<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Noëmie Honoré, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/noemie-honore/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/noemie-honore/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 14 Mar 2025 07:00:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Noëmie Honoré, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/noemie-honore/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Are you ready to TAMAM your cybersecurity awareness?</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/03/are-you-ready-to-tamam-your-cybersecurity-awareness/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/03/are-you-ready-to-tamam-your-cybersecurity-awareness/#respond</comments>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Fri, 14 Mar 2025 07:00:01 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity awareness]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[methodology]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25538</guid>

					<description><![CDATA[<p>This article was originally published on our corporate website wavestone.com on 26 January 2023.   Cybersecurity awareness is a journey to embed secure behaviours in people&#8217;s daily lives   To do so, you need to build a strong cyberawareness program, focus...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/03/are-you-ready-to-tamam-your-cybersecurity-awareness/">Are you ready to TAMAM your cybersecurity awareness?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><em>This article was originally published on our corporate website <a href="https://www.wavestone.com/en/">wavestone.com</a> on 26 January 2023.</em></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Cybersecurity awareness is a journey to embed secure behaviours in people&#8217;s daily lives</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">To do so, you need to build <strong>a strong cyberawareness program</strong>, focus on your key cybersecurity themes, that engages your people and respects their uniqueness, with practical positive actions and diverse activities. In other words, a program that meets your ambitions and aims:</p>
<ul style="text-align: justify;">
<li>An <strong>effective behavioural change</strong></li>
<li>The development of a<strong> security culture</strong> in your organization</li>
</ul>
<p style="text-align: justify;">We developed our <strong>TAMAM framework</strong> to formalize our strong beliefs about how best to build a cyberawareness framework.</p>
<p style="text-align: justify;"><strong>TARGET</strong>: set concrete and measurable objectives</p>
<p style="text-align: justify;"><strong>AUDIENCE</strong>: adapt the approach according to the people concerned</p>
<p style="text-align: justify;"><strong>MESSAGE</strong>: choose a concise, positive message that calls for action</p>
<p style="text-align: justify;"><strong>ACTIONS</strong>: set up effective, concrete and various actions</p>
<p style="text-align: justify;"><strong>MEASURES</strong>: evaluate the program&#8217;s impact on behaviour</p>
<p style="text-align: justify;">This article explains the principles, the stakes and the role that TAMAM has to play to support you!</p>
<p style="text-align: justify;">But first, let’s put some contextual elements about cybersecurity awareness…</p>
<p> </p>
<h2 style="text-align: justify;">Why do they keep clicking on these phishing emails?!</h2>
<p> </p>
<ul style="text-align: justify;">
<li><strong>Our journey doing cybersecurity awareness started more than 15 years ago.</strong> And things looked quite different back then. It was the time of the new awareness programs, led by newly appointed cybersecurity managers, with little means and yet a key objective to tell people what they must do to protect the information systems. Nothing more, nothing less. It was the time of the Top 10 best practices; the Do’s and Don’ts; the mass training sessions; etc.</li>
</ul>
<ul style="text-align: justify;">
<li>Once said, these messages were considered to be common knowledge and applied by everyone; and just like that<strong> awareness was deprioritized</strong> and no longer a priority for the cybersecurity managers. It was the rough time of insufficiency and budget cuts.</li>
</ul>
<ul style="text-align: justify;">
<li>Then came the <strong>rising number of cyberattacks and the GDPR</strong>. With new risks came new appetite for awareness and education of users. Cybersecurity awareness was back in the agenda, yet with variable means and interests. Over the years it remained part of the cybersecurity topics but with great variability between the organizations when it came to effectiveness and efficiency.</li>
</ul>
<ul style="text-align: justify;">
<li>And here we are now: at the beginning of the year 2023 and the same questions remain: “I’ve tried everything but there are still some people who do not perceive the risks– what can I do?”; “I need to keep my people interested in the topic, what new things can you propose?”. Basically, what we notice is simply a <strong>lack of consideration of the effectiveness of the program</strong>: they seemed to be reaching a glass ceiling. Efforts were put, investments were made, but little change happened. That triggered our attention and led us to discussions and research until we finally came to the evidence: efforts and investment are vain if they don’t aim at <strong>effectively changing behaviours</strong> and ultimately <strong>establishing a culture of cybersecurity</strong>. But how do you do that? That’s the focus of this article.</li>
</ul>
<p> </p>
<h2 style="text-align: justify;">Are you getting everyone on board with cybersecurity?</h2>
<p> </p>
<p style="text-align: justify;">Based on these observations of the past years of cyberawareness, we developed <strong>a framework to build an effective cybersecurity awareness program</strong>. We wanted this model to be customizable so that it could be applied to every organization regardless of its size, maturity, budget, or current culture. Not a one-size-fits-all, but a backbone to be adapted to every organization.</p>
<p> </p>
<h3 style="text-align: justify;">Target</h3>
<p style="text-align: justify;">Just like with everything, you have to start with the “why”. This serves to define the <strong>objectives</strong>: a target to reach, <a href="https://www.linkedin.com/pulse/shall-we-start-your-secure-behaviours-corentin-decock/">a vision of where to go and a path to reach that place</a>.</p>
<p style="text-align: justify;">These objectives must be targeted to your priority battles, i.e., what change you want to see in your organization, <strong>precise behaviours that you expect from your people</strong>. They do not just represent good intentions – like “raising awareness among my employees” – but precise behaviours that you want to see every day. For instance, if phishing is one of your primary concerns, and it sure is: “How to educate my employees to report phishing attempts and incidents?”. Like this you see your target and the way to reach it.</p>
<p style="text-align: justify;">Precise objectives also enable <strong>measurable results</strong>. When you define them, you also define the KPIs and metrics that you will use to assess their success. As a rule of thumb: if you are unable to find a measure for your objective, that means it’s more illusional than achievable.</p>
<p style="text-align: justify;">Finally, you share these with your employees. Isn’t it plain fairness that to tell your people from the beginning what you expect from them? This way, you make them actively engaged in the change of behaviour that you expect from them. By giving them the rules of the game, you enable them to play by these rules and to win the game with you, because <strong>cybersecurity is a collective win</strong>.</p>
<p style="text-align: justify;">This first step is largely overviewed, and few are the organizations that take the necessary time to reflect on their true target when it comes to cyberawareness. However, it is the essential starting point of our journey. Just like with any journey: we can only reach a friend’s house if know their address.</p>
<p> </p>
<h3 style="text-align: justify;">Audience</h3>
<p style="text-align: justify;">And who do you want to reach exactly? That is your audience, your population, your <strong>people that need awareness, training, and education</strong>. A clear identification of these specific audiences will help you define an approach that is meant to reach them. To know these needs you will need to start by differentiating people in clusters – mostly based on their positions in the organization, their closeness to the topic, their expositions to the risks you want to prevent, their role figures, etc. These clusters can gather newcomers, external staff, local ambassadors, IT staff, etc.</p>
<p style="text-align: justify;">For each of these populations, you will want to <strong>assess their current level of mastery</strong> of the different targets defined. That is basically performing a skills gap to know what topics requires more attention for each population. This information will be essential to customize the program to the needs of these populations (because you understand what they do in life) and their current level of mastery (which you have assessed precisely).</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Message</h3>
<p style="text-align: justify;">Off we go now with the messages you want to communicate to these people to reach these objectives; the moment where you find this catchy phrase that will be repeated oftentimes. The people with whom you will be communicating also receive numerous other communications for numerous other causes (name it: CSR, compliance, values, etc.). Hence the importance to select your messages wisely and to stay concise. The time and attention available are limited, this is why you will prefer to select <strong>a few messages that address key risks and meaningful objectives</strong>.</p>
<p style="text-align: justify;">Eventually, the tone used to communicate these messages is crucial as it must be adapted to the organizational culture: funny messages work in some environment while serious ones work better in others. Regardless of the tone used, the <strong>messages will need to be positive and call for action</strong>. Drop out the negative injunctions (“don’t”) and embrace the positive actions (“act”).</p>
<p style="text-align: justify;">With these first three steps in mind (Target, Audience and Message), you build up the framing of your cyberawareness program: you know what you want to tell, to whom, in order to reach the expected behaviours.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Actions</h3>
<p style="text-align: justify;">Now that you have tailored your messages for your specific audiences to reach the defined objectives, time has come to identify the actions that you will implement in this framing. Although you now open the catalogue of action, you must be focus and pragmatic. The principle when doing so is to think of the <strong>effectiveness of the chosen action in your journey to reach your objectives</strong>. <a href="https://www.riskinsight-wavestone.com/en/2023/01/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities/">Creativity and innovation</a> are surely important to keep people motivated but is not the sole success factor. You want to make cybersecurity practical for people, to bring the topic closer to their life and to involve them in their learning (e.g., practical activities, application of the behaviour expected, etc.) on top of a more theoretical top-down approach.</p>
<p style="text-align: justify;"><strong>The way you implement these activities</strong> is also an essential success factor, with the right resources, people and planning to enforce the selected messages:</p>
<ul style="text-align: justify;">
<li>Who is the bearer of these messages? Internal or external?</li>
<li>How to repeat them in different ways (as different people will respond to different stimuli that can be practical, visual, spoken, etc.)</li>
<li>From what angles and with what activities should these issues be addressed in order to raise awareness among employees in the most appropriate way?</li>
</ul>
<p style="text-align: justify;">With few selected messages, you build different activities, at different moments, with different approaches, to embed these behaviours in your audiences’ daily lives.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Measures</h3>
<p style="text-align: justify;">Finally, <strong>this whole program needs to be evaluated</strong> in order to say if it actually allows to change behaviours – for the management that will ask to see the value delivered for its investment, or for the awareness team that will want to show tangible results from its efforts.</p>
<p style="text-align: justify;">In your quest to raise awareness, <strong>you must focus on the effectiveness of what you implement</strong>, beyond the implementation itself. All too frequently, organizations focus on numbers of activities or people addressed. But these figures seldom provide a real understanding of the change of behaviours happening.</p>
<p style="text-align: justify;">When building your evaluation plan, you need to include quantitative measures and qualitative feedback to obtain a comprehensive understanding of the achievement of your objectives. Perhaps this will require new ways to gather this information – like getting the helpdesk involved, or even obtaining fresh data from the SOC – but the outcome will bring terrific value to your program as it will allow you to review it and keep it continuously adapted to your objectives; which can also be subject to adaptations if the organizational context changes.</p>
<p style="text-align: justify;">Oh, and don’t forget one last thing if you want to create a positive trend in awareness: communicate your achievements and celebrate the victories with everyone. You deserve it.</p>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-25545" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG.png" alt="TAMAM methodology relies on the following pillars: Target, Audience, Message, Actions and Measures" width="945" height="630" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG-287x191.png 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG-59x39.png 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/03/Image1ENG-768x512.png 768w" sizes="(max-width: 945px) 100vw, 945px" /></p>
<p style="text-align: justify;">Take the first letter of these 5 principles and you obtain TAMAM. It is no coincidence if the world translates into “all right” in Turkish; this is what you want from your people: an adherence to your objectives and an agreement to onboard your journey to more secure behaviours.</p>
<p> </p>
<h2 style="text-align: justify;">Where to start?</h2>
<p> </p>
<p style="text-align: justify;">Now that you have a better understanding of the iterative journey to build a strong awareness program, you must find yourself in the middle on a strong questioning: where do I stand in that and how do I lean more towards what you’ve just said?</p>
<p style="text-align: justify;">A first action to take is probably to <strong>take a step back to look at your current maturity level in cyberawareness</strong>. You will need to have a clear and honest understanding of how your organization addresses this topic in order to define a path towards a greater maturity.</p>
<p style="text-align: justify;">The power of TAMAM resides notably in its ability to be used regardless of your maturity level, because its principles are adaptable and true to different situations.</p>
<p> </p>
<h3 style="text-align: justify;">Do you TAMAM?</h3>
<p style="text-align: justify;">When you <strong>TAMAM</strong>, you:</p>
<ul style="text-align: justify;">
<li>Visualize a clear and precise target – behaviours – that you want to reach</li>
<li>Tailor your approach around the need of your specific clusters of people</li>
<li>Define the few messages you want communicate to your audience on these objectives</li>
<li>Select the best manner to communicate your messages with activities that focus on effectiveness</li>
<li>Monitor and assess this effectiveness to adapt your approach and finetune your whole program</li>
</ul>
<p style="text-align: justify;">This article is only a glimpse of what TAMAM can bring to your cyberawareness program. Contact us for a full understanding of how our framework can help you step up your awareness!</p>
<p><a href="https://www.riskinsight-wavestone.com/en/contact-us/">Contact us</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/03/are-you-ready-to-tamam-your-cybersecurity-awareness/">Are you ready to TAMAM your cybersecurity awareness?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/03/are-you-ready-to-tamam-your-cybersecurity-awareness/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Shake&#8217;Up and Les Echos launches the 1st edition of their “Women Entrepreneurs in Tech” Prize</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/01/shakeup-and-les-echos-launches-the-1st-edition-of-their-women-entrepreneurs-in-tech-prize/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/01/shakeup-and-les-echos-launches-the-1st-edition-of-their-women-entrepreneurs-in-tech-prize/#respond</comments>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Tue, 14 Jan 2025 13:38:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Les Echos]]></category>
		<category><![CDATA[prize]]></category>
		<category><![CDATA[startup]]></category>
		<category><![CDATA[Wavestone]]></category>
		<category><![CDATA[women]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25111</guid>

					<description><![CDATA[<p>Shake&#8217;Up, Wavestone&#8217;s startup accelerator, is pleased to present the first edition of the “Women Entrepreneurs in Tech” prize. Conceived and piloted jointly with the French newspaper Les Echos, this prize will be awarded on March 5, 2025. The aim is...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/shakeup-and-les-echos-launches-the-1st-edition-of-their-women-entrepreneurs-in-tech-prize/">Shake&#8217;Up and Les Echos launches the 1st edition of their “Women Entrepreneurs in Tech” Prize</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Shake&#8217;Up, Wavestone&#8217;s </strong><strong>startup accelerator</strong>, is pleased to present the first edition of the <strong>“Women Entrepreneurs in Tech”</strong> prize. Conceived and piloted jointly with the French newspaper <strong>Les Echos</strong>, this prize will be awarded on <strong>March 5, 2025</strong>. The aim is to highlight one of the women who is shaping or actively contributing to Europe&#8217;s technological landscape (in the geographical sense of the term). For this first edition, a female founder or director of a startup or scale-up in the <strong>cyber world</strong> will receive personalized coaching from Shake &#8216;Up, as well as a promotion in the French newspaper Les Echos.</p>
<p> </p>
<h2><strong>Why launch the “Women Entrepreneurs in Tech” award?</strong></h2>
<p> </p>
<p>The goal of the “Women Entrepreneurs in Tech” award is to highlight a female director or founder of a startup or scale-up. In particular, we&#8217;re looking for B2B or B2B2C startups with strong innovation potential that Shake&#8217;Up could support in their development.</p>
<p>By launching this &#8216;Women Entrepreneurs in Tech&#8217; award, the Shake&#8217;Up teams wanted to highlight the firm&#8217;s technological DNA and contribute to its CSR commitment regarding gender equality”, explains Mathilde Peyret, co-lead of the firm&#8217;s Shake&#8217;Up asset.</p>
<p>To ensure the best possible sourcing, in addition to the startups and scale-ups in our database (from our Radars, Calls for Projects and Vivatech Screening), we will be relying on our various partners (BPI, France Digitale&#8230;) as well as the vast network of Les Echos newspaper. And, of course, your suggestions!</p>
<p> </p>
<h2><strong>A 1st edition dedicated to c</strong><strong>yber</strong></h2>
<p> </p>
<p>For this first edition, we&#8217;ve decided to focus on the theme of <strong>cybersecurity</strong>, on a <strong>European perimeter</strong> (see precise criteria at the bottom of the article). <strong>Noëmie Honoré</strong>, head of Wavestone&#8217;s Belgian office, and very committed to the theme of “Women in Cyber”, was a natural choice to sponsor this initiative alongside <strong>Charlie Perreau</strong>, head of the Tech-Médias-Start-up department at Les Echos.</p>
<p>The winner will be selected by a jury comprising two members of Wavestone (Gérôme Billois and Noémie Honoré) and two key journalists from Les Echos (Charlie Perreau and Florian Debes). They will assess the quality of the project, the relevance of the solution for market needs, and the suitability of the startup/scale-up in terms of the support it could receive from Shake&#8217; Up.</p>
<p>The award ceremony will take place <strong>on March 5 at Wavestone&#8217;s offices in La Défense</strong>, in the presence of the firm&#8217;s partners and associations from the world of cyber. One of the five finalists invited for the occasion will be awarded the prize.</p>
<p> </p>
<h2><strong>How to apply?</strong></h2>
<p> </p>
<p>Are you a woman entrepreneur in the cyber world and does your organization meet the selection criteria? Please submit your application via this form:</p>
<p style="text-align: center;"><a href="https://forms.office.com/e/z9BXTG7T4S">Click here to submit a candidate</a></p>
<p><strong> </strong></p>
<h2><strong>Award selection criteria</strong></h2>
<p> </p>
<p>The prize will be awarded to a (co)founder or (co)director of a European cyber startup or scale-up (Europe in the geographical sense).</p>
<p>Startups and scale-ups must be headquartered in Europe, and sales of security products must represent at least 50% of their turnover.</p>
<p>Startups must be less than 7 years old and have fewer than 35 employees.</p>
<p>Scale-ups must meet at least one of the following two financial conditions:</p>
<p><strong>&#8211; either have received financing over 3 years by raising funds of at least €10M in one go.</strong></p>
<p><strong>&#8211; or have sales of at least €2.5M and annual growth in excess of 25% over the last 3 fiscal years.</strong></p>
<p>This financial condition must be coupled with a consolidated workforce of less than 250 employees.</p>
<p>If the company is linked to another (over 25% shareholding), this consolidation is the combination of its own workforce and:</p>
<p><strong>&#8211; If the holding is between 25% and 50%, the workforce of the holding company is added on a pro rata basis.</strong></p>
<p><strong>&#8211; If the holding exceeds 50%, the full workforce of the holding company is added.</strong></p>
<p> </p>
<h3><strong>About Shake&#8217;Up</strong></h3>
<p>Since its launch in 2016, Shake&#8217;Up&#8217;s aim has been to help our teams learn about offers, solutions and innovations from the startup ecosystem in order to bring value to our customers. To date, Shake&#8217;Up has supported 50 companies, including Yuka, Phoenix Mobility, Isahit, Olvid, Hackuity and Néolithe.</p>
<p> </p>
<h3><strong>About Les Echos</strong></h3>
<p>Founded in 1908, Les Echos is now France&#8217;s leading provider of business news. The brand helps decision-makers and entrepreneurs stay one step ahead. Every day, it offers them a global vision of world events and the economy. It deciphers corporate strategies and captures major emerging trends. It stimulates public debate with a plurality of opinions and contributions for a responsible economy. Les Echos reaches 9 million readers a month.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/shakeup-and-les-echos-launches-the-1st-edition-of-their-women-entrepreneurs-in-tech-prize/">Shake&#8217;Up and Les Echos launches the 1st edition of their “Women Entrepreneurs in Tech” Prize</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/01/shakeup-and-les-echos-launches-the-1st-edition-of-their-women-entrepreneurs-in-tech-prize/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Navigating The Cybersecurity Talent Management Maze: A Guide for Talent Management Enthusiasts</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/09/navigating-the-cybersecurity-talent-management-maze-a-guide-for-talent-management-enthusiasts/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/09/navigating-the-cybersecurity-talent-management-maze-a-guide-for-talent-management-enthusiasts/#respond</comments>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Mon, 02 Sep 2024 08:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[talent management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23775</guid>

					<description><![CDATA[<p>Are you a CISO, Talent Manager or Cybersecurity Specialist grappling with the challenge of recruiting and retaining top-notch cybersecurity talents? You’re not alone. Recruiting in cybersecurity is increasingly challenging, with 4 million jobs currently unfilled – a 13% rise from...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/navigating-the-cybersecurity-talent-management-maze-a-guide-for-talent-management-enthusiasts/">Navigating The Cybersecurity Talent Management Maze: A Guide for Talent Management Enthusiasts</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Are you a CISO, Talent Manager or Cybersecurity Specialist grappling with the challenge of recruiting and retaining top-notch cybersecurity talents? You’re not alone.</p>
<p style="text-align: justify;">Recruiting in cybersecurity is increasingly challenging, with 4 million jobs currently unfilled – a 13% rise from 2022 (ISC2 2023). As studies over the past three years have confirms, this challenge is only deepening, leaving CISOs struggling to recruit, manage, and retain skilled professionals. Diversifying the talent pool is also a priority, with women making up only 25% of the workforce.</p>
<p style="text-align: justify;">At Wavestone, we’ve been actively following this subject and have developed a benchmark to assess companies’ maturity level on this subject. With data from more than 20 organizations, we’re ready to share our insights.</p>
<p style="text-align: justify;">In this article, we’ll dive into the results and focus on key topics such as career path, recruitment, trainings, and retention plans. And for those who stick around till the end, there’s a little surprise waiting for you. <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p style="text-align: justify;">If you’re a CISO looking for practical solutions or just interested in cybersecurity talent management, this article is for you. Let’s tackle this challenge together.</p>
<p> </p>
<h2><strong>A Global Maturity Score of 45% in Cyber Talent Management</strong></h2>
<p style="text-align: justify;"><img decoding="async" class="alignleft wp-image-23776 " src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/1.png" alt="Moyenne 45/100
Premier quartile 27/100
Dernier quartile 62/100
Plus de 20 organisations ont été interviewe en 2024 par Wavestone pour établir ces chiffres" width="277" height="281" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/1.png 385w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/1-188x191.png 188w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/1-38x39.png 38w" sizes="(max-width: 277px) 100vw, 277px" />Current Cyber Talent Management maturity stands at 45%, indicating significant room for improvement in this emerging field. The gap between the lowest and highest scores ranges from 27% to 62%.</p>
<p style="text-align: justify;">On a positive note, there are strong performers in every area, suggesting that companies can benefit from sharing best practices. Ultimately, the goal is to build skilled and resilient cybersecurity teams.</p>
<p> </p>
<p style="text-align: justify;"><img decoding="async" class="alignright wp-image-23778 size-medium" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/2-363x191.png" alt="" width="363" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/2-363x191.png 363w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/2-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/2.png 545w" sizes="(max-width: 363px) 100vw, 363px" />The Energy sector has the highest maturity level, while Public &amp; Institutions have the lowest. The graph above compares the maturity levels of various sectors on a scale from 0 to 100%. The sectors include Energy (58.2), Luxury &amp; Retail (52.4), Services (50), Finance (45.9), Industry (47.2), and Public &amp; Institutions (36.1).</p>
<p> </p>
<h2><strong>Developing Career Path to Give Growth Perspectives to Talents</strong></h2>
<p style="text-align: justify;">The cybersecurity field is facing a clear talent shortage. In 2023, 4 million cyber jobs were unfilled, and the figure is still increasing. Organizations have a real challenge to retain their cyber talents and to attract new ones. Yet a well-defined career path could help them. From an HR perspective, it empowers individuals to take charge of their own development, serves as a framework for self-assessing competencies and areas for growth, and supports individual fulfilment. However, building an effective career path requires careful planning and can take over a year to implement.</p>
<p style="text-align: justify;">During our interviews with CISOs and Cyber Talent Managers, we observed that while 66% of the organizations have started initiatives to build their first cyber career path, these efforts are not yet fully materialized.</p>
<table style="width: 100%; border-collapse: collapse; border-style: double; border-color: #451dc7;">
<tbody>
<tr>
<td style="width: 100%; background-color: #451dc7; border-style: double; border-color: #451dc7;">
<p><span style="color: #ffffff;"><strong>Here are tips from leading organizations in the market…</strong></span></p>
<ul>
<li style="color: white;"><span style="color: #ffffff;"><strong>Job repository:</strong> develop a detailed list of all cyber roles, including responsibilities and requirements.</span></li>
<li style="color: white;"><span style="color: #ffffff;"><strong>Skills mapping: </strong>identify essential skills for each role and create a skills matrix to pinpoint gaps and future needs.</span></li>
<li style="color: white;"><span style="color: #ffffff;"><strong>Training catalogue and mapping:</strong> align training programs with specific jobs or skills to ensure employees are equipped to excel in their roles.</span></li>
</ul>
</td>
</tr>
</tbody>
</table>
<h3> </h3>
<h3 style="text-align: justify;"><strong><em>Real-world example based on a client assignment…</em></strong></h3>
<ul style="text-align: justify;">
<li>In a client project, after several phases of reviews and workshops on cyber jobs and skills frameworks, we identified 11 new cyber skills and 6 cyber jobs and integrated them into the repositories. This then led to the creation of an initial career path dedicated to cybersecurity workforce.</li>
</ul>
<p style="text-align: justify;">A well-defined career path is the cornerstone of Talent Management and represents a strategic advantage for organizations in retaining and attracting talents, prompting many to take action.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Tips to Diversify Your Recruitment Pool</strong></h2>
<p style="text-align: justify;">The cybersecurity talent pool is both limited and lacking in diversity, making recruitment a critical challenge for organizations. Despite women making up 50% of the global population, they represent only 25% of cyber professionals (ISC2 2023). This highlights the urgent need for more inclusive recruitment strategies.</p>
<p style="text-align: justify;">Nowadays, traditional job descriptions often demand too much, deterring potential female candidates. Only 27% of the organizations have adapted them. Studies show men apply if they meet 60% of the criteria, while women tend to wait until they meet 100%. Rewriting descriptions to be more inclusive, with input from female reviewers, can broaden their appeal.</p>
<p style="text-align: justify;">In addition, few companies focus on internal (5%) or external (22%) branding, yet these strategies work. Transparent branding and communication can help to demystify cybersecurity roles, attract a more diverse talent pool and boost internal mobility, making them valuable recruitment tools.</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; border-style: double; border-color: #451dc7; background-color: #451dc7;">
<p><span style="color: #ffffff;"><strong>Here are tips from leading organizations in the market…</strong></span></p>
<ul>
<li style="color: white;"><span style="color: #ffffff;"><strong>Job descriptions:</strong> create or revise job descriptions to ensure they are accessible and inclusive. And don’t forget to review your job descriptions to ensure you’re not listing 10 certifications <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></span>
<ul style="margin-bottom: 0px;">
<li style="color: white;"><span style="color: #ffffff;"><strong style="font-size: revert;">Female review: </strong><span style="font-size: revert;">have job descriptions reviewed by a female employee for inclusivity.</span></span></li>
</ul>
</li>
<li style="color: white;"><span style="color: #ffffff;"><strong style="font-size: revert;">Internal and external branding strategy:</strong><span style="font-size: revert;"> build a brand that emphasizes diversity and inclusivity, partner with universities, associations, and use female role models to promote cybersecurity.</span></span></li>
<li style="color: white;"><span style="color: #ffffff;"><strong style="font-size: revert;">Recruitment training: </strong><span style="font-size: revert;">train your team on inclusive recruitment methods to enhance diversity.</span></span></li>
</ul>
</td>
</tr>
</tbody>
</table>
<h2> </h2>
<h2 style="text-align: justify;"><strong>Offering Trainings to Reduce Skills Gaps Within Your Organization</strong></h2>
<p style="text-align: justify;">Cybersecurity skills gaps are a major issue, with 92% of professionals reporting deficiencies and 75% finding the current landscape the most challenging ever (ISC2, 2023).</p>
<p style="text-align: justify;">Our benchmark shows only 33% of companies have a skills-mapped training catalogue, and 94% address training reactively, based on demand. This reactive approach misses chances for proactive skills development. Effective training is crucial for equipping employees with the skills needed to handle evolving cybersecurity threats and trends.</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; border-style: double; border-color: #1d45c7; background-color: #451dc7;">
<p><span style="color: #ffffff;"><strong>Here are tips from the leading organizations in the market…</strong></span></p>
<ul>
<li style="color: white;"><span style="color: #ffffff;"><strong>Training catalogue: </strong>create a detailed training catalogue that aligns with cyber skills and job roles across various learning platforms (e.g. Pluralsight, LinkedIn Learning, free MOOC on national competencies centre’s website, etc.)</span></li>
<li style="color: white;"><span style="color: #ffffff;"><strong>Time and budget allocation: </strong>set aside dedicated time and budget for employee training to demonstrate the organization’s commitment to continuous learning and skill development.</span></li>
</ul>
</td>
</tr>
</tbody>
</table>
<h3> </h3>
<h3 style="text-align: justify;"><strong><em>Real-world example based on a client assignment…</em></strong></h3>
<ul style="text-align: justify;">
<li><strong>Automated Training Paths: </strong>implemented an automated tool that can generate personalized training paths based on employees’ needs and skills level.</li>
<li><strong>Consolidated Training Catalogue:</strong> a unified training catalogue, mapped to the 17 new cyber skills and 16 new cyber jobs, offering a clear development roadmap for employees.</li>
</ul>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>Enhancing Retention Through Effective HR Collaboration</strong></h2>
<p style="text-align: justify;">Collaborating closely with the HR team to create a robust retention plan is essential for organizational success. While many companies have processes to support talent development, these are often not formalized, leading to challenges in daily management.</p>
<p style="text-align: justify;">Companies need to start by assessing the unique skills and strengths of each team member and determine how to best leverage them for the organization’s goals. Conducting individual interviews is a valuable strategy in this regard. Managers can gain insights into each employee&#8217;s current career stage and future aspirations. This information allows them to craft personalized development plans that align with their goals.</p>
<p style="text-align: justify;">However, it’s important to remember that a retention plan is not a one-size-fits-all solution. It should be flexible and adaptable, capable to evolve with the changing needs of your team and the cybersecurity landscape. By working with HR to implement a tailored, adaptive plan, you ensure that your cyber talent feels valued, motivated, and committed. Remember, effective retention is as crucial as attracting top talent, so make strategic collaboration with HR a key component of your talent management strategy.</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; border-style: double; border-color: #451dc7; background-color: #451dc7;">
<p><span style="color: #ffffff;"><strong>Here are tips from the leading organizations in the market…</strong></span></p>
<ul>
<li style="color: white;"><span style="color: #ffffff;"><strong>Employee retention steering: </strong>dedicate time to define your retention objectives, KPIs and concrete actions. Only one organization has quarterly leadership moment (1 day per quarter) to focus on people and discuss on the evolution of the team.</span></li>
<li style="color: white;"><span style="color: #ffffff;"><strong>Talent reviews: </strong>dedicated time (annual interview) to create a trustful management relationship and assess the skills, performance, and potential of cybersecurity professionals. Only 5% of the companies have implemented this process in their cyber talent management strategy.</span></li>
</ul>
</td>
</tr>
</tbody>
</table>
<p> </p>
<h2><strong>A²BCⁿ framework: A Framework to Care for your Talents and Secure your Business</strong></h2>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-23780 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3.png" alt="" width="1016" height="1016" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3.png 1016w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3-191x191.png 191w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3-768x768.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3-300x300.png 300w" sizes="auto, (max-width: 1016px) 100vw, 1016px" /></p>
<p> </p>
<p style="text-align: justify;">In conclusion, caring for talent is essential to securing your business. The A²BCⁿ framework provides a structured approach to achieve this. By focusing on <strong>Assessing and Attracting</strong> talent, <strong>Building Trust </strong>with your talents, and Caring and Nurturing your team, this mixed approach, blending cybersecurity and HR strategies, ensures an effective and resilient team ready to meet tomorrow&#8217;s challenges.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/navigating-the-cybersecurity-talent-management-maze-a-guide-for-talent-management-enthusiasts/">Navigating The Cybersecurity Talent Management Maze: A Guide for Talent Management Enthusiasts</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/09/navigating-the-cybersecurity-talent-management-maze-a-guide-for-talent-management-enthusiasts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Quest for Cybersecurity’s Purple Squirrels: How to Find and Keep Them</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/12/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/12/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them/#respond</comments>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Fri, 22 Dec 2023 13:35:02 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[talent management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22115</guid>

					<description><![CDATA[<p>“Talent shortage”, “skills gap”, “employee burnout in cybersecurity”, “high turnover rate” – as a cybersecurity professional, you must be familiar with these expressions, for better or for worse. You may have seen the big headlines pointing out talent shortage issues...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/12/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them/">The Quest for Cybersecurity’s Purple Squirrels: How to Find and Keep Them</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">“Talent shortage”, “skills gap”, “employee burnout in cybersecurity”, “high turnover rate” – as a cybersecurity professional, you must be familiar with these expressions, for better or for worse.</p>
<p style="text-align: justify;">You may have seen the big headlines pointing out talent shortage issues in the latest news &#8211; that is sadly not a fake news. The talent war really exists in the cybersecurity market. Over the past months, we read numerous articles, academic papers, reports on this emerging subject; we discussed with CISO and Talent Managers (a real full-time job!) and the 3 main challenges remain the same: <strong>how to recruit, manage and nurture our talents?</strong></p>
<p style="text-align: justify;">In this article, we have compiled the different situations, our observations, and the initial lessons we can draw from the actions put in place to meet these challenges.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>Take a moment to analyse the strengths and weaknesses of your team to identify the complementary skills and competencies you need to look for…</strong></h2>
<p style="text-align: justify;">Beyond just filling the roles, it is essential to gain a strategic vision of the skills to draw up a sustained cyber division. Your mantra for this stage must be: “Getting the right people for today… and tomorrow!”.</p>
<p style="text-align: justify;"><strong>When people’ skills match their roles, tasks are performed efficiently, with everyone contributing to a more (cyber)secure organization.</strong> I doubt anyone will contradict me here, but it&#8217;s often easier said than done.</p>
<p style="text-align: justify;">Here are the first questions you can ask yourself to get moving in the right direction…</p>
<p style="text-align: justify;">Do you know what you need? Have you defined all the cyber activities you need to run? Have you defined your “make or buy” (internalization vs outsourcing) strategy? Have you identified the skills and the people needed to run these activities?</p>
<p style="text-align: justify;">This is a non-exhaustive list of questions that as an organisation you should ask yourself to better capture your need and know your people before launching a roadmap of actions.</p>
<p style="text-align: justify;">Knowing your need and team is important as it: (1) <strong>helps for task allocation: </strong>before, cyber teams were smaller, therefore, versatility was crucial. Nowadays, bigger cyber teams make specialization possible and facilitate the optimization of complementary skills (2) <strong>helps to</strong> <strong>target training and development</strong>: having a clear vision on your team and its activities helps you identify skill gaps and provide the appropriate training and development opportunities to the people who need it the most. With the identified missing skills in one hand, and the identified needs in another hand, you can start seeking for your ideal candidates thanks to a job offer that speaks volumes (but don’t look for purple squirrels, they don’t exist)!</p>
<p style="text-align: justify;">Keep an eye on the upcoming insights and focus on the cyber job descriptions topic! <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Fueling Team Today, Attracting Tomorrow: The recipe for Sustained Cyber Teams</strong></h2>
<p style="text-align: justify;">That is to concretely explain what cyber is and what its activities are. #transparency</p>
<p style="text-align: justify;">Based on the discussions with CISO and Talent Managers, being transparent on the job description works and gives people a sense of belonging and purpose, which in turns promotes a better teamwork.</p>
<p style="text-align: justify;">Let us share some concrete and easy actions that you can do to get things moving:</p>
<ul style="text-align: justify;">
<li><strong>Promote internally the cyber jobs and the <em>people</em> behind the jobs:</strong> by explaining concretely what working in cybersecurity means, what the positions available are, and what the people really do, you can inspire people to join your team, increase internal mobilities, strengthen the sense of belonging to the cyber division, and give perspective to your team.</li>
<li><strong>Promote externally your cybersecurity activities:</strong> make yourself visible by participating to cyber associations and key conferences (school events, collaborations with universities, research institutions, or organisations, etc.).
<ul>
<li>Organise/participate to upskilling/reskilling workshops (transferable skills).</li>
</ul>
</li>
<li>Include inspiring people in your recruitment process and branding (such as CISO, team lead, etc.</li>
</ul>
<p> </p>
<p style="text-align: justify;">Cybersecurity is still an obscure topic for those outside the cyber world. To fix that, everyone needs to start explaining what they do.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Mastering the art of taking care of your people</strong></h2>
<p style="text-align: justify;">By now, you must know that it’s a great asset to know who your team is, who your people are, who you really need to run the cyber activities, to have a great branding to attract people. But what will make the difference in the long run is to take good care of your people by offering a safe work environment and giving perspectives of evolution. When what is coming next is clear, it is easier for the people to project themselves in the company in the years to come.</p>
<p style="text-align: justify;">And before taking care of their people, CISOs also need to take care of themselves. 40% of the CISOs say that they experience “high-stress” on a daily basis and 28% of them are close to burn-out (Cyber Workforce Study, ISC²). Tough to take care of people if you don’t take care of yourself first…</p>
<p style="text-align: justify;">To avoid this, CISOs need to build a trusted relationship with their top management in order to be able to define the strategic objectives, prioritize the activities, obtain the resources, etc. And it is essential to know how to surround themselves with reliable individuals to delegate tasks and create an effective operational strategy.</p>
<p style="text-align: justify;"><strong>Recruiting is just the beginning of the journey; nurturing is the ultimate goal.</strong> Nevertheless, organisations tend to forget (<em>neglect</em>) this last, but perhaps most important point. It’s like getting an ISO 27001 certification, quite easy (of course, it requires work!) but maintaining it, is the real deal.</p>
<p style="text-align: justify;">In order to provide perspectives for team members, we need to establish career paths with their “pathways” and the means available to evolve on these paths: skills required per job and key milestones, training catalogue, internal mobilities, personalized evaluation process, etc.</p>
<p style="text-align: justify;">Nurturing your talents means helping them to develop and strengthen their skills/capabilities through <strong>trainings</strong>, teamwork with colleagues or with cyber associations, giving them <strong>perspective</strong> of evolution/growth within your company. As a human-being, we need to know where we stand and where we are going, we need a vision to get us moving (in our life #existentialcrises).</p>
<p style="text-align: justify;">If we take the example of the Maslow’s hierarchy of needs, people need to have a sense of belonging and feel that they are useful. Thus, part of nurturing talents also means <strong>creating a “team spirit”</strong> via rituals. It is not a secret that a friendly work environment/atmosphere is a crucial criterion when choosing a job and can increase people’ productivity by 12% (University of Warwick, UK), especially for young people nowadays.</p>
<p style="text-align: justify;">Giving perspective of growth/evolution is essential, especially for experts. Many organizations still view management as the only path to success, but in certain sectors like industry, we can observe a shift. Expertise is increasingly valued as an alternative success route to management; some may combine both, but it is not a necessity. Therefore, expertise circles are key to give recognition to experts in and outside of their organisations &#8211; give them the opportunity to attend specific cyber events that can also enables them to grow their network and acquire more skills.</p>
<p style="text-align: justify;">In a nutshell, attracting and nurturing talents take time, and talent recruitment emerges as a pivotal element in corporate strategies. By embracing diversity and promoting gender convergence, we venture into new dimensions to build robust, thoughtful, and resilient teams.</p>
<p style="text-align: justify;">We aim to open the cyber field to those unfamiliar, fostering diversity, and creating vocations. Let&#8217;s reach out to people; and let&#8217;s not wait for them to come to us.</p>
<p style="text-align: justify;"><strong><em> </em></strong></p>
<p style="text-align: justify;">We have created a benchmark tool to explore this multi-faceted topic (along with the ongoing research) and assess organisation’s maturity. Reach out to us if you would like to be part of it! We would be very delighted to share with you the good ideas we have collected on the market… and the traps to avoid.</p>
<p style="text-align: justify;"><strong>Unicorns </strong>(don’t misunderstand me, I am not talking about start-ups),<strong> Purple Squirrels, Ninja, Rockstars, don’t exist but if we combine diverse profiles, we can get this highly qualified team! </strong><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f60e.png" alt="😎" class="wp-smiley" style="height: 1em; max-height: 1em;" /></strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/12/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them/">The Quest for Cybersecurity’s Purple Squirrels: How to Find and Keep Them</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/12/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to activate gamification for an impactful Cyber Month</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/#respond</comments>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 15:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[gamification]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=21390</guid>

					<description><![CDATA[<p>Cyber Month is to cybersecurity awareness what the Olympics are to sports: the time to shine, with all eyes on you. Given that human-risk remains significant, with human error accounting for 82% of data breaches according to the 2022 Verizon...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/">How to activate gamification for an impactful Cyber Month</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Cyber Month is to cybersecurity awareness what the Olympics are to sports: the time to shine, with all eyes on you.</p>
<p style="text-align: justify;">Given that human-risk remains significant, with human error accounting for 82% of data breaches according to the <a href="https://www.verizon.com/business/resources/T1ed/reports/dbir/2022-data-breach-investigations-report-dbir.pdf">2022 Verizon Data Breach Investigations Report</a>, no wonder CISOs across European organizations are aiming for the most innovative and ground-breaking activities during this crucial time of the year.</p>
<p style="text-align: justify;">Once key risks have been identified, it&#8217;s go-time: spread priority secure behaviors throughout your organization using the ultimate medium: gamification.</p>
<h2> </h2>
<h2 style="text-align: justify;"><strong>Fail to play, fail the Cyber Month game</strong></h2>
<p style="text-align: justify;">From football matches to Monopoly fights, there is a game for everyone, and whichever your preference goes to, the chosen one will always elicit enthusiasm.</p>
<p style="text-align: justify;">It is then only logical that when meeting an opportunity to learn secure behaviors, employees will favor a game rather than an e-learning that they will have to &#8211; let&#8217;s face it &#8211; painfully sit through.</p>
<p style="text-align: justify;">Gamification is a winner, and although there are many reasons behind this fact, we have selected seven striking pieces of rationale that will shed a light on the benefits that gamification presents in a learning environment.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Gamification increases engagement dramatically</strong></span></h6>
<p style="text-align: justify;">To feel involved in an activity, and therefore reach the holy grail component of attention, <strong>interactivity</strong> is key.</p>
<p style="text-align: justify;">Games require action from the participant, which transforms the latter into a moving cog of their own learning process.</p>
<p style="text-align: justify;">Additionally, the element of <strong>competition</strong>, whether between teams or against a fictitious villain, present in games serves as a powerful motivator, further promoting engagement.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Practice beats theory in a learning context</strong></span></h6>
<p style="text-align: justify;">Practice accounts for <strong>70% of the learning process</strong>. Why so? Because practice allows to make the materials tangible and embed them into real-life situations, that employees can directly link to their everyday practices.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Feedback and rewards stimulate positive behaviors</strong></span></h6>
<p style="text-align: justify;">Games imply prizes and rewards to be earned. Not only does it contribute to foster motivation, but it also allows employees to access <strong>direct positive feedback</strong> about their actions and decisions, which comes with a sense of accomplishment and progress, further embedding the targeted secure behavior.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Games revamp the image of your cyber team</strong></span></h6>
<p style="text-align: justify;">Cyberawareness games have the power to shift the perception that staff hold of your cyber team. Indeed, cybersecurity may seem like an obscure and complex area for many employees.</p>
<p style="text-align: justify;">Offering games helps to make security concepts more<strong> tangible, accessible, and applicable into everyday life</strong>.</p>
<p style="text-align: justify;">Further, if they are held in-person, they allow your cyber team to gain <strong>visibility</strong> with end-users and bring a sense of <strong>recognition and trust</strong>, which in turn will boost the impact of future awareness actions.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Learning together increases team cohesion</strong></span></h6>
<p style="text-align: justify;">As if learning more effectively wasn&#8217;t enough, gamification also offers the valuable benefit of boosting <strong>team spirit</strong>.</p>
<p style="text-align: justify;">Many awareness games provide the opportunity to work collaboratively to attain success. This way, employees leave with fond memories and appreciation on top of precious security tips.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Games allow repetition of security messages in novel and fun ways</strong></span></h6>
<p style="text-align: justify;">When aiming to embed secure behaviors across an organization, repetition is crucial to ensure integration and implementation.</p>
<p style="text-align: justify;">However, repeating awareness communications through the same channels may decrease the attention that employees pay to them.</p>
<p style="text-align: justify;">Games constitute an innovative and enjoyable experience to<strong> reinforce security messages</strong>, making them <strong>stick over time</strong>.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Bonus: You collect valuable feedback and inputs from end-users</strong></span></h6>
<p style="text-align: justify;">By interacting with staff through awareness games, your cyber team gets the unique opportunity to collect information on the most urgent security questions that employees ask themselves and uncover which are their biggest challenges in terms of security in their daily activities. This feedback is then useful to <strong>prioritise future awareness messages</strong> and <strong>review or implement processes to facilitate employees&#8217; work life</strong>. For example, if staff repeatedly bring up the fact that they may see suspicious-looking emails but don&#8217;t know how to report them, this may lead to a special awareness campaign meant to remind employees of the way to report phishing emails, and the implementation of a phishing report button to facilitate the reporting process.</p>
<h2> </h2>
<h2 style="text-align: justify;"><strong>L</strong><strong>everaging gamification: The musts for organizing successful awareness games</strong></h2>
<p style="text-align: justify;">Prior to establishing the success factors of an awareness game, let&#8217;s pinpoint what makes a fruitful one.</p>
<p style="text-align: justify;">In order to prove truly effective, an awareness game should see its participants leave the activity with a clear idea of the security behaviors that they will change in their own office life.</p>
<p style="text-align: justify;">To achieve this goal, we have identified a set of <strong>five key criteria</strong>:</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-21392 " src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification.png" alt="" width="492" height="350" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification.png 2144w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-269x191.png 269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-768x546.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-1536x1091.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-2048x1455.png 2048w" sizes="auto, (max-width: 492px) 100vw, 492px" /></p>
<p style="text-align: justify;">A solid game will cover a<strong> priority awareness topic</strong>, based on the risks identified for the organization and ranked accordingly.</p>
<p style="text-align: justify;">Then, the right <strong>level of complexity</strong> must be found, based on the level of knowledge of your staff.</p>
<p style="text-align: justify;">Staff who already have a high level of maturity in terms of security behaviors will &#8211; at best &#8211; not learn anything new during an easy game, and &#8211; at worst &#8211; be bored or resentful towards the security awareness team for taking away some of their working time to cover elements they already know.</p>
<p style="text-align: justify;">The reverse scenario would also be problematic: confronting beginner staff with a difficult game would only leave them confused.</p>
<p style="text-align: justify;">Having an<strong> understanding of the level of security maturity of your target audience</strong> is therefore key to adapt the game for optimal results.</p>
<p style="text-align: justify;">Thirdly, the game must have at its center a <strong>compelling story</strong>. The scenario must be intriguing and should unfold seamlessly. Additionally, it should be adapted to the context of the organization so participants relate to the events happening in the game.</p>
<p style="text-align: justify;">To truly catch, and most importantly, retain employees&#8217; attention, the game will have a <strong>strong focus on interactivity</strong>. Interactions can happen between the game master(s) and the players, but also between players themselves when collaborating in the context of the activity.</p>
<p style="text-align: justify;">To further exploit this concept, the game may stimulate the 5 senses to render it even more engaging and immersive.</p>
<p style="text-align: justify;">The final key element to an effective game resides in providing a<strong> good incentive</strong>. Again, there are multiple ways to achieve this: you can for example establish a scoring system to foster playful competition between teams, and implement rewards. Rewards may come in the form of goodies, prizes such as individual or team experiences, or even donations to the charitable organization of the participants&#8217; choice. A solid incentive will boost voluntary participation to the activity, and a decision to participate that comes from the genuine willingness of staff will also be synonymous with higher motivation and involvement in the game for better retention of the shared secure behaviors.</p>
<h2> </h2>
<h2 style="text-align: justify;"><strong>Which awareness game is made for you?</strong></h2>
<p style="text-align: justify;">To make your Cyber Month gamification dreams come true, let&#8217;s jump from theory to practice!</p>
<p style="text-align: justify;">Take the quiz below to find out which cyberawareness game is tailored to your needs and objectives for <strong>maximal impact</strong>.</p>
<p style="text-align: justify;"><a href="https://take.quiz-maker.com/QCMG79JZ3" data-quiz="QCMG79JZ3" data-type="4">Loading&#8230;</a><script>(function(i,s,o,g,r,a,m){var ql=document.querySelectorAll('A[quiz],DIV[quiz],A[data-quiz],DIV[data-quiz]'); if(ql){if(ql.length){for(var k=0;k<ql.length;k++){ql[k].id='quiz-embed-'+k;ql[k].href="javascript:var i=document.getElementById('quiz-embed-"+k+"');try{qz.startQuiz(i)}catch(e){i.start=1;i.style.cursor='wait';i.style.opacity='0.5'};void(0);"}}};i['QP']=r;i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)})(window,document,'script','https://take.quiz-maker.com/3012/CDN/quiz-embed-v1.js','qp');</script></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/">How to activate gamification for an impactful Cyber Month</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake President Fraud: almost caught me out!</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/01/fake-president-fraud-almost-caught-me-out/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/01/fake-president-fraud-almost-caught-me-out/#respond</comments>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Mon, 24 Jan 2022 09:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17534</guid>

					<description><![CDATA[<p>I often talk about cybersecurity awareness: I share concepts and best practices, but today I&#8217;m writing from another point of view: that of the person who has been made aware! Yes, experts are not exempt from awareness initiatives&#8230; let me...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/01/fake-president-fraud-almost-caught-me-out/">Fake President Fraud: almost caught me out!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">I often talk about cybersecurity awareness: I share concepts and best practices, but today I&#8217;m writing from another point of view: that of the person who has been made aware!</p>
<p style="text-align: justify;">Yes, experts are not exempt from awareness initiatives&#8230; let me tell you a story, I’m hoping that it will help you to get the message across to your organization.</p>
<p style="text-align: justify;">It all started on a Tuesday at 3:34 pm. I received a WhatsApp from my CEO (or that&#8217;s what I think at the time!). The message read:</p>
<blockquote>
<p style="text-align: justify;">&#8220;Hi Noémie, are you available? I need to talk with you about a confidential acquisition in Belgium. Pascal&#8221;.</p>
</blockquote>
<p style="text-align: justify;">I picked up the message 10 minutes later and replied that I could free up my time and have that call. In my head, I asked myself a few questions: an acquisition, but who could it be? at what stage of the discussions are they? our priority areas are the US and UK, so it would be a bigger firm?&#8230; In short, the stress level was rising but I wanted to know more. At this stage, nothing indicated the slightest hint of a fraud or scam and I didn’t see any particular risk. I was more intrigued by the opportunity&#8230;</p>
<p style="text-align: justify;"> 2 minutes after my message, the following answer appeared:</p>
<blockquote>
<p style="text-align: justify;">&#8220;No need, but I will need you to prepare a transfer quickly, I will send you the bank information in a few minutes. Thanks”</p>
</blockquote>
<p style="text-align: justify;">At that moment, it all clicked into place. One thing was clear: it was a trap! It was urgent that I did nothing <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p style="text-align: justify;">I then decided to investigate because something wasn’t right in this situation:</p>
<ul style="text-align: justify;">
<li>The phone number of the WhatsApp contact was not the one I have in my phonebook</li>
<li>The photo is indeed Pascal&#8217;s but it&#8217;s a common photo, so easy to get</li>
</ul>
<p style="text-align: justify;">I then sent 2 messages in parallel:</p>
<ul style="text-align: justify;">
<li>The first one to my CEO, to the number registered in my directory. I took a screenshot of the WhatsApp discussion and asked him &#8220;Hello Pascal, obviously it&#8217;s not you! Can you confirm?&#8221;</li>
<li>The second was to the mystery sender on WhatsApp: &#8220;Are you testing me?&#8221;</li>
</ul>
<p style="text-align: justify;">The response on WhatsApp soon arrived, &#8220;Well done!&#8221;, and a more comprehensive message then followed which clarified:</p>
<ul style="text-align: justify;">
<li>This was a campaign to raise awareness about Fake President Fraud.</li>
<li>That the cases are unfortunately frequent and that several attackers have tried to impersonate a member of the executive management, by SMS, social networks or email by simply changing a photo or name</li>
<li>What Fake President Fraud is and the objective of the attackers: to make you believe that they have a priority and confidential matter for you to deal with, such as an acquisition, which requires an urgent payment out of the normal processes.</li>
<li>Rules to follow in case of an attack, clues to thwart attacks, and the security contact to alert.</li>
</ul>
<p style="text-align: justify;">As you can see, this story has a happy ending. In the cold light of day, you might think that it is quite simple to thwart the attack, but unfortunately that is not always the case.   </p>
<p style="text-align: justify;">Beyond the example, it is the management of emotions that I want to emphasise. This exercise was well done and very credible; it first gave me confidence with an important request but without asking me to take any risky or suspicious actions. The importance of the request generated questions and a little stress &#8211; emotions I needed to master in order to keep my decisions and actions logical and reasonable. I am personally familiar with this subject; I know the theory, but I assure you that the real-life situation was very different! I now know that a flood of emotions appears (although they won&#8217;t be so new next time!), but I am reassured that my common sense allowed me to keep a level head and investigate without rushing. I thanked my CISO after the exercise &#8211; I understand the benefits of practice and this experience was a good test, especially for those experts who may feel safe as they know what to do (to be clear: I don’t put myself in that category!). It tested in a very realistic way whether they would know how to put the theory into practice and recognise the messages for what they were: a scam.</p>
<p style="text-align: justify;">Training your people, even the experts, allows them to be better, to be ready (although not necessarily to be perfect!), because the situation will no longer be new, and the emotions will not be unknown&#8230; To shine on the big day, preparation is an essential ingredient, and this is true for everyone!</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>Summary</strong></h1>
<p style="text-align: justify;">Some key elements of Fake President Fraud:</p>
<ul>
<li style="text-align: justify;">Confidence building (photo, tone of voice, choice of words, etc.) by the attacker or climate of authority</li>
<li style="text-align: justify;">Urgency, stress: emotions that create pressure and disturb lucidity</li>
<li style="text-align: justify;">Demand for unusual, abnormal actions to be carried out within a short period of time</li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/01/fake-president-fraud-almost-caught-me-out/">Fake President Fraud: almost caught me out!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/01/fake-president-fraud-almost-caught-me-out/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OSE belges et ISO 27001 : quel chemin vers plus de cybersécurité ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/ose-belges-et-iso-27001-quel-chemin-vers-plus-de-cybersecurite-2/</link>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 15:20:25 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[NIS]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13761</guid>

					<description><![CDATA[<p>Comment utiliser le cadre de la norme ISO 27001 au service de l’amélioration continue du niveau de sécurité ? Dans un précédent article, on vous racontait tout sur la nouvelle directive européenne NIS et le choix de la Belgique de se...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/ose-belges-et-iso-27001-quel-chemin-vers-plus-de-cybersecurite-2/">OSE belges et ISO 27001 : quel chemin vers plus de cybersécurité ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Comment utiliser le cadre de la norme ISO 27001 au service de l’amélioration continue du niveau de sécurité ?</h1>
<p style="text-align: justify;">Dans un précédent article, on vous racontait tout sur la nouvelle directive européenne NIS et le choix de la Belgique de se baser sur la norme ISO 27001 pour accroître la sécurité des Opérateurs de Services Essentiels (OSE) avec tout ce que ça entraînait pour les organisations nouvellement désignées.</p>
<p style="text-align: justify;">Qui dit directive européenne ne dit pas règlement européen : il revient donc à chaque pays membre de transposer les exigences de la directive NIS dans son droit national. <strong>La Belgique a fait le choix d’un standard existant </strong>(la norme ISO 27001) alors que certains de ses voisins, dont la France, ont choisi une approche basée sur la définition d’un référentiel d’exigences précis mêlant à la fois des mesures techniques et de gouvernance (SI d’administration, cloisonnement, démarche d’homologation, etc.).</p>
<p style="text-align: justify;">Intéressons-nous aujourd’hui à ce que ça implique pour les OSE belges, et plus largement pour toutes les organisations attirées par les normes internationales, de suivre les exigences de la norme ISO 27001.</p>
<p>&nbsp;</p>
<h2>La norme ISO 27001, adulée par certains et critiquée par d’autres</h2>
<p style="text-align: justify;">Des voix se lèvent contre la référence du milieu, fustigeant notamment son aspect bureaucratique et sa paperasserie qui, pourtant, peuvent aider à mettre en place un référentiel utile à la continuité des services et la formation des personnes via le partage des pratiques – surtout lorsqu’il est pensé avec pragmatisme. Les critiques vont également bon train sur le niveau de complexité ajouté, encore plus présent pour les plus petites structures. Là encore, <strong>la règle est au pragmatisme et les mesures doivent être adaptées à la taille de l’organisation </strong>et s’intégrer à l’existant pour éviter les structures <em>ex nihilo</em> trop lourdes à gérer.</p>
<p style="text-align: justify;">Enfin, certains aprioris ont la vie dure et réduisent souvent une conformité ISO 27001 à une liste de cases à cocher, dépourvues d’implications réelles sur la sécurité de l’organisation. Mais la fameuse déclaration d’applicabilité (DdA), exigée par la norme ISO 27001 à tous ceux qui visent une certification, ne revient pas uniquement à lister tous les contrôles de la norme ISO 27002. Elle demande une véritable évaluation au regard des enjeux et des risques. De quoi apporter des éléments concrets pour la sécurité de l’organisation.</p>
<p>&nbsp;</p>
<h2>ISO 27001, ISO 27002, il y en a beaucoup comme ça ?</h2>
<p style="text-align: justify;">Dans la famille des ISO, beaucoup, vraiment beaucoup. En revanche pour la cybersécurité, ce sont bien ces deux-là qui sont les plus utilisées, avec l’ISO 27005 pour la gestion des risques (si c’est la protection des données qui vous intéresse, lisez aussi notre article sur la nouvelle venue <a href="https://www.linkedin.com/pulse/ose-belges-comment-r%25C3%25A9ussir-votre-mise-en-conformit%25C3%25A9-nis-no%25C3%25ABmie-honore/?trackingId=tcYWjUqWRouGnAE8PbAeVw%3D%3D" target="_blank" rel="noopener noreferrer">ISO 27701</a>).</p>
<p style="text-align: justify;">La norme ISO 27001 apporte <strong>un cadre à la cybersécurité et vise à mettre en place un SMSI</strong> (Système de Management de la Sécurité de l’Information). Pour aider les organisations dans cette direction, elle est accompagnée de la norme ISO 27002 qui détaille les bonnes pratiques sécurité présentées dans l’annexe A de l’ISO 27001. La certification (le graal des OSE belges) porte sur la norme ISO 27001 mais les deux normes fonctionnent bien de pair.</p>
<p style="text-align: justify;"><strong>La certification s’obtient sur un périmètre délimité </strong>d’un point de vue métier et IT sur lequel les principaux risques sont identifiés. Cette évaluation par les risques, mêlée à la prise en compte du contexte de l’organisation, aide à sélectionner les bonnes pratiques ISO 27002 pertinentes pour formaliser la Déclaration d’Applicabilité (DdA) et à exclure les contrôles qui ne sont pas applicables (attention à bien justifier ces exclusions : elles seront analysées par l’organisme de certification). Si on peut retirer des pratiques moins utiles, on peut aussi en rajouter d’autres : l’organisation peut ainsi compléter la liste existante des 114 mesures de sécurité au regard de ses risques. La norme ISO 27002 n&#8217;adresse pas l&#8217;exhaustivité des mesures de sécurité possibles. C’est là qu’une expertise cybersécurité prend tout son sens.</p>
<p>&nbsp;</p>
<h2>5 conseils pour trouver le bon équilibre et réussir sa mise en conformité ISO 27001</h2>
<p style="text-align: justify;">Bien entendu, vu dans son ensemble, un programme de mise en conformité à la norme ISO 27001 peut rapidement donner le vertige… Voici <strong>5 réflexes à avoir en tête </strong>pour faciliter le lancement d’un SMSI et le maintien de ses performances dans le temps :</p>
<p>&nbsp;</p>
<figure id="post-14707 media-14707" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14707 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7.png" alt="" width="1813" height="821" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7.png 1813w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7-422x191.png 422w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7-768x348.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7-1536x696.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7-730x330.png 730w" sizes="auto, (max-width: 1813px) 100vw, 1813px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;"><strong>1. Identifier un sponsor investi au service de l’objectif de sécurisation</strong>. Comme pour le cinéma, il n’y a pas de film sans réalisateur, et pas de réalisateur sans le soutien du producteur. Le <em>match</em> parfait doit avoir pleine conscience de la valeur ajoutée de la mise en conformité à la norme ISO 27001 pour améliorer le niveau de sécurité, au-delà de la pure conformité au cadre légal. Il doit utiliser les cadres normatifs au profit d&#8217;un meilleur niveau de sécurité et doit donc voir ce projet comme un chantier de sécurisation plutôt qu’un chantier de conformité.</p>
<p style="text-align: justify;">Implémenter un SMSI pérenne demande des ressources et moyens humains, organisationnels, physiques et financiers. Le pilotage du projet de mise en conformité ne fonctionnera que s’il est<strong> soutenu par un responsable qui a le pouvoir d’allouer les ressources et les moyens nécessaires pour piloter les risques</strong> et assurer un niveau de sécurité acceptable au regard des enjeux métier. Le respect de la directive NIS, à l’échelle européenne ou à l’échelle belge via une mise en conformité à la norme ISO 27001, constitue avant tout un moyen d’augmenter le niveau de sécurité et non une fin en soi.</p>
<p style="text-align: justify;"><strong>2. Piloter par les risques. </strong>C’est la base de la sécurité ; le concept clé à toujours garder en tête. Ce pilotage permet d’identifier les risques du périmètre et de s’assurer que les enjeux métier sont bien pris en compte. La gestion des risques ne s’arrête pas à leur identification et au traitement initial. Elle demande la mobilisation des équipes et des activités pour traiter les risques existants et suivre l&#8217;évolution des risques (existants et nouveaux qui apparaissent) et leurs traitements, via une mise à jour périodique et lors d’évènements majeurs sur le périmètre.</p>
<p style="text-align: justify;">Par la mise en place de cette démarche globale des risques, l’organisation s’assure une vision transverse des risques qui permet de focaliser les efforts des mesures de sécurité là où il y a le plus d’enjeux. Cette validation et cet arbitrage doivent se faire en concertation avec les propriétaires des risques (métier ou IT) qui portent la responsabilité du risque sur leurs périmètres et doivent se positionner sur les traitements possibles (acceptation, réduction, transfert ou évitement). <strong>Un pilotage affiné et resserré des risques permet ainsi de prendre de véritables décisions éclairées,</strong> par des acteurs parfois éloignés de la sécurité.</p>
<p style="text-align: justify;"><strong>3. Constituer un référentiel documentaire pragmatique.</strong> Cette étape aide à définir et documenter les pratiques et ainsi favoriser la continuité des opérations, leur contrôle et leur amélioration continue. Cette documentation doit être le reflet de la réalité tout en assurant la cohérence avec les exigences de la norme ISO 27001 pour aider à définir les pratiques à mettre en œuvre et les gérer au quotidien (implémentation et mises à jour au gré des évolutions, etc.).</p>
<p style="text-align: justify;">Les maîtres-mots lors de la constitution de ce référentiel sont <strong>pragmatisme et utilité</strong> : il doit s’intégrer à l’existant en complétant les procédures existantes et en en créant de nouvelles qui manquaient ; il ne doit pas compliquer inutilement la situation mais se baser sur une interprétation pertinente de la norme ; il doit être utile aux équipes qui assurent les activités pour permettre le maintien des opérations. <strong>Evitez donc les copier-coller des exigences des normes</strong>. Ils créent un référentiel inutile aux équipes terrain et attiseront la curiosité de vos auditeurs qui douteront alors de l&#8217;effectivité des mesures&#8230;</p>
<p style="text-align: justify;"><strong>4. Évaluer régulièrement les performances.</strong> Tout système de management qui se respecte nécessite une boucle de contrôle pour évaluer ses performances et, dans le cas du SMSI, ses non-conformités à la norme ISO 27001 et au référentiel en place dans l’organisation (synthétisé dans la DdA). L’identification de ces non-conformités doit permettre de remonter jusqu’à leur source et d’initier la réflexion sur la meilleure manière de les gérer. La réflexion à mener doit porter sur la manière dont la non-conformité va être résolue pour assurer l’augmentation du niveau de sécurité tout en s’assurant que les mesures correspondent aux exigences de la norme et sont adaptées au contexte, aux risques et aux enjeux de l’organisation.</p>
<p style="text-align: justify;">Les différents niveaux de contrôles (auto-contrôles par les équipes, audits internes/externes, revues de direction) doivent tous garder l’objectif d’amélioration du niveau de sécurité en tête en utilisant de manière pragmatique les exigences de la norme et le référentiel de l’entreprise, et au besoin faire évoluer ce dernier au regard de la réalité pratique de l’organisation. Il s&#8217;agit de trouver le bon équilibre entre le contexte de l&#8217;organisation et la gestion des risques identifiés. <em>Si vos enjeux portent essentiellement sur la disponibilité d&#8217;une activité, focalisez vos efforts (mesures et contrôles) sur cet enjeu en priorité.</em> Pour être pertinent, <strong>ce cycle d’évaluation doit distribuer les efforts sur les périmètres les plus pertinents pour l’organisation</strong> (selon ses risques et enjeux) et alimenter les prochaines étapes du cylce de vie du SMSI.</p>
<p style="text-align: justify;"><strong>5. Engager les équipes.</strong> Un projet de mise en place d’un SMSI n’est pas uniquement l’apanage du RSSI ou d’une équipe de documentalistes. Il s’agit avant tout d’un projet d’envergure qui demande un large éventail d’expertises allant de la cybersécurité au business en passant par l’IT, le juridique, les achats, les ressources humaines, etc. C’est une véritable conduite du changement qui est à organiser avec l’implication pleine et complète des différentes équipes et du management de l’organisation pour <strong>assurer un SMSI qui sert l’amélioration durable du niveau de sécurité pour l’ensemble du périmètre</strong>.</p>
<p>&nbsp;</p>
<h2>La certification ISO 27001, oui mais pragmatique !</h2>
<p style="text-align: justify;">La véritable force de la certification ISO 27001 est avant tout d’<strong>enclencher une dynamique de sécurité dans l’organisation</strong>. La documentation peut certes alourdir les pratiques mais n’enlève rien de la philosophie d’amélioration continue du niveau de sécurité. Par l’apport d’un socle minimal pour la cybersécurité, sans définir des exigences strictes, la norme laisse à l’organisation le choix de placer le curseur sécurité à un niveau qui lui est adapté et d’obtenir des résultats positifs &#8211; <em>à condition de s’entourer de bonnes personnes sensibilisées au sujet</em> !</p>
<p style="text-align: justify;">Traitée avec un <strong>regard critique et pragmatique</strong>, la norme apporte ainsi un cadre pour installer la gouvernance de la cybersécurité au sein de chaque organisation en mobilisant les concepts clés tout en laissant la marge nécessaire pour proposer des mesures complémentaires qui, ensemble, servent l’amélioration du niveau de sécurité.</p>
<p>&nbsp;</p>
<blockquote><p>Au-delà de l’approche traditionnelle de la conformité, la mise en conformité à <strong>la norme</strong> <strong>ISO 27001 doit servir de boîte à outils</strong> à toute les équipes et non constituer une fin en soi.</p></blockquote>
<p>&nbsp;</p>
<p style="text-align: justify;">La liberté de mise en œuvre de la directive NIS au niveau européen offre un nouveau terrain d’expérimentation où se mêlent cultures différentes et visions divergentes de la cybersécurité. Seul l’avenir pourra nous dire ce qui fonctionne au niveau européen, mais <strong>l’approche belge démontre une nouvelle fois la culture du compromis entre cadre strict et liberté de mouvement. </strong>Pour les OSE belges comme pour les organismes de certification, l’inconnue demeure avant tout sur le positionnement du curseur entre les deux extrêmes.</p>
<p>&nbsp;</p>
<blockquote><p>Il leur faudra alors éviter une approche scolaire et mettre à profit une interprétation utile et pragmatique de la norme en gardant l’objectif final en tête : plus de cybersécurité.</p></blockquote>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/ose-belges-et-iso-27001-quel-chemin-vers-plus-de-cybersecurite-2/">OSE belges et ISO 27001 : quel chemin vers plus de cybersécurité ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Belgian ESO and ISO 27001: which way to more cyber security?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/belgian-eso-and-iso-27001-which-way-to-more-cyber-security/</link>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 11:46:07 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[belgium]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[ESO]]></category>
		<category><![CDATA[ISMS]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14032</guid>

					<description><![CDATA[<p>How can the ISO 27001 framework be used to continuously improve the security level? In a previous article, we told you all about the new European NIS directive and Belgium&#8217;s choice to use the ISO 27001 standard as a basis...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/belgian-eso-and-iso-27001-which-way-to-more-cyber-security/">Belgian ESO and ISO 27001: which way to more cyber security?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How can the ISO 27001 framework be used to continuously improve the security level?</h2>
<p>In a previous article, we told you all about the new European NIS directive and Belgium&#8217;s choice to use the ISO 27001 standard as a basis for increasing the security of Essential Service Operators (ESOs) with all that it entailed for the newly designated organizations.</p>
<p>A European directive does not mean a European regulation: it is therefore up to each member country to transpose the requirements of the NIS directive into its national law. <strong>Belgium has chosen to use an existing standard (ISO 27001)</strong>, while some of its neighbours, including France, have chosen an approach based on the definition of a precise reference system of requirements combining both technical and governance measures (administrative IS, partitioning, approval process, etc.).</p>
<p>Today, let’s try to understand what it means for Belgian ESOs, and more broadly for all organizations attracted by international standards, to follow the requirements of ISO 27001.</p>
<p>&nbsp;</p>
<h2>The ISO 27001 standard, adulated by some and criticized by others</h2>
<p>Some voices are rising up against the reference in the field, castigating in particular its bureaucratic aspect and its red tape which, however, can help to set up a useful reference system for the continuity of services and the training of people through the sharing of practices &#8211; especially when it is thought out pragmatically. Criticism is also rife about the added level of complexity, which is even more present for smaller structures. Here again, <strong>pragmatism is the rule, and measures must be adapted to the size of the organization</strong> and integrated into existing structures to avoid ex nihilo structures that are too cumbersome to manage.</p>
<p>Finally, some preconceptions have a hard time and often reduce ISO 27001 compliance to a list of checkboxes, with no real implications for the security of the organization. But the famous Declaration of Applicability (DoA), required by ISO 27001 for all those seeking certification, is not the same as listing all the controls of ISO 27002. It requires a real assessment regarding the issues and risks. This will provide concrete elements for the security of the organization.</p>
<p>&nbsp;</p>
<h2>ISO 27001, ISO 27002, are there many like that?</h2>
<p>In the ISO family, a lot, really a lot. For cybersecurity, on the other hand, it is these two that are the most used, with ISO 27005 for risk management (if it is data protection that interests you, read also <a href="https://www.riskinsight-wavestone.com/en/2020/01/iso-27701-international-framework-privacy/">our article</a> on the newcomer ISO 27701).</p>
<p>The ISO 27001 standard <strong>provides a framework for cybersecurity and aims to set up an ISMS</strong> (Information Security Management System). To help organizations in this direction, it is accompanied by the ISO 27002 standard which details the good security practices presented in Annex A of ISO 27001. The certification (the Belgian ESOs&#8217; holy grail) is based on the ISO 27001 standard but the two standards work well together.</p>
<p><strong>Certification is obtained on a perimeter defined from a business and IT point of view</strong> on which the main risks are identified. This risk assessment, combined with the consideration of the organization&#8217;s context, helps to select the relevant ISO 27002 good practices to formalize the Declaration of Applicability (DoA) and to exclude controls that are not applicable (be careful to justify these exclusions: they will be analyzed by the certification body). If less useful practices can be removed, other practices can also be added: the organization can thus complete the existing list of 114 security measures regarding its risks. The ISO 27002 standard does not address the exhaustiveness of possible security measures. This is where cybersecurity expertise comes into its own.</p>
<p>&nbsp;</p>
<h2>5 tips to find the right balance and achieve ISO 27001 compliance</h2>
<p>Of course, seen as a whole, an ISO 27001 compliance program can quickly make you dizzy&#8230; Here are <strong>5 reflexes to keep in mind</strong> to facilitate the launch of an ISMS and the maintenance of its performance over time:</p>
<p>&nbsp;</p>
<figure id="post-14035 media-14035" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14035 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1.png" alt="" width="1876" height="833" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1.png 1876w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-430x191.png 430w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-768x341.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-1536x682.png 1536w" sizes="auto, (max-width: 1876px) 100vw, 1876px" /></figure>
<p>&nbsp;</p>
<p><strong>1. Identify a sponsor invested in the service of the security objective.</strong> As with cinema, there is no film without a director, and no director without the support of the producer. The perfect match must be fully aware of the added value of compliance with ISO 27001 to improve the security level, beyond pure compliance with the legal framework. He must use normative frameworks for the benefit of a better security level and must therefore see this project as a security project rather than a compliance project.</p>
<p>Implementing a sustainable ISMS requires human, organizational, physical and financial resources and means. Steering the compliance project will only work if it is <strong>supported by a manager who has the authority to allocate the resources and means necessary to manage the risks and ensure an acceptable level of security regarding the business challenges.</strong> Compliance with the NIS directive, at European or Belgian level through compliance with the ISO 27001 standard, is above all a means of increasing the security level and not an end in itself.</p>
<p>&nbsp;</p>
<p><strong>2. Manage by risk.</strong> This is the basis of security; the key concept to always keep in mind. This management makes it possible to identify the risks within the perimeter and to ensure that the business challenges are considered. Risk management does not stop at the identification and initial treatment of risks. It requires the mobilization of teams and activities to deal with existing risks and monitor the evolution of risks (existing and new risks that emerge) and their treatment, through periodic updates and during major events within the scope.</p>
<p>By implementing this global approach to risks, the organization ensures a cross-functional vision of risks that allows it to focus its security measures where the stakes are highest. This validation and arbitration must be carried out in consultation with the owners of the risks (business or IT) who are responsible for the risk within their perimeters and must position themselves on the possible treatments (acceptance, reduction, transfer or avoidance). <strong>Refined and tightened risk management thus enables real, informed decisions to be taken</strong>, by players who are sometimes far removed from security.</p>
<p>&nbsp;</p>
<p><strong>3. Establish a pragmatic documentary repository.</strong> This step helps to define and document practices and thus promote business continuity, control and continuous improvement. This documentation must reflect reality while ensuring consistency with the requirements of the ISO 27001 standard to help define the practices to be implemented and manage them on a daily basis (implementation and updates as changes occur, etc.).</p>
<p>The key words when setting up this reference system are <strong>pragmatism and usefulness</strong>: it must be integrated into the existing system by completing existing procedures and creating new ones that were missing; it must not unnecessarily complicate the situation but be based on a relevant interpretation of the standard; it must be useful to the teams carrying out the activities to enable operations to be maintained. Therefore, <strong>avoid copying and pasting requirements from the standards.</strong> They create a useless referential for the field teams and will arouse the curiosity of your auditors who will then doubt the effectiveness of the measures&#8230;</p>
<p>&nbsp;</p>
<p><strong>4. Regularly evaluate performance.</strong> Any self-respecting management system requires a control loop to assess its performance and, in the case of ISMS, its non-compliance with the ISO 27001 standard and with the reference system in place in the organization (summarized in the DoA). The identification of these non-conformities must make it possible to trace them back to their source and initiate reflection on the best way to manage them. The reflection to be carried out must focus on how the non-conformity will be resolved to ensure an increase in the level of security while ensuring that the measures correspond to the requirements of the standard and are adapted to the context, the risks and the stakes of the organization.</p>
<p>The different levels of control (self-monitoring by the teams, internal/external audits, management reviews) must all keep the objective of improving the security level in mind by pragmatically using the requirements of the standard and the company&#8217;s reference framework, and if necessary, make the latter evolve in the light of the practical reality of the organization. It is a question of finding the right balance between the context of the organization and the management of the identified risks. If your challenges are mainly related to the availability of an activity, focus your efforts (measures and controls) on this issue as a priority. To be relevant, <strong>this assessment cycle must distribute efforts on the most relevant perimeters for the organization</strong> (according to its risks and impacts) and feed the next steps of the ISMS life cycle.</p>
<p>&nbsp;</p>
<p><strong>5. Engage the teams.</strong> An ISMS implementation project is not only the prerogative of the CISO or a team of documentalists. It is first and foremost a large-scale project that requires a wide range of expertise, from cyber security to business, IT, legal, procurement, human resources, etc. It is a real change management process that needs to be organized with the full and complete involvement of the various teams and the organization&#8217;s management to <strong>ensure an ISMS that serves the sustainable improvement of the security level for the entire perimeter.</strong></p>
<p>&nbsp;</p>
<h2>ISO 27001 certification, yes but pragmatic!</h2>
<p>The real strength of ISO 27001 certification is above all to <strong>trigger a security dynamic within the organization.</strong> Documentation can certainly make practices more cumbersome but does not detract from the philosophy of continuous improvement of the level of security. By providing a minimal basis for cybersecurity, without defining strict requirements, the standard leaves the organization the choice of placing the security cursor at a level that is suitable and to obtain positive results &#8211; as long as you surround yourself with good people who are aware of the topic.</p>
<p>Treated with a <strong>critical and pragmatic eye</strong>, the standard thus provides a framework for installing cybersecurity governance within each organization by mobilizing key concepts while leaving the necessary room to propose complementary measures that, together, serve to improve the level of security.</p>
<p>The free implementation of the NIS Directive at the European level offers a new testing ground where different cultures and different visions of cybersecurity are mixed. Only the future will be able to tell us what works at European level, but the <strong>Belgian approach once again demonstrates the culture of compromise between strict framework and freedom of movement.</strong> For Belgian ESOs and certification bodies alike, the unknown is above</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/belgian-eso-and-iso-27001-which-way-to-more-cyber-security/">Belgian ESO and ISO 27001: which way to more cyber security?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OSE belges : comment réussir votre mise en conformité NIS et obtenir votre certification ISO 27001 ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/05/ose-belges-comment-reussir-votre-mise-en-conformite-nis-et-obtenir-votre-certification-iso-27001/</link>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Tue, 12 May 2020 15:02:51 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Belgique]]></category>
		<category><![CDATA[conformité]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[NIS]]></category>
		<category><![CDATA[OSE]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13077</guid>

					<description><![CDATA[<p>Félicitations ! Vous faites partie des élus, votre organisation a été désignée Opérateur de Services Essentiels (OSE) par son autorité sectorielle. Bienvenue au club des futurs certifiés ISO 27001. Maintenant que l’information est digérée vous vous demandez : qu’est-ce que cela implique concrètement ? Comment m’y...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/ose-belges-comment-reussir-votre-mise-en-conformite-nis-et-obtenir-votre-certification-iso-27001/">OSE belges : comment réussir votre mise en conformité NIS et obtenir votre certification ISO 27001 ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Félicitations ! Vous faites partie des élus, votre organisation a été désignée <strong>Opérateur de Services Essentiels (OSE) </strong>par son autorité sectorielle. Bienvenue au club des futurs <strong>certifiés ISO 27001</strong>. Maintenant que l’information est digérée vous vous demandez : qu’est-ce que cela implique concrètement ? Comment m’y prendre ? Dans quels délais ? Pas de panique, dans cet article, on vous propose tous les éclaircissements nécessaires pour débuter votre mise en conformité aux exigences de la loi NIS belge.</p>
<p>&nbsp;</p>
<h2>OSE, acteur clef des services essentiels économiques et sociétaux belges</h2>
<p style="text-align: justify;">Si votre organisation a été désignée comme OSE, c’est parce qu’elle fournit un ou plusieurs services <strong>essentiels au maintien d’activités sociétales et économiques critiques,</strong> pour la Belgique, et plus largement pour l’Union Européenne (UE). En effet, <strong>la Directive Européenne NIS</strong> publiée en 2016 (security of network and information systems &#8211; UE 2016/1148), a pour <strong>objectif d’assurer un niveau commun élevé de sécurité des réseaux et des systèmes d’information </strong>au sein de l’UE. Cette directive a été transposée dans le droit belge en mai 2019 et permet de désigner une entité publique ou privée comme OSE si elle répond aux critères suivants :</p>
<p>&nbsp;</p>
<figure id="post-13078 media-13078" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13078 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0.png" alt="" width="1789" height="1017" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0.png 1789w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-336x191.png 336w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-768x437.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-1536x873.png 1536w" sizes="auto, (max-width: 1789px) 100vw, 1789px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;"><strong>Depuis novembre 2019, les notifications de désignation s’établissent dans les secteurs de l’énergie, du transport aérien et de la finance. Le secteur de la santé, quant à lui, a annoncé qu’aucun OSE ne sera désigné en 2020.</strong></p>
<p style="text-align: justify;">Votre entreprise coche toutes ces cases ? Sachez que l’autorité sectorielle peut ajouter des critères spécifiques afin de juger du degré de criticité des services : par exemple, la part de marché de l’entreprise, ou l’ampleur de la zone géographique susceptible d’être touchée par un incident. (Loi 2019-04-07/15. Art.13).</p>
<p>&nbsp;</p>
<h2>Quelles obligations après sa notification ?</h2>
<p style="text-align: justify;">Être désigné OSE implique de protéger les systèmes d’information qui permettent la fourniture du ou des services essentiels identifiés. Sécuriser un service essentiel revient à s’assurer de la <strong>disponibilité, la confidentialité et l’intégrité</strong> des systèmes d’information dont il est tributaire (Loi 2019-04-07/15. Art.24). Pour ce faire, la Belgique demande aux OSE de faire certifier leurs systèmes d’information critiques à la <strong>norme ISO 27001</strong> (Loi 2019-04-07/15. Art.22). Cette norme demande la <strong>création d’un Système de Management de la Sécurité de l’Information </strong>(SMSI) avec la mise en œuvre de processus et de mesures de sécurité.</p>
<p>&nbsp;</p>
<h2>Les principales étapes et échéances de la loi NIS belge</h2>
<p style="text-align: justify;">La Loi du 7 avril 2019 établissant un cadre pour la sécurité des réseaux et des systèmes d&#8217;information d&#8217;intérêt général pour la sécurité publique, dite Loi NIS belge, prévoit un délai de mise en <strong>conformité en 3 ans et 2 mois et demi</strong> maximum après la notification de désignation de l’OSE. La loi prévoit ainsi différentes étapes et échéances précises :</p>
<p>&nbsp;</p>
<figure id="post-13080 media-13080" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13080 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-1.png" alt="" width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-1.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-1-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-1-768x432.png 768w" sizes="auto, (max-width: 1280px) 100vw, 1280px" /></figure>
<p style="text-align: justify;"><strong>3 mois </strong>après la désignation, l’OSE doit fournir :</p>
<ul style="text-align: justify;">
<li>Une description détaillée des systèmes d’information dont ses services essentiels sont tributaires. <strong>La toute première chose à faire est donc de délimiter le périmètre des services essentiels au niveau business et IT, </strong>(Loi 2019-04-07/15. Art.16)</li>
<li>Un point de contact (Loi 2019-04-07/15. Art.23)</li>
</ul>
<p style="text-align: justify;"><strong>Au plus tard 12 mois</strong> après la notification de désignation<strong> : l’OSE initie une Politique de Sécurité Informatique (PSI) </strong>(rt.21) et réalise un premier audit interne sous 3 mois.</p>
<p style="text-align: justify;"><strong>24 mois après le premier audit interne </strong>(soit environ 3 ans après la notification de désignation), c’est le grand jour <strong>: un audit externe</strong> doit être conduit en vue de l’obtention de la certification ISO 27001.</p>
<p>&nbsp;</p>
<figure id="post-13082 media-13082" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13082 size-medium" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-2-357x191.png" alt="" width="357" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-2-357x191.png 357w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-2-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-2-768x411.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-2.png 940w" sizes="auto, (max-width: 357px) 100vw, 357px" /></figure>
<p>&nbsp;</p>
<h2>Comment se déroule une mise en conformité ISO 27001 ?</h2>
<p style="text-align: justify;">Comme tout système de management, le SMSI doit garantir l’application de la <strong>méthode <em>PDCA</em></strong><em> « Plan-Do-Check-Act »,</em> aussi appelée « Roue de Deming », pour assurer l’amélioration continue des performances. <strong>6 activités fondamentales</strong> se dégagent de la norme ISO 27001 :</p>
<figure id="post-13084 media-13084" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13084 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-3.png" alt="" width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-3.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-3-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-3-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-3-768x432.png 768w" sizes="auto, (max-width: 1280px) 100vw, 1280px" /></figure>
<p style="text-align: justify;">De manière pragmatique, la norme ISO 27001 requiert des livrables et des validations à plusieurs étapes clefs du processus de mise en conformité. Ci-dessous, nous vous proposons une <strong>chronologie des actions à réaliser </strong>avec les livrables associés, ainsi qu’une estimation du temps nécessaire pour chaque étape du parcours de mise en conformité.</p>
<p>&nbsp;</p>
<figure id="post-13086 media-13086" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13086 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-4.png" alt="" width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-4.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-4-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-4-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-4-768x432.png 768w" sizes="auto, (max-width: 1280px) 100vw, 1280px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">Plus précisément, les étapes se déroulent comme suit :</p>
<p style="text-align: justify;"><strong>1 &#8211; Définition du périmètre</strong> (sous quelques semaines) : c’est la première étape clef pour déterminer le domaine d’application sur lequel les exigences de la norme vont porter. L’étendue du service essentiel est alors définie d’un point de vue business et IT, détaillant les activités, les équipes et les systèmes concernés.</p>
<p style="text-align: justify;"><strong>2 &#8211; Phase de cadrage du SMSI (entre 2 et 6 mois) :</strong></p>
<ul style="text-align: justify;">
<li><strong>2.1 &#8211; Réaliser le bilan de conformité </strong>en comparant, sur le périmètre identifié, les pratiques réalisées aux exigences des normes ISO 27001 et ISO 27002 afin de relever les écarts. Le résultat de cette étape donne à la fois <strong>le niveau global de maturité de sécurité du périmètre </strong>et <strong>la feuille de route de mise en conformité</strong> <strong>par volet sécurité.</strong></li>
<li><strong>2.2 &#8211; Conduire l’analyse de risques. </strong>Cette étape se concrétise en trois actions.</li>
<li><strong>A &#8211; Définir la méthodologie de l’analyse de risques</strong> (si celle-ci n’existe pas). Afin de pouvoir piloter les risques dans la durée, elle doit être reproductible (mise à jour annuelle et en cas de changement majeur sur le périmètre). La méthodologie définit des échelles de probabilité, d’impact, et des seuils d’acceptation des risques en fonction des enjeux business et IT présents sur le périmètre du service essentiel.</li>
<li><strong>B &#8211; Conduire la 1ère analyse de risques </strong>sur le périmètre du service essentiel. Sur la base d’entretiens avec des interlocuteurs business et IT, l’analyse permet à la fois d’identifier les enjeux, les menaces et les vulnérabilités pour déterminer les risques du périmètre et permettre la définition du plan de traitement des risques.</li>
<li><strong>C &#8211; Déterminer le Plan de Traitements des Risques (PTR)</strong> destiné à organiser l’implémentation des mesures de sécurité. En collaboration avec l’équipe sécurité, les propriétaires de risques sont identifiés et doivent, pour chaque risque, décider du traitement (réduction, transfert ou acceptation) et valider le plan d’action associé. L’ensemble de ces mesures identifiées constitue le Plan de Traitement des Risques (PTR), établissant les traitements prioritaires à réaliser, en estimant notamment les ressources nécessaires et le planning de mise en oeuvre. Après validation des actions du PTR, le niveau de risques résiduels est alors complété dans l’analyse de risques.</li>
<li><strong>2.3 &#8211; Valider le périmètre de certification. </strong>Cette étape met fin à la phase de cadrage et se concrétise par deux livrables : <strong>un descriptif précis du service essentiel </strong>du point de vue business et IT et la <strong>déclaration d’applicabilité (DdA)</strong>. La DdA<strong> </strong>correspond à la liste des mesures de sécurité de la norme ISO 27002 retenues pour répondre aux besoins de mise en conformité du SMSI selon les enjeux et les risques identifiés. Pour les mesures non retenues, l’OSE doit justifier l’exclusion de ces mesures. La DdA sert par la suite de référentiel pour les audits.</li>
</ul>
<p style="text-align: justify;"><strong>3 &#8211; Phase d’implémentation (entre 9 mois et 2 ans selon le périmètre défini et le niveau de maturité de sécurité existant)</strong></p>
<ul style="text-align: justify;">
<li><strong>3.1 &#8211; Définir la PSI (Politique de Sécurité des Systèmes et des Réseaux d’Information). </strong>Ce document a deux fonctions : il sert à la fois à lister les grands objectifs de sécurité de l’information établis par l’organisation sur un périmètre donné ainsi que les mesures à mettre en place pour les réaliser, mais il fait aussi office de preuve d’engagement de l’entreprise à satisfaire les exigences de la norme et à œuvrer pour l’amélioration continue du SMSI. Ce document, une fois émis, doit être disponible et diffusé au sein de l’organisation et doit également être mis à disposition de toutes les parties prenantes.</li>
<li><strong>3.2 &#8211; Définir, documenter et mettre en œuvre</strong> <strong>les processus clefs </strong>ISO 27001 : gestion des risques, gestion de l’exploitation, gestion des incidents, communication et sensibilisation, gestion du référentiel documentaire, gestion de l’amélioration continue, etc. Des pratiques à définir avec une attention particulière à les intégrer dans le contexte existant pour une meilleure appropriation par les équipes.</li>
<li>3.3 &#8211; Mettre en œuvre <strong>les chantiers sécurité</strong> selon le PTR</li>
<li>3.4 &#8211; Conduire un premier <strong>cycle de contrôle</strong>, à savoir : suivre les indicateurs de performance dans un <strong>tableau de bord</strong> et mesurer l&#8217;atteinte des objectifs de sécurité, réaliser des <strong>audits internes</strong> sur les périmètres à forts enjeux afin d&#8217;identifier les écarts entre les pratiques et les exigences de la norme et du référentiel du SMSI.<strong> </strong>Enfin, assurer la ou les premières <strong>revues de direction</strong> pour présenter les résultats du SMSI, valider les orientations et prendre les décisions pour traiter les non-conformités et opportunités d&#8217;amélioration continue (agenda prévu par la norme)</li>
<li><strong>3.5 &#8211; Piloter l’amélioration continue du </strong>SMSI jusqu’à l’audit externe : au fur et à mesure des incidents, des résultats du tableau de bord et de ceux des audits internes, l’OSE identifie les <strong>non-conformités résiduelles et détecte les opportunités d’amélioration continue</strong> à faire valider par l’équipe SMSI</li>
</ul>
<p style="text-align: justify;"><strong>4 &#8211; Audit externe : </strong>c’est l’évaluation décisive pour l’obtention de la certification. Cette étape se décompose de façon prévisible en 3 actions : <strong>préparer les équipes </strong>à l’audit externe, <strong>participer à l’audit externe et… obtenir la certification !</strong></p>
<p style="text-align: justify;">L’audit externe est mené par un organisme de certification qui examine, sur la base des référentiels de la <strong>loi NIS belge (Loi 2019-04-07/15),</strong> <strong>de la norme ISO 27001</strong>, de la <strong>PSI</strong> et de la <strong>DdA </strong>validée par l’OSE,<strong> </strong>que les pratiques et la documentation sont bien conformes aux exigences indiquées et effectivement appliquées selon le principe de l&#8217;amélioration continue des systèmes de management.</p>
<p style="text-align: justify;">Vous en savez désormais plus sur la Loi NIS belge et la norme ISO 27001, on espère que vous vous sentez plus armé pour mettre en oeuvre votre SMSI. Dans un prochain article, vous découvrirez <strong>quelques conseils issus de nos retours d&#8217;expérience pour réussir votre certification ISO 27001</strong> <strong>et la maintenir </strong>dans la durée.</p>
<p style="text-align: justify;">
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/ose-belges-comment-reussir-votre-mise-en-conformite-nis-et-obtenir-votre-certification-iso-27001/">OSE belges : comment réussir votre mise en conformité NIS et obtenir votre certification ISO 27001 ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
