<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Morgane Nicolas, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/morgane-nicolas/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/author/morgane-nicolas/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 21 Sep 2022 09:10:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Morgane Nicolas, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/en/author/morgane-nicolas/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Artificial Intelligence soon to be regulated?</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/06/artificial-intelligence-soon-to-be-regulated/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/06/artificial-intelligence-soon-to-be-regulated/#respond</comments>
		
		<dc:creator><![CDATA[Morgane Nicolas]]></dc:creator>
		<pubDate>Wed, 22 Jun 2022 15:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=18102</guid>

					<description><![CDATA[<p>Since the beginning of its theorisation in the 1950s at the Dartmouth Conference[1] , Artificial Intelligence (AI) has undergone significant development. Today, thanks to advancements and progress in various technological fields such as cloud computing, we find it in various...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/06/artificial-intelligence-soon-to-be-regulated/">Artificial Intelligence soon to be regulated?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Since the beginning of its theorisation in the 1950s at the Dartmouth Conference<a href="#_ftn1" name="_ftnref1">[1]</a> , Artificial Intelligence (AI) has undergone significant development. Today, thanks to advancements and progress in various technological fields such as cloud computing, we find it in various everyday uses. AI can compose music, recognise voices, anticipates our needs, drive cars, monitor our health, etc.</p>
<p style="text-align: justify;">Naturally, the development of AI gives rise to many fears. For example, that AI will make innacurate computations leading to accidents and other incidents (autonomous car accidents for example), or that it will lead to a violation of the personal data and could potentially manipulate that data (fear largely fuelled by the scandals surrounding major market players<a href="#_ftn2" name="_ftnref2">[2]</a> ).</p>
<p style="text-align: justify;">In the absence of clear regulations in the field of AI, Wavestone wanted to study, for the purpose of anticipating future needs, who are the actors at the forefront of publishing and developing texts on the framework of AI, what are these texts, the ideas developed in them and what impacts on the security of AI systems can be anticipated.</p>
<h1> </h1>
<h1>AI regulation: the global picture</h1>
<h2>AI legislation</h2>
<p>In the body of texts relating to AI regulation, there are no legislative texts to date <a href="#_ftn3" name="_ftnref1">[3]</a><a href="#_ftn4" name="_ftnref2">[4]</a>. Nevertheless, some texts generally formalize a set of broad guidelines for developing a normative framework for AI. There are, for example, guidelines/recommendations, strategic plans, or white papers.</p>
<p>They emerge mainly from the United States, Europe, Asia, or major international entities:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-18104 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image1b.png" alt="" width="848" height="509" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image1b.png 848w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image1b-318x191.png 318w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image1b-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image1b-768x461.png 768w" sizes="(max-width: 848px) 100vw, 848px" /></p>
<p style="text-align: center;"><em>Figure 1 Global overview of AI texts<a href="#_ftn5" name="_ftnref2">[5]</a></em></p>
<p>And their pace has not slowed down in recent years. Since 2019, more and more texts on AI regulation have been produced:</p>
<p> </p>
<p><img decoding="async" class="aligncenter wp-image-18306 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/2new.png" alt="" width="1005" height="538" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/2new.png 1005w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/2new-357x191.png 357w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/2new-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/2new-768x411.png 768w" sizes="(max-width: 1005px) 100vw, 1005px" /></p>
<p style="text-align: center;"><em>Figure 2 Chronology of the main texts</em></p>
<h2>Two types of actors carry these texts with varying perspectives of cybersecurity</h2>
<p style="text-align: justify;">The texts are generally carried by two types of actors:</p>
<ul style="text-align: justify;">
<li>Decision makers. That is, bodies whose objective is to formalise the regulations and requirements that AI systems will have to meet.</li>
<li>That is, bodies/organisations that have some authority in the field of AI.</li>
</ul>
<p style="text-align: justify;">At the EU level, decision-makers such as the European Commission or influencers such as ENISA are of key importance in the development of regulations or best practices in the field of AI development.</p>
<p> </p>
<p><img decoding="async" class="aligncenter wp-image-18308 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/3new.png" alt="" width="918" height="512" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/3new.png 918w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/3new-342x191.png 342w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/3new-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/3new-768x428.png 768w" sizes="(max-width: 918px) 100vw, 918px" /></p>
<p style="text-align: center;"><em>Figure 3 Key players in Europe</em></p>
<p style="text-align: justify;">In general, the texts address a few different issues. For example, they provide strategies which can be adopted or guidelines on AI ethics. They are addressed to both governments and companies and occasionally target specific sectors such as the banking sector.</p>
<p style="text-align: justify;">From a cyber security point of view, the texts are heterogeneous. The following graph represents the cyber appetence of the texts:  </p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18310 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/4new.png" alt="" width="971" height="460" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/4new.png 971w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/4new-403x191.png 403w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/4new-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/4new-768x364.png 768w" sizes="auto, (max-width: 971px) 100vw, 971px" /></p>
<p style="text-align: center;"><em>Figure 4 Text corpus between 2018 and 2021</em></p>
<h1> </h1>
<h1>What the texts say about Cybersecurity</h1>
<p>As shown in Figure 4, a significant number of texts propose requirements related to cyber security. This is partly because AI has functional specificities that need to be addressed by cyber requirements. To go into the technical details of the texts, let us reduce AI to one of its most uses today: Machine Learning (Details of how Machine Learning works are provided in <em>Annex I : Machine Learning</em>).</p>
<p>Numerous cyber requirements exist to protect the assets support applications using Machine Learning (ML) throughout the project lifecycle. On a macroscopic scale, these requirements can be categorised into the classic cybersecurity pillars<a href="#_ftn6" name="_ftnref1"><sup>[6]</sup></a><sup> </sup> extracted from the NIST Framework<a href="#_ftn7" name="_ftnref2">[7]</a> :</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18112 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image5b.png" alt="" width="1431" height="641" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image5b.png 1431w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image5b-426x191.png 426w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image5b-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image5b-768x344.png 768w" sizes="auto, (max-width: 1431px) 100vw, 1431px" /></p>
<p><a href="#_ftnref6" name="_ftn1"></a></p>
<p style="text-align: center;"><em>Figure 5 Cybersecurity pillars</em></p>
<p>The following diagram shows different texts with their cyber components:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18114 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image6b.png" alt="" width="932" height="474" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image6b.png 932w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image6b-376x191.png 376w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image6b-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image6b-768x391.png 768w" sizes="auto, (max-width: 932px) 100vw, 932px" /></p>
<p style="text-align: center;"><em>Figure 6 Cyber specificities of some important texts</em></p>
<p style="text-align: justify;">In general, if we cross-reference the results of the Figure 6 with those of the study of all the texts, it appears that three requirements are particularly addressed:</p>
<ul style="text-align: justify;">
<li>Analyse the risks on ML systems considering their specificities, to identify both &#8220;classical&#8221; and ML-specific security measures. To do this, the following steps should generally be followed:
<ul>
<li>Understand the interests of attackers in attacking the ML system.</li>
<li>Identify the sensitivity of the data handled in the life cycle of the ML system (e.g., personal, medical, military etc.).</li>
<li>Framing the legal and intellectual property rights requirements (who owns the model and the data manipulated in the case of cloud hosting for example).</li>
<li>Understand where the different supporting assets of applications using Machine Learning are hosted throughout the life cycle of the Machine Learning system. For example, some applications may be hosted in the cloud, other on-premises. The cyber risk strategy should be adjusted accordingly (management of service providers, different flows etc.).</li>
<li>Understand the architecture and exposure of the model. Some models are more exposed than others to Machine Learning-specific attacks. For example, some models are publicly exposed and thus may be subject to a thorough reconnaissance phase by an attacker (e.g. by dragging inputs and observing outputs).</li>
<li>Include specific attacks on Machine Learning algorithms. There are three main types of attack: evasion attacks (which target integrity), oracle attacks (which target confidentiality) and poisoning attacks (which target integrity and availability).</li>
</ul>
</li>
<li>Track and monitor actions. This includes at least two levels:
<ul>
<li>Traceability (log of actions) to allow monitoring of access to resources used by the ML system.</li>
<li>More &#8220;business&#8221; detection rules to check that the system is still performing and possibly detect if an attack is underway on it.</li>
</ul>
</li>
<li>Have data governance. As explained in <em>Annex I : Machine Learning</em>, data is the raw material of ML systems. Therefore, a set of measures should be taken to protect it such as:
<ul>
<li>Ensure integrity throughout the entire data life cycle.</li>
<li>Secure access to data.</li>
<li>Ensure the quality of the data collected.</li>
</ul>
</li>
</ul>
<p style="text-align: justify;">It is likely that these points will be present in the first published regulations.</p>
<p> </p>
<h1>The AI Act: will Europe take the lead as with the RGPD?</h1>
<p>In the context of this study, we looked more closely at what has been done in the European Union and one text caught our attention.</p>
<p>The claim that there is no legislation yet is only partly true. In 2021, the European Commission published the AI Act <a href="#_ftn8" name="_ftnref1">[8]</a> : a legislative proposal that aims to address the risks associated with certain uses of AI. Its objectives, to quote the document, are to:</p>
<ul>
<li>Ensure that AI systems placed on the EU market and used are safe and respect existing fundamental rights legislation and EU values.</li>
<li>Ensuring legal certainty to facilitate investment and innovation in AI.</li>
<li>Strengthen governance and effective enforcement of existing legislation on fundamental rights and security requirements for AI systems.</li>
<li>Facilitate the development of a single market for legal, safe, and trustworthy AI applications and prevent market fragmentation.</li>
</ul>
<p>The AI Act is in line with the texts listed above. It adopts a risk-based approach with requirements that depend on the risk levels of AI systems. The regulation thus defines four levels of risk:</p>
<ul>
<li>AI systems with unacceptable risks.</li>
<li>AI systems with high risks.</li>
<li>AI systems with specific risks.</li>
<li>AI systems with minimal risks.</li>
</ul>
<p>Each of these levels is the subject of an article in the legislative proposal to define them precisely and to construct the associated regulation.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18116 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image7b.png" alt="" width="923" height="342" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image7b.png 923w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image7b-437x162.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image7b-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image7b-768x285.png 768w" sizes="auto, (max-width: 923px) 100vw, 923px" /></p>
<p style="text-align: center;"><em>Figure 7 The risk hierarchy in the IA Act<a href="#_ftn9" name="_ftnref1">[9]</a></em></p>
<p>For high-risk AI systems, the AI Act proposes cyber requirements along the lines of those presented above. For example, if we use the NIST-inspired categorization presented in Figure 5 The AI Act proposes the following requirements:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18118 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image8b.png" alt="" width="3761" height="2420" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image8b.png 3761w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image8b-297x191.png 297w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image8b-61x39.png 61w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image8b-768x494.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image8b-1536x988.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image8b-2048x1318.png 2048w" sizes="auto, (max-width: 3761px) 100vw, 3761px" /></p>
<p style="text-align: justify;">Even if the text is only a proposal (it may be adopted within 1 to 5 years), we note that the European Union is taking the lead by proposing a bold regulation to accompany the development of AI, as it is with personal data and the RGPD.</p>
<p> </p>
<h1>What future for AI regulation and cybersecurity?  </h1>
<p style="text-align: justify;">In recent years, numerous texts on the regulation of AI systems have been published. Although there is no legislation to date, the pressure is mounting with numerous texts, such as the AI Act, a European Union proposal, being published. These proposals provide requirements in terms of AI development strategy, ethics and cyber security. For the latter, the requirements mainly concern topics such as cyber risk management, monitoring, governance and data protection. Moreover, it is likely that the first regulations will propose a risk-based approach with requirements adapted according to the level of risk.</p>
<p style="text-align: justify;">In view of its analysis of the situation, Wavestone can only encourage the development of an approach such as that proposed by the AI Act by adopting a risk-based methodology. This means identifying the risks posed by projects and implementing appropriate security measures. This would allow us to get started and avoid having to comply with the law after the fact.</p>
<p> </p>
<h3>Annex I: Machine Learning</h3>
<p style="text-align: justify;">Machine Learning (ML) is defined as the opportunity for systems<a href="#_ftn10" name="_ftnref1">[10]</a> to learn to solve a task using data without being explicitly programmed to do so. Heuristically, an ML system learns to give an &#8220;adequate output&#8221;, e.g. does a scanner image show a tumour, from input data (i.e. the scanner image in our example).</p>
<p style="text-align: justify;">To quote ENISA<a href="#_ftn11" name="_ftnref2"><sup>[11]</sup></a> , the specific features on which Machine Learning is based are the following:</p>
<ul style="text-align: justify;">
<li>The data. It is at the heart of Machine Learning. Data is the raw material consumed by ML systems to learn to solve a task and then to perform it once in production.</li>
<li>A model. That is, a mathematical and algorithmic model that can be seen as a box with a large set of adjustable parameters used to give an output from input data. In a phase called learning, the model uses data to learn how to solve a task by automatically adjusting its parameters, and then once in production it will be able to complete the task using the adjusted parameters.</li>
<li>Specific processes. These specific processes address the entire life cycle of the ML system. They concern, for example, the data (processing the data to make it usable, for example) or the parameterisation of the model itself (how the model adjusts its parameters based on the data it uses).</li>
<li>Development tools and environments. For example, many models are trained and then stored directly on cloud platforms as they require a lot of resources to perform the model calculations.</li>
<li>Notably because new jobs have been created with the rise of Machine Learning, such as the famous Data Scientists.</li>
</ul>
<p style="text-align: justify;">Generally, the life cycle of a Machine Learning project can be broken down into the following stages:</p>
<p><a href="#_ftnref10" name="_ftn1"></a></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18120 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image9b.png" alt="" width="378" height="318" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image9b.png 378w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image9b-227x191.png 227w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/Image9b-46x39.png 46w" sizes="auto, (max-width: 378px) 100vw, 378px" /></p>
<p style="text-align: center;"><em>Figure 8 Life cycle of a Machine Learning project<a href="#_ftn12" name="_ftnref2"><sup>[12]</sup></a></em></p>
<h3> </h3>
<h3>Annex 2 Non-exhaustive list of texts relating to AI and the framework for its development</h3>
<table style="border-style: solid; width: 101.478%; border-color: #000000; background-color: #ffffff;" width="652">
<tbody>
<tr>
<td style="width: 15.8779%;" width="105">
<p>Country or international entities</p>
</td>
<td style="width: 40%;" width="270">
<p>Title of the document<a href="#_ftn13" name="_ftnref1">[13]</a></p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Published by</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>Date of publication</p>
</td>
</tr>
<tr>
<td style="width: 15.8779%;" rowspan="4" width="105">
<p><strong>France </strong></p>
</td>
<td style="width: 40%;" width="270">
<p>Making sense of AI: for a national and European strategy</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Cédric Villani</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>March 2018</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>National AI Research Strategy</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Ministry of Higher Education, Research and Innovation, Ministry of Economy and Finance, General Directorate of Enterprises, Ministry of Health, Ministry of the Armed Forces, INRIA, DINSIC</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>November 2018</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Algorithms: preventing the automation of discrimination</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Defenders of rights &#8211; CNIL</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>May 2020</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>AI safety</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>CNIL</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>April 2022</p>
</td>
</tr>
<tr>
<td style="width: 15.8779%;" rowspan="7" width="105">
<p><strong>Europe</strong></p>
</td>
<td style="width: 40%;" width="270">
<p>Artificial Intelligence for Europe</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>European Commission</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>April 2018</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Ethical Guidelines for Trustworthy AI</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>High-level freelancers on artificial intelligence</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>April 2019</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Building confidence in human-centred artificial intelligence</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>European Commission</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>April 2019</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Policy and Investment Recommendations for Trustworthy AI</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>High-level freelancers on artificial intelligence</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>June 2019</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>White Paper &#8211; AI: a European approach based on excellence and trust</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>European Commission</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>February 2020</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>AI Act</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>European Commission</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>April 2021</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Securing Machine Learning Algorithms</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>ENISA</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>November 2021</p>
</td>
</tr>
<tr>
<td style="width: 15.8779%;" width="105">
<p><strong>Belgium</strong></p>
</td>
<td style="width: 40%;" width="270">
<p>AI 4 Belgium</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>AI 4 Belgium Coalition</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>March 2019</p>
</td>
</tr>
<tr>
<td style="width: 15.8779%;" width="105">
<p><strong>Luxembourg</strong></p>
</td>
<td style="width: 40%;" width="270">
<p>Artificial intelligence: a strategic vision for Luxembourg</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Digital Luxembourg, Government of the Grand Duchy of Luxembourg</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>May 2019</p>
</td>
</tr>
<tr>
<td style="width: 15.8779%;" rowspan="9" width="105">
<p><strong>United States</strong></p>
</td>
<td style="width: 40%;" width="270">
<p>A Vision for Safety 2.0: Automated Driving Systems</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Department of Transportation</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>August 2017</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Preparing for the Future of Transportation: Automated Vehicles 3.0</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Department of Transportation</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>October 2018</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>The AIM Initiative: A Strategy for Augmenting Intelligence Using Machines</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Department of Defense</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>January 2019</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Summary of the 2018 Department of Defense Artificial Intelligence Strategy: Harnessing AI to Advance our Security and Prosperity</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Department of Defense</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>February 2019</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>The National Artificial Intelligence Research and Development Strategic Plan: 2019 Update</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>National Science &amp; Technology Council</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>June 2019</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>A Plan for Federal Engagement in Developing Technical Standards and Related Tools</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>NIST (National Institute of Standards and Technology)</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>August 2019</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Ensuring American Leadership in Automated Vehicle Technologies: Automated Vehicles 4.0</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Department of Transportation</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>January 2020</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Aiming for truth, fairness, and equity in your company&#8217;s use of AI</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Federal trade commission</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>April 2021</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>AI Risk Management framework: Initial Draft</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>NIST</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>March 2022</p>
</td>
</tr>
<tr>
<td style="width: 15.8779%;" rowspan="8" width="105">
<p><strong>United Kingdom</strong></p>
</td>
<td style="width: 40%;" width="270">
<p>AI Sector Deal</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Department for Business, Energy &amp; Industrial Strategy; Department for Digital, Culture, Media &amp; Sport</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>May 2018</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Data Ethics Framework</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Department for Digital, Culture Media &amp; Sport</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>June 2018</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Intelligent security tools: Assessing intelligent tools for cyber security</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>National Cyber Security Center</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>April 2019</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Understanding Artificial Intelligence Ethics and Safety</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>The Alan Turing Institute</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>June 2019</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Guidelines for AI Procurement</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Office for Artificial Intelligence</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>June 2020</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>A guide to using artificial intelligence in the public sector</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Office for Artificial Intelligence</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>January 2020</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>AI Roadmap</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>UK AI Council</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>January 2021</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>National AI Strategy</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>HM Government</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>September 2021</p>
</td>
</tr>
<tr>
<td style="width: 15.8779%;" rowspan="2" width="105">
<p><strong>Hong Kong</strong></p>
</td>
<td style="width: 40%;" width="270">
<p>High-level Principles on Artificial Intelligence</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Hong Kong Monetary Authority</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>November 2019</p>
</td>
</tr>
<tr>
<td style="width: 40%;" width="270">
<p>Reshaping banking witth Artificial Intelligence</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Hong Kong Monetary Authority</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>December 2019</p>
</td>
</tr>
<tr>
<td style="width: 15.8779%;" width="105">
<p><strong>OECD</strong></p>
</td>
<td style="width: 40%;" width="270">
<p>Recommendation of the Council on Artificial Intelligence</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>OECD</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>May 2019</p>
</td>
</tr>
<tr>
<td style="width: 15.8779%;" width="105">
<p><strong>United Nations</strong></p>
</td>
<td style="width: 40%;" width="270">
<p>System-wide Approach and Road map for Supporting Capacity Development on AI</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>UN System Chief Executives Board for Coordination</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>June 2019</p>
</td>
</tr>
<tr>
<td style="width: 15.8779%;" width="105">
<p><strong>Brazil</strong></p>
</td>
<td style="width: 40%;" width="270">
<p>Brazilian Legal Framework for Artificial Intelligence</p>
</td>
<td style="width: 29.6183%;" width="200">
<p>Brazilian congress</p>
</td>
<td style="width: 42.1374%;" width="76">
<p>September 2021</p>
</td>
</tr>
</tbody>
</table>
<p> </p>
<p> </p>
<p><a href="#_ftnref1" name="_ftn1"></a></p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> Summer school that brought together scientists such as the famous John McCarthy. However, the origins of AI can be attributed to different researchers. For example, in the literature, names like the computer scientist Alan Turing can also be found.</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> For example, Amazon was accused in October 2021 of not complying with Article 22 of the GDPR. For more information: https:<a href="https://www.usine-digitale.fr/article/le-fonctionnement-de-l-algorithme-de-paiement-differe-d-amazon-violerait-le-rgpd.N1154412">//www.usine-digitale.fr/article/le-fonctionnement-de-l-algorithme-de-paiement-differe-d-amazon-violerait-le-rgpd.N1154412</a></p>
<p><a href="#_ftnref3" name="_ftn1">[3]</a> AI does not escape certain laws and regulations such as the RGPD for the countries concerned. We note for example this text from the CNIL: https://www.cnil.fr/fr/intelligence-artificielle/ia-comment-etre-en-conformite-avec-le-rgpd.</p>
<p><a href="#_ftnref4" name="_ftn2">[4]</a> Except for legislative proposals as we shall see later for the European Union. The case of Brazil is not treated in this article.</p>
<p><a href="#_ftnref5" name="_ftn2">[5]</a> This list is not exhaustive. The figures given give orders of magnitude on the main publishers of texts on the development of AI.</p>
<p>The texts on which the study is based are available in Annex 2 page 9</p>
<p><a href="#_ftnref6" name="_ftn1">[6]</a> We have chosen to merge the identification and protection phase for the purposes of this article.</p>
<p><a href="#_ftnref7" name="_ftn2">[7]</a> National Institute of Standards and Technology (NIST), Framework for improving Critical Infrastructure Cybersecurity, 16 April 2018, available at https://www.nist.gov/cyberframework/framework</p>
<p><a href="#_ftnref8" name="_ftn1">[8]</a> Available at: https:<a href="https://artificialintelligenceact.eu/the-act/">//artificialintelligenceact.eu/the-act/</a></p>
<p><a href="#_ftnref9" name="_ftn1">[9]</a> Loosely based on : Eve Gaumond, Artificial Intelligence Act: What is the European Approach for AI? in Lawfare, June 2021, available at: https:<a href="https://www.lawfareblog.com/artificial-intelligence-act-what-european-approach-ai">//www.lawfareblog.com/artificial-intelligence-act-what-european-approach-ai</a></p>
<p><a href="#_ftnref10" name="_ftn1">[10]</a> We talk about systems so as not to reduce AI.</p>
<p><a href="#_ftnref11" name="_ftn2">[11]</a><a href="https://www.enisa.europa.eu/publications/artificial-intelligence-cybersecurity-challenges"> https://www.enisa.europa.eu/publications/artificial-intelligence-cybersecurity-challenges</a></p>
<p><a href="#_ftnref12" name="_ftn2">[12]</a><a href="https://www.enisa.europa.eu/publications/securing-machine-learning-algorithms">  https://www.enisa.europa.eu/publications/securing-machine-learning-algorithms</a></p>
<p><a href="#_ftnref13" name="_ftn2">[13]</a> Note that some titles have been translated in English.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/06/artificial-intelligence-soon-to-be-regulated/">Artificial Intelligence soon to be regulated?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/06/artificial-intelligence-soon-to-be-regulated/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The 2020 French Cyber-Security Startups Radar: our analysis (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/the-2020-french-cyber-security-startups-radar-our-analysis-2-2/</link>
		
		<dc:creator><![CDATA[Morgane Nicolas]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 08:00:52 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[fundraising]]></category>
		<category><![CDATA[radar startups]]></category>
		<category><![CDATA[scale-ups]]></category>
		<category><![CDATA[startups]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14660</guid>

					<description><![CDATA[<p>In a previous article, we shared an initial analysis of the dynamics of the cyber security startup ecosystem in France. The panorama of startups remains constant, with newly created startups already showing great promise. Others, with already several years of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/the-2020-french-cyber-security-startups-radar-our-analysis-2-2/">The 2020 French Cyber-Security Startups Radar: our analysis (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="heading-text el-text">
<p><em>In a previous article, we shared an initial analysis of the dynamics of the cyber security startup ecosystem in France. The panorama of startups remains constant, with newly created startups already showing great promise. Others, with already several years of activity to their credit, have continued to grow, to the point that we had to create a new category: scale-ups. However, this ecosystem is facing two major adversities, such as the current health crisis and the resulting slowdown in international trade. We have therefore tried to envisage the necessary evolutions for this startup ecosystem.</em></p>
<p>&nbsp;</p>
<h2 id="crisis">The health crisis: an activity slowdown but not a halt</h2>
</div>
<div class="uncode_text_column">
<p>Despite a major health crisis having a major impact, <strong>the vast majority of startups remain confident about their future</strong> (more than 80% of the startups surveyed).  Some client companies have even prioritized their cyber security activities to strengthen their position in this unprecedented context.</p>
</div>
<p>&nbsp;</p>
<figure id="post-14675 media-14675" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14675 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-2.png" alt="" width="1012" height="546" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-2.png 1012w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-2-354x191.png 354w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-2-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-2-768x414.png 768w" sizes="auto, (max-width: 1012px) 100vw, 1012px" /></figure>
<p>&nbsp;</p>
<div class="uncode_text_column">
<p>Thus, 34% of the startups surveyed stated that they were balanced in terms of business opportunities, with those lost since mid-March having been able to make up for those lost. 21% of them have even seen an increase!</p>
<p>A reassuring figure, to be put into perspective, as more than a third (37%) of them have suffered losses in market share, notably due to investment halt for certain clients. Some still have trouble giving their opinion due to a lack of commercial visibility (8%).</p>
<p>On this last point, the relevance of the sector of activity of these startups to the new challenges brought about by the health crisis is probably related. The majority of those who resist are in fact addressing issues raised by the forced generalization of remote access to information systems: data protection and secure exchanges, monitoring and protection of assets, and access management. The reorientation of their commercial efforts towards resilient sectors, such as healthcare, is probably another factor in these results.</p>
<p>75% of the startups surveyed also took advantage of the period to refocus on R&amp;D or their products marketing.</p>
<p>These figures demonstrate <strong>the ability of startups to cope with the crisis, despite the adversity and uncertainty it brings, through their great flexibility and responsiveness capabilities</strong>. It also highlights <strong>the cybersecurity sector resilience</strong>, as it remains a key challenge for companies. Even in this period of economic crisis, they continue to seek ever more relevant and effective solutions to guarantee their security.</p>
<div class="heading-text el-text">
<h3><span lang="EN-US">A particularly visible slowdown in fund raising</span></h3>
</div>
<div class="uncode_text_column">
<p>We compare here two fundraising periods on the whole ecosystem (cybersecurity startups and scale-ups): period 2019-2020 (from July 2019 to June 2020) and period 2018-2019 (from July 2018 to June 2019).</p>
<p><strong>The qualitative resilience of the ecosystem noted above masks a more negative situation on fundraising</strong>. The 100 million euros raised in cyber security over the period 2019-2020 is far less compared to the more than 260 million euros raised in the previous one, 2018-2019.</p>
</div>
</div>
<p>&nbsp;</p>
<figure id="post-14677 media-14677" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14677 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-6-1.png" alt="" width="1431" height="769" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-6-1.png 1431w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-6-1-355x191.png 355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-6-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-6-1-768x413.png 768w" sizes="auto, (max-width: 1431px) 100vw, 1431px" /></figure>
<p>&nbsp;</p>
<div class="uncode_text_column">
<div class="uncode_text_column">
<p>However, the 2018-2019 period had been exceptional: 7 radar startups had raised around 10 million euros, 2 were close to 200 million euros alone. Fundraising in previous years had never reached such levels.</p>
<p>2019-2020 has been exceptional as well, but in a very different way. Great fundraisings took place until February: the top 4 was achieved over this period. Unfortunately, the activity was quickly impacted by the health crisis. Several surveys planned between February and April were postponed.</p>
<p>However, a restart was observed in April (<strong>Stamus Networks</strong>) and interesting fundraisings followed in June (e.g. <strong>Didomi, Quarkslab</strong>). These results point to a more successful end of the year.</p>
<p>As also foreseen by ACE-Management (<a href="https://www.riskinsight-wavestone.com/en/2020/11/interview-with-ace-management-2020-french-cybersecurity-startups-radar/"><strong>please find here the interview</strong></a>), a lag effect of a few months in investments seems to be emerging, rather than a decrease, once again highlighting the dynamism of the cybersecurity market.</p>
<p><strong>Another interesting aspect of the 2019-2020 period is that weaker fundraising is on the rise</strong>. 7 startups have raised between 2.5 and 5 million euros compared to only 3 in the previous period. Is this a potential indicator of the growing willingness of startups to raise funds early in order to accelerate their development? Or perhaps we are witnessing the preparation of the next generations of scale-ups? In any case, it is a very positive sign for ecosystem dynamic.</p>
<p>Given the exceptional characteristics of the two periods, it sounds difficult to draw a definitive analysis. We hope to see you next year, as it will be necessary to put those findings in perspective.</p>
<p>&nbsp;</p>
<div class="heading-text el-text">
<h2 id="developments">Developments needed in all facets of the ecosystem to ensure its success</h2>
</div>
<div class="heading-text el-text">
<h3><span lang="EN-US">Clients: take the risk of going beyond POCs</span></h3>
</div>
<div class="uncode_text_column">
<p>Clients also have a key role to play in the development of French startups.</p>
<p>In this respect, we see that companies increasingly trust French startups and support them while testing them: 70% of them carry out “Proof of Concepts” financed by their clients against 67% last year. An increase that we can only welcome, as these investments allow French gems to develop faster.</p>
<p>However, <strong>to continue to support this ecosystem development, it is also necessary to accept the risk of transforming the trial by contracting with the solutions tested</strong>. This year, companies are finding it harder to do this quickly: 30% of them may take more than six months to sign a contract after a POC, compared with 25% in 2019. The health crisis may partly explain this situation.</p>
<p>Working with a startup can certainly be risky, but it is also a gamble on the future. They can provide solutions to problems to which the “traditional” market has not provided answers for many years, enable you to remain at the cutting edge, or even provide greater support for business innovation (e.g. by securing new uses), and ultimately provide major differentiators. Some countries are keen to take this type of risk, and this is less the case in France, but nothing is stopping us from transforming ourselves.</p>
<div class="heading-text el-text">
<h3><span lang="EN-US">Startups: know how to identify the next gems from your clients!</span></h3>
</div>
<div class="uncode_text_column">
<p>Even if it seems trivial, it is important to remember how crucial for a startup to position itself on issues that have few or no satisfactory answers on the “classic” market.</p>
<p>To do so, it is essential for startups to be attentive to the needs of their future clients and to position themselves on their crucial issues.</p>
<p>The identification should not only be technological but should also take into account criteria such as the difficulty of integrating the technology into the client’s information system, the existence of established competition or the willingness of the main principals to invest in a new technology. It is the combination of these criteria that makes it possible to identify the topics that will be the most successful on the market!</p>
<p>Products that require the installation of elements on many IS equipments (e.g. a new security agent on workstations) are particularly difficult to “sell” to large companies that are already equipped. More passive approaches are more attractive to them. This can be done even more easily for still rapidly evolving themes such as surveillance or analysis of IS logs.</p>
<p>Competition from large, well-established players can be difficult for a start-up to overcome. This is the case in the EDR market, for example, where strong differentiating arguments will be necessary to break through against major players that are already recognized. Conversely, themes such as cyber-resilience and cryptography, for example, remain under-addressed in relation to market expectations, and would therefore be easier to break through from this point of view.</p>
<p>Finally, the investment willingness of the principals should also be considered. Regarding cryptography, for instance, the arrival of quantum computers is still too far away for it to be part of their imminent concerns, as the horizon in the private sector is certainly around 2023/2024. Data anonymization, while keeping anonymized databases consistency (<em>synthetic data</em>), <em>Data Leakage Prevention</em> or <em>Passwordless</em> are also major concerns for companies, which still do not have satisfactory answers on the market. The rationalization of CISO tools, which are currently more in search of optimization than investment in nth security solutions, is a topic that will be much more considered in the short term.</p>
<div class="heading-text el-text">
<h3><span lang="EN-US">Startups: don&#8217;t forget to take advantage of financing and support opportunities!</span></h3>
</div>
<div class="uncode_text_column">
<p>This year, another 32% of the startups surveyed do not plan to raise funds, and more than half of them have never been supported in their development.</p>
<p>Financing and support are nevertheless interesting accelerators, even more in the extremely fast cybersecurity market, where speed of market conquest is a crucial asset.</p>
<p>This lack of willingness to accelerators, which has been observed for several years, can partly be explained by a historical lack of specialized cybersecurity structures in France, making it more complex for startups to exchange information and to make the most of them.</p>
<p>However, the situation has improved and the consideration of cybersecurity at the national level is particularly accelerating this year:</p>
<ul>
<li>The State is mobilizing funds for innovation, particularly in the cybersecurity sector, for which the economic recovery plan provides at least 136 million euros;</li>
<li>A major challenge dedicated to cybersecurity has been launched, the publication of its roadmap in July this year was followed by a call for projects from BPI France with investments of several tens of millions of euros;</li>
<li>The French fund Brienne III, officially launched in June 2019 with a first round of financing at 80 million euros and managed by ACE-Management, specializes in cybersecurity. Other investors do not hesitate today to finance initiatives in this field.</li>
</ul>
<p>So many opportunities to be used for the startups in the ecosystem, and it would be a shame to do without it today. <strong>Current events highlight even more the fact that now is the right time to turn to these accelerators, as cybersecurity appears to be an essential part of the “new world”, where teleworking will remain a long-term phenomenon</strong>.</p>
<div class="heading-text el-text">
<h3><span lang="EN-US">Ecosystem: let&#8217;s catalyze and amplify these promising initiatives!</span></h3>
</div>
<div class="uncode_text_column">
<p>As we have seen, initiatives for the development of cybersecurity are springing up: the State is mobilizing (cyberdefense factory, grand défi, sector contract, cyber campus…), investors and incubators are also launching private initiatives.</p>
<p>The state is opening up widely thanks to these initiatives and is adopting an increasingly innovative stance. We hope that this will encourage employees of concerned entities to embark on the entrepreneurial adventure. Indeed, our cyber state actors have unparalleled visibility of the threat and use tools or approaches that would be beneficial to offer to the private sector in the short or medium term. The creation of spin-offs is still too small in France compared to other countries, such as Israel and the United States, where state entities are among the first providers of startuppers.</p>
<p>The challenge now will be to make the most of this diversity of potential energizers of the French cyber ecosystem. The risk would be that these means of supporting the market would compete and disperse, operating in silos, to the point of causing confusion and “blurring” the messages to the players in the ecosystem.</p>
<p>And that would be really damaging. We are at the dawn of a pivotal year for our ecosystem: all the components seem to come together to achieve its transformation and allow it to scale up. The question now seems to be: will we collectively succeed in making this movement a reality? Because in order to do this, it seems essential to us to join forces in presence, to catalyze them towards this common goal. A role that the cyber campus could play?</p>
<p>And that would be really damaging. <strong>We are at the dawn of a pivotal year for our ecosystem: all the components seem to be coming together to achieve its transformation and allow it to scale up</strong>. The question now seems to be: will we collectively succeed in making this movement a reality? In order to do so, it seems essential to join forces and to catalyze them towards this common goal. Is it a role that the Cyber Campus could play?</p>
<p>&nbsp;</p>
<h2 class="heading-text el-text"><span lang="EN-US">2021: the year of fulfillment?</span></h2>
<div class="uncode_text_column">
<p>Despite the impacts of the global health crisis, cybersecurity remains a resilient sector, as the ecosystem of French startups in this field has also demonstrated. Their development projects are sometimes delayed, but they remain confident about their future despite the challenges they have faced and will continue to face.</p>
<p>In this context, it remains essential to continue to support the ecosystem development. Many specialized support services are being created, and <strong>2021 will be a pivotal year for the transformation of our ecosystem and for raising it to an international level</strong>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/the-2020-french-cyber-security-startups-radar-our-analysis-2-2/">The 2020 French Cyber-Security Startups Radar: our analysis (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The 2020 French Cyber-Security Startups Radar: our analysis (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/the-2020-french-cyber-security-startups-radar-our-analysis-1-2/</link>
		
		<dc:creator><![CDATA[Morgane Nicolas]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 07:00:59 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[radar]]></category>
		<category><![CDATA[scale-ups]]></category>
		<category><![CDATA[startups]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14659</guid>

					<description><![CDATA[<p>Towards realization despite adversity? Last year marked the beginning of the French cybersecurity startups ecosystem transformation. This year, many questions are being asked: has the momentum continued despite the health crisis? How has the ecosystem responded? What actions would support it...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/the-2020-french-cyber-security-startups-radar-our-analysis-1-2/">The 2020 French Cyber-Security Startups Radar: our analysis (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="heading-text el-text"><span lang="EN-US">Towards realization despite adversity?</span></h2>
<div class="uncode_text_column vc_custom_1603380008714 border-color-gyho-color">
<p>Last year marked the beginning of the French cybersecurity startups ecosystem transformation. This year, many questions are being asked: <strong>has the momentum continued despite the health crisis? How has the ecosystem responded? What actions would support it towards scaling up?</strong></p>
<p>&nbsp;</p>
</div>
<figure id="post-14661 media-14661" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14661 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-6.png" alt="" width="1143" height="811" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-6.png 1143w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-6-269x191.png 269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-6-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-6-768x545.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-6-345x245.png 345w" sizes="auto, (max-width: 1143px) 100vw, 1143px" /></figure>
<p>&nbsp;</p>
<div class="heading-text el-text">
<h2 id="dynamic">A dynamic ecosystem where some startups are reaching maturity</h2>
</div>
<div class="heading-text el-text">
<h3><span lang="EN-US">An ever-changing panorama of startups</span></h3>
<p><strong>Our radar now lists 152 cybersecurity startups, which represents 18 more startups than in June 2019, representing a 13% growth</strong>. Regarding their size, there has been a sharp increase (73%) in the number of “medium-sized companies”, while the number of “very small companies” and “small companies” remains stable, which is a sign that the market is becoming stronger. In total, startups represent more than 1,400 employees, 17% more than last year, a figure that has increased for the 4<sup>th</sup> year in a row.</p>
</div>
<p>&nbsp;</p>
<figure id="post-14663 media-14663" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14663 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-6.png" alt="" width="1398" height="569" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-6.png 1398w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-6-437x178.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-6-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-6-768x313.png 768w" sizes="auto, (max-width: 1398px) 100vw, 1398px" /></figure>
<p>&nbsp;</p>
<div class="heading-text el-text">
<p><strong>In terms of geographical distribution, the findings are is quite similar to 2019: Paris remains the main hub (more than 60% of the radar startups have headquarters there).</strong> Rennes region comes in second position and continues to grow in volume to reach 10% of representativeness. Bordeaux region comes third, with 4% of startups.</p>
<div class="heading-text el-text">
<h3><span lang="EN-US">Still promising startup creations</span></h3>
</div>
<div class="uncode_text_column">
<p><strong>The radar shows 16 young</strong> startups created between early 2019 and August 2020. Among these startups, we can see that:</p>
<ul>
<li>More than a quarter focus on <strong>data protection topics</strong>: <strong>Olvid, Protected, Pineapple Technology, BusterAI</strong></li>
<li>Nearly another quarter on <strong>vulnerability management and operational security activities: Patrowl, V6Protect, Purplemet</strong>.</li>
<li>Endpoint protection <strong>(Nucleon Security, Glimps)</strong> completes the podium of the main themes addressed by these new startups.</li>
</ul>
<p>We want to raise your attention to <strong>Malizen</strong>, a startup which is positioned on threat hunting and assistance to investigations by incident response teams, a topic that is still little represented in today’s ecosystem. <strong>Moabi’s</strong> position on firmware security auditing (embedded software) is also interesting in terms of connected objects security.</p>
<p>These new startups most often originate from the identification of a gap in the market by one of the founders during a previous professional experience. This year, however, two companies, <strong>Malizen</strong> and <strong>CryptoNext</strong>, have emerged from research projects. This is a small but interesting figure compared to previous years, especially in a French context where the world of research and that of cybersecurity are still too separate.</p>
</div>
</div>
<p>&nbsp;</p>
<figure id="post-14665 media-14665" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14665 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-6.png" alt="" width="1302" height="749" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-6.png 1302w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-6-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-6-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-6-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-6-768x442.png 768w" sizes="auto, (max-width: 1302px) 100vw, 1302px" /></figure>
<p>&nbsp;</p>
<div class="heading-text el-text">
<div class="uncode_text_column">
<div class="heading-text el-text">
<h3>Only 38% of French startups position themselves on emerging themes</h3>
</div>
<div class="uncode_text_column">
<p>The startups relationship to innovation remains stable compared to previous years. <strong>30% of startups are disruptive and create new security solutions and 8% secure new uses (IoT, Cloud, etc.)</strong>. However, the majority (62%) of startups reinvent existing solutions by proposing improvements. Despite the lack of direct innovation, these startups can be very successful if they demonstrate business agility. A perfect example is <strong>Egerie Software</strong>, which quickly tackled the issue of digitizing the Ebios Risk Manager risk analysis method developed by ANSSI.</p>
<p><strong>In terms of innovation, we can emphasize cryptography, as current encryption methods are threatened by quantum computing</strong>. This is precisely the aim of Cryptonext, a startup committed to providing robust encryption solutions in the face of these new threats, as it is focusing on post-quantum cryptography. Another startup, <strong>Cosmian</strong>, is focusing on the “confidential computing” trend, which makes it possible to encrypt data stored in the cloud using a homomorphic encryption algorithm, and then use encrypted data in the cloud without having to entrust the key to the service provider. <strong>Scille</strong> is another one to follow, as it introduced the CYOK concept (Create and Control Your Own Key) through its Parsec solution, that makes the user workstation the only trusted entity that automatically generates encryption keys.</p>
<p>Still at the center of the CISO’s concerns,<strong> the user is offered new innovative means of being made aware of security</strong>, with <strong>Cyberzen’s</strong> augmented reality, or <strong>HIA Secure’s</strong> new authentication methods using “human intelligence”, where the user himself generates single-use codes after solving challenges consisting of a sequence of symbols and characters.</p>
<p>With the generalization of teleworking for all employees, the health crisis of Covid-19 has also reinforced the need to <strong>secure the terminals</strong>. New French Endpoint Detection and Response (EDR) solutions continue to emerge, such as the Nucléon startup. Some are even going further regarding innovation, such as Glimps (created by four former DGA – the French Defence Procurement Agency – employees), which is trying to revolutionize malware detection and analysis by conceptualizing the compiled code, which allows them to free themselves from the modifications induced by the compilation, the target architecture and thus detect unknown threats on non-standard systems.</p>
<p>Many companies want to democratize the use of agile methodologies, while integrating security into these processes remains a real challenge in most cases. <strong>Intuitem</strong> tries to remedy this by providing the necessary tools to monitor their Agile Security Framework.</p>
<p>Finally, with the emergence of connected objects, <strong>the need for a secure IoT platform is more important than ever</strong>, this is what <strong>Tarides</strong> proposes through its OSMOSE solution.</p>
<div class="heading-text el-text">
<h3><span lang="EN-US">As some startups are becoming more mature, the first « scale-ups » are being identified</span></h3>
</div>
<div class="uncode_text_column">
<p><strong>20 startups are leaving the radar this year, 6 less than last year</strong>. Of these exits, 5 are very fast growing (exceeding 35 employees in less than 7 years of existence) and 1 is due to a buyout. This continuity compared to last year demonstrates a growing capability of the French startup ecosystem, as some “scale-ups” are emerging in the cybersecurity field and can expect to attract the largest buyers or larger funds. As such, we are launching, together with BPI France, a first non-exhaustive monitoring of this category. The aim will be to complete the scale-ups list with the startups that will leave the radar in the coming years, due to very rapid growth.</p>
<p>A smaller proportion of startups are removed from the radar solely because of their seniority (20% this year compared to 37% in 2019). This year, we are seeing the first projects put “on hold” (20%, unrelated to the health crisis) and those shifting from cybersecurity to other fields (20%).</p>
</div>
</div>
</div>
<p>&nbsp;</p>
</div>
<figure id="post-14667 media-14667" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14667 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-3.png" alt="" width="1011" height="530" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-3.png 1011w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-3-364x191.png 364w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-3-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-3-768x403.png 768w" sizes="auto, (max-width: 1011px) 100vw, 1011px" /></figure>
<p>&nbsp;</p>
<div class="heading-text el-text">
<div class="uncode_text_column">
<div class="uncode_text_column">
<div class="uncode_text_column">
<div class="heading-text el-text">
<h2 id="ecosystem">An ecosystem in full renewal</h2>
</div>
<div class="heading-text el-text">
<h3><span lang="EN-US">International: a growing reality for startups</span></h3>
</div>
<div class="uncode_text_column">
<p>The health crisis does not seem to have shaken the willingness of startups to internationalize: this year, nearly 63% of the startups say they have customers abroad compared to 50% one year ago and 13% of the startups are thinking about going abroad. Cybersecurity is indeed a global issue <strong>and going international may prove to be an opportunity for startups</strong>, with countries where cybersecurity market is more mature or important than in France.</p>
<p>Regarding startup expansion targets, 55% want to expand beyond European markets. <strong>The US market is the preferred target for a third of startups wishing to expand on an international scale</strong>, and some French gems like <strong>Sqreen</strong> or <strong>Alsid</strong> have already taken this direction.</p>
<p>However, the Asian market should not be forgotten, which, even if it is less successful (only 18% of startups interested), can prove to be promising. It is a large market, where a targeted approach is necessary. Indeed, it may be interesting to start by <strong>targeting the economic centers of Hong Kong and Singapore</strong>, known to be good bridges between Europe and Asia. Singapore is particularly dynamic in cybersecurity with a historic investor (<strong>SingTel</strong>) and incubation structures widely mobilized, such as <strong>ICE71</strong> or the branch of the English incubator <strong>CylonLab</strong>. However, Hong Kong remains strong, with a significant number of acceleration programs such as <strong>Cyberport</strong> and the DIP (<em><strong>Design Incubation Program</strong></em>).</p>
<div class="heading-text el-text">
<h3><span lang="EN-US">2019-2020: The Year of National Initiatives</span></h3>
</div>
<div class="uncode_text_column">
<p>The French cybersecurity ecosystem is in full renewal. Numerous initiatives were launched between 2019 and 2020.</p>
<p>In October 2019, the Ministry of the Armed Forces inaugurated the “<strong>Cyber Defense Factory</strong>“. It is a place for cross innovation between the civilian and military worlds. Based in Rennes, this facility enables startups, SMEs and academics to work together with DGA experts and military operational staff on cybersecurity issues. It will also provide access for selected companies to certain data from the government.</p>
<p>In addition, <strong>the Strategic Committee for the “Security Industries”</strong> sector has seen its strategic contract signed with the State. The latter includes a dedicated section for cybersecurity aimed at bringing out France’s potential in terms of cybersecurity by aligning and mobilizing the various players on policies for education, innovation and technological development. Concretely, it will promote the private/public relationships, as well as initiatives on the innovation front. The first major results are expected in 2021.</p>
<p>The <strong>Grands Défis</strong> initiative, which stems from Cédric Villani’s work on artificial intelligence, saw the publication of its cybersecurity roadmap in July 2020. With a 30-million-euros budget, it highlights key themes such as cybersecurity automation, SMEs security and IoT security. A call for applications has been opened by BPI France and will close in 2021. The roadmap also highlights the importance of cybersecurity, pushing for the creation of a dedicated structure to help entrepreneurs get started and support them as early as possible.</p>
<p>Finally, the Cyber Campus project has been validated at the highest level of the State. The creation of this emblematic site aims at bringing together the driving forces of French cybersecurity, obviously to better protect our country and its strategic assets, but also to develop its economy and promote France abroad on this theme. Innovation should be widely represented, with the presence of start-ups, demonstration areas and even initiatives to accelerate or incubate cybersecurity startups. It is scheduled to open in 2021.</p>
<p>&nbsp;</p>
<div class="uncode_text_column">
<div class="uncode_text_column">
<div class="uncode_text_column">
<div class="uncode_text_column">
<div class="uncode_text_column">
<div class="uncode_text_column">
<div class="uncode_text_column">
<p><em>This concludes the first part of our analysis of the dynamics of the cyber security startup ecosystem in France. The panorama of startups remains constant, with newly created startups already showing great promise. Others, with already several years of activity to their credit, have continued to grow, to the point that we have had to create a new category: scale-ups. However, this ecosystem is facing two major adversities, such as the current health crisis and the resulting slowdown in international trade. We will therefore see in a second part, what are the necessary evolutions for this startup ecosystem.</em></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/the-2020-french-cyber-security-startups-radar-our-analysis-1-2/">The 2020 French Cyber-Security Startups Radar: our analysis (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Interview with ACE Management &#8211; 2020 French Cybersecurity Startups Radar</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/interview-with-ace-management-2020-french-cybersecurity-startups-radar/</link>
		
		<dc:creator><![CDATA[Morgane Nicolas]]></dc:creator>
		<pubDate>Fri, 06 Nov 2020 09:00:03 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[startups]]></category>
		<category><![CDATA[startups radar]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14523</guid>

					<description><![CDATA[<p>Every year, Wavestone conducts an in-depth analysis of the ecosystem of French cybersecurity startups. In this context, our team has organized an interview with the private equity firm ACE Management and represented by Quentin BESNARD and François LAVASTE. Find the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/interview-with-ace-management-2020-french-cybersecurity-startups-radar/">Interview with ACE Management &#8211; 2020 French Cybersecurity Startups Radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Every year, Wavestone conducts an in-depth analysis of the ecosystem of French cybersecurity startups. In this context, our team has organized an interview with the private equity firm ACE Management and represented by Quentin BESNARD and François LAVASTE. </em><em>Find the complete analysis </em><a href="https://www.wavestone.com/en/insights/"><em>here</em></a><em>.</em></p>
<p>&nbsp;</p>
<h2>Cybersecurity fundraising are slowing down in the 2019-2020 fiscal year (from June 2019 to June 2020), how can this be explained?</h2>
<p>There was indeed a sharp drop in the amounts raised by tech start-ups in France in March/April 2020. This is even more flagrant in comparison with the previous fiscal year, 2018-2019, which was particularly exceptional for the cybersecurity ecosystem (around €300 million raised, with great fundraisings, such as Vade Secure and Dashlane).</p>
<p>2019-2020 is, in our opinion, an extraordinary year in many ways:</p>
<ul>
<li>Significant fundraising was carried out at the end of 2019 and early 2020: 33 million euros for CybelAngel, great fundraising also for Trust-in-Soft, Egerie, Dust Mobile and Quarkslab that we were able to support;</li>
<li>Those planned for the first half of 2020 were quickly impacted by the health crisis: several planned between February and April were postponed.</li>
</ul>
<p>Nevertheless, a restart of fundraisings was initiated in mid-April at a steady pace, and we decided at the beginning of the year to invest in four new companies (three in France, one in Europe). Thus, even if the health crisis has led to a short-term slowdown, <strong>the end of 2020 should bring new fundraisings, and potentially reverse the trend</strong>, particularly in the field of cybersecurity, which is still growing despite the Covid-19 crisis.</p>
<p>&nbsp;</p>
<h2>Some start-ups decide not to raise any funds. What do you think about this?</h2>
<p>It is possible to create an “organic” self-financing business, especially in the service industry, but its development will be <strong>much slower.</strong></p>
<p>However, in the cybersecurity market, velocity seems to be essential for a startup: an innovative idea at a given moment can very quickly become obsolete and miss its chance on the market.  We believe that fundraising is an essential step for a company with a software/SaaS offer in cybersecurity that wants to reach the critical size to be a leader in a market that is by nature very international.</p>
<p>From our point of view, the particularly technical topic that is cybersecurity requires a specialized fund with cybersecurity knowledge and therefore able to understand the issues, the technology, the market, to make the right investment choices and to be relevant in supporting companies. This makes ACE Management positioning even more relevant (for entrepreneurs) and differentiating on the market (for investors in our funds).</p>
<p>On that topic, it is also important to note that if Brienne III is today the only fund specialized in cybersecurity in France, there are similar funds in other European countries, such as Germany, and the Netherlands, which are natural partners for us.</p>
<p>&nbsp;</p>
<h2>All investors have their own magic recipe for identifying gems to invest in, would you share some of yours with us?</h2>
<p>Concerning the Brienne III fund, we are targeting startups that have already reached a certain maturity level and are looking to raise significant amounts of capital (at least €5 million, rather Series A or B).</p>
<p>Without revealing the whole recipe, here are some of the key elements we are looking for:</p>
<ul>
<li>Ambitious management, knowing how to surround themselves with the right skills for the development of their structure;</li>
<li>A technically solid value proposition, potentially resulting from R&amp;D funding from large groups or research laboratories;</li>
<li>In adequacy with the needs of the market, answering a recurring unaddressed problem or protection issues highlighted by recent attacks.</li>
</ul>
<p>&nbsp;</p>
<h2>Speaking of market needs, what do you see as the next trends in cybersecurity?</h2>
<p>Our discussions with several CISO during the health crisis and our analyses of the market and current events lead us to identify the following:</p>
<ul>
<li><strong>Workstations security</strong> is back in the spotlight, especially with the generalization of remote access;</li>
<li><strong>Third party management</strong> in a more fluid way while remaining secure and limiting their access;</li>
<li><strong>Sovereignty questions</strong> are more important, but, barring regulatory constraints, should not remain the main selection criterion;</li>
<li>It also seems to us that <strong>the trend towards using the SaaS (Software As A Service) model for security solutions has been passed for a certain number of structures</strong>, which are more mature on Cloud models, and have a much lower grasp of them. An element to keep in mind for our start-ups!</li>
</ul>
<p>&nbsp;</p>
<h2>About Brienne III and ACE Management:</h2>
<p>In June 2019, with an initial closing of 80 million euros, ACE Management launched the Brienne III fund, the first French investment fund dedicated to the financing of innovative cybersecurity companies and the largest in continental Europe. The initial subscribers to this fund are Tikehau Capital (a shareholder of ACE Management), Bpifrance, EDF, Naval Group, Sopra Steria and the Nouvelle Aquitaine region. Other strategic investors and institutions wishing to support the emergence of cyber defense solutions are in advanced discussions with ACE Management to participate in the second closing.</p>
<p>ACE Management, a Tikehau Capital Company, is a private equity firm specializing in the industrial and technology sectors, with €1 billion in assets under management. Founded in 2000, ACE Management invests through sector strategies, such as strategic industries, cybersecurity and trusted technologies. ACE Management has built its model on partnerships with major groups investing in its funds (notably Airbus, Safran, EDF).</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/interview-with-ace-management-2020-french-cybersecurity-startups-radar/">Interview with ACE Management &#8211; 2020 French Cybersecurity Startups Radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Boost your cybersecurity thanks to machine learning? Part 2 &#8211; &#8220;Yes, but choose the right approach!&#8221;</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-2-2/</link>
		
		<dc:creator><![CDATA[Morgane Nicolas]]></dc:creator>
		<pubDate>Wed, 08 Jul 2020 07:34:20 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[data analysis]]></category>
		<category><![CDATA[Machine learning]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13902</guid>

					<description><![CDATA[<p>In the previous article, we presented a step by step approach for Machine Learning applied to cybersecurity in order to use its value and understand how it works (lien vers partie 1 de l’article). In this second part, we will...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-2-2/">Boost your cybersecurity thanks to machine learning? Part 2 &#8211; &#8220;Yes, but choose the right approach!&#8221;</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the <a href="https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-1-2/">previous article</a>, we presented a step by step approach for Machine Learning applied to cybersecurity in order to use its value and understand how it works (lien vers partie 1 de l’article). In this second part, we will answer a few common questions that may arise before starting such an initiative.</p>
<p>&nbsp;</p>
<h2>Is the amount of data the only success factor?</h2>
<p>Absolutely not. #GarbageInGarbageOut</p>
<p>Focusing only on the data is the best way to be disappointed by machine learning. Results do not appear out of thin air if the input data is not carefully chosen!</p>
<p>Not only should you define precisely the use case before starting, but you need to make sure that relevant data will be fed to the model.</p>
<p>&nbsp;</p>
<h2>What use case should I choose to do machine learning?</h2>
<p>You’re looking at the problem upside down!</p>
<p>The right questions would rather be:</p>
<ul>
<li><strong>Are some use cases currently causing problems?</strong> <em>g. time-consuming process because all the alerts raised require analysis, and ultimately include many false positives. </em></li>
<li><strong>Does a machine learning based approach fit with some of those problems?</strong> <em>g. alerts raised on a behaviour deemed as « abnormal », rather than a fixed detection threshold that would be hard to configure and to keep up to date.</em></li>
<li><strong>Have I checked that there are no standard solutions to tackle the problem? </strong><em>#</em><em>IAmNotReinventingTheWheel</em></li>
</ul>
<p>In cybersecurity, in front of a complex problem that has to be described explicitly (e.g what is a suspect communication in my information system?) and that additionally is very likely to evolve along time (e.g the detection thresholds need frequent adjustment), finding the right compromise between detection of suspect use cases and false positives with static rules can be difficult. In these kinds of situation, it is interesting to explore the machine learning option.</p>
<p>&nbsp;</p>
<h2>Who leads the project: the cybersecurity team or the data team?</h2>
<p>Both, with a lot of communication! #OneTeam</p>
<p>Each of these teams have <strong>their own</strong> <strong>expertise</strong>, technical for data scientists, business for the cybersecurity team. One without the other does not allow to properly conduct a machine learning for cybersecurity project.</p>
<p>Without data scientists, the cybersecurity team might for instance:</p>
<ul>
<li>Start without enough data. <em>g. the volume of data does not allow the algorithm to define a standard behaviour and it cannot separate normal situations from abnormal.</em></li>
<li>Forget to cross some data. <em>g. each user’s first connection to a new application is detected as an abnormal event, because it is not combined with a variable to allow the comparison of this specific behaviour with the behaviour of the mass of users (that already use the application).</em></li>
<li>Not being able to interpret the alerts given by the algorithm, and not being able to optimize it. <em>g. the algorithm shows anomalies that turn out not to be, the cybersecurity team does not understand on what is based the algorithm’s analysis and does not know how to improve it.</em></li>
</ul>
<p>And without the cybersecurity team, the data scientists might:</p>
<ul>
<li>Not know how to assess the relevance of the anomalies detected. <em>g. the algorithm rises a log as an anomaly, but the data scientists cannot evaluate if it is a real cybersecurity issue or not.</em></li>
<li>Not being able to select the data the algorithm should be fed with. <em>g. cybersecurity gave its proxy logs to the data scientists, but they did not sort the most adequate fields for the use case: the results of the algorithm are confused.</em></li>
<li>Miss out on crucial elements that should be integrated in the model to answer the need of the business. <em>g. by trying to optimise an algorithm, a field that is necessary to the categorisation of an anomaly in cybersecurity is deleted from the data set; the results of the algorithm are no longer valuable for cybersecurity purposes.</em></li>
</ul>
<p><strong>Combining the expertise of both teams is key to guarantee that the resources of the Machine Learning will be used efficiently to bring a high value-added answer for cybersecurity.</strong></p>
<p>&nbsp;</p>
<h2>What are the prerequisites?</h2>
<p>The data!</p>
<p>Although it is not the only aspect to focus on, no model can be create without data.</p>
<p>As a reminder, machine learning encompasses all the techniques that allow machines to learn without having been explicitly programmed for their purpose. For them to learn, the algorithms are fed with the <strong>data</strong> that we can provide them.</p>
<ul>
<li>They will need a <strong>high quantity</strong> of data so that they can define a « norm » as sharp as possible, since it will be defined and confronted to important volumes of real-life cases. Note that «high quantity » does not necessarily mean « diversity »: it is important to only select the data relevant for the use case.</li>
<li>The data will need to be <strong>qualitative</strong> not to deceive the learning of the algorithm, <em>e. </em>without the introduction of biases for instance.</li>
</ul>
<p>It will be useful to identify the relevant type of data for the analysis (e.g. security logs), the sources where they will be collected (e .g. web proxies) and the resources that will enrich them (e.g. CMDB to link IPs with machine names) if needed.</p>
<p>&nbsp;</p>
<h2>I don’t have much data available for my use case, does this mean that machine learning is not for me?</h2>
<p>Not necessarily!</p>
<p>If the available data is relevant to the use case and well distributed (e.g. representative of a usual situation on a defined time period so that a non-supervised algorithm could learn the « normal » situation), it is possible to have interesting results.</p>
<p>For instance, with a well-defined use case (e.g. targeted on a specific user population) and the adequate collected logs, suspect behaviors can be detected in proxy logs with only two weeks of traffic (depending on the wordiness of the logs, this only represents a few GB).</p>
<p>&nbsp;</p>
<h2>Which algorithm should I use?</h2>
<p>Pick one and see!</p>
<p>The most important element that will allow to answer this question in a more adapted way is the type of learning process: supervised or non-supervised.</p>
<p>The choice of one non-supervised algorithm rather than another will affect performance, but not as much as the input data. Many algorithms can work for a given use case, and their performance will depend on the context (e.g. need to interpret the results, volume of the training data…).</p>
<p>The data scientists choose the algorithm based on their watch in order to suggest the most recognized and performing algorithm for a determined use case and context.</p>
<p>&nbsp;</p>
<h2>Should I do it myself or outsource?</h2>
<p>It depends, and it can evolve in time!</p>
<p>Our first article detailed an implementation example: development with your own tools, starting from scratch. In reality, there are three implementation options; the choice depends on the use case, the available resources and the ambitions.</p>
<p>&nbsp;</p>
<figure id="post-13904 media-13904" class="align-none"></figure>
<figure id="post-13906 media-13906" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13906 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-7.png" alt="" width="1166" height="460" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-7.png 1166w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-7-437x172.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-7-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-7-768x303.png 768w" sizes="auto, (max-width: 1166px) 100vw, 1166px" /></figure>
<p>&nbsp;</p>
<p>Each of these scenarios present their strengths and weaknesses and it is possible to use them conjunctly. Also, it is essential to keep an eye on the market in order to observe if new, innovating and more-performing solutions have since appeared.</p>
<p>#TakeAStepBack</p>
<p>&nbsp;</p>
<h2>Is it easy to test?</h2>
<p>If the framing is well done, yes! #Test&amp;Learn</p>
<p>Once that the use case is selected, the data availability checked and the implementation method chosen, it is rather easy to test the benefit of machine learning before further investments.</p>
<p>This type of project is well adapted to iterative or sprint methods. Try out rapidly the selected solutions, demonstrate their relevance thanks to the added value, or on the contrary bring to light the fact that for this use case, the results are not encouraging enough to continue.</p>
<p>Whatever the case may be, a POC approach following an opportunity study can help you get a quick idea. This step, before starting on a larger scale, also enables you to take a step back to evaluate the potential benefits (e.g gains in time due to less false positives, better overall reactivity because the alerts are more relevant) compared to the investment to be made (e.g dedicated computing infrastructures, skills to recruit) before starting.</p>
<p>&nbsp;</p>
<h2>Once that my POC is done, how do I scale up?</h2>
<p>Once again, step by step!</p>
<p>Once that the first conclusive results are obtained on a use case, it is possible to envisage a production launch. Be careful not to go too fast: the production launch raises new questions that must be answered before continuing, for instance:</p>
<ul>
<li>What are the volumes of data to analyse? What pre-processing (data preparation phase) needs to be done beforehand? How frequently? (Real time, delayed time…)</li>
<li>How often will the algorithm need to go through the learning process? On how much data?</li>
<li>What are the necessary infrastructures?</li>
<li>Which skills and resources will enable to maintain to solution in time?</li>
</ul>
<p>It will then be time to take a step back and <strong>make operational choices</strong> while keeping in mind a long-term vision.</p>
<p>&nbsp;</p>
<h2>How much does it cost?</h2>
<p>It all depends on the ambitions.</p>
<p>For a POC, a framing allows to limit the investment until the added value of machine learning is demonstrated (e.g. activation of an option on a security tool on a determined time frame to test it, no infrastructure investment)</p>
<p>Once the added value is tangible, the question of the costs involved for production launch and maintenance in time surges. A few elements must be considered to evaluate the total investment that will be needed:</p>
<ul>
<li><strong>Material investments </strong>(e.g. hardware for market solutions, infrastructure and resources to acquire computing power, in-house development) and <strong>software investments </strong>(license, machine learning feature activation on SIEM, big data tools for data science…). It is essential not to put aside the computing power that is necessary to the functioning of some models. It is one reason why &#8211; besides the quality of the results- the most relevant data are needed to answer a use case.</li>
<li><strong>Talent acquisition :</strong> the new profiles to include (e.g. data scientists, data engineers) as well as the business profiles and accurate experts, that will be solicited during the project phase but also in the long term (alerts handling, re learning process, non-diversion tests for the solution, etc.)</li>
</ul>
<p>&nbsp;</p>
<h2>To sum up, what are the main pitfalls to avoid?</h2>
<p>#Reminder</p>
<p>&nbsp;</p>
<figure id="post-13908 media-13908" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13908 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-6.png" alt="" width="1199" height="549" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-6.png 1199w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-6-417x191.png 417w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-6-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-6-768x352.png 768w" sizes="auto, (max-width: 1199px) 100vw, 1199px" /></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-2-2/">Boost your cybersecurity thanks to machine learning? Part 2 &#8211; &#8220;Yes, but choose the right approach!&#8221;</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Boost your cybersecurity thanks to Machine Learning?  Part 1 – « Absolutely, here’s how! »</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-1-2/</link>
		
		<dc:creator><![CDATA[Morgane Nicolas]]></dc:creator>
		<pubDate>Fri, 03 Jul 2020 12:00:14 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[data analysis]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[Machine learning]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13821</guid>

					<description><![CDATA[<p>Nowadays, we hear about artificial intelligence (AI) everywhere, it affects all sectors&#8230; and cybersecurity is not to be left out! According to a global benchmark published by CapGemini in the summer of 2019, 69% of organizations consider that they will...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-1-2/">Boost your cybersecurity thanks to Machine Learning?  Part 1 – « Absolutely, here’s how! »</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Nowadays, we hear about artificial intelligence (AI) everywhere, it affects all sectors&#8230; and cybersecurity is not to be left out! According to a global benchmark published by CapGemini in the summer of 2019, 69% of organizations consider that they will no longer be able to respond to a cyber-attack without AI. Gartner places <strong>AI applied to cybersecurity</strong> in the top 10 strategic technological trends for 2020.</p>
<p>Throughout two articles, we will explore AI&#8217;s capabilities, specifically those pertaining to Machine Learning for cybersecurity. In this first article, we will go through each stage of a Machine Learning project focused on a cybersecurity use scenario: <strong>the exfiltration of data from the IS</strong>, on a very simplified case. We have chosen a case study, but the concepts of this article are applicable to all Machine Learning projects and can be transposed to any other use case, most notably cyber.</p>
<figure id="post-13789 media-13789" class="align-none"></figure>
<p>&nbsp;</p>
<h2>First of all, what are we talking about?</h2>
<p>The term Artificial Intelligence (AI) includes all the techniques that allow machines to simulate intelligence. Today, however, when we talk about AI, we very often talk about <strong>Machine Learning</strong>, one of its sub-domains. These are <strong>techniques that enable machines to learn a task, without having been explicitly programmed to do so</strong>.</p>
<p>For us cybersecurity professionals, this is a good thing: we often find it difficult to describe explicitly what it is we want to detect! Machine Learning then provides us with new perspectives, that have already many application cases, of which the main ones are illustrated hereunder:</p>
<p>&nbsp;</p>
<figure id="post-13847 media-13847" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13847 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-0-1.png" alt="" width="1189" height="543" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-0-1.png 1189w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-0-1-418x191.png 418w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-0-1-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-0-1-768x351.png 768w" sizes="auto, (max-width: 1189px) 100vw, 1189px" /></figure>
<p>&nbsp;</p>
<h2>The example of a use case for ML-enhanced cybersecurity: the DLP</h2>
<p>To illustrate the contribution of Machine Learning to cybersecurity, we have chosen to focus on the fraudulent extraction of data from a company&#8217;s information system. In other words, the case of DLP (Data Leakage Prevention), an issue encountered by many companies. We want to detect suspicious outbound communications in order to prevent them from happening.</p>
<p>&nbsp;</p>
<figure id="post-13829 media-13829" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13829 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-2.png" alt="" width="1363" height="335" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-2.png 1363w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-2-437x107.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-2-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-2-768x189.png 768w" sizes="auto, (max-width: 1363px) 100vw, 1363px" /></figure>
<p>&nbsp;</p>
<p><em>«Very well but… how do we identify a suspicious communication? »</em></p>
<p>By large traded volumes? By a strange destination? By an unusual connection time?</p>
<p>In reality, our problem is <strong>complex to explain </strong>and what we need to assess is <strong>likely to change over time</strong>. Therefore, by using only static detection rules, our security teams find it difficult to be exhaustive. They can play on the thresholds of these rules to refine the detected elements, but unfortunately still find themselves with a large number of false positives to deal with.</p>
<p>We understand that the Machine Learning as we defined it previously can be useful here. What if we try it?</p>
<p>&nbsp;</p>
<figure id="post-13831 media-13831" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13831 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3.png" alt="" width="1239" height="561" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3.png 1239w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3-422x191.png 422w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3-768x348.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-3-730x330.png 730w" sizes="auto, (max-width: 1239px) 100vw, 1239px" /></figure>
<p>&nbsp;</p>
<h2>Step 1: Clarify the need</h2>
<p>That is what we just did!</p>
<p>&nbsp;</p>
<h2>Step 2: Choose the data</h2>
<p>When we hear the words Machine Learning, we usually must understand &#8220;data&#8221; to feed the algorithms. <strong>Lots of data, and of good quality!</strong></p>
<p>When asking where to get useful data for our data exfiltration case to our <strong>requesting business</strong> (which for once is cybersecurity!), the web proxy stands out as the big winner: it sees almost all the traffic that comes out through the IS. So, we recovered its logs and they look like this:</p>
<p>&nbsp;</p>
<figure id="post-13833 media-13833" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13833 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-3-2.png" alt="" width="1227" height="331" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-3-2.png 1227w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-3-2-437x118.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-3-2-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-3-2-768x207.png 768w" sizes="auto, (max-width: 1227px) 100vw, 1227px" /></figure>
<p><em> </em></p>
<p><em>« This all seems quite complicated…»</em></p>
<p><em>Data scientists </em>have indeed enough reasons to get lost: on the one hand, the whole thing is not easily understandable, and on the other hand, after consultation with the cybersecurity business, <strong>not all fields are really useful for our use case. We therefore selected some</strong> of them with the cybersecurity business before continuing.</p>
<p>&nbsp;</p>
<figure id="post-13835 media-13835" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13835 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-4-2.png" alt="" width="1297" height="218" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-4-2.png 1297w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-4-2-437x73.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-4-2-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-4-2-768x129.png 768w" sizes="auto, (max-width: 1297px) 100vw, 1297px" /></figure>
<p>&nbsp;</p>
<p>The result is easier for data scientists to use!</p>
<p>&nbsp;</p>
<h2>Step 3: prepare the data</h2>
<p>Data scientists can now &#8220;explore the data&#8221; in order to ensure optimal learning of the algorithm. Here, they give us a surprising element in the distribution of our requests according to their upload volume. Since we want to detect data exfiltration, this variable is of particular interest to us.</p>
<p>&nbsp;</p>
<figure id="post-13837 media-13837" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13837 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-5-4.png" alt="" width="1179" height="481" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-5-4.png 1179w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-5-4-437x178.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-5-4-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-5-4-768x313.png 768w" sizes="auto, (max-width: 1179px) 100vw, 1179px" /></figure>
<p>&nbsp;</p>
<p>The value of our variable is not distributed, we even have a very high volume at 0.</p>
<p><em>“But still, there are a lot of these requests with a null upload volume; is it really relevant to keep them in our case? “. </em></p>
<p>Indeed, after discussion with the cybersecurity business, it appears that these data do not bring much for our use case. So we decided to remove them. Our sample was then distributed as follows:</p>
<p>&nbsp;</p>
<figure id="post-13839 media-13839" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13839 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-6-4.png" alt="" width="1177" height="511" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-6-4.png 1177w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-6-4-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-6-4-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-6-4-768x333.png 768w" sizes="auto, (max-width: 1177px) 100vw, 1177px" /></figure>
<p>&nbsp;</p>
<p>After several back and forth exchanges between data scientists challenging the data from a statistical point of view and cybersecurity teams responding with their professional eye, the data is simplified as much as possible. Data is then:</p>
<ul>
<li><strong>Enriched </strong>by creating new variables that are denser in useful information. We introduced a<strong> relative upload volume </strong>to each site, measuring the difference between the upload volume of a request and its average value over the last 90 days. We could also add the<strong> connection time </strong>for example.</li>
<li><strong>Normalized </strong>by reducing the amplitude of each variable to decrease an over- or underweighting of certain variables.</li>
<li><strong>Digitized</strong>, as most algorithms can only interpret numerical variables.</li>
</ul>
<p>We can now split our data set in two: <strong>one set that will be used to train our model</strong>, <strong>one set that will allow us to test its performance</strong>. Several separation methods exist, enabling us to keep certain characteristics of the data (e.g. seasonality), but the objective remains the same: to guarantee an evaluation measure as close as possible to the model&#8217;s real performances, by presenting the model with data that it did not have at its disposal during training.</p>
<p>&nbsp;</p>
<h2>Step 4: Choosing the learning method and training the model</h2>
<p>Some algorithms are more efficient than others for a given problem, it is therefore necessary to make a reasoned choice.</p>
<p>There are two main categories of Machine Learning algorithms:</p>
<ul>
<li><strong>Supervised, </strong>when we have labeled data as a reference to give as an example to our algorithm. These algorithms are for example used in cybersecurity by anti-spam solutions: they can learn via the users’ classification of emails as spam for example.</li>
<li><strong>Unsupervised,</strong> when we do not know precisely what we want to detect or when we lack examples to provide the algorithm with for its learning (i.e. we lack labeled data).</li>
</ul>
<p>As explained above, the context of our use case points us more towards the second option. It is for the same reasons that we initially thought of Machine Learning. We then choose our unsupervised learning algorithm (Isolation Forest here, but we could have chosen another one) and train our model.</p>
<p>&nbsp;</p>
<h2>Step 5: Analyze results</h2>
<p>We use our test data set to evaluate the effectiveness of our model in detecting exfiltration cases.</p>
<p>The designed model detects patterns in the data (queries), then compares the new data (queries) with these patterns and <strong>highlights those that deviate from what it considers to be the norm through its learning (anomaly score).</strong></p>
<p>Here are our results:</p>
<p>&nbsp;</p>
<figure id="post-13841 media-13841" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13841 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-7-2.png" alt="" width="1212" height="515" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-7-2.png 1212w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-7-2-437x186.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-7-2-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-7-2-768x326.png 768w" sizes="auto, (max-width: 1212px) 100vw, 1212px" /></figure>
<p>&nbsp;</p>
<p><em>« Ok, but how should I interpret all this ? »</em></p>
<p>The graph on the left represents the anomaly scores associated with each query in the test set, sorted in chronological order. To the right are the logs with the highest anomaly scores.</p>
<p>After investigation with the cybersecurity business:</p>
<ul>
<li>The peak in yellow, corresponds to <strong>a much larger upload volume</strong> than others, from a user who extracts a large volume of data. This anomaly is legitimate. However, an alert based on a static volume per request rule would also have detected this suspicious communication.</li>
<li>More interesting now, the peaks in red, correspond to <strong>requests for low volumes of regular uploads to unknown sites from the same user.</strong> These anomalies are harder to detect with conventional means, yet <strong>our algorithm has given them the same anomaly score as a large volume.</strong> They therefore become just as high a priority to qualify for our cybersecurity alert management teams.</li>
</ul>
<p>&nbsp;</p>
<figure id="post-13843 media-13843" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13843 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-8-2.png" alt="" width="1184" height="523" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-8-2.png 1184w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-8-2-432x191.png 432w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-8-2-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-8-2-768x339.png 768w" sizes="auto, (max-width: 1184px) 100vw, 1184px" /></figure>
<p>&nbsp;</p>
<p>Now, let&#8217;s focus on the large package in the center of the graph (in orange). On the first day, we observe a large anomaly score, a sudden <strong>sending of data by many users to the city&#8217;s transit website</strong>. After investigation we realize that this is <strong>not a real security incident</strong>, but the annual sending of receipts for the continuation of transport subscriptions (we are at the beginning of September &#8230;).  We then observe that the <strong>algorithm &#8220;understands&#8221; that these flows return to several users and progressively integrates them as a habit. The risk score therefore decreases day by day.</strong></p>
<p>The model therefore detects what is out of the norm, regardless of the standard, and corrects itself with experience. <strong>This is where Machine Learning presents a real added value compared to traditional detection methods.</strong></p>
<p>If the performance of the model on this first simplified use case attests to the potential value of the Learning Machine, it may be time to move on to step 6 &#8211; deployment to scale!</p>
<p>In a second article we will come back to these steps to highlight the success factors and pitfalls to be avoided when studying the possibilities of Machine Learning in cybersecurity.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/boost-your-cybersecurity-thanks-to-machine-learning-1-2/">Boost your cybersecurity thanks to Machine Learning?  Part 1 – « Absolutely, here’s how! »</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
