<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Matthieu Péquin, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/matthieu-pequin/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/matthieu-pequin/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 09 Feb 2021 11:04:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Matthieu Péquin, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/matthieu-pequin/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to define an effective third-party cyber risk management strategy?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/how-to-define-an-effective-third-party-cyber-risk-management-strategy/</link>
		
		<dc:creator><![CDATA[Matthieu Péquin]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 09:00:56 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[contracts]]></category>
		<category><![CDATA[know your supplier]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security Insurance Plan]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[third party]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14491</guid>

					<description><![CDATA[<p>More and more clients request our help regarding their third-party cyber risk management strategy. Indeed, third parties constitute a privileged attack vector. A recent study from Soha Systems showed that 60% of security incidents involve directly or indirectly a supplier....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/how-to-define-an-effective-third-party-cyber-risk-management-strategy/">How to define an effective third-party cyber risk management strategy?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>More and more clients request our help regarding their third-party cyber risk management strategy. Indeed, third parties constitute a privileged attack vector. A recent study from Soha Systems showed that 60% of security incidents involve directly or indirectly a supplier. The most glaring examples are the accounting software M.E.Doc identified as the patient zero of NotPetya and Cloud Hopper attacks which aim at compromising cloud service providers to attack a targeted company.</p>
<p>Paradoxically, only 35% of organizations consider their third-party cybersecurity management process as effective (according to a study conducted by the Ponemon Institute).</p>
<p>How to define an effective third-party cyber risk management strategy? What are the key success factors?</p>
<p>&nbsp;</p>
<h2>Adapt your third-party cybersecurity strategy to the risks</h2>
<p>From business partners to subcontractors and IT service providers, a lot of your suppliers manage or have access to your assets. Therefore, they represent a risk for your organization and thus it is important to ensure they are committed to respect a cybersecurity level that meets your requirements.</p>
<p>Depending on which business perimeter they operate and which type of service they provide, the level of risk would be more or less critical. Therefore, our recommendation is to classify your suppliers to adapt your cybersecurity strategy according to the risks they imply.</p>
<p>Since your suppliers can be thousands, this classification will also allow you to prioritize and keep an acceptable workload for your teams.</p>
<p>In order to do that, our first piece of advice is to inventory your suppliers. We notice that few organizations have an exhaustive cartography and that its realization is a tedious project that requires the involvement of many stakeholders (purchasing, legal, department, business…). Therefore, we advise you to start by defining a process to capture your new third parties and by identifying your suppliers involved in the critical business activities identified in your BIA (Business Impact Assessment). Afterwards, you will be able to extend progressively to other third parties.</p>
<p>From this cartography, you will be able to assess your supplier’s criticality and classify them on a scale with several levels. We advise you to consider the following criteria:</p>
<ul>
<li>The business criticality of the project or the asset the supplier is working on;</li>
<li>The degree of interconnection to your information system;</li>
<li>The access to sensitive or confidential data;</li>
<li>The service exposure on the Internet.</li>
</ul>
<p>Nevertheless, we can observe in our client’s environment that applying those criteria can be challenging due to the lack of information about some third parties. Then, we suggest organizing workshops with cybersecurity teams, IT teams and business teams to validate your cybersecurity classification by expert knowledge.</p>
<p>&nbsp;</p>
<figure id="post-14492 media-14492" class="align-none"><img fetchpriority="high" decoding="async" class="size-full wp-image-14492 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2.png" alt="" width="1443" height="398" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2.png 1443w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2-437x121.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2-768x212.png 768w" sizes="(max-width: 1443px) 100vw, 1443px" /></figure>
<p style="text-align: center;">Example of a classification scale with 3 levels</p>
<p>&nbsp;</p>
<h2>Consider cybersecurity throughout the whole lifecycle</h2>
<p>The feedbacks from the field show that most organizations assess their third party’s cybersecurity level before contracting and include cybersecurity clauses into their contracts. Nevertheless, cybersecurity is not always taken into account thereafter.</p>
<p>We recommend integrating cybersecurity throughout the whole third-party lifecycle by empowering them and adopting a control position.</p>
<p>&nbsp;</p>
<figure id="post-14494 media-14494" class="align-none"><img decoding="async" class="size-full wp-image-14494 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2.png" alt="" width="1503" height="391" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2.png 1503w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2-437x114.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2-71x18.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2-768x200.png 768w" sizes="(max-width: 1503px) 100vw, 1503px" /></figure>
<p style="text-align: center;">Third party management lifecycle</p>
<p><em> </em></p>
<h3>During contractualisation</h3>
<p>Before the contract signature, the objective is to ensure that the supplier chosen by your business meets your cybersecurity requirements. To do so, we advise you to integrate cybersecurity at each step of the supplier selection process:</p>
<ul>
<li>Include your cybersecurity requirements in your Request For Proposals;</li>
<li>Assess the maturity level of the suppliers responding to your Request For Proposals;</li>
<li>Provide a cybersecurity recommendation to your business according to the project sensitivity and the risk implied by the third party,</li>
<li>Include in the contract cybersecurity requirements adapted to the criticality and the type of service delivered.</li>
</ul>
<p>&nbsp;</p>
<h3> During the contract period</h3>
<p><em> </em>To ensure your third parties respect their cybersecurity commitments throughout the contract period, we advise to:</p>
<ul>
<li>Integrate your third parties into your risk analysis when they operate on the scope of a project. For instance, the methodology allows you to identify all the stakeholders involved in a project and to define an action plan to secure and monitor your ecosystem. The implementation of the security measures must be followed-up with the third-party;</li>
<li>Organize cybersecurity reviews at a frequency adapted to the risks and thus the level of classification. For instance, the most critical third parties can be reviewed at least annually while the less critical ones can be reviewed at contract renewal;</li>
<li>Define a process dedicated to cybersecurity incidents involving a third party and create emergency instructions;</li>
<li>Perform audits only when necessary (for instance following a major cybersecurity incident or after identifying a critical risk…)</li>
</ul>
<p>&nbsp;</p>
<h3>At the end of the contract</h3>
<p><em> </em>A contract renewal is an opportunity to perform a new assessment of the third-party cybersecurity posture and if necessary, update the contractual requirements.</p>
<p>If the contract ends, you must apply your reversibility clauses and ensure that cybersecurity is part of the decommissioning of the service provided.</p>
<p>&nbsp;</p>
<h2>Industrialize third parties’ assessments thanks to market solutions</h2>
<p>We observe that many organizations assess and monitor the cybersecurity level of their third parties with proprietary and non-automated questionnaires that require many external resources. In addition, big-sized suppliers may refuse to complete these questionnaires while smaller ones may not always answer correctly.<br />
Furthermore, we also notice that few organizations have yet adopted a mass assessment approach.</p>
<p>In order to rationalize the approach, we therefore suggest giving-up these historical assessment tools to adopt solutions adapted to the supplier classification level and thus be able to scale up.</p>
<p>&nbsp;</p>
<h3>For the most critical third parties</h3>
<p>We advise you to adopt a co-constructive approach with your most critical suppliers, while adopting a position of control. This translates into the following actions throughout the lifecycle:</p>
<ul>
<li>Assess your most critical suppliers based on their cybersecurity certifications and compliance reports on the scope of the service provided;</li>
<li>Define a contractual Security Assurance Plan to precise the security governance of the service;</li>
<li>Organize security reviews (at least once a year) to control the security level of your suppliers based on the indicators defined in the Security Assurance Plan (maintaining certifications, security incidents, audits, security roadmap&#8230;). These committees are also an opportunity to build a relationship of trust with your suppliers, for example by discussing security news and events as well as the conferences that you could do together.</li>
</ul>
<p>&nbsp;</p>
<h3>For third parties with a medium to low criticality</h3>
<p>In order to take a massive approach in assessing and reviewing the cybersecurity level of your non-critical third parties, market solutions can be used. Indeed, editors and startups (such as CyberVadis, CyberGRX, Risk Ledger…) are positioned on the industrialization of third party’s cybersecurity assessments. This will be the topic of one of our next articles.</p>
<p>Their solutions are based on maturity questionnaires whose results are shared with all their customers. More concretely, these platforms work as follows:</p>
<p>&nbsp;</p>
<figure id="post-14496 media-14496" class="align-none"><img decoding="async" class="size-full wp-image-14496 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2.png" alt="" width="1120" height="329" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2.png 1120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2-437x128.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2-768x226.png 768w" sizes="(max-width: 1120px) 100vw, 1120px" /></figure>
<p style="text-align: center;">Third party maturity assessment platforms</p>
<p>&nbsp;</p>
<p>Although these solutions are currently not customizable according to your organization&#8217;s specific requirements, they will allow you to:</p>
<ul>
<li>Get cybersecurity assessments tailored to non-critical third parties;</li>
<li>Reduce the workload of your cybersecurity teams;</li>
<li>Share third-party assessments with other customers and therefore be able to quickly access assessments already performed;</li>
<li>Adopt a win-win approach with your suppliers who will share a single questionnaire with all their customers and will be proposed action plans to remedy any discrepancies;</li>
<li>Popularize third-party cybersecurity management to your business or purchasing teams thanks to didactic scores on different topics.</li>
</ul>
<p>&nbsp;</p>
<h2>Ensure the effectiveness of your third-party cybersecurity management process</h2>
<p>From business to IT project managers and including purchasing and legal teams, third-party cybersecurity management involves many players in your organization. It can only be successful if your process is well-known and applied by all. Therefore, it is key to train and raise the awareness of all stakeholders.</p>
<p>To ensure that your process is properly implemented, it is important to define and implement controls covering all stages of the supplier management life cycle. As a first step, we recommend that you define realistic targets by focusing on your most critical third parties. Over time, these targets may evolve to consider your suppliers with lower levels of criticality. Your controls may include the classification of your third parties, their assessment and their review at an appropriate frequency during the contract period.</p>
<p>&nbsp;</p>
<h2>Integrate third-party cybersecurity management in a &#8220;Know Your Supplier&#8221; approach</h2>
<p>Just as the KYC (Know Your Customer) approach in B2C sectors, we suggest that you include third-party cybersecurity management in a KYS (Know Your Supplier) spirit where the objective is to take all supplier risks into account in a consolidated way.</p>
<p>Cybersecurity assessments and notably maturity assessment platforms can be integrated within supplier management tools (source to contract), as well as financial, CSR, environmental impact, anti-corruption and anti-money laundering assessments. This will ease the integration of cybersecurity into your sourcing and supplier review processes.</p>
<p>See you next episode for an article about market solutions that automate the cybersecurity assessments of your suppliers.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/how-to-define-an-effective-third-party-cyber-risk-management-strategy/">How to define an effective third-party cyber risk management strategy?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyberating: more than just a rating, a vital aspect of governance</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/09/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance/</link>
		
		<dc:creator><![CDATA[Matthieu Péquin]]></dc:creator>
		<pubDate>Mon, 23 Sep 2019 05:51:08 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberating]]></category>
		<category><![CDATA[évaluation]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[risk estimation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12120</guid>

					<description><![CDATA[<p>From finance to cybersecurity The major rating agencies, such as Moody&#8217;s and Standard &#38; Poor&#8217;s, are well known to the general public—especially after the 2008 financial crisis. They now shape financial markets, de facto, through their generation of comparison grids,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance/">Cyberating: more than just a rating, a vital aspect of governance</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>From finance to cybersecurity</h1>
<p>The major rating agencies, such as Moody&#8217;s and Standard &amp; Poor&#8217;s, are well known to the general public—especially after the 2008 financial crisis. They now shape financial markets, <em>de facto</em>, through their generation of comparison grids, which are used, at global scale, to rate the solvency risks associated with companies.</p>
<p>And today, it’s clear that this approach of third-party organizations producing corporate ratings isn’t just limited to the financial sector: it’s gradually being extended into the sphere of cybersecurity.</p>
<p><strong>Cyber rating agencies are now assigning &#8220;cyber scores&#8221;</strong> to companies which quantify the levels of cyber risk that companies are exposed to. The players doing this are mainly American (BitSight, Security ScoreCard, Panorays, and UpGuard, for example), but European start-up, Cyrating, also generates ratings by collecting and analyzing publicly available information, including:</p>
<ul>
<li>The vulnerabilities present on the company&#8217;s websites and the robustness of the TLS encryption in use;</li>
<li>The reputation of the company&#8217;s public IP addresses, computed from a range of data, such as the number of complaints about spam, their appearance on blacklists used by internet and email service providers, bounce rates, etc.</li>
<li>Whether corporate email address protection measures (such as DMARC, DKIM, and SPF) are in place;</li>
<li>DNS analysis (whois, root and NS servers, verification of Start of Authority, MX records, etc.);</li>
<li>Whether company data is present on the Dark Web.</li>
</ul>
<p>Apart from this public-domain data, cyber rating platforms capture and analyze a large amount of exchanged data to determine, for example, , or the versions of browsers being used.</p>
<p>The algorithms used to do such analysis are particular to each cyber rating platform; and the platforms then monetizes the results by offering access to results as a subscription-based service.</p>
<p><strong>Companies, then, get to know their rating by subscribing to a cyber rating platform service!</strong></p>
<p>These scores are widely accessible, given that the rating can also be viewed by other players who subscribe to the platform. Firms can therefore compare themselves with competitors . Cyber insurers are also starting to take such ratings into account when calculating . But, more worryingly, it&#8217;s also easy to imagine that ratings might facilitate reconnaissance for cyber attackers, by helping them to target lower-rated companies—whose defensive measures are likely to be weaker.</p>
<p>Given all this, it seems <strong>essential that firms integrate the question of cyber ratings into their cybersecurity governance.</strong></p>
<h1>Some obvious limitations to the current cyber rating model</h1>
<p>To put it bluntly, a large part of the cyber community has serious reservations about cyber ratings; this mistrust can be summarized in the following view:</p>
<p><em>&#8220;How much confidence can be placed in a security level assessment carried out by a third-party algorithm, using only a selection of the relevant parameters, and with no control mechanism for the quality of information collected? “</em></p>
<p><em> </em><em>There is still considerable work to do to perfect the model, which has a number of inherent flaws</em>; these, if not addressed, risk rendering the rating irrelevant:</p>
<ul>
<li>doesn’t reflect a firm’s overall level of security. Many factors are ignored: internal network segmentation, system and data protection measures, detection capability, etc.;</li>
<li>The rating can be &#8220;polluted&#8221; by false positives: IP addresses or domain names that do not belong to the company (registration errors), traffic originating from sandboxes considered to be malicious, etc. This therefore requires the to carry out a degree of detailed work (the sorting of IP addresses, excluding certain data) in order to obtain as accurate a result as possible;</li>
<li>A lack of transparency about rating algorithms makes it difficult to evaluate the elements that have led to a given score, and to identify parameters where corrections are needed.</li>
</ul>
<p>It’s misleading to reduce a company’s entire level of security to a single score. Moreover, in the future, it wouldn’t be surprising to see players like Qualys propose the taking into account of the results of internal tests conducted on a company&#8217;s IS, in order to refine its rating system.</p>
<h1>A wide range of use cases</h1>
<p>However, these limitations shouldn’t obscure <strong>the opportunities offered by subscribing to a cyber rating service</strong>.</p>
<p>The main argument advanced by cyber rating players is that a score represents a <strong>powerful and easy-to-understand indicator for senior management</strong>—a concept already well-established in finance but still lacking in cybersecurity. An improvement in the rating could also be used to justify and <strong>quantify the effectiveness of any corrective action plan</strong> applied to the company’s IS services.</p>
<p>In addition, cyber rating platforms make it possible to see how all the companies that have been assessed score, which enables a company to:</p>
<ul>
<li>Calibrate its performance against competitors on a common basis; and, potentially, to make an asset of cybersecurity for marketing purposes;</li>
<li>Assess its suppliers’ levels of cybersecurity maturity on a more objective basis than that of questionnaires completed for a Security Assurance Plan.</li>
</ul>
<h1>Cyber rating: an essential issue for companies</h1>
<p>Given the challenges firms face, and the opportunities on offer, <em>it seems inevitable that cyber ratings will take off</em>, something noted by ANSSI (the French National Cybersecurity Agency) in its strategic review of cyber defense: &#8221; <em>The major players in the field will therefore become benchmarks whose market position will be difficult to challenge.”</em></p>
<p>Despite the current limitations, it’s vital that companies—some of whom are already talking about giving countries financial-sector-type cyber ratings—identify how such ratings could be used as an asset increase awareness about cybersecurity among senior management, without, of course, stigmatizing .</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance/">Cyberating: more than just a rating, a vital aspect of governance</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
