain very prevalent in 2022. But what is the real level of CAC...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/fighting-back-against-ransomware-how-the-cac40-is-reacting/">Assises 2021: fighting back against ransomware: how the CAC40 is reacting?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attacks are multiplying and diversifying in terms of both their technical development and the methods of extortion. Despite recent arrests and diplomatic moves, these Ransomware attacks will remain very prevalent in 2022. But what is the real level of CAC 40 companies faced with this threat? How do these large accounts structure and monitor large-scale anti-ransomware programs? And what projects should be put in place to anticipate future developments?</p>



<p>Discover below the presentation presented during the Assises 2021</p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex">
<div class="wp-block-button"><a class="wp-block-button__link has-background" href="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/2021_Wavestone_Assises_ransomware-CAC40-fighting-back.pdf" style="background-color:#503078" target="_blank" rel="noreferrer noopener"><strong>Discover insight</strong></a></div>
</div>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/fighting-back-against-ransomware-how-the-cac40-is-reacting/">Assises 2021: fighting back against ransomware: how the CAC40 is reacting?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/10/fighting-back-against-ransomware-how-the-cac40-is-reacting/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Organise a cyber crisis exercise in a large company</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/07/organise-a-cyber-crisis-exercise-in-a-large-company/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Thu, 08 Jul 2021 12:00:18 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[COMEX]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberawareness]]></category>
		<category><![CDATA[exercice]]></category>
		<category><![CDATA[management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13884</guid>

					<description><![CDATA[<p>Organising a cyber crisis exercise is not an easy task.&#160;From&#160;the preparation to the D-Day, a lot of&#160;unforeseen&#160;events&#160;can&#160;occur&#160;and the preparation&#160;teams&#160;need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/07/organise-a-cyber-crisis-exercise-in-a-large-company/">Organise a cyber crisis exercise in a large company</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><i><span data-contrast="auto">Organising a cyber crisis exercise is not an easy task.&nbsp;From&nbsp;the preparation to the D-Day, a lot of&nbsp;unforeseen&nbsp;events&nbsp;can&nbsp;occur&nbsp;and the preparation&nbsp;teams&nbsp;need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise in a large company.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:264}">&nbsp;</span></p>
<h2></h2>
<h2 style="text-align: justify;"><strong>ORGANISING&nbsp;A CYBER CRISIS EXERCISE IN A LARGE COMPANY&nbsp;</strong></h2>
<p style="text-align: justify;"><span data-contrast="auto">There are many reasons to organise a Cyber crisis exercise: evaluating the integration of Cyber security in the crisis management system, improving interactions between the different teams, and testing the capacity of the security division to make itself understood by top management.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">From a simple table-top process test to SOC/CERT training to a large-scale exercise involving dozens of crisis&nbsp;teams&nbsp;and months of preparation, the resources&nbsp;</span><span data-contrast="auto">allocated to a crisis simulation vary greatly</span><span data-contrast="auto">.&nbsp;This article focuses on&nbsp;the&nbsp;last category.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h2></h2>
<h2><strong>WHAT’S A TYPICAL CRISIS EXERCISE?&nbsp;</strong></h2>
<p style="text-align: justify;"><span data-contrast="auto">Looking at the figures, some of the largest crisis exercises in France have consisted of one day of activity, 150 people mobilised, 10-12 crisis teams in several countries, 30 facilitators, 20 observers and more than 300 stimuli. Being able to make a success of such an event requires both a high level of preparation and a very solid facilitation team on the D-day.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">One of the key issues found in these types of exercises is that there is only one take. It is therefore essential that ALL the actors take part in the game, and that the scenario involves all the participants. Preparation and facilitation are key in such exercises to make sure the time spent on the simulation is worthwhile. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h2 aria-level="2"></h2>
<h2 style="text-align: justify;" aria-level="2"><strong>SIX MONTHS TO PREPARE</strong><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:80,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></h2>
<h4 aria-level="2"></h4>
<h3 style="text-align: justify;" aria-level="3"><strong>1/&nbsp;Selecting&nbsp;the attack scenario&nbsp;</strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">The first months of work are always devoted to the attack scenario. Ransomware, targeted fraud, attacking suppliers… the choice of weapons is large. In ambitious exercises, it is not rare to combine several attacks in one crisis: smoke screen launched by the attackers, identification of a second group during the investigation, etc. Whatever the scenario chosen, the key is to be as precise as possible:</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="2" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">What are the attackers’ motives?</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">What path of attack did they take?</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">When was the first intrusion?</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">The exercise is long and preparation beforehand is needed, especially when 150 players investigate an attack for several hours. Spear-phishing, water holing, code compromise, privilege escalation: the vulnerabilities used by the fictitious attacker are not real, but they must be plausible and “validated” by technical accomplices throughout the preparation. Similarly, for business impacts, they should be reviewed with business specialists: the level of fraud at which the situation becomes critical, critical activities to be targeted as a priority, most sensitive customers, etc. The choice and involvement of accomplices are essential and they should be integrated into the coordination team on D-day. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h3 style="text-align: justify;" aria-level="3"><strong>2/ Building&nbsp;the script of the exercise&nbsp;</strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">The&nbsp;script consists in defining minute by minute the information that will be communicated to the players. The calibration of the exercise rhythm is a complex point.&nbsp;The temptation to impose&nbsp;a strict&nbsp;rhythm is great to “master” the scenario&nbsp;but&nbsp;attention needs to be&nbsp;given&nbsp;to leave enough space&nbsp;for reflection.&nbsp;</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">The start of the exercise is another complex point: should&nbsp;the scenario&nbsp;start directly&nbsp;in&nbsp;a crisis situation&nbsp;or on&nbsp;an&nbsp;alert that will test the general mobilization process?&nbsp;Most often than not, the&nbsp;second option is chosen.&nbsp;That way, the&nbsp;technical teams (CERT, SOC, IT…)&nbsp;&nbsp;can be mobilised&nbsp;for the entire duration of the exercise.&nbsp;ExCom&nbsp;members should have their diary freed up during that day&nbsp;as well.&nbsp;</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h3 style="text-align: justify;" aria-level="3"><strong>3/ Preparation of&nbsp;the stimuli&nbsp;</strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">Technical reports, fake tweets, messages from worried customers, these are all useful stimuli for the players.&nbsp;</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">Videos are often used to&nbsp;captivate.&nbsp;Indeed, nothing is more striking than a fake&nbsp;BBC&nbsp;report relaying the current attack (logo, board, etc.&nbsp;the more realistic the better).&nbsp;For more realism, videos&nbsp;of people “known” in the company (message from the CEO, interview of a factory boss,&nbsp;etc)&nbsp;can be used.&nbsp;</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">The same goes for the technical side: the duration of the exercises often does not allow the players to carry out the technical investigations themselves, but they will ask a lot of the facilitators.&nbsp;Everything must be ready to avoid panic:&nbsp;Malware analysis reports, application log extracts, IP address lists, etc.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">As mentioned in the introduction, the most ambitious exercises may require the creation of 300 stimuli to get through the day and remain credible&nbsp;–&nbsp;is represents a&nbsp;lot of work.</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h2 style="text-align: justify;" aria-level="2"><strong>D-DAY&nbsp;</strong></h2>
<p style="text-align: justify;"><span data-contrast="auto">On D-Day, early morning, a meeting is organised&nbsp;with all the animation team and observers for&nbsp;the&nbsp;final adjustments. A few hours later, the observers&nbsp;will&nbsp;go to their crisis cells and start the players’ briefing.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h3 style="text-align: justify;" aria-level="3"><strong>1/ Starting on a good basis&nbsp;</strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">For&nbsp;many players, this may be their first exercise. The briefing is&nbsp;therefore&nbsp;essential to avoid&nbsp;confusion between fictional and real-life events:&nbsp;</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<ul style="text-align: justify; list-style-type: circle;">
<li data-leveltext="%1." data-font="Times New Roman" data-listid="3" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Players call the police in the middle of the exercise</span></li>
</ul>
<ul style="text-align: justify; list-style-type: circle;">
<li data-leveltext="%1." data-font="Times New Roman" data-listid="3" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">The players contact a mailing list of 400 people without specifying that it is an exercise</span></li>
</ul>
<ul style="text-align: justify; list-style-type: circle;">
<li data-leveltext="%1." data-font="Times New Roman" data-listid="3" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Real customers be called to be reassured</span></li>
</ul>
<ul style="text-align: justify; list-style-type: circle;">
<li data-leveltext="%1." data-font="Times New Roman" data-listid="3" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">A production site is neutralized “by prevention”</span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">To avoid such situations, it is essential to iron out the rules of the game during the briefing: the players must communicate with each other, but they must go through the facilitation unit to contact external stakeholders. Throughout the day, the facilitators and accomplices in each team find themselves in the shoes of a client, a technical expert, a CEO, or a regulator, according to the players’ requests. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h3 style="text-align: justify;" aria-level="3"><strong>2/ Rely on an efficient facilitation team&nbsp;</strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">The sequence of events depends on the efficiency of the animation cell. A successful exercise includes a lot of improvisation on the day. Stimuli may have to be readjusted according to the reactions of the players, the score is never fixed and the facilitation cell will be put to the test on the day of the exercise. The largest crisis exercises have particularly professional crisis management teams, including the head of the facilitators, PMO, technical manager, business manager, call management centre, etc. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">We suggest not to take any risks on D-Day and to recreate teams that are used to working together and know each other. Doing so is the best way to gain time that will prevent the organisation team from going into crisis itself.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/07/organise-a-cyber-crisis-exercise-in-a-large-company/">Organise a cyber crisis exercise in a large company</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security channels on the verge of burn-out – an attempt to explain this phenomenon</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/04/security-channels-on-the-verge-of-burn-out-an-attempt-to-explain-this-phenomenon/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Mon, 12 Apr 2021 09:00:02 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[burnout]]></category>
		<category><![CDATA[career]]></category>
		<category><![CDATA[CISO]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15489</guid>

					<description><![CDATA[<p>Security organisation are facing more and more employees leaving. There is an urgent need to rebuild a more readable operational model with a trend in pooling and eliminating redundancies. This article will present an attempt at explaining this situation and...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/04/security-channels-on-the-verge-of-burn-out-an-attempt-to-explain-this-phenomenon/">Security channels on the verge of burn-out – an attempt to explain this phenomenon</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Security organisation are facing more and more employees leaving. <strong>There is an urgent need to rebuild a more readable operational model with a trend in pooling and eliminating redundancies</strong><strong>.</strong> This article will present an attempt at explaining this situation and at giving some possible solutions.</p>
<p style="text-align: justify;"><strong>Repeated sick leave, insomnia, withdrawal, security systems companies have been under great pressure for several years. </strong>Although threats are intensifying, it is not enough to explain this phenomenon. It is clear <strong>that the level of stress is more related to the functioning of the sector and management practices, rather than to the very nature of the activities carried out. </strong>Last year, a study by Nominet showed that 23% of ISSMs in 2020 admit to using medication and/or alcohol and drugs to cope. And very clearly, the phenomenon is not limited to ISSMs alone, but to the entire ISS community (SOC analysts, project managers, experts&#8230;). But how have we been able to move from passionate, close-knit teams in less than 10 years to such an HR situation?</p>
<h2><strong>Cybersector HR approach </strong></h2>
<p style="text-align: justify;">Requests for intervention are very rare concerning HR policies, training courses, managerial practices even though the smooth running of the sector and the well-being of the employees have a definite impact on the medium-term level of safety. Sportsmen and women know it very well, the state of mind in the changing room has a major influence on the final result.</p>
<figure id="post-15487 media-15487" class="align-none"><img fetchpriority="high" decoding="async" class="size-medium wp-image-15487 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/RH-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/RH-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/RH-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/RH-768x511.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/RH.jpg 1000w" sizes="(max-width: 287px) 100vw, 287px" /></figure>
<p style="text-align: justify;">Faced with this observation, some major accounts have taken an interesting step: <strong>they have integrated these HR operating topics directly into their maturity framework </strong>(NIST, ISO, etc.). This is indeed an excellent idea that enables them to deal with essential subjects in a few weeks via an already established organisation and processes (insurance, evidence review, cyber programme, etc.). Another advantage, the framework is often an essential input to the construction of the strategy, and this HR dimension is thus directly integrated into the multi-year plan of certain companies. <strong>Concrete and measurable objectives are defined for staff turnover, employee motivation or even the work/life balance. </strong><strong>Finally</strong><strong>, </strong>these elements are regularly presented to top management alongside the patching rate, zero-trust convergence and resilience capacities!</p>
<p style="text-align: justify;">When the physiological well-being of the employees is integrated into the objectives of the sector, and therefore at the same time into those of the CISOs, companies have a much smoother run; but it is still necessary to address the right subjects!</p>
<h2><strong>Priorities: Valuing expertise, encouraging mobility and aligning salaries</strong></h2>
<p style="text-align: justify;">Pentesters, CERT analysts, DevSecOps specialists&#8230; the security sector is made up of a multitude of experts, who are not always recognised, valued and motivated with relevance. <strong>Unfortunately, too many companies still have a natural tendency to overvalue management to the detriment of expertise.</strong> It is therefore indispensable to create an ecosystem favourable to experts in the ISS fields. The field of possibilities is vast: the implementation of specific career paths, encouraged access to certification, involvement of communities of expertise in major decisions, external valorisation (conferences, media).</p>
<figure id="post-15485 media-15485" class="align-none"><img decoding="async" class="size-medium wp-image-15485 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/New-job-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/New-job-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/New-job-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/New-job-768x512.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/New-job.jpg 1080w" sizes="(max-width: 287px) 100vw, 287px" /></figure>
<p style="text-align: justify;">The subject of mobility is also essential. There is indeed a feeling of suffocation within the sector: the tension on cybersecurity resources is so great that <strong>many employees feel they are stuck on their posts, without the slightest possibility of evolution. </strong>As a result, morale is low, people are going around in circles, asking questions, criticising creating an unhealthy climate. A obvious solution exists: encouraging or even imposing mobility. For example, some major accounts have recently set up incentive governance that allows ISSMs to spontaneously propose mobilities and exchange resources, <strong>the subject of cybersecurity is vast enough to create rich and exciting careers</strong>. A healthy sector is one with a mobility rate of at least 10%.</p>
<p style="text-align: justify;">Finally, there is a need to discuss wages. There are major differences between CISOs remunerations from one entity to another, and the salary structure itself may differ. It is therefore impossible to create team spirit and solidarity in such conditions. The project is not simple, but it deserves to be discussed with the HR, all the more so in a context of strong mobilities which will necessarily lead to complicated situations.</p>
<h2><strong>Employees no longer understand their organisation and suffer as a result.</strong></h2>
<p style="text-align: justify;">In recent years, safety has taken on a whole new dimension: in France, there is an average of 1 safety FTE per 500 to 3,000 employees, with an average of around 1 per 1,000. The era of the small team of 15 passionate people within the IT department&#8217;s operations is over. With large teams, a simple decision can take weeks.</p>
<figure id="post-15483 media-15483" class="align-none"><img decoding="async" class="size-medium wp-image-15483 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building-768x512.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building-1536x1024.jpg 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building.jpg 1620w" sizes="(max-width: 287px) 100vw, 287px" /></figure>
<p style="text-align: justify;"><strong>There is an urgent need to rebuild a more readable operational model with a trend in pooling and eliminating redundancies.</strong></p>
<ol style="text-align: justify;">
<li>Regrouping centres of expertise (Audit, Cloud&#8230;)</li>
<li>Creation of a single cyber defence centre (SOC, CERT&#8230;)</li>
<li>Structuring of a single Cybersecurity Programme within the Group&#8217;s reach</li>
<li>Pooling of the PMO in a Reporting Factory.</li>
</ol>
<p style="text-align: justify;"><strong>This type of grouping will make it possible to create an emulation, to embark and to give collective meaning.</strong> Of the recent reorganisations, it is estimated that around 40% of the sector&#8217;s employees work on activities with a transversal scope.</p>
<p style="text-align: justify;">Salary alignment, re/up-skilling, training/certification plans, mobility processes, reorganisation of the sector, there are many subjects to be dealt with to boost well-being and enable employees to build a full and rewarding career within the sector. However, this work cannot be carried out by the HR functions alone. <strong>It is essential that the CISO and team managers are strongly involved to establish the efforts over the long term.</strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/04/security-channels-on-the-verge-of-burn-out-an-attempt-to-explain-this-phenomenon/">Security channels on the verge of burn-out – an attempt to explain this phenomenon</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Organize or reorganize the security sector of a large company &#8211; Feedback</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/organize-or-reorganize-the-security-sector-of-a-large-company-feedback/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Tue, 25 Aug 2020 13:00:32 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[feedback]]></category>
		<category><![CDATA[large company]]></category>
		<category><![CDATA[organization]]></category>
		<category><![CDATA[reorganization]]></category>
		<category><![CDATA[security sector]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14024</guid>

					<description><![CDATA[<p>Nostalgia, nostalgia&#8230; remember security organizations 20 years ago. It couldn&#8217;t be simpler! The &#8220;typical&#8221; team was made up of about fifteen people in the ISD operations, all of them passionate about technology: it caused a lot of VLAN, Internet filtering,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/organize-or-reorganize-the-security-sector-of-a-large-company-feedback/">Organize or reorganize the security sector of a large company &#8211; Feedback</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Nostalgia, nostalgia&#8230; remember security organizations 20 years ago. It couldn&#8217;t be simpler! The &#8220;typical&#8221; team was made up of <strong>about fifteen people in the ISD operations, all of them passionate about technology</strong>: it caused a lot of VLAN, Internet filtering, anti-virus comparison&#8230; Attacks were still rare, pressure from regulators was limited, top management had no control over anything&#8230; i<strong>n short, CISO had royal peace of mind!</strong> Admittedly, the first reflections on the positioning of CISO in the organisation were beginning to emerge (balance of power with the CIO, closer ties with the Risk Department, etc.) but these expert discussions were still very confidential.</p>
<p>20 years later&#8230; the situation is totally different and security has taken on a whole new dimension in companies. The figures speak for themselves: in France, <strong>there is an average of 1 security FTE per 500 to 3,000 employees</strong>, with an average of around 1 per 1,000. Some financial players can even reach record ratios of 1 per 200 by integrating the different lines of defence. I&#8217;ll let you do the math: <strong>this quickly represents several hundred, even thousands of employees</strong>! ISSM are therefore now in charge of a plethoric and highly diversified workforce. The historical experts have been joined in recent years by loads of Project Managers, PMO, COO, Program Managers, and even sometimes by specialized buyers and HR, who are gradually learning to work together. Like a sports coach, the CISO now has to deal with such a workforce and find the right organization, the right game system to get results.</p>
<p>&nbsp;</p>
<h2>NO REVOLUTION, THE FUNCTIONAL SECTOR REMAINS THE NORM</h2>
<p>&nbsp;</p>
<div class="slate-resizable-image-embed slate-image-embed__resize-right"><img loading="lazy" decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQHUfGYhv2qh4A/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=d1Wk65W0w2TehS3pPgXJITViCzgT7FaIu51-OYZijRg" alt="No alt text provided for this image" width="664" height="443" data-media-urn="" data-li-src="https://media-exp1.licdn.com/dms/image/C5612AQHUfGYhv2qh4A/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=d1Wk65W0w2TehS3pPgXJITViCzgT7FaIu51-OYZijRg" /></div>
<div></div>
<p>The reasons for reorganizing are always broadly the same: lack of control, a feeling of inefficiency, diffuse responsibilities&#8230; and the work involved in reorganizing can seem colossal. This leads some CISO to very quickly consider disruptive solutions, and in particular the idea of <strong>grouping all security resources into a single, hierarchical team</strong>. Let&#8217;s not waste time and let&#8217;s be very clear: in 95% of cases, this solution is not chosen. Such a move simply presents too many risks of excluding the security function, which is difficult to reconcile with the need for business proximity for certain activities: support for business projects, raising awareness among specific populations, budget negotiations, etc. <strong>The functional channel remains the norm: a central team and relays</strong> (local CISO, security correspondents, etc.) <strong>spread throughout the organization.</strong> However, some industrial players have recently moved towards centralisation, but the move is more motivated by a desire to bring together cybersecurity resources with the security team, which is particularly mature in this sector.</p>
<p>The attachment of the CISO also remains an element of debate, which has been widely relayed and commented on for years. CIO, Risk Management, Financial Management, CEO&#8230; it sometimes seems as if it&#8217;s a race to see who will be the highest in the hierarchy! But contrary to popular belief, there is not necessarily a trend in the field towards the exit of the IT department. Quite the contrary: <strong>3 out of 4 CISO report to the CIO in large companies</strong> and most reorganizations lead to such an affiliation. The reason is simple: it is often an excellent place to be in action, to make progress on issues and to obtain a budget! Warning: for those who decide to be attached to a different department, remember that 80% of a cybersecurity budget falls within the scope of the IT department. <strong>It is therefore essential to nurture a quality relationship between the CISO and the CIO</strong>. I have witnessed a few power struggles in recent years, and it is rarely the CISO who wins <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>That&#8217;s it&#8230; we&#8217;ve got the basic principles: a functional network, often attached to the CIO, with CISO in the company&#8217;s main areas of activity. The task now is to distribute all the cybersecurity activities within this organization, and there are many of them: policies, studies, awareness-raising, the Cybersecurity Program, project support, audits, SOC, CERT, etc.</p>
<p>&nbsp;</p>
<h2>BREAKING DOWN SILOS AND SEEKING OPERATIONAL EFFICIENCY</h2>
<p>As a service provider, I can testify to this: it is quite common to be solicited several times for the same study within a Key Account, in several different entities. This is quite understandable: in a pipeline model, each entity/country has a safety team, and without clearly established rules of the game, <strong>local management often has the reflex to reinforce its team at the slightest need</strong> (specific study, audit results, etc.). This is the whole trap of a sector: it has many advantages but creates complexity and redundancies. And believe me, when the Group CISO finds himself explaining to top management why the company has 3 SOC and 4 incident response units&#8230; it&#8217;s rarely the best meeting of the day ;-).</p>
<p>&nbsp;</p>
<div class="slate-resizable-image-embed slate-image-embed__resize-left"><img loading="lazy" decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQE75Kvn7yEQWg/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=a300caAuWVIpX8z907MSRWaw-wrtoAu4g3VgwKvvIAI" alt="No alt text provided for this image" width="682" height="420" data-media-urn="" data-li-src="https://media-exp1.licdn.com/dms/image/C5612AQE75Kvn7yEQWg/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=a300caAuWVIpX8z907MSRWaw-wrtoAu4g3VgwKvvIAI" /></div>
<p>&nbsp;</p>
<p>In order to avoid such situations, <strong>the trend is towards the pooling of expertise and the creation of central cybersecurity service offerings</strong>. In very concrete terms, this means that many organizations are pooling 1. cybersecurity expertise (studies, innovation, awareness-raising, etc.) 2. Detection and response (SOC, CERT, crisis exercises, Threat Intel, etc.) 3. Audits and controls (slopes, redteam, code analysis, etc.) 4. Project management and PMO (reporting, PMO, communication&#8230;). Add a governance and strategy entity, and <strong>you are not far from getting the organization chart of many Group CISO</strong>! Note that there are alternatives: some organisations opt for a distributed model, consisting of distributing services across entities (for example: the USA is now in charge of the intrusion test service for the entire company), and very large companies often opt for the creation of intermediate Hubs (by region, by business line&#8230;) delivering these services. Regardless of the organisation chosen, this consolidation movement is underway: <strong>it is estimated that around 40% of the sector&#8217;s employees work on activities with a cross-functional scope</strong>&#8230; and the increase has been exponential in recent years.</p>
<p>This move towards centralisation frees up local teams (CISO or business/country/entity correspondents) who can thus consume services and <strong>refocus on activities requiring close proximity to their businesses</strong>: risk assessment, integration of security in projects, security revenues, etc. In the security sectors, this is where we still find the bulk of the workforce (easily 30 to 40%)&#8230; but this situation is very probably temporary! <strong>The widespread use of agile technology has a direct impact on these teams</strong>, who find themselves changing jobs from one day to the next because they are projected into the Feature Teams to train, coach and equip &#8220;Security Champions&#8221; who are gradually gaining in autonomy. Result: local CISO are also industrializing and organizing their teams into service centers for these Feature Teams (development standards, code review, analysis methods&#8230;) Follow my eye: <strong>the spectre of a single, centralized security team is likely to resurface quite quickly in the debates</strong>&#8230; and it is the agile transformation that accelerates the process!</p>
<p>&nbsp;</p>
<h2>IT IS NOW POSSIBLE TO MAKE A CAREER IN A SAFETY FIELD</h2>
<p>&nbsp;</p>
<div class="slate-resizable-image-embed slate-image-embed__resize-right"><img loading="lazy" decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQEQen5EI-gYGg/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=euNdGx4XVbg4WCIIWaDO6MfT8_WYqdrZv6MQwEzStrw" alt="No alt text provided for this image" width="704" height="319" data-media-urn="" data-li-src="https://media-exp1.licdn.com/dms/image/C5612AQEQen5EI-gYGg/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=euNdGx4XVbg4WCIIWaDO6MfT8_WYqdrZv6MQwEzStrw" /></div>
<div></div>
<p>We have widely commented on this: some security channels have gone from a few dozen people to several hundred or even thousands in the space of a few years. Of course, this requires a bit of organisation&#8230; but <strong>it is also a great opportunity for all the employees in the sector</strong>! Project management, team management, expertise, communication&#8230; very few sectors offer such diversity, and the situation is ideal for attracting and retaining talent. I can only recommend that you take advantage of a cyber-security reorganization to highlight this wealth and<strong> work on skills management</strong>: salary alignment, re/up-skilling, training/certification plans, individual responsibilities, mobility processes&#8230; there are many topics to be addressed to boost well-being and enable employees to build a <strong>full and rewarding career within the industry</strong>!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/organize-or-reorganize-the-security-sector-of-a-large-company-feedback/">Organize or reorganize the security sector of a large company &#8211; Feedback</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Organiser ou réorganiser la filière sécurité d’une grande entreprise – retours d’expérience</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/organiser-ou-reorganiser-la-filiere-securite-dune-grande-entreprise-retours-dexperience/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 12:00:35 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[DSI]]></category>
		<category><![CDATA[filière sécurité]]></category>
		<category><![CDATA[grande entreprise]]></category>
		<category><![CDATA[organisation]]></category>
		<category><![CDATA[réorganisation]]></category>
		<category><![CDATA[retour d'expérience]]></category>
		<category><![CDATA[RSSI]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13873</guid>

					<description><![CDATA[<p>Nostalgie, nostalgie… rappelez-vous des organisations sécurité il y a 20 ans. Impossible de faire plus simple ! L’équipe « type » était composée d’une quinzaine de personnes au sein des opérations de la DSI, toutes passionnées de technique : ça causait nombre de VLAN, filtrage...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/organiser-ou-reorganiser-la-filiere-securite-dune-grande-entreprise-retours-dexperience/">Organiser ou réorganiser la filière sécurité d’une grande entreprise – retours d’expérience</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="ember64" class="ember-view">
<div class="reader-article-content" dir="ltr">
<p>Nostalgie, nostalgie… rappelez-vous des organisations sécurité il y a 20 ans. Impossible de faire plus simple ! L’équipe « type » était composée d’une <strong>quinzaine de personnes au sein des opérations de la DSI, toutes passionnées de technique</strong> : ça causait nombre de VLAN, filtrage internet, comparatif anti-virus… Les attaques étaient encore rares, la pression des régulateurs restait limitée, le top management ne maîtrisait rien… <strong>bref, les RSSI avaient une paix royale !</strong> Certes, les premières réflexions sur le positionnement du RSSI dans l’organisation commençaient à émerger (équilibre des forces avec le DSI, rapprochement avec la Direction des Risques…) mais ces débats d’expert restaient encore très confidentiels.</p>
<p>20 ans après… la situation est totalement différente et la sécurité a pris une toute autre dimension dans les entreprises. Les chiffres parlent d’eux-mêmes : en France, <strong>on constate en moyenne 1 ETP sécurité pour 500 à 3000 employés</strong>, avec une moyenne tournant aux alentours de 1 pour 1000. Certains acteurs de la Finance peuvent même atteindre des ratios record de 1 pour 200 en intégrant les différentes lignes de défense. Je vous laisse faire le calcul : <strong>cela représente rapidement plusieurs centaines, voire milliers d’employés !</strong> Les RSSI sont donc maintenant aux commandes d’un effectif pléthorique et sacrément diversifié. Les experts historiques ont été rejoint ces dernières années par des cargaisons de chefs de projet, PMO, COO, Directeurs de Programme, voire parfois par des acheteurs et RH spécialisés, qui apprennent progressivement à travailler ensemble. Tel un coach sportif, le RSSI doit désormais composer avec un tel effectif et trouver la bonne organisation, le bon système de jeu pour obtenir des résultats.</p>
<p>&nbsp;</p>
<h2>PAS DE REVOLUTION, LA FILIÈRE FONCTIONNELLE RESTE LA NORME</h2>
</div>
</div>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQHUfGYhv2qh4A/article-inline_image-shrink_1000_1488/0?e=1607558400&amp;v=beta&amp;t=q4ORDi3Uf076WAGim4Ho6ZRIvRuAAaHzT4tY5bEiyTQ" alt="No alt text provided for this image" width="447" height="298" /></p>
<p>&nbsp;</p>
<div id="ember64" class="ember-view">
<div class="reader-article-content" dir="ltr">
<p>Les raisons qui poussent à se réorganiser sont toujours globalement les mêmes : manque de maîtrise, sentiment d’inefficacité, responsabilités diffuses&#8230; et le travail de remise à plat peut sembler colossal. Cela amène certains RSSI à envisager très rapidement des solutions en rupture, et en particulier <strong>celle du regroupement de toutes les ressources sécurité dans une seule et même équipe hiérarchisée</strong>. Ne perdons pas de temps et soyons très clairs : dans 95% des cas, cette solution n’est pas retenue. Un tel mouvement présente tout simplement trop de risques d’exclusion de la fonction sécurité, difficilement conciliable avec le besoin de proximité métier de certaines activités : accompagnement de projets métier, sensibilisation des populations spécifiques, négociations budgétaires… <strong>La filière fonctionnelle reste la norme : une équipe centrale et des relai</strong>s (RSSI locaux, correspondants sécurité…) <strong>répartis partout dans l’organisation.</strong> Certains acteurs industriels ont toutefois récemment franchi le cap de la centralisation, mais le mouvement est davantage motivé par une volonté de rapprochement des ressources cybersécurité avec l’équipe sureté, particulièrement mature dans ce secteur.</p>
<p>Le rattachement du RSSI reste également un élément de débat, très largement relayé et commenté depuis des années. DSI, Direction des Risques, Direction Financière, CEO… on a parfois l’impression que c’est une course à qui sera le plus haut dans la hiérarchie ! Mais contrairement aux idées reçues, on ne constate pas forcément sur le terrain de tendance à la sortie de la DSI. Bien au contraire : <strong>3 RSSI sur 4 rapportent au DSI dans les grandes entreprises</strong> et la plupart des réorganisations débouchent sur un tel rattachement. La raison est simple : c’est souvent un excellent point de chute pour être dans l’action, faire avancer ses sujets, obtenir du budget ! Attention : pour ceux qui décident d’un rattachement différent, rappelons-nous que 80% d’un budget cybersécurité tombe dans le périmètre de la DSI. <strong>Il est donc indispensable de nourrir une relation de qualité entre le RSSI et le DSI.</strong> J’ai pu assister à quelques rapports de force ces dernières années, et c’est rarement le RSSI qui gagne <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Ça y est… on tient les principes de base : une filière fonctionnelle, souvent rattachée au DSI, avec des relais RSSI dans les grands pôles d’activité de l’entreprise. Il s’agit maintenant de répartir dans cette organisation toutes les activités de cybersécurité, et elles sont nombreuses : politiques, études, sensibilisation, Programme cybersécurité, accompagnement projets, audits, SOC, CERT…</p>
<p>&nbsp;</p>
<h2>CASSER LES SILOS ET RECHERCHER L’EFFICACITÉ OPÉRATIONNELLE</h2>
<p>En tant que prestataire, je peux en témoigner : il est assez commun d’être sollicité plusieurs fois pour la même étude au sein d’un Grand Compte, dans plusieurs entités différentes. C’est tout à fait compréhensible : dans un modèle en filière, chaque entité / pays dispose d’une équipe sécurité, et sans règles du jeu clairement établies, <strong>la Direction locale a souvent le réflexe de renforcer son équipe au moindre besoin</strong> (étude spécifique, résultat d’audit…). C’est tout le piège d’une filière : elle présente de nombreux avantages mais crée de la complexité et des redondances. Et croyez-moi, lorsque le RSSI Groupe se retrouve à expliquer au top management pourquoi l’entreprise dispose de 3 SOC et de 4 cellules de réponse à incidents… c’est rarement la meilleure réunion de sa journée ;-).</p>
</div>
</div>
<p>&nbsp;</p>
<p><img decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQE75Kvn7yEQWg/article-inline_image-shrink_1000_1488/0?e=1607558400&amp;v=beta&amp;t=r8xNz6QtkxT_an5LvmuBBLJtOG_8MnlYwDzAIqVakpI" alt="No alt text provided for this image" /></p>
<div id="ember64" class="ember-view">
<div class="reader-article-content" dir="ltr">
<p>&nbsp;</p>
<p>Pour éviter ce genre de situation, <strong>la tendance est au regroupement de compétences et à la création d’offres de service cybersécurité centrales</strong>. Très concrètement, cela se traduit pour de nombreuses organisations par une mutualisation de 1. L’expertise cybersécurité (études, innovation, sensibilisation…) 2. La détection et la réponse (SOC, CERT, exercices de crise, Threat Intel…) 3. Les audits et contrôles (pentests, redteam, analyse de code…) 4. La gestion de projet et PMO (reporting, PMO, communication…). Ajoutez une entité gouvernance et stratégie, et <strong>vous n’êtes pas loin d’obtenir l’organigramme de beaucoup de RSSI Groupe</strong> ! Notons qu’il existe des alternatives : certaines organisations optent pour un modèle distribué, consistant à répartir les services dans les entités (par exemple : les USA sont dorénavant en charge du service de tests d’intrusion pour toute l’entreprise), et les très grandes entreprises optent souvent pour la création de Hubs intermédiaires (par région, par métier…) délivrant ces services. Quelle que soit l’organisation retenue, ce mouvement de consolidation est en cours : <strong>on estime à environ 40% le nombre d’employés de la filière travaillant sur des activités à portée transverse…</strong> et la progression est exponentielle ces dernières années.</p>
<p>Ce mouvement de centralisation permet de libérer les équipes locales (RSSI ou correspondants métier/pays/entité) qui peuvent ainsi consommer les services et <strong>se recentrer sur les activités nécessitant une forte proximité avec leurs métiers</strong> : évaluation des risques, intégration de la sécurité dans les projets, recettes de sécurité… Dans les filières sécurité, c’est ici que nous retrouvons encore aujourd’hui l’essentiel des effectifs (facilement 30 à 40%)… mais cette situation est très probablement transitoire ! <strong>La généralisation de l’agile impacte de plein fouet ces équipes </strong>qui se retrouvent à changer de métier du jour au lendemain car projetées dans les Feature Teams à former, coacher et outiller des « Security Champions » qui gagnent progressivement en autonomie. Résultat : les RSSI locaux s’industrialisent également et organisent leur équipe en centre de services à destination de ces Feature Teams (standards de développement, revue de code, méthodes d’analyse…) Suivez mon regard : <strong>le spectre de l’équipe sécurité unique, centralisée, risque de ressurgir assez rapidement dans les débats</strong>… et c’est la transformation agile qui accélère le processus !</p>
<p>&nbsp;</p>
<h2>ON PEUT DÉSORMAIS FAIRE UNE CARRIÈRE DANS UNE FILIÈRE SÉCURITÉ</h2>
</div>
</div>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQEQen5EI-gYGg/article-inline_image-shrink_1000_1488/0?e=1607558400&amp;v=beta&amp;t=kSC10-FQOEhHceTe60elvOC-nBry63qS-B3lX87H_xc" alt="No alt text provided for this image" width="695" height="308" /></p>
<div id="ember64" class="ember-view">
<div class="reader-article-content" dir="ltr">
<div></div>
<p>Nous l’avons largement commenté : certaines filières sécurité sont passées de quelques dizaines de personnes, à plusieurs centaines voire milliers en l’espace de quelques années. Certes cela nécessite un brin d’organisation… mais <strong>c’est également une formidable opportunité pour tous les employés de la filière ! </strong>Gestion de projet, management d’équipe, expertise, communication… très peu de secteurs offrent une telle diversité, et la situation est idéale pour attirer et fidéliser les talents. Je ne peux que vous recommander de profiter d’une réorganisation cybersécurité pour mettre en lumière cette richesse et <strong>travailler sur la gestion des compétences</strong> : alignement des salaires, re/up-skilling, plans de formation/certification, responsabilités individuelles, processus de mobilité… les sujets à traiter sont nombreux pour booster le well-being et permettre aux employés de se construire <strong>une carrière pleine et enrichissante au sein de la filière !</strong></p>
</div>
</div>
<div class="reader-flag-content__wrapper mb4 clear-both" data-ember-action="" data-ember-action-65="65"></div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/organiser-ou-reorganiser-la-filiere-securite-dune-grande-entreprise-retours-dexperience/">Organiser ou réorganiser la filière sécurité d’une grande entreprise – retours d’expérience</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber-resilience, an opportunity to bring cybersecurity and business closer together</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/cyber-resilience-an-opportunity-to-bring-cybersecurity-and-business-closer-together/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Mon, 15 Jun 2020 09:00:11 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[ARM method]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[Business Continuity Plan]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberresilience]]></category>
		<category><![CDATA[Program management]]></category>
		<category><![CDATA[relationship IT / Business]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13232</guid>

					<description><![CDATA[<p>To say the least, cyber-resilience is a fashionable concept. The number of client requests on the topic has exploded this year: framing studies, program structuring, strategy definition, etc. Major accounts are currently multiplying initiatives. Paradoxically, the definition and scope of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/cyber-resilience-an-opportunity-to-bring-cybersecurity-and-business-closer-together/">Cyber-resilience, an opportunity to bring cybersecurity and business closer together</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>To say the least, cyber-resilience is a fashionable concept. The number of client requests on the topic has exploded this year: framing studies, program structuring, strategy definition, etc. Major accounts are currently multiplying initiatives. Paradoxically, <strong>the definition and scope of application of cyber-resilience is still unclear for most companies</strong> (for example, is cyber security included in cyber-resilience?). This article aims to shed light on the debate by providing some tips that have proven successful in the field.</em></p>
<p>&nbsp;</p>
<h2>Identification and mapping of key processes</h2>
<p>Let&#8217;s start with a definition from the regulator: <strong>the European Central Bank defines cyber-resilience as the ability to protect oneself and to quickly resume activities in the event of a successful cyber-attack.</strong> This definition has led many companies to adopt a 360° vision on the topic (prevention, crisis management, reconstruction, business continuity, etc.) through the prism of a concrete cyber-attack on key business processes. The novelty lies above all in the fact that all the analysis is focused on critical business chains, even though it is still necessary to know them. <strong>Identifying and mapping key processes is often the most complex part of a Cyber Resilience Program</strong>. Unfortunately, there is no systematic method: a list drawn up by the Risk Department, a decision by the Director of Operations, recycling of business impact analyses (BIA), criteria established during regulatory audits, etc. One thing is certain, this list cannot be drawn up by the cybersecurity team in its own corner and requires the involvement of the business lines as early as possible in the process.</p>
<p>&nbsp;</p>
<h2>Analyzing the cyber-resilience of a business chain: the A.R.M. method</h2>
<p>The cyber-resilience of a business chain can be improved by acting on several parameters: 1/ avoidance of the attack, 2/ rapid reconstruction, 3/ maintenance of business activity during the attack. As a result, <strong>many companies have structured their Cyber Resilience Program around 3 indicators: A (AVOID), R (RECOVER) and M (MAINTAIN),</strong> making it possible to target one threat at a time. Of course, most current initiatives are working on Ransomware scenarios (Ryuk, Maze, Sodinokibi, etc.).</p>
<h3>A – AVOID</h3>
<p>The first step is to assess the level of resistance of business chains to the feared cyber threats. The ATT&amp;CK Framework is increasingly used here and this indicator can simply correspond to the <strong>percentage of techniques used by the attacker against which the business chain is protected</strong> (for example, the chain is protected against 60% of the attack techniques used by the ransomware groups of the moment). The level of assurance required differs from one company to another: even if most companies still work via self-declaration, it is possible to integrate a review of evidence or Redteam audits into the approach to make the results more reliable.</p>
<h3>R – RECOVER</h3>
<p>The second step requires <strong>assessing the reconstruction time of the business chain in the event of an attack</strong> (for example, the chain can be reassembled in 9 hours after a ransomware attack). This time can obviously be different from one attack to another: destruction often restricted to Microsoft systems, possibility to use backups or not, integrity checks necessary after reconstruction, etc. This requires a detailed analysis of the impacts of each attack studied. <strong>Be careful, when mapping, it is necessary to consider the reconstruction of ALL the assets impacted by the attack</strong>. It is often observed that a few specific assets can double or triple the overall reconstruction time. Here again, the level of insurance required differs from one company to another: it is possible to work on paper, but the real reconstruction test is clearly the best option for reassurance.</p>
<h3>R – MAINTAIN</h3>
<p>The last step requires assessing the ability of the business lines to work in a degraded mode before returning to normal. This is a purely business indicator, which obviously differs from one sector and chain to another: it can be a question of transactions, reception of parcels or number of passengers depending on the sector and the chosen chain. To calculate it, it is necessary to work with the business on <strong>the assumption of long-term unavailability of the critical chain and to evaluate the percentage of the activity that can be delivered in another way.</strong> To understand the approach in a theoretical, and deliberately provocative way: does a business process vulnerable to a cyberattack, but whose activity can be maintained without an IS for a few days, really need to increase investments in cybersecurity? This is the type of topic that a Cyber Resilience Program must be able to arbitrate.</p>
<p>&nbsp;</p>
<figure id="post-13218 media-13218" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13218 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-2.png" alt="" width="1014" height="554" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-2.png 1014w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-2-350x191.png 350w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-2-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-2-768x420.png 768w" sizes="auto, (max-width: 1014px) 100vw, 1014px" /></figure>
<p>&nbsp;</p>
<p>Most Cyber Resilience Strategies and Programs on the market obviously embrace this recurring assessment phase, adding over the years cyber threats and business chains to be analyzed. At the same time, <strong>they are managing a series of cybersecurity, IT and business projects to increase the level of resilience</strong>. The most mature Programs also maintain catalogs of solutions to speed up the process and improve the scoring of the various business lines (data safes, standardized backups, market partnerships, shared business fallback solutions, etc.).</p>
<p>&nbsp;</p>
<figure id="post-13220 media-13220" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13220 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2.png" alt="" width="1018" height="532" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2.png 1018w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-365x191.png 365w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-768x401.png 768w" sizes="auto, (max-width: 1018px) 100vw, 1018px" /></figure>
<p>&nbsp;</p>
<p>As we have seen, <strong>a cyber-resilience strategy involves multiple skills:</strong> the cybersecurity department to select threats and assess the robustness of chains, the business lines to select critical chains and work on business continuity, IT and the Business Continuity Plan (BCP) for crisis management and assessment of reconstruction capacities. <strong>The best solution is to host this type of Program directly at the Operations Department level</strong>, in order to influence all these channels. However, these Programs are currently structured at the level of the CISO or the Risk Management Department. The key in this case is to deploy effective governance that allows all stakeholders to remain within their area of expertise.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/cyber-resilience-an-opportunity-to-bring-cybersecurity-and-business-closer-together/">Cyber-resilience, an opportunity to bring cybersecurity and business closer together</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity will not escape cost reduction</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/cybersecurity-will-not-escape-cost-reduction/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Tue, 09 Jun 2020 12:48:22 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[contracts]]></category>
		<category><![CDATA[cost reduction]]></category>
		<category><![CDATA[offshore]]></category>
		<category><![CDATA[Operating Model]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13175</guid>

					<description><![CDATA[<p>Let&#8217;s not lie to ourselves: it sometimes feels like cybersecurity lives in a bubble. CISOs are fed up with benchmarks (10% of the IT budget, 1 FTE for 400 employees, etc.), leading them to multiply major investment programs, sometimes costing...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/cybersecurity-will-not-escape-cost-reduction/">Cybersecurity will not escape cost reduction</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Let&#8217;s not lie to ourselves: it sometimes feels like cybersecurity lives in a bubble. CISOs are fed up with benchmarks (10% of the IT budget, 1 FTE for 400 employees, etc.), leading them to multiply major investment programs, sometimes costing hundreds of millions of dollars. It is no longer rare today to come across security teams reaching several hundred or even thousands of employees&#8230;</p>
<p style="text-align: justify;">However, for some time now, <strong>some executive committees are no longer as generous</strong> and require more effort from the IT Security sector. It is well known that it is not easy to prove the effectiveness of the means committed, and some CISOs find themselves struggling to even maintain their annual budget. The post-COVID situation may not help, and we can think that <strong>there is no reason why cybersecurity should escape the imperatives of future savings</strong>.</p>
<p style="text-align: justify;">In the field, the following three levers may present opportunities to optimize the costs in the IT Security industry: 1. review of the Operating Model, 2. contracts optimization, 3. automation and offshoring.</p>
<p>&nbsp;</p>
<h2>1/ REVIEW OF THE OPERATING MODEL</h2>
<p style="text-align: justify;">To optimize an IT Security Operating Model, the question of redundancy must be quickly addressed. The observation is often the same from one company to another: the IT Security industry has grown very quickly, and different teams have very similar or even redundant missions. Many service providers can attest to this: it is quite common to be called upon several times for the same study within a Key Account, in several different entities. Even if some companies are considering to deal with this subject by a complete centralization of the security team (some recent examples in the industry), the key is rather to gather at least the cyber expertise in a centralized way and to structure service offers that can be used by all: pentests, SOC, redteam, policy writing, awareness&#8230;</p>
<p style="text-align: justify;">Be careful, this may represent a major change in stance for many CISO teams, which move from a role of prescriber to a role of service provider with all its facets (SLA, quality measurement, and even penalties). However, it is an excellent way to eliminate redundancies, optimize costs and clarify responsibilities in the process.</p>
<p>&nbsp;</p>
<h2>2/ CONTRACTS OPTIMIZATION</h2>
<p style="text-align: justify;">Purchasing contracts often account for more than half of the IT Security industry&#8217;s expenses and can obviously present excellent avenues for optimization. Many companies have multiplied the tactical deployment of security solutions and it is not uncommon to find situations with 4 types of IPS, 3 EDRs and 3 SIEMs&#8230; A simple way to regain control and optimize costs is to return to the use of a catalogue with centrally negotiated prices: maximum 2 products referenced per technology and an obligation for all entities to use the catalogue. The results can be spectacular by playing on volume effects.</p>
<p style="text-align: justify;">Same approach for services: the aim is to avoid scattering contracts and to ensure competition. In the field, there is typically a trend towards contracts optimization that do not require specialized cyber expertise: project management, change management&#8230; From experience, it is quite simple to get 10%-15% off the daily rates, the panel of companies being much larger for this type of task. However, security value must be kept: it is not a question of lowering the guard on expertise or cyber strategy.</p>
<p>&nbsp;</p>
<h2>3/ AUTOMATION AND OFFSHORING</h2>
<p style="text-align: justify;">Automation can also be an optimization avenue to be explored in the medium term. Especially since the movement is already underway: SOAR solutions for incident handling, automatic learning for anomaly detection, deployment of measures in the Cloud&#8230; Many cyber security activities are currently seeking optimization through the automation of repetitive tasks. The results are obviously not immediate, but the current economic climate clearly risks boosting projects of this type.</p>
<p style="text-align: justify;">An offshore strategy, on the other hand, can have much more immediate results, but beware of rushed projects. Offshore security activities are anything but tactical and require a great deal of framing work to understand the specificities of each country, to establish proximity with local management, and above all to integrate offshore seamlessly into the IT Security operating model. Successful offshore operations involve up to 20% of the industry&#8217;s offshore workforce. The key to achieving such volumes is to focus on providing standardized offshore services (operations, vulnerability scans, translation, etc.), and to limit extended teams, which can be attractive on paper but often counter-productive because they are complex to manage.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/cybersecurity-will-not-escape-cost-reduction/">Cybersecurity will not escape cost reduction</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Defining a cybersecurity strategy in a large company</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/05/defining-a-cybersecurity-strategy-in-a-large-company/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Wed, 27 May 2020 15:04:39 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15492</guid>

					<description><![CDATA[<p>The name might have changed but the goal remains the same: designing a cyber master plan has evolved considerably in the last 15 years. Large companies no longer have questions about the Framework and NIST has established itself as the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/defining-a-cybersecurity-strategy-in-a-large-company/">Defining a cybersecurity strategy in a large company</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The name might have changed but the goal remains the same: designing a cyber master plan has evolved considerably in the last 15 years. Large companies no longer have questions about the Framework and NIST has established itself as the market leader. One should take advantage of this &#8220;moment&#8221; to create aspiration, enthusiasm, real team spirit in the sector.</p>
<h1>Defining a cybersecurity strategy in a large company</h1>
<p><strong>T</strong><strong>he </strong>name is not always the same: master plan, security model, action plan, roadmap but the basic idea is always to set a set of projects that will allow to converge towards a 3-4 year security target, shared and understandable by the top management. 15 years of master plans means 15 years of introductions based on accelerating the threat, tightening regulations, accompanying transformations; the reasons for establishing a cyber strategy are still globally the same. <strong>The method for designing a cyber master plan has evolved considerably.</strong></p>
<h2>10-15 years ago, life was simple.</h2>
<p><img decoding="async" class="aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/1589783496376-340x191.jpg" /></p>
<p>A master plan could be constructed in a few interviews with the ISSR and his team, &#8220;according to experts&#8221;. To provide a logic, <strong>consultants would base themselves on a pictorial model such as a fortified castle or an airport, </strong>which served as a pretext for setting up the fundamentals and explaining the choices. The attacks still seemed remote, the cyber was less dispersed than today and all the master plans were more or less the same. With a little hindsight, these cyber strategies above all had a great real <strong>role in raising awareness / training top management, </strong>who were gradually involved in the choices and discussions.</p>
<p><strong>In 2021, the context has changed a lot. It is </strong>no longer enough to say &#8220;expert opinion&#8221;: some major accounts are now investing hundreds of millions of euros a year in cybersecurity, and <strong>executive committees are demanding more evidence of the effectiveness of the strategy deployed. </strong>All the more so since the &#8220;fundamentals&#8221; (patching, bastion, etc.) are now supplemented by an arsenal of measures, each more specific than the last, which raise questions about the relevance of a single strategy for a large company. It is clear, for example, that between a retail bank focused on the leakage of customer data and an investment bank fearing unavailability of certain trading channels, the priorities are different. The current crisis is certainly likely to reinforce this trend: <strong>strategies must now be much more finely tuned to the business lines.</strong></p>
<h2>A pragmatic and agile strategy, aligned with business priorities</h2>
<p>The first months of work are always devoted to the method that will bring rigour and credibility with management and regulators. Very concretely, it is a question of defining the company&#8217;s Cyber Framework and a method enabling each entity to define its Target Profile (target to be reached on the Framework). D<strong>ifferentiated strategy for each entity.</strong></p>
<p><img decoding="async" class="aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-5-340x191.jpg" /></p>
<p>Large companies no longer have questions about the Framework and <strong>NIST has established itself as the market leader. The </strong>5 functions (identify, protect, detect&#8230;) speak volumes to management and above all its popularity favours the Benchmark. The frameworks chosen do not matter anymore, as long as they are based on a market reference. It should be noted that most companies do not hesitate to specify controls to make them more pragmatic: EDR, SOAR, AD security, anti-fraud; the Framework simply acts as a library of potential controls on which the company will base its strategy.</p>
<p>In large companies, <strong>the Group often imposes a first level of security for all, corresponding to the pursuit of fundamentals</strong>: SOC, bastion, patching, etc. Most systemic attacks still exploit these weaknesses, and the risk of inter-entity propagation must be managed in a cross-functional manner. This common target is quite similar from one company to another and is generally established on the basis of benchmarks provided by the consulting market. More challenging, <strong>each entity is then led to define its own target, </strong>according to its own stakes. Beware, the mapping and weighting mechanism between the Framework controls and the risk mapping can be complex. <strong>The key is often to get out of the cyber sector and work jointly with the Risk Department.</strong></p>
<h2>The must-haves of the moment: AD and IAM security</h2>
<p><img decoding="async" class="aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-6-368x191.jpg" /></p>
<p>The figures resulting from the cyber strategies of major French companies are important: <strong>10-20M of investment on average per year in the industrial sector, and up to 100-150M per year for Financial Services. </strong>Each strategy is different but recent feedback shows that budgets are fairly evenly balanced between 4 types of projects:</p>
<ol>
<li><strong>Security foundations </strong>(patching, awareness, director security, etc.)</li>
<li><strong>Protection of sensitive environments </strong>(LPM, AD security, data protection, etc.)</li>
<li><strong>Zero-trust convergence </strong>(inventories, IAM, risk-based authentication, compliance, etc.)</li>
<li><strong>Cyber-resilience </strong>(detection, crisis management, reconstruction, business continuity, etc.).</li>
</ol>
<p>A few years ago, the NCS and the LPM were definitely emerging as the top priority topics. Today, they are very much in competition with Active Directory security and AMI.</p>
<p>Cyber strategy is an essential tool for setting the course, federating actions, and involving management. However, e<strong>stablishing a multi-year master plan is a great opportunity to get teams on board around a common goal. </strong>Some security departments have grown from a few dozen people to several hundred or even thousands in the space of a few years, and many employees are currently looking for a meaning in their role. One should take advantage of this &#8220;moment&#8221; that is the creation of the strategy to <strong>create aspiration, enthusiasm, real team spirit in the sector. It</strong> is the ideal moment to multiply the work groups, involve as many employees as possible, adopt a transparent approach, have the top management challenge the teams; in short, <strong>turn this strategy construction into a sector event. </strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/defining-a-cybersecurity-strategy-in-a-large-company/">Defining a cybersecurity strategy in a large company</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Peut-on avoir une confiance sans limite dans la Blockchain ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/09/blockchain-peut-on-avoir-confiance-sans-limite/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Thu, 29 Sep 2016 15:30:45 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[Cyberattaque]]></category>
		<category><![CDATA[smart-contract]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9217</guid>

					<description><![CDATA[<p>La garantie de confiance est bien souvent un argument lié à la Blockchain. En effet, la Blockchain dispose de qualités sécurité intrinsèques : son caractère décentralisé et distribué permet une disponibilité forte du système, la traçabilité est assurée par la conservation...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/09/blockchain-peut-on-avoir-confiance-sans-limite/">Peut-on avoir une confiance sans limite dans la Blockchain ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>La garantie de confiance est bien souvent un argument lié à la <em>Blockchain</em>. En effet, la <em>Blockchain</em> dispose de qualités sécurité intrinsèques : son caractère décentralisé et distribué permet une disponibilité forte du système, la traçabilité est assurée par la conservation de toutes les transactions dans le registre, et l’intégrité est garantie par les mécanismes cryptographiques.</p>
<p>Malgré tout, de plus en plus d’attaques sur des environnements <em>Blockchain</em> sont constatées, avec des fraudes s’élevant souvent à plusieurs dizaines de millions d’euros.</p>
<p>Mais alors, quel niveau de confiance peut-on vraiment accorder à cette technologie ? Décryptage des attaques visant la <em>Blockchain</em> et retour sur les mesures à prendre pour améliorer ce niveau de confiance.</p>
<h2>Protéger les services et applications accédant à la Blockchain</h2>
<p>Un membre d’un réseau Blockchain est identifié grâce à une paire de clés cryptographiques : une clé privée, qui lui permet de signer ses transactions et de bénéficier des transactions reçues ; et une clé publique, qui permet aux autres membres du réseau d’identifier les transactions émises de sa part et de lui en transmettre. S’assurer de bien conserver et protéger sa clé privée est donc vital. Or, celle-ci est souvent stockée par son propriétaire sur son ordinateur ou téléphone, périphériques connus pour être aisément attaquable.</p>
<p>Aussi, de plus en plus d’utilisateurs choisissent de confier leur clé privée à des intermédiaires. Force est de constater que la plupart des attaques impactant Bitcoin ont en réalité directement ciblé ces plateformes intermédiaires. Il est donc primordial de protéger la manipulation des clés privées et plus globalement l’ensemble des services accédant au réseau <em>Blockchain</em>.</p>
<p>Dans le cas d’une <em>Blockchain</em> s’appuyant sur des <em>smart-contracts</em>, le niveau d’interaction avec l’extérieur du réseau peut être important, puisque ces derniers s’appuient sur la vérification de <em>paramètres d’entrée</em>, potentiellement externes au réseau. Il n’est alors plus question de sécuriser seulement les plateformes accédant à la <em>Blockchain,</em> mais également celles accédées par la <em>Blockchain </em>pour valider les conditions d’une transaction.</p>
<figure id="post-9218 media-9218" class="align-none">
<figure id="post-9226 media-9226" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9226 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/services-accedant-a-la-blockchain.jpg" alt="services accédant à la blockchain" width="580" height="569" /></figure>
</figure>
<figure id="post-9219 media-9219" class="align-none"></figure>
<p style="text-align: center;"><em><u>Exemples de services accédant à la Blockchain Bitcoin</u></em></p>
<h2>Surveiller la puissance de calcul des mineurs pour éviter une attaque 51%</h2>
<p>L’<em>attaque 51%</em> consiste à avoir plus de 51% de la puissance de calcul du réseau dans le but d’annuler, ajouter ou modifier des transactions présentes dans un bloc. L’idée est de créer une chaine alternative et plus longue que la <em>Blockchain</em> existante afin de la remplacer. Cela est rendu possible en exploitant un paramètre essentiel de la <em>Blockchain</em> : lorsque deux chaînes sont concurrentes, la chaine la plus longue est considérée comme la chaine légitime.</p>
<figure id="post-9229 media-9229" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9229 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/explicaition-attaque-51-e1475159703896.jpg" alt="explicaition attaque 51" width="800" height="351" /></figure>
<p style="text-align: center;"><span style="text-decoration: underline;"><em>Explication de l&#8217;attaque 51%</em></span></p>
<p>Ce risque est plus important dans le cadre de <em>Blockchains</em> privées ou hybrides, composées d’un nombre restreint d’utilisateurs, et pouvant donc plus facilement représenter plus de la moitié de la puissance de calcul. Aussi, des mesures de sécurité doivent être mises en place pour prévenir et détecter ce type d’attaque : engagements contractuels, mécanismes de surveillance et de contrôle, etc.<strong><br />
</strong></p>
<h2>Sécuriser le code des smart-contracts</h2>
<p>Un <em>smart-contract</em> est un programme informatique inscrit dans une <em>Blockchain</em> et qui s’exécute de manière automatique une fois les conditions du contrat réunies.</p>
<p>Les conséquences d’une erreur de codage peuvent être catastrophiques et difficilement réversibles, comme en témoigne l’affaire <em>TheDAO</em> (application basée sur la Blockchain Ethereum et se présentant comme un fond d’investissement participatif et mutualisé). À partir d’une vulnérabilité découverte dans le code source du <em>smart-contract</em> <em>TheDAO</em>, un membre du réseau a pu drainer le compte principal de l’application à hauteur de 50 millions de dollars. Ces fonds furent en partie récupérés suite à une opération appelée « hard fork », s’apparentant à une attaque 51% concertée.</p>
<p>En soi, ceci n’était pas une attaque car le contrat a été respecté, seule sa conception était défaillante. La création de cas d’usage basés sur des <em>smart-contract</em>s doit impérativement être associée à des mesures de sécurité applicative et un développement sécurisé.</p>
<p>Un système <em>Blockchain</em> est souvent considéré comme sécurisé par nature, mais les attaques présentées témoignent du contraire. La nature des plateformes accédant ou accédées par la <em>Blockchain</em>, la complexité des éventuels <em>smart-contracts</em> ou le nombre de mineurs du réseau sont autant d’éléments pouvant influer sur la sécurité du service fourni.</p>
<figure id="post-9231 media-9231" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9231 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/dao-e1475161606110.png" alt="dao" width="800" height="421" /></figure>
<p style="text-align: center;"><span style="text-decoration: underline;"><em>Affaire TheDAO</em></span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/09/blockchain-peut-on-avoir-confiance-sans-limite/">Peut-on avoir une confiance sans limite dans la Blockchain ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>La blockchain : un nouveau modèle pour la confiance ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/09/blockchain-nouveau-modele-confiance/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Tue, 27 Sep 2016 06:39:20 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[Règlementation]]></category>
		<category><![CDATA[smart-contract]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9205</guid>

					<description><![CDATA[<p>Qualifiée par certains visionnaires de technologie révolutionnaire, la Blockchain fait aujourd’hui de plus en plus parler d’elle. Le monde entier s’y intéresse et les investissements dans le domaine se multiplient. De nombreuses entreprises et administrations explorent actuellement les usages possibles...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/09/blockchain-nouveau-modele-confiance/">La blockchain : un nouveau modèle pour la confiance ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Qualifiée par certains visionnaires de technologie révolutionnaire, la <em>Blockchain</em> fait aujourd’hui de plus en plus parler d’elle. Le monde entier s’y intéresse et les investissements dans le domaine se multiplient. De nombreuses entreprises et administrations explorent actuellement les usages possibles de cette technologie prometteuse mais complexe à appréhender pour les métiers.</p>
<p>Pourtant, ce concept n’est pas nouveau : la <em>Blockchain</em> est la technologie sur laquelle s’appuie la crypto-monnaie Bitcoin, apparue en 2009. Mais alors, pourquoi ce regain d’intérêt ? Quelles sont les caractéristiques de cette technologie et quels usages peut-elle favoriser ? Quels sont les obstacles à surmonter pour qu’elle puisse se démocratiser ?</p>
<h2>Des algorithmes remplacent le tiers de confiance</h2>
<p>La <em>Blockchain</em> est une technologie qui permet aux membres d’un même réseau d’effectuer en toute confiance des opérations de stockage et de transmission d’informations, appelées « transactions », et ce en toute confiance, sans aucune autorité centrale de contrôle.</p>
<p>Cette technologie se présente sous la forme d’un registre contenant l’ensemble des transactions enregistrées depuis sa création (dans le cas de la <em>Blockchain</em> <em>Bitcoin</em>, il s’agit par exemple de l’intégralité des transactions financières effectuées depuis la création de cette crypto-monnaie). Ce registre dispose de 2 caractéristiques essentielles :</p>
<ul>
<li><strong>Il est distribué</strong>: tous les membres du réseau disposent d’une copie du registre, rendant quasiment impossible la modification de ce registre par un individu sans l’aval du reste du réseau ;</li>
<li><strong>Il est fiabilisé par les acteurs du réseau</strong> – : la confiance établie au sein du système est assurée par les membres du réseau eux-mêmes ; aucune autorité centrale ne joue le rôle de tiers de confiance.</li>
</ul>
<p>Au sein du registre, les transactions sont regroupées dans des « blocs » enchainés par ordre chronologique (dans le cas de la <em>Blockchain Bitcoin</em>, un bloc correspond à environ 10 minutes de transactions). Le schéma ci-dessous permet de comprendre la cinématique de création d’un nouveau bloc, et donc l’enregistrement d’une nouvelle transaction dans la <em>Blockchain</em>.</p>
<h3>Cinématique de rajout d’un Bloc à la Blockchain &#8211; Vision globale</h3>
<figure id="post-9208 media-9208" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-9208" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/Blockchain-illustration.png" alt="Blockchain illustration" width="1041" height="493" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/Blockchain-illustration.png 1041w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/Blockchain-illustration-403x191.png 403w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/Blockchain-illustration-768x364.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/Blockchain-illustration-71x34.png 71w" sizes="auto, (max-width: 1041px) 100vw, 1041px" /></figure>
<p>Ainsi, le tiers de confiance est remplacé par des algorithmes permettant à tous les membres du réseau de vérifier facilement que les mineurs n’ont pas ajouté, supprimé ou modifié une transaction lors de la création des nouveaux blocs.</p>
<h2>Du simple stockage sécurisé à l’exécution de « contrats » intelligents</h2>
<p>Toute situation faisant intervenir un tiers de confiance coûteux ou faillible est une opportunité pour créer un cas d’usage <em>Blockchain</em>. Banque, immobilier, santé, transport… tous les secteurs se sentent concernés et réfléchissent actuellement aux opportunités offertes par la <em>Blockchain</em> pour améliorer ou remplacer les modèles actuels.</p>
<p>Trois catégories de cas d’usage se distinguent aujourd’hui :</p>
<ul>
<li><strong><em>Record keeping </em></strong>– <em>Blockchain</em> utilisée comme registre de stockage pour déposer des données dont on souhaite garantir la preuve de par leur existence, leur date de création et le droit de propriété, comme par exemple : des brevets, des données médicales, etc.</li>
<li><strong><em>Digital transactions </em></strong>– <em>Blockchain</em> utilisée pour du transfert de valeur : transaction immobilière, crowdfunding, crypto-monnaies, etc.</li>
<li><strong><em>Smart-contracts </em></strong>– <em>Blockchain</em> utilisée pour développer et stocker des <em>smart-contracts</em>, à savoir des contrats entre plusieurs parties, rédigés sous forme de code informatique, et qui s’exécutent sans intervention humaine selon les conditions et termes qu’ils contiennent.</li>
</ul>
<p>Les acteurs du monde de la finance s’intéressent tout particulièrement à la <em>Blockchain</em>. Que ce soit en France ou à l’international, de nombreuses initiatives sont menées, parfois sous forme de consortium, dans le but d’évaluer le potentiel des usages de cette technologie dans le secteur et de définir des protocoles standardisés.</p>
<p>Bien que la <em>Blockchain</em> ait été initialement pensée comme un système public, la plupart des réflexions actuelles concernent des <em>Blockchains</em> privées (propre à une organisation) ou hybrides (propre à un ensemble de partenaires).</p>
<h2>Performance, écologie et réglementation : les obstacles à surmonter</h2>
<p>À titre d’exemple, le réseau Bitcoin permet d’enregistrer environ 7 transactions par seconde, à comparer aux 2 000 transactions par seconde de VISA. Pour s’imposer à large échelle et développer de nouveaux cas d’usage, la <em>Blockchain</em> doit donc pouvoir améliorer ses performances.</p>
<p>Le défi de la performance repose sur une définition et un calibrage des paramètres intrinsèques à la <em>Blockchain</em> en fonction de l’usage que l’on souhaite faire de celle-ci (taille des blocs, processus de création des blocs…).</p>
<p>De plus, elle s’avère très consommatrice en énergie. La consommation électrique actuelle du réseau Bitcoin est notamment équivalente à celle de 280 000 foyers américains.</p>
<p>La réglementation s’avère aussi être un obstacle, l’évolution rapide de la technologie et des cas d’usage amenant de nouvelles interrogations : application du processus KYC (<em>Know Your Customer</em>) ? Poids juridique d’un <em>smart-contract</em> ? Etc. Certains ministères et parlementaires français commencent à s’y intéresser sérieusement (cf. encadré).</p>
<h3>Timeline &#8211; Réglementation Blockchain en France</h3>
<figure id="post-9209 media-9209" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-9209" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/Reglementation-blockchain-timeline.png" alt="Réglementation-blockchain---timeline" width="2500" height="6246" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/Reglementation-blockchain-timeline.png 2500w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/Reglementation-blockchain-timeline-76x191.png 76w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/Reglementation-blockchain-timeline-768x1919.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/09/Reglementation-blockchain-timeline-16x39.png 16w" sizes="auto, (max-width: 2500px) 100vw, 2500px" /></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/09/blockchain-nouveau-modele-confiance/">La blockchain : un nouveau modèle pour la confiance ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
