<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyberrisk Management &amp; Strategy - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/category/sections/cybersecurity-digital-trust/cyberrisk-management-strategy-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/category/sections/cybersecurity-digital-trust/cyberrisk-management-strategy-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 09 Apr 2026 08:51:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Cyberrisk Management &amp; Strategy - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/category/sections/cybersecurity-digital-trust/cyberrisk-management-strategy-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Securing AI Agents: Why IAM Becomes Central</title>
		<link>https://www.riskinsight-wavestone.com/en/2026/04/securing-ai-agents-why-iam-becomes-central/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/04/securing-ai-agents-why-iam-becomes-central/#respond</comments>
		
		<dc:creator><![CDATA[Mathis SIGIER]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 08:51:16 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI agents]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity and access management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29632</guid>

					<description><![CDATA[<p>The rise of AI agents is redefining enterprise security   Artificial intelligence has now become a structuring lever for companies: 70%¹ have already placed it at the heart of their strategy. So far, most deployments relied on conversational assistants capable...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/securing-ai-agents-why-iam-becomes-central/">Securing AI Agents: Why IAM Becomes Central</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: justify;">The rise of AI agents is redefining enterprise security</h2>
<p> </p>
<p style="text-align: justify;">Artificial intelligence has now become a structuring lever for companies: 70%<a href="https://www.wavestone.com/en/insight/global-ai-survey-2025-ai-adoption/" target="_blank" rel="noopener">¹</a> have already placed it at the heart of their strategy. So far, most deployments relied on conversational assistants capable of returning information—sometimes enriched with internal data—but whose interactions with the information system (IS) remained limited.</p>
<p style="text-align: justify;">A major shift is now underway with the emergence of agentic AI. Unlike simple chatbots, AI agents do not merely answer questions; they reason, decide to call tools, and trigger actions. They may send an email, schedule a meeting, update a record, initiate a transaction, or soon, carry out even more sensitive operations. Their promise in terms of automation is substantial—and so is their potential impact on the attack surface of the IS.</p>
<p style="text-align: justify;">Because once an AI system acts, central questions arise: on whose behalf is it acting, with which permissions, on what perimeter, and under whose control?</p>
<p style="text-align: justify;">Those questions are even more critical given the rapid evolution of use cases: 51%<a href="https://www.pagerduty.com/resources/ai/learn/companies-expecting-agentic-ai-roi-2025/" target="_blank" rel="noopener">²</a> of organizations have already deployed an AI agent for employees, while 59%<a href="https://cybernews.com/ai-news/ai-shadow-use-workplace-survey/" target="_blank" rel="noopener">³</a> of workers acknowledge using non‑approved AI agents. Beyond individual usage, each business unit may be tempted to deploy its own agents to fulfill local needs. This fuels a form of agentic Shadow IT, where agents multiply in a fragmented way, with heterogeneous architectures, variable controls, and frequently incomplete governance.</p>
<p style="text-align: justify;">In this context, Identity and Access Management (IAM) must return to the center of the security strategy. Every piece of data an agent can access, every resource it can modify, every action it can execute must fall under a centralized access control with, traceability, and a governance framework.</p>
<p style="text-align: justify;">This article analyzes the security of AI agents through the IAM lens—not as one brick among others, but as a structural safeguard required to frame their usage and sustainably protect the information system.</p>
<p> </p>
<h2 style="text-align: justify;">From conversational assistants to AI agents: how they interact with the IS</h2>
<p> </p>
<h3 style="text-align: justify;">How can an AI agent act on an application?</h3>
<p style="text-align: justify;">The ability of an AI agent to interact with enterprise applications relies on the emergence of new protocols, among which the Model Context Protocol (MCP) is gaining prominence. This type of protocol enables an AI agent to communicate with third‑party applications through an intermediate layer, often implemented as an MCP server.</p>
<p style="text-align: justify;">The MCP server acts as an exposure and orchestration component. It receives requests generated by the model, translates them into executable calls, and forwards them to the application’s API. To achieve this, the MCP server provides the model with tools, describing the actions it is authorized to invoke. Once the server is declared in the conversational interface or agent environment, the model can decide—based on user intent and its own reasoning—to call one or several of these tools.</p>
<p style="text-align: justify;">From a security perspective, this raises a key question: how is the end‑user authenticated, and how is this identity propagated—or not—to downstream services? In modern architectures, user authentication typically relies on OpenID Connect (OIDC), while API access authorization relies on OAuth 2.x through access tokens. The challenge for an agent is to ensure that tool invocations and API calls occur through a controlled delegation model.</p>
<p style="text-align: justify;">Is the agent acting with its own rights, with the user’s rights, or through a hybrid mechanism?</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-29634" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/IAMxIAPicture1-ENG.png" alt="Machanism of tools called by MCP server" width="624" height="358" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/IAMxIAPicture1-ENG.png 624w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/IAMxIAPicture1-ENG-333x191.png 333w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/IAMxIAPicture1-ENG-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/IAMxIAPicture1-ENG-120x70.png 120w" sizes="(max-width: 624px) 100vw, 624px" /></p>
<p style="text-align: justify;">Let’s illustrate this with a real-world use case: scheduling a meeting. The user asks: “Schedule a meeting with the team tomorrow at 10 a.m.” The AI agent interprets the request and uses the “Calendar” tool exposed by the MCP server. It sends the minimal structured request (participants, date, time, subject). The MCP server then calls the enterprise calendar API to create the event.</p>
<p style="text-align: justify;">The mechanism seems simple. In practice, it represents a major shift: the model is no longer a passive assistant but an active intermediary between human intention and technical execution.</p>
<p> </p>
<h3 style="text-align: justify;">An inherently opaque operating model</h3>
<p style="text-align: justify;">This architecture introduces an immediate security difficulty: in many cases, the integration layer only has partial visibility over the originating context. It receives a structured request but not the full initial prompt, the model’s internal reasoning, or why it selected a specific tool. The IS therefore sees an action without necessarily being able to reconstruct the chain linking user demand, agent reasoning, tool invocation, and final effect.</p>
<p style="text-align: justify;">This loss of context becomes even more problematic when the API call is made using an OAuth token: depending on the architecture, the target service may only see a technical identity (service account / application) rather than the real end‑user. This undermines attribution, abuse detection, and the ability to apply conditional policies differentiating human and agentic actions.</p>
<p style="text-align: justify;">In other words, the agent interacts with the IS in a partially opaque manner, breaking with traditional application patterns and complicating real‑time control, auditing, and accountability.</p>
<p> </p>
<h3 style="text-align: justify;">A fast‑emerging technology introducing new security challenges</h3>
<p style="text-align: justify;">AI agents introduce new use cases—and new risks—that must be addressed at the IAM level. Four challenges stand out.</p>
<p> </p>
<h4 style="text-align: justify;">Challenge 1: Inventory of AI agents</h4>
<p style="text-align: justify;">Most organizations lack a comprehensive inventory of deployed agents and the tools they connect to.</p>
<p style="text-align: justify;">This lack of visibility arises from two factors:</p>
<ul style="text-align: justify;">
<li>usage often develops outside traditional governance processes;</li>
<li>integration modalities are heterogeneous (MCP, proprietary connectors, local code execution, platform‑native features, etc.).</li>
</ul>
<p style="text-align: justify;">The issue is not only inventorying the agents themselves but understanding their entire execution chain: interface, exposed tools, target applications, accounts used, data processed, and flows generated. Without visibility, no meaningful governance is possible.</p>
<p> </p>
<h4 style="text-align: justify;">Challenge 2: Attribute and govern AI agent permissions</h4>
<p style="text-align: justify;">Traditional IAM systems often lack a native, standardized object to represent an AI agent as a fully governable non‑human identity.</p>
<p style="text-align: justify;">As a result, integration layers are registered as technical apps or service accounts. This leads to well‑known risks: excessive privileges, poor separation of duties, coarse controls, and inability to distinguish a human action from an agentic action.</p>
<p style="text-align: justify;">The risk becomes substantial as the agent may become a privileged indirect access vector into the IS.</p>
<p> </p>
<h4 style="text-align: justify;">Challenge 3: Authenticate AI agents</h4>
<p style="text-align: justify;">Authentication presents the third challenge, on two distinct levels. First, the end user must be properly authenticated to ensure that the agent is not operating without an identity. But the agent itself—or at the very least the component acting on its behalf—must also be authenticated so that specific policies, appropriate restrictions, and proportionate oversight requirements can be applied to it.</p>
<p style="text-align: justify;">This dual requirement is unprecedented in its complexity: with AI agents, the system must simultaneously manage the identity of the requester, the identity of the executing system, and the precise relationship between the two.</p>
<p> </p>
<h4 style="text-align: justify;">Challenge 4: Trace agent‑driven actions</h4>
<p style="text-align: justify;">The final challenge is that of traceability. In many current architectures, logs primarily allow us to observe the technical call sent to the target service. However, it remains difficult to reliably reconstruct:</p>
<ul style="text-align: justify;">
<li>which user originated the request;</li>
<li>which agent decided to execute it;</li>
<li>the business context;</li>
<li>the intermediate reasoning steps.</li>
</ul>
<p style="text-align: justify;">This lack of auditability undermines detection, investigation, and accountability. When a sensitive action is triggered, it must be possible to determine whether it resulted from a legitimate instruction, a misinterpretation, an autonomous deviation, an abuse of privilege, or a compromise of the input context—for example, through a prompt injection attack.</p>
<p> </p>
<h2 style="text-align: justify;">IAM as the reference framework for securing AI agents</h2>
<h3> </h3>
<h3 style="text-align: justify;">Core IAM principles remain unchanged</h3>
<p style="text-align: justify;">In light of this transformation, one point must be made clear: the fundamentals of IAM do not disappear with agent-based AI. On the contrary, they become essential once again.</p>
<p style="text-align: justify;">A well-managed information system is based on a few simple and robust principles:</p>
<ul style="text-align: justify;">
<li>centralize authentication via a reference IdP;</li>
<li>avoid generic accounts when nominative identities are possible;</li>
<li>enforce least privilege;</li>
<li>govern entitlements over time;</li>
<li>ensure robust logs;</li>
<li>clearly separate roles and execution perimeters.</li>
</ul>
<p style="text-align: justify;">AI agents do not invalidate these principles—they expose existing weaknesses and require adapting the IAM execution model to a new class of digital actors.</p>
<p> </p>
<h3 style="text-align: justify;">A four‑step security trajectory</h3>
<p> </p>
<h4>1. Inventory use cases and agents</h4>
<p style="text-align: justify;">Identify:</p>
<ul style="text-align: justify;">
<li>deployed agents,</li>
<li>environments,</li>
<li>tools,</li>
<li>target apps,</li>
<li>accounts and tokens,</li>
<li>accessible data.</li>
</ul>
<p style="text-align: justify;">This inventory exercise is not merely a secondary documentation task; it is a prerequisite for any coherent access control policy. To carry it out, commercial tools are emerging, such as Microsoft’s Agent 365 solution.</p>
<p> </p>
<h4>2. Introduce a dedicated identity type for AI agents</h4>
<p style="text-align: justify;">The second step involves recognizing AI agents as a specific category of non-human entities. This classification is essential because it enables the implementation of differentiated policies: prohibitions on certain actions, restrictions to specific areas, requirements for prior approval, enhanced monitoring, or conditional restrictions.</p>
<p style="text-align: justify;">This distinction is fundamental. A traditional application does not have the same level of autonomy, nor the same risk profile, as an AI agent capable of selecting a tool on its own, chaining together multiple actions, or reacting to an ambiguous context. IAM must therefore be able to determine not only who is acting, but also how the system is acting.</p>
<p style="text-align: justify;">For example, a user may have the right to send an email or create a change request. This does not mean that an agent can execute this action without safeguards. Depending on the sensitivity of the process, a dedicated policy may require human validation, a restricted scope, or a complete prohibition.</p>
<p> </p>
<h4 style="text-align: justify;">3. Link authentication and rights to a central IdP + the end‑user</h4>
<p style="text-align: justify;">The third step involves bringing authentication under the purview of a central identity provider, so that access rights are managed consistently. The goal is twofold: to prevent the uncontrolled use of over-privileged technical accounts, and to ensure that the agent operates, as much as possible, within the limits of the permissions held by the user who initiated the request.</p>
<p style="text-align: justify;">This does not mean that the agent must be transparent from a security standpoint. On the contrary, the challenge is to apply a logic such as: “even if the user has the right, the agent does not necessarily have the right to do so alone, in any context, and without additional oversight.</p>
<p> </p>
<h4 style="text-align: justify;">4. Introduce human approval for certain agent‑initiated actions</h4>
<p style="text-align: justify;">Securing AI agents cannot rely solely on authentication and authorization. It also requires defining the acceptable level of autonomy based on the criticality of the actions in question.</p>
<p style="text-align: justify;">Three models are typically distinguished</p>
<p style="text-align: justify;"><strong>Human</strong><strong>‑in</strong><strong>‑the</strong><strong>‑loop</strong></p>
<p style="text-align: justify;">This is the most secure mode. The agent prepares the action, but its execution is contingent upon explicit validation. This approach should be prioritized for sensitive operations: financial transactions, changes to permissions, external communications on behalf of the company, access to sensitive data, actions with irreversible consequences, etc.</p>
<p style="text-align: justify;">Its key advantage is that final validation is handled by a control interface independent of the agent’s reasoning. Even if the model has been influenced, manipulated, or simply deceived, the user or operator retains control over the decision.</p>
<p style="text-align: justify;"><strong>Human</strong><strong>‑over</strong><strong>‑the</strong><strong>‑loop</strong></p>
<p style="text-align: justify;">In this model, humans do not approve each action individually but oversee the execution and retain the ability to interrupt the process immediately. This approach may be suitable for frequent, well-defined, low-risk processes, provided that monitoring is effective, and the shutdown mechanism is fully operational.</p>
<p style="text-align: justify;"><strong>Human</strong><strong>‑out</strong><strong>‑of</strong><strong>‑the</strong><strong>‑loop</strong></p>
<p style="text-align: justify;">Here, the agent operates autonomously without immediate human intervention. This level of autonomy should only be considered for very low-criticality use cases, in strictly bounded environments with limited scopes of action, robust compensatory control mechanisms, and explicit tolerance for residual risk.</p>
<p style="text-align: justify;">For a CISO, the logic is simple: the greater the business, regulatory, or security impact, the closer the human oversight must be to the execution.</p>
<p> </p>
<h2 style="text-align: justify;">A clear target state—still constrained by several limitations</h2>
<p> </p>
<h3 style="text-align: justify;">Functional obstacles</h3>
<p style="text-align: justify;">The target security model can be clearly defined. Its implementation, however, encounters several major functional obstacles.</p>
<p style="text-align: justify;">The first obstacle concerns the lack of granular authorization mechanisms. Today, a user may want to ask an agent to perform a precise action on a precise resource. Yet available mechanisms often require permissions that are far broader than necessary. Processing an email may require opening access to an entire mailbox; scheduling a meeting may imply extended access to the user’s full calendar; interacting with a repository may require read or write permissions far beyond the expressed need. This mismatch is particularly problematic in an agentic context. Because an AI is inherently non‑deterministic in the way it selects and chains actions, overly broad access rights mechanically become a disproportionate risk. Secure adoption therefore requires moving toward finer‑grained, contextualized, temporary authorization mechanisms, proportionate to the specific request being made.</p>
<p style="text-align: justify;">The second obstacle concerns authentication and identity propagation. In many cases, current architectures still rely on technical accounts, shared secrets, or authentication mechanisms that fall short of mature IAM governance standards. The target state, in contrast, requires that each action be explicitly linked to (i) the user originating the request, and (ii) the fact that this action was executed by an agent — which implies distinguishing between the identity of the initiator and the identity of the executing system, while documenting the delegation relationship between the two. In practice, this refers to controlled delegation mechanisms such as OAuth “On-Behalf-Of (OBO)” flows: the agent (or its orchestration layer) calls an API while carrying an authorization derived from the user, but with additional constraints (limited scope, reduced duration, contextual checks, conditional access policies). The objective is to reduce reliance on over‑privileged technical accounts while preserving a usable chain of accountability. At this stage, however, the market does not yet offer a fully homogeneous and interoperable model that covers authentication, fine‑grained authorization, traceability, and agent governance at scale.</p>
<p style="text-align: justify;">A final foundational obstacle is traceability: every action must be linked explicitly to a clear and intelligible chain of responsibility. Without this capability, there can be no robust auditability, no effective control, and no defendable governance in front of business stakeholders, auditors, or regulators. And this obviously comes at a cost for SIEM platforms…</p>
<p> </p>
<h3 style="text-align: justify;">A fragmented market complicating security</h3>
<p style="text-align: justify;">From the perspective of enterprises, the difficulty is not only technical: it also relates to the overall maturity of the market. Agentic capabilities are proliferating faster than the security and governance standards needed to frame them in a consistent way. As a result, organizations must deal with heterogeneous solutions, in which identity models, audit capabilities, and control mechanisms vary significantly from one vendor to another.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-29636" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/Picture2ENG.png" alt="Responsibility in MCP actions" width="624" height="422" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/Picture2ENG.png 624w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/Picture2ENG-282x191.png 282w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/Picture2ENG-58x39.png 58w" sizes="(max-width: 624px) 100vw, 624px" /></p>
<p> </p>
<h3 style="text-align: justify;">Will MCP become the standard?</h3>
<p style="text-align: justify;">Some vendors expose their applications through MCP servers or comparable mechanisms, while others favor more closed, native integrations within their own ecosystems. In practice, there is still no fully homogeneous framework that satisfactorily covers authentication, authorization, traceability, governance, and the nomenclature of exposed capabilities.</p>
<p style="text-align: justify;">Two trajectories can be envisioned:</p>
<ul style="text-align: justify;">
<li>The first would be convergence toward a standardized foundation enabling interoperability across agents, tools, and platforms. Such evolution would facilitate large‑scale deployment, improve user experience, and enable more coherent enterprise‑wide governance.</li>
<li>The second would be persistent fragmentation. In this scenario, each vendor would continue to favor its own mechanisms, security objects, and integration models. The consequences for organizations would be significant: multiplication of blind spots, heterogeneous controls, difficulty centralizing supervision, and practical impossibility of applying a homogeneous IAM policy across the entire agentic perimeter.</li>
</ul>
<p style="text-align: justify;">In the short term, market signals point toward co‑existence: interoperability initiatives are emerging, but major vendors continue to build logically integrated ecosystems. For CISOs, this means thinking not only “tool by tool” but also in terms of the ability to govern a portfolio of agents spanning multiple vendors.</p>
<p> </p>
<h3 style="text-align: justify;">Toward enterprise AI agent registries</h3>
<p style="text-align: justify;">The rise of AI agents justifies the emergence of a new governance object: the AI agent registry. Because an agent is an autonomous system capable of triggering actions, it can no longer be treated as an invisible application component. It must be identified, qualified, assigned an owner, embedded in a lifecycle, evaluated according to its scope of action, and subjected to specific rules.</p>
<p style="text-align: justify;">Such a registry must ultimately be able to answer several fundamental questions:</p>
<ul style="text-align: justify;">
<li>Which agents exist within the organization?</li>
<li>Who is responsible for them?</li>
<li>In which environment do they operate?</li>
<li>Which tools and which data do they have access to?</li>
<li>Which authentication mechanisms do they use?</li>
<li>Which human validations are required?</li>
<li>Which logs do they produce?</li>
<li>When must they be reviewed, requalified, suspended, or retired?</li>
</ul>
<p style="text-align: justify;">Some identity providers are beginning to introduce capabilities dedicated to this new category of non‑human identities. This is an important signal. But market maturity remains early, and governance cannot be outsourced entirely to vendors. The real issue is fundamentally organizational: defining a model of responsibility, control, and security that is adapted to the growing autonomy of AI systems.</p>
<p> </p>
<h2 style="text-align: justify;">When should organizations address IAM for AI agents? Right now.</h2>
<p> </p>
<p style="text-align: justify;">The rise of AI agents marks a major evolution in the transformation of information systems. By shifting from a logic of assistance to a logic of action, these systems fundamentally reshape security concerns: the challenge is no longer limited to controlling the data an AI can access, but also the <strong>actions it can execute</strong>, the <strong>privileges it leverages</strong>, and the <strong>responsibilities it triggers</strong>.</p>
<p style="text-align: justify;">In this context, <strong>IAM becomes a structuring pillar</strong>. It provides the foundation needed to <strong>make agents visible</strong>, <strong>control their entitlements</strong>, <strong>trace their actions</strong>, and <strong>define the conditions under which their autonomy can be accepted</strong>. In other words, securing AI agents cannot rely on peripheral measures: it requires an integrated governance approach that combines identity, access control, supervision, and human validation.</p>
<p style="text-align: justify;">For organizations, the objective is not to slow down the adoption of agentic AI, but <strong>to frame it within a sustainable trust model</strong>. This means making structural decisions today: mapping use cases, integrating agents into IAM frameworks, distinguishing human and non‑human identities, adapting authorization policies, and defining safeguards proportionate to the criticality of the actions delegated.</p>
<p style="text-align: justify;">As architectures become standardized and market offerings mature, the organizations best prepared will be those that treat AI agents <strong>not as simple innovative assistants</strong>, but as <strong>new actors of the information system</strong>, subject to the same requirements of security, traceability, and governance as any other critical component.</p>
<p style="text-align: justify;">The question is therefore no longer whether AI agents will find their place in the enterprise, but <strong>under what</strong> <strong>conditions of control</strong>. For CISOs, the matter is clear: the ability to industrialize agentic AI will depend less on the performance of the models than on the <strong>robustness of the IAM and governance framework</strong> put in place to supervise them.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">If you, too, are questioning how to manage access for AI agents or wish to deepen the security of these emerging use cases, we would be delighted to connect. Feel free to reach out to share your challenges or to explore together potential approaches tailored to your context.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<ol style="text-align: justify;">
<li>Wavestone<em> &#8211; Global AI Survey 2025  &#8211; </em><a href="https://www.wavestone.com/en/insight/global-ai-survey-2025-ai-adoption/"><em>AI Adoption and Its Paradoxes: Global AI survey 2025 | Wavestone</em></a><em>)</em></li>
<li>PagerDuty (2025) <em>More than Half of Companies (51%) Already Deployed AI Agents</em>. Pager Duty, March 2025. Available at: <a href="https://www.pagerduty.com/resources/ai/learn/companies-expecting-agentic-ai-roi-2025/">2025 Agentic AI ROI Survey Results</a> (Accessed: 2 January 2026)</li>
<li>Cybernews (2025) <em>Unapproved AI Tools in the Workplace</em>. September 2025. Available at: <a href="https://cybernews.com/ai-news/ai-shadow-use-workplace-survey/">https://cybernews.com/ai-news/ai-shadow-use-workplace-survey/</a> (Accessed: 2 January 2026).</li>
</ol>




<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/securing-ai-agents-why-iam-becomes-central/">Securing AI Agents: Why IAM Becomes Central</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/04/securing-ai-agents-why-iam-becomes-central/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Resilience by design: strategic imperatives for UK General &#038; Reinsurance Insurers (2025 – 2030)</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/09/resilience-by-design-strategic-imperatives-for-uk-general-reinsurance-insurers-2025-2030/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/09/resilience-by-design-strategic-imperatives-for-uk-general-reinsurance-insurers-2025-2030/#respond</comments>
		
		<dc:creator><![CDATA[Suman Dogra Gaur]]></dc:creator>
		<pubDate>Wed, 03 Sep 2025 06:19:22 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[cyber strategy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[general insurers]]></category>
		<category><![CDATA[Operational Resilience]]></category>
		<category><![CDATA[reinsurance insurers]]></category>
		<category><![CDATA[Resilience by design]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[unified resilience approach]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=27036</guid>

					<description><![CDATA[<p>The UK insurance and reinsurance industry is navigating a period of rapid transformation, marked by regulatory reform, accelerating cyber threats, and shifting macroeconomic conditions. With a combined market valuation of £74.6 billion and forecasted earnings growth of 18% annually, the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/resilience-by-design-strategic-imperatives-for-uk-general-reinsurance-insurers-2025-2030/">Resilience by design: strategic imperatives for UK General &amp; Reinsurance Insurers (2025 – 2030)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The UK insurance and reinsurance industry is navigating a period of rapid transformation, marked by regulatory reform, accelerating cyber threats, and shifting macroeconomic conditions. With a combined market valuation of £74.6 billion and forecasted earnings growth of 18% annually, the sector remains resilient despite global volatility, reflecting strong investor sentiment and long-term growth confidence. With this, the UK regulators continue to sharpen their focus on operational resilience, urging financial institutions to fortify themselves against cyber disruption and systemic vulnerabilities.</p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-27048" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/picture1-1.png" alt="Operational resilience landscape will continue to rapidly evolve" width="692" height="370" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/picture1-1.png 692w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/picture1-1-357x191.png 357w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/picture1-1-71x39.png 71w" sizes="(max-width: 692px) 100vw, 692px" /></p>
<p style="text-align: justify;">In recent years, regulators have consistently urged insurers to adopt holistic strategies that extend far beyond traditional disaster recovery—embedding resilience throughout business operations and the entire software development lifecycle.</p>
<p style="text-align: justify;">This paper aims to offer a comprehensive perspective on resilience, bringing together operational continuity, cyber defence, and third-party risk management. It can serve as a strategic guide for CxOs, outlining how to identify the Minimum Viable Company (MVC), market insights into sector-wide impact tolerance, and anticipate the evolving landscape of regulatory and cyber resilience through 2030.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27043" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Image2.png" alt="comprehensive perspective on resilience" width="607" height="558" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Image2.png 607w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Image2-208x191.png 208w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Image2-42x39.png 42w" sizes="auto, (max-width: 607px) 100vw, 607px" /></p>
<p style="text-align: justify;"> </p>
<p> </p>
<h2><strong>Minimum Viable Company (MVC) framework</strong></h2>
<p style="text-align: justify;">The FCA’s Operational Resilience Policy Statement (PS21/3) challenges insurers to pinpoint their Important Business Services (IBS) and develop strategies for maintaining these during severe disruptions. Though MVC is not named explicitly in PS21/3 (FCA’s Policy Statement on Building Operational Resilience, published in March 2021) organizations are advised to define their “minimum operational footprint,” closely aligning with MVC principles.</p>
<p style="text-align: justify;">Think of the MVC as your organisation’s lifeline: those indispensable services, processes, technologies, and teams that maintain trust and financial stability, even when everything else must be paused.</p>
<p style="text-align: justify;">Most organizations keep their MVC lean, just 15–17% of total business activity, backed by robust lists of mission-critical applications, core infrastructure, key data, and vital third-party relationships. This isn’t just compliance: it’s about identifying a modular, scalable foundation that lets your business isolate issues, recover fast, and keep delivering during systemic risks.</p>
<p style="text-align: justify;">Informed by our extensive work with top UK and global insurance organisations, an indicative list of Core Services typically is:</p>
<table style="height: 712px; border-color: #6f1fde; width: 81.9712%; background-color: #ede4f5; border-style: solid;" width="81.9712%">
<tbody>
<tr style="height: 68px;">
<td style="height: 68px;" width="191">
<p><strong>Category</strong></p>
</td>
<td style="height: 68px;" width="417">
<p><strong>Key Services</strong></p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="191">
<p>Policyholder Protection</p>
</td>
<td style="height: 100px;" width="417">
<p>Claims processing, policy issuance, renewals, cancellations</p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="191">
<p>Financial Continuity</p>
</td>
<td style="height: 100px;" width="417">
<p>Premium collection, solvency monitoring, payment execution</p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="191">
<p>Compliance</p>
</td>
<td style="height: 100px;" width="417">
<p>AML screening, sanctions checks, conduct and transaction reporting</p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="191">
<p>Customer Engagement</p>
</td>
<td style="height: 100px;" width="417">
<p>Complaints handling, contact centre operations, digital portals</p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="191">
<p>Underwriting &amp; Risk</p>
</td>
<td style="height: 100px;" width="417">
<p>Quoting, risk analysis, reinsurance placement and management</p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="191">
<p>Third-Party Oversight</p>
</td>
<td style="height: 100px;" width="417">
<p>Broker relations, outsourced claims handling, vendor contracts</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Further examination of trends in impact tolerance, detailing standard timeframes observed and strategic rationale for core services identified within MVC.</p>
<p style="text-align: justify;"><strong>Note:</strong> The following ranges are intended as guidance, reflecting our market study and regulatory advisory. Actual tolerances may vary based on factors such as the jurisdictions involved, the organization&#8217;s risk profile, and its financial capacity.</p>
<table style="height: 776px; border-style: solid; width: 84.4971%; border-color: #7b0aab; background-color: #ede4f5;" width="84.4971%">
<tbody>
<tr style="height: 68px;">
<td style="height: 68px;" width="200">
<p><strong>Service</strong></p>
</td>
<td style="height: 68px;" width="200">
<p><strong>Tolerance Range*</strong></p>
</td>
<td style="height: 68px;" width="200">
<p><strong>Strategic Rationale</strong></p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="200">
<p>Claims Processing</p>
</td>
<td style="height: 100px;" width="200">
<p>4–6 hours</p>
</td>
<td style="height: 100px;" width="200">
<p>High customer sensitivity</p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="200">
<p>AML/Sanctions Screening</p>
</td>
<td style="height: 100px;" width="200">
<p>Real-time to ≤1 hr</p>
</td>
<td style="height: 100px;" width="200">
<p>Regulatory zero tolerance</p>
</td>
</tr>
<tr style="height: 68px;">
<td style="height: 68px;" width="200">
<p>Premium Collection</p>
</td>
<td style="height: 68px;" width="200">
<p>1–2 business days</p>
</td>
<td style="height: 68px;" width="200">
<p>Financial viability risk</p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="200">
<p>Contact Centre Operations</p>
</td>
<td style="height: 100px;" width="200">
<p>2–4 hours</p>
</td>
<td style="height: 100px;" width="200">
<p>Reputation and customer satisfaction</p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="200">
<p>Policy Issuance</p>
</td>
<td style="height: 100px;" width="200">
<p>24–48 hours</p>
</td>
<td style="height: 100px;" width="200">
<p>Tiered based on product complexity</p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="200">
<p>Reinsurance Placement</p>
</td>
<td style="height: 100px;" width="200">
<p>3–5 business days</p>
</td>
<td style="height: 100px;" width="200">
<p>Indirect impact on front-line policyholders</p>
</td>
</tr>
<tr style="height: 100px;">
<td style="height: 100px;" width="200">
<p>Broker Connectivity</p>
</td>
<td style="height: 100px;" width="200">
<p>1 business day</p>
</td>
<td style="height: 100px;" width="200">
<p>Continuity of sales and distribution</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<p> </p>
<h2><strong>Regulatory trends: 2025–2030 outlook</strong></h2>
<p style="text-align: justify;">As the insurance industry navigates evolving operational demands, it is equally crucial to anticipate the shifting regulatory landscape that will define the coming years. The following outlook highlights the major regulatory trends projected for 2025 through 2030, outlining key compliance requirements and anticipated changes that will shape the UK insurance sector’s risk management and reporting frameworks.</p>
<table style="border-style: solid; width: 89.7152%; border-color: #690aad; background-color: #ede4f5; height: 1047px;" width="632">
<tbody>
<tr>
<td width="108">
<p><strong>Timeframe</strong></p>
</td>
<td width="176">
<p><strong>Topic</strong></p>
</td>
<td width="211">
<p><strong>Expected Development</strong></p>
</td>
<td width="137">
<p><strong>Principal Regulator(s)</strong></p>
</td>
</tr>
<tr>
<td width="108">
<p>Q4 2025</p>
</td>
<td width="176">
<p>Financial Conduct Authority (FCA), Prudential Regulation Authority (PRA) Incident Reporting</p>
</td>
<td width="211">
<p>Real-time and layered disclosures mandated</p>
</td>
<td width="137">
<p>FCA, PRA</p>
</td>
</tr>
<tr>
<td width="108">
<p>2025-26</p>
</td>
<td width="176">
<p>UK Cyber Security and Resilience Bill</p>
</td>
<td width="211">
<p>Modernize the UK&#8217;s cyber security framework and strengthen regulations.</p>
</td>
<td width="137">
<p>Information Commissioner&#8217;s Office (ICO)</p>
</td>
</tr>
<tr>
<td width="108">
<p>2025–2027</p>
</td>
<td width="176">
<p>Critical Third-Party Oversight</p>
</td>
<td width="211">
<p>Prescriptive governance for cloud, data and service providers</p>
</td>
<td width="137">
<p>FCA, PRA</p>
</td>
</tr>
<tr>
<td width="108">
<p>2026</p>
</td>
<td width="176">
<p>PRA DyGIST Resilience Stress Testing</p>
</td>
<td width="211">
<p>Sector-wide stress testing for liquidity and capital</p>
</td>
<td width="137">
<p>PRA</p>
</td>
</tr>
<tr>
<td width="108">
<p>Q2 2025</p>
</td>
<td width="176">
<p>Climate Risk (SS3/19 update)</p>
</td>
<td width="211">
<p>Expanded stress testing and governance mandates</p>
</td>
<td width="137">
<p>PRA</p>
</td>
</tr>
<tr>
<td width="108">
<p>2025–2030</p>
</td>
<td width="176">
<p>Captive Regulation Reform</p>
</td>
<td width="211">
<p>Modernisation for UK-based captives under review</p>
</td>
<td width="137">
<p>PRA, FCA</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">It is important to recognise that as regulations in this area continue to develop, UK regulators such as the FCA and PRA are moving towards greater alignment with major European frameworks, including the EU Digital Operational Resilience Act (DORA) and the Network and Information Security (NIS) Directive.</p>
<p style="text-align: justify;">This alignment reflects a recognition of the interconnectedness of financial markets and critical services across borders, and the need for consistent, elevated standards of operational and cyber resilience.</p>
<p style="text-align: justify;">The FCA and PRA have issued consultations and guidance signalling their intent to integrate core DORA and NIS principles—such as enhanced third-party risk management, harmonised incident reporting obligations, and sector-wide resilience testing—into the UK’s regulatory regime. This convergence ensures that UK financial institutions, insurers, and service providers are prepared not only for domestic regulatory expectations but also for the demands of operating within a global and digitally integrated market.</p>
<p style="text-align: justify;"> </p>
<p> </p>
<h2><strong>Boardroom resilience checklist</strong></h2>
<p style="text-align: justify;">In light of these forthcoming regulatory changes and strategic reforms, it is essential for boardrooms to evaluate and reinforce their organisational resilience frameworks. The following checklist is designed to guide leadership teams in proactively assessing their preparedness, ensuring robust governance, and embedding resilience into core decision-making processes.</p>
<ul style="text-align: justify;">
<li><strong>MVC coverage:</strong> Is your Minimum Viable Company (MVC) clearly defined, mapped, and stress-tested across operations to maintain delivery of essential services</li>
<li><strong>Impact tolerance benchmarking:</strong> Have you validated realistic impact tolerances through scenario analysis, and benchmarked them against peer institutions and regulatory frameworks</li>
<li><strong>Third-Party risk visibility:</strong> Do you maintain real-time insight into key external dependencies, supported by contingency planning and contractual resilience provisions</li>
<li><strong>Integrated resilience functions:</strong> Are your operational resilience, cyber security, third-party risk, and enterprise risk teams aligned in strategy, decision-making, and board reporting to support a cohesive resilience posture</li>
<li><strong>Incident Response preparedness:</strong> Do you have robust mechanisms for multi-channel incident reporting (internal and external) and active regulator engagement, supported by rehearsed playbooks</li>
<li><strong>Cyber insurance alignment:</strong> Is your cyber insurance coverage tailored to your specific risk landscape, and tested against evolving threat scenarios across business-critical assets</li>
<li><strong>Board accountability:</strong> Have board members been trained in resilience and security oversight, and do they receive regular briefings from integrated risk functions to ensure informed governance</li>
<li><strong>Resilience culture:</strong> Is a resilience-aware culture embedded across the organization —from executive leadership to operational teams — fostering proactive risk ownership and continuous improvement</li>
<li><strong>Regulatory awareness &amp; horizon scanning</strong>: Are we tracking global and local regulatory developments (e.g. EU DORA, FCA SS1/21, SEC cyber rules), and ensuring readiness and board-level awareness of compliance obligations</li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The UK insurance and reinsurance sector is well-capitalised, digitally evolving, and strategically positioned for growth. But resilience (operational, cyber, and third-party) remains the defining factor for long-term success. </p>
<p style="text-align: justify;">By thoughtfully harmonizing operational resilience strategies across function with leading global standards, organizations can elevate their industry standing and secure enduring stakeholder confidence. This proactive approach not only ensures compliance with a rapidly evolving regulatory landscape but also fortifies the ability to mitigate cross-border risks and respond decisively to unforeseen disruptions. In a world where digital threats and supply chain vulnerabilities transcend geographic boundaries, developing internationally recognised resilience is both a regulatory imperative and a cornerstone of successful, forward-looking business strategy.</p>
<p style="text-align: justify;">In conclusion, executives must embed robust, integrated resilience frameworks for sustained growth and stability. By cultivating a culture of proactive risk management and regulatory awareness, institutions can position themselves at the forefront of operational excellence, prepared not just to withstand challenges, but to transform them into opportunities for long-term success.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-27046" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Image3-1.png" alt="Key priorities organizations to consider within 2025-2030 Operational Resilience Strategies: Innovate and automation, from recovery to value creation, resilience culture, secure foundations" width="677" height="369" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Image3-1.png 677w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Image3-1-350x191.png 350w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Image3-1-71x39.png 71w" sizes="auto, (max-width: 677px) 100vw, 677px" /></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/resilience-by-design-strategic-imperatives-for-uk-general-reinsurance-insurers-2025-2030/">Resilience by design: strategic imperatives for UK General &amp; Reinsurance Insurers (2025 – 2030)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/09/resilience-by-design-strategic-imperatives-for-uk-general-reinsurance-insurers-2025-2030/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Ahmed Amine Ghariani]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 14:17:53 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity startups radar]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[radar 2025]]></category>
		<category><![CDATA[Swiss radar]]></category>
		<category><![CDATA[Switzerland]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26402</guid>

					<description><![CDATA[<p>AI at the service of cybersecurity: a concrete step forward   Every year since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. While AI has established itself as a cross-disciplinary subject in all fields, the 2025 Radar...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/">Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: justify;">AI at the service of cybersecurity: a concrete step forward</h2>
<p> </p>
<p style="text-align: justify;">Every year since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. While AI has established itself as a cross-disciplinary subject in all fields, the 2025 Radar focuses on the <strong>use of artificial intelligence as a tool</strong>, not just as a subject to be secured, but as a <strong>technology at the very heart of the cyber response.</strong></p>
<p style="text-align: justify;">Several startups are using AI to automate, enhance or personalize their solutions:</p>
<p style="text-align: justify;"><strong>Egonym</strong> uses generative AI to anonymize faces in images and videos while preserving useful traits like age and emotion — striking a rare balance between privacy and utility.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26393" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image16.jpg" alt="egonym logo" width="155" height="53" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image16.jpg 155w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image16-71x24.jpg 71w" sizes="auto, (max-width: 155px) 100vw, 155px" /></p>
<p style="text-align: justify;"><strong>Hafnova</strong> applies real-time AI to detect, block, and report threats across critical infrastructures with high responsiveness and minimal delay.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26369" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png" alt="Hafnova logo" width="67" height="71" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2-37x39.png 37w" sizes="auto, (max-width: 67px) 100vw, 67px" /></p>
<p style="text-align: justify;"><strong>Aurigin</strong> combats deepfake-based fraud in real time using multimodal AI that simultaneously analyzes voice, image, and text to validate identities. </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26395" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image17.jpg" alt="aurigin.ai logo" width="176" height="51" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image17.jpg 176w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image17-71x21.jpg 71w" sizes="auto, (max-width: 176px) 100vw, 176px" /></p>
<p style="text-align: justify;"><strong>RedCarbon</strong> delivers autonomous AI agents capable of handling complex cybersecurity tasks such as threat detection, hunting, and compliance monitoring — significantly reducing analyst workload.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26375" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image6-e1750428148421.png" alt="REDCARBON logo" width="183" height="24" /></p>
<p style="text-align: justify;"><strong>Baited</strong> leverages AI and OSINT to generate hyper-realistic phishing simulations, enabling organizations to test and train employees under real-world conditions.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26373" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image5-e1750428603602.png" alt="baited logo" width="142" height="45" /></p>
<p style="text-align: justify;">It&#8217;s good to see AI becoming an essential defensive weapon contributing to the defense of our information systems.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Strong momentum around threat detection, response and monitoring</h2>
<p> </p>
<p style="text-align: justify;">The second strong trend this year is the emergence or reinforcement of startups specializing in <strong>intrusion detection, suspicious behavior detection, incident response</strong> and <strong>continuous supervision.</strong></p>
<p style="text-align: justify;">This segment, already well established historically, is undoubtedly gaining strength with several new entries:</p>
<p style="text-align: justify;"><strong>RedCarbon</strong>: AI agents for threat detection &amp; automated hunting.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26375" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image6-e1750428148421.png" alt="REDCARBON logo" width="175" height="23" /></p>
<p style="text-align: justify;"><strong>Swiss Security Hub</strong>: continuous monitoring of SAP systems with XDR integration.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26377" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image7-e1750428038244.png" alt="Security Hub logo" width="115" height="115" /></p>
<p style="text-align: justify;"><strong>Cyberservices</strong> : XDR platform based on the Google ecosystem.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter  wp-image-26379" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image8-e1750428222485.png" alt="Cyberservices logo" width="64" height="35" /></p>
<p style="text-align: justify;"><strong>Hafnova</strong>: real-time cyber supervision in critical sectors.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26369" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png" alt="Hafnova logo" width="67" height="71" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2-37x39.png 37w" sizes="auto, (max-width: 67px) 100vw, 67px" /></p>
<p style="text-align: justify;"><strong>Tirreno</strong>: on-prem platform for online fraud detection with user trust scoring.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter  wp-image-26383" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image10-e1750428239189.png" alt="tirreno logo" width="131" height="29" /></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">At a time when cyber-attacks continue to increase in number and complexity, <strong>preventive, contextualized and autonomous detection</strong> is and will remain key to strengthening operational resilience.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;">New ground explored: digital sovereignty and secure hardware</h2>
<p> </p>
<p style="text-align: justify;">Among the notable additions, <strong>The Cosmic Dolphins</strong> stands out with its sovereign hardware approach:</p>
<p style="text-align: justify;"><strong>The Cosmic Dolphins</strong>: Swiss smartphones with dual-zone OS (Shark Zone / Dolphin Zone), kill switch, and hardware-first approach to privacy.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26385" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image11-e1750428264682.jpg" alt="The Cosmic Dolphins logo" width="99" height="99" /></p>
<p style="text-align: justify;">Swiss innovation isn&#8217;t limited to software: <strong>mastery of the physical infrastructure</strong> is becoming an issue of trust, sovereignty and differentiation.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26387" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12.jpg" alt="Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity" width="602" height="338" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12.jpg 602w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12-340x191.jpg 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12-600x338.jpg 600w" sizes="auto, (max-width: 602px) 100vw, 602px" /></p>
<h2 style="text-align: justify;">Key Figures</h2>
<h2 style="text-align: justify;" data-wp-editing="1"><img loading="lazy" decoding="async" class="aligncenter wp-image-26406 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image18-e1750429011414.png" alt="" width="200" height="39" /><br /><img loading="lazy" decoding="async" class="aligncenter wp-image-26408 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image19-e1750428988444.png" alt="" width="200" height="67" /></h2>
<p> </p>
<h2 style="text-align: justify;">Geographical focus: undisputed predominance of Lausanne and Zurich, but other regions are gaining ground</h2>
<p> </p>
<p style="text-align: justify;">Unsurprisingly, most startups are located around two main technological clusters: Zürich and Lausanne. This confirms an already existing trend since these two cities are hosting Swiss Federal institutes of technology (ETHZ in Zürich, EPFL in Lausanne).</p>
<p style="text-align: justify;">These universities are providing a fertile ground for startups as they offer support in terms of infrastructure but also in terms of collaboration with students and labs. In return, intellectual property is shared between startups and universities. This model is a success for Switzerland as it allows to continuously improve the economy of these regions with a good balance between investment and research.</p>
<p style="text-align: justify;">Nevertheless, other regions such as Geneva and Ticino are showing increasing dynamism, with several new startups emerging in this year’s edition. This points to a gradually diversifying ecosystem, supported by regional initiatives like innovation hubs and dedicated startup incubators.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Methodology</h2>
<p> </p>
<p style="text-align: justify;">Wavestone’s Swiss Cybersecurity Startups Radar identifies new players in the Swiss cyber innovation ecosystem. Its objective: to provide a global and critical view of an ever-renewing environment.</p>
<ul>
<li style="text-align: justify;">Startups were selected according to our eligibility criteria:</li>
<li style="text-align: justify;">Head office in Switzerland</li>
<li style="text-align: justify;">Less than 50 employees</li>
<li style="text-align: justify;">Less than 8 years of activity (established as of 2017)</li>
<li style="text-align: justify;">Business model around a specific product (software or hardware)</li>
<li style="text-align: justify;">Startups were identified and evaluated according to the following procedure:</li>
<li style="text-align: justify;">Open Source Intelligence (OSINT) data consolidation</li>
<li style="text-align: justify;">Evaluation in regard to above criteria</li>
<li style="text-align: justify;">Qualitative interviews with the startups</li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/">Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2025 cybersecurity awareness solutions radar: how can I find the right solution for my needs?</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/02/2025-cybersecurity-awareness-solutions-radar-how-can-i-find-the-right-solution-for-my-needs/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/02/2025-cybersecurity-awareness-solutions-radar-how-can-i-find-the-right-solution-for-my-needs/#respond</comments>
		
		<dc:creator><![CDATA[Laetitia Reverseau]]></dc:creator>
		<pubDate>Wed, 05 Feb 2025 10:19:20 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[radar]]></category>
		<category><![CDATA[Wavestone]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25316</guid>

					<description><![CDATA[<p>According to the 2024 Verizon report, the human factors is responsible for 68% of data breaches. Aware of this vulnerability, 90% of cyberattacks exploit human error, with phishing as the primary attack vector. In this context, it has become essential...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/02/2025-cybersecurity-awareness-solutions-radar-how-can-i-find-the-right-solution-for-my-needs/">2025 cybersecurity awareness solutions radar: how can I find the right solution for my needs?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">According to the 2024 Verizon report, the human factors is responsible for <strong>68% of data breaches</strong>. Aware of this vulnerability, <strong>90% of cyberattacks exploit human error</strong>, with phishing as the primary attack vector. In this context, it has become essential to raise awareness to cybersecurity risks in line with your organization&#8217;s needs.</p>
<p style="text-align: justify;">However, although <strong>companies recognize the importance of awareness content</strong>, <strong>very few manage to effectively deploy</strong> <strong>solutions</strong> adapted to their teams&#8217; specific needs. In fact, as much as awareness is a priority, choosing the most suitable tool remains a challenge. Companies are confronted to a diverse range of options, from standardized online training to interactive and personalized tools.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>A radar of +100 cybersecurity awareness solutions</strong></h2>
<p style="text-align: justify;">In an environment where cybersecurity awareness is becoming a priority, the <strong>awareness solutions radar proves to be a strategic ally for companies</strong>. This tool provides a <strong>clear and structured view of available solutions</strong>, helping organizations <strong>identify the ones best suited to their needs.</strong></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-28865 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Image-2.png" alt="" width="837" height="561" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Image-2.png 837w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Image-2-285x191.png 285w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Image-2-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Image-2-768x515.png 768w" sizes="auto, (max-width: 837px) 100vw, 837px" /></p>
<p> </p>
<h3 style="text-align: justify;"><strong>A decision-making tool</strong></h3>
<p><strong>The radar provides a comprehensive overview of options available and helps assess the size of the market. </strong>Thanks to the radar, companies can <strong>quickly identify high-performing</strong> <strong>and innovative</strong> <strong>solutions</strong>, while also distinguishing <strong>essential ones</strong>. To achieve this, the solutions have been grouped into 7 categories:</p>
<ol>
<li><strong>Maturity Assessment</strong>: Solutions offering robust cybersecurity maturity and human risk evaluation tools, going beyond reports or questionnaires</li>
<li><strong>E-learning</strong>: Solutions providing a variety of structured learning modules</li>
<li><strong>Technical Training</strong>: Solutions specifically designed for technical audiences (cybersecurity teams, IT, developers, etc.)</li>
<li><strong>AI</strong>: Solutions based on artificial intelligence tools</li>
<li><strong>Chatbot</strong>: Solutions integrating an interactive conversational agent</li>
<li><strong>Phishing</strong>: Solutions specialized in phishing attack simulations, distinct from e-learning modules covering the topic.</li>
<li><strong>Games</strong>: Solutions focused on gamification, offering engaging cybersecurity awareness activities.</li>
</ol>
<p>This <strong>radar aims to provide a condensed view of our benchmark and is not a ranking</strong>. It is a <strong>curated selection based on several criteria</strong>, including company size, market presence (primarily in France), and our expert evaluation. We have <strong>intentionally limited the number of solutions presented to ensure a clear and strategic overview.</strong></p>
<p>The selection favors French solutions, in line with our client base, while also including a few relevant international players. Additionally, <strong>only solutions whose core offer is product-oriented</strong>, rather than consulting services, have been included, to ensure a <strong>product-focused approach</strong>.</p>
<h3> </h3>
<h3 style="text-align: justify;"><strong>A benchmark for a tailored solution</strong></h3>
<p style="text-align: justify;"><strong>The radar is based on a benchmark of over +100 solutions available on the market</strong>, providing a <strong>comprehensive overview of the cybersecurity awareness solutions’ ecosystem</strong>.</p>
<p style="text-align: justify;">The <strong>benchmark is designed to guide your selection</strong> towards the <strong>most suitable solution</strong>. Companies <strong>fill in their criteria</strong> to <strong>generate a refined list of options: types of content </strong>(phishing, passwords, social engineering, etc.), <strong>types of formats </strong>(quizzes, videos, chatbot, e-learning, etc.),<strong> availability and flexibility of the solution</strong>,<strong> target population</strong>, <strong>price</strong>,<strong> languages</strong>, etc. This process helps <strong>avoid arbitrary choices</strong> and ensures the selection of a <strong>solution that is truly aligned with awareness challenges and objectives.</strong></p>
<p style="text-align: justify;">Thus, without trying to be exhaustive, the radar <strong>offers a wide range of options to best meet</strong> <strong>your</strong> <strong>organization&#8217;s needs.</strong></p>
<p> </p>
<h3 style="text-align: justify;"><strong>Integration process into the benchmark</strong></h3>
<p style="text-align: justify;">The process of integrating a solution into the benchmark is intended to be straightforward. Once a solution is identified, it is <strong>analyzed and sorted based on specific criteria</strong>, along with <strong>feedbacks from our Wavestone consultants.</strong> In addition, <strong>meetings with solution providers </strong>allow us to <strong>refine our analysis </strong>through demonstrations and the collection of additional information.</p>
<p style="text-align: justify;">As such, a solution with a <strong>clear and intuitive interface</strong>, offering <strong>transcriptions in multiple languages, </strong>and covering a <strong>wide range of topics</strong> (phishing, cloud, chatbot, etc.) in an <strong>innovative way</strong> will be particularly relevant. If it also receives positive feedback from our consultants, it will have a strong chance of being included in the radar.</p>
<p style="text-align: justify;">The benchmark and its radar also come with <strong>detailed presentations of certain solutions</strong>. Thanks to our <strong>expertise and strong convictions regarding awareness</strong>, some <strong>solutions deemed relevant have detailed profiles that include a more precise overview of the interface</strong> and <strong>expert opinions</strong>, enriched by discussions with vendors. These presentations not only help <strong>select the most suitable tool but also highlight often more effective yet lesser-known alternatives.</strong></p>
<p> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25318" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Process-EN-v2-1.png" alt="" width="1344" height="370" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Process-EN-v2-1.png 1344w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Process-EN-v2-1-437x120.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Process-EN-v2-1-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/02/Process-EN-v2-1-768x211.png 768w" sizes="auto, (max-width: 1344px) 100vw, 1344px" /></p>
<p style="text-align: center;"><em style="font-size: revert; color: initial;">Integration process of a solution into the benchmark and radar</em></p>
<h4> </h4>
<h4><strong>Disclaimer</strong></h4>
<p>Please note that this radar is a reduced view of the associated benchmark. If you notice that a cyber awareness player you know is missing from this radar, contact us so we can evaluate and add them.</p>
<p> </p>
<h4 style="text-align: left;"><strong>Acknowledgements</strong></h4>
<p style="text-align: left;">We would like to thank Guillaume MASSEBOEUF for his contribution to this radar.</p>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/02/2025-cybersecurity-awareness-solutions-radar-how-can-i-find-the-right-solution-for-my-needs/">2025 cybersecurity awareness solutions radar: how can I find the right solution for my needs?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/02/2025-cybersecurity-awareness-solutions-radar-how-can-i-find-the-right-solution-for-my-needs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Post-quantum cryptography is here: what are the consequences and actions for large organisations? </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/09/post-quantum-cryptography-is-here-what-are-the-consequences-and-actions-for-large-organisations/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/09/post-quantum-cryptography-is-here-what-are-the-consequences-and-actions-for-large-organisations/#respond</comments>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Mon, 23 Sep 2024 06:52:19 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23956</guid>

					<description><![CDATA[<p>This summer&#8217;s post-quantum news: what you need to know  This summer marks a major breakthrough in cybersecurity with the publication of the NIST standards for post-quantum cryptography. This publication is the culmination of many years of work, the standardisation process...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/post-quantum-cryptography-is-here-what-are-the-consequences-and-actions-for-large-organisations/">Post-quantum cryptography is here: what are the consequences and actions for large organisations? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 aria-level="2">This summer&#8217;s post-quantum news: what you need to know </h1>
<p><span data-contrast="auto">This summer marks a major breakthrough in cybersecurity with the publication of the NIST standards for post-quantum cryptography. This publication is the culmination of many years of work, the standardisation process having begun in 2016, while the mathematical research has lasted decades.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">This news has been eagerly awaited by the cyber community, because the threat is so real: a sufficiently powerful quantum computer would render all current asymmetric cryptography obsolete. This would mean the impossibility of exchanging encryption keys, as well as the possibility of digitally signing documents. In short, it would mean the end of confidentiality and integrity guarantees for communications.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">It&#8217;s difficult to describe the extent of the consequences, with secure communications on the Internet becoming near enough impossible.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">To counter this, 3 new cryptographic standards have been identified:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li><span data-contrast="auto">ML-KEM (CRYSTALS-Kyber), the new main standard for encryption and therefore key exchange</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">ML-DSA (CRYSTALS-Dilithium), the new main standard for digital signatures</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:360}"> </span></li>
<li><span data-contrast="auto">SLH-DSA (Sphincs+), the backup solution for backup signatures should ML-DSA prove vulnerable.</span></li>
</ul>
<p>Note that a “backup” solution for encryption, FN-DSA (FALCON), will be released in the near future.<span style="font-size: revert; color: initial;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">The standards are published, but the post-quantum efforts are not over &#8211; quite the contrary!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<h1 aria-level="2">Integrations begin: editors and developers in action </h1>
<p><span data-contrast="auto">Publication of the standards means that the next stage in the post-quantum security process can begin: integration of the algorithms by the major players and developers of technological solutions. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">This work has already begun, of course, and includes the integration of post-quantum algorithms into the development roadmap of Tink</span><span data-contrast="auto">1</span><span data-contrast="auto">, Google&#8217;s well-known cryptographic library. Also worthy of mention is the partnership between IBM and Thales</span><span data-contrast="auto">2</span><span data-contrast="auto"> for complete post-quantum security, from VPN to TLS to digital document signing. Finally, Microsoft</span><span data-contrast="auto">3</span><span data-contrast="auto"> has also indicated that efforts are now underway for a post-quantum transition of their services, from cloud to on-premise. Even Apple</span><span data-contrast="auto">4</span><span data-contrast="auto"> in the consumer sphere has launched the migration of iMessage to post-quantum algorithms.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">But beware, post-quantum security is not suddenly a reality. It is and will be a long process which relies, in particular, on the efforts of all IT service providers. It&#8217;s encouraging to see that market leaders are taking this subject seriously.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<h1><span data-contrast="none">It&#8217;s up to large organisations to act! </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:278}"> </span></h1>
<p><span data-contrast="auto">Post-quantum security doesn&#8217;t just concern GAFAM: all major organisations need to start transitioning to this new paradigm. We recommend that you start thinking about and adopting a post-quantum security strategy now, as US agencies are obliged to do so under the </span><i><span data-contrast="auto">Quantum Computing Cybersecurity Preparedness Act</span></i><span data-contrast="auto"> (2022). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">There are many major stages in this migration strategy, and it obviously has to cover conventional IT systems. But we mustn&#8217;t forget industrial systems and embedded systems (vehicles, trains, connected objects, remote systems, etc.). For each of these areas, the following elements need to be consolidated:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<ul>
<li><span data-contrast="auto">An inventory of data and its security shelf-life, particularly for long-lived data, in order to prioritise safeguards.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">An inventory of cryptographic solutions used in-house, to identify their origins and responsibilities (in-house, open-source, suppliers, etc.).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Each use of asymmetric cryptography must be the subject of a transition plan, including a POC. Note that symmetrical AES cryptography does not require any transition, with the exception of the move to AES256 for ultra-critical data (sensitive over several decades). For legacy systems, beyond the migration of encryption systems, it may be necessary to re-encrypt part of the stored data.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">The entire cryptographic chain will obviously have to evolve, from PKI to certificates, via the various encryption and signature systems. We&#8217;ll also need to pay close attention to performance issues, particularly in embedded environments. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">New projects must take post-quantum security into account right from the design stage:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span>
<ul>
<li><span data-contrast="auto">With the inclusion of post-quantum security criteria in the evaluation of service providers.</span></li>
<li data-leveltext="o" data-font="Courier New" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="2"><span data-contrast="auto">All in-house projects must include the use of post-quantum asymmetric cryptography, requirements equivalent to AES256 for symmetric cryptography, and guarantees equivalent to SHA512 for hashing.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></li>
</ul>
</li>
</ul>
<p><span data-contrast="auto">Given the scale of the task, a complete ecosystem of suppliers is emerging to support inventorying, risk assessment (via library or source code scanning) and action plan follow-up. This is the case at Thales, IBM and Sandbox AQ. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">But beyond the tools, it will be necessary to embark on a real transformation programme, mobilising IT teams, the business lines concerned, and also purchasing if the supplier stakes are high. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">This migration is also an opportunity to think more deeply about the management of “crypto agility”, because let&#8217;s face it, these algorithms are fairly “new”, and it&#8217;s not impossible that flaws will be discovered that will require upgrades. The transformation programme should not lead to a “one-off” migration, but rather to the mastery of agile cryptography within the organisation. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">History shows that it takes 3 to 4 years to initiate and complete this type of migration. And it won&#8217;t be easy to make headway on this issue, so invisible is it to the business world. Let&#8217;s hope that regulations, particularly in Europe, will bring the subject into the spotlight!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<h1><span data-contrast="none">Risks and timelines: when to act? </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:278}"> </span></h1>
<p aria-level="2"><span data-contrast="auto">Estimates vary as to when a quantum computer will be able to “break” state-of-the-art RSA encryption. Most place it between 2030 and 2040, with a concentration of estimates around 2033-2035. The NSA requires exclusively post-quantum cryptography from its software, firmware and network equipment suppliers as early as 2030, from 2033 for certain others (e.g. O.S.) and 2035 for all its suppliers</span><span data-contrast="auto">. Post-quantum cryptography should be available as early as 2025 in certain cases.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">Even if nobody knows exactly when quantum computers will be sufficiently sophisticated, not being ready by 2033 means accepting risks that will have a serious impact on the most sensitive data.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">However, another threat exists today. We are all now exposed to the risk of “Harvest Now, Decrypt Later”, which consists in the large-scale storage of Internet communications for future decryption with a quantum computer (or when encryption keys are leaked). This risk obviously concerns entities with very specific capabilities, namely state agencies or groups of attackers backed by them. Only those organisations whose data is of strategic interest to these agencies are most at risk. It&#8217;s this particularity that has prompted migrations for some specific players. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p><span data-contrast="auto">But for all of them, given the efforts required and the risk zone by 2030, it&#8217;s in the 2025 action plan that the first phases of assessment and construction of the project plan must be planned!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/post-quantum-cryptography-is-here-what-are-the-consequences-and-actions-for-large-organisations/">Post-quantum cryptography is here: what are the consequences and actions for large organisations? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/09/post-quantum-cryptography-is-here-what-are-the-consequences-and-actions-for-large-organisations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Navigating The Cybersecurity Talent Management Maze: A Guide for Talent Management Enthusiasts</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/09/navigating-the-cybersecurity-talent-management-maze-a-guide-for-talent-management-enthusiasts/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/09/navigating-the-cybersecurity-talent-management-maze-a-guide-for-talent-management-enthusiasts/#respond</comments>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Mon, 02 Sep 2024 08:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[talent management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23775</guid>

					<description><![CDATA[<p>Are you a CISO, Talent Manager or Cybersecurity Specialist grappling with the challenge of recruiting and retaining top-notch cybersecurity talents? You’re not alone. Recruiting in cybersecurity is increasingly challenging, with 4 million jobs currently unfilled – a 13% rise from...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/navigating-the-cybersecurity-talent-management-maze-a-guide-for-talent-management-enthusiasts/">Navigating The Cybersecurity Talent Management Maze: A Guide for Talent Management Enthusiasts</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Are you a CISO, Talent Manager or Cybersecurity Specialist grappling with the challenge of recruiting and retaining top-notch cybersecurity talents? You’re not alone.</p>
<p style="text-align: justify;">Recruiting in cybersecurity is increasingly challenging, with 4 million jobs currently unfilled – a 13% rise from 2022 (ISC2 2023). As studies over the past three years have confirms, this challenge is only deepening, leaving CISOs struggling to recruit, manage, and retain skilled professionals. Diversifying the talent pool is also a priority, with women making up only 25% of the workforce.</p>
<p style="text-align: justify;">At Wavestone, we’ve been actively following this subject and have developed a benchmark to assess companies’ maturity level on this subject. With data from more than 20 organizations, we’re ready to share our insights.</p>
<p style="text-align: justify;">In this article, we’ll dive into the results and focus on key topics such as career path, recruitment, trainings, and retention plans. And for those who stick around till the end, there’s a little surprise waiting for you. <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p style="text-align: justify;">If you’re a CISO looking for practical solutions or just interested in cybersecurity talent management, this article is for you. Let’s tackle this challenge together.</p>
<p> </p>
<h2><strong>A Global Maturity Score of 45% in Cyber Talent Management</strong></h2>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignleft wp-image-23776 " src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/1.png" alt="Moyenne 45/100
Premier quartile 27/100
Dernier quartile 62/100
Plus de 20 organisations ont été interviewe en 2024 par Wavestone pour établir ces chiffres" width="277" height="281" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/1.png 385w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/1-188x191.png 188w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/1-38x39.png 38w" sizes="auto, (max-width: 277px) 100vw, 277px" />Current Cyber Talent Management maturity stands at 45%, indicating significant room for improvement in this emerging field. The gap between the lowest and highest scores ranges from 27% to 62%.</p>
<p style="text-align: justify;">On a positive note, there are strong performers in every area, suggesting that companies can benefit from sharing best practices. Ultimately, the goal is to build skilled and resilient cybersecurity teams.</p>
<p> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignright wp-image-23778 size-medium" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/2-363x191.png" alt="" width="363" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/2-363x191.png 363w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/2-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/2.png 545w" sizes="auto, (max-width: 363px) 100vw, 363px" />The Energy sector has the highest maturity level, while Public &amp; Institutions have the lowest. The graph above compares the maturity levels of various sectors on a scale from 0 to 100%. The sectors include Energy (58.2), Luxury &amp; Retail (52.4), Services (50), Finance (45.9), Industry (47.2), and Public &amp; Institutions (36.1).</p>
<p> </p>
<h2><strong>Developing Career Path to Give Growth Perspectives to Talents</strong></h2>
<p style="text-align: justify;">The cybersecurity field is facing a clear talent shortage. In 2023, 4 million cyber jobs were unfilled, and the figure is still increasing. Organizations have a real challenge to retain their cyber talents and to attract new ones. Yet a well-defined career path could help them. From an HR perspective, it empowers individuals to take charge of their own development, serves as a framework for self-assessing competencies and areas for growth, and supports individual fulfilment. However, building an effective career path requires careful planning and can take over a year to implement.</p>
<p style="text-align: justify;">During our interviews with CISOs and Cyber Talent Managers, we observed that while 66% of the organizations have started initiatives to build their first cyber career path, these efforts are not yet fully materialized.</p>
<table style="width: 100%; border-collapse: collapse; border-style: double; border-color: #451dc7;">
<tbody>
<tr>
<td style="width: 100%; background-color: #451dc7; border-style: double; border-color: #451dc7;">
<p><span style="color: #ffffff;"><strong>Here are tips from leading organizations in the market…</strong></span></p>
<ul>
<li style="color: white;"><span style="color: #ffffff;"><strong>Job repository:</strong> develop a detailed list of all cyber roles, including responsibilities and requirements.</span></li>
<li style="color: white;"><span style="color: #ffffff;"><strong>Skills mapping: </strong>identify essential skills for each role and create a skills matrix to pinpoint gaps and future needs.</span></li>
<li style="color: white;"><span style="color: #ffffff;"><strong>Training catalogue and mapping:</strong> align training programs with specific jobs or skills to ensure employees are equipped to excel in their roles.</span></li>
</ul>
</td>
</tr>
</tbody>
</table>
<h3> </h3>
<h3 style="text-align: justify;"><strong><em>Real-world example based on a client assignment…</em></strong></h3>
<ul style="text-align: justify;">
<li>In a client project, after several phases of reviews and workshops on cyber jobs and skills frameworks, we identified 11 new cyber skills and 6 cyber jobs and integrated them into the repositories. This then led to the creation of an initial career path dedicated to cybersecurity workforce.</li>
</ul>
<p style="text-align: justify;">A well-defined career path is the cornerstone of Talent Management and represents a strategic advantage for organizations in retaining and attracting talents, prompting many to take action.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Tips to Diversify Your Recruitment Pool</strong></h2>
<p style="text-align: justify;">The cybersecurity talent pool is both limited and lacking in diversity, making recruitment a critical challenge for organizations. Despite women making up 50% of the global population, they represent only 25% of cyber professionals (ISC2 2023). This highlights the urgent need for more inclusive recruitment strategies.</p>
<p style="text-align: justify;">Nowadays, traditional job descriptions often demand too much, deterring potential female candidates. Only 27% of the organizations have adapted them. Studies show men apply if they meet 60% of the criteria, while women tend to wait until they meet 100%. Rewriting descriptions to be more inclusive, with input from female reviewers, can broaden their appeal.</p>
<p style="text-align: justify;">In addition, few companies focus on internal (5%) or external (22%) branding, yet these strategies work. Transparent branding and communication can help to demystify cybersecurity roles, attract a more diverse talent pool and boost internal mobility, making them valuable recruitment tools.</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; border-style: double; border-color: #451dc7; background-color: #451dc7;">
<p><span style="color: #ffffff;"><strong>Here are tips from leading organizations in the market…</strong></span></p>
<ul>
<li style="color: white;"><span style="color: #ffffff;"><strong>Job descriptions:</strong> create or revise job descriptions to ensure they are accessible and inclusive. And don’t forget to review your job descriptions to ensure you’re not listing 10 certifications <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></span>
<ul style="margin-bottom: 0px;">
<li style="color: white;"><span style="color: #ffffff;"><strong style="font-size: revert;">Female review: </strong><span style="font-size: revert;">have job descriptions reviewed by a female employee for inclusivity.</span></span></li>
</ul>
</li>
<li style="color: white;"><span style="color: #ffffff;"><strong style="font-size: revert;">Internal and external branding strategy:</strong><span style="font-size: revert;"> build a brand that emphasizes diversity and inclusivity, partner with universities, associations, and use female role models to promote cybersecurity.</span></span></li>
<li style="color: white;"><span style="color: #ffffff;"><strong style="font-size: revert;">Recruitment training: </strong><span style="font-size: revert;">train your team on inclusive recruitment methods to enhance diversity.</span></span></li>
</ul>
</td>
</tr>
</tbody>
</table>
<h2> </h2>
<h2 style="text-align: justify;"><strong>Offering Trainings to Reduce Skills Gaps Within Your Organization</strong></h2>
<p style="text-align: justify;">Cybersecurity skills gaps are a major issue, with 92% of professionals reporting deficiencies and 75% finding the current landscape the most challenging ever (ISC2, 2023).</p>
<p style="text-align: justify;">Our benchmark shows only 33% of companies have a skills-mapped training catalogue, and 94% address training reactively, based on demand. This reactive approach misses chances for proactive skills development. Effective training is crucial for equipping employees with the skills needed to handle evolving cybersecurity threats and trends.</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; border-style: double; border-color: #1d45c7; background-color: #451dc7;">
<p><span style="color: #ffffff;"><strong>Here are tips from the leading organizations in the market…</strong></span></p>
<ul>
<li style="color: white;"><span style="color: #ffffff;"><strong>Training catalogue: </strong>create a detailed training catalogue that aligns with cyber skills and job roles across various learning platforms (e.g. Pluralsight, LinkedIn Learning, free MOOC on national competencies centre’s website, etc.)</span></li>
<li style="color: white;"><span style="color: #ffffff;"><strong>Time and budget allocation: </strong>set aside dedicated time and budget for employee training to demonstrate the organization’s commitment to continuous learning and skill development.</span></li>
</ul>
</td>
</tr>
</tbody>
</table>
<h3> </h3>
<h3 style="text-align: justify;"><strong><em>Real-world example based on a client assignment…</em></strong></h3>
<ul style="text-align: justify;">
<li><strong>Automated Training Paths: </strong>implemented an automated tool that can generate personalized training paths based on employees’ needs and skills level.</li>
<li><strong>Consolidated Training Catalogue:</strong> a unified training catalogue, mapped to the 17 new cyber skills and 16 new cyber jobs, offering a clear development roadmap for employees.</li>
</ul>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>Enhancing Retention Through Effective HR Collaboration</strong></h2>
<p style="text-align: justify;">Collaborating closely with the HR team to create a robust retention plan is essential for organizational success. While many companies have processes to support talent development, these are often not formalized, leading to challenges in daily management.</p>
<p style="text-align: justify;">Companies need to start by assessing the unique skills and strengths of each team member and determine how to best leverage them for the organization’s goals. Conducting individual interviews is a valuable strategy in this regard. Managers can gain insights into each employee&#8217;s current career stage and future aspirations. This information allows them to craft personalized development plans that align with their goals.</p>
<p style="text-align: justify;">However, it’s important to remember that a retention plan is not a one-size-fits-all solution. It should be flexible and adaptable, capable to evolve with the changing needs of your team and the cybersecurity landscape. By working with HR to implement a tailored, adaptive plan, you ensure that your cyber talent feels valued, motivated, and committed. Remember, effective retention is as crucial as attracting top talent, so make strategic collaboration with HR a key component of your talent management strategy.</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; border-style: double; border-color: #451dc7; background-color: #451dc7;">
<p><span style="color: #ffffff;"><strong>Here are tips from the leading organizations in the market…</strong></span></p>
<ul>
<li style="color: white;"><span style="color: #ffffff;"><strong>Employee retention steering: </strong>dedicate time to define your retention objectives, KPIs and concrete actions. Only one organization has quarterly leadership moment (1 day per quarter) to focus on people and discuss on the evolution of the team.</span></li>
<li style="color: white;"><span style="color: #ffffff;"><strong>Talent reviews: </strong>dedicated time (annual interview) to create a trustful management relationship and assess the skills, performance, and potential of cybersecurity professionals. Only 5% of the companies have implemented this process in their cyber talent management strategy.</span></li>
</ul>
</td>
</tr>
</tbody>
</table>
<p> </p>
<h2><strong>A²BCⁿ framework: A Framework to Care for your Talents and Secure your Business</strong></h2>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-23780 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3.png" alt="" width="1016" height="1016" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3.png 1016w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3-191x191.png 191w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3-768x768.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/08/3-300x300.png 300w" sizes="auto, (max-width: 1016px) 100vw, 1016px" /></p>
<p> </p>
<p style="text-align: justify;">In conclusion, caring for talent is essential to securing your business. The A²BCⁿ framework provides a structured approach to achieve this. By focusing on <strong>Assessing and Attracting</strong> talent, <strong>Building Trust </strong>with your talents, and Caring and Nurturing your team, this mixed approach, blending cybersecurity and HR strategies, ensures an effective and resilient team ready to meet tomorrow&#8217;s challenges.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/navigating-the-cybersecurity-talent-management-maze-a-guide-for-talent-management-enthusiasts/">Navigating The Cybersecurity Talent Management Maze: A Guide for Talent Management Enthusiasts</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/09/navigating-the-cybersecurity-talent-management-maze-a-guide-for-talent-management-enthusiasts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Timeline Update: CMMC 2.0 and the Phenomenon of Midnight Rulemaking</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/#respond</comments>
		
		<dc:creator><![CDATA[Baptistin Buchet]]></dc:creator>
		<pubDate>Wed, 17 Jul 2024 10:12:40 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Certification]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[FCI]]></category>
		<category><![CDATA[Midnight Rulemaking]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[third party]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23608</guid>

					<description><![CDATA[<p>Not familiar with CMMC 2.0? For more information regarding CMMC 2.0, please refer to this article. The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive framework designed to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI), shared with...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/">Timeline Update: CMMC 2.0 and the Phenomenon of Midnight Rulemaking</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><em>Not familiar with CMMC 2.0? For more information regarding CMMC 2.0, please refer to </em><a href="https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/"><em>this article</em></a><em>.</em></p>
<p style="text-align: justify;">The Cybersecurity Maturity Model Certification (CMMC) is a <strong>comprehensive framework </strong>designed to <strong>protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI), shared with contractors and subcontractors </strong>of the <strong>Department of Defense (DoD) </strong>through acquisition programs<strong>, as defined by Executive Order 13556</strong>.</p>
<p style="text-align: justify;">The CMMC 2.0 Proposed Rule, published on December 26, 2023, represents the latest evolution of the CMMC cybersecurity model.</p>
<p style="text-align: justify;">On June 27, 2024, after adjudicating nearly 2,000 comments, following a 60-day open-comment period, the <a href="https://cmmcinfo.org/cmmc-regulations-move-closer-to-final/">DoD submitted a draft of the CMMC 2.0 Final Rule</a> (32 CFR) to the Office of Information and Regulatory Affairs (OIRA) at the White House.</p>
<p style="text-align: justify;"><strong>The summited draft represents <span style="font-weight: normal !msorm;">the </span>final step before the CMMC 2.0 rule is published<span style="font-weight: normal !msorm;"> in the Federal Register</span>. As the final draft has been submitted the<span style="font-weight: normal !msorm;"> focus </span>now <span style="font-weight: normal !msorm;">shifts to the timeline for </span>when the CMMC 2.0 regulation will take effect and be enforced.</strong></p>
<p style="text-align: justify;">Before addressing this shift in focus, it is essential to understand that the security requirements, upon which CMMC 2.0 Level 2 is founded (NIST SP 800-171), <strong>have been mandatory</strong> for DoD contractors handling sensitive information <strong>since December 2017</strong>, when the DFARS clause 252.204-7012 was included in DoD contracts. However, during this period, compliance mostly relied on self-attestation <strong>without a robust enforcement mechanism</strong>, leaving the <strong>DoD unable to verify adherence.</strong> As a result, many contractors <span style="font-weight: normal !msorm;"><strong>neglected</strong></span> to fully implement the required controls.</p>
<p style="text-align: justify;">To address this issue, the DoD launched the <strong>CMMC program</strong>, which essentially serves as the <strong>mechanism through which the DoD will verify compliance</strong> with the requirements outlined in DFARS clause 252.204-7012 (NIST SP 800-171), mandated in contracts since 2017.</p>
<p style="text-align: justify;">As the DoD puts it: &#8220;<a href="https://www.federalregister.gov/documents/2023/12/26/2023-27280/cybersecurity-maturity-model-certification-cmmc-program"><em>A key difference between the DFARS 252.204-7012 and CMMC Level 2 requirements is that compliance with NIST SP 800-171 under DFARS 252.204-7012 has not been consistently verified. <strong>Under CMMC, compliance will be checked by independent third-party assessors certified by DoD</strong></em></a><strong><em>.</em></strong>&#8220;</p>
<p style="text-align: justify;">The <strong>significant change</strong> <strong>introduced by CMMC</strong>, requires contractors to <strong>obtain certification through assessments</strong> conducted by a CMMC Third Party Assessment Organization (C3PAO) to <strong>demonstrate compliance</strong> to retain and secure DoD contracts.</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #50067a;"><strong>CMMC Rulemaking Timeline</strong></span></h2>
<p style="text-align: justify;">The CMMC rulemaking timeline is summarized below based on publicly available information as of July 17, 2024.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23612" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN.png" alt="" width="3935" height="1545" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN.png 3935w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-437x172.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-768x302.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-1536x603.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-2048x804.png 2048w" sizes="auto, (max-width: 3935px) 100vw, 3935px" /></p>
<p style="text-align: justify;">As with all federal regulations, CMMC requires a legal basis for implementation. Therefore, to determine when the CMMC 2.0 regulation will come into effect, we need to understand the rulemaking process behind CMMC 2.0, involving two rules from the <a href="https://www.ecfr.gov/">Code of Federal Regulations</a>: 32 CFR and 48 CFR.</p>
<p style="text-align: justify;">For the CMMC 2.0 regulation to come fully into effect, <strong>two things need to happen</strong>.</p>
<ol style="text-align: justify;">
<li>The <a href="https://www.reginfo.gov/public/do/eAgendaViewRule?pubId=202210&amp;RIN=0790-AL49">32 CFR CMMC</a> Final Rule has to come into effect. This rule outlines and codifies the CMMC program and will allow CMMC third-party assessments to begin, known as the &#8220;<strong>market rollout</strong>&#8220;.</li>
</ol>
<p style="text-align: justify;">The 32 CFR CMMC Final Rule is estimated to be published no later than October 26, 2024, after OIRA&#8217;s review of up to 120 days, and will come into <strong>effect approximately 60 days later, in late Q3 or early Q4 2024</strong>.</p>
<ol style="text-align: justify;" start="2">
<li><a href="https://www.reginfo.gov/public/do/eAgendaViewRule?pubId=202210&amp;RIN=0750-AK81">48 CFR CMMC</a> Final Rule must come into effect. This rule revises the DFARS clause 252.204-7021 to point to the CMMC program (32 CFR) and will introduce CMMC compliance as a contractual clause gradually over 3 years, known as the &#8220;<strong>phased rollout</strong>&#8220;.</li>
</ol>
<p style="text-align: justify;">The 48 CFR Proposed Rule was <strong>submitted to OIRA</strong> in May 2024. After a 90 to 120-day regulatory review and an initial 60-day public comment period, the Proposed Rule will undergo another 60-day public comment period, followed by a Final Rule review and adjudication process, estimated to take 150 to 280 business days. The 48 CFR Final Rule is <strong>expected to come into effect around Q3 or Q4 2025</strong> but could be sooner, as it revises an existing, small clause (DFARS clause 252.204-7021).</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #50067a;"><strong>The 32 CFR is the Starting Gun for the CMMC Race</strong></span></h2>
<p style="text-align: justify;">While the effective date of the 48 CFR Final Rule (expected in Q3 or Q4 2025) will determine when the CMMC 2.0 regulation is mandatorily included in contracts, known as the &#8220;<strong>phase-rollout</strong>,&#8221; it&#8217;s a <strong>significant misconception</strong> that the pivotal milestone for the start of the CMMC race is the effective date of the 48 CFR.</p>
<p style="text-align: justify;">Indeed, the <strong>kickoff for the CMMC race will be determined by the effective date of the 32 CFR Final Rule</strong> (expected late Q3 or early Q4 2024), not the 48 CFR Final Rule.</p>
<p style="text-align: justify;">The 32 CFR Final Rule will trigger the &#8220;<strong>market rollout</strong>&#8220;, which will <strong>allow CMMC assessments to begin</strong>. Once these assessments are available, prime contractors (e.g., Lockheed Martin, Boeing, Raytheon) will likely <strong>require subcontractors to obtain CMMC certification</strong> as soon as possible, <strong>well before DoD does </strong>through the &#8220;<strong>phased rollout</strong>&#8220;, to maintain their competitive edge and mitigate the risk of non-certified suppliers jeopardizing their own certification status.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23615" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN.png" alt="" width="3100" height="2277" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN.png 3100w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-260x191.png 260w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-53x39.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-768x564.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-1536x1128.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-2048x1504.png 2048w" sizes="auto, (max-width: 3100px) 100vw, 3100px" /></p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #50067a;"><strong>Midnight Rulemaking and CMMC 2.0</strong></span></h2>
<p style="text-align: justify;">In the past 6 months, there has been a <strong>notable acceleration in the CMMC rulemaking process</strong>. This is evident in several key milestones, including the publication of the 32 CFR Proposed Rule in December 2023, the submission of a 48 CFR Proposed Rule to OIRA in May 2024, and most recently, the submission of the 32 CFR Final Rule to OIRA in June 2024. This <strong>phenomenon is often referred to as </strong>&#8220;<a href="https://www.gao.gov/products/gao-23-105510">Midnight Rulemaking</a>&#8220;, which describes the rush to finalize regulations in the final months before a presidential administration concludes.</p>
<p style="text-align: justify;">Thus, if we anticipate the 32 CFR Final Rule to be finalized and effective in late Q3 or early Q4 2024, given the Department of Defense&#8217;s strong motivation to complete the CMMC regulations before the U.S. 2024 elections, there is a very strong possibility it will <strong>become effective before November 5, 2024</strong>.</p>
<p> </p>
<h2 style="text-align: justify;"><strong><span style="color: #50067a;">Don’t Wait for the Starting Gun to Begin the CMMC Compliance Journey</span></strong></h2>
<p style="text-align: justify;">The DoD anticipates that it will take <a href="https://www.federalregister.gov/documents/2023/12/26/2023-27280/cybersecurity-maturity-model-certification-cmmc-program">two years</a> for companies with existing contracts to become CMMC certified, <strong>assuming they have already implemented the NIST SP 800-171 Rev. 2 requirements </strong>as per DFARS clause 252.204-7012. This extended timeline is due to several factors:</p>
<ol style="text-align: justify;">
<li>Once 32 CFR becomes effective, CMMC third-party assessments for CMMC Level 2 will commence, requiring organizations to achieve <strong>100% self-attestation readiness before undergoing assessment</strong>. This preparatory phase demands significant time and effort.</li>
<li>On average, organizations <strong>spend between 12 to 18 months preparing</strong> for a CMMC Level 2 assessment.</li>
<li>Due to a <strong>shortage</strong> of CMMC assessors, organizations may expect to <strong>wait approximately 9 to 15 months</strong> (3 to 5 quarters) for a CMMC assessment.</li>
</ol>
<p style="text-align: justify;">Therefore, to stay prepared for future DoD contract opportunities and maintain a competitive edge, it is recommended that organizations <strong>begin their CMMC compliance process today. </strong></p>
<p style="text-align: justify;">Feel free to <a href="https://www.wavestone.com/en/get-in-touch/">reach out</a> to discuss your CMMC journey with us and explore how #Wavestone can assist you in navigating the intricate landscape of CMMC 2.0 compliance, supporting your path to certification, and enhancing your cybersecurity readiness into a strategic advantage.</p>
<h3 style="text-align: justify;"><strong>Our CMMC 2.0 Compliance Services:</strong></h3>
<ol style="text-align: justify;">
<li><u>CUI Identification:</u>
<ul>
<li>We assist in identifying Controlled Unclassified Information (CUI) within your organization to ensure compliance with CMMC requirements.</li>
</ul>
</li>
<li><u>CMMC Assessment Scope Identification:</u>
<ul>
<li>We help define and minimize your CMMC Assessment Scope to stay cost-effective and pragmatic. By clearly identifying the scope, we ensure that all necessary systems and processes are included while avoiding unnecessary complexity and costs.</li>
</ul>
</li>
<li><u>CMMC Readiness Assessments</u>:
<ul>
<li>Our experts conduct CMMC Level 1 and 2 readiness assessments, evaluating your current state against the respective assessment objectives (e.g., NIST SP 800-171A) to provide you with actionable recommendations.</li>
</ul>
</li>
<li><u>CMMC Compliance Roadmap Definition</u>:
<ul>
<li>We work with you to define a clear roadmap to achieve CMMC compliance, tailored to your needs, whether for CMMC clusters or all-in scenarios.</li>
</ul>
</li>
<li><u>CMMC Implementation Support</u>:
<ul>
<li>We offer comprehensive guidance and support throughout the implementation phase, helping you effectively integrate the required controls and reach CMMC 2.0 compliance.</li>
</ul>
</li>
</ol>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/">Timeline Update: CMMC 2.0 and the Phenomenon of Midnight Rulemaking</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/#respond</comments>
		
		<dc:creator><![CDATA[Baptistin Buchet]]></dc:creator>
		<pubDate>Wed, 24 Apr 2024 08:25:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Certification]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[FCI]]></category>
		<category><![CDATA[règlementation]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[Supply-chain attacks]]></category>
		<category><![CDATA[third party]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[US Department of Defense]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23048</guid>

					<description><![CDATA[<p>In late October 2023, a third-party data breach incident sent shockwaves through the business world, affecting over 57,000 entities engaged in business with Bank of America. This breach exposed sensitive personal and financial information, underscoring the pivotal role that third-party...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/">The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">In late October 2023, a <span style="color: #53548a;"><strong>third-party data breach incident</strong> </span>sent shockwaves through the business world, affecting over <span style="color: #53548a;"><strong>57,000 entities</strong></span> engaged in business with <span style="color: #53548a;"><strong>Bank of America</strong>.</span> This breach exposed sensitive personal and financial information, underscoring the pivotal role that third-party suppliers play in an organization’s cybersecurity infrastructure.</p>
<p style="text-align: justify;">These incidents, commonly referred to as “<span style="color: #53548a;"><strong>supply-chain attacks</strong></span>”, involve targeting an organization’s downstream <span style="color: #53548a;"><strong>third parties</strong></span> (e.g., partners, vendors) to gain access to valuable systems. In the Bank of America case, the compromised third party responsible for this breach, was Infosys McCamish Systems (IMS), an insurance process management services provider.</p>
<p style="text-align: justify;">This breach resonates with the infamous <span style="color: #53548a;"><strong>SolarWinds</strong> </span>cyberattack, where Nobelium hackers inserted malicious code into the SolarWinds Orion platform, enabling them to infiltrate numerous government systems, including the U.S.’ Homeland Security, State, Commerce, and Treasury, as well as private systems worldwide.</p>
<p style="text-align: justify;">As corporate IT architectures are arguably a mere reflection of a company’s intricate web of business relationships, these events serve as a stark reminder that <span style="color: #53548a;"><strong>organizations are not isolated entities</strong> </span>but rather <span style="color: #53548a;"><strong>hubs of interconnected and co-dependent partners</strong> </span>and third parties. Achieving a robust cybersecurity posture requires more than individual efforts; it demands cultivating a <span style="color: #53548a;"><strong>secure ecosystem</strong></span> of thoroughly vetted trusted partners to effectively safeguard the entire supply chain required for product delivery (TPRM).</p>
<p style="text-align: justify;">However, building such an ecosystem poses challenges. Many companies lack the resources to exclusively select leading, cutting-edge, and trusted third parties or may lack the leverage to demand transparency from existing partners.</p>
<p style="text-align: justify;">Drawing lessons from the SolarWinds cyberattack, and amid heightened geopolitical tensions (see <a href="https://www.wsj.com/politics/national-security/fbi-director-says-china-cyberattacks-on-u-s-infrastructure-now-at-unprecedented-scale-c8de5983">Chinese cyberattacks on U.S. infrastructure at an unprecedented scale</a>), the Department of Defense recognized this challenge and responded with the development of a solution for securing the supply-chain ecosystem of the Defense Industrial Base (DIB) called the <span style="color: #53548a;"><strong>CMMC</strong></span>.</p>
<p style="text-align: justify;">The Cybersecurity Maturity Model Certification (CMMC) is a <span style="color: #53548a;"><strong>comprehensive framework </strong></span>designed to <span style="color: #53548a;"><strong>protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI)</strong></span>, that is <strong><span style="color: #53548a;">shared with contractors and subcontractors of the Department of Defense (DoD) </span></strong>through acquisition programs.</p>
<p style="text-align: justify;">The CMMC 2.0 Proposed Rule Release, published on December 26, 2023, represents the latest evolution of the CMMC cybersecurity model, poised to supplant the preceding CMMC 1.0 with a <span style="color: #53548a;"><strong>more pragmatic approach</strong></span>. Following its release, the proposed policy underwent a <span style="color: #53548a;"><strong>60-day open-comment period</strong></span>, which <span style="color: #53548a;"><strong>concluded on February 26, 2024</strong>.</span> The new regulation is anticipated <span style="color: #666699;"><strong>to <span class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr">be finalized by late 2024 or early 2025</span>.</strong></span></p>
<p style="text-align: justify;">The CMMC 2.0 is aimed at <span style="color: #53548a;"><strong>safeguarding sensitive national security information</strong></span> by protecting the Defense Industrial Base&#8217;s (DIB) sensitive unclassified information from frequent and increasingly complex cyberattacks. It streamlines requirements to <span style="color: #53548a;"><strong>three levels </strong></span>of compliance and aligns the requirements at each level with well-known and widely accepted NIST cybersecurity standards. The specific security requirements and assessment types (self-assessment, third-party assessment, or DoD assessment) vary based on the level.</p>
<ul style="text-align: justify;">
<li><span style="color: #53548a;"><strong>Foundational</strong> </span>(Level 1): Targets organizations handling FCI (e.g., contract performance reports, organizational charts). Compliance mandates strict adherence to the 15 security requirements outlined in FAR clause 52.204-21, through an annual self-assessment.</li>
<li><span style="color: #53548a;"><strong>Advanced</strong> </span>(Level 2): Targets organizations handling CUI, including Controlled Technical Information, DoD Critical Infrastructure Security Information, Naval Nuclear Propulsion Information, and Personally Identifiable Information (PIIs). Compliance requires adherence to 110 security requirements based on NIST SP 800-171 Rev. 2. Assessments are conducted by third-party organizations known as CMMC Third Party Assessment Organizations (C3PAO) tri-annually or through an annual self-assessment, depending on the sensitivity of the underlying CUIs.</li>
<li><span style="color: #53548a;"><strong>Expert</strong> </span>(Level 3): Targets organizations handling CUI for DoD programs with the highest priority. Compliance entails adhering to the 110 security requirements based on NIST SP 800-171 Rev 2 and an <span style="color: #53548a;"><strong>additional 24 security requirements</strong></span> based on NIST SP 800-172. These organizations undergo tri-annual assessments conducted by the DoD’s Defense Industrial Base Cybersecurity Assessment Center (DIBCAC).</li>
</ul>
<p style="text-align: justify;">Organizations must obtain a CMMC Level 2 Final Certification before scheduling a DIBCAC assessment for CMMC Level 3.</p>
<p style="text-align: justify;">The results of all assessments conducted on DIB organizations are consolidated within the <strong><span style="color: #53548a;">Supplier Performance Risk System (SPRS)</span></strong>. The SPRS (pronounced “Spurs”) is Department of Defense’s web platform that collects, processes, and retrieves data on supplier performance within the Defense Industrial Base, enabling the DoD to map the DIB&#8217;s business network cyber maturity, assess supplier performance, and evaluate risks related to contractual obligations.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-23041" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN.png" alt="" width="3557" height="1719" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN.png 3557w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-1536x742.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-2048x990.png 2048w" sizes="auto, (max-width: 3557px) 100vw, 3557px" /></p>
<p style="text-align: justify;">By deploying this mandatory certification model, the DoD is at the forefront of establishing a comprehensive, secure, end-to-end supply chain framework within the DIB, hopefully enhancing long-term U.S. national security. Simultaneously, the DoD underscores that security is no longer optional; it is an integral aspect of business operations.</p>
<p><span style="color: #666699;"><strong>CMMC 2.0 assessments are expected to become available around Q4 2024</strong> </span>(once 32 CFR is finalized). <span style="color: #666699;"><strong>Prime contractors will expect sub-contractors to achieve CMMC compliance before Q3 2025</strong></span>, when CMMC 2.0 takes effect. Starting October 1, 2025, CMMC certification will be mandatory at the time of contract award.</p>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;">If you require assistance navigating the intricate landscape of CMMC 2.0 compliance or need support on your path to certification, <span style="color: #53548a;"><strong>#Wavestone is ready to empower your journey</strong>.</span> Reach out today and elevate your cybersecurity readiness into a strategic advantage.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/">The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Bug Bounty: Insight and benchmark on the banking and public sectors 2024</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/02/bug-bounty-insight-and-benchmark-on-the-banking-and-public-sectors-2024/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/02/bug-bounty-insight-and-benchmark-on-the-banking-and-public-sectors-2024/#respond</comments>
		
		<dc:creator><![CDATA[Jérôme de Lisle]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 09:34:52 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[BugBounty]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22539</guid>

					<description><![CDATA[<p>About the study: This study is based on publicly available data up to Q3 2023 and aims to outline the various active Vulnerability Disclosure initiatives within the 100 largest banks and the EU countries. Bug Bounty? A Bug Bounty program...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/02/bug-bounty-insight-and-benchmark-on-the-banking-and-public-sectors-2024/">Bug Bounty: Insight and benchmark on the banking and public sectors 2024</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><strong>About the study</strong>: This study is based on publicly available data up to Q3 2023 and aims to outline the various active Vulnerability Disclosure initiatives within the 100 largest banks and the EU countries.</p>
<p style="text-align: justify;"><strong>Bug Bounty?</strong> A Bug Bounty program is a crowdsourcing initiative wherein ethical hackers are rewarded by companies for finding and reporting vulnerabilities.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In the ever-evolving landscape of cybersecurity, the banking and public sectors have increasingly embraced various vulnerability disclosure initiatives. Reflecting on <a href="https://www.riskinsight-wavestone.com/en/2021/01/bug-bounty-insight-and-benchmark-on-the-banking-industry-2021/">Wavestone&#8217;s 2021 report</a>, it&#8217;s crucial to understand the three key approaches that shaped the previous research:</p>
<ul style="text-align: justify;">
<li><strong>Vulnerability Report Channels</strong> (VRCs): These are the first step toward a bug bounty program, a web page providing basic instructions to hackers and a reporting channel.</li>
<li><strong>Vulnerability Disclosure Policies</strong> (VDPs): These policies outline how an organization receives and responds to disclosed vulnerabilities from external parties. The existence of a VDP implies the presence of a VRC as part of its framework.</li>
<li><strong>Bug Bounty Programs</strong> (BBPs): An advanced form of VDPs, and alongside the policy, BBPs offer financial rewards for reporting security vulnerabilities, incentivizing the discovery and disclosure of security issues. It can be accessible to anyone (public) or a small number of hackers (private).</li>
</ul>
<p style="text-align: justify;">These initiatives are not just procedural but bring significant benefits. They enable earlier detection of vulnerabilities, foster a culture of transparency and continuous improvement, and leverage the global cybersecurity community&#8217;s expertise to enhance security measures. By incentivizing ethical hacking, organizations can stay one step ahead of potential threats, protecting their data and systems more effectively.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>Overview of Research</strong></h2>
<p style="text-align: justify;">This study, leveraging data up to Q3 2023, examines the adoption and impact of these cybersecurity measures in the banking and public sectors. The research methodology involves a thorough analysis of current trends, regulatory landscapes, and the effectiveness of BBPs in enhancing digital security.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>Banking sector insights</strong></h2>
<p style="text-align: justify;">The banking sector, serving as the backbone of the global financial system, has shown a remarkable transformation in its approach to cybersecurity. The analysis of the world’s top 100 banks between <a href="https://www.riskinsight-wavestone.com/en/2021/01/bug-bounty-insight-and-benchmark-on-the-banking-industry-2021/">2020</a> and 2023 reveals significant developments in the adoption of cybersecurity measures. Here are some key insights:</p>
<ul style="text-align: justify;">
<li><strong>Increase of VRCs and VDPs</strong>: There was a marked increase in the implementation of VRCs and VDPs, by 2023, 34% of the top 100 banks had at least one active VRC, and 26% had implemented a VDP.</li>
<li><strong>Geographical Trends</strong>:
<ul style="text-align: justify;">
<li><strong>Dominance in Europe and North America</strong>: Banks located in the United States and European countries demonstrated higher adoption rates of VRCs and VDPs. Delving deeper into the continent analysis, Figure 1 shows that North America, with 72% of banks implementing VRCs against Europe’s 49%, continues to be ahead in adopting cybersecurity initiatives.</li>
</ul>
</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-22522 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image1.png" alt="" width="481" height="167" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image1.png 481w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image1-437x152.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image1-71x25.png 71w" sizes="auto, (max-width: 481px) 100vw, 481px" /></p>
<ul style="text-align: justify;">
<li style="list-style-type: none;">
<ul style="text-align: justify;">
<li><strong>Asia and South America</strong>: Despite managing 46% of the assets across 43 banks, only one implemented a VDP, indicating a slower pace of adopting for these kinds of programs.</li>
</ul>
</li>
<li><strong>Stale number of Public BBPs:</strong> The data showed a stagnation in the number of public BBPs, with only 5% of the banks operating a public BBP as of 2023. This suggests a cautious approach towards publicly inviting vulnerability disclosures.</li>
<li><strong>Notable Countries</strong>: The Netherlands stands out with a 100% adoption rate of vulnerability disclosure programs among its top banks. This demonstrates a strong national commitment to cybersecurity.</li>
<li><strong>Platform Utilization</strong>: Most banks preferred developing in-house programs for vulnerability disclosure, with a few opting for external platforms like BugCrowd, Synack, and HackerOne.</li>
</ul>
<p> </p>
<h2 style="text-align: justify;"><strong>Luxembourg: A Case Study</strong></h2>
<p style="text-align: justify;">Luxembourg&#8217;s banking sector case study focused on 5 retail and 17 private banks, provides a snapshot of current cybersecurity practices:</p>
<ul style="text-align: justify;">
<li><strong>Overall low Adoption Rates:</strong> Only a minority of the 22 banks have embraced structured cybersecurity programs. Specifically, only 7 out of 22 banks have established VRCs, including only 5 banks which adopted VDPs and just 1 bank which implemented a Public BBP.</li>
<li><strong>External hacker Interest</strong>: Some banks received external reports through OpenBugBounty.org, demonstrating hackers&#8217; interest in showing vulnerabilities, despite not having a formal active program.</li>
<li><strong>Overall Trend</strong>: The sector shows a need for more consistent adoption of structured cybersecurity strategies, especially considering the high stakes in private banking.</li>
</ul>
<p> </p>
<h2 style="text-align: justify;"><strong>Public Sector Analysis and Regulation</strong></h2>
<p style="text-align: justify;">The public sector&#8217;s approach to cybersecurity, especially within the EU27, shows a complex and evolving landscape. Key aspects of this analysis include:<img loading="lazy" decoding="async" class="wp-image-22524  alignright" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image2.png" alt="" width="342" height="353" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image2.png 525w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image2-185x191.png 185w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Image2-38x39.png 38w" sizes="auto, (max-width: 342px) 100vw, 342px" /></p>
<ul style="text-align: justify;">
<li><strong>Growth in Coordinated Vulnerability Disclosure (CVD): </strong>Compared with <a href="https://www.enisa.europa.eu/news/enisa-news/coordinated-vulnerability-disclosure-policies-in-the-eu">ENISA&#8217;s 2021 study</a>, there has been a significant increase in the adoption of active CVD policies. The number of EU27 Member States with active CVD has risen from 4 to 11, indicating a growing emphasis on structured cybersecurity strategies.</li>
<li><strong>The UK&#8217;s Proactive Stance</strong>: Despite being outside the EU27, the United Kingdom has made remarkable efforts in implementing active CVD. This highlights the UK&#8217;s commitment to maintaining robust cybersecurity standards.</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Conclusion and Future Outlook</strong></h2>
<p style="text-align: justify;">As the digital world advances, the significance of vulnerability disclosure programs is increasingly clear. They represent not just a trend, but a fundamental shift in how organizations approach cybersecurity:</p>
<ul style="text-align: justify;">
<li><strong>The Rise of Vulnerability Disclosure</strong>: A dynamic and rapidly expanding area, these programs are becoming essential in the banking and public sectors.</li>
<li><strong>European Regulatory Momentum</strong>: With the EU&#8217;s NIS2 directive and forthcoming legislations like the CRA, there is a robust push for national CVD policies and organizational VDPs/BBPs.</li>
</ul>
<p style="text-align: justify;">At <strong>Wavestone</strong>, we understand the importance of staying ahead in this evolving scenario. We are here to help you navigate these changes effectively. Reach out to us for expert guidance in strengthening your cybersecurity position.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/02/bug-bounty-insight-and-benchmark-on-the-banking-and-public-sectors-2024/">Bug Bounty: Insight and benchmark on the banking and public sectors 2024</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/02/bug-bounty-insight-and-benchmark-on-the-banking-and-public-sectors-2024/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Quest for Cybersecurity’s Purple Squirrels: How to Find and Keep Them</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/12/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/12/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them/#respond</comments>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Fri, 22 Dec 2023 13:35:02 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[talent management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22115</guid>

					<description><![CDATA[<p>“Talent shortage”, “skills gap”, “employee burnout in cybersecurity”, “high turnover rate” – as a cybersecurity professional, you must be familiar with these expressions, for better or for worse. You may have seen the big headlines pointing out talent shortage issues...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/12/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them/">The Quest for Cybersecurity’s Purple Squirrels: How to Find and Keep Them</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">“Talent shortage”, “skills gap”, “employee burnout in cybersecurity”, “high turnover rate” – as a cybersecurity professional, you must be familiar with these expressions, for better or for worse.</p>
<p style="text-align: justify;">You may have seen the big headlines pointing out talent shortage issues in the latest news &#8211; that is sadly not a fake news. The talent war really exists in the cybersecurity market. Over the past months, we read numerous articles, academic papers, reports on this emerging subject; we discussed with CISO and Talent Managers (a real full-time job!) and the 3 main challenges remain the same: <strong>how to recruit, manage and nurture our talents?</strong></p>
<p style="text-align: justify;">In this article, we have compiled the different situations, our observations, and the initial lessons we can draw from the actions put in place to meet these challenges.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>Take a moment to analyse the strengths and weaknesses of your team to identify the complementary skills and competencies you need to look for…</strong></h2>
<p style="text-align: justify;">Beyond just filling the roles, it is essential to gain a strategic vision of the skills to draw up a sustained cyber division. Your mantra for this stage must be: “Getting the right people for today… and tomorrow!”.</p>
<p style="text-align: justify;"><strong>When people’ skills match their roles, tasks are performed efficiently, with everyone contributing to a more (cyber)secure organization.</strong> I doubt anyone will contradict me here, but it&#8217;s often easier said than done.</p>
<p style="text-align: justify;">Here are the first questions you can ask yourself to get moving in the right direction…</p>
<p style="text-align: justify;">Do you know what you need? Have you defined all the cyber activities you need to run? Have you defined your “make or buy” (internalization vs outsourcing) strategy? Have you identified the skills and the people needed to run these activities?</p>
<p style="text-align: justify;">This is a non-exhaustive list of questions that as an organisation you should ask yourself to better capture your need and know your people before launching a roadmap of actions.</p>
<p style="text-align: justify;">Knowing your need and team is important as it: (1) <strong>helps for task allocation: </strong>before, cyber teams were smaller, therefore, versatility was crucial. Nowadays, bigger cyber teams make specialization possible and facilitate the optimization of complementary skills (2) <strong>helps to</strong> <strong>target training and development</strong>: having a clear vision on your team and its activities helps you identify skill gaps and provide the appropriate training and development opportunities to the people who need it the most. With the identified missing skills in one hand, and the identified needs in another hand, you can start seeking for your ideal candidates thanks to a job offer that speaks volumes (but don’t look for purple squirrels, they don’t exist)!</p>
<p style="text-align: justify;">Keep an eye on the upcoming insights and focus on the cyber job descriptions topic! <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Fueling Team Today, Attracting Tomorrow: The recipe for Sustained Cyber Teams</strong></h2>
<p style="text-align: justify;">That is to concretely explain what cyber is and what its activities are. #transparency</p>
<p style="text-align: justify;">Based on the discussions with CISO and Talent Managers, being transparent on the job description works and gives people a sense of belonging and purpose, which in turns promotes a better teamwork.</p>
<p style="text-align: justify;">Let us share some concrete and easy actions that you can do to get things moving:</p>
<ul style="text-align: justify;">
<li><strong>Promote internally the cyber jobs and the <em>people</em> behind the jobs:</strong> by explaining concretely what working in cybersecurity means, what the positions available are, and what the people really do, you can inspire people to join your team, increase internal mobilities, strengthen the sense of belonging to the cyber division, and give perspective to your team.</li>
<li><strong>Promote externally your cybersecurity activities:</strong> make yourself visible by participating to cyber associations and key conferences (school events, collaborations with universities, research institutions, or organisations, etc.).
<ul>
<li>Organise/participate to upskilling/reskilling workshops (transferable skills).</li>
</ul>
</li>
<li>Include inspiring people in your recruitment process and branding (such as CISO, team lead, etc.</li>
</ul>
<p> </p>
<p style="text-align: justify;">Cybersecurity is still an obscure topic for those outside the cyber world. To fix that, everyone needs to start explaining what they do.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Mastering the art of taking care of your people</strong></h2>
<p style="text-align: justify;">By now, you must know that it’s a great asset to know who your team is, who your people are, who you really need to run the cyber activities, to have a great branding to attract people. But what will make the difference in the long run is to take good care of your people by offering a safe work environment and giving perspectives of evolution. When what is coming next is clear, it is easier for the people to project themselves in the company in the years to come.</p>
<p style="text-align: justify;">And before taking care of their people, CISOs also need to take care of themselves. 40% of the CISOs say that they experience “high-stress” on a daily basis and 28% of them are close to burn-out (Cyber Workforce Study, ISC²). Tough to take care of people if you don’t take care of yourself first…</p>
<p style="text-align: justify;">To avoid this, CISOs need to build a trusted relationship with their top management in order to be able to define the strategic objectives, prioritize the activities, obtain the resources, etc. And it is essential to know how to surround themselves with reliable individuals to delegate tasks and create an effective operational strategy.</p>
<p style="text-align: justify;"><strong>Recruiting is just the beginning of the journey; nurturing is the ultimate goal.</strong> Nevertheless, organisations tend to forget (<em>neglect</em>) this last, but perhaps most important point. It’s like getting an ISO 27001 certification, quite easy (of course, it requires work!) but maintaining it, is the real deal.</p>
<p style="text-align: justify;">In order to provide perspectives for team members, we need to establish career paths with their “pathways” and the means available to evolve on these paths: skills required per job and key milestones, training catalogue, internal mobilities, personalized evaluation process, etc.</p>
<p style="text-align: justify;">Nurturing your talents means helping them to develop and strengthen their skills/capabilities through <strong>trainings</strong>, teamwork with colleagues or with cyber associations, giving them <strong>perspective</strong> of evolution/growth within your company. As a human-being, we need to know where we stand and where we are going, we need a vision to get us moving (in our life #existentialcrises).</p>
<p style="text-align: justify;">If we take the example of the Maslow’s hierarchy of needs, people need to have a sense of belonging and feel that they are useful. Thus, part of nurturing talents also means <strong>creating a “team spirit”</strong> via rituals. It is not a secret that a friendly work environment/atmosphere is a crucial criterion when choosing a job and can increase people’ productivity by 12% (University of Warwick, UK), especially for young people nowadays.</p>
<p style="text-align: justify;">Giving perspective of growth/evolution is essential, especially for experts. Many organizations still view management as the only path to success, but in certain sectors like industry, we can observe a shift. Expertise is increasingly valued as an alternative success route to management; some may combine both, but it is not a necessity. Therefore, expertise circles are key to give recognition to experts in and outside of their organisations &#8211; give them the opportunity to attend specific cyber events that can also enables them to grow their network and acquire more skills.</p>
<p style="text-align: justify;">In a nutshell, attracting and nurturing talents take time, and talent recruitment emerges as a pivotal element in corporate strategies. By embracing diversity and promoting gender convergence, we venture into new dimensions to build robust, thoughtful, and resilient teams.</p>
<p style="text-align: justify;">We aim to open the cyber field to those unfamiliar, fostering diversity, and creating vocations. Let&#8217;s reach out to people; and let&#8217;s not wait for them to come to us.</p>
<p style="text-align: justify;"><strong><em> </em></strong></p>
<p style="text-align: justify;">We have created a benchmark tool to explore this multi-faceted topic (along with the ongoing research) and assess organisation’s maturity. Reach out to us if you would like to be part of it! We would be very delighted to share with you the good ideas we have collected on the market… and the traps to avoid.</p>
<p style="text-align: justify;"><strong>Unicorns </strong>(don’t misunderstand me, I am not talking about start-ups),<strong> Purple Squirrels, Ninja, Rockstars, don’t exist but if we combine diverse profiles, we can get this highly qualified team! </strong><strong><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f60e.png" alt="😎" class="wp-smiley" style="height: 1em; max-height: 1em;" /></strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/12/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them/">The Quest for Cybersecurity’s Purple Squirrels: How to Find and Keep Them</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/12/the-quest-for-cybersecuritys-purple-squirrels-how-to-find-and-keep-them/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity: an essential part of the Due Diligence</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/11/cybersecurity-an-essential-part-of-the-due-diligence/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/11/cybersecurity-an-essential-part-of-the-due-diligence/#respond</comments>
		
		<dc:creator><![CDATA[Florian Chabre]]></dc:creator>
		<pubDate>Mon, 27 Nov 2023 13:58:22 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Cyber risks]]></category>
		<category><![CDATA[due diligence]]></category>
		<category><![CDATA[M&A]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=21900</guid>

					<description><![CDATA[<p>Confidential and strategic, the due diligence phase that precedes an acquisition regularly takes place behind closed doors. This phase aims to analyse the target company for an acquisition, in order to determine its level of maturity and compliance on various...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/11/cybersecurity-an-essential-part-of-the-due-diligence/">Cybersecurity: an essential part of the Due Diligence</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Confidential and strategic, the due diligence phase that precedes an acquisition regularly takes place behind closed doors. This phase aims to analyse the target company for an acquisition, in order to determine its level of maturity and compliance on various aspects (strategic, legal, financial, accounting, etc.) and confirm the relevance of the operation.</p>
<p style="text-align: justify;">Acquisitions are an ideal time for attackers. With heterogeneous levels of security or uncontrolled interconnections, it becomes possible to attack the acquiring company by rebound, using the acquired company as a gateway.</p>
<p style="text-align: justify;">To manage these risks, <strong>cybersecurity must be a key factor</strong> in the success of acquisitions and mergers, <strong>from the due diligence phase</strong> onwards.</p>
<p> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-21978" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1.png" alt="" width="3409" height="1866" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1.png 3409w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1-349x191.png 349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1-768x420.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1-1536x841.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture-1-1-2048x1121.png 2048w" sizes="auto, (max-width: 3409px) 100vw, 3409px" /></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Variable </strong>cyber needs</h2>
<p style="text-align: justify;">Cyber due diligence can bring significant value to cyber, IT and business teams. The results can be used to support decision-making at several levels.</p>
<ol style="text-align: justify;">
<li><strong>Understanding the level of maturity of the target company:</strong> analysing security practices and identifying gaps in relation to the acquirer&#8217;s standards in order to understand the cyber risks incurred during the integration of the new IS.</li>
<li><strong>Test the level of security of a solution (mainly IT or Cyber): </strong>ensure security and resilience to confirm the value assessment (compliance with secure development practices, absence of critical vulnerabilities, preventive security measures, etc.).</li>
<li><strong>Estimate the cost of the integration:</strong> assess the cost of upgrading on the basis of the security debt and the charts to check the relevance of the operation and negotiate the acquisition price which absorbs the integration costs as far as possible.</li>
<li><strong>Assess reputational risks:</strong> ensure compliance with regulations, particularly on personal data, and the absence of intrusions that could damage the reputation of the acquirer after the transfer of ownership.</li>
</ol>
<p style="text-align: justify;">Cyber due diligence remains nonetheless a special exercise. The company under review (target) does not yet belong to the acquiring company, and the constraints imposed by the teams in charge of the operation or by business teams can be tough.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>A </strong>business context <strong>to take into account when choosing the cyber due diligence method</strong></h2>
<p style="text-align: justify;"><strong><u>On the acquirer&#8217;s side:</u></strong></p>
<ul style="text-align: justify;">
<li><strong>The budget:</strong> the choice of method is correlated to the availability of cyber security teams or a dedicated budget for calling in an external service. It is preferable to secure a contingency with the M&amp;A teams before any operation, to leave yourself a margin of choice.</li>
<li><strong>Time:</strong> business or competitive constraints can have an impact on the due diligence period. The choice of method depends fundamentally on the time given to the cyber teams to conduct their investigation.</li>
</ul>
<p style="text-align: justify;"><strong><u>On the identified company side: </u></strong></p>
<ul style="text-align: justify;">
<li><strong>Size:</strong> the due diligence method must be consistent with the size of the target company&#8217;s information system, the nature of its assets and the types of technology used.</li>
<li><strong>The &#8220;balance of power&#8221;:</strong> the difference in weight between the acquirer and the target company has a major influence on the possibility of conducting an in-depth and transparent cyber analysis (ability to obtain information, evidence, interviews, tests, etc.).</li>
<li><strong>The core business:</strong> the valuation must focus on what makes the identified company valuable, particularly when it comes to an IT product or know-how.</li>
</ul>
<p style="text-align: justify;">Based on these criteria, as well as existing processes, the cyber and M&amp;A teams work together to choose the method best suited to their needs and the situation.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Cyber due diligence for every operation</strong></h2>
<p style="text-align: justify;"><strong><u>Non-intrusive methods </u></strong></p>
<p style="text-align: justify;">The cybersecurity team may opt for non-intrusive due diligence methods when they have limited resources or when the target company is coveted by other potential acquirers.</p>
<p style="text-align: justify;">1) <strong>The security essentials questionnaire</strong> is used to measure the pre-identified company&#8217;s maturity in terms of the key areas. It has the advantage of being easy to deploy, without imposing a major burden on either the target company or the acquirer.</p>
<ul style="text-align: justify;">
<li><strong>Our conviction:</strong> <em>it is particularly well suited to assessing the cyber maturity of small companies (fewer than 50 employees). This questionnaire is to be defined by the cyber security teams in collaboration with the IT and M&amp;A teams.</em></li>
</ul>
<p style="text-align: justify;">2)<strong> &#8220;Automatic&#8221; cyber-scoring tools</strong> can be used to measure the level of security of assets exposed on the Internet. They have the advantage of providing security teams with an immediate view. Beware, however, that their results can be simplistic, as these tools only focus on the tip of the iceberg (what about partner management, cloud security, etc.).</p>
<ul style="text-align: justify;">
<li><strong>Our conviction:</strong> <em>we do not recommend prioritising their use in a cyber due diligence context, but they do have the advantage of providing a wealth of additional information quickly if your company has already subscribed to an offer.</em></li>
</ul>
<p style="text-align: justify;"><strong><u>In-depth methods</u></strong></p>
<p style="text-align: justify;">The cybersecurity team can opt for more in-depth due diligence methods when they have the human or financial resources and a &#8220;favourable balance of power&#8221; in the negotiation of the operation.</p>
<p style="text-align: justify;">1) <strong>The Due Diligence questionnaire, based on the acquirer&#8217;s internal cyber standards</strong>, is used to measure the target company&#8217;s level of maturity and to identify any deviations from its own policies and standards, an essential prerequisite for quantifying the potential cyber integration costs.</p>
<ul style="text-align: justify;">
<li><strong>Our conviction:</strong> <em>this is the most widely used method on the market, and enables us to prepare for the integration (integration scenario, cost scenario, planning, etc.). This questionnaire is to be defined by the cyber security teams in collaboration with the IT and M&amp;A teams.</em></li>
</ul>
<p style="text-align: justify;">2) <strong>Cyber assessment platforms</strong> (such as Cybervadis, Risk Ledger, CyberGRX…) can be used to assess the target company&#8217;s level of maturity in relation to benchmark security standards, and sometimes even to obtain upgrade action plans.</p>
<ul style="text-align: justify;">
<li><strong>Our conviction: </strong><em>the use of platforms is worthwhile if the target company is already registered/assessed. This also allows to pool resources with your &#8220;third party&#8221; approach (see RiskInsight article on third party management <a href="https://www.riskinsight-wavestone.com/en/2020/11/how-to-define-an-effective-third-party-cyber-risk-management-strategy/">here</a>). Otherwise, it often takes too long.</em></li>
</ul>
<p style="text-align: justify;">3) <strong>The technical audit</strong> provides an in-depth measurement of the level of exposure of a company or asset. Although penetration testing remains the most comprehensive audit, there are other types of tests that are easier to implement in a due diligence context (AD configuration scan, architecture audit, EDR report, report on penetration tests already carried out, etc.).</p>
<ul style="text-align: justify;">
<li><strong>Our conviction:</strong> <em>it is generally impossible to carry out tests before closing (the assets have not yet been purchased). In the absence of comprehensive tests, the free version of PingCastle provides a simple, accurate and rapid overview of the security level of Active Directories.</em></li>
</ul>
<p style="text-align: justify;">While Cyber Due Diligence is a necessary pre-requisite for all M&amp;A operations, it should serve as a leitmotiv for bringing together cybersecurity, M&amp;A, and IT teams to best guide companies in their transformation.</p>
<p style="text-align: justify;">Finally, there are situations in which Cyber Due Diligence could not be carried out (confidentiality, tight schedule, competitive pressure at the time of the operation, etc.). Cyber Due Diligence is often transformed into a 360° audit carried out post-signing/closing. This audit has a new objective: to help define the integration strategy.</p>
<p>&#8211;</p>
<p>We&#8217;d like to thank Arielle Attias for her contribution to the writing of this article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/11/cybersecurity-an-essential-part-of-the-due-diligence/">Cybersecurity: an essential part of the Due Diligence</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/11/cybersecurity-an-essential-part-of-the-due-diligence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI: Discover the 5 most frequent questions asked by our clients!</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/#respond</comments>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Wed, 08 Nov 2023 11:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[chatgpt]]></category>
		<category><![CDATA[Regulations]]></category>
		<category><![CDATA[risks]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=21818</guid>

					<description><![CDATA[<p>The dawn of generative Artificial Intelligence (GenAI) in the corporate sphere signals a turning point in the digital narrative. It is exemplified by pioneering tools like OpenAI’s ChatGPT (which found its way into Bing as “Bing Chat, leveraging the GPT-4...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/">AI: Discover the 5 most frequent questions asked by our clients!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The dawn of generative Artificial Intelligence (GenAI) in the corporate sphere signals a turning point in the digital narrative. It is exemplified by pioneering tools like OpenAI’s ChatGPT (which found its way into Bing as “Bing Chat, leveraging the GPT-4 language model) and Microsoft 365’s Copilot. These technologies have graduated from being mere experimental subjects or media fodder. Today, they lie at the heart of businesses, redefining workflows and outlining the future trajectory of entire industries.</p>
<p style="text-align: justify;">While there have been significant advancements, there are also challenges. For instance, Samsung’s sensitive data was exposed on ChatGPT by employees (the entire source code of a database download program)<a href="#_ftn1" name="_ftnref1">[1]</a>. Compounding these challenges, ChatGPT [OpenAI] itself underwent a security breach that affected over 100 000 users between June 2022 and May 2023, with those compromised credentials now being traded on the Dark web<a href="#_ftn2" name="_ftnref2">[2]</a>.</p>
<p style="text-align: justify;">At this digital crossroad, it’s no wonder that there’s both enthusiasm and caution about embracing the potential of generative AI. Given these complexities, it’s understandable why many grapple with determining the optimal approach to AI. With that in mind, the article aims to address the most representative questions asked by our clients.</p>
<h2 style="text-align: justify;"><span style="color: #732196;">Question 1: Is Generative AI just a buzz?</span></h2>
<p style="text-align: justify;">AI is a collection of theories and techniques implemented with the aim of creating machines capable of simulating the cognitive functions of human intelligence (vision, writing, moving&#8230;). A particularly captivating subfield of AI is “Generative AI”. This can be defined as a discipline that employs advanced algorithms, including artificial neural networks, to <strong>autonomously craft content</strong>, whether it’s text, images, or music. Moving on from your basic banking chatbot answering aside all your question, GenAI not only just mimics capabilities in a remarkable way, but in some cases, enhances them.</p>
<p style="text-align: justify;">Our observation on the market: the reach of generative AI is broad and profound. It contributes to diverse areas such as content creation, data analysis, decision-making, customer support and even cybersecurity (for example, by identifying abnormal data patterns to counter threats). We’ve observed 3 fields where GenAI is particularly useful.</p>
<p> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-21820" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1.png" alt="" width="605" height="341" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1-69x39.png 69w" sizes="auto, (max-width: 605px) 100vw, 605px" /></p>
<h3> </h3>
<h3>Marketing and customer experience personalisation</h3>
<p style="text-align: justify;">GenAI offers insights into customer behaviours and preferences. By analysing data patterns, it allows businesses to craft tailored messages and visuals, enhancing engagement, and ensuring personalized interactions.</p>
<h3>No-code solutions and enhanced customer support</h3>
<p style="text-align: justify;">In today’s rapidly changing digital world, the ideas of no-code solutions and improved customer service are increasingly at the forefront. Bouygues Telecom is a good example of a leveraging advanced tools. They are actively analysing voice interactions from recorded conversations between advisors and customers, aiming to improve customer relationships<a href="#_ftn3" name="_ftnref3">[3]</a>. On a similar note, Tesla employs the AI tool “<a href="https://www.youtube.com/watch?v=1mP5e5-dujg">Air AI</a>” for seamless customer interaction, handling sales calls with potential customers, even going so far as to schedule test drives.</p>
<p style="text-align: justify;">As for coding, an interesting experiment from one of our clients stands out. Involving 50 developers, the test found that 25% of the AI-generated code suggestions were accepted, leading to a significant 10% boost in productivity. It is still early to conclude on the actual efficiency of GenAI for coding, but the first results are promising and should be improved. However, the intricate issue of intellectual property rights concerning this AI-generated code continues to be a topic of discussion.</p>
<h3>Documentary watch and research tool</h3>
<p style="text-align: justify;">Using AI as a research tool can help save hours in domains where regulatory and documentary corpus are very extensive (e.g.: financial sector). At Wavestone, we internally developed two AI tools. The first, CISO GPT, allows users to ask specific security questions in their native language. Once a question is asked, the tool scans through extensive security documentation, efficiently extracting and presenting relevant information. The second one, a Library and credential GPT, provides specific CVs from Wavestone employees, as well as references from previous engagements for the writing of commercial proposals.</p>
<p style="text-align: justify;">However, while tools like ChatGPT (which draws data from public databases) are undeniably beneficial, the game-changing potential emerges when companies tap into their proprietary data. For this, companies need to implement GenAI capabilities internally or setup systems that ensure the protection of their data (cloud-based solution like Azure OpenAI or proprietary models). <strong>From our standpoint, GenAI is worth more than just the buzz around it and is here to stay. </strong>There are real business applications and true added value, but also security risks. Your company needs to kick-off the dynamic to be able to implement GenAI projects in a secure way.</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #9727b3;"><span style="color: #732196;">Question 2: What is the market reaction to the use of ChatGPT?</span></span></h2>
<p style="text-align: justify;">To delve deeper into the perspective of those at the forefront of cybersecurity, we’ve asked our client’s CISO’s, their opinions on the implications and opportunities of GenAI. Therefore, the following graph illustrates the opinions of CISOs on this subject.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-21822" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2.png" alt="" width="601" height="279" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2.png 601w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2-411x191.png 411w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2-71x33.png 71w" sizes="auto, (max-width: 601px) 100vw, 601px" /></p>
<p style="text-align: justify;">Based on our survey, the feedback from the CISOs can be grouped into three distinct categories:</p>
<h3>The Pragmatists (65%)</h3>
<p style="text-align: justify;">Most of our respondents recognize the potential data leakage risks with ChatGPT, but they equate them to risk encountered on forums or during exchanges on platforms or forums such as Stack Overflow (for developers). They believe that the risk of data leaks hasn’t significantly changed with ChatGPT. However, the current buzz justifies dedicated sensibilization campaigns to emphasize the importance of not using company-specific or sensitive data.</p>
<h3>The Visionaries (25%)</h3>
<p style="text-align: justify;">A quarter of the respondents view ChatGPT as a ground-breaking tool. They’ve noticed its adoption in departments such as communication and legal. They’ve taken proactive steps to understanding its use (which data, which use cases) and have subsequently established a set of guidelines. This is a more collaborative approach to define a use case framework.</p>
<h3>The Sceptics (10%)</h3>
<p style="text-align: justify;">A segment of the market has reservations about ChatGPT. To them, it’s a tool that’s too easy to misuse, receives excessive media attention and carries inherent risks, according to various business sectors. Depending on your activity, this can be relevant when judging that the risk of data leakage and loss of intellectual property is too high compared to the potential benefits.</p>
<p> </p>
<h2><span style="color: #9727b3;"><span style="color: #732196;">Question 3: What are the risks of Generative AI?</span></span></h2>
<p style="text-align: justify;">In evaluating the diverse perspectives on generative AI within organizations, we’ve classified the concerns into four distinct categories of risks, presented from the least severe to the most critical:</p>
<h3>Content alteration and misrepresentation</h3>
<p style="text-align: justify;">Organizations using generative AI must safeguard the integrity of their integrated systems. When AI is maliciously tampered with, it can distort genuine content, leading to misinformation. This can produce biased outputs, undermining the reliability and effectiveness of AI-driven solutions. Specifically, for Large Language Models (LLMs) like GenAI, there’s a notable concern of prompt injections. To mitigate this, organizations should:</p>
<ol style="text-align: justify;">
<li>Develop a malicious input classification system that assesses the legitimacy of a user’s input, ensuring that only genuine prompts are processed.</li>
<li>Limit the size and change the format of user inputs. By adjusting these parameters, the chances of successful prompt injection are significantly reduced.</li>
</ol>
<h3>Deceptive and manipulative threats</h3>
<p style="text-align: justify;">Even if an organization decides to prohibit the use of generative AI, it must remain vigilant about the potential surge in phishing, scams and deepfake attacks. While one might argue that these threats have been around in the cybersecurity realm for some time, the introduction of generative AI intensifies both their frequency and sophistication.</p>
<p style="text-align: justify;">This potential is vividly illustrated through a range of compelling examples. For instance, Deutsche Telekom released an awareness <a href="https://www.youtube.com/watch?v=F4WZ_k0vUDM">video</a> that demonstrates the ability, by using GenAI, to age a young girl’s image from photos/videos available on social media.</p>
<p style="text-align: justify;">Furthermore, HeyGen is a generative AI software capable of dubbing <a href="https://www.youtube.com/watch?v=gQYm_aia5No">videos</a> into multiple languages while retaining the original voice. It’s now feasible to hear Donald Trump articulating in French or Charles de Gaulle conversing in Portuguese.</p>
<p style="text-align: justify;">These instances highlight the potential for attackers to use these tools to mimic a CEO’s voice, create convincing phishing emails, or produce realistic video deepfakes, intensifying detection and defence challenges.</p>
<p style="text-align: justify;">For more information on the use of GenAI by cybercriminals, consult the dedicated RiskInsight <a href="https://www.riskinsight-wavestone.com/en/2023/10/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried/">article</a>.</p>
<h3>Data confidentiality and privacy concerns</h3>
<p style="text-align: justify;">If organizations choose to allow the use of generative AI, they must consider that the vast data processing capabilities of this technology can pose unintended confidentiality and privacy risks. First, while these models excel in generating content, they might leak sensitive training data or replicate copyrighted content.</p>
<p style="text-align: justify;">Furthermore, concerning data privacy rights, if we examine ChatGPT’s privacy policy, the chatbot can gather information such as account details, identification data extracted from your device or browser, and information entered in the chatbot (that can be used to train the generative AI)<a href="#_ftn4" name="_ftnref4">[4]</a>. According to article 3 (a) of OpenAI’s general terms and conditions, input and output belong to the user. However, since these data are stored and recorded by Open AI, it poses risks related to intellectual property and potential data breaches (as previously noted in the Samsung case). Such risks can have significant reputational and commercial impact on your organization.</p>
<p style="text-align: justify;">Precisely for these reasons, OpenAI developed the ChatGPT Business subscription, which provides enhanced control over organizational data (such as AES-256 encryption for data at rest, TLS 1.2+ for data in transit, SSO SAML authentication, and a dedicated administration console)<a href="#_ftn5" name="_ftnref5">[5]</a>. But in reality, it&#8217;s all about the trust you have in your provider and the respect of contractual commitments. Additionally, there&#8217;s the option to develop or train internal AI models using one&#8217;s own data for a more tailored solution.</p>
<h3>Model vulnerabilities and attacks</h3>
<p style="text-align: justify;">As more organizations use machine learning models, it’s crucial to understand that these models aren’t fool proof. They can face threats that affect their reliability, accuracy or confidentiality, as it will be explained in the following section.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span style="color: #9727b3;"><span style="color: #732196;">Question 4: How can an AI model be attacked?</span></span></h2>
<p style="text-align: justify;">AI introduces added complexities atop existing network and infrastructure vulnerabilities. It’s crucial to note that these complexities are not specific to generative AI, but they are present in various AI models. Understanding these attack models is essential to reinforcing defences and ensuring the secure deployment of AI. There are three main attack models (non-exhaustive list):</p>
<p style="text-align: justify;">For detailed insights on vulnerabilities in Large Language Models and generative AI, refer to the <a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/assets/PDF/OWASP-Top-10-for-LLMs-2023-v05.pdf">“OWASP Top 10 for LLM”</a> by the Open Web Application Security Project (OWASP).</p>
<h3>Evasion attacks</h3>
<p style="text-align: justify;">These attacks target AI by manipulating the inputs of machine learning algorithms to introduce minor disturbances that result in significant alterations to the outputs. Such manipulations can cause the AI model to classify inaccurately or overlook certain inputs. A classic example would be altering signs to deceive AI self-driving cars (have identify a “stop” sign into a “priority” sign). However, evasion attacks can also apply to facial recognition. One might use subtle makeup patterns, strategically placed stickers, special glasses, or specific lighting conditions to confuse the system, leading to misidentification.</p>
<p style="text-align: justify;">Moreover, evasion attacks extend beyond visual manipulation. In voice command systems, attackers can embed malicious commands within regular audio content in such a way that they’re imperceptible to humans but recognizable by voice assistants. For instance, researchers have demonstrated adversarial audio techniques targeting speech recognition systems, like those in voice-activated smart speaker systems such as Amazon’s Alexa. In one scenario, a seemingly ordinary song or commercial could contain a concealed command instructing the voice assistant to make an unauthorized purchase or divulge personal information, all without the user’s awareness<a href="#_ftn6" name="_ftnref6">[6]</a>.</p>
<h3>Poisoning</h3>
<p style="text-align: justify;">Poisoning is a type of attack in which the attacker altered data or model to modify the ML algorithm’s behaviour in a chosen direction (e.g to sabotage its results, to insert a backdoor). It is as if the attacker conditioned the algorithm according to its motivations. Such attacks are also called causative attacks.</p>
<p style="text-align: justify;">In line with this definition, attackers use causative attacks to guide a machine learning algorithm towards their intended outcome. They introduced malicious samples into the training dataset, leading the algorithm to behave in unpredictable ways. A notorious example is Microsoft’s chatbot, TAY, that was unveiled on Twitter in 2016. Designed to emulate and converse with American teenagers, it soon began acting like a far-right activist<a href="#_ftn7" name="_ftnref7">[7]</a>. This highlights the fact that, in their early learning stages, AI systems are susceptible to the data they encounter. 4Chan users intentionally poisoned TAY’s data with their controversial humour and conversations.</p>
<p style="text-align: justify;">However, data poisoning can also be unintentional, stemming from biases inherent in the data sources or the unconscious prejudices of those curating the datasets. This became evident when early facial recognition technology had difficulties identifying darker skin tones. This underscores the need for diverse and unbiased training data to guard against both deliberate and inadvertent data distortions.</p>
<p style="text-align: justify;">Finally, the proliferation of open-source AI algorithms online, such as those on platforms like Hugging Face, presents another risk. Malicious actors could modify and poison these algorithms to favour specific biases, leading unsuspecting developers to inadvertently integrate tainted algorithms into their projects, further perpetuating biases or malicious intents.</p>
<h3>Oracle attacks</h3>
<p style="text-align: justify;">This type of attack involves probing a model with a sequence of meticulously designed inputs while analysing the outputs. Through the application of diverse optimization strategies and repeated querying, attackers can deduce confidential information, thereby jeopardizing both user privacy, overall system security, or internal operating rules.</p>
<p style="text-align: justify;">A pertinent example is the case of Microsoft’s AI-powered Bing chatbot. Shortly after its unveiling, a Stanford student, Kevin Liu, exploited the chatbot using a prompt injection attack, leading it to reveal its internal guidelines and code name “Sidney”, even though one of the fundamental internal operating rules of the system was to never reveal such information<a href="#_ftn8" name="_ftnref8">[8]</a>.</p>
<p style="text-align: justify;">A previous RiskInsight <a href="https://www.riskinsight-wavestone.com/en/2023/06/attacking-ai-a-real-life-example/">article</a> showed an example of Evasion and Oracle attacks and explained other attack models that are not specific to AI, but that are nonetheless an important risk for these technologies.</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #732196;">Question 5: What is the status of regulations? How is generative AI regulated?</span></h2>
<p style="text-align: justify;">Since our <a href="https://www.riskinsight-wavestone.com/en/2022/06/artificial-intelligence-soon-to-be-regulated/">2022 article</a>, there has been significant development in AI regulations across the globe.</p>
<h3 style="text-align: justify;">EU</h3>
<p style="text-align: justify;">The EU’s digital strategy aims to regulate AI, ensuring its innovative development and use, as well as the safety and fundamental rights of individuals and businesses regarding AI. On June 14, 2023, the European Parliament adopted and amended the proposal for a regulation on Artificial Intelligence, categorizing AI risks into four distinct levels: unacceptable, high, limited, and minimal<a href="#_ftn9" name="_ftnref9">[9]</a>.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-21824" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3.png" alt="" width="605" height="322" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3-359x191.png 359w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3-71x39.png 71w" sizes="auto, (max-width: 605px) 100vw, 605px" /></p>
<h3 style="text-align: justify;">US</h3>
<p style="text-align: justify;">The White House Office of Science and Technology Policy, guided by diverse stakeholder insights, presented the “Blueprint for an AI Bill of Rights”<a href="#_ftn10" name="_ftnref10">[10]</a>. Although non-binding, it underscores a commitment to civil rights and democratic values in AI’s governance and deployment.</p>
<h3 style="text-align: justify;">China</h3>
<p style="text-align: justify;">China’s Cyberspace Administration, considering rising AI concerns, proposed the Administrative Measures for Generative Artificial Intelligence Services. Aimed at securing national interests and upholding user rights, these measures offer a holistic approach to AI governance. Additionally, the measures seek to mitigate potential risks associated with Generative AI services, such as the spread of misinformation, privacy violations, intellectual property infringement, and discrimination. However, its territorial reach might pose challenges for foreign AI service providers in China<a href="#_ftn11" name="_ftnref11">[11]</a>.</p>
<h3 style="text-align: justify;">UK</h3>
<p style="text-align: justify;">The United Kingdom is charting a distinct path, emphasizing a pro-innovation approach in its National AI Strategy. The Department for Science, Innovation &amp; Technology released a white paper titled “AI Regulation: A Pro-Innovation Approach”, with a focus on fostering growth through minimal regulations and increased AI investments. The UK framework doesn’t prescribe rules or risk levels to specific sectors or technologies. Instead, it focuses on regulating the outcomes AI produces in specific applications. This approach is guided by five core principles: safety &amp; security, transparency, fairness, accountability &amp; governance, and contestability &amp; redress<a href="#_ftn12" name="_ftnref12">[12]</a>.</p>
<h3 style="text-align: justify;">Frameworks</h3>
<p style="text-align: justify;">Besides formal regulations, there are several guidance documents, such as NIST’s AI Risk Management Framework and ISO/IEC 23894, that provide recommendations to manage AI-associated risks. They focus on criteria aimed at trusting the algorithms in fine, and this is not just about cybersecurity! It’s about trust.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-21826" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4.png" alt="" width="605" height="340" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4-69x39.png 69w" sizes="auto, (max-width: 605px) 100vw, 605px" /></p>
<p> </p>
<p style="text-align: justify;">With such a broad regulatory landscape, organizations might feel overwhelmed. To assist, we suggest focusing on key considerations when integrating AI into operations, in order to setup the roadmap towards being compliant.</p>
<ul style="text-align: justify;">
<li><strong>Identify all existing AI systems</strong> within the organization and establish a procedure/protocol to identify new AI endeavours.</li>
<li><strong>Evaluate AI systems</strong> using criteria derived from reference frameworks, such as NIST.</li>
<li><strong>Categorize AI systems according to the AI Act’s classification</strong> (unacceptable, high, low or minimal).</li>
<li><strong>Determine the tailored risk management approach</strong> for each category.</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span style="color: #732196;">Bonus Question: This being said, what can I do right now?</span></h2>
<p style="text-align: justify;">As the digital landscape evolves, Wavestone emphasizes a comprehensive approach to generative AI integration. We advocate that every AI deployment undergo a rigorous sensitivity analysis, ranging from outright prohibition to guided implementation and stringent compliance. For systems classified as high risk, it’s paramount to apply a detailed risk analysis anchored in the standards set by ENISA and NIST. While AI introduces a sophisticated layer, foundational IT hygiene should never be side lined. We recommend the following approach:</p>
<ul style="text-align: justify;">
<li><span style="color: #732196;"><strong><em>Pilot &amp; Validate:</em></strong></span> Begin by gauging the transformative potential of generative AI within your organizational context. Moreover, it’s essential to understand the tools at your disposal, navigate the array of available choices, and make informed decisions based on specific needs and use cases.</li>
<li><span style="color: #732196;"><strong><em>Strategic Insight:</em></strong> </span>Based on our client CISO survey, ascertain your ideal AI adoption intensity. Do you resonate with the 10%, 65% or 25% adoption benchmarks shared by your industry peers?</li>
<li><span style="color: #732196;"><strong><em>Risk Mitigation: </em></strong></span>Ground your strategy in a comprehensive risk assessment, proportional to your intended adoption intensity.</li>
<li><span style="color: #732196;"><strong><em>Policy Formulation:</em> </strong></span>Use your risk-benefit analysis as a foundation to craft AI policies that are both robust and agile.</li>
<li><span style="color: #732196;"><strong><em>Continuous Learning &amp; Regulatory Vigilance:</em> </strong></span>Maintain an unwavering commitment to staying updated with the evolving regulatory landscape. Both locally and globally, it’s crucial to stay informed about the latest tools, attack methods, and defensive strategies.</li>
</ul>
<p style="text-align: justify;"><a href="#_ftnref1" name="_ftn1">[1]</a>  <a href="https://www.rfi.fr/fr/technologies/20230409-des-donn%C3%A9es-sensibles-de-samsung-divulgu%C3%A9s-sur-chatgpt-par-des-employ%C3%A9s">Des données sensibles de Samsung divulgués sur ChatGPT par des employés (rfi.fr)</a></p>
<p style="text-align: justify;"><a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://www.phonandroid.com/chatgpt-100-000-comptes-pirates-se-retrouvent-en-vente-sur-le-dark-web.html">https://www.phonandroid.com/chatgpt-100-000-comptes-pirates-se-retrouvent-en-vente-sur-le-dark-web.html</a></p>
<p style="text-align: justify;"><a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://www.cio-online.com/actualites/lire-bouygues-telecom-mise-sur-l-ia-generative-pour-transformer-sa-relation-client-14869.html">Bouygues Telecom mise sur l&#8217;IA générative pour transformer sa relation client (cio-online.com)</a></p>
<p style="text-align: justify;"><a href="#_ftnref4" name="_ftn4">[4]</a> <a href="https://www.bitdefender.fr/blog/hotforsecurity/quelles-donnees-chat-gpt-collecte-a-votre-sujet-et-pourquoi-est-ce-important-pour-votre-confidentialite-numerique/">Quelles données Chat GPT collecte à votre sujet et pourquoi est-ce important pour votre vie privée en ligne ? (bitdefender.fr)</a></p>
<p style="text-align: justify;"><a href="#_ftnref5" name="_ftn5">[5]</a> <a href="https://www.lemondeinformatique.fr/actualites/lire-openai-lance-un-chatgpt-plus-securise-pour-les-entreprises-91387.html">OpenAI lance un ChatGPT plus sécurisé pour les entreprises &#8211; Le Monde Informatique</a></p>
<p style="text-align: justify;"><a href="#_ftnref6" name="_ftn6">[6]</a> <a href="https://ieeexplore.ieee.org/document/8747397">Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System | IEEE Journals &amp; Magazine | IEEE Xplore</a></p>
<p style="text-align: justify;"><a href="#_ftnref7" name="_ftn7">[7]</a> <a href="https://www.washingtonpost.com/news/the-intersect/wp/2016/03/25/not-just-tay-a-recent-history-of-the-internets-racist-bots/">Not just Tay: A recent history of the Internet’s racist bots &#8211; The Washington Post</a></p>
<p style="text-align: justify;"><a href="#_ftnref8" name="_ftn8">[8]</a> <a href="https://www.phonandroid.com/microsoft-comment-un-etudiant-a-oblige-lia-de-bing-a-reveler-ses-secrets.html">Microsoft : comment un étudiant a obligé l&#8217;IA de Bing à révéler ses secrets (phonandroid.com)</a></p>
<p style="text-align: justify;"><a href="#_ftnref9" name="_ftn9">[9]</a> <a href="https://www.europarl.europa.eu/RegData/etudes/BRIE/2021/698792/EPRS_BRI(2021)698792_EN.pdf">Artificial intelligence act (europa.eu)</a></p>
<p style="text-align: justify;"><a href="#_ftnref10" name="_ftn10">[10]</a> <a href="https://www.whitehouse.gov/wp-content/uploads/2022/10/Blueprint-for-an-AI-Bill-of-Rights.pdf">https://www.whitehouse.gov/wp-content/uploads/2022/10/Blueprint-for-an-AI-Bill-of-Rights.pdf</a></p>
<p style="text-align: left;"><a href="#_ftnref11" name="_ftn11">[11]</a> <a href="https://www.china-briefing.com/news/china-to-regulate-deep-synthesis-deep-fake-technology-starting-january-2023/">https://www.china-briefing.com/news/china-to-regulate-deep-synthesis-deep-fake-technology-starting-january-2023/</a></p>
<p style="text-align: justify;"><a href="#_ftnref12" name="_ftn12">[12]</a> <a href="https://www.gov.uk/government/publications/ai-regulation-a-pro-innovation-approach/white-paper">A pro-innovation approach to AI regulation &#8211; GOV.UK (www.gov.uk)</a></p>
<p style="text-align: justify;"> </p>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/">AI: Discover the 5 most frequent questions asked by our clients!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to activate gamification for an impactful Cyber Month</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/#respond</comments>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 15:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[gamification]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=21390</guid>

					<description><![CDATA[<p>Cyber Month is to cybersecurity awareness what the Olympics are to sports: the time to shine, with all eyes on you. Given that human-risk remains significant, with human error accounting for 82% of data breaches according to the 2022 Verizon...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/">How to activate gamification for an impactful Cyber Month</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Cyber Month is to cybersecurity awareness what the Olympics are to sports: the time to shine, with all eyes on you.</p>
<p style="text-align: justify;">Given that human-risk remains significant, with human error accounting for 82% of data breaches according to the <a href="https://www.verizon.com/business/resources/T1ed/reports/dbir/2022-data-breach-investigations-report-dbir.pdf">2022 Verizon Data Breach Investigations Report</a>, no wonder CISOs across European organizations are aiming for the most innovative and ground-breaking activities during this crucial time of the year.</p>
<p style="text-align: justify;">Once key risks have been identified, it&#8217;s go-time: spread priority secure behaviors throughout your organization using the ultimate medium: gamification.</p>
<h2> </h2>
<h2 style="text-align: justify;"><strong>Fail to play, fail the Cyber Month game</strong></h2>
<p style="text-align: justify;">From football matches to Monopoly fights, there is a game for everyone, and whichever your preference goes to, the chosen one will always elicit enthusiasm.</p>
<p style="text-align: justify;">It is then only logical that when meeting an opportunity to learn secure behaviors, employees will favor a game rather than an e-learning that they will have to &#8211; let&#8217;s face it &#8211; painfully sit through.</p>
<p style="text-align: justify;">Gamification is a winner, and although there are many reasons behind this fact, we have selected seven striking pieces of rationale that will shed a light on the benefits that gamification presents in a learning environment.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Gamification increases engagement dramatically</strong></span></h6>
<p style="text-align: justify;">To feel involved in an activity, and therefore reach the holy grail component of attention, <strong>interactivity</strong> is key.</p>
<p style="text-align: justify;">Games require action from the participant, which transforms the latter into a moving cog of their own learning process.</p>
<p style="text-align: justify;">Additionally, the element of <strong>competition</strong>, whether between teams or against a fictitious villain, present in games serves as a powerful motivator, further promoting engagement.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Practice beats theory in a learning context</strong></span></h6>
<p style="text-align: justify;">Practice accounts for <strong>70% of the learning process</strong>. Why so? Because practice allows to make the materials tangible and embed them into real-life situations, that employees can directly link to their everyday practices.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Feedback and rewards stimulate positive behaviors</strong></span></h6>
<p style="text-align: justify;">Games imply prizes and rewards to be earned. Not only does it contribute to foster motivation, but it also allows employees to access <strong>direct positive feedback</strong> about their actions and decisions, which comes with a sense of accomplishment and progress, further embedding the targeted secure behavior.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Games revamp the image of your cyber team</strong></span></h6>
<p style="text-align: justify;">Cyberawareness games have the power to shift the perception that staff hold of your cyber team. Indeed, cybersecurity may seem like an obscure and complex area for many employees.</p>
<p style="text-align: justify;">Offering games helps to make security concepts more<strong> tangible, accessible, and applicable into everyday life</strong>.</p>
<p style="text-align: justify;">Further, if they are held in-person, they allow your cyber team to gain <strong>visibility</strong> with end-users and bring a sense of <strong>recognition and trust</strong>, which in turn will boost the impact of future awareness actions.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Learning together increases team cohesion</strong></span></h6>
<p style="text-align: justify;">As if learning more effectively wasn&#8217;t enough, gamification also offers the valuable benefit of boosting <strong>team spirit</strong>.</p>
<p style="text-align: justify;">Many awareness games provide the opportunity to work collaboratively to attain success. This way, employees leave with fond memories and appreciation on top of precious security tips.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Games allow repetition of security messages in novel and fun ways</strong></span></h6>
<p style="text-align: justify;">When aiming to embed secure behaviors across an organization, repetition is crucial to ensure integration and implementation.</p>
<p style="text-align: justify;">However, repeating awareness communications through the same channels may decrease the attention that employees pay to them.</p>
<p style="text-align: justify;">Games constitute an innovative and enjoyable experience to<strong> reinforce security messages</strong>, making them <strong>stick over time</strong>.</p>
<h6 style="text-align: justify;"><span style="color: #503078;"><strong>Bonus: You collect valuable feedback and inputs from end-users</strong></span></h6>
<p style="text-align: justify;">By interacting with staff through awareness games, your cyber team gets the unique opportunity to collect information on the most urgent security questions that employees ask themselves and uncover which are their biggest challenges in terms of security in their daily activities. This feedback is then useful to <strong>prioritise future awareness messages</strong> and <strong>review or implement processes to facilitate employees&#8217; work life</strong>. For example, if staff repeatedly bring up the fact that they may see suspicious-looking emails but don&#8217;t know how to report them, this may lead to a special awareness campaign meant to remind employees of the way to report phishing emails, and the implementation of a phishing report button to facilitate the reporting process.</p>
<h2> </h2>
<h2 style="text-align: justify;"><strong>L</strong><strong>everaging gamification: The musts for organizing successful awareness games</strong></h2>
<p style="text-align: justify;">Prior to establishing the success factors of an awareness game, let&#8217;s pinpoint what makes a fruitful one.</p>
<p style="text-align: justify;">In order to prove truly effective, an awareness game should see its participants leave the activity with a clear idea of the security behaviors that they will change in their own office life.</p>
<p style="text-align: justify;">To achieve this goal, we have identified a set of <strong>five key criteria</strong>:</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-21392 " src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification.png" alt="" width="492" height="350" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification.png 2144w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-269x191.png 269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-768x546.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-1536x1091.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/09/Image-article-gamification-2048x1455.png 2048w" sizes="auto, (max-width: 492px) 100vw, 492px" /></p>
<p style="text-align: justify;">A solid game will cover a<strong> priority awareness topic</strong>, based on the risks identified for the organization and ranked accordingly.</p>
<p style="text-align: justify;">Then, the right <strong>level of complexity</strong> must be found, based on the level of knowledge of your staff.</p>
<p style="text-align: justify;">Staff who already have a high level of maturity in terms of security behaviors will &#8211; at best &#8211; not learn anything new during an easy game, and &#8211; at worst &#8211; be bored or resentful towards the security awareness team for taking away some of their working time to cover elements they already know.</p>
<p style="text-align: justify;">The reverse scenario would also be problematic: confronting beginner staff with a difficult game would only leave them confused.</p>
<p style="text-align: justify;">Having an<strong> understanding of the level of security maturity of your target audience</strong> is therefore key to adapt the game for optimal results.</p>
<p style="text-align: justify;">Thirdly, the game must have at its center a <strong>compelling story</strong>. The scenario must be intriguing and should unfold seamlessly. Additionally, it should be adapted to the context of the organization so participants relate to the events happening in the game.</p>
<p style="text-align: justify;">To truly catch, and most importantly, retain employees&#8217; attention, the game will have a <strong>strong focus on interactivity</strong>. Interactions can happen between the game master(s) and the players, but also between players themselves when collaborating in the context of the activity.</p>
<p style="text-align: justify;">To further exploit this concept, the game may stimulate the 5 senses to render it even more engaging and immersive.</p>
<p style="text-align: justify;">The final key element to an effective game resides in providing a<strong> good incentive</strong>. Again, there are multiple ways to achieve this: you can for example establish a scoring system to foster playful competition between teams, and implement rewards. Rewards may come in the form of goodies, prizes such as individual or team experiences, or even donations to the charitable organization of the participants&#8217; choice. A solid incentive will boost voluntary participation to the activity, and a decision to participate that comes from the genuine willingness of staff will also be synonymous with higher motivation and involvement in the game for better retention of the shared secure behaviors.</p>
<h2> </h2>
<h2 style="text-align: justify;"><strong>Which awareness game is made for you?</strong></h2>
<p style="text-align: justify;">To make your Cyber Month gamification dreams come true, let&#8217;s jump from theory to practice!</p>
<p style="text-align: justify;">Take the quiz below to find out which cyberawareness game is tailored to your needs and objectives for <strong>maximal impact</strong>.</p>
<p style="text-align: justify;"><a href="https://take.quiz-maker.com/QCMG79JZ3" data-quiz="QCMG79JZ3" data-type="4">Loading&#8230;</a><script>(function(i,s,o,g,r,a,m){var ql=document.querySelectorAll('A[quiz],DIV[quiz],A[data-quiz],DIV[data-quiz]'); if(ql){if(ql.length){for(var k=0;k<ql.length;k++){ql[k].id='quiz-embed-'+k;ql[k].href="javascript:var i=document.getElementById('quiz-embed-"+k+"');try{qz.startQuiz(i)}catch(e){i.start=1;i.style.cursor='wait';i.style.opacity='0.5'};void(0);"}}};i['QP']=r;i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)})(window,document,'script','https://take.quiz-maker.com/3012/CDN/quiz-embed-v1.js','qp');</script></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/">How to activate gamification for an impactful Cyber Month</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/09/how-to-activate-gamification-for-an-impactful-cyber-month/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Engaging the C-Suite on Information Security</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/06/engaging-the-c-suite-on-information-security/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/06/engaging-the-c-suite-on-information-security/#respond</comments>
		
		<dc:creator><![CDATA[Lloyd Barwood]]></dc:creator>
		<pubDate>Tue, 13 Jun 2023 13:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[C-Suite]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Framework]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20710</guid>

					<description><![CDATA[<p>Introduction The ever-increasing threat of cyber-attacks on organisations around the world and their potentially devastating financial, reputational, or operational impact on the business means it has never been more important to position Cyber Security as a major issue in front...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/06/engaging-the-c-suite-on-information-security/">Engaging the C-Suite on Information Security</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 style="text-align: justify;"><strong>Introduction</strong></h3>
<p style="text-align: justify;">The ever-increasing threat of cyber-attacks on organisations around the world and their potentially devastating financial, reputational, or operational impact on the business means it has never been more important to position Cyber Security as a major issue in front of the C-Suite. The C-Suite holds ultimate accountability for an organisation’s approach to risk in both setting the appetite for Cyber risk for the business and ensuring sufficient budget &amp; resource is assigned to manage Cyber risk to within the appetite. If they are not appropriately informed of the risks associated with Information Security (IS), the organisation may not put in place the correct and appropriate mitigations to protect the organization from their top threats and risks.</p>
<p style="text-align: justify;">Failure to effectively protect against these cyber threats can have both organisational and personal consequences for executives. For example, The Senior Managers and Certification Regime (SMR) is an FCA enforced regulation that assigns responsibility for Information Security to executive level employees, making them liable for correct implementation of cyber protections for IS.</p>
<p style="text-align: justify;">This article will provide you with a 4-stage approach on how to better engage the C-Suite in your organisation on Information Security, to build a fruitful partnership between these executives who direct budget &amp; resource towards Information Security and the Cyber teams who are responsible for the oversight &amp; implementation of security.</p>
<h3 style="text-align: justify;"><strong>Stage 1: Introducing the Execs to Cyber Security</strong></h3>
<p style="text-align: justify;">In this first session with the C-Suite, it is imperative that you initiate the conversation by focusing on an introduction to Cyber Security that provides an overarching view of the organisation’s Cyber Security capabilities and operating model, that will encourage future more in-depth discussion.</p>
<p style="text-align: justify;">Outline the responsibilities the organisation and executives have towards Information Security and how these align with the strategic priorities of the organisation &amp; Cyber team. This should include a presentation of the top threats to the organization (both internal &amp; external), the risks that they expose the organisation to and the existing roadmap to mitigating these risks. This will provide a high-level overview of the organisation’s Cyber capability and will set the tone ready for future conversations with the C-Suite.</p>
<p style="text-align: justify;">Provide an overview showing the blueprint for Information Security and how security integrates and adds value to the rest of the business. It is important to include metrics that can be used to compare the organisation’s approach to Cyber Security against peers within the market. A difference in budget or team size compared to a competitor can provide guidance on whether the organisation is assigning adequate resources and budget to the issue. </p>
<h3 style="text-align: justify;"><strong>Stage 2: 360 Audit</strong></h3>
<p style="text-align: justify;">After successfully introducing the C-Suite to Information Security, it is now essential that you lock in that second session where you can provide a more granular breakdown of the organisation’s Cyber Security capability with a clear focus on where resources need to be focussed.</p>
<p style="text-align: justify;">Industry standard frameworks, such as ISO and NIST, should be deployed to measure an organisation’s Cyber Security maturity and provide analysis on potential improvements that can be presented to the C-Suite executives. These frameworks offer controls against which the organisation can be benchmarked, to identify areas that require maturing to mitigate risk from the organisation’s top threats. While these frameworks in their original state offer a good measurement of maturity, it is important to refine the controls so that the framework is tailored towards the organisation, taking into consideration the industry sector and regulatory environment. Wavestone recommends taking the NIST framework as a basis and fitting it to the specific stakes of the organisation to overcome any framework limitation and focus it on the businesses’ needs.</p>
<p style="text-align: justify;">Wavestone have built our own framework, called the Cyber Benchmark, that leverages the best of industry frameworks to provide a comprehensive approach to maturity assessment with organisational &amp; technological perspectives included. We recommend organisations follow a similar approach to accelerate their framework improvements to increasing their Cyber maturity.</p>
<p style="text-align: justify;">Capturing the attention of senior executives to invest time &amp; resources into developing a framework to improve Cyber maturity can be difficult. A good methodology is to provide real life evidence of their security vulnerabilities, for example by presenting evidence of how an internal ‘Red Team’ gained access to the mailboxes of the senior executives present, with an explanation of how few days it took. </p>
<h3 style="text-align: justify;"><strong>Stage 3: Programme and Framework</strong></h3>
<p style="text-align: justify;">Once this more granular breakdown has been presented, a key priority must be to ensure the C-Suite has bought into the Cyber Security strategy &amp; roadmap; developed using the maturity improvement opportunities identified through the framework assessment. Buy in from the C-Suite on the roadmap will guarantee the required funding &amp; resources required to implement these enhancements.</p>
<p style="text-align: justify;">Using the customised framework, develop a roadmap that focuses on maturing controls that will most effectively reduce the risk from the organisation’s top threats. This roadmap will become the building blocks for the security programme. The security programme should be defined so that it provides clear targets to be met to ensure compliance with the customised framework controls, beginning with a remediation approach that will guarantee a standard Cyber maturity across the organisation, and followed by steps to achieve the Cyber maturity goals. Ensuring a standard maturity across the organisation will alleviate the risk from current threats, while building on this to achieve maturity targets will reduce the potential risk from over-the-horizon threats.</p>
<p style="text-align: justify;">Programme support can be leveraged from a specialised Project Management Office (PMO) that will supervise the execution of the programme. It is important that this PMO curates a good relationship between IT who will implement the roadmap to maturity and the business, so that the benefits are understood and extracted across the organisation.</p>
<h3 style="text-align: justify;"><strong>Stage 4: Risk Quantification and Business Accelerators </strong></h3>
<p style="text-align: justify;">The final stage of engaging with the C-Suite requires you to demonstrate the return on investment (ROI) that Cyber Security can deliver, both through risk reduction from top threats and as a business enabler that encourages expansion into new territories and engaging new client relationships.</p>
<p style="text-align: justify;">Implementing the appropriate customised framework to the organisation and following the established roadmap to Cyber Security maturity will require an increased budget allocation. However, it is important to emphasise to the board that the return on this investment will far exceed the initial cost due to a dramatic decrease in the scale and severity of risk that the organisation is exposed to. Use calculations to demonstrate this Return on Investment (ROI) quantitively and link this to the efforts and changes delivered by the security programme. It should also be explained that this initial outlay required to deliver the security programme is far less than the potential financial, reputational, and personal (e.g., SMR) repercussions that would result from a failure to adequately protect information systems during a cyber-attack.</p>
<p style="text-align: justify;">As well as preventing the serious repercussions of failing to protect information systems in an attack, Cyber Security can also become an important business enabler. Effective Cyber Security will ensure that your customers are retained in the event of a properly managed security breach, as well as confirming your organisation as a secure manager of customer data &amp; details, increasing your attractiveness to new customers. A secure organisation can move swiftly into new business environments &amp; seize opportunities with confidence that their Cyber Security maturity will be able to resist potential additional threats that may arise from this expansion; opening the door for the organisation to safely engage a wider client base.</p>
<h3 style="text-align: justify;"><strong>Conclusion</strong></h3>
<p style="text-align: justify;">Following the 4-stages outlined in this article will allow you to foster a strong relationship with the C-Suite on Information Security, ensuring they are aware of their responsibilities for Cyber Security under the SMR and that they assign budget &amp; resources appropriately to deal with the top threats facing the organisation. The customised framework will allow these executives to understand the current Cyber Security posture of the organisation and buy in to the roadmap for future maturity. Once this vision of mature Cyber Security has been delivered, the business incentives can be leveraged to ensure the C-Suite continues to invest in developing Information Security within your organisation.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/06/engaging-the-c-suite-on-information-security/">Engaging the C-Suite on Information Security</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/06/engaging-the-c-suite-on-information-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Enabling a paradigm shift in cyber crisis management preparedness</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/#respond</comments>
		
		<dc:creator><![CDATA[Swann Lassiva]]></dc:creator>
		<pubDate>Tue, 07 Feb 2023 11:30:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19625</guid>

					<description><![CDATA[<p>Preparing for crisis management is now necessary for most companies and large organizations. Conscious of the risk or driven by regulations (the DORA regulation is a good example), crisis exercises and simulations have become an unmissable annual event.   Even if...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/">Enabling a paradigm shift in cyber crisis management preparedness</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">Preparing for crisis management is now necessary for most companies and large organizations. Conscious of the risk or driven by regulations (the DORA regulation is a good example), crisis exercises and simulations have become an unmissable annual event. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Even if the depth and complexity of these exercises vary, the capabilities tested are often the same. They almost always entail knowing how to take on roles, assimilate a strong flow of information (stimuli), and understand a high-stakes, high-intensity situation. These exercises train coordination and impact assessment, but they cannot be considered an end in themselves. Resolving a crisis is not limited to the famous: &#8220;isolate, cut, communicate, we&#8217;re out of the woods&#8221;. We are calling for a paradigm shift in the preparation of cyber crisis management.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">Shift the focus from information management to feasibility</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Most crisis exercises used today test the players&#8217; ability to manage and synthesize the flow of information. However, this is not where the quality of crisis management is concentrated. Some might even say that a decision-making unit should not be in a situation where it is erratically and incessantly solicited by its stakeholders. A decision-making unit must be put in a position to decide. To do so, it must respect a healthy work rhythm in cooperation with other more operational bodies.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">These exercises too often lead players, who are sucked into the time-consuming management of information, to take misleading operational sides. They make assumptions about what they can do and when &#8211; the famous &#8220;isolate, cut, communicate, we&#8217;re out of the woods.” These exercises give decision-making teams the impression that they are ready to cope when in fact they have limited their preparation to the ability to understand and coordinate events. This is a necessary step, but not sufficient. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The key word for a 2023 preparedness strategy? Feasibility. Notably, though, the feasibility of all the steps of crisis management is based on a wider spectrum than just information management. This feasibility must be measurable, specific, and enabled by documentation, equipment, simulation, and sequencing of these capabilities.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">Preparing across the spectrum: from threat detection to reconstruction</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Training to manage a crisis involves above all taking into account the complete chronology of crisis management. We can summarize this chronology in eight major steps:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<ol style="text-align: justify;">
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Detect relevant threats and have the capacity to investigate them </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Mobilize experts and decision-makers to react</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Survive during the first peak by guaranteeing business continuity capabilities </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Evaluate the impact, its ramifications, and its foreseeable evolutions </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Contain the threat and understand the impact of isolation </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Coordinate your strengths and those of your ecosystem </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Communicate with internal and external stakeholders </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Restore and rebuild what can be restored and built when it can be restored and built</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
</ol>
<h3 style="text-align: left;"><b><span data-contrast="auto">Also, prepare the tools: I design, I use</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">A relevant preparedness strategy must encompass each of these eight steps with the keyword of feasibility. It requires answering the question: will we really be able to carry out these actions when we need to?</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-19599" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN.jpg" alt="" width="1560" height="1078" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN.jpg 1560w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-768x531.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-1536x1061.jpg 1536w" sizes="auto, (max-width: 1560px) 100vw, 1560px" /></p>
<p style="text-align: justify;"><span data-contrast="auto">The answer to this capability question is based on three aspects: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<ol>
<li style="text-align: justify;"><span data-contrast="auto">Ensuring the formalization of brief, up-to-date and known processes (e.g.: have a flow matrix indicating how to isolate, the timeframe, and the operational consequences) </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Equipping, training, and empowering the teams in charge of these actions (e.g.: having a discussion on “license to kill” and technically enabling a “red button” on relevant perimeters) </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Training the teams concerned specifically through role-playing exercises and specific simulations of the deployment of these capabilities (e.g.: test the decision-making process leading to the use of this “red button”, then technically test the proper functioning of the red button)</span></li>
</ol>
<p>Thus, while some may limit themselves exclusively to the latter (simulation), it is essential to design one&#8217;s preparation with more hindsight and to begin with a real effort to build capacity. The exercise should be a milestone for verifying, adjusting, and promoting capabilities. In the worst case, it can be a deadline for preparing the capability or even serve as an opportunity to build said capability during the session (e.g.: reconstruction chronology, identification of technical interdependencies, etc.).<span style="font-size: revert; text-align: justify; color: initial;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">Overcome opportunistic logic and practice the capabilities&#8217; sequencing</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Currently, the main drivers of complexity are the increase in duration, intensity and the number of actors involved. Here again, we call for a paradigm shift.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">First, we call for a culture of preparation based on the eight pillars detailed above. This entails the need to provide tools and formalize the capabilities to do and train these capabilities throughout the year &#8211; without necessarily making them an event in a big exercise (e.g.: ComEx workshop on the first 10 actions to launch in case of a cyber crash, testing the isolation of backups or the restoration of workstations). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In addition, employing vertical training logic (e.g., enable then simulate), it is important to train the ability to sequence the different capabilities quickly and efficiently. Thus, it is advisable to propose larger exercises, common to the business, forensic and decision-making teams, to orchestrate their different simulations in a single exercise. In training, for example, the detection capacity should be tested with a Purple Team, and then the mobilization capacity of the crisis system with a surprise mobilization using the alternative tools provided. A second example: work on the coordination capacity of the numerous crisis cells over a long period of time and then producing a communication message for all its stakeholders (internal and external).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-19601" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN.jpg" alt="" width="1557" height="1077" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN.jpg 1557w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-768x531.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-1536x1062.jpg 1536w" sizes="auto, (max-width: 1557px) 100vw, 1557px" /></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">A long-term commitment</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">To be relevant, this approach must be supported by strategic, global, multi-year thinking. Since it is more ambitious and involves more stakeholders (SOC, RPCA, Resilience, Infra, CISO, ComEx, Third Parties, &#8230;), it can gain legitimacy through a prior empirical evaluation of the means:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<ol style="text-align: justify;">
<li data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Assess the current state of your readiness by taking a feasibility-centric approach to the eight pillars. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Establish a maturity target and a roadmap that you will be able to report on empirically over time.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Finally, share with your management teams a more robust view of your crisis management maturity. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
</ol>
<p style="text-align: justify;"><span data-contrast="auto">This type of approach, more empirical and personalized, will not only allow you to identify capacity gaps but also to truly train for the actions that will be essential at the worst moment.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/">Enabling a paradigm shift in cyber crisis management preparedness</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cracking the recipe: making employees hungry for more cyber awareness activities</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities/#respond</comments>
		
		<dc:creator><![CDATA[Thomas Vo-Dinh]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[EscapeGame]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19509</guid>

					<description><![CDATA[<p>Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity?  In a never-ending quest to find innovative ways to raise awareness on cybersecurity topics, the Wavestone team...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities/">Cracking the recipe: making employees hungry for more cyber awareness activities</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="reader-text-block__paragraph" style="text-align: justify;">Who would have known that locking your employees in a room for 15 minutes could become their new favorite way to learn about cybersecurity? </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">In a never-ending quest to find innovative ways to raise awareness on cybersecurity topics, the Wavestone team might have very well unearthed the new golden nugget.</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Tested and approved by hundreds of our clients&#8217; employees, <strong>read on to find out the secret recipe that makes cybersecurity best practices so easy to digest. </strong></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-24559 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-1-1.png" alt="Cyber escape game as a secret recipe for maximizing awareness-raising efforts" width="1002" height="318" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-1-1.png 1002w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-1-1-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-1-1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-1-1-768x244.png 768w" sizes="auto, (max-width: 1002px) 100vw, 1002px" /></p>
<div class="reader-image-block reader-image-block--full-width" style="text-align: justify;">
<figure class="reader-image-block__figure">
<div class="ivm-image-view-model   ">
<div class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "> </div>
<div> </div>
<div class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "><span style="font-size: revert; color: initial;">The concept, inspired by a beloved leisure activity, is </span><strong style="font-size: revert; color: initial;">simple, yet mightily potent. </strong></div>
</div>
</figure>
</div>
<p class="reader-text-block__paragraph" style="text-align: justify;">Employees are assembled into teams of four or five participants. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">The mission starts with a 10-minute briefing where they receive a lightning-fast training to become agents, and step into the shoes of hackers to perform their mission &#8211; should they accept it. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">They are then given 15 minutes to uncover as many confidential documents as they will find in their fictional target&#8217;s office. The game elaborately weaves in clues of varying difficulty level related to key security topics, including <strong>passwords, physical security, and social engineering</strong> to name a few. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Finally, participants come out of their adventure eyes bright and laughing, enthusiastic to move on to a 15-minute debriefing, where best cybersecurity practices are explained. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">In the end, <strong>the activity mobilizes employees for a mere 40 minutes, which pass by in a flash, and leaves them motivated to implement concrete actions to protect their organization</strong>.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24561" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-2.png" alt="What sets the cyber game apart?" width="966" height="325" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-2.png 966w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-2-437x147.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-2-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-2-768x258.png 768w" sizes="auto, (max-width: 966px) 100vw, 966px" /></p>
<div class="reader-image-block reader-image-block--full-width" style="text-align: justify;">
<figure class="reader-image-block__figure">
<div class="ivm-image-view-model   ">
<h2 class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "> </h2>
</div>
</figure>
</div>
<h2 class="reader-text-block__heading2" style="text-align: justify;">Gamification never disappoints  </h2>
<p class="reader-text-block__paragraph" style="text-align: justify;">Quite a few years might have passed since you and the members of your organization ran around your school&#8217;s playground, but one thing remains the same: <strong>games are still a unanimously popular way to learn. </strong></p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Through gamification, <strong>people become actors, instead of spectators</strong>, of the learning process and embody the principles that you aim to instill in them. Keeping in mind that <strong>practice makes up 70% of the learning process</strong>, that is an opportunity that is hard to pass by.</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">When adopting an active posture, participants get immersed in the activity, and they do not even realize that they are <strong>acquiring precious skills that will serve them and their organization&#8217;s security well for years to come. </strong></p>
<h2 class="reader-text-block__heading2" style="text-align: justify;">Spice it up with competition </h2>
<p class="reader-text-block__paragraph" style="text-align: justify;">What do football, chess, and Monopoly have in common? Besides the fact that they are all games, they also include an element of competition. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">In the context of a challenge, <strong>competition acts as a strong motivator and a driver to perform</strong>. Add a fun and safe environment to the mix, and you have yourself a perfect combination to tremendously boost engagement. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Our cyber escape game includes a <strong>smart scoring system</strong>, so teams feel driven to reach the highest score, and you can gather information on overall performance. That&#8217;s what we call a win-win. </p>
<figure id="attachment_19496" aria-describedby="caption-attachment-19496" style="width: 872px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-19496" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-1.png" alt="Example of scoring sheet for the cybersecurity escape game" width="872" height="637" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-1.png 872w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-1-261x191.png 261w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-1-53x39.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-1-768x561.png 768w" sizes="auto, (max-width: 872px) 100vw, 872px" /><figcaption id="caption-attachment-19496" class="wp-caption-text"><em>Example of scoring sheet</em></figcaption></figure>
<div class="reader-image-block reader-image-block--resize" style="text-align: center;">
<figure class="reader-image-block__figure">
<div class="ivm-image-view-model   ">
<div class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "> </div>
</div>
<figcaption class="display-block mt2 full-width text-body-small-open t-sans text-align-center t-black--light"></figcaption>
</figure>
</div>
<h2 class="reader-text-block__heading2" style="text-align: justify;">The more the merrier </h2>
<p class="reader-text-block__paragraph" style="text-align: justify;">When faced with a puzzle to solve, who would be against a little bit of help? </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Indeed, completing an exercise on one&#8217;s own can be daunting, if not just plain lonely.  </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">As part of a cyber escape game, people are encouraged to collaborate to solve clues. <strong>Teamwork then makes the challenge even more fun</strong> as creative ideas to break codes burst and are implemented, rendering their success all the more rewarding. </p>
<figure id="attachment_19498" aria-describedby="caption-attachment-19498" style="width: 1024px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-19498" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2.jpg" alt="Briefing session in Krakow" width="1024" height="768" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2.jpg 1024w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2-255x191.jpg 255w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2-52x39.jpg 52w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2-768x576.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-2-600x450.jpg 600w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption id="caption-attachment-19498" class="wp-caption-text"><em>Briefing before the escape game</em></figcaption></figure>
<div class="reader-image-block reader-image-block--resize" style="text-align: center;">
<figure class="reader-image-block__figure">
<div class="ivm-image-view-model   ">
<div class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "> </div>
</div>
<figcaption class="display-block mt2 full-width text-body-small-open t-sans text-align-center t-black--light"></figcaption>
</figure>
</div>
<h2 class="reader-text-block__heading2" style="text-align: justify;">Bring the human touch to learning experiences </h2>
<p class="reader-text-block__paragraph" style="text-align: justify;">To complement online training initiatives, providing staff with a way to <strong>engage in-person with cybersecurity experts</strong> allows to go the extra mile in accompanying them on their learning journey. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Indeed, this format promotes live discussions and gives people the opportunity to receive personalized answers to their specific questions related to security.</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">The result? Employees coming out of the activity with <strong>advice that precisely solves their pain points</strong>. </p>
<figure id="attachment_19500" aria-describedby="caption-attachment-19500" style="width: 1395px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-19500" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-3.png" alt="Positive feedback from the cybersecurity escape game" width="1395" height="919" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-3.png 1395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-3-290x191.png 290w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-3-59x39.png 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Article-Escape-Game-Photo-3-768x506.png 768w" sizes="auto, (max-width: 1395px) 100vw, 1395px" /><figcaption id="caption-attachment-19500" class="wp-caption-text"><em>Feedback from participants of our latest session</em></figcaption></figure>
<div class="reader-image-block reader-image-block--resize" style="text-align: center;">
<figure class="reader-image-block__figure">
<div class="ivm-image-view-model   ">
<div class="ivm-view-attr__img-wrapper ivm-view-attr__img-wrapper--use-img-tag display-flex
    
    "> </div>
</div>
<figcaption class="display-block mt2 full-width text-body-small-open t-sans text-align-center t-black--light"><em><br /><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24563" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-3.png" alt="Make it happen" width="1004" height="320" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-3.png 1004w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-3-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-3-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/image-3-768x245.png 768w" sizes="auto, (max-width: 1004px) 100vw, 1004px" /></em></figcaption>
</figure>
</div>
<p class="reader-text-block__paragraph" style="text-align: justify;">Not only is the format of the cyber escape game particularly appreciated by employees, it also presents multiple advantages for your organization in terms of implementation. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Take it from the Wavestone team !</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Over the course of the month of October 2022, <a href="https://www.linkedin.com/company/wavestone/" data-entity-hovercard-id="urn:li:fs_miniCompany:10133" data-entity-type="MINI_COMPANY">Wavestone</a> Belgium carried out +100 cyber escape games sessions with +400 players across 6 countries.  </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">As training sessions last 40 minutes each,<strong> up to 45 collaborators can be trained in one day</strong>, maximizing time-efficiency. </p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Further, <strong>customization </strong>is at the core of our approach, with a debriefing that exposes concrete ways to <strong>apply the best security practices that are most crucial to your organization</strong>.</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Although we could keep on enumerating the benefits that a cyber escape game can bring to an entity&#8217;s security, a game is still worth a thousand words.</p>
<p class="reader-text-block__paragraph" style="text-align: justify;">Curious to understand how the cyber escape game leaves employees asking for another serving of awareness activities? <strong>Get in touch with our expert </strong><a href="https://www.linkedin.com/in/thomasvodinh?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAABXDa2gB3uuIfNKDhMbmEedA2haY2hHz1UA" data-entity-hovercard-id="urn:li:fs_miniProfile:ACoAABXDa2gB3uuIfNKDhMbmEedA2haY2hHz1UA" data-entity-type="MINI_PROFILE">Thomas Vo Dinh</a><strong> to organize a free session.</strong></p>
<p class="reader-text-block__paragraph" style="text-align: justify;">See you on the other side, agent <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities/">Cracking the recipe: making employees hungry for more cyber awareness activities</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/cracking-the-recipe-making-employees-hungry-for-more-cyber-awareness-activities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>One month to assess your cybersecurity posture!</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/one-month-to-assess-your-cybersecurity-posture/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/one-month-to-assess-your-cybersecurity-posture/#respond</comments>
		
		<dc:creator><![CDATA[Anthony GUIEU]]></dc:creator>
		<pubDate>Mon, 16 Jan 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[Assessment]]></category>
		<category><![CDATA[CyberBenchmark]]></category>
		<category><![CDATA[Maturity]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19438</guid>

					<description><![CDATA[<p>Regularly rethinking your cyber strategy is a must for cybersecurity teams. Changes in the threat, regulations, business priorities, etc., necessitate an in-depth review of the action plan at least once every three years, or yearly, if necessary. To accomplish this,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/one-month-to-assess-your-cybersecurity-posture/">One month to assess your cybersecurity posture!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Regularly rethinking your cyber strategy is a must for cybersecurity teams. Changes in the threat, regulations, business priorities, etc., necessitate an in-depth review of the action plan at least once every three years, or yearly, if necessary.</p>
<p style="text-align: justify;">To accomplish this, you must understand your starting point and your market position. Wavestone&#8217;s cybersecurity maturity assessment framework, which currently has the support of over 100 international organisations, was developed with this conviction.</p>
<p style="text-align: justify;"><strong><em>Discover how the CyberBenchmark works with Anthony GUIEU, the Cybersecurity Manager at Wavestone.</em></strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Hello Anthony. As a start, can you present CyberBenchmark in one sentence?</h2>
<p style="text-align: justify;">The CyberBenchmark is a comprehensive tool that allows companies to assess their level of cybersecurity, position themselves in relation to the market, and establish a roadmap- thanks to a questionnaire and a database of nearly 100 customers worldwide.</p>
<p> </p>
<h2 style="text-align: justify;">Why did you create the CyberBenchmark when there are already many frameworks in the market?</h2>
<p style="text-align: justify;"><strong>We created the CyberBenchmark because many of our clients were concerned about where they stood in relation to the market.</strong> Historically, our clients were looking for absolute ratings against known frameworks such as NIST or ISO. But now, they are very much interested in knowing their relative position within their ecosystem. Our CyberBenchmark allows them to deal with both of these approaches simultaneously.</p>
<p style="text-align: justify;">CyberBenchmark also enables to come up with slightly different angles of attack: there are issues that our clients are not mature as per the market and prioritising these actions can make them progress. On the other hand, there are areas where they are not good and the market is also not mature, here the subject&#8217;s urgency must be put in context. Companies such as Gartner and Forrester provide general trends on major cyber issues, to which we add a <strong>concrete perspective based on our field observations with clients.</strong></p>
<p style="text-align: justify;">As soon as we built the CyberBenchmark, we realized that numerous competitors offer their own augmented versions of cyber security questionnaires. <strong>Our real added value is the market comparison: to date, nearly 100 clients have trusted us and been evaluated using this reference framework!</strong></p>
<p> </p>
<h2 style="text-align: justify;">How does the CyberBenchmark work?</h2>
<p style="text-align: justify;">To have a coherent framework, we based ourselves on the existing frameworks, i.e., the security standards as per the market: ISO 27001/2, NIST, etc. This was necessary because our clients used these standards for assessing themselves. We <strong>added a questionnaire with our own feedback from the field</strong> to refine the maturity levels by theme. </p>
<p style="text-align: justify;"><strong>One of the added values of the CyberBenchmark is the granularity of the evaluation.</strong> It allows precise perimeter measurement in relation to their level of maturity. In concrete terms, it is possible to distribute the level of maturity for a given question with different levels: for example, 30% level 2, 60% level 3 and 10% level 4, which may be due to heterogeneous perimeters, initiatives in progress, etc. This <strong>enables us to quantify the value of projects that take a longer time to complete and are complex to implement over several perimeters</strong>: particularly in large groups by materialising their progress.</p>
<p style="text-align: justify;"><strong>Subsequently, each evaluation gives rise to a report in two parts-</strong></p>
<ul>
<li style="text-align: justify;">One part is for top management with budgetary ratios, human resources, and the level of maturity in relation to international standards.</li>
<li style="text-align: justify;">Second part is for the operational security staff, who identifies good and bad practices as well as the actions to be launched as a priority. The objective is to develop recommendations and concrete measures to elevate the level of the organisation.</li>
</ul>
<p> </p>
<h2 style="text-align: justify;"><strong>When should the CyberBenchmark be used?</strong></h2>
<ul style="text-align: justify;">
<li>In my opinion, this tool will be ideal for an organisation that wishes to rapidly identify its cybersecurity priorities</li>
<li><strong>The first results are quick</strong>: within a month itself, we were able to produce a deliverable for the Executive Committee that included specific action proposals</li>
<li>It is one of the few tools in the market that offers a <strong>comparison with competitors</strong></li>
<li>Unlike the traditional frameworks, our questionnaire addresses both <strong>governance and operational concerns</strong></li>
</ul>
<p><strong>The CyberBenchmark is also adaptable to all requirements and budgets</strong></p>
<ul style="text-align: justify;">
<li>The <strong>&#8220;quick&#8221; approach </strong>requires only a few interviews. It is based on a declarative evaluation to quickly determine the company&#8217;s level of maturity and the projects to be launched</li>
<li>The <strong>&#8220;complete&#8221; approach </strong>is based on an in-depth audit, dozens of interviews, a review of the evidence, and even additional technical tests (intrusion tests, Red Team, etc.)</li>
</ul>
<p> </p>
<h2 style="text-align: justify;"><strong>Can you provide an example of a specific application of the CyberBenchmark?</strong></h2>
<p style="text-align: justify;">To illustrate the &#8220;rapid&#8221; approach, we recently used it to support a large industrial group in <strong>initiating a security process and challenging its executive committee</strong>. After 2 months of work and 5 workshops, we were able to provide a clear vision of the structure&#8217;s cybersecurity level and project a target level for 3 years, which got accepted by the Executive Committee.</p>
<p style="text-align: justify;">In terms of a comprehensive approach, over the last few months, we have been working with a British bank for <strong>assessing its general cybersecurity posture and level of compliance with the reference frameworks</strong>. We mobilised a team of 10 consultants in 3 different countries for conducting more than 50 workshops and collecting evidence. With this we were able to provide concrete and reliable feedback on the level of security as well as for identifying market-related investment priorities. Likewise, these elements are utilised in exchanges with their main regulators.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>A final word?</strong></h2>
<p style="text-align: justify;">Wavestone&#8217;s CyberBenchmark provides a broad view of the market&#8217;s level of maturity while delving deep into its specific technical subjects. This is <strong>what makes it a differentiating asset for our clients, as they could position themselves against competitors within their sector on each of their topics</strong>. The priorities in terms of cybersecurity would then emerge clearly for the client, allowing them for an effective cyber budget. It is a real cyber strategy accelerator, that has been tried and tested by numerous clients!</p>
<p style="text-align: justify;">We can easily generate statistics and trends using CyberBenchmark&#8217;s exclusive data: how many companies have deployed a security tool (EDR, bastion, probes, etc.), where they stand in terms of deployment, who is leading the market, and so on. According to the <a href="https://www.wavestone.com/fr/insight/cyberbenchmark-ou-en-sont-les-grandes-entreprises-francaises/"><strong>latest study on the maturity of French companies</strong></a>, <strong>the general level of maturity on our benchmark based on international standards (NIST CSF Framework and ISO 27001/2) is&#8230; 46%</strong>. Each year, we formalise our market knowledge and forecast strong sector and technical subject trends.</p>
<p style="text-align: justify;">Finally, as you would have understood, the <strong>CyberBenchmark evolves and develops</strong> as it is used by new companies. We now have a database of over 100 companies, which will enable us to open a new category in January: <strong>&#8220;Luxury goods &amp; Retail&#8221;</strong>, with more than ten companies with which we can refine the sector-specific analysis.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">If you are interested in positioning your organisation within the market, please do not hesitate to contact me or one of our experts. We will be able to guide you through this process. <a href="https://www.linkedin.com/in/anthony-guieu-5b699458/"><img loading="lazy" decoding="async" class="alignnone  wp-image-19487" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/logo-linkedin-officiel-225x191.webp" alt="" width="31" height="26" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/logo-linkedin-officiel-225x191.webp 225w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/logo-linkedin-officiel-46x39.webp 46w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/logo-linkedin-officiel.webp 635w" sizes="auto, (max-width: 31px) 100vw, 31px" /></a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/one-month-to-assess-your-cybersecurity-posture/">One month to assess your cybersecurity posture!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/one-month-to-assess-your-cybersecurity-posture/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Turn your dashboard into a real management asset against global cyber threats</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/12/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/12/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats/#respond</comments>
		
		<dc:creator><![CDATA[Mathieu Bouchot]]></dc:creator>
		<pubDate>Thu, 08 Dec 2022 15:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[dashboard]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[kpi]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19212</guid>

					<description><![CDATA[<p>Dashboards are an essential tool for CISOs to measure and control risks in their scope, to steer their projects and to inform their management of the company’s cyber health evolution. However, according to Wavestone’s Cyber benchmark results from 2022, 47%...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats/">Turn your dashboard into a real management asset against global cyber threats</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Dashboards are an essential tool for CISOs to <strong>measure</strong> and <strong>control</strong> <strong>risks</strong> in their scope, to <strong>steer their projects</strong> and to <strong>inform their management</strong> of the company’s cyber health evolution. However, according to Wavestone’s Cyber benchmark results from 2022, 47% of companies have insufficient indicators or dashboards. In practice, indicators provide only a simple overview on a perimeter, and offer limited insights on the achievement of the company&#8217;s strategic and operational goals. If the deviations are not correctly measured, it will be complicated to deploy relevant measures of improvement, necessary to define operational priorities as well as to gather more resources in areas that are the most at risk.</p>
<p style="text-align: justify;">Furthermore, it would be riskier to entrust on one&#8217;s dashboards without having the reassurance offered by the indicators’ relevance and reliability. This can lead to serious loss, or even to some major incidents. The crash of the Eastern Airlines 401 in 1972 is a striking example: a simple burnt-out light bulb, that was used to indicate the correct deployment of the landing gear, mobilized the entire crew, who were unable to notice in time the alarm that indicated the plane’s drastic decrease in altitude. The plane crashed a few minutes later.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>How to reconsider your indicator’s base to make your dashboards more efficient and reliable? </strong></h1>
<p> </p>
<h1 style="text-align: justify;">What are dashboards, KRI, KCI?</h1>
<p> </p>
<p style="text-align: justify;">The dashboard is a <strong>synthetic</strong> <strong>presentation</strong> tool. Highlights the key trends used to facilitate decision making. It is a federating tool used to improve governance efficiency and is designed for everyone (not only for the CISO). Therefore, we refer to dashboards in plural. Each instance is defined by a unique perimeter, where there are specified: the recipients and their stakes, the review frequency, the associated governance, the indicators, the calculating methods used and the source, etc.</p>
<p style="text-align: justify;">Constructing a well-defined dashboard will <strong>correctly address</strong><strong> the business stakes</strong> of the dashboards’ users. A three-level segmentation summarizes all the requirements in an organization:</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19249 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/1.png" alt="" width="906" height="518" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/1.png 906w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/1-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/1-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/1-768x439.png 768w" sizes="auto, (max-width: 906px) 100vw, 906px" /></p>
<p> </p>
<p style="text-align: center;"><em>Figure 1: Typologies of cyber dashboards: uses and objectives</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">An indicator is a measurement that is collected, contextualized, and used to facilitate decision-making. It is implemented to <strong>answer a well-identified need</strong> by one or more departments. Depending on the purpose of the measurement, three types of indicators can be defined:</p>
<ol style="text-align: justify;">
<li><strong>KPI</strong> (<em>Key Performance Indicator</em>): measures the performance of a department, a team, or a strategic plan. They are linked to strategic objectives to measure the effectiveness <em>(e.g., retention of cyber talent over the year).</em></li>
<li><strong>KRI</strong> (<em>Key Risk Indicator</em>): assesses an identified risk, quantifying its likelihood and/or impact at a given time. They are essential for accepting or rejecting a risk, and for controlling it over time<em> (e.g., number of compromised business identifiers &#8211; account takeover).</em></li>
<li><strong>KCI </strong><em>(Key Compliance Indicator)</em>: measures a compliance rate in relation to a standard (PSSI, NIST, etc.). It evaluates an organization’s maturity regarding to the given standard at a specific time <em>(e.g., % of policies updated within the last year).</em></li>
</ol>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">How to make a dashboard efficient?</h1>
<p> </p>
<p style="text-align: justify;">An efficient dashboard will convey self-supporting messages to the recipients. To build it, one must meticulously construct reliable and high-performance indicators, as well as minimising their number. These are defined by making a compromise between:</p>
<ul style="text-align: justify;">
<li>their <strong>relevance</strong> (processing purpose, i.e., the ability to trigger a discussion);</li>
<li>their <strong>computational</strong> cost (collection time, interpretation time);</li>
<li>their <strong>maintainability</strong> over time (sustainability of data sources).</li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Let us take an example to evaluate the effectiveness of the &#8220;security-by-design&#8221; measures, where, in this case, a relevant indicator could be: <strong><em>&#8220;rate of validation of the security report at the first iteration by project scope and criticality&#8221;</em></strong>. First, it is operationally viable (approval process provides simple data for interpretation <em>(binary values)).</em> It is relevant <em>(responding to a clearly identified issue),</em> can be easily calculated if the processes are well set up <em>(characteristic depending on the quality of the feedback information)</em> and it is sustainable <em>(the approval process guarantees reliable data over time). </em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">A deficient indicator base can neglect one of the three criteria. This can be seen in the following field: one can often observe <strong>clusters of indicators</strong>, that are inherited by tradition without any real purpose or without responding to an outdated need; or indicators that require <strong>time-consuming gathering</strong> that creates frustration among teams. These discrepancies can be explained by a lack of long-term strategy and a lack of importance given to these indicators.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">To rectify this, the existing system must be cleaned up and supplemented with performant indicators on a regular basis <em>(methodology detailed in section 3.1) where </em><strong>the management of indicators itself is just as important as the other issues</strong>. Therefore, it must be monitored by a dedicated sponsor within the CISO&#8217;s governance team and by <strong>dedicated monitoring indicators</strong> <em>(% of indicators defined with an approved calculation method, % of indicators that are fully automated, etc.)</em>. This central governance helps in finding compromises and minimising the number of indicators: about ten per perimeter/program is an order of magnitude that works well.</p>
<p> </p>
<h1 style="text-align: justify;">Increase team engagement to get more useable data?</h1>
<p> </p>
<p style="text-align: justify;">It is not new: getting people to accept change and integrate new tools is always a tricky subject, especially for CISOs. The complexity of the environment, lack of dialogue between cyber teams and business lines, unsuitable tools, useless or unanalysed collected data, etc., represents numerous reasons that can explain a team&#8217;s lack of commitment. To address this, there are two principal areas to focus on:</p>
<ol style="text-align: justify;">
<li>Engage your employees in the indicator&#8217;s life cycle;</li>
<li>Facilitating the report of indicators with automation to minimize the workload.</li>
</ol>
<p style="text-align: justify;"> </p>
<h2>Engage employees throughout the indicator’s life cycle</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Team&#8217;s organizational complexity and local engagement are the first challenges that need to be addressed before deploying a dashboard: information gathering requires a dialogue between lines of business that are not used to work together <em>(such as finance, IT risk management, strategy, program management, etc.)</em>. Involving your operational teams on a long-term basis is vital for a <strong>more reliable</strong> gathering and reporting process of indicators. More specifically, it allows you to:</p>
<ul style="text-align: justify;">
<li>Define more <strong>realistic</strong> indicators, unlocking operational sticking points (unavailable data, communication problems, etc.);</li>
<li>Define and develop <strong>operational needs</strong> more precisely: it is necessary to arise teams’ interest in the results of the project <em>(i.e., ensure that their work has a tangible impact for them)</em>;</li>
<li><strong>Facilitate change management </strong>to get more reliable results overall, by understanding the purpose of the gathered indicators.</li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">It is necessary to involve the employees from the beginning of the process, as well as <strong>maintaining the dynamic </strong>throughout the indicator’s operational maintenance. Transversal workshops should be organized throughout the process below, which will help in defining the indicators or generating questions.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19251 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/2.png" alt="" width="975" height="507" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/2.png 975w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/2-367x191.png 367w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/2-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/2-768x399.png 768w" sizes="auto, (max-width: 975px) 100vw, 975px" /></p>
<p> </p>
<p style="text-align: center;"><em>Figure 2: Indicator life cycle and maintenance</em></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Facilitate data gathering and reporting with automation and appropriate tools</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">While manual collection provides flexibility to experiment and test new indicators, (semi-)automated collection increases the team productivity and provides more reliable data.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19253 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/3.png" alt="" width="975" height="215" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/3.png 975w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/3-437x96.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/3-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/3-768x169.png 768w" sizes="auto, (max-width: 975px) 100vw, 975px" /></p>
<p style="text-align: justify;"><strong>It is not always profitable to automate everything</strong>, as it depends on the data nature, data volatility or data maintenance. One of the highlighted reasons can be because of the cost of automation (it takes a full year on average to automate gathering and reporting process). Therefore, scope of automation should be carefully determined.</p>
<p style="text-align: justify;">To scale up and automate more indicators, the<strong> corporate data culture</strong> needs to be improved. To reduce the cost of automation, it is necessary to have organized, referenced, and standardised data. Four measures to achieve that are:</p>
<ol style="text-align: justify;">
<li>Define a corporate <strong>vision</strong> and <strong>objectives</strong> to control, reference and manage the data;</li>
<li>Define <strong>policies</strong> and <strong>rules</strong> supported by top management to regulate the use and standardisation of data;</li>
<li><strong>Promote a data culture</strong> among business teams to reflect the way data is valued and used;</li>
<li>Equip ISS with <strong>tools</strong> to support the organization&#8217;s data policies and strategy (Master Data Management, Data catalogue, Data lineage, etc.).</li>
</ol>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">To become data-driven, <strong>the blocking points does not require to be technological, but organizational</strong>, particularly in terms of skills and ability to accept changes.</p>
<p style="text-align: justify;">As a result, automation makes data collection &#8220;<strong>more</strong> <strong>liveable</strong>&#8221; for employees and makes the indicator’s feedback more reliable over time.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Talking to your executives: the value of limiting the number of indicators</h1>
<p> </p>
<p style="text-align: justify;">A well-constructed dashboard is an excellent way to address and involve the Executive Committee (COMEX), even though dashboards are <strong>under-exploited</strong> for their &#8220;marketing&#8221; side. In 2022, 25% of companies have never solicited their Executive Committee, and only 30% of the market involves them regularly.</p>
<p style="text-align: justify;">The dashboard must be self-sufficient (i.e., must be understandable at first sight), able to carry impactful messages, since it is intended to be shared with as many people as possible. The Executive Committee solves problems, accepts, or rejects risks daily, monitors budgetary performance and operational efficiency, supervises of customer satisfaction and the company&#8217;s public image. To talk to the executive committee, the dashboard must <strong>bring out the necessary essentials</strong> required to respond specifically to the targeted issues. To do so, it is more useful to highlight specific methods and solutions rather than explaining in-depth, the causes of the technical problem (unless the need is clearly expressed).</p>
<p style="text-align: justify;">The purpose of presenting to management the <strong><em>“ratio of cyber FTEs over IT FTEs per entity”</em></strong> or the <strong><em>“ratio of cyber budget over IT budget” </em></strong>(that can be two viable approaches) is to inform and make decisions on cybersecurity resources.</p>
<p style="text-align: justify;">In short, the choice of indicators and their format must be adapted to the COMEX. To do so, they must:</p>
<ul style="text-align: justify;">
<li>Be focused on potential <strong>business</strong> <strong>impacts</strong>;</li>
<li>Be consistent over time to have a <strong>stable indicator base</strong> and facilitate appropriation and understanding;</li>
<li>Have a <strong>self-supporting form</strong> to visualize the evolution of a trend and its deviation from the set target.</li>
</ul>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Conclusion</h1>
<p> </p>
<p style="text-align: justify;">A dashboard is only a tool that should not be considered as an end itself. However, when properly configured and defined, it is certainly the best weapon for a CISO to make cyber governance more efficient.</p>
<p style="text-align: justify;">To set up or update a dashboard, there are 4 success factors to remember:</p>
<ol>
<li style="text-align: justify;"><strong>Incremental</strong>: identifying sustainable indicators is difficult. Except for EXCOM dashboards, where an agile approach is necessary to integrate time for asking questions.</li>
<li style="text-align: justify;"><strong>Inclusive</strong>: all teams must be involved to understand the purpose of gathered indicators (and the impact on their work). This will lead to increased reliability.</li>
<li style="text-align: justify;"><strong>Scalable</strong>: the cyber ecosystem and its threats are growing exponentially. The designed dashboard needs to be flexible to consider the new risks that will arise (new KRI that needs to be implemented to the standard security base).</li>
<li style="text-align: justify;"><strong>Simple</strong>: the purpose of a dashboard is to be shared. Therefore, it must be understandable at first sight. &#8220;Keep it simple&#8221; is necessary to simplify reading and accelerate appropriation.</li>
</ol>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats/">Turn your dashboard into a real management asset against global cyber threats</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/12/turn-your-dashboard-into-a-real-management-asset-against-global-cyber-threats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Supply Chain Risk Management Best Practices : Operationalizing Your proactive C-SCRM Defenses</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/05/cyber-supply-chain-risk-management-best-practices-operationalizing-your-proactive-c-scrm-defenses/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/05/cyber-supply-chain-risk-management-best-practices-operationalizing-your-proactive-c-scrm-defenses/#respond</comments>
		
		<dc:creator><![CDATA[Constance Francois]]></dc:creator>
		<pubDate>Mon, 16 May 2022 16:40:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[BestPractices]]></category>
		<category><![CDATA[CyberSupplyChain]]></category>
		<category><![CDATA[SupplyChain]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17934</guid>

					<description><![CDATA[<p>Introduction Cyber Supply Chain attacks are a growing trend amongst cybercriminals where one attack can leave countless organizations vulnerable and potentially damaged.  You’ve seen the headlines following a number of high-profile incidents in recent months.  The European Union Agency for...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/cyber-supply-chain-risk-management-best-practices-operationalizing-your-proactive-c-scrm-defenses/">Cyber Supply Chain Risk Management Best Practices : Operationalizing Your proactive C-SCRM Defenses</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1><strong>Introduction</strong></h1>
<p>Cyber Supply Chain attacks are a growing trend amongst cybercriminals where one attack can leave countless organizations vulnerable and potentially damaged.  You’ve seen the headlines following a number of high-profile incidents in recent months.  The European Union Agency for Cybersecurity (ENISA) warns that these types of attacks are now growing 400% year-over-year as cybercriminals are shifting to larger, cross-border targets.</p>
<p>Attackers’ main motivations remain to gain access to source code and customer data, and now they can do so across multiple target organizations by first compromising vendor software being deployed to those companies and government agencies.  This is an ingenious (and nefarious!) approach on a few fronts:</p>
<ol>
<li>This type of attack can generally get around any target company’s strong cybersecurity posture, particularly related to its perimeter security; the attack is brought into the target environment via a trusted vendor’s product.</li>
<li>Such an unsuspected attack vector (a form of “friendly fire”) means that the attacker’s “dwell time” within the target can be quite long before discovered (or revealed in the form of ransomware!). Quite a lot of damage can be done during this time.   </li>
<li>The shear breadth in number of targets that can be addressed via a single attack is immense; the economies for a cybercriminal vastly multiply their criminal profitability.</li>
</ol>
<p>About 50% of these attacks can be attributed to known advanced persistent threat (APT) organizations (e.g., the Russian state-sponsored threat group APT29, a.k.a. “Cozy Bear”, responsible for the 2020 SolarWinds attack).  These APT groups have access to many resources and much funding enabling their creativity for damage and not getting caught.  Hence, these attacks are growing rapidly and more complex with such backing; and this trend will continue, enlarging the gap between such risks and an organization’s ability to detect and remediate them in a timely fashion.     </p>
<p>Some most notable recent cyber supply chain attacks include:</p>
<ul>
<li>SolarWinds – Where attackers in 2020 exploited known vulnerabilities in its IT software Orion (used to manage servers in many organizations, including large businesses, several arms of the U.S. government, threat response firm FireEye, and Microsoft.</li>
<li>Kayesa – More recently in 2021, the notorious REvil ransomware gang (another APT organization) exploited known vulnerabilities in IT management platform Kayesa VSA, which ultimately compromised an estimated 1,000 organizations that use the platform.</li>
</ul>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #1</em><em>: </em></strong><em>In terms of your organization’s vendors for software or hardware, etc., it turns out that their risk model is now your risk model!  Frankly, it always has been, and attackers have evolved to take advantage of this existing threat vector.</em></p>
</blockquote>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-17921 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KEITHImage1.png" alt="" width="780" height="439" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KEITHImage1.png 780w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KEITHImage1-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KEITHImage1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KEITHImage1-768x432.png 768w" sizes="auto, (max-width: 780px) 100vw, 780px" /></p>
<p><strong><em>Graphic #1: Unavoidably Intertwined Operational Models in Managing Cyber Supply Chain Risk </em></strong></p>
<p> </p>
<p>Hence, the complete Cyber Supply Chain lifecycle for all your business applications and IT tools must be considered within your Cybersecurity strategy and practices.  This means that before you choose a vendor, you should assess their security posture and security &amp; incident management processes BEFORE you allow them to contribute software, tools, or equipment to your otherwise secure enterprise.</p>
<p>More so, beyond an initial assessment and acceptance of a vendor’s software, etc., the acceptability of a vendor’s continual access to your environments via releases and patches of their products needs to be continually monitored and assessed.     </p>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #2</em></strong><em><strong>:</strong> Shift Security Left. The only way to fully secure your enterprise continually is to ensure the sanctity of anything that comes into it.  That includes all vendor products that would integrate into your IT environments, etc., and the vendor’s lifecycle for development and deployment of their products.  You can only be as secure as they are!   </em></p>
</blockquote>
<p><strong>C-Supply Chain Risk Management – Definition and Scope</strong></p>
<p>Attacks on Cyber Supply Chains continue to take advantage of ongoing disconnects in an organization’s understanding of the related supply chain risks and how to deal with them:</p>
<ul>
<li>Most organizations have a false sense of security (“blind spots“) based on assumptions that their vendors are already secure, and their products can be trusted in the organization‘s environment. They believe their recognizable “brand name“ vendors are at least as diligent and proactive about cybersecurity as their organization.</li>
<li>Many organizations also lack continual robust monitoring and reporting, particularly around their vendors‘ software product interactions within their environments; they’re simply not looking here with sufficient focus based on current events.</li>
<li>82% of organizations believe their executive teams and boards are confident in their approach to measuring and managing Supply Chain Risk.
<ul>
<li>Yet only 44% regularly report on their supply chain risks and related industry events to senior leadership. This is clearly a blind spot for leadership.</li>
</ul>
</li>
<li>Looking at financial services firms, for example, 79% say they would decline a business relationship due to a vendor’s cybersecurity performance.
<ul>
<li>But lack the data to make such decisions.</li>
</ul>
</li>
</ul>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-17923 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KeithImage2.png" alt="" width="780" height="428" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KeithImage2.png 780w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KeithImage2-348x191.png 348w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KeithImage2-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/KeithImage2-768x421.png 768w" sizes="auto, (max-width: 780px) 100vw, 780px" /></p>
<p><strong><em>Graphic #2: Today’s Growing C-SCRM Threat Definition and Scope  </em></strong></p>
<p> </p>
<p>This false sense of security that most organizations have about their vendors’ software, etc. is based upon a (unverified) trust of a vendor’s own security diligence.  But we cannot assume this anymore, and perhaps never should have. </p>
<p>This is one big reason driving a growing need for:</p>
<ol>
<li>More continual and robust assessment of software (and hardware, firmware, etc.) providers’ cybersecurity performance.</li>
<li>Improved monitoring and reporting from both: a) upstream software vendors’ environments; as well as b) the downstream software buyers’ environments.</li>
</ol>
<p>These may seem to be separate issues at first, but they ultimately compound to corrupt downstream customer environments prolifically.  Hence, we must “Shift Left” and go upstream into the vendor’s cybersecurity practices in order to manage our own Supply Chain risks.</p>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #3</em></strong><em><strong>:</strong>  Both initial and continual assessments of a vendor’s cybersecurity practices and incidents should be analyzed to ensure the security of an organization’s global supply chain before the vendor’s products or services touch their enterprise, and then continually throughout the relationship (and related product updates, patches, etc.).   </em></p>
</blockquote>
<p>Another growing need is for the establishment of cybersecurity consortiums of industries and organizations (”IT ecosystems”) to share vendor and product risk data, and to quickly and continually inform partner organizations of new risks and mitigations to ensure fewer downstream surprises.  Whether performed per organization or through a consortium information sharing, there is (for the first time) a recognized need for continual assessments of many vendors’ cybersecurity practices before and throughout an organization’s relationship with these providers of solutions within their enterprise.  This is an emerging best practice for maintaining your environments’ security.  </p>
<p>Because these types of attacks have proven very successful (and profitable) to cybercriminals over the past few years, organizations should expect more and larger cyber supply chain attacks in 2022 and beyond.  Hence, the cost of the supply chain status quo is going up and this trend cannot be allowed to persist.  This is causing organizations to embrace stronger operational resilience strategies and emerging approaches like never before.</p>
<p>Noted that it is not only financial damage that companies must avoid (or remediate!) in the case of these attacks that often end in data exfiltration and/or ransomware.  83% of compromised organizations have also experienced reputational damage to their brand and public perception of their company.  This “ups the ante” for proactive avoidance of such attacks and more work to do if you are attacked.  </p>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #4</em></strong><em><strong>:</strong> Supply Chain attacks do more than financial harm to a company; in many cases these may also cause long-term reputational damage!  Hence, managing to reduce such attacks but also in robustly handling such attacks is vital to an organization’s survival.   </em></p>
</blockquote>
<p>In response to the increasing waves of Cyber Supply Chain attacks, it is no surprise that a global approach to securing their supply chains as well as increasing their operational resilience will be the top priorities for 50% of organizations by 2023.  This is survival of the cyber-fittest.</p>
<p>To accomplish this, 88% of companies state that visibility into their global supply chain is more important now than it was 2 years ago.  But unfortunately, 74% of organizations are still using inefficient and less adaptable manual methods to ascertain and manage their supply chain risks.  Such approaches cannot persist while such risks are increasing at an exponential rate.</p>
<p>For an example of where improved C-SCRM approaches and processes are heading, consider the emerging security ratings services that customer organizations can utilize to initially (and continually) assess the cybersecurity practices and incident management of their vendors.  This is another emerging best practice, yet only 22% of organizations are using these resources to continually monitor their vendors’ cybersecurity performance.  Expect this utilization to grow and for such services to become more robust with available security tracking data for vendors.  </p>
<p><strong>C-SCRM – Current Challenges and Opportunities</strong></p>
<p>The vast number of Cyber Supply Chain attacks are being enabled by many challenges affecting organizations that utilize vendor software.  Yes, you are right; this means almost all organizations.  Try imagining an organization that does not use vendor software; then pause to think about the many(!) types of vendor software your organization relies on.</p>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #5</em></strong><em><strong>:</strong> Everyone has a cyber supply chain that can be corrupted!  There are very few exceptions.  In sort, every organization has a cyber supply chain whether the know it or not, complete with risks that can be exploited, and threats brought into their environment unexpectedly … EVEN IF the organization is highly secure in its perimeter defenses.</em><em>Hence,</em><em>cyber supply chain risks must be proactively managed by your organization. </em></p>
</blockquote>
<p>It’s quite clear what the breadth of target organizations can be for cybercriminals when they devise such supply chain attacks.  They only need to breach a small number of the right vendors to indirectly gain access to their preferred (many!) target organizations amongst a vendors’ customer list. </p>
<p>Some of the current challenges that organizations face in trying to regularly assess their vendor and supply chain cyber risks include:</p>
<ol>
<li>Lack of data that is readily available related to such risks, including its timeliness, accuracy, and actionability. Organizations have had to develop their own data for such analysis and decision-making to select or continue with a particular vendor or product.
<ol>
<li>This can be (too) time-consuming and resource-intensive for organizations.</li>
<li>Such data, when possible, is intended to help organizations to identify as early as possible any potential risk exposure when using a particular vendor’s product</li>
</ol>
</li>
<li>Even when such data is sufficiently available (rarely), most customer organizations have had little sway to force vendors to remediate their internal and supply chain processes to a point that they can regularly be confident in consuming their products as cyber-safe.</li>
<li>Such data would need to be refreshed frequently to be effective; but even where there are useful data points, these are generally not monitored continuously as would be needed based on today’s changing and escalating threats.</li>
<li>All this lack of actionable data from the above challenges means that the speed of any assessment is simply too long a cycle.
<ol>
<li>Especially true for continual monitoring where the threat is potentially already in your enterprise (vs. an initial assessment before bringing in a product).</li>
<li>But the only way an organization could previously speed up such assessments was to invest more of its resources into such focused efforts; but it generally didn’t have the capacity to do so.</li>
</ol>
</li>
<li>Lastly, how an organization would address its 3<sup>rd</sup> Party risk management is strongly determined by its structure, and defined roles and responsibilities for managing this. Most organizations have not made it clear who (what person or team) would own the responsibility for Cyber Supply Chain Risk Management.  This will have to change before many of the challenges above can be addressed considerably.    </li>
</ol>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-17925 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3.png" alt="" width="780" height="446" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3.png 780w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage3-768x439.png 768w" sizes="auto, (max-width: 780px) 100vw, 780px" /></p>
<p><strong><em>Graphic #3: Current C-SCRM Challenges and Potential Solutions </em></strong></p>
<p> </p>
<p>There are emerging opportunities and options in addressing the challenges listed above and related ongoing Supply Chain concerns. For example:</p>
<ul>
<li>New technologies are becoming available to organizations that wish to be more proactive and quickly adaptive to their supply chain risks.
<ul>
<li>3<sup>rd</sup> Party Security Ratings – Services are becoming available where an organization can purchase one-time or recurring ratings for a particular vendor or set of products it wants to purchase (or already has).</li>
<li>Advanced Monitoring and Detection Tools and Services – Continued advancement and maturity of monitoring, detection, and action-oriented tools and services is enabling earlier detection and appropriate actions than ever before.</li>
<li>AI and its behavior analysis capabilities – This is one important advancement amongst monitoring and detection tool improvements; but this technology is also becoming engrained within many other aspects of cybersecurity
<ul>
<li>Wherever unusual patterns can be recognized by AI and enacted on appropriately far more quickly than a human could.</li>
<li>Expect AI to become a primary underpinning to many cybersecurity automation tools, not just C-SCRM.</li>
</ul>
</li>
<li>For supply chains, Blockchain is an emerging technology that will enable better security management in terms of a product manifest’s chain of custody and that it has not been tampered with during the supply chain deployment.
<ul>
<li>Note, however, that this doesn’t solve the issue of a vendor’s software development process being breached to inject a threat for downstream users; this risk would need to be assessed as part of the vendor’s security practices (see the 3<sup>rd</sup> Party Security Ratings services above).</li>
</ul>
</li>
<li>Perhaps most importantly, new organizational roles (and responsibilities) are being created to enable greater focus and proactivity in assessing and managing supply chain and other 3<sup>rd</sup> Party risks. This is long overdue, and a promising development in appropriately applying all the risk mitigation options listed above as needed for a particular organization’s target security posture.     </li>
</ul>
</li>
</ul>
<p><strong>If Every Organization has a Cyber Supply Chain that Can Be Corrupted to Create Extensive Damage </strong><strong>à</strong><strong> What are you going to do about it? </strong></p>
<p>Every organization has a supply chain with risks that can absolutely be exploited; there are no meaningful exceptions to this rule.  Hence, there is no room for a false sense of security, and no excuse to not address this immediately (and ongoing).  After all, you do not want to be the next cautionary tale about an organization in industry news!</p>
<p>To get started with your organization’s C-SCRM strategy, first consider these Success Factors in developing your overall approach.  Remember these factors as the “B-O-O-M“ strategy to pursue when ensuring C-SCRM success:</p>
<ol>
<li><u>B</u>oth internal and external supply chain processes and security checks require focus.
<ol>
<li>There are clearly a number of processes and capabilities that an organization has direct influence on immediately; start there, but do not end there.</li>
<li>Be sure to also include external forces, such as suppliers, where the organization has only indirect influence; but where failure to implement such influence creates greater risk.</li>
<li>Manage all threat vectors associated with your cyber supply chain risks; hence manage your supply chain vendors as well as your own organization.</li>
</ol>
</li>
<li><u>O</u>ptimize Your Organization and related processes to stay aware of current cyber events, industry trends, issues, and best practices.
<ol>
<li>Ensure sufficient focus by your organization on these items, including assigned roles and responsibilities for coverage.</li>
<li>Partner with industry organizations and vendor partner organizations to stay informed and influential for managing supply chain risks.</li>
</ol>
</li>
<li><u>O</u>ptimize Your Data for cyber supply chain and vendor risks, and extensively analyze these to be data-driven in your C-SCRM capabilities prioritization as well as your vendor selections and ongoing risk management.</li>
<li><u>M</u>ature your organization, data, and tailored best practices to keep pace with (or preferably ahead of!) the continually growing and evolving cyber supply chain threats you must manage. This is far from a static set of threat vectors in this cybersecurity space and may just be in its infancy in terms of the future number of threats and types of complexity to be managed!  </li>
</ol>
<p> </p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-17927 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage4.png" alt="" width="780" height="437" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage4.png 780w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage4-341x191.png 341w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage4-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/keithImage4-768x430.png 768w" sizes="auto, (max-width: 780px) 100vw, 780px" /></p>
<p><strong><em>Graphic 4: Success Factors for Managing Cyber Supply Chain Risk</em></strong></p>
<p> </p>
<blockquote>
<p><strong><em>C-SCRM Survival Tip #6</em></strong><em><strong>:</strong> Drop the “BOOM” to be successful in your C-SCRM strategy and approach:  Both internal and external forces need to be managed; Optimize your organization for C-SCRM coverage; Optimize your C-SCRM data for analysis, selection, and monitoring risks; and Mature the above as organizational-specific best practices to stay ahead of the curve!       </em></p>
</blockquote>
<p><strong>Defining &amp; Implementing C-SCRM Best Practices for Your Organization</strong></p>
<p>The previously listed success factors for C-SCRM lead directly to the following best practices and capabilities for an organization to implement (shown here in a step-wise approach): </p>
<ol>
<li><strong>Identify / Inventory all your types of vendor suppliers and service providers.</strong></li>
<li><strong>Define risk tolerance criteria for each type of relevant vendor and service for critical business processes.</strong>
<ul>
<li>Including important vendor dependencies, their critical software dependencies and single points of failure, etc.)</li>
</ul>
</li>
<li><strong>Assess each supply chain risk (e.g., a vendor or product) according to their specific business continuity impact assessment and requirements.</strong></li>
<li><strong>Define initiatives and best practice procedures based on industry best practices tailored for your organization and assessed risks.</strong></li>
<li><strong>Establish your organizational teams and roles for ownership and maturing these critical C-SCRM responsibilities, including –</strong>
<ul>
<li><em>C-SCRM Leadership and Communications</em> – Report to Executive Team &amp; Board regularly about risks and threats to the organization and identified in the industry (that may become threats which can be proactively avoided).</li>
<li><em>Risk Identification and Monitoring</em> – Continually assess prospective and current vendors via software and service types with their risk profiles and requirements.</li>
<li><em>Cyber Supply Chain Requirements</em> – Actively manage each vendor’s adherence to the organization’s C-SCRM established requirements; and hence, their incorporation into vendor contracts.</li>
<li><em>Cybersecurity Knowledgebase / Data Repository</em> – This resource should be maintained to be more broadly used than just for C-SCRM scenarios; but this is where business line managers as well as technical integrators can access requirements lists, contractual provisions, and ratings data associated with vendors and their products.</li>
<li><em>Supply Chain Risk Liaison to the rest of the organization</em> – In the case of insufficient data available for a vendor-related cybersecurity decision, or the needed investigation into a new vendor, product, or incident. <em> </em></li>
</ul>
</li>
<li><strong>Continually monitor supply chain risks and threats, based on internal and external sources of data.</strong>
<ul>
<li>Including findings from suppliers’ performance monitoring and reviews.</li>
<li>Maintain historical and trend data as long as relevant.</li>
</ul>
</li>
<li><strong>Make vendors aware of perceived or discovered risks or weaknesses associated with their products and processes.</strong>
<ul>
<li>g., managing such vendors throughput their entire product lifecycle, including procedures to manage releases, patches, and end-of-life considerations.</li>
<li>In some cases, you can help them improve their cybersecurity capabilities to advance your own security posture.</li>
<li>But if they fail to adhere to your supply chain security requirements or attempt to remediate based on findings you share, all bets are off.  </li>
</ul>
</li>
<li><strong>Continually use and enhance data to optimize your C-SCRM strategy and approach.</strong>
<ul>
<li>Strive for C-SCRM process and data maturity in both selecting vendors as well as strengthening these relationships (and your trust in them) over time.</li>
<li>Also use data to build an appropriate operational resilience strategy that will take over in the case of a vendor’s failure – via an attack needing remediation and/or the subsequent removal of such a unacceptable vendor or product.</li>
</ul>
</li>
<li><strong>Grow your C-SCRM Optimization maturity. </strong></li>
</ol>
<ul>
<li>This will never be a static set of vulnerabilities or threat vectors; stay diligent at continual improvement and maturity in your organization’s capabilities to actively avoid supply chain risk and to remediate it quickly if encountered.</li>
</ul>
<p>The listing above of C-SCRM best practices was laid out in a suggested chronological order (do this first, second, and so on).  However, for further elaboration on implementing your best practices, the list below in Graphic #5 shows these same best practices in relation to achieving organizational C-SCRM strategic objectives.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-17929 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/image-5-keith.png" alt="" width="780" height="420" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/image-5-keith.png 780w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/image-5-keith-355x191.png 355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/image-5-keith-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/image-5-keith-768x414.png 768w" sizes="auto, (max-width: 780px) 100vw, 780px" /></p>
<p><strong><em>Graphic 5: C-SCRM Best Practices to Implement Now and Ongoing</em></strong></p>
<p> </p>
<blockquote>
<p><em><strong>C-SCRM Survival Tip #7</strong>: Implement your C-SCRM Best Practices in the order that makes most sense for your organization’s transformation into C-SCRM maturity; but ensure these accomplish the strategic objectives above as you mature.</em></p>
</blockquote>
<h1><strong>Conclusion &amp; Next Steps</strong></h1>
<p><em>So, to what extent do you need a C-SCRM strategy?</em>  By now you should understand the value for any organization to have such a strategy and accompanying best practices.  But the extent to which SCRM should be aligned with and support your business and IT strategies will depend on your business model, vendors profile, cybersecurity capabilities, and risk tolerance.</p>
<p><em>How important are your vendors’ products (e.g., software, tools, hardware, or firmware) to your critical business operations?  Or to your potential growth?  How fragile are your business operations if a vendor in your supply chain was no longer a secure option?   What is your feasible risk tolerance for such external disruptions to operations?  </em>Think about these questions regarding your supply chain, vendor and product choices, and ongoing operational resilience requirements to determine how to develop your specific C-SCRM strategy for current and future needs.</p>
<p>Once you’ve determined the next steps that are appropriate for your organization, here are a few ways that Wavestone can assist you when you’re ready to build out your Cyber Supply Chain Risk Management optimization approach to enhance, baseline, or continually improve your C-SCRM capabilities:</p>
<ol>
<li>Develop a customized C-SCRM strategy for your organization.</li>
<li>Establish a Cyber Supply Chain Center of Excellence (CSC-CoE) with robust C-SCRM capabilities for vendor-related decision-making as well ongoing monitoring and reporting at all organizational levels.</li>
<li>Execute a C-SCRM (Vendor &amp; Product) Capabilities Maturity &amp; Risk Management Assessment to identify any vulnerabilities, risks, or threats; as well as to enable targeted decision-making about selected vendors or products of interest.</li>
</ol>
<p><span style="color: #800080;"><strong>Feel free to reach out to us if you’d like to discuss your Cybersecurity journey and capabilities, and how to get started towards supply chain risk management success.</strong></span></p>
<p><em><strong>About Wavestone US</strong></em></p>
<p><em>Wavestone US is the North American arm of global management and IT consulting firm Wavestone. We have supported the transformations of more than 200 Fortune 1000 companies across a wide range of industries, leveraging a strong peer-to-peer culture, offering a practitioner’s perspective on IT strategy, cost optimization, operational improvements, cybersecurity, and business management. It is our mission to help business and IT leaders successfully deliver their most critical transformations and achieve positive outcomes. We drive change for growth, lower cost, and risk, and create the trust that gives people the desire to act.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/cyber-supply-chain-risk-management-best-practices-operationalizing-your-proactive-c-scrm-defenses/">Cyber Supply Chain Risk Management Best Practices : Operationalizing Your proactive C-SCRM Defenses</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/05/cyber-supply-chain-risk-management-best-practices-operationalizing-your-proactive-c-scrm-defenses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>THE CHALLENGE OF ORGANIZING THE BUDGETARY MANAGEMENT OF CYBERSECURITY IN YOUR COMPANY</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/04/the-challenge-of-organizing-the-budgetary-management-of-cybersecurity-in-your-company/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/04/the-challenge-of-organizing-the-budgetary-management-of-cybersecurity-in-your-company/#respond</comments>
		
		<dc:creator><![CDATA[Nicolas Gauchard]]></dc:creator>
		<pubDate>Tue, 19 Apr 2022 09:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[kpi]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17799</guid>

					<description><![CDATA[<p>The multiple perks of establishing a cyber budget management    For the past few years, companies have seen their cybersecurity budgets significantly increasing; according to the latest Gartner reports, they have increased by 51% since 2018. Chief Information Security Officers...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/04/the-challenge-of-organizing-the-budgetary-management-of-cybersecurity-in-your-company/">THE CHALLENGE OF ORGANIZING THE BUDGETARY MANAGEMENT OF CYBERSECURITY IN YOUR COMPANY</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: justify;"><b><span data-contrast="none">The multiple perks of establishing a cyber budget management</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></h1>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">For the past few years, companies have seen their cybersecurity budgets significantly increasing; according to the latest Gartner reports, they have increased by 51% since 2018. Chief Information Security Officers (CISOs) are now being asked to control cybersecurity costs and report to management as well as the regulator. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">However, this increase in corporate IT security budgets has not always been followed by prudent budgetary management in the past. Learning from that, companies are now launching initiatives to monitor and collect cybersecurity cost data to better understand their evolution and make better informed strategic decisions, improving security while optimizing resource allocation. However, setting up budget management is a complex process that must meet specific objectives. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To what extent is the installation of a cybersecurity budget management system a key issue for the CISOs of large companies? &#8211; Our experience with our clients has proved that collecting cybersecurity budgets and implementing their management is often a valuable process and that reports resulting from such exercises are valuable governance tools. In this first section, we will examine the benefits of regular and industrialized cost collection and its true purposes. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h1><span data-contrast="none">Effectively driving cybersecurity budgeting</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></h1>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">The final budget report is a strategically important governance tool key to achieving operational excellence and helps establish whether the company&#8217;s cybersecurity budget is being used effectively. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Budgetary steering is also an integral component of budget management and allows us to verify that the investments are aligned with the main risks the company is facing. For example, a company might find that its investments in a NIST benchmark topic are particularly low. In addition, if audits show that the level of security is insufficient in this area, then the conclusion is clear: it is necessary to devote more resources to this area. Therefore, budget reports are one of the elements that better facilitate quantitative investment decision making.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span style="color: #ff0000;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"><img loading="lazy" decoding="async" class="aligncenter wp-image-17802 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image1-EN.png" alt="" width="2085" height="1476" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image1-EN.png 2085w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image1-EN-270x191.png 270w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image1-EN-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image1-EN-768x544.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image1-EN-1536x1087.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image1-EN-2048x1450.png 2048w" sizes="auto, (max-width: 2085px) 100vw, 2085px" /> </span></p>
<p style="text-align: justify;"><i><span data-contrast="none">Example of a data visualization element from a budget report showing budgets by NIST activities. In this example, the chart highlights low investments in the &#8220;Identity and Access Management&#8221; area. If operational indicators show that the company&#8217;s maturity level is low, then it will be clear that the company has an incentive in making greater investments in this area. </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">In addition, the Group level data is very useful to the group members when they are shared across the peer set. It offers them an internal benchmark that enables them to view their position relative to their peers. CISOs of the various corporate entities will therefore be able to exchange information directly with each other, share best cybersecurity practices and identify the best operational models implemented by their peers.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h1><b><span data-contrast="none">Taking optimized decisions to achieve operation excellence</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="none">Budget management helps identify opportunities for optimization at entity or group level in order improve cybersecurity effectiveness.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The budget report is an asset for bettering the management of human resources dedicated to cybersecurity. For example, it makes it possible to estimate the ratio of internal labour resources to external resources and to make the necessary adjustments i.e., after reading the budget report, management could launch a labour internalization initiative if it realizes that the proportion of external staff is too high. It can also modify the geographical distribution of human resources in order to better meet the security requirements of corporate entities in different countries and to gauge the onshore/offshore distribution.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-17804 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2-EN.png" alt="" width="1798" height="800" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2-EN.png 1798w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2-EN-429x191.png 429w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2-EN-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2-EN-768x342.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2-EN-1536x683.png 1536w" sizes="auto, (max-width: 1798px) 100vw, 1798px" /></p>
<p style="text-align: justify;"><i><span data-contrast="none">Example of a data visualization element from a budget report showing the number of cybersecurity employees. In this example, the graph reveals a risk that the share of interns is too low to keep the expertise in-house. It might therefore be worthwhile to launch an insourcing plan. </span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Consolidating the cybersecurity budget provides an opportunity to make savings, automate or mutualize activities. Budget management can then result in decisions to consolidate contracts as well as rationalize and/or automate processes in order to keep control of cybersecurity costs.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h1><span data-contrast="none">Due diligence and externally conducted audit compliance</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h1>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">When a company&#8217;s cyber budget is under scrutiny by regulatory authorities, it will be necessary to have a dedicated collection process to be able to provide a reliable breakdown of IT security costs.   Properly conducted budget collection will allow the creation of analytical data and deliverables that will serve as the basis for accurate and informed responses. For example, the European Central Bank has asked some banking organizations to present details of the human resources dedicated to IT security to monitor the preparedness of European banks for cybersecurity risks.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Furthermore, a synthetic view facilitates communication with certainty on the state of budgets and expenses dedicated to security to any interested third party. For example, the American bank JP Morgan Chase explained in its April 2019 letter to shareholders that cybersecurity was one of its major concerns. The bank announced spending more than $600 million a year on IT security and employs 3,000 people in the area. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Finally, knowing one&#8217;s budget is also important when purchasing cyber insurance, to prove the resources invested into cybersecurity. Furthermore, during a merger and acquisition, the resources invested in cybersecurity are often considered in the valuation of a corporate entity.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"> </p>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">Therefore, it seems particularly useful for large companies to have a process for collecting cybersecurity costs as it allows decision-makers to be aware of the amounts spent by the group on information systems security and to steer the strategy. However, the construction of a relevant budgetary report depends on the prior implementation of an extensive, methodical, and standardized data collection process.  The next part of this series will detail the framing and implementation of a budget steering process.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h3>Sources</h3>
<p>[1] « Gartner Forecasts Worldwide Information Security Spending to Exceed $124 Billion in 2019 », august 2018, <a href="https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019">https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019</a></p>
<p>[1] « Cybersecurity spending trends for 2022: Investing in the future », december 2021, <a href="https://www.csoonline.com/article/3645091/cybersecurity-spending-trends-for-2022-investing-in-the-future.html">https://www.csoonline.com/article/3645091/cybersecurity-spending-trends-for-2022-investing-in-the-future.html</a></p>
<p>[2] « Cybersecurity for the financial sector », <a href="https://www.ecb.europa.eu/paym/pol/shared/pdf/qa_cybersecurity.pdf">https://www.ecb.europa.eu/paym/pol/shared/pdf/qa_cybersecurity.pdf</a></p>
<p>[2] « Face au risque de cyberattaque, la BCE demande aux banques d&#8217;être prêtes», february 2022, <a href="https://www.latribune.fr/entreprises-finance/banques-finance/banque/face-au-risque-de-cyberattaque-la-bce-demande-aux-banques-d-etre-pretes-903841.html">https://www.latribune.fr/entreprises-finance/banques-finance/banque/face-au-risque-de-cyberattaque-la-bce-demande-aux-banques-d-etre-pretes-903841.html</a></p>
<p>[3] « CEO Letter to shareholders », august 2019, <a href="https://www.jpmorganchase.com/content/dam/jpmc/jpmorgan-chase-and-co/investor-relations/documents/ceo-letter-to-shareholders-2018.pdf">https://www.jpmorganchase.com/content/dam/jpmc/jpmorgan-chase-and-co/investor-relations/documents/ceo-letter-to-shareholders-2018.pdf</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/04/the-challenge-of-organizing-the-budgetary-management-of-cybersecurity-in-your-company/">THE CHALLENGE OF ORGANIZING THE BUDGETARY MANAGEMENT OF CYBERSECURITY IN YOUR COMPANY</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/04/the-challenge-of-organizing-the-budgetary-management-of-cybersecurity-in-your-company/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake President Fraud: almost caught me out!</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/01/fake-president-fraud-almost-caught-me-out/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/01/fake-president-fraud-almost-caught-me-out/#respond</comments>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Mon, 24 Jan 2022 09:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17534</guid>

					<description><![CDATA[<p>I often talk about cybersecurity awareness: I share concepts and best practices, but today I&#8217;m writing from another point of view: that of the person who has been made aware! Yes, experts are not exempt from awareness initiatives&#8230; let me...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/01/fake-president-fraud-almost-caught-me-out/">Fake President Fraud: almost caught me out!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">I often talk about cybersecurity awareness: I share concepts and best practices, but today I&#8217;m writing from another point of view: that of the person who has been made aware!</p>
<p style="text-align: justify;">Yes, experts are not exempt from awareness initiatives&#8230; let me tell you a story, I’m hoping that it will help you to get the message across to your organization.</p>
<p style="text-align: justify;">It all started on a Tuesday at 3:34 pm. I received a WhatsApp from my CEO (or that&#8217;s what I think at the time!). The message read:</p>
<blockquote>
<p style="text-align: justify;">&#8220;Hi Noémie, are you available? I need to talk with you about a confidential acquisition in Belgium. Pascal&#8221;.</p>
</blockquote>
<p style="text-align: justify;">I picked up the message 10 minutes later and replied that I could free up my time and have that call. In my head, I asked myself a few questions: an acquisition, but who could it be? at what stage of the discussions are they? our priority areas are the US and UK, so it would be a bigger firm?&#8230; In short, the stress level was rising but I wanted to know more. At this stage, nothing indicated the slightest hint of a fraud or scam and I didn’t see any particular risk. I was more intrigued by the opportunity&#8230;</p>
<p style="text-align: justify;"> 2 minutes after my message, the following answer appeared:</p>
<blockquote>
<p style="text-align: justify;">&#8220;No need, but I will need you to prepare a transfer quickly, I will send you the bank information in a few minutes. Thanks”</p>
</blockquote>
<p style="text-align: justify;">At that moment, it all clicked into place. One thing was clear: it was a trap! It was urgent that I did nothing <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p style="text-align: justify;">I then decided to investigate because something wasn’t right in this situation:</p>
<ul style="text-align: justify;">
<li>The phone number of the WhatsApp contact was not the one I have in my phonebook</li>
<li>The photo is indeed Pascal&#8217;s but it&#8217;s a common photo, so easy to get</li>
</ul>
<p style="text-align: justify;">I then sent 2 messages in parallel:</p>
<ul style="text-align: justify;">
<li>The first one to my CEO, to the number registered in my directory. I took a screenshot of the WhatsApp discussion and asked him &#8220;Hello Pascal, obviously it&#8217;s not you! Can you confirm?&#8221;</li>
<li>The second was to the mystery sender on WhatsApp: &#8220;Are you testing me?&#8221;</li>
</ul>
<p style="text-align: justify;">The response on WhatsApp soon arrived, &#8220;Well done!&#8221;, and a more comprehensive message then followed which clarified:</p>
<ul style="text-align: justify;">
<li>This was a campaign to raise awareness about Fake President Fraud.</li>
<li>That the cases are unfortunately frequent and that several attackers have tried to impersonate a member of the executive management, by SMS, social networks or email by simply changing a photo or name</li>
<li>What Fake President Fraud is and the objective of the attackers: to make you believe that they have a priority and confidential matter for you to deal with, such as an acquisition, which requires an urgent payment out of the normal processes.</li>
<li>Rules to follow in case of an attack, clues to thwart attacks, and the security contact to alert.</li>
</ul>
<p style="text-align: justify;">As you can see, this story has a happy ending. In the cold light of day, you might think that it is quite simple to thwart the attack, but unfortunately that is not always the case.   </p>
<p style="text-align: justify;">Beyond the example, it is the management of emotions that I want to emphasise. This exercise was well done and very credible; it first gave me confidence with an important request but without asking me to take any risky or suspicious actions. The importance of the request generated questions and a little stress &#8211; emotions I needed to master in order to keep my decisions and actions logical and reasonable. I am personally familiar with this subject; I know the theory, but I assure you that the real-life situation was very different! I now know that a flood of emotions appears (although they won&#8217;t be so new next time!), but I am reassured that my common sense allowed me to keep a level head and investigate without rushing. I thanked my CISO after the exercise &#8211; I understand the benefits of practice and this experience was a good test, especially for those experts who may feel safe as they know what to do (to be clear: I don’t put myself in that category!). It tested in a very realistic way whether they would know how to put the theory into practice and recognise the messages for what they were: a scam.</p>
<p style="text-align: justify;">Training your people, even the experts, allows them to be better, to be ready (although not necessarily to be perfect!), because the situation will no longer be new, and the emotions will not be unknown&#8230; To shine on the big day, preparation is an essential ingredient, and this is true for everyone!</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>Summary</strong></h1>
<p style="text-align: justify;">Some key elements of Fake President Fraud:</p>
<ul>
<li style="text-align: justify;">Confidence building (photo, tone of voice, choice of words, etc.) by the attacker or climate of authority</li>
<li style="text-align: justify;">Urgency, stress: emotions that create pressure and disturb lucidity</li>
<li style="text-align: justify;">Demand for unusual, abnormal actions to be carried out within a short period of time</li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/01/fake-president-fraud-almost-caught-me-out/">Fake President Fraud: almost caught me out!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/01/fake-president-fraud-almost-caught-me-out/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber-attacks: what are the risks for backups and how to protect yourself?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/11/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/11/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself/#respond</comments>
		
		<dc:creator><![CDATA[Wajih JMAIEL]]></dc:creator>
		<pubDate>Mon, 29 Nov 2021 08:39:18 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Resilience]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17395</guid>

					<description><![CDATA[<p>Backup security is a topic of increasing concern to large accounts, often as part of initiatives to improve their cyber-resilience. When all the protection, detection and response measures have not been sufficient: the information system must be restored quickly from...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself/">Cyber-attacks: what are the risks for backups and how to protect yourself?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Backup </strong>security is a topic of increasing concern to large accounts, often as part of initiatives to improve their <strong>cyber-resilience</strong>. When all the protection, detection and response measures have not been sufficient: the information system must be restored quickly from the backups. Backups are indeed the <strong>last resort in the event of a cyber-attack.</strong></p>
<p>Attackers have understood this issue and we are seeing more and more cyber-attacks affecting backups. As highlighted in the <a href="https://uk.wavestone.com/en/insight/cyberattacks-in-2021-ransomwares-still-threat-n1">2021 benchmark of cyber-attacks in France</a>, <strong>in 21% of ransomware attacks, backup systems were targeted until they were rendered unusable</strong>.</p>
<h1>What is the attackers’ modus operandi for reaching backups?</h1>
<p>First, backups can be affected as <strong>collateral damage</strong>. This was the case a few years ago during a cyber-attack at one of CERT-Wavestone&#8217;s clients. In this, the backup management infrastructure was itself encrypted by the ransomware and had to be rebuilt before backups could be restored.</p>
<p>In ransomware attacks, attackers can also <strong>directly target backups </strong>to <strong>force their target to pay the ransom</strong>. For example, less than a year ago during a CERT-Wavestone incident response, the attacker took care to destroy all backups before encrypting the customer&#8217;s information system. The attacker was able to do this because the backup management infrastructure was administered through an account in the Active Directory. The attacker was able to elevate its privileges to the highest level and was able to easily connect to the backup infrastructure and delete all the backed up data.</p>
<h1>Some initial protective measures can significantly reduce the risk</h1>
<p>In <a href="https://uk.wavestone.com/en/insight/cyberattacks-in-2021-ransomwares-still-threat-n1">100% of the ransomware crises managed by CERT-Wavestone</a>, the attacker had Active Directory domain administration accounts. To prevent the attacker from reaching the backups by this mean, it is therefore necessary to <strong>separate the backup infrastructure from the Active Directory</strong>. To do this,  make sure that the backup administration accounts as well as the backup servers are outside the Active Directory (NB: this will not prevent this infrastructure from backing up the resources managed in the Active Directory).</p>
<p>To further reduce the risk of an administration account being compromised, backup administration access should also be strengthened, for example with <strong>multi-factor authentication </strong>(MFA).</p>
<p>Furthermore, since ransomware attacks often propagate on the same operating system, it may be worthwhile to <strong>adopt a different operating system for the backup infrastructure</strong>. Alternatively, at the very least, make a <strong>copy of the backup catalogue </strong>(database containing pointers to backups) <strong>on a different operating system</strong>. This enables rapid restoration of the backup infrastructure in the event of a compromise.</p>
<p>In addition, it is sometimes possible to apply <strong>retention measures to the backup storage technology, </strong>such as applying a delay before the actual deletion of the data or keeping a copy (or snapshot) on the storage array. This allows for a delay of one or more days before the data is completely lost in the event of a deletion.</p>
<h1>To go further&#8230;</h1>
<p>Various initiatives are emerging to standardize data protection measures to face the growing threat (e.g. <a href="https://www.hkma.gov.hk/media/eng/doc/key-information/guidelines-and-circular/2021/20210518e1.pdf">Secure Tertiary Data Backup Guideline </a>by the HKAB &#8211; <em>Hong Kong Association of Banks</em>, <a href="https://www.shelteredharbor.org/how-it-works">Sheltered Harbor </a>in the United States&#8230;).</p>
<p>In addition, backup vendors are building their solutions with the cyber threat in mind, with <strong>ransomware detection features</strong>, <strong>immutability features </strong>(to make backed up data completely unalterable, even for an administrator) or even <strong>&#8220;offline&#8221; backup isolation </strong>capabilities<strong>. </strong></p>
<p>These solutions can be adopted to <strong>replace or complement </strong>existing backup solutions. Nevertheless, they <strong>often require significant investments</strong>. As we have seen, a certain number of initial protection measures can already greatly reduce the risk. It is therefore important to identify the feared threat scenarios and your level of exposure. It is also important to identify any compliance requirements (regulations, standards, etc.), in order to define an appropriate roadmap of maturity improvement.</p>
<p><em>This article is intended as an introduction to protecting backups against cyber-attacks. We will have the opportunity to go into more detail on this subject in future publications.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself/">Cyber-attacks: what are the risks for backups and how to protect yourself?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/11/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Creating a relationship of trust with your executive committee: step 3, make the transformation a reality!</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/10/creating-a-relationship-of-trust-with-your-executive-committee-step-3-make-the-transformation-a-reality/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/10/creating-a-relationship-of-trust-with-your-executive-committee-step-3-make-the-transformation-a-reality/#respond</comments>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Fri, 29 Oct 2021 13:16:32 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[Executive Committee]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17228</guid>

					<description><![CDATA[<p>  After having successfully mobilized its executive committee on cybersecurity, having made a realistic and concrete assessment of the situation, you had an agreement in principle to start a remediation program! A great victory, and the beginning of a multi-year...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/creating-a-relationship-of-trust-with-your-executive-committee-step-3-make-the-transformation-a-reality/">Creating a relationship of trust with your executive committee: step 3, make the transformation a reality!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">After having successfully <a href="https://www.riskinsight-wavestone.com/en/2020/07/creating-a-relationship-of-trust-with-the-excom-first-step-raising-awareness/">mobilized its executive committee on cybersecurity</a>, having <a href="https://www.riskinsight-wavestone.com/en/2021/05/episode-2-create-a-relationship-of-trust-with-the-executive-committee/">made a realistic and concrete assessment of the situation</a>, you had an agreement in principle to start a remediation program!</p>
<p style="text-align: justify;">A great victory, and the beginning of a multi-year adventure!</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Defining ambitions and framing governance </strong></h2>
<p style="text-align: justify;">The cybersecurity assessment and its benchmark have enabled us to position the organization&#8217;s current level of security. What remains now is to define the target to be reached and the means necessary to achieve it. This involves working with the cybersecurity teams, the IT department and of course the executive committee sponsor! The target can take many forms, but it must in any case respond to clear and concrete business challenges:</p>
<p style="text-align: justify;">“To have an above-average level of security overall to avoid the most frequent attacks&#8221;, &#8220;To protect the data of large public customers&#8221;, &#8220;To ensure the resumption of factory production in less than 4 days in the event of a cyber attack&#8221;, or for more mature structures &#8220;To rationalize cyber investments by saving 20% for the same level of risk&#8221;, these are just a few examples of ambitions encountered in the field.</p>
<p style="text-align: justify;">It is at the time of this target definition that we can adopt a risk-based approach, for example with different targets between businesses or entities; a regulatory approach with different levels depending on business constraints or a global approach.</p>
<p style="text-align: justify;">Each target will be the subject of performance or risk indicators (KPI/KRI) to specify how progress will be measured. These ambitions are then translated into a concrete positioning on a cybersecurity benchmark, by theme and by scope. The easiest way to do this is to use the <a href="https://www.riskinsight-wavestone.com/en/2021/05/episode-2-create-a-relationship-of-trust-with-the-executive-committee/">results of the previous benchmark</a>, but it is possible to use another benchmark. Be careful, however, it will be used throughout the program to monitor progress and guide the various teams and entities, so plan on a lifespan of at least 2 years! The definition of the repository and the indicators is a key step in the success of the program, so plan to devote time to it. It is best not to immediately launch a whole series of technical projects without the necessary consistency.</p>
<p style="text-align: justify;">To manage this program, the CISO must know how to surround themselves with people. The IS (Information Security) departments rarely have the experience to carry out such a transformation and budgetary requirements at this level. A good practice is to identify an experienced program director within the organization, who is used to the workings of the organization, and who can work closely with the CISO. The skills of the two profiles will naturally complement each other, on the one hand with security expertise, and on the other with large-scale management expertise. The choice of the binomial is also an important key factor of success, do not hesitate to spend time on it!</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Build budgets on clear axes and know how to commit expenses</strong></h2>
<p style="text-align: justify;">Once the agreement in principle has been received, the next step is to clearly structure the budgetary commitment. Once again, the major challenge in the relationship with the executive committee will be to make a clear and precise proposal: Acronyms, project codes and other abstruse terms should be avoided. The structure of a simple strategy; &#8220;Protecting the digital work environment&#8221;, &#8220;Encrypting and avoiding critical data leaks&#8221;, &#8220;Detecting attacks on our key assets&#8221; are some examples of terms used successfully.</p>
<p style="text-align: justify;">The structuring of a program should be kept to around 4 or 5 axes and to group about 30 projects  maximum is something to keep in mind. Beyond that, reporting and monitoring will become too complex.</p>
<p style="text-align: justify;">It should be noted that it will be necessary to break with the budgetary exercise obviously on the construction actions (&#8220;build&#8221;) but also on the additional operating costs (&#8220;run&#8221;) without that, the beautiful remediation will not last long&#8230; The identification also of the HR elements (number of recruitments/mobilities, trainings to be envisaged, salary evolution, evolution of the hierarchical relations in the entities or the subsidiaries&#8230;) are key elements to be created in the program to ensure its durability in time. This is clearly the right time to create a real cyber department within the organization and have it managed by a &#8220;Chief Operating Officer&#8221; like any other major department.</p>
<p style="text-align: justify;">The preparation of these different budgetary elements will also have to consider the difficulty observed for several years now to commit the budgets obtained. The market is in dire need of cyber expertise and many projects have to be postponed. It is a good idea to take some leeway in the planning process to consider this situation, which will continue. The classic program timeline of, year 1 scoping, year 2 implementation, year 3 control, should be reviewed and instead be based on waves of smaller projects that are initiated as they come along. In short, it is better to have 5 waves of 5 projects that come to fruition than to launch 25 scopes simultaneously!</p>
<p style="text-align: justify;">It should also be noted that these budgets and priorities will have to be reviewed annually, as the cyber threat is very dynamic, it is important to keep flexible budget lines to adapt to an unprecedented evolution of threats &#8211; as we have experienced in recent years.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Show progress to the executive committee!</strong></h2>
<p style="text-align: justify;">Once the program has been launched, the challenge will be to show the executive committee the progress and the effects on risk levels. On a quarterly or even a semi-annual basis there are key points that need to be established: clear reporting, using simple terms that are linked to the reference system used, adding a vision on the progress of the projects and the progression of the risk level.To directly demonstrate the transition to regular reporting mode, it may be useful to add operational indicators linked to the level of security. In the long term, the challenge is to maintain an exchange with the executive committee at least every six months in order to maintain the level of attention on the cyber subject. These long-term exchanges can be structured around two annual meetings, one on risks (evolution of the threat and risks weighing on the organization), the other on investments (effects of projects, budgetary and HR issues for the following year).</p>
<p style="text-align: justify;">Finally, the most advanced structures and those whose core business is based on digital technology can consider using their cybersecurity investments as business differentiators! Today, the cybersecurity requirements of customers, both large public and professional, are increasing rapidly. It is possible, and even desirable, to enhance the value of investments made to show that the subject of cybersecurity is a priority for the organization! For some organizations, cybersecurity may even become a profit centre, which will clearly change the discussions with the executive committee.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/creating-a-relationship-of-trust-with-your-executive-committee-step-3-make-the-transformation-a-reality/">Creating a relationship of trust with your executive committee: step 3, make the transformation a reality!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/10/creating-a-relationship-of-trust-with-your-executive-committee-step-3-make-the-transformation-a-reality/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Assises 2021: fighting back against ransomware: how the CAC40 is reacting?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/10/fighting-back-against-ransomware-how-the-cac40-is-reacting/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/10/fighting-back-against-ransomware-how-the-cac40-is-reacting/#respond</comments>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Mon, 25 Oct 2021 10:44:32 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17186</guid>

					<description><![CDATA[<p>Attacks are multiplying and diversifying in terms of both their technical development and the methods of extortion. Despite recent arrests and diplomatic moves, these Ransomware attacks will remain very prevalent in 2022. But what is the real level of CAC...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/fighting-back-against-ransomware-how-the-cac40-is-reacting/">Assises 2021: fighting back against ransomware: how the CAC40 is reacting?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attacks are multiplying and diversifying in terms of both their technical development and the methods of extortion. Despite recent arrests and diplomatic moves, these Ransomware attacks will remain very prevalent in 2022. But what is the real level of CAC 40 companies faced with this threat? How do these large accounts structure and monitor large-scale anti-ransomware programs? And what projects should be put in place to anticipate future developments?</p>



<p>Discover below the presentation presented during the Assises 2021</p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex">
<div class="wp-block-button"><a class="wp-block-button__link has-background" href="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/2021_Wavestone_Assises_ransomware-CAC40-fighting-back.pdf" style="background-color:#503078" target="_blank" rel="noreferrer noopener"><strong>Discover insight</strong></a></div>
</div>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/fighting-back-against-ransomware-how-the-cac40-is-reacting/">Assises 2021: fighting back against ransomware: how the CAC40 is reacting?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/10/fighting-back-against-ransomware-how-the-cac40-is-reacting/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Organise a cyber crisis exercise in a large company</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/07/organise-a-cyber-crisis-exercise-in-a-large-company/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Thu, 08 Jul 2021 12:00:18 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[COMEX]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberawareness]]></category>
		<category><![CDATA[exercice]]></category>
		<category><![CDATA[management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13884</guid>

					<description><![CDATA[<p>Organising a cyber crisis exercise is not an easy task.&#160;From&#160;the preparation to the D-Day, a lot of&#160;unforeseen&#160;events&#160;can&#160;occur&#160;and the preparation&#160;teams&#160;need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/07/organise-a-cyber-crisis-exercise-in-a-large-company/">Organise a cyber crisis exercise in a large company</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><i><span data-contrast="auto">Organising a cyber crisis exercise is not an easy task.&nbsp;From&nbsp;the preparation to the D-Day, a lot of&nbsp;unforeseen&nbsp;events&nbsp;can&nbsp;occur&nbsp;and the preparation&nbsp;teams&nbsp;need to remain a step ahead of the players. This article will break down the steps to a successful cyber crisis exercise in a large company.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:264}">&nbsp;</span></p>
<h2></h2>
<h2 style="text-align: justify;"><strong>ORGANISING&nbsp;A CYBER CRISIS EXERCISE IN A LARGE COMPANY&nbsp;</strong></h2>
<p style="text-align: justify;"><span data-contrast="auto">There are many reasons to organise a Cyber crisis exercise: evaluating the integration of Cyber security in the crisis management system, improving interactions between the different teams, and testing the capacity of the security division to make itself understood by top management.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">From a simple table-top process test to SOC/CERT training to a large-scale exercise involving dozens of crisis&nbsp;teams&nbsp;and months of preparation, the resources&nbsp;</span><span data-contrast="auto">allocated to a crisis simulation vary greatly</span><span data-contrast="auto">.&nbsp;This article focuses on&nbsp;the&nbsp;last category.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h2></h2>
<h2><strong>WHAT’S A TYPICAL CRISIS EXERCISE?&nbsp;</strong></h2>
<p style="text-align: justify;"><span data-contrast="auto">Looking at the figures, some of the largest crisis exercises in France have consisted of one day of activity, 150 people mobilised, 10-12 crisis teams in several countries, 30 facilitators, 20 observers and more than 300 stimuli. Being able to make a success of such an event requires both a high level of preparation and a very solid facilitation team on the D-day.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">One of the key issues found in these types of exercises is that there is only one take. It is therefore essential that ALL the actors take part in the game, and that the scenario involves all the participants. Preparation and facilitation are key in such exercises to make sure the time spent on the simulation is worthwhile. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h2 aria-level="2"></h2>
<h2 style="text-align: justify;" aria-level="2"><strong>SIX MONTHS TO PREPARE</strong><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559738&quot;:80,&quot;335559739&quot;:0,&quot;335559740&quot;:240}">&nbsp;</span></h2>
<h4 aria-level="2"></h4>
<h3 style="text-align: justify;" aria-level="3"><strong>1/&nbsp;Selecting&nbsp;the attack scenario&nbsp;</strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">The first months of work are always devoted to the attack scenario. Ransomware, targeted fraud, attacking suppliers… the choice of weapons is large. In ambitious exercises, it is not rare to combine several attacks in one crisis: smoke screen launched by the attackers, identification of a second group during the investigation, etc. Whatever the scenario chosen, the key is to be as precise as possible:</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="2" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">What are the attackers’ motives?</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">What path of attack did they take?</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></li>
<li data-leveltext="" data-font="Symbol" data-listid="2" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">When was the first intrusion?</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">The exercise is long and preparation beforehand is needed, especially when 150 players investigate an attack for several hours. Spear-phishing, water holing, code compromise, privilege escalation: the vulnerabilities used by the fictitious attacker are not real, but they must be plausible and “validated” by technical accomplices throughout the preparation. Similarly, for business impacts, they should be reviewed with business specialists: the level of fraud at which the situation becomes critical, critical activities to be targeted as a priority, most sensitive customers, etc. The choice and involvement of accomplices are essential and they should be integrated into the coordination team on D-day. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h3 style="text-align: justify;" aria-level="3"><strong>2/ Building&nbsp;the script of the exercise&nbsp;</strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">The&nbsp;script consists in defining minute by minute the information that will be communicated to the players. The calibration of the exercise rhythm is a complex point.&nbsp;The temptation to impose&nbsp;a strict&nbsp;rhythm is great to “master” the scenario&nbsp;but&nbsp;attention needs to be&nbsp;given&nbsp;to leave enough space&nbsp;for reflection.&nbsp;</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">The start of the exercise is another complex point: should&nbsp;the scenario&nbsp;start directly&nbsp;in&nbsp;a crisis situation&nbsp;or on&nbsp;an&nbsp;alert that will test the general mobilization process?&nbsp;Most often than not, the&nbsp;second option is chosen.&nbsp;That way, the&nbsp;technical teams (CERT, SOC, IT…)&nbsp;&nbsp;can be mobilised&nbsp;for the entire duration of the exercise.&nbsp;ExCom&nbsp;members should have their diary freed up during that day&nbsp;as well.&nbsp;</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h3 style="text-align: justify;" aria-level="3"><strong>3/ Preparation of&nbsp;the stimuli&nbsp;</strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">Technical reports, fake tweets, messages from worried customers, these are all useful stimuli for the players.&nbsp;</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">Videos are often used to&nbsp;captivate.&nbsp;Indeed, nothing is more striking than a fake&nbsp;BBC&nbsp;report relaying the current attack (logo, board, etc.&nbsp;the more realistic the better).&nbsp;For more realism, videos&nbsp;of people “known” in the company (message from the CEO, interview of a factory boss,&nbsp;etc)&nbsp;can be used.&nbsp;</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">The same goes for the technical side: the duration of the exercises often does not allow the players to carry out the technical investigations themselves, but they will ask a lot of the facilitators.&nbsp;Everything must be ready to avoid panic:&nbsp;Malware analysis reports, application log extracts, IP address lists, etc.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">As mentioned in the introduction, the most ambitious exercises may require the creation of 300 stimuli to get through the day and remain credible&nbsp;–&nbsp;is represents a&nbsp;lot of work.</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h2 style="text-align: justify;" aria-level="2"><strong>D-DAY&nbsp;</strong></h2>
<p style="text-align: justify;"><span data-contrast="auto">On D-Day, early morning, a meeting is organised&nbsp;with all the animation team and observers for&nbsp;the&nbsp;final adjustments. A few hours later, the observers&nbsp;will&nbsp;go to their crisis cells and start the players’ briefing.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h3 style="text-align: justify;" aria-level="3"><strong>1/ Starting on a good basis&nbsp;</strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">For&nbsp;many players, this may be their first exercise. The briefing is&nbsp;therefore&nbsp;essential to avoid&nbsp;confusion between fictional and real-life events:&nbsp;</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<ul style="text-align: justify; list-style-type: circle;">
<li data-leveltext="%1." data-font="Times New Roman" data-listid="3" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Players call the police in the middle of the exercise</span></li>
</ul>
<ul style="text-align: justify; list-style-type: circle;">
<li data-leveltext="%1." data-font="Times New Roman" data-listid="3" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">The players contact a mailing list of 400 people without specifying that it is an exercise</span></li>
</ul>
<ul style="text-align: justify; list-style-type: circle;">
<li data-leveltext="%1." data-font="Times New Roman" data-listid="3" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Real customers be called to be reassured</span></li>
</ul>
<ul style="text-align: justify; list-style-type: circle;">
<li data-leveltext="%1." data-font="Times New Roman" data-listid="3" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">A production site is neutralized “by prevention”</span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">To avoid such situations, it is essential to iron out the rules of the game during the briefing: the players must communicate with each other, but they must go through the facilitation unit to contact external stakeholders. Throughout the day, the facilitators and accomplices in each team find themselves in the shoes of a client, a technical expert, a CEO, or a regulator, according to the players’ requests. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<h3 style="text-align: justify;" aria-level="3"><strong>2/ Rely on an efficient facilitation team&nbsp;</strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">The sequence of events depends on the efficiency of the animation cell. A successful exercise includes a lot of improvisation on the day. Stimuli may have to be readjusted according to the reactions of the players, the score is never fixed and the facilitation cell will be put to the test on the day of the exercise. The largest crisis exercises have particularly professional crisis management teams, including the head of the facilitators, PMO, technical manager, business manager, call management centre, etc. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">We suggest not to take any risks on D-Day and to recreate teams that are used to working together and know each other. Doing so is the best way to gain time that will prevent the organisation team from going into crisis itself.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:120,&quot;335559740&quot;:240}">&nbsp;</span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/07/organise-a-cyber-crisis-exercise-in-a-large-company/">Organise a cyber crisis exercise in a large company</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Episode 2 Create a relationship of trust with the executive committee</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/05/episode-2-create-a-relationship-of-trust-with-the-executive-committee/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Fri, 28 May 2021 07:29:33 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15889</guid>

					<description><![CDATA[<p>Create a relationship of trust with&#160;the&#160;executive committee: step 2,&#160;solidify&#160;the&#160;organisation&#8217;s&#160;posture and explain the lines of action Creating a relationship of trust with&#160;the&#160;executive committee is a long-term action. After a&#160;first&#160;step that often involves raising awareness and putting the cyber risk into perspective...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/05/episode-2-create-a-relationship-of-trust-with-the-executive-committee/">Episode 2 Create a relationship of trust with the executive committee</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: left;"><b><span data-contrast="auto">Create a relationship of trust </span></b><b><span data-contrast="auto">with</span></b><b><span data-contrast="auto">&nbsp;the&nbsp;</span></b><b><span data-contrast="auto">executive committee: step 2,&nbsp;</span></b><b><span data-contrast="auto">solidify</span></b><b><span data-contrast="auto">&nbsp;the&nbsp;</span></b><b><span data-contrast="auto">organisation&#8217;s</span></b><b><span data-contrast="auto">&nbsp;posture and explain the lines of action</span></b></h1>
<p style="text-align: justify;"><span data-contrast="auto">Creating a relationship of trust with&nbsp;</span><span data-contrast="auto">the</span><span data-contrast="auto">&nbsp;executive committee is a long-term action. After a</span><span data-contrast="auto">&nbsp;first</span><span data-contrast="auto">&nbsp;step that often involves raising awareness and putting the cyber risk into perspective for the organization (see</span><span data-contrast="auto">&nbsp;</span><span data-contrast="auto"><a href="https://www.riskinsight-wavestone.com/en/2020/07/creating-a-relationship-of-trust-with-the-excom-first-step-raising-awareness/">BILLET 1</a>),</span><span data-contrast="auto">&nbsp;</span><span data-contrast="auto">it is now a&nbsp;</span><span data-contrast="auto">case</span><span data-contrast="auto">&nbsp;of getting to the heart of the matter and starting the path of transformation!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<h2><b><span data-contrast="auto">TO TRANSFORM, YOU HAVE TO KNOW&nbsp;</span></b><b><span data-contrast="auto">FROM WHERE YOU ARE STARTING</span></b><b><span data-contrast="auto">&#8230;.</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Before any transformation</span><span data-contrast="auto">,</span><span data-contrast="auto">&nbsp;it is important to define the starting point and share the findings with the executive committee. The use of&nbsp;</span><span data-contrast="auto">international standards&nbsp;</span><span data-contrast="auto">obviously forms the basis for evaluation</span><span data-contrast="auto">, ISO 27001/2 and NIST CSF are the two international references: one rather European, the other more&nbsp;</span><span data-contrast="auto">anglo-american</span><span data-contrast="auto">.&nbsp;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">But what will matter most to executives is a benchmark based on the posture of their competitors and the market in which they are located. As such, we have developed a specific tool</span><span data-contrast="auto">ing</span><span data-contrast="auto">&nbsp;at Wavestone and built a comparison base that currently includes more than 50 large organizations, mostly international and based in Europe. The quality of this base is essential to convince the leaders, who during the debriefings will ask, precisely and&nbsp;</span><span data-contrast="auto">often&nbsp;</span><span data-contrast="auto">with&nbsp;</span><span data-contrast="auto">a</span><span data-contrast="auto">&nbsp;lot of hindsight, what is done elsewhere.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">The first key element of an evaluation&nbsp;</span><b><span data-contrast="auto">is to ask the right&nbsp;</span></b><b><span data-contrast="auto">questions and get useful answers!</span></b><span data-contrast="auto">&nbsp;</span><span data-contrast="auto">&nbsp;In a large organization, it is complex to</span><span data-contrast="auto">&nbsp;carry out</span><span data-contrast="auto">&nbsp;a detailed assessment of the level of compliance with&nbsp;</span><span data-contrast="auto">security&nbsp;</span><span data-contrast="auto">rules</span><span data-contrast="auto">. The use of a simple notation, on a classic scale of maturity&nbsp;</span><span data-contrast="none">&#8211;</span><span data-contrast="auto">&nbsp;</span><span data-contrast="auto">from 1 to 4 for example</span><span data-contrast="auto">&nbsp;</span><span data-contrast="none">&#8211;&nbsp;</span><span data-contrast="auto">quickly reaches its limit. What we have chosen to do, and which has proven its worth on the ground</span><span data-contrast="auto">,</span><span data-contrast="auto">&nbsp;is to answer questions by expressing a percentage of the perimeter covered. For example, it is possible to have 80% of workstations with a simple anti-virus and 20% with a modern tooling type EDR. The same approach is replicable on more organizational issues, 50% of users</span><span data-contrast="auto">&nbsp;aware</span><span data-contrast="auto">&nbsp;by sending emails, 30% by tracking a webinar and 20% by face-to-face sessions.&nbsp;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">In the collective unconscious, this phase of questioning often seems long and very energy intensive.</span><span data-contrast="auto">&nbsp;I</span><span data-contrast="auto">f you want a high level of detail, evidence gathering or technical checks: this can be useful when the organization already has a high level of maturity. But at the beginning, a simpler and more effective approach, typically over a short period of one month with a load of twenty days, may be enough to&nbsp;</span><span data-contrast="auto">provide a&nbsp;</span><span data-contrast="auto">&nbsp;concrete picture of the situation and enough concrete arguments to get decisions and initiate change.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">During the preparation phase</span><span data-contrast="auto">,</span><span data-contrast="auto">&nbsp;it will also be important to identify the expectations of the executive committee beforehand. Discussing with the most concerned members about their expectations, getting their opinions on the right way to approach the subject and the priorities of the organization will be essential to ensure the relevance of the questioning and restitution phases.&nbsp;</span><span data-contrast="auto">There is n</span><span data-contrast="auto">othing</span><span data-contrast="auto">&nbsp;worse than making an off topic on the day of restitution!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">&#8230; AND SHARE THE REALITY OF THE SITUATION&nbsp;</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></h2>
<p style="text-align: justify;"><span data-contrast="auto">After the collection phase, the time will come for the analysis of the results. Our feedback show</span><span data-contrast="auto">s</span><span data-contrast="auto">&nbsp;</span><span data-contrast="auto">that combining multiple views makes the most sense and is effective in gaining commitment</span><span data-contrast="auto">. The classic rosettes of ISO or NIST compliance are obviously essential but often prove ineffective: too many axes, too many mixed elements that ultimately always give average notes.&nbsp;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">As mentioned in the previous post, two indicators will be successful at the beginning of the exchange: the budget dedicated to cybersecurity and the&nbsp;</span><span data-contrast="auto">number</span><span data-contrast="auto">&nbsp;of people</span><span data-contrast="auto">&nbsp;mobilized on cybersecurity. The budget indicator is always tricky to handle (high annual variation and non-homogeneous accounting method), we often prefer to use that of more stable and reliable staff). Secondly, in our opinion, it is effective to run the analysis on three axes:&nbsp;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Calibri" data-listid="1" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Th</span><span data-contrast="auto">e 1</span><span data-contrast="auto">st</span><span data-contrast="auto">&nbsp;is the&nbsp;</span><span data-contrast="auto">resistance of the organization to the last known&nbsp;</span><b><span data-contrast="auto">attacks.</span></b><span data-contrast="auto">&nbsp;Clearly the most effective element in debriefing with the executive committee, it also helps to attract attention at the beginning of the restitution. To achieve this view, we use CERT-W operational feedback to find out&nbsp;</span><span data-contrast="auto">about</span><span data-contrast="auto">&nbsp;the latest methods of cybercriminal attacks and we conduct an analysis of the&nbsp;</span><span data-contrast="auto">associated measures.&nbsp;</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></li>
<li data-leveltext="-" data-font="Calibri" data-listid="1" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Th</span><span data-contrast="auto">e 2</span><span data-contrast="auto">nd</span><span data-contrast="auto">&nbsp;is&nbsp;</span><span data-contrast="auto">a</span><span data-contrast="auto">&nbsp;</span><b><span data-contrast="auto">market posture,</span></b><b><span data-contrast="auto">&nbsp;</span></b><span data-contrast="auto">crossing the level of compliance with international</span><span data-contrast="auto">&nbsp;</span><span data-contrast="auto">benchmarks (type: &#8220;I aim for 75% ISO compliance&#8221;) with the gap to the market average for the organization concerned (&#8220;on the safety of the workstation, I am 3 points below the market. On physical security, I&#8217;m 2 points above&#8221;). Crossing these two axes helps to identify priority areas (those where you are below international standards but also above the market)&nbsp;</span><span data-contrast="auto">and</span><span data-contrast="auto">&nbsp;those where you should not be aggressive (the whole market is below international benchmarks, but you are above the market average).</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></li>
<li data-leveltext="-" data-font="Calibri" data-listid="1" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Th</span><span data-contrast="auto">e 3</span><span data-contrast="auto">rd</span><span data-contrast="auto">&nbsp;is a</span><span data-contrast="auto">n “actors” oriented view</span><b><span data-contrast="auto">&nbsp;of the transformation,&nbsp;</span></b><span data-contrast="auto">organized by the large entities that will be in charge of the transformation (for example: within the CIO the network, the workstations, the servers, within the risk directorate &#8230;). This view is very useful to conclude the exchange because it&nbsp;</span><span data-contrast="auto">creates action&nbsp;</span><span data-contrast="auto">and shows who will have to invest the most.</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">Of course, these different views can be segmented by country or large organizational units to reflect possible disparities or expectations of management.&nbsp;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">In this phase of restitution, our feedback show</span><span data-contrast="auto">s</span><span data-contrast="auto">&nbsp;that executive committees are increasingly sensitive to cybersecurity issues and will ask very specific and concrete questions. Therefore, evidence and factual evidence about the organization must be&nbsp;</span><span data-contrast="auto">well-informed.</span><span data-contrast="auto">&nbsp;Having the results of recent audits, concrete figures on the length of time it takes to successfully break in, and even videos of an attack demonstration can&nbsp;</span><span data-contrast="auto">facilitate&nbsp;</span><span data-contrast="auto">an executive committee&nbsp;</span><span data-contrast="auto">to become&nbsp;</span><span data-contrast="auto">aware of the risk.&nbsp;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">STARTING NOW STEP 3: TRANSFORMING THE ORGANIZATION&nbsp;</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Describ</span><span data-contrast="auto">ing</span><span data-contrast="auto">&nbsp;the situation, the difficulties and the axes of progress should not be an&nbsp;</span><span data-contrast="auto">end</span><span data-contrast="auto">. The first arguments must be prepared on the conduct of change. Who should carry the transformation? What financial volumes should be expected? What schedule to consider? What reporting should be done? And above all what sponsor in the executive committee&nbsp;</span><span data-contrast="auto">should&nbsp;</span><span data-contrast="auto">follow this topic! Without being a formal part of the&nbsp;</span><span data-contrast="auto">meeting</span><span data-contrast="auto">,&nbsp;</span><span data-contrast="auto">incorporating these elements into</span><span data-contrast="auto">&nbsp;</span><span data-contrast="auto">the end of the exchange allows us to prepare the next step and</span><span data-contrast="auto">&nbsp;</span><span data-contrast="auto">collect the first opinions</span><span data-contrast="auto">.&nbsp;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">These issues are obviously very dependent on the organization, but we are seeing trends emerging. Today, it is mainly the&nbsp;</span><span data-contrast="auto">CISO w</span><span data-contrast="auto">ithin the CIO that carries the transformation often supported by an experienced&nbsp;</span><span data-contrast="auto">program</span><span data-contrast="auto">me</span><span data-contrast="auto">&nbsp;director familiar with the structure. Regarding budgets, for major remediation&nbsp;</span><span data-contrast="auto">programmes</span><span data-contrast="auto">, the sums in the financial sector range between 200 and 800 million euros, in the&nbsp;</span><span data-contrast="auto">industr</span><span data-contrast="auto">ial sector&nbsp;</span><span data-contrast="auto">b</span><span data-contrast="auto">etween 50 and 100 million. These sums are usually committed on 2- or 3-year programs and are followed by the quarterly executive committee at the launch and then a semi-annual pace can be&nbsp;</span><span data-contrast="auto">sustained</span><span data-contrast="auto">&nbsp;from then onwards</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<p style="text-align: justify;"><span data-contrast="auto">To conclude the session, the most important thing is to&nbsp;</span><b><span data-contrast="auto">define the next step</span></b><b><span data-contrast="auto">s</span></b><b><span data-contrast="auto">!</span></b><span data-contrast="auto">&nbsp;</span><span data-contrast="auto">&nbsp;Even if all these&nbsp;</span><span data-contrast="auto">savings&nbsp;</span><span data-contrast="auto">do not&nbsp;</span><span data-contrast="auto">immediately&nbsp;</span><span data-contrast="auto">lead to the launch of an investment&nbsp;</span><span data-contrast="auto">programme</span><span data-contrast="auto">,</span><span data-contrast="auto">&nbsp;</span><span data-contrast="auto">the risk review should take&nbsp;</span><span data-contrast="auto">these results into account or propose the realization of a benchmark again the following year.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}">&nbsp;</span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/05/episode-2-create-a-relationship-of-trust-with-the-executive-committee/">Episode 2 Create a relationship of trust with the executive committee</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security channels on the verge of burn-out – an attempt to explain this phenomenon</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/04/security-channels-on-the-verge-of-burn-out-an-attempt-to-explain-this-phenomenon/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Mon, 12 Apr 2021 09:00:02 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[burnout]]></category>
		<category><![CDATA[career]]></category>
		<category><![CDATA[CISO]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15489</guid>

					<description><![CDATA[<p>Security organisation are facing more and more employees leaving. There is an urgent need to rebuild a more readable operational model with a trend in pooling and eliminating redundancies. This article will present an attempt at explaining this situation and...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/04/security-channels-on-the-verge-of-burn-out-an-attempt-to-explain-this-phenomenon/">Security channels on the verge of burn-out – an attempt to explain this phenomenon</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Security organisation are facing more and more employees leaving. <strong>There is an urgent need to rebuild a more readable operational model with a trend in pooling and eliminating redundancies</strong><strong>.</strong> This article will present an attempt at explaining this situation and at giving some possible solutions.</p>
<p style="text-align: justify;"><strong>Repeated sick leave, insomnia, withdrawal, security systems companies have been under great pressure for several years. </strong>Although threats are intensifying, it is not enough to explain this phenomenon. It is clear <strong>that the level of stress is more related to the functioning of the sector and management practices, rather than to the very nature of the activities carried out. </strong>Last year, a study by Nominet showed that 23% of ISSMs in 2020 admit to using medication and/or alcohol and drugs to cope. And very clearly, the phenomenon is not limited to ISSMs alone, but to the entire ISS community (SOC analysts, project managers, experts&#8230;). But how have we been able to move from passionate, close-knit teams in less than 10 years to such an HR situation?</p>
<h2><strong>Cybersector HR approach </strong></h2>
<p style="text-align: justify;">Requests for intervention are very rare concerning HR policies, training courses, managerial practices even though the smooth running of the sector and the well-being of the employees have a definite impact on the medium-term level of safety. Sportsmen and women know it very well, the state of mind in the changing room has a major influence on the final result.</p>
<figure id="post-15487 media-15487" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-15487 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/RH-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/RH-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/RH-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/RH-768x511.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/RH.jpg 1000w" sizes="auto, (max-width: 287px) 100vw, 287px" /></figure>
<p style="text-align: justify;">Faced with this observation, some major accounts have taken an interesting step: <strong>they have integrated these HR operating topics directly into their maturity framework </strong>(NIST, ISO, etc.). This is indeed an excellent idea that enables them to deal with essential subjects in a few weeks via an already established organisation and processes (insurance, evidence review, cyber programme, etc.). Another advantage, the framework is often an essential input to the construction of the strategy, and this HR dimension is thus directly integrated into the multi-year plan of certain companies. <strong>Concrete and measurable objectives are defined for staff turnover, employee motivation or even the work/life balance. </strong><strong>Finally</strong><strong>, </strong>these elements are regularly presented to top management alongside the patching rate, zero-trust convergence and resilience capacities!</p>
<p style="text-align: justify;">When the physiological well-being of the employees is integrated into the objectives of the sector, and therefore at the same time into those of the CISOs, companies have a much smoother run; but it is still necessary to address the right subjects!</p>
<h2><strong>Priorities: Valuing expertise, encouraging mobility and aligning salaries</strong></h2>
<p style="text-align: justify;">Pentesters, CERT analysts, DevSecOps specialists&#8230; the security sector is made up of a multitude of experts, who are not always recognised, valued and motivated with relevance. <strong>Unfortunately, too many companies still have a natural tendency to overvalue management to the detriment of expertise.</strong> It is therefore indispensable to create an ecosystem favourable to experts in the ISS fields. The field of possibilities is vast: the implementation of specific career paths, encouraged access to certification, involvement of communities of expertise in major decisions, external valorisation (conferences, media).</p>
<figure id="post-15485 media-15485" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-15485 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/New-job-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/New-job-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/New-job-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/New-job-768x512.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/New-job.jpg 1080w" sizes="auto, (max-width: 287px) 100vw, 287px" /></figure>
<p style="text-align: justify;">The subject of mobility is also essential. There is indeed a feeling of suffocation within the sector: the tension on cybersecurity resources is so great that <strong>many employees feel they are stuck on their posts, without the slightest possibility of evolution. </strong>As a result, morale is low, people are going around in circles, asking questions, criticising creating an unhealthy climate. A obvious solution exists: encouraging or even imposing mobility. For example, some major accounts have recently set up incentive governance that allows ISSMs to spontaneously propose mobilities and exchange resources, <strong>the subject of cybersecurity is vast enough to create rich and exciting careers</strong>. A healthy sector is one with a mobility rate of at least 10%.</p>
<p style="text-align: justify;">Finally, there is a need to discuss wages. There are major differences between CISOs remunerations from one entity to another, and the salary structure itself may differ. It is therefore impossible to create team spirit and solidarity in such conditions. The project is not simple, but it deserves to be discussed with the HR, all the more so in a context of strong mobilities which will necessarily lead to complicated situations.</p>
<h2><strong>Employees no longer understand their organisation and suffer as a result.</strong></h2>
<p style="text-align: justify;">In recent years, safety has taken on a whole new dimension: in France, there is an average of 1 safety FTE per 500 to 3,000 employees, with an average of around 1 per 1,000. The era of the small team of 15 passionate people within the IT department&#8217;s operations is over. With large teams, a simple decision can take weeks.</p>
<figure id="post-15483 media-15483" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-15483 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building-768x512.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building-1536x1024.jpg 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Building.jpg 1620w" sizes="auto, (max-width: 287px) 100vw, 287px" /></figure>
<p style="text-align: justify;"><strong>There is an urgent need to rebuild a more readable operational model with a trend in pooling and eliminating redundancies.</strong></p>
<ol style="text-align: justify;">
<li>Regrouping centres of expertise (Audit, Cloud&#8230;)</li>
<li>Creation of a single cyber defence centre (SOC, CERT&#8230;)</li>
<li>Structuring of a single Cybersecurity Programme within the Group&#8217;s reach</li>
<li>Pooling of the PMO in a Reporting Factory.</li>
</ol>
<p style="text-align: justify;"><strong>This type of grouping will make it possible to create an emulation, to embark and to give collective meaning.</strong> Of the recent reorganisations, it is estimated that around 40% of the sector&#8217;s employees work on activities with a transversal scope.</p>
<p style="text-align: justify;">Salary alignment, re/up-skilling, training/certification plans, mobility processes, reorganisation of the sector, there are many subjects to be dealt with to boost well-being and enable employees to build a full and rewarding career within the sector. However, this work cannot be carried out by the HR functions alone. <strong>It is essential that the CISO and team managers are strongly involved to establish the efforts over the long term.</strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/04/security-channels-on-the-verge-of-burn-out-an-attempt-to-explain-this-phenomenon/">Security channels on the verge of burn-out – an attempt to explain this phenomenon</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security accreditation for Agile projects: how to successfully do it !</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/03/security-accreditation-for-agile-projects-how-to-successfully-do-it/</link>
		
		<dc:creator><![CDATA[Vincent Nguyen]]></dc:creator>
		<pubDate>Mon, 22 Mar 2021 09:00:42 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[accreditation]]></category>
		<category><![CDATA[agility]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15390</guid>

					<description><![CDATA[<p>[nota bene: this article has been translated to English for accessibility reasons. It does not address UK or US regulations, but only French ones regarding Security Accreditation (“homologation” in French). It is nonetheless useful for any organization wanting to implement...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/security-accreditation-for-agile-projects-how-to-successfully-do-it/">Security accreditation for Agile projects: how to successfully do it !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><em>[<strong>nota bene</strong>: this article has been translated to English for accessibility reasons. It does not address UK or US regulations, but only French ones regarding Security Accreditation (“homologation” in French). It is nonetheless useful for any organization wanting to implement security accreditation in Agile projects.]</em></p>
<p style="text-align: justify;">“Security accreditation is a formal act by which the authority responsible for a system commits its responsibility to risk management.” <a href="#_ftn1" name="_ftnref1">[1]</a>. It is of course mandatory in some cases<a href="#_ftn2" name="_ftnref2">[2]</a>, but beyond that, it is also a way of sending a strong message to users and top management: <strong>security is indeed a major topic for the</strong> <strong>organization</strong>. Agile methodology was at first designed for projects, but it can be a real opportunity for security teams to reduce security risks.</p>
<p style="text-align: justify;">This method disrupted working habits of product teams and ISS teams (Information System Security). The latter have to find a way to go beyond adapting old accreditation method and propose a new relevant solution to still comply with the original goal of the accreditation: “Find a balance between acceptable risk and security costs, then have it formally accepted by a manager/an authority who has the power to do so<a href="#_ftn3" name="_ftnref3">[3]</a>”.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">One solution: provisional accreditation and long-term accreditation</h2>
<p style="text-align: justify;">As a famous Agile Security expert from Wavestone once said: “Agile and accreditation, it’s not rocket science”. Without denying the difficulties, explaining it is quite simple. Faced with teams that must deliver faster and provide continuous releases, the risk levels and therefore the security accreditation must be dealt with at the same pace.</p>
<h3>What should the accreditation consider?</h3>
<p style="text-align: justify;">As always, security accreditation is all about giving thorough information on a project’s security risk level to the Accreditation Authority, for them to decide if it’s acceptable with regard to the organization ISS criteria (e.g. number of EUS still on the backlog, percentage of security baseline rules implemented on a given scope, etc.). Then, they take responsibility for the possible residual risks.</p>
<p style="text-align: justify;">For example, only a few features are available to a few users at the beginning of a project. This small scope will display a lower level of risk (because of a low level of exposure) despite not being fully secured yet. Provisional accreditation (for a few months for example) may be issued to allow experimentation. It will have to be renewed when renewal criteria (defined in advance) are met.</p>
<figure id="post-15391 media-15391" class="align-none"><img loading="lazy" decoding="async" class="wp-image-15391 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN.png" alt="" width="1652" height="930" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN.png 1652w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/Schema-agilite-EN-1536x865.png 1536w" sizes="auto, (max-width: 1652px) 100vw, 1652px" /></figure>
<p style="text-align: center;"><strong><em>Figure 1 </em></strong><em>– Product exposure to residual risk<br />
From the ANSSI&nbsp;guide (in French): Digital Agility and Security, October 2018 (</em><a href="https://www.ssi.gouv.fr/uploads/2018/11/guide-securite-numerique-agile-anssi-pa-v1.pdf"><em>link to the guide</em></a><em>)</em></p>
<p style="text-align: justify;">For a project at cruising speed, accessible to its target audience with all the expected features, a firm accreditation (3 years for example) is pronounced. The criteria for renewal, leading to the issuance of a new accreditation, are also defined in advance.</p>
<h3>When to renew the accreditation?</h3>
<p style="text-align: justify;">The criteria used to know when to renew the accreditation are closely linked to the project, the context, or the scope, but here are <strong>some examples</strong> to build these criteria. The provisional accreditation is valid until:</p>
<ul style="text-align: justify;">
<li>New critical features are added (“critical” depending on the project),</li>
<li>A new threshold for the number of users has been reached (defined in advance, depending on the associated risks),</li>
<li>New personal data must be integrated and processed by the project,</li>
<li>New features related to payments must be implemented,</li>
<li>A new level of transaction volume is reached,</li>
<li>And of course when the accreditation deadline is reached.</li>
</ul>
<p style="text-align: justify;">Long-term accreditation is valid for a longer time because less changes are expected at this stage of the project. That being said, the accreditation will have to be renewed regularly (at least every 3 years) to check on security levels and in a will of <strong>continuous improvement</strong>.</p>
<h3>What evidence should squads bring?</h3>
<p style="text-align: justify;">Squads/feature teams should be able to bring different types of evidence/proofs (of the security level) to the Accreditation authority/responsible for the accreditation. The Evil User Stories (EUS) serve as what we used to call risks, where prioritization gives information about their criticality (see our <a href="https://www.riskinsight-wavestone.com/en/2020/10/how-to-conduct-an-agile-cyber-security-workshop/">article on how to lead a workshop on risk analysis in Agile</a>). An extract from the backlog can be used as proof that the main EUS have been processed and that <strong>residual EUS</strong> are known (and accepted by the Accreditation Authority).</p>
<p style="text-align: justify;">The <strong>Security Form</strong> (or Passport, detailed in <a href="https://www.riskinsight-wavestone.com/en/2019/12/cybersecurity-transformation-agile/">this article on Agile transformation</a> &#8211; <em>in French</em> -) is also a relevant way to follow-up on security levels of projects.</p>
<p style="text-align: justify;"><strong>Code review</strong> and <strong>vulnerability scan reports</strong> can also be used (for squads that have integrated DevSecOps and have the appropriate tools).</p>
<p style="text-align: justify;">If the X-team exists (see <a href="https://www.riskinsight-wavestone.com/en/2021/01/how-to-structure-cybersecurity-teams-to-integrate-security-in-agile-at-scale/">our article on the new ISS roles in Agile and the corresponding organization</a>) or if an external audit team was able to perform them, the penetration test reports are also presented.</p>
<p style="text-align: justify;">Any other existing documents can be used to give all necessary information (architecture documents, applicable regulations, etc.).</p>
<p style="text-align: justify;">For provisional accreditation, these documents don’t have to be gathered in a proper “accreditation folder”, which would imply losing time for squads. What is necessary is to ensure they exist and are available to anyone involved in the accreditation process (accreditation authority or their delegate, ISS team, etc.).</p>
<h3>Who are the actors in this process?</h3>
<p style="text-align: justify;">During product development, the <strong>Security Champion</strong> (<a href="https://www.riskinsight-wavestone.com/en/2021/01/how-to-structure-cybersecurity-teams-to-integrate-security-in-agile-at-scale/">see this article for definition</a>) is in charge of organizing the risk analysis workshops (identification of EUS and associated Security Stories). The ISS team is of course involved in the process, bringing their knowledge to the squads during workshops.</p>
<p style="text-align: justify;">The <strong>Product Owner</strong> is responsible for the creation and updates of the necessary documentation. They also make sure the ISS team is informed and asked for help when needed.</p>
<p style="text-align: justify;"><strong>The accreditation Authority</strong> should be a business manager (e.g. the Business Owner) as usual. They must have the capacity to accept <strong>residual risks</strong> and validate the product security levels. As security should not slow down any Agile processes, the signing of a provisional accreditation may be delegated to the Product Owner, <strong>as they are representative of the Business Owner in the squad</strong>. The temporary accreditation can thus be signed faster if criteria for validity are met. In some cases, where projects would pose a risk to other businesses or systems, a transversal officer/business owner must be found, to sign for both businesses or systems. If no one is found, or no compromise is achieved, the Chief Information Officer (CIO) will assume responsibility, as it is their role to ensure the operational conditions of the Information System.</p>
<p style="text-align: justify;">As a conclusion, security accreditation remains key when speaking about integration of security into projects, in particular within the Agile framework which changes the product teams’ way of working. The ISS teams must take advantage and (re)join these product teams (through the Security Champion and the security training of the product teams) and thus work together towards the incremental reduction of risk.</p>
<p>&nbsp;</p>
<p style="text-align: justify;">More articles to come on Agile Security, stay tuned!</p>
<p>&nbsp;</p>
<p style="text-align: justify;"><a href="#_ftnref1" name="_ftn1">[1]</a> ANSSI guide (in French): <em>Digital</em> <em>Agility and Security</em>, October 2018 (<a href="https://www.ssi.gouv.fr/uploads/2018/11/guide-securite-numerique-agile-anssi-pa-v1.pdf">link to the guide</a>)</p>
<p style="text-align: justify;"><a href="#_ftnref2" name="_ftn2">[2]</a> (<strong>French regulations only</strong>) For administrations: decree n ° 2010-112 of February 2, 2010, terms of the General Safety Reference System (RGS). For any product dealing with information coming under National Defense secrecy: Interministerial General Instruction 1300. For operators of vital importance: cyber section of the LPM (law n ° 2013-1168 of 18 December 2013 &#8211; article 22), to strengthen the security of the critical information systems they operate, carried out as part of an accreditation process.</p>
<p style="text-align: justify;"><a href="#_ftnref3" name="_ftn3">[3]</a> ANSSI&nbsp;guide (in French): <em>The nine steps of the security accreditation</em>, August 2014 (<a href="https://www.ssi.gouv.fr/uploads/2014/06/guide_homologation_de_securite_en_9_etapes.pdf">link to the guide</a>)</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/security-accreditation-for-agile-projects-how-to-successfully-do-it/">Security accreditation for Agile projects: how to successfully do it !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISO, between post-COVID world and persistent threats, what are the priorities for 2021?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/ciso-between-post-covid-world-and-persistent-threats-what-are-the-priorities-for-2021/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 10:21:29 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[2021]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[emerging topics]]></category>
		<category><![CDATA[opportunities]]></category>
		<category><![CDATA[priorities]]></category>
		<category><![CDATA[radar]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15064</guid>

					<description><![CDATA[<p>Since the last edition of the radar, the world has been hit hard by an unprecedented viral pandemic. This has piled on the pressure to fast track digital transformations set in a context of increasingly active cybercriminals and an ever-growing threat. Against...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/ciso-between-post-covid-world-and-persistent-threats-what-are-the-priorities-for-2021/">CISO, between post-COVID world and persistent threats, what are the priorities for 2021?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Since <a href="https://www.wavestone.com/en/insight/ciso-radar-2020/">the last edition of the radar</a>, the world has been hit hard by <a href="https://www.wavestone.com/en/insight/cybersecurity-in-the-face-of-the-health-crisis/">an unprecedented viral pandemic</a>. This has piled on the pressure to fast track digital transformations set in a context of increasingly active cybercriminals and an ever-growing threat. Against this twin backdrop of public-health and economic crises, what should you do to plan for 2021? And what are the trends to watch to assure cybersecurity in large organizations?</p>
<p style="text-align: justify;">One fundamental theme won’t change: the threat – the starting point for all thinking about cybersecurity. In our view, unsurprisingly, ransomware will remain the major threat facing businesses. Since the end of 2019, and the exploits of <strong>Maze</strong>, <strong>Sodinokibi</strong>, and, more recently <strong>Egregor</strong>, these destructive attacks have been paired with massive data exfiltration – adding a new dimension to criminal blackmail operations. All types of organizations are affected: from local authorities, through SMEs, to large international groups – wherever they are in the world.</p>
<p style="text-align: justify;">In addition, as we recently discussed in <a href="https://www.lemonde.fr/economie/article/2020/11/15/comment-le-cybercrime-se-professionnalise-en-s-attaquant-aux-particuliers-et-aux-entreprises_6059830_3234.html"><em>Le Monde</em></a>, cybercriminal operations have become <strong>highly professionalized</strong>, ensuring the perpetrators reap a <strong>return on their considerable investments</strong>. These investments will enable them to mount increasingly deep, and technically sophisticated, attacks in the future – attacks that will have no qualms about <strong>targeting activities that are core to business functions</strong> (such as industrial networks, payment systems, etc.). In 2021, the stakes in <strong>the tug of war over the payment of ransoms</strong> are likely to be raised – with a determined effort by criminal groups to achieve higher <strong>profile</strong> attacks.<strong> We saw some early signs</strong> this year with the use of <strong>sophisticated procedures</strong>: from an attack being announced via Facebook advertisements, through direct negotiation with patients in healthcare-sector attacks, to the printing of ransom demands via in-store cash registers… There will be a need to anticipate such situations to the maximum extent possible, either by simulating them in crisis exercises or by tailoring specific, well-thought-out responses in advance.</p>
<p style="text-align: justify;">In addition to the many-headed beast of ransomware, our teams out in the field anticipate strong growth in two other threat areas in 2021. First, <strong>indirect attacks, using third-party services</strong>: cybercriminals are heavily focused on circumventing the security arrangements of major players by exploiting vulnerabilities in their less-protected partners or targeting their IT service providers. In addition, <strong>attacks that target cloud-based systems are expected to accelerate and manifest new types of compromise</strong>. Exploiting vulnerabilities in identity and access management (<strong>IAM</strong>), in particular via supplier APIs to compromise ever more critical areas of business, will be one of the hallmarks of incidents in 2021. Today, this area represents a real challenge for IT teams, who are still much too unfamiliar with the fast-developing particularities of these platforms.</p>
<p style="text-align: justify;">Faced with such a range of threats, CISOs will need to be both agile and robust, especially in their mastery <strong>of security fundamentals</strong> (in particular, the Active Directory, the application of patches, and multi-factor authentication) and in solidly demonstrating their <strong>cyber-resilience</strong> capabilities (with ever-more demanding commitments in terms of reconstruction times and the ability of business functions to be resilient without IT capacity).</p>
<p style="text-align: justify;">In parallel, there are several areas that will be central to developments in IT departments, and CISOs can turn them into <strong>opportunities</strong> to improve cybersecurity within their organizations. In particular, we have in mind “Digital Workplace” projects – and the work to optimize available security measures, which will have to be done against the current backdrop of constrained budgets. Previous years’ investments in cybersecurity have often added new functionalities that are little known or used, especially when it comes to the cloud. Looking to these may offer a way to improve cybersecurity at lower cost.</p>
<p style="text-align: justify;">From a regulatory perspective, 2021 will see another increase in issues linked to <strong>cyber borders</strong> or even cyber-protectionism. It will mean considering demanding <strong>isolation and protection requirements</strong>, and also the issue of the interconnection of <strong>new and little-known systems</strong> (for example, Alibaba in China, Yandex in Russia, etc.) with organizational networks.</p>
<p style="text-align: justify;">In terms of technological developments to keep in mind, we have identified three trends: <strong>Zero-trust, <a href="https://www.wavestone.com/en/insight/quantum-computing-cybersecurity-wavestone-francedigitale/">Confidential Computing</a></strong>, and<strong> Quantum Computing.</strong> We discuss these in more detail below and set out the minimum level of monitoring that you should plan for.</p>
<p style="text-align: justify;">Threats are becoming more complex and resources increasingly limited… CISOs will need to demonstrate their agility in 2021, by addressing a range of issues while still maintaining a clear strategic direction: they’ll need to be able to protect their organizations against cyber criminals while supporting, or even developing, new digital uses.</p>
<figure id="post-15058 media-15058" class="align-none" style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-15058 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1.jpg" alt="" width="2048" height="1418" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1.jpg 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-768x532.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-1536x1064.jpg 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-245x170.jpg 245w" sizes="auto, (max-width: 2048px) 100vw, 2048px" /></figure>
<div class="heading-text el-text" style="text-align: justify;">
<h2>Methodology</h2>
</div>
<div class="uncode_text_column">
<p style="text-align: justify;">The <strong>CISO Radar</strong> is a tool that Wavestone has developed and published since 2011. More than <strong>40 experts</strong> meet <strong>three times a year</strong> to discuss news and key topics, based on what they’ve observed while working with Wavestone’s clients. This assessment includes all Wavestone’s offices – from New York to Hong Kong – taking in Paris and several others.</p>
<p style="text-align: justify;">Every year, the Radar presents <strong>a broad selection of the topics that CISOs have to grapple with in their role</strong>. It covers over 100 topics, which are considered and analyzed by our experts.</p>
<div class="row-container" style="text-align: justify;" data-parent="true" data-section="1">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="uncode_text_column">
<p>It’s presented as a series of dials covering <strong>key themes</strong> (identity, protection, detection, risk management, compliance, and continuity) <strong>on three levels:</strong> <strong>Mature, News, </strong>and<strong> Emergent</strong>. The “Mature” level covers topics that every CISO can, and must, master. The “News” level covers topics currently being addressed; these are new areas where initial feedback can be shared. The “Emergent” level covers topics on the horizon that are still little known or that have no obvious solutions. These topics are included to better predict future developments and prepare for their emergence in organizations.</p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="2">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width" style="text-align: justify;">
<div class="heading-text el-text">
<h2>What are the threads to develop in 2021?</h2>
<h3>Mastery of cybersecurity fundamentals</h3>
<p>Patches not being applied; weaknesses in Active Directories; vulnerabilities in attack channels… In 2020, cybercriminals have regularly reminded us of the importance of mastering cybersecurity fundamentals. Unsurprisingly, we believe these fundamentals will remain key in 2021 – a time when cyber attackers are likely to remain highly opportunistic (<strong>58%</strong> according to an assessment of recent incidents where Wavestone has <a href="https://www.wavestone.com/en/insight/cyberattack-france-situation-on-the-ground/">provided support</a>) and where we continue to see a daily stream of new fixes to critical vulnerabilities.</p>
<p>Now is the time for cybersecurity teams to act on their responsibilities: they can no longer operate in the background in their key areas – such as the management and maintenance of security, which are core to digital trust and other key systems. CISOs will need to be robust and responsive in opening up these areas with production teams. We should note that startups like <a href="https://www.hackuity.io/">Hackuity</a> can bring new impetus and help unlock the complex process of vulnerability management.</p>
<h3>Consolidate work on cyber-resilience</h3>
<p>For several years now, cyber-resilience has been a phrase on everybody’s lips – and rightly so. As we observe, cybercriminals are an increasingly active menace. It’s no longer a question of “Will we be attacked?” but “<em>When</em> will we be attacked?”  Against this backdrop, it’s essential to have in place an appropriate strategy and be prepared to respond to an attack – by limiting its impact, in order to restart as securely and quickly as possible. In 2021, the involvement of business functions will remain an issue that continues to occupy security teams as they work to increase efficiency.</p>
<p>Nevertheless, we’re now seeing a new trend in cyber-resilience: CISOs are increasingly being asked to provide concrete evidence of the organization’s capacity to resist and recover from a cyber-attack. Percentage of production capacity preserved in the event of a loss of IT and the resilience of business activities; the precise timescale for rebuilding core confidence; and the restoration of data under time constraints… Both regulators and business leaders are asking for guarantees and defined commitments to provide them with reassurance. In such a context, we should be prepared to push systems to their limits; for example, by conducting realistic reconstruction tests, working in partnership with operational teams.</p>
<p>&nbsp;</p>
</div>
</div>
<div class="heading-text el-text" style="text-align: justify;">
<h2>Which areas represent opportunities for cybersecurity?</h2>
</div>
<h3 class="clear" style="text-align: justify;">Continuing pressure to make progress on digital transformation</h3>
<div style="text-align: justify;">
<p>It’s a matter of fact that the public-health crisis has allowed many organizations to take major steps toward creating latest-generation digital workspaces. This situation presents a real opportunity for CISOs, who can capitalize on it by becoming involved in numerous innovative projects and help their organizations move to an in-depth<em>, </em>cloud-based approach.</p>
<p>More than ever, it offers an opportunity for cybersecurity teams to deliver a step change in approach and overcome numerous long-standing challenges: the simplification of remote access, authentication that reduces the use of passwords (Passwordless), enhanced detection of data leaks, expansion of SOCs and cloud-related detection capacities, etc.</p>
<h3>Cyber-effectiveness</h3>
<p>In a period when expenditure is under greater scrutiny than ever, CISOs must continue to rationalize the use of their budgets, while also demonstrating the effectiveness of the interventions they make. Given this, one of the first actions you should consider is the scope to capitalize on investments made in previous years: teams already in place and, for technical solutions or cloud-based services undergoing rapid changes, unlocking functionalities that can be easily activated at no additional cost. A genuinely rich seam to provide better security in the year ahead. In some areas, outsourcing may be an option in the interests of rationalizing costs.</p>
<p>For some business sectors, cybersecurity may become, or may already be, a market differentiator. CISOs, then, have an opportunity to develop their role – by getting closer to the business functions and unlocking cross-functional projects that were previously unworkable.</p>
<h3>Borders in cyberspace</h3>
<p>While the internet is often considered a borderless space, there is an increasing tendency among regulators, and some countries, to want to ringfence data within their borders and prevent it from being hosted elsewhere. This trend is firming in Europe, where we saw the GDPR come into effect in 2018, and, more recently, a ruling that <a href="https://curia.europa.eu/jcms/upload/docs/application/pdf/2020-07/cp200091fr.pdf">the US Privacy Shield is invalid</a>; but also in China and Russia, where new regulations are proliferating, some of which could be classed as examples of “cyber-protectionism.”</p>
<p>As a result, many regulators and authorities are imposing rules that only encrypted data can be stored abroad, the key to which is a closely guarded secret (HYOK). This situation requires rethinking on data flows, the systems that will host them, and especially the need to adapt to local solutions. This presents a real challenge for CISOs; for example, when considering connections between the networks of global organizations that are using French, American, Russian, and Chinese systems… Integrating these systems into an overall cybersecurity approach is a real challenge in the face of their fragmentation and the difficulties in making a concrete assessment of the risks and the quality of the systems to be used.</p>
<p>&nbsp;</p>
<div class="heading-text el-text">
<h2>What are the emerging topics for 2021 and beyond?</h2>
<h3>Taking a new, entirely cloud-based approach, with Zero trust</h3>
<p>Promoted by Forrester in the late noughties, use of the <strong>Zero Trust</strong> security model is on the rise. As a reminder, this system is the opposite of the traditional <strong>castle</strong> approach, which aimed to defend the periphery using sizable ramparts (i.e., firewalls), but which is gradually being rendered impotent in the face of new threats.</p>
<p>Digital transformation has had profound impacts on system architecture and interconnections with third parties. As a result, it is no longer enough to protect oneself from the outside only; so much so, that even the concept of “the outside” is no longer that meaningful: nowadays threats can more easily use their target’s ecosystem to penetrate systems and compromise them. Access management, identities, and privileged accounts are central to the <strong>Zero Trust</strong> model – areas pertinent to many of the problems we face today. In 2021, businesses will continue their move toward the cloud. This provides a real opportunity to gradually base architectures and systems on the <strong>Zero-Trust</strong> principle, or, for latecomers, to begin to clear the way for it.</p>
<h3>Get ready for a data-protection revolution with confidential computing</h3>
<p>One of the major challenges for the cloud remains that of trust with the various partners involved, especially when it comes to organizations’ most sensitive data. In response to this problem, concepts like Confidential Computing and Data Privacy by Design have emerged gradually over recent years, in parallel with more concrete solutions.</p>
<p>Among these, <strong>homomorphic encryption</strong> enables algorithms to encrypt data while maintaining the option of processing it, something that greatly reduces the risks of disclosure and data leakage. IBM is one step ahead here, and, in the summer of 2020, shared its open-source library, <a href="https://github.com/shaih/HElib">HElib</a>, on the topic. French startups Cosmian and Zama are also active in the area.</p>
<p>Lastly, <strong>synthetic data</strong> can also offer an original response to the issue. By using algorithms enhanced by artificial intelligence, synthetic data generators, such as the one offered by British startup Hazy make it possible to create data sets that retain the characteristics and logic of the real data without featuring that data in any way. Yet another way to avoid any risk of a data breach in the cloud.</p>
<h3>Anticipate longer-term threats from Quantum computing</h3>
<p>Eight hours: this is the time it will take a sufficiently powerful and reliable quantum computer to undermine the security of our communications by breaking today’s commonly used encryption algorithms. <a href="https://www.wavestone.com/en/insight/informatique-quantique-et-cybersecurite_francedigitale_wavestone/">The global technological race has already begun</a>, and companies and institutions must begin preparing themselves now, because considerable investments will be needed to put in place the required <strong>technical migrations</strong>. Which data must be protected as a priority, because it needs to remain confidential in the years to come? Which clauses should I include in my contracts today, to ensure the systems I purchase are compatible with the new encryption solutions? And which providers can support these migrations?</p>
<p>In France, several players have already taken the initiative for example the INRIA-Sorbonne spin-off <strong>CryptoNext-Security</strong> – the winner of several innovation competitions, which offers a quantum-safe cryptography solution that has already been tested by the French army for use with an instant-messaging application on mobiles.</p>
<div class="post-content">
<div class="row-container" data-parent="true" data-section="5">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="uncode-accordion" data-collapsible="no" data-active-tab="1">
<div id="accordion_308999376" class="panel-group" role="tablist" aria-multiselectable="true">
<div class="panel panel-default">
<div id="anticipate-longer-term-threats-from-quantum-computing" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p>It’s an area that raises many questions, which will all need to be rapidly addressed. One thing is certain though: CISOs will have a major role in these developments and need to anticipate the many related activities that will be required.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/ciso-between-post-covid-world-and-persistent-threats-what-are-the-priorities-for-2021/">CISO, between post-COVID world and persistent threats, what are the priorities for 2021?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quantified risk estimate (2/2): What data, what tools?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/12/quantified-risk-estimate-2-2-what-data-what-tools/</link>
		
		<dc:creator><![CDATA[Charles Dubos]]></dc:creator>
		<pubDate>Mon, 14 Dec 2020 14:32:13 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[estimation]]></category>
		<category><![CDATA[FAIR]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[quantified]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14826</guid>

					<description><![CDATA[<p>If we have seen in a previous article the predominance of FAIR in the world of quantification[1],  another article published here in early June[2] (detailing the FAIR method in its second part) emphasizes the care to be taken in the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/quantified-risk-estimate-2-2-what-data-what-tools/">Quantified risk estimate (2/2): What data, what tools?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If we have seen in a previous article the predominance of FAIR in the world of quantification<a href="#_ftn1" name="_ftnref1">[1]</a>,  another article published here in early June<a href="#_ftn2" name="_ftnref2">[2]</a> (detailing the FAIR method in its second part) emphasizes the care to be taken in the method workflow, whose results of the calculations (possibly  being automated) allow to obtain precise  values. .</p>
<p>However, how to model these different FAIR input data?  How to compute with these data? Are there tools to simplify their collection or estimate their quality, and what efforts do they require to be implemented?</p>
<p>Having seen previously how trustworthy the risk quantification method was in its processes, let&#8217;s now see how the inevitable part of subjectivity can be isolated, and which facilitators can help to obtain reliable results.</p>
<p>&nbsp;</p>
<h2>The FAIR fuel: data</h2>
<p>The risk analysis proposed by FAIR (according to the standardization document published by openGroup)<a href="#_ftn3" name="_ftnref3">[3]</a>  is carried out in four stages:</p>
<ul>
<li>At first, in a fairly conventional way, it is a question of specifying the scope of the examined risk : what is the asset (subject to risk), what is the threat context (agent and scenario), and what is the loss event (the dreaded event in terms of losses);</li>
<li>The second step (called Evaluate Loss Event Frequency) aims at collecting all the frequency data related to the loss event (and thus intimately linked to the threat agent). This consists of collecting the values for the left branch of the arborescence below.</li>
<li>The third one (called Evaluate Loss Magnitude), because it assesses the loss, is focused on the asset. It is then a question of estimating the various primary losses (i.e. the inevitable loss in case of risk occurrence) and secondary (or possible loss, i.e. not occurring systematically when the risk advent). Its goal is to collect the values of the right branch in the tree below.</li>
<li>Finally, the last step (called Derive and Articulate Risk) consists in merging the collected data as defined in the FAIR tree by the various calculations, to obtain the result in the form of usable outputs.</li>
</ul>
<p>&nbsp;</p>
<figure id="post-14806 media-14806" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14806 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1.png" alt="" width="1904" height="468" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1.png 1904w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1-437x107.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1-768x189.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1-1536x378.png 1536w" sizes="auto, (max-width: 1904px) 100vw, 1904px" /></figure>
<p style="text-align: center;">Link between FAIR analysis and taxonomy</p>
<p>&nbsp;</p>
<p>Without detailing more the taxonomy, already discussed in the article presented before2, one can note that the standard analysis of a single risk requires seven data  (corresponding to the elements at the base of the tree):</p>
<ol>
<li><em>Contact frequency;</em></li>
<li><em>Possibility of action;</em></li>
<li><em>Threat capability;</em></li>
<li><em>Resistance strength;</em></li>
<li><em>Primary loss magnitude;</em></li>
<li><em>Secondary loss magnitude;</em></li>
<li><em>Secondary loss event frequency.</em></li>
</ol>
<p>It should be added that FAIR invites to decline losses (primary and secondary) into six categories (in order to ease and accurate estimate of the loss):</p>
<ul>
<li>The <em>production</em> losses: related to the interruption of the service produced by the asset;</li>
<li>The <em>response</em> cost: related to the incident response;</li>
<li>The <em>replacement</em> costs: related to the replacement of damaged constituents of the asset;</li>
<li>The <em>fine/judgement</em> costs: related to fines, court fees and legal proceedings;</li>
<li>The financial impact on <em>competitive advantage</em>: related to the impact on the organization in its sector;</li>
<li>The <em>reputation</em> costs: related to the impact on the public image of the organization.</li>
</ul>
<p>&nbsp;</p>
<h2>How do we correctly model risk uncertainty?</h2>
<p>Furthermore, it is good to ask the question of what a FAIR data is actually.</p>
<p>Indeed, it is too reductive to define a data by a single numerical value. For example, lets consider a ransomware attack: it would be incorrect to say that an occurrence of this risk would cost exactly 475k €<a href="#_ftn4" name="_ftnref4">[4]</a> (illustrated by the blue curve on graph 1).</p>
<p>&nbsp;</p>
<figure id="post-14808 media-14808" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-14808 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/image-2-286x191.png" alt="" width="286" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-2-286x191.png 286w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-2-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-2.png 352w" sizes="auto, (max-width: 286px) 100vw, 286px" /></figure>
<p style="text-align: center;">Graph 1: A distribution, a more realistic model than a single value</p>
<p>&nbsp;</p>
<p>However, adding uncertainty to this data by accompanying it with a minimum value (which could be  1€ in our example) and a maximum one (of  300 M€ in the same example), while keeping the most likely value stated above, would allow to model much more accurately the reality (purple curve of graph 1).</p>
<p>A data is then defined by a minimum, a maximum and a most likely value (corresponding to the peak of the distribution). We can also, note that such a probability distribution is independent of the kind of values considered: it may as well be a loss in any currency  (cf. the previous example), than an occurrence (for example, between once a year and once every 10 years, and a value more likely around once every two years), or even a ratio (between  30% and 70%, more likely 45%). Hence, we can use these distributions to model all the  data of the FAIR taxonomy.</p>
<p>Another advantage of predicting uncertainty through distribution is that it is possible to fine-tune the degree of confidence in the most likely value, via the kurtosis coefficient of the curve. The higher it would be, the greater the data will be trusted (corresponding to a very marked peak, see the green curve on graph 2). On the other hand, an unreliable data will be modelled by a much more homogeneous distribution (see the red curve on graph 2).</p>
<p>&nbsp;</p>
<figure id="post-14810 media-14810" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-14810 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/image-3-286x191.png" alt="" width="286" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-3-286x191.png 286w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-3-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-3.png 352w" sizes="auto, (max-width: 286px) 100vw, 286px" /></figure>
<p style="text-align: center;">Graph 2: Reflecting the level of trust through distributions</p>
<p>&nbsp;</p>
<p>However, using distributions rather than fixed values is a problem when it comes to combine them, which will necessarily be the case when we will make the computations of the FAIR tree. As we can indeed see on graph 3 (the addition of the green distribution and the red one giving the violet), the addition of two distribution does not allow to obtain a distribution as &#8216;simple&#8217; as the previous ones (it no longer follows a log-normal distribution). This is also the case in the context of a multiplication (the result of which is also complex).</p>
<p>&nbsp;</p>
<figure id="post-14812 media-14812" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-14812 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/image-4-286x191.png" alt="" width="286" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-4-286x191.png 286w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-4-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-4.png 550w" sizes="auto, (max-width: 286px) 100vw, 286px" /></figure>
<p style="text-align: center;">Graph 3: addition of two distributions.</p>
<p>&nbsp;</p>
<p>To obtain a mathematically consistent result, game theory gives us a simple way: The Monte Carlo simulations. It is in fact a matter of dissecting the distributions (the green and the red of the graph 3), in a predefined number of random values (called number of simulations), distributed in such a way as to correspond to the given distribution. We can then combine the distributions thus dissected by performing the calculations on pairs of values of each distribution. The new distribution can then be approximated, and will be all the more precise as the number of simulations will be large.</p>
<p>&nbsp;</p>
<h2>Hands on toolboxes to automate FAIR&#8230;</h2>
<p>To make these calculations and obtain a numerical value of risk, solutions have emerged (mainly from the FAIR method). We will therefore address here the pros and cons of these tools, which are also cited in the previous article1.</p>
<h3>The OpenFAIR Analysis Tool</h3>
<p>The first we can cite hire is the OpenFAIR Analysis Tool<a href="#_ftn5" name="_ftnref5">[5]</a>. While this tool has a pedagogical purpose, it nevertheless helps to understand how FAIR works. It is thus possible to have a first concrete application of the method, and to obtain simply results (only for the analysis of a single risk). Developed by the University of San José (California) in collaboration with the OpenGroup, this tool relies on an Excel sheet to obtain a risk assessment from a predetermined number of  simulations, scrupulously respecting the FAIR taxonomy.</p>
<p>&nbsp;</p>
<figure id="post-14814 media-14814" class="align-none"><img loading="lazy" decoding="async" class="wp-image-14814 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5.png" alt="" width="1931" height="1091" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5.png 1931w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5-768x434.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5-1536x868.png 1536w" sizes="auto, (max-width: 1931px) 100vw, 1931px" /></figure>
<p style="text-align: center;">OpenFAIR Risk Analysis Tool: a tool that is first and foremost educational</p>
<p>&nbsp;</p>
<p>Very useful to have a first contact with quantification, this tool remains however very limited in terms of use. Finally, one should note that Excel is needed, and it is only accessible with an evaluation license limited to 90 day.</p>
<h3>Riskquant</h3>
<p>For a larger scale use, Netflix&#8217;s R&amp;D department has developed Riskquant<a href="#_ftn6" name="_ftnref6">[6]</a> solution. It is a Python programming library, relying more particularly on tensorflow (a specialized python module for massive statistical calculation). Riskquant&#8217;s particularity is to propose a quantification of risk inspired by the FAIR taxonomy, but with a great freedom in its approach and its implementation. Developed to facilitate the use on containers, it would allow by its design very fast evaluations from csv files.</p>
<p>&nbsp;</p>
<figure id="post-14816 media-14816" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14816 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6.png" alt="" width="1920" height="1020" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6.png 1920w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6-768x408.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6-1536x816.png 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></figure>
<p style="text-align: center;">Riskquant: an original approach but lacking maturity</p>
<p>&nbsp;</p>
<p>However, keeping of FAIR taxonomy only a single loss value and a single frequency makes it not very usable, especially in the context of an organization that would seek to precisely scope its risks. In addition, it provides so far only a few exploitable results and clearly lacks maturity. Finally, it seems to have been dormant since May 1<sup>st</sup>, 2020 (the date of the last commit on the GitHub page of the solution).</p>
<h3>PyFAIR</h3>
<p>To conclude on this paragraph on solutions that can be used for a basic implementation of FAIR, the PyFAIR library is available on the official python repository (downloadable via the pip tool). Now mature, the tool allows a decomposition of risk according to the FAIR taxonomy. It also allows the feed of the FAIR tree with intermediates values, or the aggregation of data that can be used for several risks (e.g. allowing groupings by asset or threats). It is capable of calculating overall and global risks, and provides easily usable distributions (exploitable with other simple python modules), but also gives access to advanced charts and HTML pre-formatted reports.</p>
<p>&nbsp;</p>
<figure id="post-14818 media-14818" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14818 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-7.png" alt="" width="532" height="274" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-7.png 532w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-7-371x191.png 371w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-7-71x37.png 71w" sizes="auto, (max-width: 532px) 100vw, 532px" /></figure>
<p style="text-align: center;">PyFAIR, a complete and efficient library in Python</p>
<p>&nbsp;</p>
<p>Although it remains a programming toolbox, hence requiring an appetence and time to develop and maintain a Python solution, PyFAIR is well-designed. It facilitates the implementation of FAIR by staying very close to the taxonomy, and provides functions facilitating implementation and the exploitation of the results. Suitable to be operated on multiple levels (i.e. using it only to calculate results by influencing the fine settings of FAIR and Monte Carlo, or by exploiting its high-level reporting functions), it makes it possible to envisage a use of quantification technically facilitated and on a large scale.</p>
<p>&nbsp;</p>
<h2>&#8216;Turnkey&#8217; platforms to make data acquisition easier:</h2>
<p>Nevertheless, the main difficulty of FAIR remains, as we have seen before, obtaining the data and their trust level. To deal effectively, the most efficient solution is to rely on a platform that integrates a CTI database.</p>
<p>These platforms provide risk threat statistics (very few company-dependent). They also support in deploying and implementing the quantification method in the organization, which includes a guidance in obtaining the appropriate loss data.</p>
<h3>RiskLens</h3>
<p>The first of these solutions is the RiskLens<a href="#_ftn7" name="_ftnref7">[7]</a> platform. This solution, directly derived from the FAIR methodology, was co-founded by Jack Jones. It is used as technical support for the development of the method, linked to the FAIR Institute. Emphasing on a technical approach of the method, it focuses on the respect of the standards of analysis  in general  and the definition of the perimeter (first  step  of FAIR) in particular.</p>
<p>&nbsp;</p>
<figure id="post-14820 media-14820" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14820 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-8.png" alt="" width="776" height="431" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-8.png 776w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-8-344x191.png 344w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-8-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-8-768x427.png 768w" sizes="auto, (max-width: 776px) 100vw, 776px" /></figure>
<p style="text-align: center;">RiskLens, FAIR&#8217;s application to the letter</p>
<p>&nbsp;</p>
<p>Nevertheless, it should be noted that, on the one hand, this solution requires advanced notions in the FAIR methodology to be easily operable. Indeed, the platform does not provide a consequent help in obtaining data (which, as we have seen, remains the keystone of quantification), on the basis that the definition of the perimeter is enough to define precisely the data, and thus to obtain it easily. On the other hand, it is an American platform, which implies that the interface (quite unintuitive) is only available in that language, and that the data collected is also subject to U.S. regulations.</p>
<h3>CITALID</h3>
<p>The second platform we will mention here is the French startup CITALID, whose approach is fundamentally different. Indeed, it has been founded by two ANSSI analysts, who wanted to link the CTI to the risk management. Thus, using FAIR as the tool to make this link, it makes its effort on the conception and the maintenance of the database, made of solid figures kept up to date, to closely monitor the local and international cyber geopolitical situation.</p>
<p>&nbsp;</p>
<figure id="post-14822 media-14822" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14822 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9.png" alt="" width="1920" height="1080" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9.png 1920w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9-1536x864.png 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></figure>
<p style="text-align: center;">CITALID, a high value-added database</p>
<p>&nbsp;</p>
<p>The CITALID platform provides real support in the definition and the collection of the FAIR data, thus allowing to identify precisely where is the remaining part of subjectivity undeniably linked to risk. Available in French and English, it facilitates the management of cyber risk by taking into account all the parameters of the organization (location, size, sector of industry, level of maturity, compliance with standards, etc.), to provide data originating from appropriate contexts. Furthermore, and in addition to an interactive explanation of each of the platform&#8217;s fields, the startup supports its customers in collecting the needed inner data of their organization.</p>
<p>&nbsp;</p>
<h2>First step with FAIR&#8230;</h2>
<p>Anyhow, the difficulty will always be to succeed in the transition from qualitative to quantitative estimation. Even if solutions can facilitate this shift, leaving a controlled qualitative method for a new unassimilated assessment method remains a challenge, despite all the benefits the new method promises.</p>
<p>If three points were to be highlighted to pursue on the quantitative way, they could be:</p>
<ul>
<li>First, to make sure the required maturity is reached. Quantification requires a good understanding of the level of security of the concerned IS, and a pre-existing and well-established risk management method. If quantification provides solutions to assess the cost of a risk, provision it or estimate  the  ROI  of a measure, it is however useless  (or even counterproductive) to embark on this path too early (at best it will be a waste of time, at worst it will degrade the existing risk management process).</li>
<li>Then, to have a gradual approach in the deployment of quantification. In a mature IS with stable risk management, it is preferable to gradually adopt the quantitative method. This allows to gain confidence in the estimates produced (potentially by making it coexist with the elder qualitative estimation method) and to assimilate the methodology, while ensuring its integration into the existing risk management workflow.</li>
<li>Finally, rely on existing experience in collecting cyber risk data. As the difficulty stays confined in obtaining reliable data, it is crucial (to be confident in the method) to have trusted figures. It then seems appropriate make use of a platform that can provide data of quality, and a support in the collection of our own data. It will furthermore have more experience deploying the methodology to various customers. The quality of the provided results will then be the key element in the confidence that the organization will have in the quantitative method.</li>
</ul>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://www.riskinsight-wavestone.com/en/2020/11/quantified-risk-assessment-1-2-a-quantification-odyssey/">https://www.riskinsight-wavestone.com/en/2020/11/quantified-risk-assessment-1-2-a-quantification-odyssey/</a></p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://www.riskinsight-wavestone.com/en/2020/06/la-quantification-du-risque-cybersecurite/">https://www.riskinsight-wavestone.com/2020/06/la-quantification-du-risque-cybersecurite/</a></p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://publications.opengroup.org/c13g">https://publications.opengroup.org/c13g</a></p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> <a href="https://www.sophos.com/fr-fr/medialibrary/Gated-Assets/white-papers/sophos-the-state-of-ransomware-2020-wp.pdf">https://www.sophos.com/fr-fr/medialibrary/Gated-Assets/white-papers/sophos-the-state-of-ransomware-2020-wp.pdf</a></p>
<p><a href="#_ftnref5" name="_ftn5">[5]</a> <a href="https://blog.opengroup.org/2018/03/29/introducing-the-open-group-open-fair-risk-analysis-tool/">https://blog.opengroup.org/2018/03/29/introducing-the-open-group-open-fair-risk-analysis-tool/</a></p>
<p><a href="#_ftnref6" name="_ftn6">[6]</a> <a href="https://netflixtechblog.com/open-sourcing-riskquant-a-library-for-quantifying-risk-6720cc1e4968">https://netflixtechblog.com/open-sourcing-riskquant-a-library-for-quantifying-risk-6720cc1e4968</a></p>
<p><a href="#_ftnref7" name="_ftn7">[7]</a> <a href="https://www.risklens.com/">https://www.risklens.com/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/quantified-risk-estimate-2-2-what-data-what-tools/">Quantified risk estimate (2/2): What data, what tools?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quantified Risk Assessment (1/2): A Quantification Odyssey</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/quantified-risk-assessment-1-2-a-quantification-odyssey/</link>
		
		<dc:creator><![CDATA[Charles Dubos]]></dc:creator>
		<pubDate>Mon, 30 Nov 2020 17:42:47 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[FAIR]]></category>
		<category><![CDATA[FAIR methodology]]></category>
		<category><![CDATA[ISO27k]]></category>
		<category><![CDATA[OpenFAIR]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14448</guid>

					<description><![CDATA[<p>A few months ago, François LUCQUET and Anaïs ETIENNE told us of the growing interest in quantifying cyber risks[1], but also warned us against going to the path of quantification without prior reflection. Their analysis, which is still relevant, emphasized...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/quantified-risk-assessment-1-2-a-quantification-odyssey/">Quantified Risk Assessment (1/2): A Quantification Odyssey</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A few months ago, François LUCQUET and Anaïs ETIENNE told us of the growing interest in quantifying cyber risks<a href="#_ftn1" name="_ftnref1">[1]</a>, but also warned us against going to the path of quantification without prior reflection. Their analysis, which is still relevant, emphasized in particular the level of maturity required to engage in a method of quantitative estimation. This latter point of maturity level drastically reduces the scope of organizations which are likely try it out. However, some methods of quantification are the source of solutions that give hope in the ability of quantifying its risks in financial terms, and by the same logic of being capable to estimate a return on investment.</p>
<p>It is therefore useful at this point to take a look at the existing methods and the theories that could lead us to concrete results. In the big bang of cyber risk quantification, what are the theoretical foundation for the development of a method? Which ones have succeeded, which ones seem mature? Can we expect in the short or medium term, alternatives to the current quantitative assessment methods?</p>
<p>&nbsp;</p>
<h2>Roadmap: Risk analysis and quantification:  what can we expect of it?</h2>
<p>To locate the quantification in the field of risk management, let&#8217;s start by clarifying what we are looking for. Within the risk management process, the primary objective is to define an efficient numerical value, illustrating a level of risk (usually a financial cost).</p>
<p>It is therefore, according to the ISO27k standard, only a new risk assessment. Indeed, preceding phases of risk contextualization and identification have no reason to be affected by quantification. The phases of risk treatment, acceptance, supervision or communication, while they will benefit from the results of the quantitative analysis, are unchanged in their workflow. Simply put, it is only question of changing the way each risk is estimated and computed.</p>
<p>&nbsp;</p>
<figure id="post-14762 media-14762" class="align-none"><img loading="lazy" decoding="async" class="wp-image-14762 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image4.png" alt="" width="761" height="553" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image4.png 761w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image4-263x191.png 263w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image4-54x39.png 54w" sizes="auto, (max-width: 761px) 100vw, 761px" /></figure>
<p>&nbsp;</p>
<p>This point, rather trivial but crucial, allows us to ensure that, even if they are fundamentally different from the qualitative methods in their results, the quantitative ones will in any case support pre-existing methods. So, we can be reassured that, although it is necessary to use them to have a mature risk management process, it will also be the basis for the quantification (that will thus exploit the pre-existing risk identification phase).</p>
<p>Now that we have framed the contribution of quantification in an organization&#8217;s overall risk analysis, let us specify what we would expect (regardless of the possibility of achieving these assertions):</p>
<ul>
<li>On the one hand, it is imperative for this method to be more precise in its result, compared to the qualitative method that it has to replace. This means above all that, from the first occurrence and without having previous results records, it must give a precise numerical estimation (which may as far as possible contain several values: maximum risk or probable risk in particular).</li>
<li>We may also want it to be faster to achieve (or at least to be carried out in an acceptable time), in order to be able to completely replace the qualitative estimate in the long-term. We are here talking about the time it would take to implement the analysis, without worrying a lot about the time it would take for computations (which can now be efficiently delegated, especially via the cloud). In the end, correlating this with the previous point, it is only question of having a better efficiency than the qualitative evaluation.</li>
<li>Furthermore, we wish the quantitative assessment to be based on concrete data, in order to gain credibility in the results that will be produced. Indeed, since the workflow of a quantitative method is based on mathematical theories, only an incorrect implementation could introduce subjectivity into the values obtained. This last point would justify that in a time equivalent to qualitative analysis, we have finer results.</li>
<li>Finally, and this stems from the previous point, we need to have a precise taxonomy, for the collected data to be clearly defined (regardless of the kind of risk). Indeed, if the quantitative estimate is based on proven mathematical theories, the quality of the data produced will then depend only on the quality of the data used as input, and in particular on the relevance and the consistency of the data, depending largely on its definition..</li>
</ul>
<p>&nbsp;</p>
<h2>At the core of the galaxy: moving from theory to practice</h2>
<p>Having specified what are the characteristics of quantification, let us now see what mathematical theories would take into account the hazard associated with a risk.</p>
<p>Consider, for example, the fuzzy sets theory. This mathematical theory is based on the principle that an element, instead of classically belonging or not to a mathematical ensemble, may only partially belong to it, according to a stated degree. This could be useful to highlight the occurrence or the impact of a risk with the degree of belonging of that risk to ensembles. This theory, while interesting, has not led to concrete applications.</p>
<p>Another approach, which could be called correlative, would be based on the use of self-learning neural networks, to determine from CTI data what the level of risk of a company would be, according to its characteristics. This theory has benefited from the current popularity for artificial intelligence. This led to academics’ studies comparing different modes of machine learning (notably BP<a href="#_ftn2" name="_ftnref2">[2]</a> or RBF)<a href="#_ftn3" name="_ftnref3">[3]</a>, in order to be used in cyber risk analysis. However, to date, it does not appear mature enough to lead to a realistic method.</p>
<p>Finally, the only mathematical solution that has paid off has been the statistical analysis (and game theory, which offers the means to combine statistical distributions, see the &#8220;Risk Quantification and Data: Advice and Tools&#8221;<a href="#_ftn4" name="_ftnref4">[4]</a> article about this subject). The principle of statistical analysis is to rely on statistical observations to estimate the level of a risk. The hazard of risk is then, in large part, taken into account by the distribution of the statistics.</p>
<p>Based on these statistics, two approaches are practicable:</p>
<ul>
<li>The first is illustrated by a method proposed by the IMF<a href="#_ftn5" name="_ftnref5">[5]</a>. It proposes to assess a cyber risk by a detailed statistical analysis. However, it is highly computational and inaccessible for regular use or as a part of a quantified risk estimate. However, it retains an undoubted interest in an analysis of a level of cyber risk on several entities that would have similar data, which may be useful for an insurer or in the banking community. However, it remains confined to this use. Reduced to the already limited scope of entities with acceptable cyber maturity, this method does not seem to be able to offer in the short or medium term an exploitable solution for the IS level of an organization.</li>
<li>The second is to break down any cyber risk based on common characteristics. This is in particular the approach of the FAIR methodology: it proposes in its taxonomy (see &#8216;how to apply the FAIR method’1) a dissociation of risk according to its occurrence and the estimated impact, from a financial point of view. FAIR then proposes a declination of these two parameters which, because of their universal nature, may therefore be applied to any cyber risk. This type of method has the advantage of proposing an identical process for the analysis of any cyber risk, facilitating its use in an organizational context (that can then compare cyber risks of distinct natures).</li>
</ul>
<p>&nbsp;</p>
<figure id="post-14758 media-14758" class="align-none">
<figure id="post-14760 media-14760" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14760 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1.png" alt="" width="1865" height="593" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1.png 1865w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1-768x244.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1-1536x488.png 1536w" sizes="auto, (max-width: 1865px) 100vw, 1865px" /></figure>
</figure>
<p style="text-align: center;">The galaxy of quantification</p>
<p>&nbsp;</p>
<h2>The FAIR method: a supermassive black hole</h2>
<p>Currently, only the FAIR method has risen to applicated quantification solutions for a company. Its monopoly in the field is such that it has become an inescapable reference for a solution or methodology to remain credible. Like a black hole, it attracts to it all the current solutions of quantification. We can, for example, illustrate this with the Risquant Library, developed by Netflix&#8217;s R&amp;D department<a href="#_ftn6" name="_ftnref6">[6]</a>. This one clearly announces that it relies on the FAIR methodology. Nevertheless, he takes great freedom in the interpretation of taxonomy and analysis, but the fact of quoting it allows him to be more easily accepted and recognized.</p>
<p>This hegemony of FAIR can be explained quite easily:</p>
<ul>
<li>To begin with, it&#8217;s a pragmatic method by design. Its inventor, Jack Jones, set it up when he was an RSSI of a large American group, and was asked to justify cyber ROI. It was therefore initiated for operational purposes, then refined and gained credibility by relying on mathematical tools and theories. This concept of development  (i.e.  the fact that the method was born out of a need, and then mathematically justified) makes of FAIR a method particularly appreciated by the first concerned, that are the CISO and the other cyber-risk managers.</li>
<li>Then, it was particularly visionary, as she preceded all other methods. Appeared in 2001, the first book about the method was published in 2006, detailing its operation and taxonomy. As time went on, a community was made up around Jack Jones and his method: the FAIR Institute. This community continued the maturation and thz diffusion of the method. More precisely, it helped developing the efficiency of the method by placing facilitators to make it ever usable.</li>
<li>The FAIR method also has a particularly solid basis: in addition to the publication mentioned above and which was the subject of an enriched reissue in 2016, it is based on two  standardization documents, published by the OpenGroup (the consortium behind the architecture standard of SI TOGAF). The OpenGroup also offers certification to the method, based on its two standards, and which add to the interest laying on the method.</li>
<li>Finally, FAIR is strongly supported (particularly across the Atlantic): the community that drives it is particularly active, and contributes as much to its evolution as to its promotion: the links between the OpenFAIR and the FAIR Institute, both mentioned above, are substantially close. The strength of his ties is ensured by the fact that Jack Jones, father of the method, plays a central role in both organizations.</li>
</ul>
<p>Thus, in the world of cyber-risk quantification, the only operational solutions to date all rely on the FAIR methodology, with a more or less large but still displayed parentage.</p>
<p>If the maturity of this method seems now acquired, its monopoly in the field of quantification allows with little doubt to envisage, at least for next years, that it will remain the only method of quantification. In order for another method to be equal, and in addition to the fact that it will have to establish its conceptual credibility, it will above all have to make a place for itself  alongside the hegemony of FAIR, while proving that it is more efficient.</p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://www.riskinsight-wavestone.com/en/2020/06/la-quantification-du-risque-cybersecurite/">https://www.riskinsight-wavestone.com/2020/06/la-quantification-du-risque-cybersecurite/</a></p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> Back-propagation</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> Radial basis functions</p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> See the 2nd article on Risk Insight</p>
<p><a href="#_ftnref5" name="_ftn5">[5]</a> <a href="https://www.imf.org/en/Publications/WP/Issues/2018/06/22/Cyber-Risk-for-the-Financial-Sector-A-Framework-for-Quantitative-Assessment-45924">https://www.imf.org/en/Publications/WP/Issues/2018/06/22/Cyber-Risk-for-the-Financial-Sector-A-Framework-for-Quantitative-Assessment-45924</a></p>
<p><a href="#_ftnref6" name="_ftn6">[6]</a> <a href="https://netflixtechblog.com/open-sourcing-riskquant-a-library-for-quantifying-risk-6720cc1e4968">https://netflixtechblog.com/open-sourcing-riskquant-a-library-for-quantifying-risk-6720cc1e4968</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/quantified-risk-assessment-1-2-a-quantification-odyssey/">Quantified Risk Assessment (1/2): A Quantification Odyssey</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to define an effective third-party cyber risk management strategy?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/how-to-define-an-effective-third-party-cyber-risk-management-strategy/</link>
		
		<dc:creator><![CDATA[Matthieu Péquin]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 09:00:56 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[contracts]]></category>
		<category><![CDATA[know your supplier]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security Insurance Plan]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[third party]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14491</guid>

					<description><![CDATA[<p>More and more clients request our help regarding their third-party cyber risk management strategy. Indeed, third parties constitute a privileged attack vector. A recent study from Soha Systems showed that 60% of security incidents involve directly or indirectly a supplier....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/how-to-define-an-effective-third-party-cyber-risk-management-strategy/">How to define an effective third-party cyber risk management strategy?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>More and more clients request our help regarding their third-party cyber risk management strategy. Indeed, third parties constitute a privileged attack vector. A recent study from Soha Systems showed that 60% of security incidents involve directly or indirectly a supplier. The most glaring examples are the accounting software M.E.Doc identified as the patient zero of NotPetya and Cloud Hopper attacks which aim at compromising cloud service providers to attack a targeted company.</p>
<p>Paradoxically, only 35% of organizations consider their third-party cybersecurity management process as effective (according to a study conducted by the Ponemon Institute).</p>
<p>How to define an effective third-party cyber risk management strategy? What are the key success factors?</p>
<p>&nbsp;</p>
<h2>Adapt your third-party cybersecurity strategy to the risks</h2>
<p>From business partners to subcontractors and IT service providers, a lot of your suppliers manage or have access to your assets. Therefore, they represent a risk for your organization and thus it is important to ensure they are committed to respect a cybersecurity level that meets your requirements.</p>
<p>Depending on which business perimeter they operate and which type of service they provide, the level of risk would be more or less critical. Therefore, our recommendation is to classify your suppliers to adapt your cybersecurity strategy according to the risks they imply.</p>
<p>Since your suppliers can be thousands, this classification will also allow you to prioritize and keep an acceptable workload for your teams.</p>
<p>In order to do that, our first piece of advice is to inventory your suppliers. We notice that few organizations have an exhaustive cartography and that its realization is a tedious project that requires the involvement of many stakeholders (purchasing, legal, department, business…). Therefore, we advise you to start by defining a process to capture your new third parties and by identifying your suppliers involved in the critical business activities identified in your BIA (Business Impact Assessment). Afterwards, you will be able to extend progressively to other third parties.</p>
<p>From this cartography, you will be able to assess your supplier’s criticality and classify them on a scale with several levels. We advise you to consider the following criteria:</p>
<ul>
<li>The business criticality of the project or the asset the supplier is working on;</li>
<li>The degree of interconnection to your information system;</li>
<li>The access to sensitive or confidential data;</li>
<li>The service exposure on the Internet.</li>
</ul>
<p>Nevertheless, we can observe in our client’s environment that applying those criteria can be challenging due to the lack of information about some third parties. Then, we suggest organizing workshops with cybersecurity teams, IT teams and business teams to validate your cybersecurity classification by expert knowledge.</p>
<p>&nbsp;</p>
<figure id="post-14492 media-14492" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14492 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2.png" alt="" width="1443" height="398" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2.png 1443w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2-437x121.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2-768x212.png 768w" sizes="auto, (max-width: 1443px) 100vw, 1443px" /></figure>
<p style="text-align: center;">Example of a classification scale with 3 levels</p>
<p>&nbsp;</p>
<h2>Consider cybersecurity throughout the whole lifecycle</h2>
<p>The feedbacks from the field show that most organizations assess their third party’s cybersecurity level before contracting and include cybersecurity clauses into their contracts. Nevertheless, cybersecurity is not always taken into account thereafter.</p>
<p>We recommend integrating cybersecurity throughout the whole third-party lifecycle by empowering them and adopting a control position.</p>
<p>&nbsp;</p>
<figure id="post-14494 media-14494" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14494 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2.png" alt="" width="1503" height="391" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2.png 1503w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2-437x114.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2-71x18.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2-768x200.png 768w" sizes="auto, (max-width: 1503px) 100vw, 1503px" /></figure>
<p style="text-align: center;">Third party management lifecycle</p>
<p><em> </em></p>
<h3>During contractualisation</h3>
<p>Before the contract signature, the objective is to ensure that the supplier chosen by your business meets your cybersecurity requirements. To do so, we advise you to integrate cybersecurity at each step of the supplier selection process:</p>
<ul>
<li>Include your cybersecurity requirements in your Request For Proposals;</li>
<li>Assess the maturity level of the suppliers responding to your Request For Proposals;</li>
<li>Provide a cybersecurity recommendation to your business according to the project sensitivity and the risk implied by the third party,</li>
<li>Include in the contract cybersecurity requirements adapted to the criticality and the type of service delivered.</li>
</ul>
<p>&nbsp;</p>
<h3> During the contract period</h3>
<p><em> </em>To ensure your third parties respect their cybersecurity commitments throughout the contract period, we advise to:</p>
<ul>
<li>Integrate your third parties into your risk analysis when they operate on the scope of a project. For instance, the methodology allows you to identify all the stakeholders involved in a project and to define an action plan to secure and monitor your ecosystem. The implementation of the security measures must be followed-up with the third-party;</li>
<li>Organize cybersecurity reviews at a frequency adapted to the risks and thus the level of classification. For instance, the most critical third parties can be reviewed at least annually while the less critical ones can be reviewed at contract renewal;</li>
<li>Define a process dedicated to cybersecurity incidents involving a third party and create emergency instructions;</li>
<li>Perform audits only when necessary (for instance following a major cybersecurity incident or after identifying a critical risk…)</li>
</ul>
<p>&nbsp;</p>
<h3>At the end of the contract</h3>
<p><em> </em>A contract renewal is an opportunity to perform a new assessment of the third-party cybersecurity posture and if necessary, update the contractual requirements.</p>
<p>If the contract ends, you must apply your reversibility clauses and ensure that cybersecurity is part of the decommissioning of the service provided.</p>
<p>&nbsp;</p>
<h2>Industrialize third parties’ assessments thanks to market solutions</h2>
<p>We observe that many organizations assess and monitor the cybersecurity level of their third parties with proprietary and non-automated questionnaires that require many external resources. In addition, big-sized suppliers may refuse to complete these questionnaires while smaller ones may not always answer correctly.<br />
Furthermore, we also notice that few organizations have yet adopted a mass assessment approach.</p>
<p>In order to rationalize the approach, we therefore suggest giving-up these historical assessment tools to adopt solutions adapted to the supplier classification level and thus be able to scale up.</p>
<p>&nbsp;</p>
<h3>For the most critical third parties</h3>
<p>We advise you to adopt a co-constructive approach with your most critical suppliers, while adopting a position of control. This translates into the following actions throughout the lifecycle:</p>
<ul>
<li>Assess your most critical suppliers based on their cybersecurity certifications and compliance reports on the scope of the service provided;</li>
<li>Define a contractual Security Assurance Plan to precise the security governance of the service;</li>
<li>Organize security reviews (at least once a year) to control the security level of your suppliers based on the indicators defined in the Security Assurance Plan (maintaining certifications, security incidents, audits, security roadmap&#8230;). These committees are also an opportunity to build a relationship of trust with your suppliers, for example by discussing security news and events as well as the conferences that you could do together.</li>
</ul>
<p>&nbsp;</p>
<h3>For third parties with a medium to low criticality</h3>
<p>In order to take a massive approach in assessing and reviewing the cybersecurity level of your non-critical third parties, market solutions can be used. Indeed, editors and startups (such as CyberVadis, CyberGRX, Risk Ledger…) are positioned on the industrialization of third party’s cybersecurity assessments. This will be the topic of one of our next articles.</p>
<p>Their solutions are based on maturity questionnaires whose results are shared with all their customers. More concretely, these platforms work as follows:</p>
<p>&nbsp;</p>
<figure id="post-14496 media-14496" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14496 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2.png" alt="" width="1120" height="329" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2.png 1120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2-437x128.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2-768x226.png 768w" sizes="auto, (max-width: 1120px) 100vw, 1120px" /></figure>
<p style="text-align: center;">Third party maturity assessment platforms</p>
<p>&nbsp;</p>
<p>Although these solutions are currently not customizable according to your organization&#8217;s specific requirements, they will allow you to:</p>
<ul>
<li>Get cybersecurity assessments tailored to non-critical third parties;</li>
<li>Reduce the workload of your cybersecurity teams;</li>
<li>Share third-party assessments with other customers and therefore be able to quickly access assessments already performed;</li>
<li>Adopt a win-win approach with your suppliers who will share a single questionnaire with all their customers and will be proposed action plans to remedy any discrepancies;</li>
<li>Popularize third-party cybersecurity management to your business or purchasing teams thanks to didactic scores on different topics.</li>
</ul>
<p>&nbsp;</p>
<h2>Ensure the effectiveness of your third-party cybersecurity management process</h2>
<p>From business to IT project managers and including purchasing and legal teams, third-party cybersecurity management involves many players in your organization. It can only be successful if your process is well-known and applied by all. Therefore, it is key to train and raise the awareness of all stakeholders.</p>
<p>To ensure that your process is properly implemented, it is important to define and implement controls covering all stages of the supplier management life cycle. As a first step, we recommend that you define realistic targets by focusing on your most critical third parties. Over time, these targets may evolve to consider your suppliers with lower levels of criticality. Your controls may include the classification of your third parties, their assessment and their review at an appropriate frequency during the contract period.</p>
<p>&nbsp;</p>
<h2>Integrate third-party cybersecurity management in a &#8220;Know Your Supplier&#8221; approach</h2>
<p>Just as the KYC (Know Your Customer) approach in B2C sectors, we suggest that you include third-party cybersecurity management in a KYS (Know Your Supplier) spirit where the objective is to take all supplier risks into account in a consolidated way.</p>
<p>Cybersecurity assessments and notably maturity assessment platforms can be integrated within supplier management tools (source to contract), as well as financial, CSR, environmental impact, anti-corruption and anti-money laundering assessments. This will ease the integration of cybersecurity into your sourcing and supplier review processes.</p>
<p>See you next episode for an article about market solutions that automate the cybersecurity assessments of your suppliers.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/how-to-define-an-effective-third-party-cyber-risk-management-strategy/">How to define an effective third-party cyber risk management strategy?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Citalid &#124; Shake Up &#8211; Cyber Threat Intelligence for optimizing cyber budgets</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/cyber-threat-intelligence-for-optimizing-cyber-budgets/</link>
		
		<dc:creator><![CDATA[Maxime Cartan]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 17:48:01 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[citalid]]></category>
		<category><![CDATA[CTI]]></category>
		<category><![CDATA[FAIR]]></category>
		<category><![CDATA[finance]]></category>
		<category><![CDATA[investment]]></category>
		<category><![CDATA[optimization]]></category>
		<category><![CDATA[quantification]]></category>
		<category><![CDATA[shake'up]]></category>
		<category><![CDATA[startups]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14585</guid>

					<description><![CDATA[<p>Citalid is a French tech startup founded in 2017 that provides CISOs and Risk Managers with a software for quantifying and managing cyber risk. Citalid&#8216;s highly innovative technology enables its clients to benefit from simulations, metrics and recommendations that are...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/cyber-threat-intelligence-for-optimizing-cyber-budgets/">Citalid | Shake Up &#8211; Cyber Threat Intelligence for optimizing cyber budgets</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><em>Citalid</em></strong><em> is a French tech startup founded in 2017 that provides CISOs and Risk Managers with a software for quantifying and managing cyber risk. <strong>Citalid</strong>&#8216;s highly innovative technology enables its clients to benefit from simulations, metrics and recommendations that are directly operational to optimize their ROSI (Return On Security Investments) thanks to its unique ability to cross-reference technical, contextual and financial data. <strong>Citalid</strong> is part of Wavestone&#8217;s startup acceleration programme, Shake&#8217;Up.</em></p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14516 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2.png" alt="" width="1082" height="378" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2.png 1082w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2-437x153.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2-768x268.png 768w" sizes="auto, (max-width: 1082px) 100vw, 1082px" /></p>
<p><strong><em> </em></strong></p>
<p>For the time being less well known and less widespread in Europe than its sisters <strong>EBIOS RM &amp; Mehari</strong> (among others), the FAIR risk analysis method nevertheless fills the gaps left by other approaches. Already highlighted by <strong>Wavestone</strong> in a <a href="https://www.riskinsight-wavestone.com/en/2020/10/cyber-risk-quantification-understanding-the-fair-methodology/">previous article</a>, its main assets lie in the perspective of data usually ignored by traditional risk analysis on the one hand, and on the other hand in its ability to generate metrics dedicated to strategic decision support and adapted to the language of decision-makers, such as <em>Value at Risk</em>.</p>
<p>Nevertheless, as this same article points out, this approach is a priori undermined by time, human resources and the multiplicity of knowledge required to carry it out. Therefore, although the concept is attractive, is it realistic to deploy the <strong>FAIR</strong> method? How can its nomenclature be translated operationally? What about its automation? More generally, does it provide enough added value to justify its use?</p>
<p>Despite its undeniable effectiveness in quantifying risks, such an approach requires both an appropriate technical system and functional support, which is essential in the collection of data. Quantifying its potential financial losses in the event of a cyber incident is not enough: it is also necessary to have the capacity to put them into perspective in an ecosystem of polymorphous and evolving threats. This is <strong>Citalid</strong>&#8216;s innovation: to be able to carry out a dynamic quantification of cyber risk for decision-makers, by automatically crossing the reality of the threat that weighs on a company, its business context and its defensive maturity. And, above all, not to stop at analysis alone: to generate an action plan that reflects the optimal balance between efficiency and profitability.</p>
<p>&nbsp;</p>
<h2>Empiricism as FAIR&#8217;s automation framework</h2>
<h3>Contextualizing the external environment</h3>
<p>As in any analysis, the objectivity of the observation increases with the number of parameters considered. If it is frequent, even usual, that the internal context of an information system is studied, it is rarer for the analyst to be interested in all the external dynamics that can influence the analysis. These dynamics, which can take on a variety of realities as we shall see, can however strongly influence the frequency and intensity of cyber threats. However, it is difficult to draw up an exhaustive typology of these data, and taking them into account is almost systematically a mixture of two ingredients:</p>
<ul>
<li>Curiosity and the logical mind of the analyst (<em>in fine</em>, his capacity to project himself into / adapt to a context);</li>
<li>The good visibility of the person(s) responsible for the system and the activities within their perimeters;</li>
</ul>
<p>Among the exogenous criteria that can influence the risk analysis are: the competitive environment, the company&#8217;s position on its market, its geographical locations, geopolitical dynamics, internal policies, the normative framework, the socio-economic climate, the diversity of its activities, etc.</p>
<p>However, it would be easy to get lost in this labyrinth of criteria. It is therefore necessary to support the decision-maker in the creation of a cartography of its environment in the most comprehensive sense of the term. It is therefore through exchange and collective intelligence that a first level of filter is created, by drawing up a perimeter of analysis that is both structured and flexible.</p>
<p>While defining the perimeter of the analysis makes it possible to establish a coherent framework, a multitude of risks can nevertheless be inserted into it. It should also be noted that the defined perimeter can itself be a component of a broader scope of analysis. In this sense, the various perimeters determined can be articulated in the form of a hierarchical tree, often tracing the internal organisation of the company (see diagram below).</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14452 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1.png" alt="" width="601" height="433" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1.png 601w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-265x191.png 265w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-54x39.png 54w" sizes="auto, (max-width: 601px) 100vw, 601px" /></p>
<p>&nbsp;</p>
<p>Thus, in the example opposite, the group level is represented by the &#8220;<em>Energy Company</em>&#8221; perimeter, which aggregates the risk of all its &#8220;children&#8221; perimeters (here its &#8220;<em>business units</em>&#8220;). However, each perimeter has its own context and risks. This tree structure plays a predominant role in the construction of a relevant library of related risk scenarios. One could easily be tempted to go back up to the group level to globalize its scenarios, but this often <em>de facto</em> deteriorates the granularity, and therefore the quality, of the analysis due to the particularities of each perimeter.</p>
<p>&nbsp;</p>
<h3>Build a relevant library of scenarios</h3>
<p>This framing work therefore conditions the choice and parameterisation of risk scenarios. This parameterisation and the resulting calculation is made complex by the number of criteria to be taken into account and the uncertainty inherent in cyber risk. Without going back over the FAIR methodology already discussed on this blog, it can therefore be long and tedious to build a large number of scenarios of risk while considering the specificities of each perimeter. A solution to this problem therefore lies in the construction of a library of scenarios that can be adapted to each business context and encompass several types of threats. Based on operators&#8217; experience and accumulated data, Citalid now has several libraries of scenarios and losses, listed in &#8216;Business&#8217; directories. These are easily exportable on the platform, while retaining a degree of flexibility that allows the scenarios indicated to adapt very precisely to the business context. Following on from the use-case used above, the image below illustrates a &#8216;fictitious&#8217; library of scenarios related to the Energy sector. As this is a &#8216;Demo&#8217; version, this panel is however not exhaustive.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14454 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2.png" alt="" width="1862" height="629" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2.png 1862w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-437x148.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-768x259.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-1536x519.png 1536w" sizes="auto, (max-width: 1862px) 100vw, 1862px" /></p>
<p>&nbsp;</p>
<p><strong>Citalid</strong>&#8216;s library of scenarios is thus part of a double dynamic that at first sight seems contradictory: capable of meeting the requirements of efficiency and automation of the analysis, it remains flexible enough to be implemented with precision and relevance in any context. Each typology of threat, combined with the characteristics of the perimeter analyzed, determines the frequency of occurrence and the financial losses, whether primary or secondary, inherent in the chosen scenario. In the case of an economic espionage scenario, for example, it is safe to say that there will systematically be a loss related to the remediation of the incident, a loss related to the exfiltration of data and a loss resulting from damage to the entity&#8217;s reputation if the attack were to become public.</p>
<p>In addition, for the quantitative parameters (frequency of the threat, IS resistance to the attack, frequency and magnitude of losses, targeted assets, etc.) of the scenario to remain relevant, they must be profiled on the characteristics of the target perimeter. Therefore, Citalid&#8217;s expertise lies in part in defining and keeping up to date &#8211; cyber threats and available abacus evolving rapidly &#8211; a library of <em>templates</em> from which the analyst must be able to draw to easily and automatically initiate his risk assessment.</p>
<p>Accumulating data on cyber threats and their impacts therefore makes it possible to calibrate scenario &#8220;templates&#8221; and thus gradually automate the <strong>FAIR</strong> analysis. By combining threat intelligence, technical models and abacuses from open source analysis and customer feedback to assist analysts, <strong>Citalid</strong>&#8216;s award-winning innovation platform leverages collective intelligence to ensure scientific rigor and unparalleled accuracy in quantifying financial losses.</p>
<p>&nbsp;</p>
<h2>Putting risks in perspective with the defense ecosystem</h2>
<h3>The CISO as pilot of his IS</h3>
<p>In terms of cybersecurity management, the CISO is, unsurprisingly, the focal point of the system. To do this, he must be able to quickly visualize the entire panorama of cyber risks weighing on his IS &#8211; a &#8220;cockpit&#8221; view, in order to then inflect orientations on a larger scale. He therefore needs a GPS to guide him in his decisions: how to take his IS from point A (current risk situation) to point B (desired risk exposure), taking care to optimize his trajectory (cyber investments) while avoiding obstacles (threats) that appear dynamically along the way.</p>
<p><strong> </strong></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14456 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3.png" alt="" width="1877" height="818" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3.png 1877w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-768x335.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-1536x669.png 1536w" sizes="auto, (max-width: 1877px) 100vw, 1877px" /></p>
<p style="text-align: center;">Example of a <em>risk dashboard</em>, illustrating the ISSM&#8217;s cockpit vision<strong>. </strong></p>
<p>&nbsp;</p>
<p>Once the various scenarios have been established and the quantification carried out, the difficulty lies in the possibility of translating these &#8220;raw&#8221; risks into a strategic roadmap. The first step is to put these risks into perspective by comparing them with the current defensive infrastructure of the IS. Knowledge of its environment is a prerequisite for the CISO&#8217;s analysis. All the more so as, in terms of defensive infrastructure, two major options exist and sometimes complement each other: opting for a logic of defensive maturity based on compliance with one or more reference systems (ISO 27k, NIST, CIS, etc.) or carrying out &#8211; and then comparing with peers &#8211; an inventory and evaluation of all the security solutions deployed on the perimeter.</p>
<p>&#8220;A permanent confrontation between theory and experience is a necessary condition for the expression of creativity&#8221; [1]. 1] The aphorism could not be more revealing of the method described here: that of the confrontation between theory (raw risks) and experience (evaluation of defensive maturity based on a multitude of feedback and incidents) as a necessary condition for the creation of a roadmap. The confrontation makes it possible to obtain the &#8220;net&#8221; risk with which the company is really confronted, lower than the gross risk since it considers the defenses of the IS.</p>
<p>Fueled by &#8220;actionable&#8221; metrics, the decision-maker will now be able to have visibility on his real risk in his own language, and consequently be able to arbitrate and determine its destination &#8211; his B point &#8211; according to his appetite for risk and the company&#8217;s policy. Which scenarios should be dealt with by investing to reduce the associated risk? Which ones should be maintained, given their low economic impact? Which ones to share with a cyber insurer? However, as we will see, the modelling of net risk described in the previous paragraph requires a consequent knowledge of the threat ecosystem in which it is embedded.</p>
<p>&nbsp;</p>
<h3>Cyber Threat Intelligence, a catalyst for optimal risk management</h3>
<p>One of the main shortcomings of risk management in cybersecurity is the difficulty in deploying an approach that reflects the reality of the risk &#8220;on the ground&#8221;. The CISO or Risk Manager must therefore also have a radar to dynamically detect obstacles in his path (threats) and, as far as possible, anticipate and prevent impediments.</p>
<p>Thus, just as a rock slide on a road is the result of a conjunction of multiple factors (weather conditions, geological characteristics, human activity, etc.), an attacker&#8217;s action depends on many elements. These elements should, as far as possible, be observed and included in the risk analysis. Consequently, Cyber Threat Intelligence (CTI), a discipline dedicated to the study and contextualization of attackers&#8217; operating modes, enriches and energizes traditional risk analyses. The mastery and inclusion of this discipline in cyber risk management is one of Citalid&#8217;s major differentiators and permeates its entire corporate culture.</p>
<p>How can CTI data be operationally and sustainably combined with the risk calculations announced in the previous paragraph? We can get an intuition of this by noting the following three facts:</p>
<ul>
<li>The company&#8217;s market segment helps to determine the operating methods most likely to be of interest to the company;</li>
<li>The attack techniques used by these operating methods and their centers of interest within the targeted information systems make it possible to identify the most critical assets and to know how to improve their protection;</li>
<li>By comparing again the CTI data defined in the two previous points with its defensive infrastructure, the entity can identify which scope (in the sense of a security repository) or which defense solution is not cost-effective enough (reduction of the risk in relation to the cost).</li>
</ul>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14458 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4.png" alt="" width="1190" height="519" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4.png 1190w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-768x335.png 768w" sizes="auto, (max-width: 1190px) 100vw, 1190px" /></p>
<p>&nbsp;</p>
<p>The diagram above represents a concrete example of the application of CTI to risk analysis, acting as a real catalyst for drawing up guidelines. A modus operandi is technically expressed through its &#8220;Kill Chain&#8221;, i.e. the sequence of attack techniques it uses to achieve its objective. Citalid has mapped the links between these TTPs (Tactics-Techniques-Procedures) and specific points of different security reference systems (here the CIS20), the latter being the defensive measures best adapted to the TTPs defined in the diagram. On the first line, for example, the CIS 16.3 measure (among others) is sufficiently deployed at the target entity to limit the impact of the TTPs indicated at this stage of the Kill Chain. On the second line, on the other hand, the opposite occurs: the CIS 11.1 measure is not mature enough to provide effective protection against the sophistication of the attacker.  It is therefore on this line that the defender potentially needs to concentrate.</p>
<p>The last line crystallizes the interests of the enrichment of the analysis by the CTI. The yellow square determines the maturity progression due to the implementation of security solutions relevant to the CIS 11.1 measure (e.g. a network device management system), which are automatically determined and recommended to the user in the case of the Citalid calculation engine. In other words, this differential indirectly expresses a path towards optimal maturity and resilience for this specific scenario, the starting point for the definition of a tailor-made cyber investment strategy.</p>
<p>&nbsp;</p>
<h2>Turning analysis into strategy</h2>
<h3>Formulate a cyber strategy aligned with group objectives</h3>
<p>A successful and relevant risk analysis is characterized by the ease with which the observer can immediately visualize how to translate data into action. It must therefore be intelligible and coherent for the recipient, whatever his or her technical level and position in the organization chart. In other words, risk analysis alone is insufficient: it can only be truly useful if it gives rise to a long-term strategy.</p>
<p>This vision, strongly oriented towards the most strategic levels, marks the very DNA of Citalid. Behind the calculation of the risks (raw and real) and the most effective recommendations (referential as solutions) thanks to CTI, the objective is to be able to propose an indicator of the return on investment (ROI) of the security solutions. By visualizing his initial position (A), his desired position (B) and the different possible paths (defense investments), the final decision-maker must be able to compare the ROI of the different options and draw up a cyber investment strategy in line with his budget and real objectives.</p>
<p>Moreover, the objective behind this singular approach is twofold. Firstly, it is a question of accompanying our clients in the definition of their cyber security strategies and in the application of a co-constructed action plan, aimed at compensating for the flaws made visible by the analysis. However, in order to keep this strategy realistic, it is essential to ensure that it can be part of a global dynamic and therefore quickly assimilated by a higher hierarchical body (COMEX). To meet this need, Citalid has refined its service so that it is in line with the realities of the CISO:</p>
<ul>
<li>By adapting the platform in terms of ergonomics, level of technicality and language, so that the dashboards are transparent and easy to interpret;</li>
<li>By assisting our clients in defining budgets and in their legitimization and justification (advocacy) in view of the reality of the threat.</li>
</ul>
<p>By aligning cybersecurity strategies with broader investment strategies, in line with the objectives set by the group, Citalid intends to guarantee and reinforce the predominant role of the CISO in steering cyber resilience.</p>
<p>&nbsp;</p>
<h3>Capitalizing on the approach through the deployment of a risk index</h3>
<p>The major advantage in choosing to take a global approach to security lies in its potential for aggregating risk at any level (group, business unit, application, project, etc.) and for standardization (comparison between perimeters and peers). Like rating agencies, this &#8220;scoring&#8221; of the entity, which takes into account not only its level of maturity on its exposed assets but also its risk management strategy, internal organization, the reality of the threat, its own business context, etc., can be transformed into a global risk index, symbol of the entity&#8217;s resilience and monitored by its management. This is truer since a scientific approach based on many heterogeneous parameters presents a desirable objectivity, for the entity as well as for its partners and collaborators.</p>
<p>This time, it is no longer just a question of positioning oneself in one&#8217;s environment, but of positioning oneself in relation to possible peers (comparison) and partners (guarantees). A risk index reflecting high resilience and sound risk management will ensure that its suppliers or end customers have optimal security and respect for their data, while reassuring investors that their funds are being used correctly.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14460 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5.png" alt="" width="1387" height="606" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5.png 1387w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-768x336.png 768w" sizes="auto, (max-width: 1387px) 100vw, 1387px" /></p>
<p style="text-align: center;">Examples of risk indices produced by <strong>Citalid</strong>: in this case, a &#8216;Cyber Weather&#8217; that identifies variations in a client&#8217;s media exposure.</p>
<p>&nbsp;</p>
<p>Other players could also benefit from such an index: the insurance industry, and cyber-insurers. The quantification of cyber risk remains an obstacle for them, as traditional actuarial approaches are limited by the lack of historical cyber security data. Citalid&#8217;s model, presented here, combines threat expertise, advanced probabilistic models and innovative attack-defense simulations to overcome this lack of data. Our scoring and metrics, based on risks rather than on a simple level of defense, allow us to refine the insurance model to be as close as possible to the real needs of our clients.</p>
<p>Thus, quantifying cyber risk and the return on investment of security solutions is one of the biggest challenges facing today&#8217;s CISOs, Risk Managers and insurers. Through its innovative approach, Citalid responds to this need to reposition cyber security at the heart of corporate strategies and to optimize its action plans and investments.</p>
<p><sup>[1]</sup> Attributed to Pierre Joliot-Curie</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/cyber-threat-intelligence-for-optimizing-cyber-budgets/">Citalid | Shake Up &#8211; Cyber Threat Intelligence for optimizing cyber budgets</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber risk quantification : understanding the FAIR methodology</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/10/cyber-risk-quantification-understanding-the-fair-methodology/</link>
		
		<dc:creator><![CDATA[Fr@Nc0isLuqu3t]]></dc:creator>
		<pubDate>Wed, 07 Oct 2020 08:39:51 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Board]]></category>
		<category><![CDATA[c-level]]></category>
		<category><![CDATA[cyber risk quantification]]></category>
		<category><![CDATA[FAIR methodology]]></category>
		<category><![CDATA[Financial terms]]></category>
		<category><![CDATA[risk analysis]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14270</guid>

					<description><![CDATA[<p>As of now, it is interesting to note that it is the real attacks themselves that most easily allow us to quantify the cyber risks, and this by estimating the costs involved. It is estimated that NotPetya, the famous 1-billion-dollar...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/cyber-risk-quantification-understanding-the-fair-methodology/">Cyber risk quantification : understanding the FAIR methodology</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As of now, it is interesting to note that it is the real attacks themselves that most easily allow us to quantify the cyber risks, and this by estimating the costs involved. It is estimated that NotPetya, the famous 1-billion-dollar malware, would have cost more than 300 million to many large companies, such as Fedex, Saint Gobain, &#8230; These estimates are still very approximate and are generally possible only several months after an attack. So, how can we anticipate the risks related to cyberattacks? How to reliably quantify this risk?</p>
<p>Lately, strong attention is being paid to risk quantification, and rightly so. However, it remains a very complex topic. There are two obvious reasons for this: we are sorely lacking in precise information and feedback; but also because cyberattacks generate many intangible impacts (reputation, internal disorganization, strategic damage, shutdown of operations); or indirect costs (drop in sales, contractual penalties, drop in the company&#8217;s market value, etc.).</p>
<p>We can see promising avenues for quantifying risk, and solutions able to automate this quantification are been released.</p>
<p>&nbsp;</p>
<h2>Why cyber risk should be quantified?</h2>
<p>Whether it is for communicating with senior management, business units, or even insurers, there is a real need to assess cyber risks as objectively as possible. The challenge is twofold: to gain relevance and legitimacy. One way forward is to treat cyber risk through a financial prism, like all other business risks, to make them meaningful to decision-makers.</p>
<p>One of the real challenges in quantifying cyber risks lies in building trust with executive committees over the long term. The first step is to adopt a clear posture <strong>to convince them and secure the investments needed to launch structuring security programs.</strong> Then, it should help <strong>proving the effectiveness of the investments made</strong>, and thus sustain the relationship with the executive committees over time, through the demonstration of the risk reduction in a quantified way and the evolution of risk over several years. This is key, particularly <strong>in the wake of the COVID crisis</strong>, as it will lead to a reduction and optimization of cyber security budgets within companies. It will therefore be essential to quantify the cyber risk for a stronger control on the ROI of cyber security investments.</p>
<p>The process of securing a company&#8217;s information system cannot be carried out without the implementation of Security by Design. Hence, it cannot be carried out without involving the business units. <strong>Speaking the same language is therefore necessary.</strong></p>
<p>Finally, in order not to find themselves at the foot of the wall in the event of an attack, it is essential for companies to anticipate the potential costs of an attack in order to <strong>adapt provisions and insurance. </strong><strong>This quantification allows them to do this.</strong></p>
<p>&nbsp;</p>
<h2>What are the main difficulties encountered?</h2>
<p>Given their <strong>intangible nature</strong>, it seems complex to objectively assess the impacts of cyberattacks. This is the case, for example, of the impact on a company&#8217;s image and reputation, or strategic damage and internal disorganization. Other risks are indeed tangible but <strong>indirect</strong>, which further complicates the task of companies that wish to quantify their risks, for example a loss of market share, a drop in the company&#8217;s market value, etc.</p>
<p>There is no universal formula for calculating the impact of an attack on a company. It depends on several parameters: the size of the company, the level of complexity and openness of the information system, the cyber maturity, etc. A company&#8217;s level of exposure depends essentially on its level of cyber security maturity. There are frameworks such as NIST, ISO, CIS, etc. for estimating the level of maturity in cyber security, but few companies manage to implement them or use them at their full extent.</p>
<p>Companies willing to quantify their cyber risks are faced with a lack of statistical databases on the cost of cyberattacks. Of course, most companies communicate little or nothing about it, probably to avoid scaring their customers and partners. And yet, collaboration would be key in the face of increasingly clever attackers: both to increase their cyber-resilience and to facilitate risk quantification. For example, Altran and Norsk Hydro have been affected by similar ransomwares from the same group of attackers!</p>
<p>&nbsp;</p>
<h2>Some first clues for quantifying cyber risk</h2>
<p>IMF President Christine Lagarde has already taken up the issue and published a bill and a methodology for quantifying cyber risks in the banking sector, used within the IMF. So how can we extend quantification to other sectors?</p>
<h3>Prerequisites for optimal risk quantification</h3>
<p>The FAIR methodology is one of the most widely used to quantify risks. Effective risk quantification induces:</p>
<ul>
<li><strong>A good knowledge of its most critical risks. </strong>Indeed, given the complexity of FAIR, it is better not to spread out and focus on the most important risk scenarios. You still have to know them! A risk mapping exercise is to be expected, in which the mobilization of the business units will be needed;</li>
<li><strong>A good understanding of existing security measures</strong> to ensure their ability to resist attacks and to estimate the residual impacts;</li>
<li><strong>A first draft of a repository of typical costs</strong> (legal fees, communications fees, etc.), which will be completed over time, and which requires business expertise to identify and estimate costs.</li>
</ul>
<p>Also, estimating the cost of risk, due to its cross-functional nature, calls for the collaboration of many stakeholders in the company (HR, legal, etc.), which can be complex to set up.</p>
<h3>The FAIR methodology, an approach that specifies certain phases of risk analysis and treatment</h3>
<p><strong>Introduction to the FAIR (Factor Analysis of Information Risk) methodology</strong></p>
<p>In 2001, Jack Jones was the CISO for Nationwide Insurance. He was confronted with persistent questions from his senior management asking for figures on the risks to which the company was exposed. Faced with the dissatisfaction caused by the vagueness of his answers, Jack Jones set up a methodology to estimate, in a quantified way, the risks weighing on his business: the FAIR methodology.</p>
<p><strong>Concretely, how does this differ from a risk analysis methodology, such as EBIOS in France?</strong></p>
<p>The FAIR methodology is not a substitute for risk analysis: FAIR is a methodology for assessing the impacts and probabilities of a risk more reliably. The impacts are always translated into financial terms in order to make the evaluation tangible. The contributions made are illustrated in the diagram below.</p>
<p>&nbsp;</p>
<figure id="post-14328 media-14328" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14328 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image-1-4.png" alt="" width="1496" height="509" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image-1-4.png 1496w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image-1-4-437x149.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image-1-4-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image-1-4-768x261.png 768w" sizes="auto, (max-width: 1496px) 100vw, 1496px" /></figure>
<figure id="post-14326 media-14326" class="align-none"></figure>
<p style="text-align: center;"><strong><em>Diagram 1</em></strong><em>: FAIR, an approach that specifies certain phases of risk analysis and treatment</em></p>
<p>&nbsp;</p>
<p>Usually, cyber risk assessment results in several types of impact (image, financial, operational, legal, etc.). The particularity of the FAIR methodology is to transpose each impact to a financial cost (direct, indirect, tangible and intangible costs). For example, if a risk scenario has an impact on the company&#8217;s image, FAIR translates this risk into a financial risk by evaluating the cost of the communication agency that will be mobilized to improve the company&#8217;s image. If a company&#8217;s CEO is mobilized as part of crisis management, then it will be necessary to estimate the time spent managing this crisis and monetize it.</p>
<p><strong>How to apply the FAIR methodology?</strong></p>
<p>A risk quantified in euros is the factor of the frequency of successful attack (loss event frequency) and the cost of the successful attack (loss magnitude). The diagram below shows the approach used by the FAIR methodology to estimate these two characteristics.</p>
<p><strong><em> </em></strong></p>
<figure id="post-14277 media-14277" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14277 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-2.png" alt="" width="1629" height="821" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-2.png 1629w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-2-379x191.png 379w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-2-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-2-768x387.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-2-1536x774.png 1536w" sizes="auto, (max-width: 1629px) 100vw, 1629px" /></figure>
<p style="text-align: center;"><strong><em>Diagram 2:</em></strong><em> the criteria taken into account by the FAIR methodology to estimate risks</em></p>
<p>&nbsp;</p>
<ul>
<li><strong><em>« Loss Event Frequency</em></strong><strong><em> » computation</em></strong></li>
</ul>
<p>The &#8220;contact frequency&#8221; represents the frequency at which the threat agent meets the asset to be protected. For example, it may be the frequency at which a natural disaster occurs at a given location.</p>
<p>The &#8220;probability of action&#8221; is the likelihood that the threat will maliciously act on the system once contact is made. This applies only when the threat agent is a living being (does not apply in the case of a tornado, for example). This is deducted from the gain, effort and cost of the attack and the risks.</p>
<p>The <strong>&#8220;threat event frequency&#8221;</strong> is derived from these two parameters.</p>
<p>The &#8220;threat capability&#8221; consists of estimating the capabilities of the threat agent both in terms of skills (experience and knowledge) and resources (time and materials).</p>
<p>The &#8220;resistance strength&#8221; is the company&#8217;s ability to withstand this attack scenario. The resistance threat is calculated based on the level of cyber maturity of the entity, for example with a gap analysis at NIST.</p>
<p>From these two parameters come the <strong>&#8220;vulnerability&#8221;</strong> and the <strong>&#8220;loss event frequency&#8221;.</strong></p>
<ul>
<li><strong><em>« Loss Magnitude » computation</em></strong></li>
</ul>
<p>“Primary losses” are the cost of direct losses. This includes: interruption of operations, salaries paid to employees while operations are interrupted, cost of mobilizing service providers to mitigate the attack (restoring systems, conducting investigations), etc.</p>
<p>“Secondary losses&#8221; are indirect losses, resulting from the reactions of other people affected, and are more difficult to estimate. For example, secondary loss can cover the loss of market share caused by the deterioration of the company&#8217;s image, the costs of notifying an attack through a communication agency, the payment of a fine to a regulator or even legal fees, etc. This is calculated by multiplying the &#8220;secondary loss event frequency&#8221; and the &#8220;secondary loss magnitude&#8221; for each of the indirect costs.</p>
<p><strong>A solution that accompanies companies in the implementation of this methodology</strong></p>
<p>Beyond the theoretical description of the methodology, solutions are being developed to enable companies to apply the methodology in a concrete way. This is the case of the French start-up Citalid, for example, which offers a platform for quantifying cyber risks based on the FAIR methodology. This enables the CISO to refine and make the quantification of risks consistent thanks to threat intelligence (for monitoring attackers over time). To use the solution, the company must fill in elements relating to its context and, for each of the risk scenarios to be quantified, complete a NIST questionnaire (50 questions for the most basic or 250 for a finer level of granularity) and the rest is calculated automatically.</p>
<p>&nbsp;</p>
<h2>What are the advantages and limitations of the FAIR methodology?</h2>
<p>The FAIR methodology mainly provides the following elements:</p>
<ul>
<li>It allows the company <strong>to identify and evaluate more precisely the most important risks</strong>. For each of the selected risk scenarios, the methodology allows an estimate of average and maximum financial losses and an estimated frequency. For example: &#8220;the probability of losing 150 million euros due to the propagation of a destructive NotPetya type ransomware exploiting a 0-day Windows flaw is 20%&#8221;.</li>
<li>It allows to estimate the cost-benefit of the risk reduction action plan. By playing with &#8220;resistence strength&#8221;, it is possible <strong>to estimate the return on investment (ROI) of the security measures to be put in place.</strong></li>
<li>It transposes all cyber risks into a financial risk which allows a <strong>better understanding of the risk by the company&#8217;s managers.</strong></li>
</ul>
<p>However, the FAIR application is not without constraints because it requires resources that are sometimes significant (both in terms of man-days and knowledge of the company&#8217;s context). Moreover, risk quantification only covers a limited scope (1 risk scenario). Also, <strong>risk quantification using the FAIR methodology needs to be refined with standard cost charts associated with a cyber impact</strong>. This can be done, for example, by capitalizing on post-mortem analyses of a cyber crisis, which can often provide a real illustration of the financial impacts.</p>
<p>Thus, the FAIR methodology is a promising approach that still needs to be fully understood and adapted to companies’ context in order to derive concrete benefits.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/cyber-risk-quantification-understanding-the-fair-methodology/">Cyber risk quantification : understanding the FAIR methodology</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Test, test and increase your Resilience: how to build your testing programme</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/09/test-test-and-increase-your-resilience-how-to-build-your-testing-programme/</link>
		
		<dc:creator><![CDATA[m@THIEU]]></dc:creator>
		<pubDate>Mon, 14 Sep 2020 11:03:17 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[BC]]></category>
		<category><![CDATA[CM]]></category>
		<category><![CDATA[CR]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[DR]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[programme]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14194</guid>

					<description><![CDATA[<p>This year has been exceptionally trying for individuals, businesses and governments globally. Living and working in a crisis mode introduced an array of challenges, with some firms dealing with them better and faster than others. What is the common denominator?...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/test-test-and-increase-your-resilience-how-to-build-your-testing-programme/">Test, test and increase your Resilience: how to build your testing programme</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 style="text-align: justify;">This year has been exceptionally trying for individuals, businesses and governments globally. Living and working in a crisis mode introduced an array of challenges, with some firms dealing with them better and faster than others. What is the common denominator? The answer in most cases is strong crisis reflexes, built over the years with consistent effort.</h3>
<p style="text-align: justify;">Testing is an important part of <b>operational </b><b>resilience</b> and can take <b>many shapes and forms, </b>from disaster recovery testing for ensuring service continuity to end-to-end crisis simulations examining decision-making. It enables to proactively <b>manage risk, embed crisis management framework</b>, and allows to continuously improve capabilities such as <b>business continuity </b>(BC), <b>crisis management </b>(CM), <b>disaster recovery </b>(DR), and <b>cyber resilience </b>(CR). Needless to say, training plays an important role in such a testing programme.</p>
<h3 style="text-align: justify;"><i>“Better awareness nurtures an organisational culture that embraces operational resilience and, as a result, improves the company’s preparedness to deal with adversity.”</i></h3>
<p style="text-align: justify;">From firm to firm, good testing programmes vary in nature, scale and complexity. Depending on how a firm is structured and what it does, testing is addressed at different organisational levels and locations, with involvement of external parties (i.e. critical suppliers). In reality, given little guidance from the regulators on what ‘good’ looks like, programmes are often fragmented and can cause a real headache.</p>
<p>&nbsp;</p>
<h2>Principles for creating a successful testing programme</h2>
<div class="uncode_text_column">
<p style="text-align: justify;">While there is no silver bullet to creating a fit-for-purpose testing programme, we recommend following <b>6 guiding </b><b>principles </b>to devise one that is successful and tailored to your organisation’s needs. Following these could significantly improve the outcomes of the programme.</p>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3 style="text-align: justify;">1. Think long term</h3>
<p style="text-align: justify;">When constructing a testing programme, it is of paramount importance to define what you want to achieve in 3 years. A <b>focus on outcomes </b>provides the required direction yet allows the flexibility to re-shape the testing programme each year in order to respond to changes while focusing on the end goal. Begin with small and less complex tests, such as <b>test walkthroughs</b>, and progress to very involved, <b>realistic crisis simulation exercises.</b></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<div class="uncode_text_column">
<h3 style="text-align: justify;">2. Start with threats</h3>
<p style="text-align: justify;">Every test needs to link to threat(s) resulting in one or several plausible major incident scenarios (and impacts). <b>Anticipate and understand new threats </b>through market watch and leverage audit reports and risk assessments when building or reviewing your programme.</p>
<p>&nbsp;</p>
</div>
<div id="gallery-146195" class="isotope-system">
<div class="isotope-wrapper no-gutter style-color-xsdn-bg">
<div class="isotope-container isotope-layout style-masonry" data-type="masonry" data-layout="masonry" data-lg="1000" data-md="600" data-sm="480">
<div class="tmb tmb-iso-w10 tmb-iso-h4 tmb-light tmb-overlay-text-anim tmb-overlay-anim tmb-overlay-middle tmb-overlay-text-left tmb-text-space-reduced tmb-image-anim tmb-bordered tmb-media-first tmb-media-last tmb-content-overlay">
<div class="t-inside style-color-xsdn-bg">
<div class="t-entry-visual" tabindex="0">
<div class="t-entry-visual-tc">
<div class="t-entry-visual-cont">
<div class="dummy">
<figure id="post-14195 media-14195" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14195 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3.jpg" alt="" width="1866" height="333" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3.jpg 1866w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-437x78.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-71x13.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-768x137.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-1536x274.jpg 1536w" sizes="auto, (max-width: 1866px) 100vw, 1866px" /></figure>
</div>
<div class="t-entry-visual-overlay-in style-dark-bg">
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3></h3>
<h3 style="text-align: justify;"><b>3. Focus on Important Business Services (IBS)</b></h3>
<p style="text-align: justify;"><b>Align testing of existing contingency arrangements </b>to important business services and key processes. This ensures preparedness when a situation of high business impact occurs and avoids challenges arising from lack of end-to-end vision.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-internal row-container" style="text-align: justify;">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3><b>4. Diversify testing</b></h3>
<p>The most likely and most impactful scenarios should be examined with <b>different stakeholder groups </b>through different types of testing. This ensures that the theory works in practice and different reflexes are <b>embedded in the organisation’s DNA</b>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="t-overlay-wrap">
<div class="t-overlay-inner">
<div class="t-overlay-content">
<div class="t-overlay-text single-block-padding">
<div class="uncode_text_column">
<p style="text-align: justify;">To achieve more benefits, go beyond standalone contingency plans and comms tooling testing and examine a combination of them with internal and external, business and technical stakeholders.</p>
<p>&nbsp;</p>
</div>
<div id="gallery-342260" class="isotope-system">
<div class="isotope-wrapper no-gutter">
<div class="isotope-container isotope-layout style-masonry" data-type="masonry" data-layout="masonry" data-lg="1000" data-md="600" data-sm="480">
<div class="tmb tmb-iso-w10 tmb-iso-h4 tmb-light tmb-overlay-text-anim tmb-overlay-anim tmb-overlay-middle tmb-overlay-text-left tmb-image-anim tmb-bordered tmb-media-first tmb-media-last tmb-content-overlay tmb-no-bg">
<div class="t-inside">
<div class="t-entry-visual-cont">
<figure id="post-14197 media-14197" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14197 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1.jpg" alt="" width="1440" height="594" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1.jpg 1440w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1-437x180.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1-71x29.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1-768x317.jpg 768w" sizes="auto, (max-width: 1440px) 100vw, 1440px" /></figure>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<p style="text-align: center;"><i>The radar above is an indicative example of what a good testing programme would consist of. The threat categories considered are random and could be selected differently as long as diversification is maintained (mix-and-match).</i></p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="uncode-accordion" data-collapsible="no" data-active-tab="1">
<div id="accordion_1849304804" class="panel-group" role="tablist" aria-multiselectable="true">
<div class="panel panel-default">
<div class="panel-heading" role="tab">
<p><strong>Crisis simulation</strong></p>
<div id="crisis-simulations" class="panel-collapse collapse in" role="tabpanel">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">Crisis simulations examine a <b>hypothetical disaster situation </b>with defined parties and multi-cells of stimulus. They allow to rehearse the establishment and communication of recovery requirements and carry out relevant activities effectively. Crisis simulation can be a tabletop exercise (level 1), a hands-on simulation (level 2), a multi-cell hands-on crisis simulation (level 3) or an international hands-on multi-cell multi-party simulation (level 4).</p>
<div class="panel-heading" style="text-align: justify;" role="tab"><strong>Work area recovery testing</strong></div>
<div id="work-area-recovery-testing" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">Work area recovery testing checks whether <b>full end-to-end business processes</b> can be run offsite, <b>ensuring</b> <b>that</b> <b>all elements of a process can be completed during a test </b>and not just the technical aspects. They can involve a team (level 2) or a number of geographically dispersed teams (level 3) working from recovery sites or home. Both third parties (i.e. outsourced teams) and internal teams should be considered.</p>
<div class="panel-heading" role="tab"><strong>IT disaster recovery plan and cyber range testing</strong></div>
<div id="it-disaster-recovery-plan-and-cyber-range-testing" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">IT DRP and Cyber range testing practically examines <b>each step in a specific disaster recovery plan</b> or <b>tests cyber forensics capabilities</b>. This ensures the possibility to <b>recover data, restore critical IT system </b>after an interruption of its services, critical IT failure or complete disruption due to cyber attacks or IT disruptions. This testing can happen as a standalone (level 2) or as part of a crisis simulation (level 3-4).</p>
<div class="panel-heading" style="text-align: justify;" role="tab"><strong>Business recovery plan walkthroughs</strong></div>
<div id="business-recovery-plan-walkthroughs" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">Business Recovery Plan walkthroughs for group/business divisions/business units are undertaken following a major revision of a plan or team and are <b>designed to increase the understanding of the recovery processes, roles and responsibilities</b>, <b>and</b> <b>question the suitability and completeness of the plan</b>. Normally this would be carried out as a review-and-challenge session with the plan owner and a BC expert (level 1) or to test the efficiency of the specific measures and planned workarounds (level 2).</p>
<div class="panel-heading" role="tab"><strong>Communication cascade tests</strong></div>
<div id="communication-cascade-tests" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column" style="text-align: justify;">
<p>Communication cascade tests establish whether <b>contact details </b>are accurate, determine whether <b>cascade roles and responsibilities </b>are understood by staff, and establish whether or not the <b>documented procedures </b>are robust. They can be completed in one of three ways – either a standalone live test (e.g. text cascade; level 2), as part of a crisis simulation exercise (level 2-4), or an audit involving review of plans and interview of staff with key responsibilities (level 1).</p>
</div>
<div class="row-internal row-container" style="text-align: justify;">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3><b>5. Stay current</b></h3>
<p>Review your testing programme at least once a year in order to <b>adapt to the changing threats landscape</b> and ultimately <b>ensure operational resilience</b>. Make sure your crisis management framework and contingency plans are regularly improved based on the testing outcomes and changes in the business.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3 style="text-align: justify;"><b>6. Engage and drive</b></h3>
<p style="text-align: justify;"><b>Involve different parties </b>in shaping and running your testing programme (e.g. cyber, risk, Ops, DPO, legal, business resilience champions, etc.). Use MI to share progress and alignment with the 3-year operational resilience vision.</p>
<p>&nbsp;</p>
</div>
<div class="heading-text el-text">
<h2>What next: how do you structure your testing programme?</h2>
</div>
<div class="uncode_text_column">
<p>While it is not possible to prescribe a testing programme without better understanding the organisation of interest and deep-diving into the specifics of a threat landscape, it is clear that investing time and resources is worthwhile from operational resilience and regulatory standpoints.</p>
<h3><i>“Having recently gone through a pandemic, it is a high time to keep the momentum and continue fostering the right culture and correct reflexes for the next </i><i>major </i><i>crisis.”</i></h3>
</div>
<div class="uncode_text_column">
<h4><b>A few concluding tips</b></h4>
</div>
<div class="uncode-wrapper uncode-list">
<ul>
<li><b>Make it realistic: </b>Where maturity allows, aim for more <b>complex and realistic tests </b>as they are essential to effectively respond to real events and increase end-to-end resilience. This means engaging more internal and external parties in the ‘live’ exercises.</li>
<li><b>Leverage internal and market crises: </b>Continuously <b>monitor</b> events happening on the market (major incidents and crises) as well as your internal major incidents to feed your testing program, prioritise your threats and devise your scenarios making it more tangible for your stakeholders.</li>
<li><b>Engage early: </b>Share the vision for testing with <b>key stakeholder groups </b>so they understand the journey on which you want to bring the organisation. This will enhance collaboration and, therefore, outcomes.</li>
<li><b>Facilitate remotely:</b> Remote working arrangements should not put your whole testing programme on hold &#8211; use collaborative solutions or leverage tools from the market for carrying out the exercises. This is especially relevant for cyber range testing and follow-the-sun testing. Experience shows that <b>digital workplace solutions </b>introduce a more democratic participation and is an excellent way to record interactions.</li>
<li><b>Continuously improve:</b> Reflect on tests by producing post-test reports and defining an action plan to <b>drive and track improvements</b>. Involve key stakeholders throughout so they understand the gravitas of the outcomes and help with driving positive changes.</li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/test-test-and-increase-your-resilience-how-to-build-your-testing-programme/">Test, test and increase your Resilience: how to build your testing programme</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Organize or reorganize the security sector of a large company &#8211; Feedback</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/organize-or-reorganize-the-security-sector-of-a-large-company-feedback/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Tue, 25 Aug 2020 13:00:32 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[feedback]]></category>
		<category><![CDATA[large company]]></category>
		<category><![CDATA[organization]]></category>
		<category><![CDATA[reorganization]]></category>
		<category><![CDATA[security sector]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14024</guid>

					<description><![CDATA[<p>Nostalgia, nostalgia&#8230; remember security organizations 20 years ago. It couldn&#8217;t be simpler! The &#8220;typical&#8221; team was made up of about fifteen people in the ISD operations, all of them passionate about technology: it caused a lot of VLAN, Internet filtering,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/organize-or-reorganize-the-security-sector-of-a-large-company-feedback/">Organize or reorganize the security sector of a large company &#8211; Feedback</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Nostalgia, nostalgia&#8230; remember security organizations 20 years ago. It couldn&#8217;t be simpler! The &#8220;typical&#8221; team was made up of <strong>about fifteen people in the ISD operations, all of them passionate about technology</strong>: it caused a lot of VLAN, Internet filtering, anti-virus comparison&#8230; Attacks were still rare, pressure from regulators was limited, top management had no control over anything&#8230; i<strong>n short, CISO had royal peace of mind!</strong> Admittedly, the first reflections on the positioning of CISO in the organisation were beginning to emerge (balance of power with the CIO, closer ties with the Risk Department, etc.) but these expert discussions were still very confidential.</p>
<p>20 years later&#8230; the situation is totally different and security has taken on a whole new dimension in companies. The figures speak for themselves: in France, <strong>there is an average of 1 security FTE per 500 to 3,000 employees</strong>, with an average of around 1 per 1,000. Some financial players can even reach record ratios of 1 per 200 by integrating the different lines of defence. I&#8217;ll let you do the math: <strong>this quickly represents several hundred, even thousands of employees</strong>! ISSM are therefore now in charge of a plethoric and highly diversified workforce. The historical experts have been joined in recent years by loads of Project Managers, PMO, COO, Program Managers, and even sometimes by specialized buyers and HR, who are gradually learning to work together. Like a sports coach, the CISO now has to deal with such a workforce and find the right organization, the right game system to get results.</p>
<p>&nbsp;</p>
<h2>NO REVOLUTION, THE FUNCTIONAL SECTOR REMAINS THE NORM</h2>
<p>&nbsp;</p>
<div class="slate-resizable-image-embed slate-image-embed__resize-right"><img loading="lazy" decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQHUfGYhv2qh4A/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=d1Wk65W0w2TehS3pPgXJITViCzgT7FaIu51-OYZijRg" alt="No alt text provided for this image" width="664" height="443" data-media-urn="" data-li-src="https://media-exp1.licdn.com/dms/image/C5612AQHUfGYhv2qh4A/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=d1Wk65W0w2TehS3pPgXJITViCzgT7FaIu51-OYZijRg" /></div>
<div></div>
<p>The reasons for reorganizing are always broadly the same: lack of control, a feeling of inefficiency, diffuse responsibilities&#8230; and the work involved in reorganizing can seem colossal. This leads some CISO to very quickly consider disruptive solutions, and in particular the idea of <strong>grouping all security resources into a single, hierarchical team</strong>. Let&#8217;s not waste time and let&#8217;s be very clear: in 95% of cases, this solution is not chosen. Such a move simply presents too many risks of excluding the security function, which is difficult to reconcile with the need for business proximity for certain activities: support for business projects, raising awareness among specific populations, budget negotiations, etc. <strong>The functional channel remains the norm: a central team and relays</strong> (local CISO, security correspondents, etc.) <strong>spread throughout the organization.</strong> However, some industrial players have recently moved towards centralisation, but the move is more motivated by a desire to bring together cybersecurity resources with the security team, which is particularly mature in this sector.</p>
<p>The attachment of the CISO also remains an element of debate, which has been widely relayed and commented on for years. CIO, Risk Management, Financial Management, CEO&#8230; it sometimes seems as if it&#8217;s a race to see who will be the highest in the hierarchy! But contrary to popular belief, there is not necessarily a trend in the field towards the exit of the IT department. Quite the contrary: <strong>3 out of 4 CISO report to the CIO in large companies</strong> and most reorganizations lead to such an affiliation. The reason is simple: it is often an excellent place to be in action, to make progress on issues and to obtain a budget! Warning: for those who decide to be attached to a different department, remember that 80% of a cybersecurity budget falls within the scope of the IT department. <strong>It is therefore essential to nurture a quality relationship between the CISO and the CIO</strong>. I have witnessed a few power struggles in recent years, and it is rarely the CISO who wins <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>That&#8217;s it&#8230; we&#8217;ve got the basic principles: a functional network, often attached to the CIO, with CISO in the company&#8217;s main areas of activity. The task now is to distribute all the cybersecurity activities within this organization, and there are many of them: policies, studies, awareness-raising, the Cybersecurity Program, project support, audits, SOC, CERT, etc.</p>
<p>&nbsp;</p>
<h2>BREAKING DOWN SILOS AND SEEKING OPERATIONAL EFFICIENCY</h2>
<p>As a service provider, I can testify to this: it is quite common to be solicited several times for the same study within a Key Account, in several different entities. This is quite understandable: in a pipeline model, each entity/country has a safety team, and without clearly established rules of the game, <strong>local management often has the reflex to reinforce its team at the slightest need</strong> (specific study, audit results, etc.). This is the whole trap of a sector: it has many advantages but creates complexity and redundancies. And believe me, when the Group CISO finds himself explaining to top management why the company has 3 SOC and 4 incident response units&#8230; it&#8217;s rarely the best meeting of the day ;-).</p>
<p>&nbsp;</p>
<div class="slate-resizable-image-embed slate-image-embed__resize-left"><img loading="lazy" decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQE75Kvn7yEQWg/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=a300caAuWVIpX8z907MSRWaw-wrtoAu4g3VgwKvvIAI" alt="No alt text provided for this image" width="682" height="420" data-media-urn="" data-li-src="https://media-exp1.licdn.com/dms/image/C5612AQE75Kvn7yEQWg/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=a300caAuWVIpX8z907MSRWaw-wrtoAu4g3VgwKvvIAI" /></div>
<p>&nbsp;</p>
<p>In order to avoid such situations, <strong>the trend is towards the pooling of expertise and the creation of central cybersecurity service offerings</strong>. In very concrete terms, this means that many organizations are pooling 1. cybersecurity expertise (studies, innovation, awareness-raising, etc.) 2. Detection and response (SOC, CERT, crisis exercises, Threat Intel, etc.) 3. Audits and controls (slopes, redteam, code analysis, etc.) 4. Project management and PMO (reporting, PMO, communication&#8230;). Add a governance and strategy entity, and <strong>you are not far from getting the organization chart of many Group CISO</strong>! Note that there are alternatives: some organisations opt for a distributed model, consisting of distributing services across entities (for example: the USA is now in charge of the intrusion test service for the entire company), and very large companies often opt for the creation of intermediate Hubs (by region, by business line&#8230;) delivering these services. Regardless of the organisation chosen, this consolidation movement is underway: <strong>it is estimated that around 40% of the sector&#8217;s employees work on activities with a cross-functional scope</strong>&#8230; and the increase has been exponential in recent years.</p>
<p>This move towards centralisation frees up local teams (CISO or business/country/entity correspondents) who can thus consume services and <strong>refocus on activities requiring close proximity to their businesses</strong>: risk assessment, integration of security in projects, security revenues, etc. In the security sectors, this is where we still find the bulk of the workforce (easily 30 to 40%)&#8230; but this situation is very probably temporary! <strong>The widespread use of agile technology has a direct impact on these teams</strong>, who find themselves changing jobs from one day to the next because they are projected into the Feature Teams to train, coach and equip &#8220;Security Champions&#8221; who are gradually gaining in autonomy. Result: local CISO are also industrializing and organizing their teams into service centers for these Feature Teams (development standards, code review, analysis methods&#8230;) Follow my eye: <strong>the spectre of a single, centralized security team is likely to resurface quite quickly in the debates</strong>&#8230; and it is the agile transformation that accelerates the process!</p>
<p>&nbsp;</p>
<h2>IT IS NOW POSSIBLE TO MAKE A CAREER IN A SAFETY FIELD</h2>
<p>&nbsp;</p>
<div class="slate-resizable-image-embed slate-image-embed__resize-right"><img loading="lazy" decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQEQen5EI-gYGg/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=euNdGx4XVbg4WCIIWaDO6MfT8_WYqdrZv6MQwEzStrw" alt="No alt text provided for this image" width="704" height="319" data-media-urn="" data-li-src="https://media-exp1.licdn.com/dms/image/C5612AQEQen5EI-gYGg/article-inline_image-shrink_1000_1488/0?e=1599696000&amp;v=beta&amp;t=euNdGx4XVbg4WCIIWaDO6MfT8_WYqdrZv6MQwEzStrw" /></div>
<div></div>
<p>We have widely commented on this: some security channels have gone from a few dozen people to several hundred or even thousands in the space of a few years. Of course, this requires a bit of organisation&#8230; but <strong>it is also a great opportunity for all the employees in the sector</strong>! Project management, team management, expertise, communication&#8230; very few sectors offer such diversity, and the situation is ideal for attracting and retaining talent. I can only recommend that you take advantage of a cyber-security reorganization to highlight this wealth and<strong> work on skills management</strong>: salary alignment, re/up-skilling, training/certification plans, individual responsibilities, mobility processes&#8230; there are many topics to be addressed to boost well-being and enable employees to build a <strong>full and rewarding career within the industry</strong>!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/organize-or-reorganize-the-security-sector-of-a-large-company-feedback/">Organize or reorganize the security sector of a large company &#8211; Feedback</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OSE belges et ISO 27001 : quel chemin vers plus de cybersécurité ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/ose-belges-et-iso-27001-quel-chemin-vers-plus-de-cybersecurite-2/</link>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 15:20:25 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[NIS]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13761</guid>

					<description><![CDATA[<p>Comment utiliser le cadre de la norme ISO 27001 au service de l’amélioration continue du niveau de sécurité ? Dans un précédent article, on vous racontait tout sur la nouvelle directive européenne NIS et le choix de la Belgique de se...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/ose-belges-et-iso-27001-quel-chemin-vers-plus-de-cybersecurite-2/">OSE belges et ISO 27001 : quel chemin vers plus de cybersécurité ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Comment utiliser le cadre de la norme ISO 27001 au service de l’amélioration continue du niveau de sécurité ?</h1>
<p style="text-align: justify;">Dans un précédent article, on vous racontait tout sur la nouvelle directive européenne NIS et le choix de la Belgique de se baser sur la norme ISO 27001 pour accroître la sécurité des Opérateurs de Services Essentiels (OSE) avec tout ce que ça entraînait pour les organisations nouvellement désignées.</p>
<p style="text-align: justify;">Qui dit directive européenne ne dit pas règlement européen : il revient donc à chaque pays membre de transposer les exigences de la directive NIS dans son droit national. <strong>La Belgique a fait le choix d’un standard existant </strong>(la norme ISO 27001) alors que certains de ses voisins, dont la France, ont choisi une approche basée sur la définition d’un référentiel d’exigences précis mêlant à la fois des mesures techniques et de gouvernance (SI d’administration, cloisonnement, démarche d’homologation, etc.).</p>
<p style="text-align: justify;">Intéressons-nous aujourd’hui à ce que ça implique pour les OSE belges, et plus largement pour toutes les organisations attirées par les normes internationales, de suivre les exigences de la norme ISO 27001.</p>
<p>&nbsp;</p>
<h2>La norme ISO 27001, adulée par certains et critiquée par d’autres</h2>
<p style="text-align: justify;">Des voix se lèvent contre la référence du milieu, fustigeant notamment son aspect bureaucratique et sa paperasserie qui, pourtant, peuvent aider à mettre en place un référentiel utile à la continuité des services et la formation des personnes via le partage des pratiques – surtout lorsqu’il est pensé avec pragmatisme. Les critiques vont également bon train sur le niveau de complexité ajouté, encore plus présent pour les plus petites structures. Là encore, <strong>la règle est au pragmatisme et les mesures doivent être adaptées à la taille de l’organisation </strong>et s’intégrer à l’existant pour éviter les structures <em>ex nihilo</em> trop lourdes à gérer.</p>
<p style="text-align: justify;">Enfin, certains aprioris ont la vie dure et réduisent souvent une conformité ISO 27001 à une liste de cases à cocher, dépourvues d’implications réelles sur la sécurité de l’organisation. Mais la fameuse déclaration d’applicabilité (DdA), exigée par la norme ISO 27001 à tous ceux qui visent une certification, ne revient pas uniquement à lister tous les contrôles de la norme ISO 27002. Elle demande une véritable évaluation au regard des enjeux et des risques. De quoi apporter des éléments concrets pour la sécurité de l’organisation.</p>
<p>&nbsp;</p>
<h2>ISO 27001, ISO 27002, il y en a beaucoup comme ça ?</h2>
<p style="text-align: justify;">Dans la famille des ISO, beaucoup, vraiment beaucoup. En revanche pour la cybersécurité, ce sont bien ces deux-là qui sont les plus utilisées, avec l’ISO 27005 pour la gestion des risques (si c’est la protection des données qui vous intéresse, lisez aussi notre article sur la nouvelle venue <a href="https://www.linkedin.com/pulse/ose-belges-comment-r%25C3%25A9ussir-votre-mise-en-conformit%25C3%25A9-nis-no%25C3%25ABmie-honore/?trackingId=tcYWjUqWRouGnAE8PbAeVw%3D%3D" target="_blank" rel="noopener noreferrer">ISO 27701</a>).</p>
<p style="text-align: justify;">La norme ISO 27001 apporte <strong>un cadre à la cybersécurité et vise à mettre en place un SMSI</strong> (Système de Management de la Sécurité de l’Information). Pour aider les organisations dans cette direction, elle est accompagnée de la norme ISO 27002 qui détaille les bonnes pratiques sécurité présentées dans l’annexe A de l’ISO 27001. La certification (le graal des OSE belges) porte sur la norme ISO 27001 mais les deux normes fonctionnent bien de pair.</p>
<p style="text-align: justify;"><strong>La certification s’obtient sur un périmètre délimité </strong>d’un point de vue métier et IT sur lequel les principaux risques sont identifiés. Cette évaluation par les risques, mêlée à la prise en compte du contexte de l’organisation, aide à sélectionner les bonnes pratiques ISO 27002 pertinentes pour formaliser la Déclaration d’Applicabilité (DdA) et à exclure les contrôles qui ne sont pas applicables (attention à bien justifier ces exclusions : elles seront analysées par l’organisme de certification). Si on peut retirer des pratiques moins utiles, on peut aussi en rajouter d’autres : l’organisation peut ainsi compléter la liste existante des 114 mesures de sécurité au regard de ses risques. La norme ISO 27002 n&#8217;adresse pas l&#8217;exhaustivité des mesures de sécurité possibles. C’est là qu’une expertise cybersécurité prend tout son sens.</p>
<p>&nbsp;</p>
<h2>5 conseils pour trouver le bon équilibre et réussir sa mise en conformité ISO 27001</h2>
<p style="text-align: justify;">Bien entendu, vu dans son ensemble, un programme de mise en conformité à la norme ISO 27001 peut rapidement donner le vertige… Voici <strong>5 réflexes à avoir en tête </strong>pour faciliter le lancement d’un SMSI et le maintien de ses performances dans le temps :</p>
<p>&nbsp;</p>
<figure id="post-14707 media-14707" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14707 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7.png" alt="" width="1813" height="821" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7.png 1813w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7-422x191.png 422w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7-768x348.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7-1536x696.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-7-730x330.png 730w" sizes="auto, (max-width: 1813px) 100vw, 1813px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;"><strong>1. Identifier un sponsor investi au service de l’objectif de sécurisation</strong>. Comme pour le cinéma, il n’y a pas de film sans réalisateur, et pas de réalisateur sans le soutien du producteur. Le <em>match</em> parfait doit avoir pleine conscience de la valeur ajoutée de la mise en conformité à la norme ISO 27001 pour améliorer le niveau de sécurité, au-delà de la pure conformité au cadre légal. Il doit utiliser les cadres normatifs au profit d&#8217;un meilleur niveau de sécurité et doit donc voir ce projet comme un chantier de sécurisation plutôt qu’un chantier de conformité.</p>
<p style="text-align: justify;">Implémenter un SMSI pérenne demande des ressources et moyens humains, organisationnels, physiques et financiers. Le pilotage du projet de mise en conformité ne fonctionnera que s’il est<strong> soutenu par un responsable qui a le pouvoir d’allouer les ressources et les moyens nécessaires pour piloter les risques</strong> et assurer un niveau de sécurité acceptable au regard des enjeux métier. Le respect de la directive NIS, à l’échelle européenne ou à l’échelle belge via une mise en conformité à la norme ISO 27001, constitue avant tout un moyen d’augmenter le niveau de sécurité et non une fin en soi.</p>
<p style="text-align: justify;"><strong>2. Piloter par les risques. </strong>C’est la base de la sécurité ; le concept clé à toujours garder en tête. Ce pilotage permet d’identifier les risques du périmètre et de s’assurer que les enjeux métier sont bien pris en compte. La gestion des risques ne s’arrête pas à leur identification et au traitement initial. Elle demande la mobilisation des équipes et des activités pour traiter les risques existants et suivre l&#8217;évolution des risques (existants et nouveaux qui apparaissent) et leurs traitements, via une mise à jour périodique et lors d’évènements majeurs sur le périmètre.</p>
<p style="text-align: justify;">Par la mise en place de cette démarche globale des risques, l’organisation s’assure une vision transverse des risques qui permet de focaliser les efforts des mesures de sécurité là où il y a le plus d’enjeux. Cette validation et cet arbitrage doivent se faire en concertation avec les propriétaires des risques (métier ou IT) qui portent la responsabilité du risque sur leurs périmètres et doivent se positionner sur les traitements possibles (acceptation, réduction, transfert ou évitement). <strong>Un pilotage affiné et resserré des risques permet ainsi de prendre de véritables décisions éclairées,</strong> par des acteurs parfois éloignés de la sécurité.</p>
<p style="text-align: justify;"><strong>3. Constituer un référentiel documentaire pragmatique.</strong> Cette étape aide à définir et documenter les pratiques et ainsi favoriser la continuité des opérations, leur contrôle et leur amélioration continue. Cette documentation doit être le reflet de la réalité tout en assurant la cohérence avec les exigences de la norme ISO 27001 pour aider à définir les pratiques à mettre en œuvre et les gérer au quotidien (implémentation et mises à jour au gré des évolutions, etc.).</p>
<p style="text-align: justify;">Les maîtres-mots lors de la constitution de ce référentiel sont <strong>pragmatisme et utilité</strong> : il doit s’intégrer à l’existant en complétant les procédures existantes et en en créant de nouvelles qui manquaient ; il ne doit pas compliquer inutilement la situation mais se baser sur une interprétation pertinente de la norme ; il doit être utile aux équipes qui assurent les activités pour permettre le maintien des opérations. <strong>Evitez donc les copier-coller des exigences des normes</strong>. Ils créent un référentiel inutile aux équipes terrain et attiseront la curiosité de vos auditeurs qui douteront alors de l&#8217;effectivité des mesures&#8230;</p>
<p style="text-align: justify;"><strong>4. Évaluer régulièrement les performances.</strong> Tout système de management qui se respecte nécessite une boucle de contrôle pour évaluer ses performances et, dans le cas du SMSI, ses non-conformités à la norme ISO 27001 et au référentiel en place dans l’organisation (synthétisé dans la DdA). L’identification de ces non-conformités doit permettre de remonter jusqu’à leur source et d’initier la réflexion sur la meilleure manière de les gérer. La réflexion à mener doit porter sur la manière dont la non-conformité va être résolue pour assurer l’augmentation du niveau de sécurité tout en s’assurant que les mesures correspondent aux exigences de la norme et sont adaptées au contexte, aux risques et aux enjeux de l’organisation.</p>
<p style="text-align: justify;">Les différents niveaux de contrôles (auto-contrôles par les équipes, audits internes/externes, revues de direction) doivent tous garder l’objectif d’amélioration du niveau de sécurité en tête en utilisant de manière pragmatique les exigences de la norme et le référentiel de l’entreprise, et au besoin faire évoluer ce dernier au regard de la réalité pratique de l’organisation. Il s&#8217;agit de trouver le bon équilibre entre le contexte de l&#8217;organisation et la gestion des risques identifiés. <em>Si vos enjeux portent essentiellement sur la disponibilité d&#8217;une activité, focalisez vos efforts (mesures et contrôles) sur cet enjeu en priorité.</em> Pour être pertinent, <strong>ce cycle d’évaluation doit distribuer les efforts sur les périmètres les plus pertinents pour l’organisation</strong> (selon ses risques et enjeux) et alimenter les prochaines étapes du cylce de vie du SMSI.</p>
<p style="text-align: justify;"><strong>5. Engager les équipes.</strong> Un projet de mise en place d’un SMSI n’est pas uniquement l’apanage du RSSI ou d’une équipe de documentalistes. Il s’agit avant tout d’un projet d’envergure qui demande un large éventail d’expertises allant de la cybersécurité au business en passant par l’IT, le juridique, les achats, les ressources humaines, etc. C’est une véritable conduite du changement qui est à organiser avec l’implication pleine et complète des différentes équipes et du management de l’organisation pour <strong>assurer un SMSI qui sert l’amélioration durable du niveau de sécurité pour l’ensemble du périmètre</strong>.</p>
<p>&nbsp;</p>
<h2>La certification ISO 27001, oui mais pragmatique !</h2>
<p style="text-align: justify;">La véritable force de la certification ISO 27001 est avant tout d’<strong>enclencher une dynamique de sécurité dans l’organisation</strong>. La documentation peut certes alourdir les pratiques mais n’enlève rien de la philosophie d’amélioration continue du niveau de sécurité. Par l’apport d’un socle minimal pour la cybersécurité, sans définir des exigences strictes, la norme laisse à l’organisation le choix de placer le curseur sécurité à un niveau qui lui est adapté et d’obtenir des résultats positifs &#8211; <em>à condition de s’entourer de bonnes personnes sensibilisées au sujet</em> !</p>
<p style="text-align: justify;">Traitée avec un <strong>regard critique et pragmatique</strong>, la norme apporte ainsi un cadre pour installer la gouvernance de la cybersécurité au sein de chaque organisation en mobilisant les concepts clés tout en laissant la marge nécessaire pour proposer des mesures complémentaires qui, ensemble, servent l’amélioration du niveau de sécurité.</p>
<p>&nbsp;</p>
<blockquote><p>Au-delà de l’approche traditionnelle de la conformité, la mise en conformité à <strong>la norme</strong> <strong>ISO 27001 doit servir de boîte à outils</strong> à toute les équipes et non constituer une fin en soi.</p></blockquote>
<p>&nbsp;</p>
<p style="text-align: justify;">La liberté de mise en œuvre de la directive NIS au niveau européen offre un nouveau terrain d’expérimentation où se mêlent cultures différentes et visions divergentes de la cybersécurité. Seul l’avenir pourra nous dire ce qui fonctionne au niveau européen, mais <strong>l’approche belge démontre une nouvelle fois la culture du compromis entre cadre strict et liberté de mouvement. </strong>Pour les OSE belges comme pour les organismes de certification, l’inconnue demeure avant tout sur le positionnement du curseur entre les deux extrêmes.</p>
<p>&nbsp;</p>
<blockquote><p>Il leur faudra alors éviter une approche scolaire et mettre à profit une interprétation utile et pragmatique de la norme en gardant l’objectif final en tête : plus de cybersécurité.</p></blockquote>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/ose-belges-et-iso-27001-quel-chemin-vers-plus-de-cybersecurite-2/">OSE belges et ISO 27001 : quel chemin vers plus de cybersécurité ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Belgian ESO and ISO 27001: which way to more cyber security?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/belgian-eso-and-iso-27001-which-way-to-more-cyber-security/</link>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 11:46:07 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[belgium]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[ESO]]></category>
		<category><![CDATA[ISMS]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14032</guid>

					<description><![CDATA[<p>How can the ISO 27001 framework be used to continuously improve the security level? In a previous article, we told you all about the new European NIS directive and Belgium&#8217;s choice to use the ISO 27001 standard as a basis...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/belgian-eso-and-iso-27001-which-way-to-more-cyber-security/">Belgian ESO and ISO 27001: which way to more cyber security?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How can the ISO 27001 framework be used to continuously improve the security level?</h2>
<p>In a previous article, we told you all about the new European NIS directive and Belgium&#8217;s choice to use the ISO 27001 standard as a basis for increasing the security of Essential Service Operators (ESOs) with all that it entailed for the newly designated organizations.</p>
<p>A European directive does not mean a European regulation: it is therefore up to each member country to transpose the requirements of the NIS directive into its national law. <strong>Belgium has chosen to use an existing standard (ISO 27001)</strong>, while some of its neighbours, including France, have chosen an approach based on the definition of a precise reference system of requirements combining both technical and governance measures (administrative IS, partitioning, approval process, etc.).</p>
<p>Today, let’s try to understand what it means for Belgian ESOs, and more broadly for all organizations attracted by international standards, to follow the requirements of ISO 27001.</p>
<p>&nbsp;</p>
<h2>The ISO 27001 standard, adulated by some and criticized by others</h2>
<p>Some voices are rising up against the reference in the field, castigating in particular its bureaucratic aspect and its red tape which, however, can help to set up a useful reference system for the continuity of services and the training of people through the sharing of practices &#8211; especially when it is thought out pragmatically. Criticism is also rife about the added level of complexity, which is even more present for smaller structures. Here again, <strong>pragmatism is the rule, and measures must be adapted to the size of the organization</strong> and integrated into existing structures to avoid ex nihilo structures that are too cumbersome to manage.</p>
<p>Finally, some preconceptions have a hard time and often reduce ISO 27001 compliance to a list of checkboxes, with no real implications for the security of the organization. But the famous Declaration of Applicability (DoA), required by ISO 27001 for all those seeking certification, is not the same as listing all the controls of ISO 27002. It requires a real assessment regarding the issues and risks. This will provide concrete elements for the security of the organization.</p>
<p>&nbsp;</p>
<h2>ISO 27001, ISO 27002, are there many like that?</h2>
<p>In the ISO family, a lot, really a lot. For cybersecurity, on the other hand, it is these two that are the most used, with ISO 27005 for risk management (if it is data protection that interests you, read also <a href="https://www.riskinsight-wavestone.com/en/2020/01/iso-27701-international-framework-privacy/">our article</a> on the newcomer ISO 27701).</p>
<p>The ISO 27001 standard <strong>provides a framework for cybersecurity and aims to set up an ISMS</strong> (Information Security Management System). To help organizations in this direction, it is accompanied by the ISO 27002 standard which details the good security practices presented in Annex A of ISO 27001. The certification (the Belgian ESOs&#8217; holy grail) is based on the ISO 27001 standard but the two standards work well together.</p>
<p><strong>Certification is obtained on a perimeter defined from a business and IT point of view</strong> on which the main risks are identified. This risk assessment, combined with the consideration of the organization&#8217;s context, helps to select the relevant ISO 27002 good practices to formalize the Declaration of Applicability (DoA) and to exclude controls that are not applicable (be careful to justify these exclusions: they will be analyzed by the certification body). If less useful practices can be removed, other practices can also be added: the organization can thus complete the existing list of 114 security measures regarding its risks. The ISO 27002 standard does not address the exhaustiveness of possible security measures. This is where cybersecurity expertise comes into its own.</p>
<p>&nbsp;</p>
<h2>5 tips to find the right balance and achieve ISO 27001 compliance</h2>
<p>Of course, seen as a whole, an ISO 27001 compliance program can quickly make you dizzy&#8230; Here are <strong>5 reflexes to keep in mind</strong> to facilitate the launch of an ISMS and the maintenance of its performance over time:</p>
<p>&nbsp;</p>
<figure id="post-14035 media-14035" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14035 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1.png" alt="" width="1876" height="833" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1.png 1876w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-430x191.png 430w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-768x341.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-1536x682.png 1536w" sizes="auto, (max-width: 1876px) 100vw, 1876px" /></figure>
<p>&nbsp;</p>
<p><strong>1. Identify a sponsor invested in the service of the security objective.</strong> As with cinema, there is no film without a director, and no director without the support of the producer. The perfect match must be fully aware of the added value of compliance with ISO 27001 to improve the security level, beyond pure compliance with the legal framework. He must use normative frameworks for the benefit of a better security level and must therefore see this project as a security project rather than a compliance project.</p>
<p>Implementing a sustainable ISMS requires human, organizational, physical and financial resources and means. Steering the compliance project will only work if it is <strong>supported by a manager who has the authority to allocate the resources and means necessary to manage the risks and ensure an acceptable level of security regarding the business challenges.</strong> Compliance with the NIS directive, at European or Belgian level through compliance with the ISO 27001 standard, is above all a means of increasing the security level and not an end in itself.</p>
<p>&nbsp;</p>
<p><strong>2. Manage by risk.</strong> This is the basis of security; the key concept to always keep in mind. This management makes it possible to identify the risks within the perimeter and to ensure that the business challenges are considered. Risk management does not stop at the identification and initial treatment of risks. It requires the mobilization of teams and activities to deal with existing risks and monitor the evolution of risks (existing and new risks that emerge) and their treatment, through periodic updates and during major events within the scope.</p>
<p>By implementing this global approach to risks, the organization ensures a cross-functional vision of risks that allows it to focus its security measures where the stakes are highest. This validation and arbitration must be carried out in consultation with the owners of the risks (business or IT) who are responsible for the risk within their perimeters and must position themselves on the possible treatments (acceptance, reduction, transfer or avoidance). <strong>Refined and tightened risk management thus enables real, informed decisions to be taken</strong>, by players who are sometimes far removed from security.</p>
<p>&nbsp;</p>
<p><strong>3. Establish a pragmatic documentary repository.</strong> This step helps to define and document practices and thus promote business continuity, control and continuous improvement. This documentation must reflect reality while ensuring consistency with the requirements of the ISO 27001 standard to help define the practices to be implemented and manage them on a daily basis (implementation and updates as changes occur, etc.).</p>
<p>The key words when setting up this reference system are <strong>pragmatism and usefulness</strong>: it must be integrated into the existing system by completing existing procedures and creating new ones that were missing; it must not unnecessarily complicate the situation but be based on a relevant interpretation of the standard; it must be useful to the teams carrying out the activities to enable operations to be maintained. Therefore, <strong>avoid copying and pasting requirements from the standards.</strong> They create a useless referential for the field teams and will arouse the curiosity of your auditors who will then doubt the effectiveness of the measures&#8230;</p>
<p>&nbsp;</p>
<p><strong>4. Regularly evaluate performance.</strong> Any self-respecting management system requires a control loop to assess its performance and, in the case of ISMS, its non-compliance with the ISO 27001 standard and with the reference system in place in the organization (summarized in the DoA). The identification of these non-conformities must make it possible to trace them back to their source and initiate reflection on the best way to manage them. The reflection to be carried out must focus on how the non-conformity will be resolved to ensure an increase in the level of security while ensuring that the measures correspond to the requirements of the standard and are adapted to the context, the risks and the stakes of the organization.</p>
<p>The different levels of control (self-monitoring by the teams, internal/external audits, management reviews) must all keep the objective of improving the security level in mind by pragmatically using the requirements of the standard and the company&#8217;s reference framework, and if necessary, make the latter evolve in the light of the practical reality of the organization. It is a question of finding the right balance between the context of the organization and the management of the identified risks. If your challenges are mainly related to the availability of an activity, focus your efforts (measures and controls) on this issue as a priority. To be relevant, <strong>this assessment cycle must distribute efforts on the most relevant perimeters for the organization</strong> (according to its risks and impacts) and feed the next steps of the ISMS life cycle.</p>
<p>&nbsp;</p>
<p><strong>5. Engage the teams.</strong> An ISMS implementation project is not only the prerogative of the CISO or a team of documentalists. It is first and foremost a large-scale project that requires a wide range of expertise, from cyber security to business, IT, legal, procurement, human resources, etc. It is a real change management process that needs to be organized with the full and complete involvement of the various teams and the organization&#8217;s management to <strong>ensure an ISMS that serves the sustainable improvement of the security level for the entire perimeter.</strong></p>
<p>&nbsp;</p>
<h2>ISO 27001 certification, yes but pragmatic!</h2>
<p>The real strength of ISO 27001 certification is above all to <strong>trigger a security dynamic within the organization.</strong> Documentation can certainly make practices more cumbersome but does not detract from the philosophy of continuous improvement of the level of security. By providing a minimal basis for cybersecurity, without defining strict requirements, the standard leaves the organization the choice of placing the security cursor at a level that is suitable and to obtain positive results &#8211; as long as you surround yourself with good people who are aware of the topic.</p>
<p>Treated with a <strong>critical and pragmatic eye</strong>, the standard thus provides a framework for installing cybersecurity governance within each organization by mobilizing key concepts while leaving the necessary room to propose complementary measures that, together, serve to improve the level of security.</p>
<p>The free implementation of the NIS Directive at the European level offers a new testing ground where different cultures and different visions of cybersecurity are mixed. Only the future will be able to tell us what works at European level, but the <strong>Belgian approach once again demonstrates the culture of compromise between strict framework and freedom of movement.</strong> For Belgian ESOs and certification bodies alike, the unknown is above</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/belgian-eso-and-iso-27001-which-way-to-more-cyber-security/">Belgian ESO and ISO 27001: which way to more cyber security?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Organiser ou réorganiser la filière sécurité d’une grande entreprise – retours d’expérience</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/organiser-ou-reorganiser-la-filiere-securite-dune-grande-entreprise-retours-dexperience/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 12:00:35 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[DSI]]></category>
		<category><![CDATA[filière sécurité]]></category>
		<category><![CDATA[grande entreprise]]></category>
		<category><![CDATA[organisation]]></category>
		<category><![CDATA[réorganisation]]></category>
		<category><![CDATA[retour d'expérience]]></category>
		<category><![CDATA[RSSI]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13873</guid>

					<description><![CDATA[<p>Nostalgie, nostalgie… rappelez-vous des organisations sécurité il y a 20 ans. Impossible de faire plus simple ! L’équipe « type » était composée d’une quinzaine de personnes au sein des opérations de la DSI, toutes passionnées de technique : ça causait nombre de VLAN, filtrage...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/organiser-ou-reorganiser-la-filiere-securite-dune-grande-entreprise-retours-dexperience/">Organiser ou réorganiser la filière sécurité d’une grande entreprise – retours d’expérience</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="ember64" class="ember-view">
<div class="reader-article-content" dir="ltr">
<p>Nostalgie, nostalgie… rappelez-vous des organisations sécurité il y a 20 ans. Impossible de faire plus simple ! L’équipe « type » était composée d’une <strong>quinzaine de personnes au sein des opérations de la DSI, toutes passionnées de technique</strong> : ça causait nombre de VLAN, filtrage internet, comparatif anti-virus… Les attaques étaient encore rares, la pression des régulateurs restait limitée, le top management ne maîtrisait rien… <strong>bref, les RSSI avaient une paix royale !</strong> Certes, les premières réflexions sur le positionnement du RSSI dans l’organisation commençaient à émerger (équilibre des forces avec le DSI, rapprochement avec la Direction des Risques…) mais ces débats d’expert restaient encore très confidentiels.</p>
<p>20 ans après… la situation est totalement différente et la sécurité a pris une toute autre dimension dans les entreprises. Les chiffres parlent d’eux-mêmes : en France, <strong>on constate en moyenne 1 ETP sécurité pour 500 à 3000 employés</strong>, avec une moyenne tournant aux alentours de 1 pour 1000. Certains acteurs de la Finance peuvent même atteindre des ratios record de 1 pour 200 en intégrant les différentes lignes de défense. Je vous laisse faire le calcul : <strong>cela représente rapidement plusieurs centaines, voire milliers d’employés !</strong> Les RSSI sont donc maintenant aux commandes d’un effectif pléthorique et sacrément diversifié. Les experts historiques ont été rejoint ces dernières années par des cargaisons de chefs de projet, PMO, COO, Directeurs de Programme, voire parfois par des acheteurs et RH spécialisés, qui apprennent progressivement à travailler ensemble. Tel un coach sportif, le RSSI doit désormais composer avec un tel effectif et trouver la bonne organisation, le bon système de jeu pour obtenir des résultats.</p>
<p>&nbsp;</p>
<h2>PAS DE REVOLUTION, LA FILIÈRE FONCTIONNELLE RESTE LA NORME</h2>
</div>
</div>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQHUfGYhv2qh4A/article-inline_image-shrink_1000_1488/0?e=1607558400&amp;v=beta&amp;t=q4ORDi3Uf076WAGim4Ho6ZRIvRuAAaHzT4tY5bEiyTQ" alt="No alt text provided for this image" width="447" height="298" /></p>
<p>&nbsp;</p>
<div id="ember64" class="ember-view">
<div class="reader-article-content" dir="ltr">
<p>Les raisons qui poussent à se réorganiser sont toujours globalement les mêmes : manque de maîtrise, sentiment d’inefficacité, responsabilités diffuses&#8230; et le travail de remise à plat peut sembler colossal. Cela amène certains RSSI à envisager très rapidement des solutions en rupture, et en particulier <strong>celle du regroupement de toutes les ressources sécurité dans une seule et même équipe hiérarchisée</strong>. Ne perdons pas de temps et soyons très clairs : dans 95% des cas, cette solution n’est pas retenue. Un tel mouvement présente tout simplement trop de risques d’exclusion de la fonction sécurité, difficilement conciliable avec le besoin de proximité métier de certaines activités : accompagnement de projets métier, sensibilisation des populations spécifiques, négociations budgétaires… <strong>La filière fonctionnelle reste la norme : une équipe centrale et des relai</strong>s (RSSI locaux, correspondants sécurité…) <strong>répartis partout dans l’organisation.</strong> Certains acteurs industriels ont toutefois récemment franchi le cap de la centralisation, mais le mouvement est davantage motivé par une volonté de rapprochement des ressources cybersécurité avec l’équipe sureté, particulièrement mature dans ce secteur.</p>
<p>Le rattachement du RSSI reste également un élément de débat, très largement relayé et commenté depuis des années. DSI, Direction des Risques, Direction Financière, CEO… on a parfois l’impression que c’est une course à qui sera le plus haut dans la hiérarchie ! Mais contrairement aux idées reçues, on ne constate pas forcément sur le terrain de tendance à la sortie de la DSI. Bien au contraire : <strong>3 RSSI sur 4 rapportent au DSI dans les grandes entreprises</strong> et la plupart des réorganisations débouchent sur un tel rattachement. La raison est simple : c’est souvent un excellent point de chute pour être dans l’action, faire avancer ses sujets, obtenir du budget ! Attention : pour ceux qui décident d’un rattachement différent, rappelons-nous que 80% d’un budget cybersécurité tombe dans le périmètre de la DSI. <strong>Il est donc indispensable de nourrir une relation de qualité entre le RSSI et le DSI.</strong> J’ai pu assister à quelques rapports de force ces dernières années, et c’est rarement le RSSI qui gagne <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Ça y est… on tient les principes de base : une filière fonctionnelle, souvent rattachée au DSI, avec des relais RSSI dans les grands pôles d’activité de l’entreprise. Il s’agit maintenant de répartir dans cette organisation toutes les activités de cybersécurité, et elles sont nombreuses : politiques, études, sensibilisation, Programme cybersécurité, accompagnement projets, audits, SOC, CERT…</p>
<p>&nbsp;</p>
<h2>CASSER LES SILOS ET RECHERCHER L’EFFICACITÉ OPÉRATIONNELLE</h2>
<p>En tant que prestataire, je peux en témoigner : il est assez commun d’être sollicité plusieurs fois pour la même étude au sein d’un Grand Compte, dans plusieurs entités différentes. C’est tout à fait compréhensible : dans un modèle en filière, chaque entité / pays dispose d’une équipe sécurité, et sans règles du jeu clairement établies, <strong>la Direction locale a souvent le réflexe de renforcer son équipe au moindre besoin</strong> (étude spécifique, résultat d’audit…). C’est tout le piège d’une filière : elle présente de nombreux avantages mais crée de la complexité et des redondances. Et croyez-moi, lorsque le RSSI Groupe se retrouve à expliquer au top management pourquoi l’entreprise dispose de 3 SOC et de 4 cellules de réponse à incidents… c’est rarement la meilleure réunion de sa journée ;-).</p>
</div>
</div>
<p>&nbsp;</p>
<p><img decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQE75Kvn7yEQWg/article-inline_image-shrink_1000_1488/0?e=1607558400&amp;v=beta&amp;t=r8xNz6QtkxT_an5LvmuBBLJtOG_8MnlYwDzAIqVakpI" alt="No alt text provided for this image" /></p>
<div id="ember64" class="ember-view">
<div class="reader-article-content" dir="ltr">
<p>&nbsp;</p>
<p>Pour éviter ce genre de situation, <strong>la tendance est au regroupement de compétences et à la création d’offres de service cybersécurité centrales</strong>. Très concrètement, cela se traduit pour de nombreuses organisations par une mutualisation de 1. L’expertise cybersécurité (études, innovation, sensibilisation…) 2. La détection et la réponse (SOC, CERT, exercices de crise, Threat Intel…) 3. Les audits et contrôles (pentests, redteam, analyse de code…) 4. La gestion de projet et PMO (reporting, PMO, communication…). Ajoutez une entité gouvernance et stratégie, et <strong>vous n’êtes pas loin d’obtenir l’organigramme de beaucoup de RSSI Groupe</strong> ! Notons qu’il existe des alternatives : certaines organisations optent pour un modèle distribué, consistant à répartir les services dans les entités (par exemple : les USA sont dorénavant en charge du service de tests d’intrusion pour toute l’entreprise), et les très grandes entreprises optent souvent pour la création de Hubs intermédiaires (par région, par métier…) délivrant ces services. Quelle que soit l’organisation retenue, ce mouvement de consolidation est en cours : <strong>on estime à environ 40% le nombre d’employés de la filière travaillant sur des activités à portée transverse…</strong> et la progression est exponentielle ces dernières années.</p>
<p>Ce mouvement de centralisation permet de libérer les équipes locales (RSSI ou correspondants métier/pays/entité) qui peuvent ainsi consommer les services et <strong>se recentrer sur les activités nécessitant une forte proximité avec leurs métiers</strong> : évaluation des risques, intégration de la sécurité dans les projets, recettes de sécurité… Dans les filières sécurité, c’est ici que nous retrouvons encore aujourd’hui l’essentiel des effectifs (facilement 30 à 40%)… mais cette situation est très probablement transitoire ! <strong>La généralisation de l’agile impacte de plein fouet ces équipes </strong>qui se retrouvent à changer de métier du jour au lendemain car projetées dans les Feature Teams à former, coacher et outiller des « Security Champions » qui gagnent progressivement en autonomie. Résultat : les RSSI locaux s’industrialisent également et organisent leur équipe en centre de services à destination de ces Feature Teams (standards de développement, revue de code, méthodes d’analyse…) Suivez mon regard : <strong>le spectre de l’équipe sécurité unique, centralisée, risque de ressurgir assez rapidement dans les débats</strong>… et c’est la transformation agile qui accélère le processus !</p>
<p>&nbsp;</p>
<h2>ON PEUT DÉSORMAIS FAIRE UNE CARRIÈRE DANS UNE FILIÈRE SÉCURITÉ</h2>
</div>
</div>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter" src="https://media-exp1.licdn.com/dms/image/C5612AQEQen5EI-gYGg/article-inline_image-shrink_1000_1488/0?e=1607558400&amp;v=beta&amp;t=kSC10-FQOEhHceTe60elvOC-nBry63qS-B3lX87H_xc" alt="No alt text provided for this image" width="695" height="308" /></p>
<div id="ember64" class="ember-view">
<div class="reader-article-content" dir="ltr">
<div></div>
<p>Nous l’avons largement commenté : certaines filières sécurité sont passées de quelques dizaines de personnes, à plusieurs centaines voire milliers en l’espace de quelques années. Certes cela nécessite un brin d’organisation… mais <strong>c’est également une formidable opportunité pour tous les employés de la filière ! </strong>Gestion de projet, management d’équipe, expertise, communication… très peu de secteurs offrent une telle diversité, et la situation est idéale pour attirer et fidéliser les talents. Je ne peux que vous recommander de profiter d’une réorganisation cybersécurité pour mettre en lumière cette richesse et <strong>travailler sur la gestion des compétences</strong> : alignement des salaires, re/up-skilling, plans de formation/certification, responsabilités individuelles, processus de mobilité… les sujets à traiter sont nombreux pour booster le well-being et permettre aux employés de se construire <strong>une carrière pleine et enrichissante au sein de la filière !</strong></p>
</div>
</div>
<div class="reader-flag-content__wrapper mb4 clear-both" data-ember-action="" data-ember-action-65="65"></div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/organiser-ou-reorganiser-la-filiere-securite-dune-grande-entreprise-retours-dexperience/">Organiser ou réorganiser la filière sécurité d’une grande entreprise – retours d’expérience</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Creating a relationship of trust with the EXCOM: first step, raising awareness!</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/creating-a-relationship-of-trust-with-the-excom-first-step-raising-awareness/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 12:00:11 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Sections]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[EXCOM]]></category>
		<category><![CDATA[How-to]]></category>
		<category><![CDATA[Maturity]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13916</guid>

					<description><![CDATA[<p>The cybersecurity topic requires involvement at all levels of the company, but also and above all with the executive committee! Obviously, management must be an example, but it will also decide on major investments and will know how to unlock...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/creating-a-relationship-of-trust-with-the-excom-first-step-raising-awareness/">Creating a relationship of trust with the EXCOM: first step, raising awareness!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The cybersecurity topic requires involvement at all levels of the company, but also and above all with the executive committee! Obviously, management must be an example, but it will also decide on major investments and will know how to unlock the most complex situations in the company. It is therefore a key issue for all cybersecurity managers to create a lasting relationship of trust with their EXCOM. But it is also a high-risk exercise, which requires a gradual approach and consistency in commitments.</p>
<p>After having made several dozen speeches to executive committees, audit committees and boards of directors, I wanted to share with you the essential steps for advancing the relationship over the long term. The first phase of this trip should make it possible to create an initial contact and raise the EXCOM&#8217;s awareness on cybersecurity issues. First step, awareness! The objective for these sessions is often to manage to attract attention so as to be able to trigger further reflection within the organization. Later on, we will see the following steps: presenting a balance sheet, obtaining a budget, monitoring the progress on the security level&#8230;</p>
<p>&nbsp;</p>
<h2>An essential prerequisite, knowing where you are starting from and who you are going to deal with</h2>
<p>This may seem like a cliché, but it is certainly the most important element before going to meet an executive committee or a board of directors. Thanks to its wide media coverage, cybersecurity is often already present in executives&#8217; minds. But their degree of digital literacy and their level of appetite for the topic can completely change the way the topic is raised. Will it be necessary to be very didactic (going so far as to re-explain the principle of data, applications, if any) or will it be necessary to immediately address complex points such as the latest attacks observed and their methodologies? You would be surprised to see the diversity of levels between companies, but also within the same EXCOM. And it is necessary to interest each of the stakeholders, at the cost of having comments that are not very helpful during the intervention.</p>
<p>It is therefore important to prepare this first meeting by talking with other members of the ECOM their deputies or with people familiar with this forum to determine the tone to be adopted and the level of the speech to be given. Obviously, the operating rules will also have to be known: is it common for questions to be asked as they arise? Can a member be questioned? Should subjects relating to the company be raised from the outset? Plan to clear the ground upstream! And even if there is no perfect recipe, I will give you below the elements I use most often to make these meetings useful and effective.</p>
<p>&nbsp;</p>
<h2>To start, draw the attention by revealing the behind-the-scenes of an attack&#8230;</h2>
<p>The topics quickly follow one another during the EXCOM. The directors think very, very quickly, so it is necessary to be concrete and to give food for thought and experience. The element that I find most effective consists in presenting a recent attack, published in the press or having affected the sector, and deciphering the stakes and the background: what is the timeframe? what motivation for the attackers? what weaknesses in the company? what is the reaction internally? publicly? with the authorities? This will have the effect of mentally projecting the directors concerned into their role as if they were going through the same thing. <a href="https://www.wavestone.com/app/uploads/2019/10/2019-Security-incident-response-benchmark-Wavestone.pdf">We at Wavestone are fortunate enough to frequently manage major cyber crises</a> and we use these elements, both as a benchmark but also by anonymizing them or in agreement with the victims, to give a very concrete meaning to our feedback.</p>
<p>&nbsp;</p>
<h2>Follow-up with a generalization about cybercrime</h2>
<p>An case is good to understand, but it doesn&#8217;t explain everything! After zooming in on a case, it is a question of generalizing it by explaining what are the mainsprings cybercriminality ways of proceeding. We then analyze the motivations of criminal groups, their organizations, but also and perhaps above all how they make money!</p>
<p>&nbsp;</p>
<figure id="post-13920 media-13920" class="align-none"><img loading="lazy" decoding="async" class="wp-image-13920 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-1-1.jpg" alt="" width="569" height="332" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-1-1.jpg 390w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-1-1-327x191.jpg 327w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-1-1-67x39.jpg 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-1-1-120x70.jpg 120w" sizes="auto, (max-width: 569px) 100vw, 569px" /></figure>
<p>&nbsp;</p>
<p>For an EXCOM to know that it is a DDoS attack or ransomware that has done damage is of little interest, it is especially important to show them that cybercriminal activities are profitable, even very profitable. We have calculated the ROI of several types of attacks and I can tell you that when you explain a 600% profitable attack like a ransomware, the eyes of the directors are wide open. We then highlight very concretely why their structure could be attacked and especially how much money the criminals would make. This often puts an end to the question &#8220;but why would we be targeted by an attack? We&#8217;re not known/we&#8217;re small/we don&#8217;t do anything strategic&#8221;.</p>
<p>&nbsp;</p>
<h2>Explain the company&#8217;s current situation in concrete terms</h2>
<p>This is the right time to present the company&#8217;s IT posture and its current organization in terms of security. It is then a question of presenting it simply, with clear and meaningful images: are you rather in an old-fashioned &#8220;fortress&#8221; model? Or have you already opened your doors as a result of the digital transformation and have you adopted a porch model where security is reinforced the further you go towards critical systems? This will help to make the situation more concrete.</p>
<p>After this phase of mobilization and explanation, comes naturally the phase of questioning by the members of the executive committee. &#8220;But then, where are we now, or are we facing this risk of a cyberattack? ». Faced with this question, either you are lucky enough <a href="https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/">to have a detailed maturity assessment</a> and you can present it immediately, or you can bring in initial qualitative or even partial quantitative elements and explain that today you need to have more visibility. The elements that speak for themselves are the latest audit reports, the latest incidents, budgetary elements.</p>
<p>&nbsp;</p>
<figure id="post-13917 media-13917" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13917 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3.jpg" alt="" width="598" height="461" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3.jpg 598w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3-248x191.jpg 248w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3-51x39.jpg 51w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3-156x121.jpg 156w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3-155x120.jpg 155w" sizes="auto, (max-width: 598px) 100vw, 598px" /></figure>
<p>&nbsp;</p>
<p>If it is difficult at the beginning of the process to talk about the budget and to compare oneself because of a lack of data, it is possible to use a simple and effective indicator, that of your staff dedicated to cybersecurity. We have a database on this point and we can quickly show a EXCOM where it is just by mobilizing its HR. It&#8217;s simple and effective to convince them!</p>
<p>&nbsp;</p>
<h2>Don&#8217;t leave emprty-handed</h2>
<p>The major risk of this awareness is that everything goes well but nothing moves. Indeed, you may have a positive message, &#8220;thank you and see you in a year for an update&#8221;, you will be happy but you will not have helped cybersecurity situation moving forward. It is then necessary to prepare the next step by indicating from this presentation the main points of weakness or strength felt and how you would like to evaluate them more precisely.</p>
<p>Indeed, the second step is often the realization of a dedicated maturity assessment in order to know how to position yourself! If at this point the meeting has taken place, the EXCOM, intrigued and interested in the topic, will want to know more and will give an agreement in principle. Beware that this may not be a budget directly, it will certainly refer you to the CIO or the Risk Director to get it, but with their agreement you will have a great lever to move on to the next step! See you on the next episode.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/creating-a-relationship-of-trust-with-the-excom-first-step-raising-awareness/">Creating a relationship of trust with the EXCOM: first step, raising awareness!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is cybersecurity escape game the best way to raise awareness?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/is-cybersecurity-escape-game-the-best-way-to-raise-awareness/</link>
		
		<dc:creator><![CDATA[Sylvain Werdefroy]]></dc:creator>
		<pubDate>Wed, 15 Jul 2020 09:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[escape game]]></category>
		<category><![CDATA[game]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13892</guid>

					<description><![CDATA[<p>Phishing, data leak, laptop or smartphone thefts, fake President… end-users are key actors in securing information systems. However, it is a difficult exercise to raise their awareness to security risk and to teach them good practices. Headache for CISOs, lack...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/is-cybersecurity-escape-game-the-best-way-to-raise-awareness/">Is cybersecurity escape game the best way to raise awareness?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Phishing, data leak, laptop or smartphone thefts, fake President… <strong>end-users are key actors in securing information systems.</strong></p>
<p>However, <strong>it is a difficult exercise to raise their awareness to security risk and to teach them good practices</strong>. Headache for CISOs, lack of interest or even state of tension from end-users interpreting security measures as restrictions. Ways to raise awareness on information security must evolve continuously.</p>
<p>Is an escape game the way to bring end-users and cybersecurity back together?</p>
<p>&nbsp;</p>
<h2>A fun approach to raise awareness among end-users</h2>
<p>Like any classic escape game, the game master welcomes players and introduces the game’s context and rules. They get into the game’s room where they have to reach their goals in a limited time.</p>
<p>During the game, the game master follows remotely the team progress and gives clues if the players encounter difficulties.</p>
<p>At the end, the game master performs a debriefing. He goes through the different bad security practices used by the team during the game and remind them the good security practices.</p>
<p>&nbsp;</p>
<figure id="post-13893 media-13893" class="align-none">
<figure id="post-13895 media-13895" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13895 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-5.png" alt="" width="946" height="444" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-5.png 946w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-5-407x191.png 407w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-5-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-1-5-768x360.png 768w" sizes="auto, (max-width: 946px) 100vw, 946px" /></figure>
</figure>
<p>&nbsp;</p>
<p><strong> Goals to be reached during the game depends on the scenario</strong>. It can be:</p>
<ul>
<li>Someone pretending to apply for a job that will search the desk of the R&amp;D director of a competitor company to steal the design and technical details of a new product.</li>
<li>A hacker forcing people to steal classified documents and to do bank payments within their own company by threatening them to reveal private sensitive information.</li>
<li>Someone using the opportunity of an invitation at their CEO’s home to steal evidence of their involvement in misappropriation of funds.</li>
</ul>
<p>&nbsp;</p>
<h2>Which awareness areas are raised?</h2>
<p>An escape game enables<strong> to raise awareness</strong> on different topics:</p>
<p>&nbsp;</p>
<figure id="post-13897 media-13897" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13897 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-5.png" alt="" width="950" height="481" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-5.png 950w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-5-377x191.png 377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-5-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Image-2-5-768x389.png 768w" sizes="auto, (max-width: 950px) 100vw, 950px" /></figure>
<p>&nbsp;</p>
<p>Let us take as example the &#8220;Password&#8221; area. The game will expose players to bad practices they will have to leverage to reach their goals:</p>
<ul>
<li>Straightforward password based on personal information (first name, last name, birthdate…),</li>
<li>Passwords saved in Web browsers,</li>
<li>Same passwords used for personal and professional life,</li>
<li>Passwords written on a post-it.</li>
</ul>
<p>Players will <strong>exploit themselves vulnerabilities</strong> set-up in the game and will get a <strong>better understanding of associated risks than if they had to read a policy.</strong></p>
<p>Furthermore, the escape game will help them <strong>understand the part they have to play to avoid being unintentionally accomplice of a cyberattack.</strong> It means to have a cautious behavior like being discreet on social media, being careful when talking to someone new, having reflexes to identify phishing e-mail, shredding confidential papers, etc.</p>
<p>&nbsp;</p>
<h2 id="tw-target-text" class="tw-data-text tw-text-large XcVN5d tw-ta" dir="ltr" data-placeholder="Translation"><span lang="en">How to successfully build a cybersecurity escape game?</span></h2>
<p>First, define the <strong>overall scenario</strong>: goals to be reached, roles taken by players and location of the game.</p>
<p>Then, <strong>design secondary objectives and the series of actions</strong> that will allow the players to reach the main goals. Let us take an example: to reach the goal “steal the confidential document of a product’s design”, players will have to:</p>
<ul>
<li>Rebuild a document torn apart manually from the trash,</li>
<li>Use this document to find the answer of a secret question to reset a user password,</li>
<li>Leverage the account hacked to connect to a SharePoint to fetch the confidential document.</li>
</ul>
<p>A classic escape game is using clues / objects in unexpected hiding places. On the contrary, <strong>the idea of a cybersecurity escape game is to recreate real life circumstances that players will be able to reflect on their own working life.</strong></p>
<p>It is important <strong>to adjust the difficulty level according to the people targeted.</strong> Clues must be comprehensible to people with no IT expertise if the escape game is targeting a large group of coworkers. On the contrary, clues must be more complex if the target is IT people. Like, having them do easy SQL injections on an application to access confidential data. The approach to use the SQL injection can be provided through a Web app thanks to a bookmark saved in a Web browser.</p>
<p>Finally, once everything is designed and ready, test sessions are required to refine the game and adjust when the game master needs to give clues. It is important that players <strong>reach all goals to ensure they see all security awareness topics expected.</strong></p>
<p>&nbsp;</p>
<h2>A very effecient tool to be included in a global awareness strategy</h2>
<p>Role-playing provided by escape game enable <strong>great awareness and ensure a good assimilation of messages</strong>. Players spontaneously create links between life experience and ones encountered during the game which allows rich debriefings: multiple discussions and players are engaged in depth in the topic approached.</p>
<p>Escape game does not replace <strong>other methods of awareness campaigns</strong>. It must be part of a global strategy which alternate actions with strong impact (but costly) and other cheaper actions (but with less impact) to allow continuous awareness with a controlled budget.</p>
<p>Finally, <strong>cybersecurity escape game is also an excellent teambuilding tool!</strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/is-cybersecurity-escape-game-the-best-way-to-raise-awareness/">Is cybersecurity escape game the best way to raise awareness?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to effectively evaluate your cybersecurity</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/</link>
		
		<dc:creator><![CDATA[Anthony GUIEU]]></dc:creator>
		<pubDate>Tue, 30 Jun 2020 13:00:04 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Analyze]]></category>
		<category><![CDATA[How-to]]></category>
		<category><![CDATA[ISO27k]]></category>
		<category><![CDATA[Level]]></category>
		<category><![CDATA[Maturity]]></category>
		<category><![CDATA[REX]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Roadmap]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13312</guid>

					<description><![CDATA[<p>Security managers often bring us in to evaluate their cybersecurity maturity level. We help firms analyze the return on investment for cybersecurity, properly allocating the budget, comparing level of security to that of others in similar sectors or common standards,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/">How to effectively evaluate your cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Security managers often bring us in to <strong>evaluate their cybersecurity maturity level</strong>. We help firms analyze the return on investment for cybersecurity, properly allocating the budget, comparing level of security to that of others in similar sectors or common standards, and measure exposure to recent attacks.</p>
<p>But these projects are not only the work of systems security managers. These projects also come from executive committees who seek a<strong> 360 view of the security of their institution</strong> to better evaluate potential risk. So, what are key success factors that we have seen in the field?</p>
<p>&nbsp;</p>
<h2>Step 1: Know the purpose and expectations of your evaluation</h2>
<p>Evaluations can be entirely different <strong>levels of depth</strong>. From a high-level interview with the Chief Security officer to an in-depth assessment of the security mechanisms and processes of all the subsidiaries of a multinational group, everyone can choose their areas of focus and advance step-by-step.</p>
<p>Our first advice is to <strong>keep in mind the objectives of your evaluation</strong>. This will allow you to orient yourself toward the right security benchmarks and ultimately define the depth of the evaluation. Do you only want to measure the security maturity of your subsidiary’s information systems or also its efficiency? Perfectly documented security processes and an ISO 27001 certification can unfortunately hide problems on the ground that can expose you to vulnerabilities. It can be judicious to combine a technical test (pentest, red team, etc.) to the evaluation in order to <strong>avoid situations that seem fine on the surface but hide underlying issues</strong>.</p>
<p>&nbsp;</p>
<h2>Step 2: Find and mobilize the right people at the right level, easy to say but harder to do…</h2>
<p>The next difficulty that you can encounter in your assessment is to succeed at meeting the right people. From experience, we advise you to confirm your list of the necessary collaborators as soon as possible.</p>
<p>Logically, this list will certainly depend on the granularity of the analysis but also on the organization of the business. For example, the necessary people will differ if the security staff are at the group level and function as a service center or if they are merged into each entity and service. Consequently, if you want to have a high-level estimate first, it could suffice to only have a half day exchange with the Chief Security Officer, who generally has a sufficient and global vision of the subject.</p>
<p>The second stage of analysis can be performed in gathering information from all actors involved in cybersecurity at the group level. In this group, it can be interesting to meet a large group of people involved in information systems and the cloud.</p>
<p>Finally, when the assessment must be thorough and exhaustive, it becomes necessary to widen the list of collaborators to all of the concerned entities. Obviously, you should expect a larger workload, so do not skimp on preparation and tools to help you in your work. It can also be the right moment to think about your presentation format: face-to-face, distance, strategic, operational, etc.</p>
<p>&nbsp;</p>
<h2>Step 3: Equipment, finding the right balance between too much and not enough</h2>
<p>Choosing the right tools is one of the main assessment challenges that you will face. The more complete the assessment, the more it will require tools that ensure simplification and understanding of the whole project. Indeed, for large evaluations, the <strong>consolidation and restitution of results are two of the great challenges that you will encounter</strong>. In particular, commonly used tools don’t take into account the organizational complexity of large groups or the effectiveness of allocated resources. It is for these reasons that, from our side, we have chosen to develop a specific tool.</p>
<p>A good tool also allows you to position yourself against your competitors and understand your exposure to current attack trends and points where your COMEX is particularly sensitive, ensuring you can legitimize the assessment.</p>
<p>So it begins! It’s time to get your hands dirty and start the work of collecting information! There is a classic phrase that applies to these situations: entirely feasible from a distance. Be aware and transparent about the limits of the exercise: those questioned will sometimes have the impression that the assessment is too theoretical and this is normal, according to their objectives. During this phase, it will also be necessary to be able to juggle between the various unknowns because it is not uncommon to have people who are ultimately absent for long periods of time, added parameters, changes in methodology. Make it a point of honor to remain agile.</p>
<p>&nbsp;</p>
<h2>Step 4: Reforming at the right level to act, everything is a question of the point of view</h2>
<p>A good habit to keep is to honestly adapt each reform to each person. From the managerial summaries where we talk about trends without much detail to presentations for technical teams that are highly detailed, adapting the discourse to the necessary format is important to convey the right messages to the right people.</p>
<p>Usually, we start the reforms in terms of the organization’s budget and workforce dedicated to cybersecurity. These very concrete points allow you to attract attention and be able to then analyze the situation from four different angles:<br />
· Compliance with different global benchmarks (ISO/NIST)<br />
· Assessment of the level of maturity of different entities compared to others in the same sector or market<br />
· Quantification of the effort reach the market level and/or the required level according to cybersecurity benchmarks<br />
· Evaluation of the level of robustness of the organization against the last known cyberattacks</p>
<p>With senior management, the restitution is often going to focus on organizational and governance matters. However, there can always be surprises. In cases where businesses have already been hit by serious cyber attacks, we have had surprisingly precise and technical questions from executive committees. For example, we have been asked for details on encryption algorithms and “How secure is my active directory?”</p>
<p>&nbsp;</p>
<h2>Get started</h2>
<p>As mentioned earlier, the maturity assessment is an effective means for <strong>measuring the effectiveness and progress of your cybersecurity roadmap</strong>. Consequently, even if you don’t want to immediately begin an assessment involving all security systems and dozens of teams at your business, <strong>we advise you to familiarize yourself with the approach</strong> and its usefulness in starting out with more modest goals.</p>
<p>At Wavestone, with years of experience and expertise, we have developed the <strong>W-Cyber-Benchmark</strong>, a multi-use tool that has been implemented by dozens of clients. We know that just writing about it isn’t enough, <a href="https://www.wavestone.com/en/contact/">so don’t hesitate to contact us to discuss further</a>!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/">How to effectively evaluate your cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The creation of Wavestone’s new internal awareness program (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/the-creation-of-wavestones-new-internal-awareness-program-2-2/</link>
		
		<dc:creator><![CDATA[Timoléon Tilmant]]></dc:creator>
		<pubDate>Fri, 26 Jun 2020 09:00:26 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Sections]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[cyberawareness]]></category>
		<category><![CDATA[DSI]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13299</guid>

					<description><![CDATA[<p>Find the entire story about the creation of TRUST in my first article. &#160; A campaign launch is all well, but how do you keep it going over time? The creation of TRUST was not an end in itself, but...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/the-creation-of-wavestones-new-internal-awareness-program-2-2/">The creation of Wavestone’s new internal awareness program (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Find the entire story about the creation of TRUST in my <a href="https://www.riskinsight-wavestone.com/en/2020/06/the-creation-of-wavestones-new-internal-awareness-program-1-2/">first article.</a></p>
<p>&nbsp;</p>
<h2>A campaign launch is all well, but how do you keep it going over time?</h2>
<p>The creation of TRUST was not an end in itself, but a stepping-stone for the future.</p>
<p>At the start of the project, we immediately envisaged the annual pace of our two awareness plans.</p>
<p>Two, because we had to keep in mind that we were raising awareness for two distinct populations: newcomers and existing employees.</p>
<p>For newcomers, the solution is simple: plan the launch of all existing TRUST resources over one year to space out messages.</p>
<p>&nbsp;</p>
<figure id="post-13290 media-13290" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13290 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-3.png" alt="" width="854" height="584" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-3.png 854w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-3-279x191.png 279w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-3-57x39.png 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-3-768x525.png 768w" sizes="auto, (max-width: 854px) 100vw, 854px" /></figure>
<p>&nbsp;</p>
<p>For all other employees, it&#8217;s more complex. How to get the messages across again without giving a feeling of déjà vu, fatigue or even an overdose?</p>
<p>We have therefore organized our awareness plan with 3 major initiatives spaced out over time.</p>
<p>&nbsp;</p>
<h2>A new monthly meeting: The Trust minute</h2>
<p>&nbsp;</p>
<figure id="post-13292 media-13292" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13292 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-2.png" alt="" width="800" height="450" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-2.png 800w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-2-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-2-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-2-768x432.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></figure>
<p>&nbsp;</p>
<p>A one-minute film broadcasted on all our communication channels to present 5 different messages per month:</p>
<ol>
<li>An example of an anonymous user or client incident</li>
<li>A Trustee, our security tool presented in the previous article</li>
<li>A security indicator (e.g. the percentage of new recruits who have completed e-learning, the number of those leaving the firm detected downloading documents before they leave). Sharing these indicators helps raising awareness and demonstrates that controls have been lifted.</li>
<li>A daily tip given by our friend Sofia</li>
<li>A popularized cyber news story</li>
</ol>
<p><strong> </strong></p>
<figure id="post-13300 media-13300" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13300 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-EN.png" alt="" width="1920" height="1080" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-EN.png 1920w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-EN-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-EN-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-EN-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-EN-1536x864.png 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></figure>
<p>&nbsp;</p>
<h2>A new campaign of cybercoffee quizzes because it gets results</h2>
<p>Of course, we must reinvent it, change the quizzes (but not necessarily the themes) and change the prize? All of this is easy and requires little preparation. Admittedly, this period of lockdown slightly challenged our initial plan. But it has been an opportunity to be creative and to release, in partnership with my colleagues in the Cybersecurity &amp; Digital Trust practice, the new <a href="https://youtu.be/YneNQ0nts98">#TotalCyberAwakening video </a>series about lockdown.</p>
<p>&nbsp;</p>
<h2>An annual global event in October during Cyber Security Month</h2>
<p>In 2019, we organized a firm-wide competition on the theme of protecting personal digital information.</p>
<p>Every week, all employees received a question by email which they could answer directly via option buttons <em>(sending a multiple-choice approval via Power Automate)</em>. Depending on their answer, they received a second email with the answer and the various tips associated to be used on a personal basis.</p>
<p>Answering a question and getting a correct answer would help contributing to a Euro prize fund. More than €2,100 was donated to the ISSA association, an association which Wavestone has partnered with to promote cybersecurity among schools and children.</p>
<p>This first game, based entirely on voluntary participation, enabled us to reach more than a third of Wavestone&#8217;s employees.</p>
<p>&nbsp;</p>
<figure id="post-13302 media-13302" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13302 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4-EN.png" alt="" width="781" height="1352" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4-EN.png 781w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4-EN-110x191.png 110w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4-EN-23x39.png 23w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4-EN-768x1329.png 768w" sizes="auto, (max-width: 781px) 100vw, 781px" /></figure>
<p>&nbsp;</p>
<p>We are already preparing for next October&#8217;s initiative and this time we will go further with videos, games, meetings, quizzes under a global theme inspired by a famous TV series. What if this time, the new threat of Wavestone was the return of the White Walkers?</p>
<p>&nbsp;</p>
<h2>6 key elements to keep in mind</h2>
<p>To sum up, the key elements for creating a successful awareness program are as follows:</p>
<ol>
<li>Set achievable goals</li>
<li>Define a common thread (a theme, a brand) that will allow users to easily associate your messages with security</li>
<li>Define a short list of messages to be communicated and stick to it</li>
<li>Diversify the media and channels (posters, films, emails, e-learning, games) but always keep at least one event to meet the users</li>
<li>First use the tools already at your disposal (PowerPoint, emails, PowerAutomate) before acquiring new interesting solutions if needed, but not necessarily a priority to get started</li>
<li>Be creative and use humor to get your messages across (however, culture differences may have an impact in case of an international group)</li>
</ol>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/the-creation-of-wavestones-new-internal-awareness-program-2-2/">The creation of Wavestone’s new internal awareness program (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Récit de la création du nouveau programme de sensibilisation interne de Wavestone (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/programme-sensibilisation-interne-wavestone-2-2/</link>
		
		<dc:creator><![CDATA[Timoléon Tilmant]]></dc:creator>
		<pubDate>Fri, 26 Jun 2020 09:00:07 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyberawareness]]></category>
		<category><![CDATA[DSI]]></category>
		<category><![CDATA[sensibilisation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13288</guid>

					<description><![CDATA[<p>Retrouver toute l&#8217;histoire de la création de TRUST dans mon premier article. &#160; Un lancement de campagne c’est bien, mais comment tenir dans la durée ? La création de TRUST n’a pas été une finalité, mais un tremplin pour la...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/programme-sensibilisation-interne-wavestone-2-2/">Récit de la création du nouveau programme de sensibilisation interne de Wavestone (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Retrouver toute l&#8217;histoire de la création de TRUST dans mon <a href="https://www.riskinsight-wavestone.com/en/2020/06/the-creation-of-wavestones-new-internal-awareness-program-1-2/">premier article.</a></p>
<p>&nbsp;</p>
<h2>Un lancement de campagne c’est bien, mais comment tenir dans la durée ?</h2>
<p>La création de TRUST n’a pas été une finalité, mais un tremplin pour la suite.</p>
<p>Au démarrage du projet, nous avions tout de suite imaginé quel serait le rythme annuel de nos 2 plans de sensibilisation.</p>
<p>Nous devions avoir en tête de gérer la sensibilisation de 2 populations distinctes : les nouveaux et les anciens collaborateurs.</p>
<p>Pour les nouveaux, la solution est simple : planifier le lancement de tous les supports TRUST existants sur une année pour espacer les messages.</p>
<p>&nbsp;</p>
<figure id="post-13289 media-13289" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13289 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-3.png" alt="" width="854" height="584" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-3.png 854w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-3-279x191.png 279w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-3-57x39.png 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-3-768x525.png 768w" sizes="auto, (max-width: 854px) 100vw, 854px" /></figure>
<p>&nbsp;</p>
<p>Pour tous les autres collaborateurs, c’est plus complexe. Comment faire à nouveau passer les messages sans donner un sentiment de déjà vu, de lassitude, voire d’overdose ?</p>
<p>Nous avons donc organisé notre plan de sensibilisation avec 3 grandes actions espacées temporellement.</p>
<p>&nbsp;</p>
<h2>Un nouveau rendez-vous mensuel : The Trust minute</h2>
<p>&nbsp;</p>
<figure id="post-13291 media-13291" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13291 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-2.png" alt="" width="800" height="450" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-2.png 800w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-2-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-2-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-2-768x432.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></figure>
<p>&nbsp;</p>
<p>Un film d’une minute diffusé sur tous nos canaux de communications pour présenter 5 messages différents par mois :</p>
<ol>
<li>Un exemple anonymisé d’incident utilisateur ou avec un client</li>
<li>Un Trustee, nos outils de sécurité présentés dans l&#8217;article précédent</li>
<li>Un indicateur de sécurité (ex : le pourcentage de nouveaux ayant réalisé le e-learning, le nombre de démissionnaires détectés à télécharger des documents avant leur départ). Le fait de partager ces indicateurs permet de sensibiliser sur la problématique et de démontrer l’existence des contrôles.</li>
<li>Une astuce du quotidien donnée par notre amie Sofia</li>
<li>Une actualité cyber vulgarisée</li>
</ol>
<p>&nbsp;</p>
<figure id="post-13295 media-13295" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13295 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-1.png" alt="" width="800" height="450" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-1.png 800w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-1-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-1-768x432.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /></figure>
<p>&nbsp;</p>
<h2>Une nouvelle campagne de cybercoffee quizz car le résultat est au rendez-vous.</h2>
<p>Evidemment, il faut se renouveler, changer les questionnaires (mais pas forcément les thèmes), changer le goodie, mais tout cela est facile et demande peu de préparation. Certes, je vous l’avoue, cette période de confinement a légèrement remis en cause notre plan initial. Cependant, cela a été l’occasion d’être imaginatif et de sortir, en partenariat avec mes collègues de la practice Cybersécurité &amp; Digital Trust, la nouvelle série en <a href="https://youtu.be/YneNQ0nts98">vidéo TotalCyberAwakening</a> sur le confinement.</p>
<p>&nbsp;</p>
<h2>Un évènement global annuel en octobre lors du mois de la cybersécurité.</h2>
<p>En 2019, nous avions organisé un jeu concours à l’échelle du cabinet sur le thème de la protection de la vie numérique personnelle.</p>
<p>Chaque semaine, tous les collaborateurs recevaient une question par mail à laquelle ils pouvaient répondre directement via des boutons de choix <em>(envoi d’une approbation à choix multiples via Power Automate)</em>. En fonction de leur réponse, ils recevaient un second email leur annonçant la réponse et différents conseils associés à utiliser à titre personnel.</p>
<p>La participation à une question et une bonne réponse alimentaient une cagnotte en euros. Plus de 2100€ ont ainsi été reversés à l’association ISSA à laquelle Wavestone s’est associée pour promouvoir la cybersécurité auprès des écoles et des enfants.</p>
<p>Ce premier jeu sur base de volontariat nous a permis d’atteindre plus d’un tiers des collaborateurs de Wavestone.</p>
<p>&nbsp;</p>
<figure id="post-13293 media-13293" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13293 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4.png" alt="" width="781" height="1352" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4.png 781w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4-110x191.png 110w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4-23x39.png 23w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4-768x1329.png 768w" sizes="auto, (max-width: 781px) 100vw, 781px" /></figure>
<figure id="post-13289 media-13289" class="align-none"></figure>
<p>&nbsp;</p>
<p>Nous sommes déjà en train de préparer celui d’octobre prochain et cette fois-ci nous irons plus loin, avec des vidéos, des jeux, des rencontres, des quizz sous un thème global inspiré d’une célèbre série TV. Et si cette fois-ci la nouvelle menace de Wavestone était le retour des marcheurs blancs ?</p>
<p>&nbsp;</p>
<h2>6 éléments clés à retenir</h2>
<p>Pour résumer, les éléments clés de succès pour la création d’un programme de sensibilisation réussi sont les suivants :</p>
<ol>
<li>Se fixer des objectifs chiffrables et atteignables</li>
<li>Définir un fil rouge (un thème, une marque) qui va permettre aux utilisateurs d’associer facilement vos messages à la sécurité</li>
<li>Définir une courte liste de messages à faire passer et s’y tenir</li>
<li>Diversifier les supports et les canaux (affiches, films, mails, e-learning, jeux) mais toujours conserver au moins un évènement permettant d’aller à la rencontre des utilisateurs</li>
<li>Utiliser dans un premier temps les outils déjà à votre disposition (PowerPoint, mails, PowerAutomate) avant d’acquérir si besoin de nouvelles solutions intéressantes mais pas forcément prioritaires pour démarrer</li>
<li>Faire preuve de créativité et utiliser l’humour pour faire passer vos messages (attention toutefois à prendre en compte les différences de culture dans le cadre d&#8217;un groupe international)</li>
</ol>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/programme-sensibilisation-interne-wavestone-2-2/">Récit de la création du nouveau programme de sensibilisation interne de Wavestone (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The creation of Wavestone’s new internal awareness program (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/the-creation-of-wavestones-new-internal-awareness-program-1-2/</link>
		
		<dc:creator><![CDATA[Timoléon Tilmant]]></dc:creator>
		<pubDate>Tue, 23 Jun 2020 09:00:43 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[data protection]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13272</guid>

					<description><![CDATA[<p>&#160; A year ago, the idea of TRUST was born, the name of the new awareness program at Wavestone. My team and I spent a year thinking about and developing a whole new strategy to raise awareness among Wavestone employees....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/the-creation-of-wavestones-new-internal-awareness-program-1-2/">The creation of Wavestone’s new internal awareness program (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-13245 media-13245" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13245 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1.jpg" alt="" width="1161" height="452" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1.jpg 1161w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-437x170.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-71x28.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-768x299.jpg 768w" sizes="auto, (max-width: 1161px) 100vw, 1161px" /></figure>
<p>&nbsp;</p>
<p>A year ago, the idea of TRUST was born, the name of the new awareness program at Wavestone. My team and I spent a year thinking about and developing a whole new strategy to raise awareness among Wavestone employees. Wavestone has 3,500 employees in 8 countries, whose main job is consulting (but not only!), rather young (but not only!), who know about IT and cybersecurity (but not only!).</p>
<p>This anniversary was an opportunity to reflect on the results and think about what we are going to do next. In view of the very positive feedback that I have received from our employees, I consider this program to be a success in terms of our objectives and I would therefore like to share it with you to explain how it is possible to build a program and develop materials without necessarily having an enormous budget. In a nutshell, awareness-raising is within the reach of every company, even the smallest.</p>
<p>&nbsp;</p>
<h2>It all starts with a review and objectives</h2>
<p>The assessment at the beginning of 2019 was simple: for several years, I had already developed various awareness-raising tools: a virtual character (Sofia), an e-learning module, phishing campaigns, a very stylish user charter (but I am not fooled by its actual read rate), videos, an Intranet page, awareness-raising emails, security tools available to users&#8230; but then <strong>why did our users always continue to act as if they didn&#8217;t know?</strong></p>
<p>At the same time, within the framework of the <strong>Wavestone 2021 strategic plan</strong> and its aim to position the firm in the top 3 of its category in terms of CSR, we have set ourselves the objective of being a trusted partner with 100% of our employees being aware of data protection issues.</p>
<p><strong>100%!</strong> At the beginning of 2019, I only had a 70% participation rate of employees in e-learning safety.</p>
<p>&nbsp;</p>
<figure id="post-13247 media-13247" class="align-none"></figure>
<figure id="post-13277 media-13277" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13277 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-EN.png" alt="" width="591" height="560" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-EN.png 591w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-EN-202x191.png 202w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-2-EN-41x39.png 41w" sizes="auto, (max-width: 591px) 100vw, 591px" /></figure>
<p>&nbsp;</p>
<h2>But then how? What more could I do?</h2>
<p>After several group sessions and one or two sleepless nights, the ideas were there:</p>
<p>Our various actions were too diverse, <strong>a common thread was missing: a brand!</strong></p>
<p>A digital format is a good thing, but there is no substitute for a verbal discussion (we forget the traditional 2 hour face-to-face mandatory training for all newcomers, which is very time consuming and has a limited impact due to the large number of messages addressed in the 2 hours. I have led so many of them as a consultant).</p>
<p>We always talk about risk and threat, but employees need more practical examples that are well adapted to their company&#8217;s situation. What mistakes can they make on a daily basis and what would be the actual impact for Wavestone?</p>
<p>&#8220;Humor! We need humor!&#8221; Yes, but not always! Humor is a great tool to grab the attention of your target audience, to lure them in, to make them receptive to you&#8230; but what you really need is <strong>pragmatism!</strong></p>
<p>It is difficult for the employee to ultimately know what to do with the many rules given. In the end, a large part of data protection remains the mission of IT management, by implementing protection tools, alerts and controls. For example: <strong>is it up to users to be more vigilant against phishing or malicious emails?</strong> For my part, I think it&#8217;s more up to the company:</p>
<ol>
<li>to implement a better messaging protection solution,</li>
<li>a better EDR that will block the action of the faulty part,</li>
<li>to have solutions to avoid the spread of ransomware or data backups,</li>
<li>to have a multi-factor solution that will greatly reduce the use of stolen logins and passwords via a fake password reset email.</li>
</ol>
<p>It is more important to work on limiting the impact of a malicious email that will always find a willing victim, rather than focusing energy on educating users on this topic.</p>
<p>Based on this observation, what are the messages I wanted to convey? <strong>What is really in the control of the Wavestone employee, and not IT management?</strong></p>
<p>They can be summed up in 5 messages:</p>
<ol>
<li><strong>Transfer documents from your client ONLY WITH authorization:</strong>When you are a consulting firm whose employees spend so much time on your clients&#8217; IS, the primary risk is a lack of awareness and the loss of a client because your employees have taken out sensitive documents to make it easier for them to work on their workstations, or with their project manager who does not have access to the client&#8217;s IS (at least not yet, which can often happen with long processes for providing access to client’s IS). This is not a security risk as such for Wavestone, but rather a risk of a client incident that is dealt with through data protection awareness.</li>
<li><strong>Respect the project confidentiality procedure</strong>: the fundamentals! Comply with the instructions for handling client data. On the other hand, for it to be effective, this procedure must be very simple&#8230; no more than 2 or 3 rules.</li>
<li><strong>Use security tools to protect data</strong>: as long as they are easy to use! We&#8217;ll talk about this later.</li>
<li><strong>Store personal data only if necessary and process only for the intended purpose</strong>: you have to put a little GDPR message in the formula&#8230;</li>
<li><strong>Think twice before opening an attachment, clicking on the web link, and working in transport </strong><strong>and public places</strong>: &#8220;but you just told us it was the role of IT management!&#8221; Yes, sure, you&#8217;re right, but it doesn&#8217;t cost anything to add it at the end. Anyway, we always forget the last piece of advice!</li>
</ol>
<p>5 messages. Perhaps the more visual among you have noticed&#8230; but the first letter of each line combines to form…</p>
<p>&nbsp;</p>
<figure id="post-13249 media-13249" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13249 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3.png" alt="" width="1163" height="565" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3.png 1163w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-393x191.png 393w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-3-768x373.png 768w" sizes="auto, (max-width: 1163px) 100vw, 1163px" /></p>
<figure id="post-13249 media-13249" class="align-none"></figure>
</figure>
<p>&nbsp;</p>
<p>And here&#8217;s the TRUST brand that was born, with its logo, design, style guide and visuals.</p>
<p>&nbsp;</p>
<h2>We have the brand! Like any good marketing product, it must now be broken down into multiple promotional formats.</h2>
<p>Once we had our central theme in terms of messages and visuals, all that remained was to communicate it, but not in a single action, in a series of actions linked to each other to simultaneously increase formats, channels and messages to different categories of users.</p>
<h3>Production of the TRUST video. 5-minute film in 3 parts:</h3>
<ol>
<li>An introduction to set the scene with fictional press or radio articles presenting the consequences for Wavestone of a security incident (loss of clients, loss of turnover, stock market decline, etc.).</li>
<li>5 messages: 5 humorous sketches including a Wavestone employee and a different CISO. What better than CISOs to play their own role? I was lucky that the CISOs of 2 CAC40 companies, a large French public company and a large English bank agreed to play the game in a humorous way. Many thanks again to them! Each consequence of the scene is then explained by the managing director of Wavestone, Mr Patrick HIRIGOYEN. Small video excerpt <a href="https://youtu.be/I3dbj1SHvgw">here</a>.</li>
</ol>
<ol start="3">
<li>Finally, a conclusion with a message from Mr. Pascal IMBERT, Chairman and Chief Executive Officer of Wavestone, as a more serious reminder of the risks involved for the firm and the need for each employee to feel committed and to apply the proposed measures.</li>
</ol>
<p>We received a very good feedback from the employees on this humorous film, which was widely distributed through all the firm&#8217;s communication channels.</p>
<p>The TRUST brand was quickly identifiable. But this film was just for the launch, it needs more!</p>
<h3>Creation of cybercoffee quizzes</h3>
<p>The principle is simple: answer at least 3 security questions and get a free coffee and 1 goodies (a TRUST webcam cover for this year).</p>
<p>An excellent opportunity to meet employees at a time when they are open to discussion: during their coffee break.</p>
<p>For this, you need visuals: kakemonos, polo shirts, screens with the awareness film and 1 coffee machine with free coffee. You can’t miss us!</p>
<p>&nbsp;</p>
<figure id="post-13251 media-13251" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13251 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4.jpg" alt="" width="658" height="878" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4.jpg 658w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4-143x191.jpg 143w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-4-29x39.jpg 29w" sizes="auto, (max-width: 658px) 100vw, 658px" /></figure>
<p>&nbsp;</p>
<p>Every fortnight, my team would go to a different break room in our offices to introduce TRUST, get the staff playing and answer their questions. This initiative was greatly appreciated by the employees. Beyond the lure of winning, they were delighted that we took the time to explain to them individually things they didn&#8217;t know or didn&#8217;t know well and all the simple things that were available to them. <strong>&#8220;It&#8217;s not as complicated as it sounds!”</strong></p>
<p>These quizzes, in the form of presentations at management meetings or team meetings in our various offices, enabled us to meet with more than <strong>1,000</strong> employees in person in 9 months, i.e. around 1/3 of our staff. Although time-consuming, this action remains one of the most impactful in terms of making ourselves known and getting our messages across.</p>
<p><em>Technical tip:</em> it&#8217;s very easy to implement in practice:</p>
<ul>
<li>3-question form, for us, made on Microsoft Forms,</li>
<li>QR code displayed on a kakemono or a poster so that from its phone, the participant can easily access this form (just take out the camera, no application to install)</li>
<li>Finally, a simple workflow (via Power Automate) to save the result in a database and automatically send a summary email to the participant with key messages and links to videos.</li>
</ul>
<p>The score and corrections being displayed directly on the phone after confirmation, the facilitator can directly discuss with the participant to explain their mistakes and offer them their gift.</p>
<h3>What if the security tools were superheroes?</h3>
<p>&#8220;Encrypt your document&#8221;, &#8220;Protect your passwords&#8221;, &#8220;Encrypt your emails&#8221;&#8230; so many instructions given to users who, despite their good intentions, often find themselves saying &#8220;I want to, but how can I do it?”</p>
<p>We had a whole catalog of tools installed on the workstations and were available for employees, which were simply unknown to everyone. So, we had to bring them out of the shadows and into the spotlight to show their existence and their usefulness. That&#8217;s how our League of Trustees was born!</p>
<p>&nbsp;</p>
<figure id="post-13279 media-13279" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13279 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-5-EN.png" alt="" width="1012" height="571" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-5-EN.png 1012w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-5-EN-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-5-EN-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-5-EN-768x433.png 768w" sizes="auto, (max-width: 1012px) 100vw, 1012px" /></figure>
<p>&nbsp;</p>
<p>Each tool has its own superhero whose duty is to show our employees what they are used for and how easy it is to use them in less than 1 minute:</p>
<p>&#8220;I want to send a secure document to my client&#8221;: Encrypt it with 7zip!</p>
<p>&#8220;I want to protect the documents on my USB flash drive&#8221;: Encrypt it with BitlockerToGo, it&#8217;s on your computer!</p>
<p>Posters and short demonstration videos were used to communicate on our different channels and to present them during our Cybercoffee quizzes.</p>
<p>I wouldn&#8217;t say that they are now used every time, but at least they are better known and therefore are used more than they were before.</p>
<p>&nbsp;</p>
<figure id="post-13281 media-13281" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13281 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-6-EN.png" alt="" width="497" height="722" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-6-EN.png 497w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-6-EN-131x191.png 131w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-6-EN-27x39.png 27w" sizes="auto, (max-width: 497px) 100vw, 497px" /></figure>
<p>&nbsp;</p>
<p><em>Technical tip:</em> did you know that you don&#8217;t need professional software and a 5-year degree in audiovisuals to make short animated films?</p>
<p>There are tools such as Powtoon or Vyond that allow you to make awareness videos very easily with a whole series of characters or settings already proposed. In 1 to 2 days you can already make your first one-minute video. Quickly, you will only need half a day of editing. The most complex part is always the script writing, the duration of this step can be very varied depending on the message you want to convey, your context or requirements (it&#8217;s this last point that personally takes me a lot of time!).</p>
<p>For simpler films, including video clips and text, personally, my new video editing tool has become Microsoft PowerPoint! You all already know how to use it to put text, animations and transitions. All you have to do now is use the video insertion, screen recording and video export functions. 3 features that make your life easier because usually you always have to find third party tools to record your screen, cut them and convert videos.</p>
<p>You can even save your films in GIF format to integrate them directly into your awareness emails! No need to redirect your user to a video site!</p>
<p>The ultimate advantage is that you can have your videos edited by other people and modified afterwards by others without training because most of your employees know how to use PowerPoint. Creativity becomes your only limit.</p>
<p>&nbsp;</p>
<h2>3 new materials, that&#8217;s it?</h2>
<p>As soon as our new materials were ready, we took the opportunity to bring our old awareness tools back to TRUST&#8217;s colours:</p>
<p>The e-learning for all new employees has been revamped with TRUST visuals by integrating the videos presented previously and refocusing the questions on our 5 messages. This more entertaining aspect enabled us to achieve our goal of having 100% of our new employees completing this e-learning programme by 2019. It is also thanks to good follow-up efforts and perseverance that this objective has been achieved! It&#8217;s not that easy getting 100%&#8230;</p>
<p>The Intranet page has also undergone a makeover to centralize all these resources and highlight the messages.</p>
<p>The security alerts for employees have also been rebranded under the TRUST brand. It should not be forgotten, but these alerts can be a great tool for raising awareness. Between the automatic email saying &#8220;We saw you, it&#8217;s not right, you&#8217;re going to be punished&#8221; and the prevention email sent by the awareness character explaining the right way to do things, the message gets across differently. And I strongly believe that it is more effective&#8230; the proof is in the observed decrease of these alerts since their implementation.</p>
<p>&nbsp;</p>
<figure id="post-13275 media-13275" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13275 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-7-EN-1.png" alt="" width="1244" height="513" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-7-EN-1.png 1244w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-7-EN-1-437x180.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-7-EN-1-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-7-EN-1-768x317.png 768w" sizes="auto, (max-width: 1244px) 100vw, 1244px" /></figure>
<p>&nbsp;</p>
<p><strong>End of the first article&#8230; how to keep it going and my conclusion soon to be published in part 2.</strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/the-creation-of-wavestones-new-internal-awareness-program-1-2/">The creation of Wavestone’s new internal awareness program (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity will not escape cost reduction</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/cybersecurity-will-not-escape-cost-reduction/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Tue, 09 Jun 2020 12:48:22 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[contracts]]></category>
		<category><![CDATA[cost reduction]]></category>
		<category><![CDATA[offshore]]></category>
		<category><![CDATA[Operating Model]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13175</guid>

					<description><![CDATA[<p>Let&#8217;s not lie to ourselves: it sometimes feels like cybersecurity lives in a bubble. CISOs are fed up with benchmarks (10% of the IT budget, 1 FTE for 400 employees, etc.), leading them to multiply major investment programs, sometimes costing...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/cybersecurity-will-not-escape-cost-reduction/">Cybersecurity will not escape cost reduction</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Let&#8217;s not lie to ourselves: it sometimes feels like cybersecurity lives in a bubble. CISOs are fed up with benchmarks (10% of the IT budget, 1 FTE for 400 employees, etc.), leading them to multiply major investment programs, sometimes costing hundreds of millions of dollars. It is no longer rare today to come across security teams reaching several hundred or even thousands of employees&#8230;</p>
<p style="text-align: justify;">However, for some time now, <strong>some executive committees are no longer as generous</strong> and require more effort from the IT Security sector. It is well known that it is not easy to prove the effectiveness of the means committed, and some CISOs find themselves struggling to even maintain their annual budget. The post-COVID situation may not help, and we can think that <strong>there is no reason why cybersecurity should escape the imperatives of future savings</strong>.</p>
<p style="text-align: justify;">In the field, the following three levers may present opportunities to optimize the costs in the IT Security industry: 1. review of the Operating Model, 2. contracts optimization, 3. automation and offshoring.</p>
<p>&nbsp;</p>
<h2>1/ REVIEW OF THE OPERATING MODEL</h2>
<p style="text-align: justify;">To optimize an IT Security Operating Model, the question of redundancy must be quickly addressed. The observation is often the same from one company to another: the IT Security industry has grown very quickly, and different teams have very similar or even redundant missions. Many service providers can attest to this: it is quite common to be called upon several times for the same study within a Key Account, in several different entities. Even if some companies are considering to deal with this subject by a complete centralization of the security team (some recent examples in the industry), the key is rather to gather at least the cyber expertise in a centralized way and to structure service offers that can be used by all: pentests, SOC, redteam, policy writing, awareness&#8230;</p>
<p style="text-align: justify;">Be careful, this may represent a major change in stance for many CISO teams, which move from a role of prescriber to a role of service provider with all its facets (SLA, quality measurement, and even penalties). However, it is an excellent way to eliminate redundancies, optimize costs and clarify responsibilities in the process.</p>
<p>&nbsp;</p>
<h2>2/ CONTRACTS OPTIMIZATION</h2>
<p style="text-align: justify;">Purchasing contracts often account for more than half of the IT Security industry&#8217;s expenses and can obviously present excellent avenues for optimization. Many companies have multiplied the tactical deployment of security solutions and it is not uncommon to find situations with 4 types of IPS, 3 EDRs and 3 SIEMs&#8230; A simple way to regain control and optimize costs is to return to the use of a catalogue with centrally negotiated prices: maximum 2 products referenced per technology and an obligation for all entities to use the catalogue. The results can be spectacular by playing on volume effects.</p>
<p style="text-align: justify;">Same approach for services: the aim is to avoid scattering contracts and to ensure competition. In the field, there is typically a trend towards contracts optimization that do not require specialized cyber expertise: project management, change management&#8230; From experience, it is quite simple to get 10%-15% off the daily rates, the panel of companies being much larger for this type of task. However, security value must be kept: it is not a question of lowering the guard on expertise or cyber strategy.</p>
<p>&nbsp;</p>
<h2>3/ AUTOMATION AND OFFSHORING</h2>
<p style="text-align: justify;">Automation can also be an optimization avenue to be explored in the medium term. Especially since the movement is already underway: SOAR solutions for incident handling, automatic learning for anomaly detection, deployment of measures in the Cloud&#8230; Many cyber security activities are currently seeking optimization through the automation of repetitive tasks. The results are obviously not immediate, but the current economic climate clearly risks boosting projects of this type.</p>
<p style="text-align: justify;">An offshore strategy, on the other hand, can have much more immediate results, but beware of rushed projects. Offshore security activities are anything but tactical and require a great deal of framing work to understand the specificities of each country, to establish proximity with local management, and above all to integrate offshore seamlessly into the IT Security operating model. Successful offshore operations involve up to 20% of the industry&#8217;s offshore workforce. The key to achieving such volumes is to focus on providing standardized offshore services (operations, vulnerability scans, translation, etc.), and to limit extended teams, which can be attractive on paper but often counter-productive because they are complex to manage.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/cybersecurity-will-not-escape-cost-reduction/">Cybersecurity will not escape cost reduction</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Créer une relation de confiance avec son comité exécutif : première étape, la sensibilisation !</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/creer-une-relation-de-confiance-avec-son-comite-executif-premiere-etape-la-sensibilisation/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Mon, 08 Jun 2020 11:00:06 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[COMEX]]></category>
		<category><![CDATA[How-to]]></category>
		<category><![CDATA[maturité]]></category>
		<category><![CDATA[sensibilisation]]></category>
		<category><![CDATA[stratégie]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13165</guid>

					<description><![CDATA[<p>Le sujet de la cybersécurité requiert une implication à tous les niveaux de l’entreprise, mais aussi et surtout avec le comité exécutif ! Evidemment le management doit montrer l’exemple mais c’est aussi ce comité qui va décider des investissements majeurs...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/creer-une-relation-de-confiance-avec-son-comite-executif-premiere-etape-la-sensibilisation/">Créer une relation de confiance avec son comité exécutif : première étape, la sensibilisation !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Le sujet de la cybersécurité requiert une implication à tous les niveaux de l’entreprise, mais aussi et surtout avec le comité exécutif ! Evidemment le management doit montrer l’exemple mais c’est aussi ce comité qui va décider des investissements majeurs et qui saura déverrouiller les situations les plus complexes dans l’entreprise. C’est donc un enjeu clé pour tous les responsables cybersécurité que de créer une relation de confiance pérenne avec son COMEX ! Mais c’est aussi un exercice à haut risque, qui nécessite une approche graduée et de la constance dans les engagements.</p>
<p style="text-align: justify;">Après avoir réalisé plusieurs dizaines d’interventions auprès de comité exécutif, de comités d’audit ou de conseil d’administration, je souhaitais partager avec vous les étapes essentielles pour faire progresser la relation dans la durée. La première phase de ce voyage devra permettre de créer un premier contact et à sensibiliser le comité exécutif aux enjeux de cybersécurité. Première étape, la sensibilisation ! L’objectif pour ces séances est souvent d’arriver à attirer l’attention pour pouvoir déclencher une réflexion plus approfondie dans l’organisation. Nous verrons plus tard les étapes suivantes : présenter un bilan, obtenir un budget, suivre la progression du niveau de sécurité…</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Un pré-requis essentiel, savoir d’où l’on part et avec qui l&#8217;on va échanger !</h2>
<p style="text-align: justify;">Cela peut apparaitre comme un poncif, mais cet élément est certainement le plus important avant d’aller rencontrer un comité exécutif ou un conseil d’administration. Grâce à sa large couverture médiatique, le sujet de la cybersécurité est souvent déjà présent dans l’esprit des exécutifs. Mais leur degré de connaissance du numérique et leur niveau d’appétence pour le sujet peuvent changer complètement la manière d’aborder le sujet. Faudra-t-il être très didactique (en allant jusqu’à réexpliquer le principe de données, d’applications, si si) ou alors faudra-t-il tout de suite aborder des points complexes comme les dernières attaques observées et leurs méthodologies ? Vous seriez surpris de voir la diversité des niveaux entre les entreprises, mais aussi au sein d’un même COMEX. Et il est nécessaire d’intéresser chacun des acteurs, au prix d’avoir des commentaires peu amènes pendant l’intervention.</p>
<p style="text-align: justify;">Il s’agit donc de bien préparer cette première réunion en échangeant avec d’autres membres du COMEX, leurs adjoints ou avec des personnes familières de cette enceinte pour déterminer le ton à adopter et le niveau du discours à tenir. Evidemment, les règles de fonctionnement devront aussi être connues : est-il courant que les questions soient posées au fil de l’eau ? Peut-on interpeller un membre ? Doit-on évoquer dès le début les sujets relatifs à l’entreprise ? Prévoyez de déminer le terrain en amont ! Et même s’il n’y a pas de recette parfaite, je vous livre ci-dessous les éléments que j’utilise le plus souvent pour faire de ces rencontres des moments utiles et efficaces.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Pour commencer, attirer l’attention en dévoilant les coulisses d’une attaque</h2>
<p style="text-align: justify;">Les sujets s’enchaînent rapidement durant les COMEX, les directeurs réfléchissent très très vite, il faut donc très rapidement être dans le concret et donner de la matière à réflexion, du vécu. L’élément que je trouve le plus efficace consiste à présenter une attaque récente, parue dans la presse ou ayant touché le secteur, et en décrypter les enjeux et les coulisses : quelle temporalité ? quelle motivation pour les attaquants ? quelles faiblesses dans l’entreprise ? quelle réaction en interne ? publique ? avec les autorités ? Cela aura pour effet de projeter mentalement les directeurs concernés dans leur rôle s’ils vivaient la même chose. Nous avons la chance <a href="https://www.wavestone.com/app/uploads/2019/10/2019-Security-incident-response-benchmark-Wavestone.pdf" target="_blank" rel="nofollow noopener noreferrer">chez Wavestone de gérer fréquemment des grandes crises cyber et nous utilisons ces éléments</a>, à la fois sous forme de benchmark mais aussi en les anonymisant ou en accord avec les victimes, pour donner un sens très concret à nos retours d’expérience.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Enchaîner avec une généralisation sur la cybercriminalité</h2>
<p style="text-align: justify;">Une attaque, c’est bien mais ça n’explique pas tout ! Il s’agit après avoir zoomé sur un cas de le généraliser en expliquant quels sont les ressorts du fonctionnement de la cybercriminalité. Nous analysons alors les motivations des groupes criminels, leurs organisations, mais aussi et peut être surtout comment ils gagent de l’argent !</p>
<div class="slate-resizable-image-embed slate-image-embed__resize-left" style="text-align: justify;">
<figure id="post-14710 media-14710" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14710 alignleft" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-3-327x191.jpg" alt="" width="327" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-3-327x191.jpg 327w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-3-67x39.jpg 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-3-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-3.jpg 390w" sizes="auto, (max-width: 327px) 100vw, 327px" /></figure>
</div>
<div></div>
<div style="text-align: justify;">Pour un COMEX savoir que c’est une attaque DDoS ou un ransomware qui a fait des dégâts n’a que peu d’intérêt, il faut surtout leur montrer que les activités cybercriminelles sont rentables, voire très rentables. Nous avons calculé le ROI de plusieurs types d’attaques et je peux vous dire que quand vous expliquez une attaque à 600% de rentabilité comme un ransomware, les yeux des directeurs sont grands ouverts. Nous mettons alors en lumière très concrètement pourquoi leur structure pourrait être attaquée et surtout quelle quantité d’argent gagnerait les criminels. Cela met souvent un terme à la question « mais pourquoi serions-nous visés par une attaque ? Nous ne sommes pas connus/nous sommes petits/nous ne faisons rien de stratégique…».</div>
<div></div>
<div style="text-align: justify;">
<h2>Expliquer concrètement où en est l’entreprise</h2>
<p>C’est le bon moment pour présenter la posture IT de l’entreprise et son organisation actuelle en terme de sécurité. Il s’agit alors de la présenter simplement, avec des images claires et parlantes : <a href="https://www.riskinsight-wavestone.com/en/2016/05/levolution-modele-de-securite-chateau-fort-a-laeroport/" target="_blank" rel="nofollow noopener noreferrer">êtes-vous plutôt dans un modèle « château fort » à l’ancienne</a> ? Ou avez-vous déjà ouvert vos portes suite à la transformation numérique et avez-vous adopter un modèle porche de l’aéroport ou la sécurité est renforcée plus on va vers des systèmes critiques ? Cela permettra de concrétiser la situation.</p>
<p>Après cette phase de mobilisation et d’explication, vient naturellement la phase d’interrogation par les membres du comité exécutif. « Mais alors nous, nous en sommes ou face à ce risque de cyberattaque ? ». Face à cette question, soit vous avez la chance d’avoir <a href="https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/" target="_blank" rel="nofollow noopener noreferrer">un bilan de maturité fin et vous pouvez tout de suite le présenter</a>, soit vous pouvez amener des premiers éléments qualitatifs voire quantitatifs partiels et expliquer qu’aujourd’hui vous avez besoin d’avoir plus de visibilité. Les éléments qui parlent sont les derniers rapports d’audits, les derniers incidents, des éléments budgétaires.</p>
<p>&nbsp;</p>
<figure id="post-14712 media-14712" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14712 alignright" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-4-248x191.jpg" alt="" width="248" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-4-248x191.jpg 248w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-4-51x39.jpg 51w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-4-156x121.jpg 156w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-4-155x120.jpg 155w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/0-4.jpg 598w" sizes="auto, (max-width: 248px) 100vw, 248px" /></figure>
</div>
<p style="text-align: justify;">S’il est difficile au début de la démarche de parler budget et de se comparer car les données manquent, il est possible d’utiliser un indicateur simple et efficace, celui de vos effectifs dédiés à la cybersécurité. Nous disposons d’une base de données sur ce point et nous pouvons rapidement montrer à un COMEX où il en est rien que par sa mobilisation sur le plan RH. C’est simple et efficace pour les convaincre !</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Ne pas repartir bredouille</h2>
<p style="text-align: justify;">Le risque majeur de cette sensibilisation, c’est que tout se passe bien mais que rien ne bouge ! En effet, vous pouvez avoir un message positif, « merci et rendez-vous dans un an pour une mise à jour », vous serez content mais vous n’aurez pas débloqué pour autant la situation. Il faut alors bien préparer l’étape d’après en indiquant dès cette présentation les principaux points de faiblesses ou de force ressenti et de quelle manière vous souhaiteriez les évaluer de manière plus précise.</p>
<p style="text-align: justify;">En effet la deuxième étape est souvent la réalisation d’un bilan de maturité dédié pour bien savoir comment se positionner ! Si à ce moment, la réunion s’est déroulé, le COMEX intrigué et intéressé par le sujet voudra en savoir plus et donnera un accord de principe. Attention cela ne sera peut-être pas directement un budget, il vous renverra certainement vers le DSI ou le directeur des risques pour l’obtenir, mais vous aurez avec leur accord un levier formidable pour passer à l’étape d’après ! Rendez-vous au prochain épisode.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/creer-une-relation-de-confiance-avec-son-comite-executif-premiere-etape-la-sensibilisation/">Créer une relation de confiance avec son comité exécutif : première étape, la sensibilisation !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>La quantification du risque cybersécurité</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/la-quantification-du-risque-cybersecurite/</link>
		
		<dc:creator><![CDATA[Fr@Nc0isLuqu3t]]></dc:creator>
		<pubDate>Wed, 03 Jun 2020 12:49:19 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Board]]></category>
		<category><![CDATA[c-level]]></category>
		<category><![CDATA[FAIR]]></category>
		<category><![CDATA[quantification]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13146</guid>

					<description><![CDATA[<p>A date, il est intéressant de noter que ce sont les attaques réelles elles-mêmes qui nous permettent le plus aisément de quantifier les risques cyber, et ce par l’estimation des coûts engendrés. On estime ainsi que NotPetya, le fameux malware...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/la-quantification-du-risque-cybersecurite/">La quantification du risque cybersécurité</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A date, il est intéressant de noter que ce sont les attaques réelles elles-mêmes qui nous permettent le plus aisément de quantifier les risques cyber, et ce par l’estimation des coûts engendrés. On estime ainsi que NotPetya, le fameux malware à 1 milliard, aurait couté plus de 300 millions à des grandes entreprises, de type Fedex, Saint Gobain, et bien d’autres… Ces estimations restent cependant très approximatives et ne sont généralement faisables que plusieurs mois après une attaque. Dès lors, comment anticiper les risques liés aux attaques cyber ? Comment quantifier ce risque avec plus ou moins de fiabilité ?</p>
<p>Aujourd’hui, une attention forte est portée à la quantification du risque, et à juste titre. Il reste pour autant un sujet très complexe. Deux raisons évidentes à cela : nous manquons cruellement d’informations et de retours d’expérience précis sur le sujet ; mais aussi parce que les attaques cyber engendrent de nombreux impacts intangibles (réputation, désorganisation interne, préjudice stratégique, arrêt des opérations) ; ou à couts indirects (chute des ventes, pénalités contractuelles, baisse de valorisation de l’entreprise sur les marchés, etc.).</p>
<p>Nous distinguons aujourd’hui des pistes prometteuses pour quantifier le risque, et des premières solutions permettant d’automatiser cette quantification.</p>
<h2>Pourquoi chercher à quantifier le risque cybersécurité ?</h2>
<p>Que ce soit pour échanger avec les directions générales, les métiers, voire même les assureurs, il y a un véritable besoin de parvenir à évaluer les risques cyber de la manière la plus objective possible. L’enjeu est double : gagner en pertinence et en légitimité. L’une des pistes possibles est donc de traiter le risque cyber sous le prisme financier, comme tous les autres risques de l’entreprise pour les rendre significatifs pour les décideurs.</p>
<h4>Convaincre et démontrer l’efficacité des investissements auprès des comités exécutifs</h4>
<p>L’un des véritables enjeux de la quantification des risques cyber réside dans la construction d’une relation de confiance avec les comités exécutifs sur le long-terme. Dans un premier temps, adopter un discours clair<strong> pour les convaincre</strong> et <strong>décrocher des investissements nécessaires au lancement de programmes de sécurité structurants</strong>. Pour ensuite<strong> démontrer l’efficacité des investissements menés </strong>et ainsi pérenniser la relation avec les comités exécutifs dans le temps : démontrer la réduction des risques de manière chiffrée et l’évolution du risque sur plusieurs années. Cela est clé, notamment <strong>à la suite de la crise COVID</strong> va déboucher sur une réduction et une optimisation des budgets cybersécurité au sein des entreprises. Il sera donc primordial de quantifier le risque cyber pour un contrôle plus fort sur le ROI des investissements cybersécurité.</p>
<h4>Sensibiliser et ainsi embarquer les métiers dans la démarche de cybersécurité</h4>
<p>La démarche de sécurisation du système d’information d’une entreprise ne peut se faire sans l’instauration du Security by Design, et en ce sens, ne peut se faire sans embarquer les métiers. <strong>Parler le même langage est donc nécessaire.</strong></p>
<h4>Adapter les plans d’assurance sécurité (PAS) pour ne pas être pris au piège</h4>
<p>Enfin, afin de ne pas se retrouver au pied du mur en cas d’attaque, il est primordial pour les entreprises d’anticiper les potentiels coûts d’une attaque afin <strong>d’adapter les provisions et les assurances. Cette quantification leur permet de réaliser cela. </strong></p>
<h2>Quelles sont les principales difficultés à date ?</h2>
<h4>Des impacts qui restent pour la plupart intangibles, ou indirects</h4>
<p>Compte tenu de leur <strong>nature intangible</strong>, il parait de prime abord complexe d’évaluer objectivement certains impacts d’attaques cyber. C’est par exemple le cas de l’impact sur l’image de marque, sur la réputation d’une entreprise ou encore le préjudice stratégique, la désorganisation interne. D’autres risques sont bel et bien tangibles mais <strong>indirects,</strong> ce qui complexifie encore la tâche des entreprises souhaitant quantifier leurs risques, c’est par exemple le cas de la perte de parts de marchés, de la baisse de valorisation de l’entreprise sur les marchés, etc</p>
<h4>Une difficulté à estimer avec certitude le degré d’exposition d’une entreprise au risque cyber</h4>
<p>Il n’existe pas de formule universelle pour calculer l’impact d’une attaque sur une entreprise. Cela dépend de nombreux paramètres : taille de l’entreprise, niveau de complexité et d’ouverture du système d’information, maturité cyber, etc. Le niveau d’exposition d’une entreprise dépend essentiellement de son niveau de maturité cyber sécurité. Il existe des référentiels tels que NIST, ISO, CIS, etc. pour estimer le niveau de maturité en cybersécurité, mais encore peu d’entreprises parviennent à les mettre en œuvre ou à les utiliser pleinement.</p>
<h4>Un cruel manque d’informations sur les attaques les plus récentes et leur coût</h4>
<p>Les entreprises souhaitant quantifier leurs risques cyber sont confrontées à une absence de base de données statistiques sur le coût des cyber-attaques. Bien sûr, la plupart des entreprises communiquent peu, voire pas à ce sujet, probablement pour ne pas effrayer leurs clients et leurs partenaires. Et pourtant, la collaboration serait clé face à des attaquants toujours plus astucieux : tant pour augmenter leur cyber-résilience que pour faciliter la quantification du risque. Par exemple, les entreprises Altran et Norsk Hydro ont été touchées par des ransomwares similaires en provenance du même groupe d’attaquants !</p>
<h2>Quelques premières pistes pour quantifier le risque cybersécurité</h2>
<p>Christine Lagarde, présidente du FMI, s’est d’ores et déjà emparée du sujet et a publié un billet et une méthodologie de quantification des risques s’appliquant au secteur bancaire, utilisée au sein du FMI. Alors comment étendre la quantification aux autres secteurs ?</p>
<h3>Les prérequis à une quantification des risques optimale</h3>
<p>La méthodologie FAIR est l’une des plus répandues pour quantifier les risques. Une quantification des risques efficace induit :</p>
<ul>
<li><strong>Une bonne connaissance de ses risques les plus critiques.</strong> En effet, vu la complexité de FAIR, il ne vaut mieux pas s’éparpiller et se concentrer sur les scénarios de risque les plus importants. Encore faut-il les connaître ! Un travail de cartographie des risques est à prévoir dans lequel la mobilisation des métiers sera nécessaire ;</li>
<li><strong>Une bonne compréhension des mesures de sécurité existantes</strong> pour estimer sa capacité à résister à des attaques et les impacts résiduels ;</li>
<li><strong>Une première ébauche d’un référentiel des coûts types</strong> (honoraires d’avocats, de cabinet de communication, etc.), que sera complété dans le temps, ce qui nécessite une expertise métier pour identifier et estimer les coûts.</li>
</ul>
<p>Aussi, l’estimation du coût des risques, du fait de sa nature transverse appelle à la collaboration de nombreux acteurs de l’entreprise (RH, juridique, etc.), ce qui peut être complexe à mettre en place.</p>
<h3>La méthodologie FAIR, une approche qui vient préciser certaines phases de l’analyse et du traitement des risques</h3>
<p><strong>Introduction à la méthodologie FAIR (Factor Analysis of Information Risk)</strong></p>
<p>En 2001, Jack Jones était le RSSI de Nationwide Insurance. Il était lui-même confronté aux interrogations persistantes de sa direction générale lui demandant des données chiffrées sur les risques auxquels était exposée l’entreprise. Face à l’insatisfaction causée par le flou de ses réponses, Jack Jones a mis en place une méthodologie pour estimer, de manière chiffrée, les risques pesant sur son entreprise, c’est la méthodologie FAIR.</p>
<p><strong>Concrètement, comment celle-ci se différencie d’une méthodologie d’analyse des risques, tel que EBIOS ?</strong></p>
<p>La méthodologie FAIR ne vient en aucun cas remplacer l’analyse de risque : FAIR est une méthodologie permettant d’évaluer les impacts et les probabilités d’un risque de manière plus fiable. Les impacts sont toujours traduits en pertes financières afin de rendre tangible l’évaluation réalisée. Les compléments apportés sont illustrés par le schéma ci-dessous.</p>
<figure id="post-13153 media-13153" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-13153" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-1.png" alt="" width="1346" height="519" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-1.png 1346w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-1-437x169.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-1-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Image-1-1-768x296.png 768w" sizes="auto, (max-width: 1346px) 100vw, 1346px" /></figure>
<p style="text-align: center;"><strong><em>Schéma 1 :</em></strong><em> FAIR, une approche qui précise certaines phases de l’analyse et du traitement des risques</em></p>
<p>Habituellement, l’évaluation du risque cyber se traduit par plusieurs types d’impact (impact d’image, financier, opérationnel, juridique, etc). La particularité de la méthodologie FAIR est de transposer chaque impact à un coût financier (coûts direct, indirects, tangibles et intangibles). Par exemple, si un scénario de risque présente un impact sur l’image de l’entreprise, FAIR traduit ce risque sous forme de risque financier en évaluant le coût de l’agence de communication que l’on mobilisera afin de redresser l’image de l’entreprise notamment. Si le directeur général d’une entreprise est mobilisé dans le cadre d’une gestion de crise, alors il faudra estimer le temps passé à gérer cette crise et monétiser celui-ci.</p>
<p><strong> </strong><strong>Comment appliquer la méthodologie FAIR ?</strong></p>
<p>Un risque quantifié en euro est le facteur de la fréquence d’attaque réussie (loss event frequency) et le coût de l’attaque réussie (loss magnitude). Le schéma ci-dessus présente la démarche utilisée par la méthodologie FAIR afin d’estimer ces deux caractéristiques.</p>
<p>&nbsp;</p>
<figure id="post-13155 media-13155" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-13155" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/image-2-1.png" alt="" width="1629" height="821" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/image-2-1.png 1629w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/image-2-1-379x191.png 379w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/image-2-1-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/image-2-1-768x387.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/image-2-1-1536x774.png 1536w" sizes="auto, (max-width: 1629px) 100vw, 1629px" /></figure>
<p style="text-align: center;"><strong><em>Schéma 2 :</em></strong><em> les critères pris en compte par la méthodologie FAIR pour estimer les risques (traduction non disponible à date)</em></p>
<ul>
<li><strong>Calcul de la <em>« Loss Event Frequency</em></strong><strong><em> »</em></strong></li>
</ul>
<p>Le <em>« contact frequency »</em> représente la fréquence à laquelle la menace <em>(« threat agent »)</em> entre en contact avec le bien à protéger. Par exemple, il peut s’agir de la fréquence à laquelle a lieu une catastrophe naturelle à endroit donné.</p>
<p>La <em>« probability of action »</em> est la probabilité que la menace agisse de manière malveillante sur le système une fois le contact effectué. Celui-ci ne s’applique que lorsque le threat agent est un être vivant (ne s’applique pas dans le cas d’une tornade par exemple). Cela se déduit du gain, de l’effort et du coût de l’attaque et des risques.</p>
<p>De ces deux paramètres en découle la <strong><em>« threat event frequency ».</em></strong></p>
<p>La <em>« threat capability »</em> consiste à estimer les capacités du threat agent tant en matière de compétences (expérience et savoir) qu’en matière de ressources (temps et matériel).</p>
<p>La <em>« resistance strength »</em> est la capacité de resistance de l’entreprise face à ce scénario d’attaque. la resistance threat se calcule à partir du niveau de maturité cyber de l’entité par exemple avec une analyse d’écart à NIST.</p>
<p>De ces deux paramètres en découle la<strong> <em>« vulnerability »,</em></strong> puis la <strong><em>« loss event frequency ».</em></strong></p>
<ul>
<li><strong>Calcul de la <em>« Loss Magnitude »</em></strong></li>
</ul>
<p>Les <em>« primary loss »</em> constituent le coût des pertes directes. Cela comprend notamment : l’interruption des opérations, les salaires versés aux employés alors que les opérations sont interrompues, le coût de la mobilisation de prestataires pour pallier l’attaque (restaurer les systèmes, mener les investigations), etc.</p>
<p>Les <em>« secondary loss »</em> constituent les pertes indirectes, provenant des réactions d’autres personnes impactées, et sont plus difficiles à estimer. Par exemple, les <em>« secondary loss »</em> peuvent couvrir la perte de part de marché engendrée par la dégradation de l’image de l’entreprise, les coûts de notification d’une attaque via une agence de communication, le paiement d’une amende auprès d’un régulateur ou encore des honoraires d’avocat pour se défendre en justice, etc. Celle-ci se calcule en multipliant la <em>« secondary loss event frequency »</em> et la <em>« secondary loss magnitude »</em> pour chacun des coûts indirects.</p>
<p><strong>Une solution qui accompagne les entreprises dans la mise en application de cette méthodologie</strong></p>
<p>Au-delà de la description théorique de la méthodologie, des solutions se développent pour permettre aux entreprises d’appliquer la méthodologie de manière concrète. C’est le cas de la start-up Citalid qui, par exemple, propose une plateforme de quantification des risques cyber en s’appuyant sur la méthodologie FAIR. Celle-ci permet au RSSI d’affiner et de rendre cohérente la quantification des risques grâce à de la threat intelligence (pour le suivi des attaquants dans le temps). Pour utiliser la solution, l’entreprise doit renseigner des éléments relatifs à son contexte et, pour chacun des scénarios de risque à quantifier, compléter un questionnaire NIST (50 questions pour le plus basique ou 250 pour un niveau de granularité plus fin) et le reste est calculé automatiquement.</p>
<h3>Quelles sont les avantages et les limites de la méthodologie FAIR ?</h3>
<p>La méthodologie FAIR apporte principalement les éléments suivants :</p>
<ul>
<li>Elle permet à l’entreprise <strong>d’identifier et d’évaluer plus précisément les risques les plus importants. </strong>Pour chacun des scénarios de risque choisis, la méthodologie permet une estimation des pertes financières moyennes et maximales et une fréquence estimée. Par exemple : « la probabilité de perdre 150 millions d’euros en raison de la propagation d’un ransomware destructif de type NotPetya exploitant une faille 0-day Windows est de 20% ».</li>
<li>Elle permet<strong> l</strong><strong>’estimation des coûts-avantages du plan d’actions de réduction des risques.</strong> En jouant avec la <em>« resistence strength »,</em> il est possible d’estimer le retour sur investissement (ROI) des mesures de sécurité à mettre en place.</li>
<li>Elle transpose tous les risques cyber en un risque financier ce qui permet une <strong>meilleure compréhension du risque par les dirigeants de l’entreprise.</strong></li>
</ul>
<p>Cependant, l’application de FAIR n’est pas sans contraintes car elle demande des ressources parfois importantes (tant en nombre de jours hommes que de connaissance du contexte de l’entreprise). La quantification du risque ne couvre par ailleurs qu’un périmètre restreint (1 scénario de risque). Aussi,<strong> la quantification du risque avec la méthodologie FAIR nécessite d’être affinée avec des abaques types de coûts associés à un impact cyber. </strong>Cela peut par exemple se faire en capitalisant sur les analyses post-mortem d’un crise cyber qui permettent souvent de donner une illustration réelle des impacts financiers.</p>
<p>Ainsi, la méthodologie FAIR est une piste prometteuse mais qu’il faudra se l’approprier dans le but d’en tirer des bénéfices concrets.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/la-quantification-du-risque-cybersecurite/">La quantification du risque cybersécurité</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Defining a cybersecurity strategy in a large company</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/05/defining-a-cybersecurity-strategy-in-a-large-company/</link>
		
		<dc:creator><![CDATA[Matthieu Garin]]></dc:creator>
		<pubDate>Wed, 27 May 2020 15:04:39 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15492</guid>

					<description><![CDATA[<p>The name might have changed but the goal remains the same: designing a cyber master plan has evolved considerably in the last 15 years. Large companies no longer have questions about the Framework and NIST has established itself as the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/defining-a-cybersecurity-strategy-in-a-large-company/">Defining a cybersecurity strategy in a large company</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The name might have changed but the goal remains the same: designing a cyber master plan has evolved considerably in the last 15 years. Large companies no longer have questions about the Framework and NIST has established itself as the market leader. One should take advantage of this &#8220;moment&#8221; to create aspiration, enthusiasm, real team spirit in the sector.</p>
<h1>Defining a cybersecurity strategy in a large company</h1>
<p><strong>T</strong><strong>he </strong>name is not always the same: master plan, security model, action plan, roadmap but the basic idea is always to set a set of projects that will allow to converge towards a 3-4 year security target, shared and understandable by the top management. 15 years of master plans means 15 years of introductions based on accelerating the threat, tightening regulations, accompanying transformations; the reasons for establishing a cyber strategy are still globally the same. <strong>The method for designing a cyber master plan has evolved considerably.</strong></p>
<h2>10-15 years ago, life was simple.</h2>
<p><img decoding="async" class="aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/1589783496376-340x191.jpg" /></p>
<p>A master plan could be constructed in a few interviews with the ISSR and his team, &#8220;according to experts&#8221;. To provide a logic, <strong>consultants would base themselves on a pictorial model such as a fortified castle or an airport, </strong>which served as a pretext for setting up the fundamentals and explaining the choices. The attacks still seemed remote, the cyber was less dispersed than today and all the master plans were more or less the same. With a little hindsight, these cyber strategies above all had a great real <strong>role in raising awareness / training top management, </strong>who were gradually involved in the choices and discussions.</p>
<p><strong>In 2021, the context has changed a lot. It is </strong>no longer enough to say &#8220;expert opinion&#8221;: some major accounts are now investing hundreds of millions of euros a year in cybersecurity, and <strong>executive committees are demanding more evidence of the effectiveness of the strategy deployed. </strong>All the more so since the &#8220;fundamentals&#8221; (patching, bastion, etc.) are now supplemented by an arsenal of measures, each more specific than the last, which raise questions about the relevance of a single strategy for a large company. It is clear, for example, that between a retail bank focused on the leakage of customer data and an investment bank fearing unavailability of certain trading channels, the priorities are different. The current crisis is certainly likely to reinforce this trend: <strong>strategies must now be much more finely tuned to the business lines.</strong></p>
<h2>A pragmatic and agile strategy, aligned with business priorities</h2>
<p>The first months of work are always devoted to the method that will bring rigour and credibility with management and regulators. Very concretely, it is a question of defining the company&#8217;s Cyber Framework and a method enabling each entity to define its Target Profile (target to be reached on the Framework). D<strong>ifferentiated strategy for each entity.</strong></p>
<p><img decoding="async" class="aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-5-340x191.jpg" /></p>
<p>Large companies no longer have questions about the Framework and <strong>NIST has established itself as the market leader. The </strong>5 functions (identify, protect, detect&#8230;) speak volumes to management and above all its popularity favours the Benchmark. The frameworks chosen do not matter anymore, as long as they are based on a market reference. It should be noted that most companies do not hesitate to specify controls to make them more pragmatic: EDR, SOAR, AD security, anti-fraud; the Framework simply acts as a library of potential controls on which the company will base its strategy.</p>
<p>In large companies, <strong>the Group often imposes a first level of security for all, corresponding to the pursuit of fundamentals</strong>: SOC, bastion, patching, etc. Most systemic attacks still exploit these weaknesses, and the risk of inter-entity propagation must be managed in a cross-functional manner. This common target is quite similar from one company to another and is generally established on the basis of benchmarks provided by the consulting market. More challenging, <strong>each entity is then led to define its own target, </strong>according to its own stakes. Beware, the mapping and weighting mechanism between the Framework controls and the risk mapping can be complex. <strong>The key is often to get out of the cyber sector and work jointly with the Risk Department.</strong></p>
<h2>The must-haves of the moment: AD and IAM security</h2>
<p><img decoding="async" class="aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/0-6-368x191.jpg" /></p>
<p>The figures resulting from the cyber strategies of major French companies are important: <strong>10-20M of investment on average per year in the industrial sector, and up to 100-150M per year for Financial Services. </strong>Each strategy is different but recent feedback shows that budgets are fairly evenly balanced between 4 types of projects:</p>
<ol>
<li><strong>Security foundations </strong>(patching, awareness, director security, etc.)</li>
<li><strong>Protection of sensitive environments </strong>(LPM, AD security, data protection, etc.)</li>
<li><strong>Zero-trust convergence </strong>(inventories, IAM, risk-based authentication, compliance, etc.)</li>
<li><strong>Cyber-resilience </strong>(detection, crisis management, reconstruction, business continuity, etc.).</li>
</ol>
<p>A few years ago, the NCS and the LPM were definitely emerging as the top priority topics. Today, they are very much in competition with Active Directory security and AMI.</p>
<p>Cyber strategy is an essential tool for setting the course, federating actions, and involving management. However, e<strong>stablishing a multi-year master plan is a great opportunity to get teams on board around a common goal. </strong>Some security departments have grown from a few dozen people to several hundred or even thousands in the space of a few years, and many employees are currently looking for a meaning in their role. One should take advantage of this &#8220;moment&#8221; that is the creation of the strategy to <strong>create aspiration, enthusiasm, real team spirit in the sector. It</strong> is the ideal moment to multiply the work groups, involve as many employees as possible, adopt a transparent approach, have the top management challenge the teams; in short, <strong>turn this strategy construction into a sector event. </strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/defining-a-cybersecurity-strategy-in-a-large-company/">Defining a cybersecurity strategy in a large company</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Deep dive into deepfake &#8211; How to face increasingly believable fake news? (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-2-2/</link>
		
		<dc:creator><![CDATA[Carole Meyziat]]></dc:creator>
		<pubDate>Mon, 18 May 2020 08:25:27 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[media]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13034</guid>

					<description><![CDATA[<p>We have seen in the first part of the article the risks that represent the deepfakes for the businesses. In this part, we are going to focus on the strategies available to pre-empt deepfakes and the concrete actions to implement...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-2-2/">Deep dive into deepfake &#8211; How to face increasingly believable fake news? (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">We have seen in the first part of the article the risks that represent the deepfakes for the businesses. In this part, we are going to focus on the strategies available to pre-empt deepfakes and the concrete actions to implement as of now to reduce their risks.</p>
<p>&nbsp;</p>
<h2>DIFFERENT STRATEGIES TO safeguard AGAINST DEEPFAKES</h2>
<p style="text-align: justify;">Concurrently with the legal framework, public and private organisations get organised to put forward solutions allowing to detect and prevent the malicious spread of deepfakes. We can distinguish <strong>four strategies to safeguard against deepfakes.</strong></p>
<p>&nbsp;</p>
<h3>1/ Detecting the imperfections</h3>
<p style="text-align: justify;">Detecting the deepfakes by their imperfections is one of the main existing methods. Some irregularities remain in the generated contents, such as the lack of blinks and of synchronisation between the lips and the voice, distortions of the face and accessories (arms of the glasses), or the inaccuracy of the context (weather, location).</p>
<p style="text-align: justify;"><strong>The deepfakes are however built to learn from their mistakes </strong>and generate a content that is increasingly alike the original, making the imperfections less perceptible. The tools using this deepfake detection strategy can be effective but require a constant improvement to <strong>detect ever more subtle anomalies</strong>.</p>
<p style="text-align: justify;">We can cite in this category Assembler, a tool intended for journalists developed by Jigsaw (branch of Alphabet, parent company of Google). It enables to verify the authenticity of contents through their analysis via five detectors, amongst which the detection of anomalies of patterns and colours, of copied and pasted areas, and of known characteristics of deepfakes algorithms.</p>
<p>&nbsp;</p>
<h3>2/ Screening and comparative analysis</h3>
<p style="text-align: justify;">Comparing the contents with a <strong>database of authentic content</strong> or by <strong>looking for similar content</strong> on search engines to see whether they have been manipulated (for instance, by finding the same video with a different face) is another strategy allowing to pre-empt deepfakes.</p>
<p style="text-align: justify;">In 2020, the AI Foundation should make available a plugin, Reality Defender, to integrate to web browsers and over time to social networks. It will allow the detection of manipulations of contents, targeting first the politicians. Users will be led to adjust the sensitivity of this tool, according to the manipulations they will want to detect or not, not to be notified for every manipulation of content, notably for the most ordinary manipulations (photo retouch on a web page done on Photoshop for example).</p>
<p>&nbsp;</p>
<h3>3/ Watermarking</h3>
<p style="text-align: justify;">A third method consists in marking the contents with a watermark, or digital tattoo, to <strong>facilitate the authentication process</strong> by filling in their source and following the manipulations undertaken on these contents.</p>
<p style="text-align: justify;">A team from the New York University works on a research project to create a camera embedding a watermarking technology meant to mark the photographed contents, in order not only to authenticate the original photography, but also to mark and follow all the manipulations carried out on it throughout its lifecycle.</p>
<p>&nbsp;</p>
<h3>4/ Involving the human factor</h3>
<p style="text-align: justify;">Involving the users in the detection process allows <strong>both mitigating deepfakes’ impacts</strong> by making them realise that the alteration of the acceded contents is possible, and to <strong>reduce deepfakes’ occurrence</strong> by allowing them to report the ones they suspect.</p>
<p style="text-align: justify;">The plugin Reality Defender already mentioned will give users the possibility to report the contents they judge as fake so as to inform the other users – which once added to the analysis realised by the tool, will be able to see if the contents have been reported by other users, offering a second level of indication.</p>
<p>&nbsp;</p>
<p style="text-align: justify;">Some <strong>initiatives carried by cooperation of cross-sector actors combine these four strategies</strong> for a maximal efficiency against deepfakes. Some are already used or tested by journalists. It is the case of InVID, initiative developed within the scope of the European Union Horizon 2020 program of financing of research and innovation, used by the French press agency (AFP).</p>
<p style="text-align: justify;">Solutions and strategies are therefore emerging, the market is developing, and new innovative solutions should appear very shortly with the results of the Deepfake Detection Challenge. This contest anti-deepfake was launched by Facebook upon the approach of the American presidential election, and more than 2,600 teams signed up. Results the 22<sup>nd</sup> of April!</p>
<p style="text-align: justify;">Below a table presenting examples of initiatives combining different strategies to safeguard against deepfakes.<strong><br />
</strong> <strong><br />
</strong></p>
<figure id="post-13038 media-13038" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13038 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6.png" alt="" width="1198" height="655" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6.png 1198w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6-349x191.png 349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6-768x420.png 768w" sizes="auto, (max-width: 1198px) 100vw, 1198px" /></figure>
<p>&nbsp;</p>
<h2>Different means to protect one’s activity</h2>
<p style="text-align: justify;">The risk deepfakes present for businesses is genuine, and a few actions can be taken to protect one’s activity and mitigate its impacts from now on.</p>
<ul>
<li style="text-align: justify;"><strong>Estimating the exposure: </strong>The use cases of deepfakes and the worst-case scenario of their use must be determined on the <strong>perimeters of the company</strong>, taking the fraud and undermining risks into consideration, and identifying the appropriate security strategies.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Raising awareness: </strong>The collaborators must be made aware of the <strong>detection </strong>of deepfakes (to avoid the cases of fraud) but also of the <strong>limitation of shared contents </strong>on social media that can be reused to create deepfakes (to avoid the undermining). Just like anti-phishing campaigns, this awareness campaign focuses both on the detection of technical faults (form) of the deepfakes (although they will be led to disappear with the improvement of techniques), but mostly on the detection of the suspicious nature of information (content), encouraging the audience’s suspicion, cross checking of information and notification of the suspicions to the appropriate teams (what to do if I see a suspect video of my head of communications on the social networks during the weekend? What to do if I receive a vocal message of my chief asking me to execute a punctual operation that is slightly out of my perimeter?).</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Adapting the verification processes: </strong>The existing anti-fraud plans can be redesigned to be applied to deepfakes. For instance, for a Fake President fraud via deepfakes, one of the recommendations is to suggest to the interlocutor to hang up and call him back (if possible on a known number, and after an internal check). For the <strong>most</strong> <strong>sensitive fraud scenarios, </strong>these reaction processes must be <strong>finely defined,</strong> and the concerned collaborators regularly <strong>trained to the reflexes to adopt</strong>. Tools such as the ones defined earlier can also be used to verify all or any part of the media used by the collaborators.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Protect the contents: </strong>The contents representing collaborators shared internally or externally by the company can be <strong>controlled to avoid them being reused to generate deepfakes. </strong>Businesses can limit the <strong>diversity </strong>(angle of the people and types of media) of the data potentially usable by malicious actors, and play on the <strong>digital quality</strong> (definition) of the shared contents. In fact, the more the malicious actors benefit from diverse and good quality contents representing the collaborators, the more it facilitates their reuse to generate deepfakes. Moreover, businesses can limit their means of communication to an <strong>official channel, verified social networks and their official websites </strong>– which creates contents’ consumer habits for the audience, that will be suspicious of all diffusion out of these habits.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Anticipate the crises: </strong>The communications requirements in the case of a <strong>proven incident</strong> linked to deepfakes must be anticipated, and the management of the deepfake case must include the “generic” communications scenarios addressed in the crisis communication plans.</li>
</ul>
<p>&nbsp;</p>
<figure id="post-13040 media-13040" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13040 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7.png" alt="" width="1092" height="545" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7.png 1092w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7-383x191.png 383w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7-768x383.png 768w" sizes="auto, (max-width: 1092px) 100vw, 1092px" /></figure>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-2-2/">Deep dive into deepfake &#8211; How to face increasingly believable fake news? (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
