<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Swann Lassiva, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/swann-lassiva/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/swann-lassiva/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 07 Feb 2023 11:36:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Swann Lassiva, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/swann-lassiva/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Enabling a paradigm shift in cyber crisis management preparedness</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/#respond</comments>
		
		<dc:creator><![CDATA[Swann Lassiva]]></dc:creator>
		<pubDate>Tue, 07 Feb 2023 11:30:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19625</guid>

					<description><![CDATA[<p>Preparing for crisis management is now necessary for most companies and large organizations. Conscious of the risk or driven by regulations (the DORA regulation is a good example), crisis exercises and simulations have become an unmissable annual event.   Even if...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/">Enabling a paradigm shift in cyber crisis management preparedness</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">Preparing for crisis management is now necessary for most companies and large organizations. Conscious of the risk or driven by regulations (the DORA regulation is a good example), crisis exercises and simulations have become an unmissable annual event. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Even if the depth and complexity of these exercises vary, the capabilities tested are often the same. They almost always entail knowing how to take on roles, assimilate a strong flow of information (stimuli), and understand a high-stakes, high-intensity situation. These exercises train coordination and impact assessment, but they cannot be considered an end in themselves. Resolving a crisis is not limited to the famous: &#8220;isolate, cut, communicate, we&#8217;re out of the woods&#8221;. We are calling for a paradigm shift in the preparation of cyber crisis management.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">Shift the focus from information management to feasibility</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Most crisis exercises used today test the players&#8217; ability to manage and synthesize the flow of information. However, this is not where the quality of crisis management is concentrated. Some might even say that a decision-making unit should not be in a situation where it is erratically and incessantly solicited by its stakeholders. A decision-making unit must be put in a position to decide. To do so, it must respect a healthy work rhythm in cooperation with other more operational bodies.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">These exercises too often lead players, who are sucked into the time-consuming management of information, to take misleading operational sides. They make assumptions about what they can do and when &#8211; the famous &#8220;isolate, cut, communicate, we&#8217;re out of the woods.” These exercises give decision-making teams the impression that they are ready to cope when in fact they have limited their preparation to the ability to understand and coordinate events. This is a necessary step, but not sufficient. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The key word for a 2023 preparedness strategy? Feasibility. Notably, though, the feasibility of all the steps of crisis management is based on a wider spectrum than just information management. This feasibility must be measurable, specific, and enabled by documentation, equipment, simulation, and sequencing of these capabilities.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">Preparing across the spectrum: from threat detection to reconstruction</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Training to manage a crisis involves above all taking into account the complete chronology of crisis management. We can summarize this chronology in eight major steps:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<ol style="text-align: justify;">
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Detect relevant threats and have the capacity to investigate them </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Mobilize experts and decision-makers to react</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Survive during the first peak by guaranteeing business continuity capabilities </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Evaluate the impact, its ramifications, and its foreseeable evolutions </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Contain the threat and understand the impact of isolation </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Coordinate your strengths and those of your ecosystem </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Communicate with internal and external stakeholders </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Restore and rebuild what can be restored and built when it can be restored and built</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
</ol>
<h3 style="text-align: left;"><b><span data-contrast="auto">Also, prepare the tools: I design, I use</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">A relevant preparedness strategy must encompass each of these eight steps with the keyword of feasibility. It requires answering the question: will we really be able to carry out these actions when we need to?</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-19599" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN.jpg" alt="" width="1560" height="1078" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN.jpg 1560w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-768x531.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-1536x1061.jpg 1536w" sizes="(max-width: 1560px) 100vw, 1560px" /></p>
<p style="text-align: justify;"><span data-contrast="auto">The answer to this capability question is based on three aspects: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<ol>
<li style="text-align: justify;"><span data-contrast="auto">Ensuring the formalization of brief, up-to-date and known processes (e.g.: have a flow matrix indicating how to isolate, the timeframe, and the operational consequences) </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Equipping, training, and empowering the teams in charge of these actions (e.g.: having a discussion on “license to kill” and technically enabling a “red button” on relevant perimeters) </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Training the teams concerned specifically through role-playing exercises and specific simulations of the deployment of these capabilities (e.g.: test the decision-making process leading to the use of this “red button”, then technically test the proper functioning of the red button)</span></li>
</ol>
<p>Thus, while some may limit themselves exclusively to the latter (simulation), it is essential to design one&#8217;s preparation with more hindsight and to begin with a real effort to build capacity. The exercise should be a milestone for verifying, adjusting, and promoting capabilities. In the worst case, it can be a deadline for preparing the capability or even serve as an opportunity to build said capability during the session (e.g.: reconstruction chronology, identification of technical interdependencies, etc.).<span style="font-size: revert; text-align: justify; color: initial;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">Overcome opportunistic logic and practice the capabilities&#8217; sequencing</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Currently, the main drivers of complexity are the increase in duration, intensity and the number of actors involved. Here again, we call for a paradigm shift.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">First, we call for a culture of preparation based on the eight pillars detailed above. This entails the need to provide tools and formalize the capabilities to do and train these capabilities throughout the year &#8211; without necessarily making them an event in a big exercise (e.g.: ComEx workshop on the first 10 actions to launch in case of a cyber crash, testing the isolation of backups or the restoration of workstations). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In addition, employing vertical training logic (e.g., enable then simulate), it is important to train the ability to sequence the different capabilities quickly and efficiently. Thus, it is advisable to propose larger exercises, common to the business, forensic and decision-making teams, to orchestrate their different simulations in a single exercise. In training, for example, the detection capacity should be tested with a Purple Team, and then the mobilization capacity of the crisis system with a surprise mobilization using the alternative tools provided. A second example: work on the coordination capacity of the numerous crisis cells over a long period of time and then producing a communication message for all its stakeholders (internal and external).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p><img decoding="async" class="aligncenter size-full wp-image-19601" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN.jpg" alt="" width="1557" height="1077" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN.jpg 1557w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-768x531.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-1536x1062.jpg 1536w" sizes="(max-width: 1557px) 100vw, 1557px" /></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">A long-term commitment</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">To be relevant, this approach must be supported by strategic, global, multi-year thinking. Since it is more ambitious and involves more stakeholders (SOC, RPCA, Resilience, Infra, CISO, ComEx, Third Parties, &#8230;), it can gain legitimacy through a prior empirical evaluation of the means:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<ol style="text-align: justify;">
<li data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Assess the current state of your readiness by taking a feasibility-centric approach to the eight pillars. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Establish a maturity target and a roadmap that you will be able to report on empirically over time.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Finally, share with your management teams a more robust view of your crisis management maturity. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
</ol>
<p style="text-align: justify;"><span data-contrast="auto">This type of approach, more empirical and personalized, will not only allow you to identify capacity gaps but also to truly train for the actions that will be essential at the worst moment.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/">Enabling a paradigm shift in cyber crisis management preparedness</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>EBIOS (2010) est mort, vive EBIOS (RM) ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/01/ebios-2010-est-mort-vive-ebios-rm/</link>
		
		<dc:creator><![CDATA[Swann Lassiva]]></dc:creator>
		<pubDate>Wed, 23 Jan 2019 18:12:04 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[analyse de risques]]></category>
		<category><![CDATA[ANSSI]]></category>
		<category><![CDATA[EBIOS]]></category>
		<category><![CDATA[EBIOS RM]]></category>
		<category><![CDATA[EBIOS RM/homologation]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11577/</guid>

					<description><![CDATA[<p>Résultat d’un travail d’envergure porté durant deux ans par l’ANSSI et le Club EBIOS, EBIOS Risk Manager (EBIOS RM) est la nouvelle déclinaison de la méthodologie d’analyse de risque EBIOS. Bien que les principes fondamentaux d’identification des enjeux, des risques...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/01/ebios-2010-est-mort-vive-ebios-rm/">EBIOS (2010) est mort, vive EBIOS (RM) ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Résultat d’un travail d’envergure porté durant deux ans par l’ANSSI et le Club EBIOS, <strong>EBIOS Risk Manager</strong> (EBIOS RM) est la nouvelle déclinaison de la méthodologie d’analyse de risque EBIOS.</p>
<p>Bien que les principes fondamentaux d’identification des enjeux, des risques et des actions de remédiation demeurent, la méthode s’illustre par son appel à des <strong>scénarios d’attaque complexes</strong> <strong>tirant partie de vulnérabilités multiples,</strong> à la manière d’attaques réelles comme celle contre les systèmes de connexion à SWIFT de la Banque Centrale du Bangladesh en 2016 ou contre Sony Pictures en 2014&#8230; Autre évolution majeure, l’apparition d’une <strong>analyse approfondie des attaquants potentiels, de l’écosystème et des parties prenantes</strong> du périmètre étudié.</p>
<p>Ce changement de posture permet à EBIOS RM de répondre spécifiquement aux problématiques posées par des<strong> attaquants toujours plus professionnalisés </strong>qui étudieront méthodiquement les vulnérabilités d’une cible ainsi que l’ensemble de son écosystème pour parvenir à leurs fins. Elle vient ainsi remplir une zone de vide dans l&#8217;espace des méthodologies d’analyse de risques.</p>
<p>Néanmoins, malgré cette approche réellement innovante et comme nous allons l’étayer ci-dessous, EBIOS RM ne doit<strong> pas forcément être considérée comme la nouvelle démarche globale</strong> d’analyse des risques mais plutôt comme une <strong>nouvelle corde à l’arc</strong> méthodologique du RSSI pour traiter les scénarios d’attaque les plus complexes.</p>
<p>S’appuyant sur nos premiers retours d’expérience de l’application concrète de cette méthode, nous présenterons en détail les évolutions qu’elle apporte ainsi que leurs implications sur la gouvernance plus générale des risques SSI.</p>
<h1>EBIOS RM, une nouvelle méthodologie pour mieux appréhender les risques complexes de cybersécurité<code></code></h1>
<p>Depuis bientôt 10 ans, EBIOS 2010 propose une méthode centrée sur la notion de <strong>menaces unitaires</strong> tirant partie de <strong>vulnérabilités</strong> et de prévention de leurs <strong>impacts sur des processus métiers</strong>. Cette méthode, qui remettait à l’époque le métier au centre de l’analyse de risques, n’est cependant <strong>pas conçue pour </strong>identifier et traiter<strong> des menaces complexes. </strong>Ces menaces, composées de rebonds de l’attaquant d’une vulnérabilité à une autre pour atteindre ses fins, constituent pourtant aujourd’hui une part majeure de l’univers des risques SSI et ont été mises <strong>à l’ordre du jour de nombreux comités exécutifs</strong> à la suite des dernières attaques majeures comme NotPetya ou WannaCry.</p>
<p>EBIOS RM vise à compléter ce manque par une approche intégrant dans un premier temps de l’étude poussée<strong> des intentions des attaquants</strong> potentiels, puis la prise en compte formelle de <strong>l’écosystème</strong> et enfin l’identification de <strong>scénarios d’attaque complexes de type <em>kill chain</em></strong>. L’objectif final de cette étude n’est plus l’alignement des mesures de sécurité à des failles unitaires comme pour EBIOS 2010 mais bien la capacité à maîtriser des risques aux facettes multiples.</p>
<h1 style="text-align: left;">En préalable, mener un travail préparatoire concernant les vulnérabilités</h1>
<p>EBIOS RM propose dans un premier temps la mise place d’une étude structurée du niveau de sécurité du périmètre analysé par une revue de conformité. Cette vérification permet d’identifier un premier panel de vulnérabilités, <strong>comme le ferait un attaquant</strong> en testant par exemple la version des infrastructures ou les vulnérabilités de l’OWASP.</p>
<p>Contrairement à ce qui est proposé dans la méthode EBIOS 2010, la principale finalité de cette approche n’est pas de remédier à des vulnérabilités unitaires mais bien d’alimenter la définition des scénarios d’attaque complexes en identifiant les potentiels <strong>points de rebond</strong> de l’attaquant.</p>
<h1>Ensuite, mieux prendre en compte l’écosystème et les sources d’attaque</h1>
<p>Par ailleurs, afin d’adapter l’analyse des risques à la réalité des SI contemporains et de l’univers de menace, EBIOS RM intègre une innovation majeure sous la forme de la <strong>revue systématique de l’écosystème</strong> du périmètre étudié, depuis les <strong>tiers de confiance</strong> connectés à celui-ci jusqu’aux <strong>tiers présumés hostiles</strong> tels que des concurrents, des états voire des activistes.</p>
<p>L’étude des tiers de confiance met en lumière leurs interactions avec le périmètre étudié, <strong>trop souvent acquises comme sûres</strong>, qui constituent un vecteur d’attaque idéal pour un attaquant contournant ainsi les défenses périmétriques voire les mesures de gestion des accès internes.</p>
<p>L’étude des tiers hostiles place quant à elle la notion <strong>d’intentionnalité de la malveillance </strong>au cœur de l’étude. EBIOS RM propose donc de les identifier précisément et d’analyser les objectifs possiblement visés. Ce changement d’angle de vue sert de base au développement de scénarios d’attaque complexes dans la suite de la démarche.</p>
<p>Cette nouvelle approche vise notamment à faire face aux attaques par <em>water-holing</em> ou encore des conséquences de la compromission d’un SI tiers comme les fuites de données de l’enseigne américaine Target en 2013.</p>
<h1>Enfin, un travail itératif de construction des scénarios d’attaque</h1>
<p>Sur la base de cette connaissance approfondie du contexte, la démarche EBIOS RM vise à réaliser une <strong>étude préliminaire et plus fonctionnelle</strong> des évènements pouvant survenir sous la forme de scénarios stratégiques, puis un <strong>zoom plus technique</strong> sous la forme de scénarios opérationnels détaillés. L’objectif est que ces deux visions s’alimentent tout au long de l’étude dans une <strong>réflexion itérative</strong>.</p>
<p>EBIOS RM demande tout d’abord de définir de 3 à 5 scénarios stratégiques combinant source d’attaque, objectif visé et principaux moyens utilisés pour atteindre cet objectif. Cette <strong>vision de haut niveau et aux aspects techniques très limités</strong>, atout clef pour présenter les risques cyber <strong>aux métiers voire aux instances dirigeantes </strong>d’une organisation, permet également de préciser le périmètre de la réflexion plus technique qui sera réalisée au travers de 10 à 15 scénarios opérationnels.</p>
<p>Ces <strong>scénarios opérationnels</strong> racontent un fil détaillé d’évènements qui, combinés, mènent à un impact majeur. EBIOS RM structure ce cheminement au travers de quatre phases. Tout d’abord, la <strong>prise de connaissance</strong> par l’attaquant du SI ciblé, de son fonctionnement et de ses acteurs. Ensuite, la phase <strong>d’entrée </strong>dans ce SI au travers d’actions comme le phishing ou l’exploitation d’une <em>backdoor</em>. Puis vient la phase de <strong>recherche</strong> des données ou du SI critique que l’attaquant souhaite compromettre. Enfin, c’est la phase <strong>d’exploitation</strong> de cette cible via par exemple l’exfiltration de données ou l’implantation d’une bombe logique.</p>
<p>Chaque scénario d’attaque opérationnel aura donc <strong>sa propre histoire à raconter, sa propre <em>kill chain</em></strong><em>,</em> dont la vraisemblance sera déterminée. Cette spécificité est une des forces de l’étude, facilitant sa restitution, mais lui permettant également <strong>d’alimenter la réflexion d’un SOC</strong> concernant la définition de scénarios de corrélation à implémenter dans un SIEM.</p>
<p>Cette hauteur d’analyse en fait d’ailleurs un outil de choix pour l’étude des risques des périmètres les plus critiques d’une entreprise, comme par exemple les SI d’importance vitale.</p>
<h1>Un outil ambitieux dont il faut cadrer l’utilisation</h1>
<p>EBIOS RM présente des atouts séduisants par la prise en compte des motivations et méthodes des attaquants, de l’étude approfondie des tiers de confiance comme potentiels vecteurs d’attaque ou encore par sa capacité à produire des scénarios d’attaques complexes mais capables de convaincre des publics non-initiés.</p>
<p>L’une des principales qualités d’EBIOS RM, imposer réflexion et créativité pour définir les scénarios stratégiques et opérationnels pertinents, a néanmoins un revers notable : EBIOS RM ne pourra ainsi pas, exception faite de l’étude du socle et des acteurs menaçants, <strong>faire l’objet d’une industrialisation poussée</strong> des outils associés <strong>sans craindre</strong> une perte de créativité et donc <strong>une perte de qualité</strong> dans ses résultats. Cette logique s’écarte donc de celle en vigueur pour EBIOS 2010 qui rendait par exemple possible une revue exhaustive des menaces, permise par la complexité très souvent limitée de celles-ci.</p>
<p>En l’absence de cadre largement outillé et afin d’éviter que la subjectivité des participants n’y fasse son lit, EBIOS RM va ainsi exiger <strong>de son pilote un éventail de compétences qui reste rare</strong> sur le marché : des <strong>connaissances techniques pointues et orientées test d’intrusion </strong>pour déterminer ce que serait capable de réaliser un attaquant selon son niveau d’expertise, de la <strong>créativité,</strong> une <strong>capacité au <em>story telling</em>, à la synthèse et à la pédagogie</strong>, afin de définir des scénarios d’attaques qui auront à la fois <strong>suffisamment d’impact et de pertinence</strong> pour convaincre à la fois les équipes métiers et techniques tout en illustrant avec justesse et moins de quinze scénarios opérationnels <strong>toutes les facettes</strong> remarquables de la situation étudiée.</p>
<p>Ces différentes qualités renforceront par ailleurs la <strong>légitimité</strong> du pilote de l’étude, indispensable <strong>pour animer et recadrer efficacement</strong> les différents groupes de travail demandés par la méthodologie, afin d’éviter les discussions sans fin qu’elle peut risquer d’entraîner par ses aspects subjectifs. Il faut en outre garder à l’esprit que par son aspect <strong>itératif</strong> et les nombreux groupes de travail qu’elle implique, EBIOS RM sera une démarche <strong>significativement plus coûteuse en temps</strong> qu’EBIOS 2010. De plus, ses résultats seront <strong>difficilement réutilisables d’une étude à l’autre</strong>, en cela qu’elle se concentre justement sur les spécificités des périmètres étudiés.</p>
<h1>Les sources accidentelles écartées</h1>
<p>Dernier point d’attention, EBIOS RM, en plaçant l’intentionnalité au cœur de sa démarche, <strong>écarte les sources accidentelles</strong>. Pourtant, celles-ci se produisent régulièrement, qu’il s’agisse d’un coup de pelleteuse, d’une corruption d’une base de données ou de l’erreur d’un administrateur. Par ailleurs, le cœur de la démarche EBIOS RM, en générant un nombre limité de scénarios opérationnels, <strong>ne vise pas à l’exhaustivité</strong> qui était une des forces d’EBIOS 2010. La réponse de la démarche à ce biais méthodologique est l’étape d’étude du socle, mais celle-ci <strong>n’est qu’une revue de conformité</strong>. Si on imagine appliquer la démarche à un périmètre existant présentant de nombreux axes d’améliorations et qu’on utilise un référentiel de conformité suffisamment exhaustif (les 42 règles de l’ANSSI ou ISO27002), on pourra se retrouver avec une liste à la Prévert des mesures correctives à mettre en œuvre, <strong>sans moyen rigoureux de les prioriser</strong>, sauf à faire appel à EBIOS 2010 qu’EBIOS RM visait à remplacer…</p>
<h1>Vers une refonte de la gouvernance de la gestion des risques</h1>
<p>EBIOS RM est donc une démarche qui nécessite un temps de mise en œuvre certain ainsi que des expertises à la disponibilité souvent déjà limitée, et dont les résultats seront difficiles à réutiliser. En tenant également compte de ses priorités méthodologiques, nous pensons préférable de <strong>concentrer</strong> l’application de cette démarche aux systèmes présentant <strong>des enjeux forts</strong> et dont le niveau de sécurité a déjà <strong>un certain niveau de maturité</strong>, par exemple parce qu’ils seront passés par l’étape EBIOS 2010. Il nous semble également préférable d’utiliser EBIOS RM <strong>pour des ensembles cohérents de SI </strong>(exemple : une voiture ou les activités marketing) afin de conserver un périmètre d’étude suffisamment important pour permettre des attaques avancées. Enfin, sur des <strong>ensembles cohérents de SI appartenant à des acteurs différents</strong>, il est possible d’appliquer la méthode jusqu’aux scénarios stratégiques afin de fixer des priorités d’étude pour les analyse de risques plus détaillées qui seront mises en œuvre par chaque entité sur ses périmètres propres. EBIOS RM sera dans ces cas d’autant plus pertinente qu’elle se concentrera uniquement sur des scénarios <strong>au plus proche des pratiques métiers</strong>.</p>
<h1>EBIOS RM, une brique dans l’offre de services d’analyse de risque</h1>
<p>L’arrivée d’EBIOS RM, démarche novatrice quoique à utiliser avec mesure, et qui finalement <strong>complète plus qu’elle ne remplace</strong> EBIOS 2010, participe donc à créer ce qu’on pourrait appeler une <strong>offre de service EBIOS</strong>. L<strong>es ressources et les compétences nombreuses qu’elle nécessite</strong> pour être mise en œuvre la réserveront ainsi à des périmètres spécifiques,<strong> fortement exposés ou porteurs d’enjeux majeurs</strong> comme par exemples les SI d’importance vitale, <strong>ayant déjà fait l’objet d’un socle de mesures d’hygiène SSI</strong>.</p>
<p>Tout ceci plaide en faveur de la mise en œuvre<strong>, en amont des projets, d’une démarche de gouvernance des risques, transverse à l’entité,</strong> qui permettra de déterminer rapidement les <strong>enjeux, l’exposition et la maturité sécurité</strong> de ses périmètres fonctionnels et applicatifs, puis de décider en fonction quelle méthodologie de sécurisation mettre en place : simple revue de conformité à un socle minimal de règles de sécurité, étude EBIOS 2010 plus ou moins approfondie ou enfin, sur les périmètres à la fois sensibles et matures, étude EBIOS RM.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/01/ebios-2010-est-mort-vive-ebios-rm/">EBIOS (2010) est mort, vive EBIOS (RM) ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybercrisis, a fully-fledged media topic</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/04/cybercrisis-media-topic/</link>
		
		<dc:creator><![CDATA[Swann Lassiva]]></dc:creator>
		<pubDate>Sat, 14 Apr 2018 11:21:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[communication]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[media]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10728/</guid>

					<description><![CDATA[<p>Although they are based on similar objectives, methods and tools, crisis management and crisis communication necessarily appropriate the specifics of the issues they deal with to be relevant and therefore effective. In the case of a crisis of cyber origin,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/04/cybercrisis-media-topic/">Cybercrisis, a fully-fledged media topic</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Although they are based on similar objectives, methods and tools, crisis management and crisis communication necessarily appropriate the specifics of the issues they deal with to be relevant and therefore effective. In the case of a crisis of cyber origin, considering its characteristics and its exposure to often large numbers of users, requires specific anticipation and preparation. The first step is understanding the expected scale of media exposure.</em></p>
<p>&nbsp;</p>
<h2>Addressing the need to know and the need for reassurance</h2>
<p>Supported by the increased number of incidents and attacks on information systems, the cybercrisis has moved into the public realm. The democratisation of its vocabulary is a clear indicator of the place that this subject takes up in the media. Data leakage, ransomware, hacktivist, DDoS, phishing, whistle-blower, these terms have left the server rooms and specialist blogs to make their way into national newspaper columns and most people’s vocabulary. The cybercrisis is no longer a mere quality incident discreetly handled in-house but has become an event that arouses the interest of a broad audience. This interest transforms the cybercrisis into a communicational crisis. However, while this theme’s new popularity is logically transposing into an increase in coverage, other elements justify a significant increase in solicitations, whether internal or external to the organisation in crisis.</p>
<p>When the cybercrisis results in data leakage, for example, it is not only the subject of the crisis that is newsworthy, but its very object. In fact, when the data leaks or is stolen, its nature arouses curiosity, whether it is personal data, a State secret or simply a private conversation. This mechanic logically generates for many audiences both the need to know the unknown, and to make sure that they are not the victim. These two primary needs of curiosity and reassurance are the essential drivers of media coverage and more generally encourage the information consumer, the stakeholder, the client to fill that need and seek to obtain this information. The same logic assumes that the source of this information, in this case the legitimate data holder, addresses these requests and communicates on the incident.</p>
<p>Whether it’s strategic events such as presidential elections or everyday private conversations on digital media that are compromised, the crisis’ media effect is magnified by the extraordinary nature of the event. This is the result of both its supposed impossibility and the confidence that the public entrusts it. The sudden rupture of the trust placed in these &#8220;institutions&#8221; of major importance, erected in good stead in a 2.0 version of Maslow’s pyramid, then generates itself the interest and the need to know, translated into an explosion of the number of requests for information to the organisation in crisis.</p>
<p>&nbsp;</p>
<figure id="post-10730 media-10730" class="align-none"><img decoding="async" class="aligncenter wp-image-10730" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1.png" alt="" width="600" height="497" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1.png 1160w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1-231x191.png 231w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1-768x636.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1-47x39.png 47w" sizes="(max-width: 600px) 100vw, 600px" /></figure>
<p style="text-align: center;"><em>Figure 1: Maslow Pyramid Example</em></p>
<p>&nbsp;</p>
<h2>Communication war between the attacker and the communicator</h2>
<p>Cybercrisis communication is thus a specific exercise given the subject it deals with, but also by the nature of the actors present. In fact, when immeasurable sums of money are stolen without warning or institutions fall under &#8220;citizens&#8221; hacktivist attacks, opinion tends to sympathise towards the attacker perceived as a modern hero, a romantic pirate or a anonymous vigilante.</p>
<p>This public figure, aware of its image and the codes of the communication world, will of course be able to play this environment. Thus, the very methods of the attackers reinforce the central place of communication in the management of cybercrises. Attacks on political, ideological and militant grounds are no longer confined to the compromise of a system but send a message whose publicity must be maximised.</p>
<p>This obvious appropriation of the activists’ specific methods is illustrated in several ways: prior warning of a DDoS, defacing a website, publication over time of proofs of a theft on social networks, dissemination of information such as exchanges of compromising private mail conversations, etc. If the attackers have learned to maximize the reputational impact of their attacks, they also use this lever to disrupt their target’s crisis management and make a noise that will buy them time once their attack is discovered. While one of crisis management’s key success factors of is regaining control of this rhythm and the publication of new elements, the cybercrisis inevitably leaves this power to a malicious third party.</p>
<p>This third party can also, if the compromise goes deeply, alter the company’s means of communication. While it tries to respond to the need to express itself urgently and widely, this can severely hinder the fluidity of its communication. Without email, how to spread a message to employees? Without social networks, how to be close to the community and answer their questions?</p>
<p>&nbsp;</p>
<h2>Restoring the trust relationship through communication</h2>
<p>Fascinated by the attackers and the magnitude of the attacks, the general public is nonetheless intransigent at a time when trust and data are the very value of a company. Intrinsically, preserving the first assumes the protection of the second. When the organisation fails to achieve this goal, crisis communication is the only one able to restore this relationship of trust on which depends the future of the relation with customers and partners, who will or will not continue to entrust their data or the management of their tools, as well as their services to an organisation.</p>
<p>This trust requirement also brings about, when it’s is broken, the search for whom to point the blame. Although the reality of the facts is much more complex, the general public will easily assume that information system attacks are made possible by exploiting a vulnerability and therefore a fault.</p>
<p>A data leak is thus not only perceived as an attack perpetuated by a malicious third party, but also as negligence in the defences of the company victim to the theft. The latter is automatically designated as responsible and its reputation is logically impacted. Even as the attackers have become professional, the attacks complexify and the absence of vulnerabilities is a myth, cyber-attacks are now a subject of crisis management and communication in their own right. Because of its potential impact on the general public’s daily life and therefore its newsworthy nature, it forces the victim, considered to be co-responsible for its loss, to express itself.</p>
<p>&nbsp;</p>
<h2>Try to Keep It Simple for Better Crisis Communication</h2>
<p>Beyond defining a clear, shared and timely strategy, managing a cybercrisis with its particular rhythm and the obstacles caused by the attackers must be accompanied by a special communication which implies a final effort: keeping it simple.</p>
<p>Confronted by a cybercrisis, like any type of crisis, communicating implies being able to translate the events and corrective actions into clear impacts and to address them in a coherent manner. Of course, the complexity of the terms and the mechanics of a cybercrisis makes this exercise tricky and is another particularity to take into account.</p>
<p>In this context, through their ability to translate the technical cause into business consequences and more generally into layman’s terms, the CISO and their team’s role is central. During business as usual as well as in times of crisis, the CISO’s mission is the responsibility for translating the facts and technical components not only into business impacts but also into understandable and convincing impacts for diverse non-expert audiences. They may also have to conceive or even bear responsibility for elements of crisis communication language in the same way that a human resources representative is exposed during a social crisis.</p>
<p>Without presupposing their exposure on a major TV channel’s news programme, information security experts’ words will be expected on social networks, on professional networks, in the specialized press or in-house. In crisis communication, everyone is responsible for everything and everyone has to be prepared for it.</p>
<p>Thus, the subject of cyber carries a media power of its own; the immediate consequence of which is the considerable increase in expectations and requests to be informed from different divisions of an organisation as well as from the public. If the impending occurrence of an information security incident involves a specific defence and continuity of operations planning, it also requires anticipation of these requests and an active preparation for this overall communication effort.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/04/cybercrisis-media-topic/">Cybercrisis, a fully-fledged media topic</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
