<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>crisis management - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/crisis-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/crisis-management/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 07 Feb 2023 11:36:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>crisis management - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/crisis-management/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Enabling a paradigm shift in cyber crisis management preparedness</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/#respond</comments>
		
		<dc:creator><![CDATA[Swann Lassiva]]></dc:creator>
		<pubDate>Tue, 07 Feb 2023 11:30:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Transformation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19625</guid>

					<description><![CDATA[<p>Preparing for crisis management is now necessary for most companies and large organizations. Conscious of the risk or driven by regulations (the DORA regulation is a good example), crisis exercises and simulations have become an unmissable annual event.   Even if...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/">Enabling a paradigm shift in cyber crisis management preparedness</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">Preparing for crisis management is now necessary for most companies and large organizations. Conscious of the risk or driven by regulations (the DORA regulation is a good example), crisis exercises and simulations have become an unmissable annual event. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Even if the depth and complexity of these exercises vary, the capabilities tested are often the same. They almost always entail knowing how to take on roles, assimilate a strong flow of information (stimuli), and understand a high-stakes, high-intensity situation. These exercises train coordination and impact assessment, but they cannot be considered an end in themselves. Resolving a crisis is not limited to the famous: &#8220;isolate, cut, communicate, we&#8217;re out of the woods&#8221;. We are calling for a paradigm shift in the preparation of cyber crisis management.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">Shift the focus from information management to feasibility</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Most crisis exercises used today test the players&#8217; ability to manage and synthesize the flow of information. However, this is not where the quality of crisis management is concentrated. Some might even say that a decision-making unit should not be in a situation where it is erratically and incessantly solicited by its stakeholders. A decision-making unit must be put in a position to decide. To do so, it must respect a healthy work rhythm in cooperation with other more operational bodies.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">These exercises too often lead players, who are sucked into the time-consuming management of information, to take misleading operational sides. They make assumptions about what they can do and when &#8211; the famous &#8220;isolate, cut, communicate, we&#8217;re out of the woods.” These exercises give decision-making teams the impression that they are ready to cope when in fact they have limited their preparation to the ability to understand and coordinate events. This is a necessary step, but not sufficient. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The key word for a 2023 preparedness strategy? Feasibility. Notably, though, the feasibility of all the steps of crisis management is based on a wider spectrum than just information management. This feasibility must be measurable, specific, and enabled by documentation, equipment, simulation, and sequencing of these capabilities.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">Preparing across the spectrum: from threat detection to reconstruction</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Training to manage a crisis involves above all taking into account the complete chronology of crisis management. We can summarize this chronology in eight major steps:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<ol style="text-align: justify;">
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Detect relevant threats and have the capacity to investigate them </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Mobilize experts and decision-makers to react</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Survive during the first peak by guaranteeing business continuity capabilities </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Evaluate the impact, its ramifications, and its foreseeable evolutions </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Contain the threat and understand the impact of isolation </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Coordinate your strengths and those of your ecosystem </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Communicate with internal and external stakeholders </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Restore and rebuild what can be restored and built when it can be restored and built</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
</ol>
<h3 style="text-align: left;"><b><span data-contrast="auto">Also, prepare the tools: I design, I use</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">A relevant preparedness strategy must encompass each of these eight steps with the keyword of feasibility. It requires answering the question: will we really be able to carry out these actions when we need to?</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-19599" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN.jpg" alt="" width="1560" height="1078" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN.jpg 1560w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-768x531.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-1-EN-1536x1061.jpg 1536w" sizes="(max-width: 1560px) 100vw, 1560px" /></p>
<p style="text-align: justify;"><span data-contrast="auto">The answer to this capability question is based on three aspects: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<ol>
<li style="text-align: justify;"><span data-contrast="auto">Ensuring the formalization of brief, up-to-date and known processes (e.g.: have a flow matrix indicating how to isolate, the timeframe, and the operational consequences) </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Equipping, training, and empowering the teams in charge of these actions (e.g.: having a discussion on “license to kill” and technically enabling a “red button” on relevant perimeters) </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Training the teams concerned specifically through role-playing exercises and specific simulations of the deployment of these capabilities (e.g.: test the decision-making process leading to the use of this “red button”, then technically test the proper functioning of the red button)</span></li>
</ol>
<p>Thus, while some may limit themselves exclusively to the latter (simulation), it is essential to design one&#8217;s preparation with more hindsight and to begin with a real effort to build capacity. The exercise should be a milestone for verifying, adjusting, and promoting capabilities. In the worst case, it can be a deadline for preparing the capability or even serve as an opportunity to build said capability during the session (e.g.: reconstruction chronology, identification of technical interdependencies, etc.).<span style="font-size: revert; text-align: justify; color: initial;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">Overcome opportunistic logic and practice the capabilities&#8217; sequencing</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Currently, the main drivers of complexity are the increase in duration, intensity and the number of actors involved. Here again, we call for a paradigm shift.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">First, we call for a culture of preparation based on the eight pillars detailed above. This entails the need to provide tools and formalize the capabilities to do and train these capabilities throughout the year &#8211; without necessarily making them an event in a big exercise (e.g.: ComEx workshop on the first 10 actions to launch in case of a cyber crash, testing the isolation of backups or the restoration of workstations). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In addition, employing vertical training logic (e.g., enable then simulate), it is important to train the ability to sequence the different capabilities quickly and efficiently. Thus, it is advisable to propose larger exercises, common to the business, forensic and decision-making teams, to orchestrate their different simulations in a single exercise. In training, for example, the detection capacity should be tested with a Purple Team, and then the mobilization capacity of the crisis system with a surprise mobilization using the alternative tools provided. A second example: work on the coordination capacity of the numerous crisis cells over a long period of time and then producing a communication message for all its stakeholders (internal and external).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p><img decoding="async" class="aligncenter size-full wp-image-19601" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN.jpg" alt="" width="1557" height="1077" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN.jpg 1557w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-768x531.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Picture-2-EN-1536x1062.jpg 1536w" sizes="(max-width: 1557px) 100vw, 1557px" /></p>
<h3 style="text-align: left;"><b><span data-contrast="auto">A long-term commitment</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">To be relevant, this approach must be supported by strategic, global, multi-year thinking. Since it is more ambitious and involves more stakeholders (SOC, RPCA, Resilience, Infra, CISO, ComEx, Third Parties, &#8230;), it can gain legitimacy through a prior empirical evaluation of the means:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<ol style="text-align: justify;">
<li data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Assess the current state of your readiness by taking a feasibility-centric approach to the eight pillars. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Establish a maturity target and a roadmap that you will be able to report on empirically over time.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Finally, share with your management teams a more robust view of your crisis management maturity. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></li>
</ol>
<p style="text-align: justify;"><span data-contrast="auto">This type of approach, more empirical and personalized, will not only allow you to identify capacity gaps but also to truly train for the actions that will be essential at the worst moment.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:257}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/">Enabling a paradigm shift in cyber crisis management preparedness</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/02/enabling-a-paradigm-shift-in-cyber-crisis-management-preparedness/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Successful Ransomware Crisis Management: Top 10 pitfalls to avoid</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/successful-ransomware-crisis-management-top-10-pitfalls-to-avoid/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/successful-ransomware-crisis-management-top-10-pitfalls-to-avoid/#respond</comments>
		
		<dc:creator><![CDATA[Nicolas Gauchard]]></dc:creator>
		<pubDate>Fri, 06 Jan 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19337</guid>

					<description><![CDATA[<p>Once again, the CERT-W 2022 report confirms that the main motivation of attackers continues to be financial gain and ransomware remains the most common means of extortion. Ransomware attacks are among the most severe cyberattacks in terms of their impact on...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/successful-ransomware-crisis-management-top-10-pitfalls-to-avoid/">Successful Ransomware Crisis Management: Top 10 pitfalls to avoid</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Once again, the <a href="https://www.wavestone.com/fr/insight/cert-w-2022-cybersecurite-tendances-analyses/">CERT-W 2022 report</a> confirms that the main motivation of attackers continues to be financial gain and <strong>ransomware</strong> remains the most common <strong>means of extortion</strong>. Ransomware attacks are among the most severe cyberattacks in terms of <strong>their impact on the continuity</strong> of IT services and, by extension, the business operations itself.</p>
<p style="text-align: justify;">Wavestone assists many victims in managing their <strong>crisis triggered by ransomware attacks</strong>. Often, poorly trained IT and management teams make incorrect decisions in response to these unexpected situations.</p>
<p style="text-align: justify;">This list of the top ten pitfalls to avoid in ransomware crisis management is based on the feedback from over 5 years of supporting victims.</p>
<p> </p>
<h1 style="text-align: justify;">#1 Paying the ransom will speed up your back up process</h1>
<p style="text-align: justify;">Although the French National Agency for the Security of Information Systems (ANSSI) recommends never paying a ransom, <strong>this question will always arise</strong> for certain stakeholders, especially the decision-makers, who are not completely aware of these issues. Beyond the fact that paying the ransom encourages attackers to continue their activities, it should also be noted that paying the ransom <strong>does not always lead to the recovery of the decryption key.</strong></p>
<p style="text-align: justify;">In cases where a ransom payment allows the decryption key to be obtained, the <strong>decryption time</strong> is often very lengthy. It can take several hours or even dozens of hours per server or workstation, depending on the size of the encrypted files. When there are large numbers of computers, strict coordination is necessary for processing all the systems. In comparison, it will be <strong>faster to restore systems from backups</strong>.</p>
<p style="text-align: justify;">In addition to the time required, the encrypting or decrypting process is rife with errors, according to past experience. Thus, even with the decryption key, certain <strong>files</strong>, particularly the largest ones, are sometimes <strong>modified</strong> and cannot be restored as they are.</p>
<p style="text-align: justify;">In short, we are far from the widely held notion that a simple click can restore a functional information system after ransom payment. <strong>There is no point in considering a ransom payment</strong> to restart services if there are <strong>healthy and functional backups</strong>. In the case of data theft, the issue gets more complex.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">#2 Reopening the information system too quickly</h1>
<p style="text-align: justify;">To limit operating losses due to inactivity, the crisis unit is often <strong>urged by the business to restart the information system as quickly as possible</strong>. During the reconstruction phase following a cyber-attack, it is necessary to control the following two main risks:</p>
<ul>
<li style="text-align: justify;">Resumption of the attacker&#8217;s attack and <strong>re-encryption of the reconstructed systems</strong></li>
<li style="text-align: justify;">Theft of new information by the attacker who restarts the <strong>data exfiltration</strong></li>
</ul>
<p style="text-align: justify;"><strong>Isolating the information system</strong> from the outside world is the initial security measure that must be implemented to reduce these risks significantly (internet access in and out, links with partners, etc.). This measure eliminates the connection between the attacker and his malicious tools, and thus drastically reduces the likelihood of a repeated attack. Certain external flows can be opened individually for the most critical activities (from or to a controlled server, on a given port), but reopening a wide range from or to the outside increases the risks.</p>
<p style="text-align: justify;">Restoring servers is the first step in the rebuilding process. However, since servers are not always backed up simultaneously, <strong>resynchronisation of applications and data are often necessary</strong> before the servers are put into service. As an example, a hasty restart of a payment application during a crisis has already resulted in a double payment of hundreds of thousands of euros, which had already been transmitted to the bank before the attack.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">#3 Wait for an extreme level of security before reopening</h1>
<p style="text-align: justify;">As cyberattacks can have a significant impact, fear of repeated attacks can be traumatic for crisis teams, leading them to impose an <strong>extreme level of security</strong> before restarting. The challenge here is to find the right <strong>balance between security and rapid recovery.</strong></p>
<p style="text-align: justify;">There are two possible strategies for rebuilding servers:</p>
<ul>
<li style="text-align: justify;"><strong>The green zone strategy-</strong> It prioritises security over the speed of recovery. It involves creating a new network zone in which only the rebuilt machines are hosted. The technical components (Active Directory, DHCP, DNS, etc.) are dedicated to this secure zone. However, changing the addressing plan can have unintended consequences and it will slow down the reboot.</li>
<li style="text-align: justify;"><strong>The grey zone approach-</strong> It favours the speed of recovery over security. It consists of rebuilding or restoring servers in their initial zone. Compromised machines can be found alongside the restored machines. This strategy will represent a risk when the attack is propagated from server to server.</li>
</ul>
<p style="text-align: justify;"><img decoding="async" class="aligncenter wp-image-19326 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image1EN.png" alt="" width="4180" height="1921" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image1EN.png 4180w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image1EN-416x191.png 416w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image1EN-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image1EN-768x353.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image1EN-1536x706.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image1EN-2048x941.png 2048w" sizes="(max-width: 4180px) 100vw, 4180px" /></p>
<p style="text-align: justify;">The choice of strategy must be made in the light of the investigations and techniques used by the attacker. As mentioned earlier, isolation from the outside world remains as a key measure in reducing the risk.</p>
<p> </p>
<h1 style="text-align: justify;">#4 Denying a restart in degraded mode</h1>
<p style="text-align: justify;">In most companies, IT has become indispensable for all their operations. In the exceptional situation of a total IT shutdown, it is often initially inconceivable to <strong>continue working without IT</strong>. This is the common argument put forward by the IT and business managers during cyber crisis.</p>
<p style="text-align: justify;">By working in <strong>degraded mode</strong>, it is possible to <strong>limit the impac</strong>t in many instances. This includes implementing previously defined resilience and business continuity plans. To consider implementing these plans when all the activities are ceased during a crisis, special emphasis must be given to when these activities were stopped during the crisis, as well. Managers often underestimate the mobilisation and creativity of the teams to work differently (disengaging non-essential processes, transferring to a partner, carrying out operations manually, etc.).</p>
<p style="text-align: justify;">It is essential to find a <strong>good balance</strong> between restarting the first application in degraded mode within two days, rather than waiting two weeks to have the complete application chain.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">#5 Wanting to restart all at once</h1>
<p style="text-align: justify;">Quite often, the information systems of large organisations contain hundreds or thousands of applications. During cyber crisis situations, it is impossible to spend an enormous time on all these applications. Thus, it is essential to prioritise them by defining a restart order.</p>
<p style="text-align: justify;">Each department often tends to consider that its own activity is the most important in the company. Arbitration by general management is often necessary to establish a <strong>restart plan</strong> that can be utilised by everyone. Some departments, countries, or regions will see their applications getting started later than others too.</p>
<p style="text-align: justify;">It should also be noted that there are many <strong>dependencies between applications,</strong> and these are not always known by IT teams. But this must be considered in the reboot plan.</p>
<p> </p>
<h1 style="text-align: justify;">#6 Executing major changes in a hurry</h1>
<p style="text-align: justify;">It is sometimes tempting to want to take advantage of the situation of a system shutdown <strong>to carry out major changes</strong> in the information system.</p>
<p style="text-align: justify;">Security teams see this as an opportunity to <strong>carry out projects that the IT department has turned down in the past</strong> because of their perceived complexity and impact: network partitioning, upgrading operating system versions, Active Directory tiering, multi-factor authentication, etc.</p>
<p style="text-align: justify;">If these projects are necessary to reinforce a level of security, it is advisable <strong>to avoid making too many changes</strong> during the crisis period. Thus, the teams can concentrate on actions that are necessary to restart within a controlled level of security.</p>
<p style="text-align: justify;">For example, partitioning the network requires a review of the addressing plan, the addition of network equipment, and the modification of configurations. These actions often cause additional problems to be dealt with (IP hardcoded in the application, blocking of flows necessary for the proper functioning of the application, etc.).</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">#7 Waiting until investigations are complete</h1>
<p style="text-align: justify;">Investigations are essential to understand the attacker&#8217;s techniques and identify the vulnerabilities they exploited to carry out the attack. These <strong>vulnerabilities can be corrected during the reconstruction</strong> to avoid a new attack. However, investigations are complex and time-consuming (sometimes several weeks).</p>
<p style="text-align: justify;">A standard mistake is to wait until the end of the investigation to launch the reconstruction. In reality, it is essential to start the reconstruction operations before the end of investigations. According to the conclusions from the investigative teams, the plan for <strong>secure reconstruction</strong> will be regularly revised.</p>
<p style="text-align: justify;">In many instances, it will not be possible to identify <strong>patient zero</strong> or reconstruct the <strong>attack&#8217;s chronology</strong>. Indeed, the traces (log) maintained by the information system are not always precise (verbosity) or it does not permit going back far enough (retention time). They have sometimes been deleted by the attacker itself, while erasing his traces.</p>
<p style="text-align: justify;">Finally, decision-makers frequently ask whether the <strong>data has been exfiltrated</strong> from an information system. It should be emphasised that unless the organisation has advanced security systems, it is rarely possible to respond precisely to this issue (DLP, for example).</p>
<p> </p>
<h1 style="text-align: justify;">#8 Not anticipating human resource management</h1>
<p style="text-align: justify;">Cyber crises are situations <strong>where employees are intensely mobilized</strong>. Some members of the teams can be so determined to settle this matter, that they do not wish to quit at all! Concurrently, it is quite common to see cases of burnout, hospitalization, or sick leave during a poorly managed crisis.</p>
<p style="text-align: justify;">In the case of a large-scale ransomware attack, <strong>intensive team mobilisation will take at least three weeks</strong>. It is essential to organise <strong>team rotations</strong> from the start of the crisis ensuring that key resources are maintained over time.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-19330 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image2EN.png" alt="" width="2722" height="1507" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image2EN.png 2722w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image2EN-345x191.png 345w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image2EN-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image2EN-768x425.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image2EN-1536x850.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Image2EN-2048x1134.png 2048w" sizes="auto, (max-width: 2722px) 100vw, 2722px" /></p>
<p style="text-align: justify;">It is often appropriate to call on <strong>external service providers</strong> for expertise (digital investigations, Active Directory reconstruction, backup systems, etc.) to multiply efforts (reinstallation of workstations, upgrading of operating system versions, coordination of tasks, etc.).</p>
<p> </p>
<h1 style="text-align: justify;">#9 Hiding the situation from employees, partners, customers</h1>
<p style="text-align: justify;">More than five years ago, companies that suffered a cyberattack but failed to take adequate precautions had their reputations severely harmed. Due to the rise in cyber-attacks, an increasing number of organisations are falling victim to cyber-attacks, and firms will be evaluated not just on their <strong>ability to manage a crisis</strong>, but also on their status as victims.</p>
<p style="text-align: justify;">One of the first reflexes of management teams is often not communicating with stakeholders (employees, partners, and customers) in the hope that the <strong>attack will go unnoticed</strong>. It is clear that a major attack will always end up being communicated. In these situations, social networks and the media will communicate before the victim, who will then have to adopt a defensive posture in response. It is recommended to adopt a <strong>posture of transparency</strong> with the stakeholders, who will be reassured to know that the situation is under control. </p>
<p style="text-align: justify;">Finally, there must be <strong>appropriate communication</strong> between <strong>partners</strong>. Without specific information, many of the attackers tend to cut all the links with the victim, and thus the reopening could be longer and more complex. Moreover, s will be inclined to reopen if the victim has proactively warned them.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">#10 Failing to structure crisis management</h1>
<p style="text-align: justify;">Since ransomware attacks have a significant impact on information systems, they <strong>inevitably cause chaos within an organization</strong>. Thus, no longer we can rely on the current communication and decision-making procedures.</p>
<p style="text-align: justify;">Some people think that a crisis situation allows <strong>approximate management</strong>: improvised meetings, follow-up of perfectible actions, lack of formalisation, etc. On the contrary, decisions must be precise, rapid, formalised, and communicated to all stakeholders involved. This discipline is the key to successful crisis management, where everyone finds their place and is utilised wisely.</p>
<p style="text-align: justify;">In certain large-scale crises, such as those involving international groups, keeping a PMO crisis unit for several dozen individuals is advantageous. It will be their responsibility for consolidating precise inventory, organising crisis committees, communicating, and following up on the decisions taken by the crisis unit. This unit of crisis management professionals is an indispensable asset for effective crisis management.</p>
<p style="text-align: justify;">A ransomware attack is a <strong>sudden event</strong> that has a very <strong>significant impact</strong> on the business&#8217;s operations. There are various <strong>pitfalls to avoid</strong> in crisis management to quickly regain a functional situation. To optimise operations and gain valuable feedback, it is strongly advised to <strong>surround yourself with cyber crisis management professionals</strong>.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/successful-ransomware-crisis-management-top-10-pitfalls-to-avoid/">Successful Ransomware Crisis Management: Top 10 pitfalls to avoid</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/successful-ransomware-crisis-management-top-10-pitfalls-to-avoid/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Preparing for a Cyber Crisis</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/06/preparing-for-a-cyber-crisis/</link>
		
		<dc:creator><![CDATA[Nick Prescot]]></dc:creator>
		<pubDate>Thu, 13 Jun 2019 08:21:12 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[c-level]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[cyber crisis]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[préparation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11911</guid>

					<description><![CDATA[<p>The number of cyber-attacks is increasing at an unprecedented rate with no two being the same. We sat down with Nick Prescot (Senior Manager, UK Cybersecurity practice) to discuss cyber crisis management and some key considerations to help C-level executives prepare for...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/06/preparing-for-a-cyber-crisis/">Preparing for a Cyber Crisis</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="uncode_text_column">
<div class="wavestone-intro"><em>The number of cyber-attacks is increasing at an unprecedented rate with no two being the same. We sat down with Nick Prescot (Senior Manager, UK Cybersecurity practice) to discuss cyber crisis management and some key considerations to help C-level executives prepare for a cyber-attack.</em></div>
</div>
<div class="uncode_text_column"></div>
<div>
<h2>What do we mean by Cyber Crisis Management?</h2>
<p>Cyber crisis management encompasses 3 key areas:</p>
<ol>
<li>Firstly, there is the <strong>cyber resilience</strong> side of things. You can liken this to an elastic band – how far it stretches is representative of how much a business can take away from its day-to-day operations in the face of a cyber-attack, how much redundancy is in place and how many layers of triage exist. High availability businesses  with a strong resilience strategy for example, may be able to deal with 1-2 incidents at the same time before operations are compromised.</li>
<li>Secondly, you’ve got the actual <strong>cyber response</strong> element. This is about the ability to detect and respond to the cyber-attack as quickly and effectively as possible. Well-established cyber playbooks covering a variety of incidents and scenarios will allow you detect, react and respond accordingly. They will help answer key questions such as: <em>how do you detect the bad guys actually getting in?</em> … <em>and what do you do once they’re in?</em></li>
<li>Finally, there’s <strong>cyber recovery</strong>. This occurs post-crisis and looks at how a business returns its IT estate to BAU operations. Cyber recovery is all about having a strategy to rebuild on the assumption that everything has gone (e.g. ‘earth-scorched’ scenario). For example, some organisations have pre-stored copies of critical information in a secure vault to allow them to rebuild and restore as necessary.</li>
</ol>
</div>
<figure id="post-11913 media-11913" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11913 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/3-Cyber-Crisis-Elements-768x169.jpg" alt="" width="768" height="169" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/3-Cyber-Crisis-Elements-768x169.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/3-Cyber-Crisis-Elements-768x169-437x96.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/3-Cyber-Crisis-Elements-768x169-71x16.jpg 71w" sizes="auto, (max-width: 768px) 100vw, 768px" /></figure>
<p>&nbsp;</p>
<div class="vc_custom_1557450197979 row-container" data-parent="true" data-section="1">
<div class="row single-top-padding no-bottom-padding single-h-padding limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column vc_custom_1557444574319">
<h2>How can C-level executives understand and make sure they’re prepared for those attacks?</h2>
<p>Simply, <strong>prepare for the worst</strong>; not too distant from that saying in the military of…<em>train hard and fight easy</em>. A key message for top management in any organisation is that an effective response starts way before the attack might occur. Have those crisis management plans in place, <strong>test, refine and test again</strong>. Know likely attack-scenarios and build flexibility into your plans to ensure that they are not too dogmatic in their application and still allow you to respond to the real-time threat.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="2">
<div class="row single-top-padding single-bottom-padding penta-h-padding limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<blockquote><p><em>C-level executives need to have a pragmatic and robust security posture, making sure that they practice table-top exercises and run red-team tests on a routine basis.</em></p></blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="3">
<div class="row no-top-padding no-bottom-padding single-h-padding limit-width row-parent" data-height-ratio="3" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<p>We’ve found that the real effectiveness of running simulation exercises, comes when you <strong>mix the cyber</strong> and <strong>the real world</strong> together. For example, previously we’ve helped a global insurer understand what they might do if the crisis team’s situation room was suddenly unavailable due to terrorist attack <em>(… an extreme example of course).</em></p>
<p>On a similar note, top management must prepare for the <strong><em>‘n+1’</em> type scenarios</strong>. For example, many crisis response plans assume there is still email access, but what if this has been knocked out as part of the cyber-attack?  In this situation, one solution may be to use a predefined WhatsApp network to call, message and share information. I’ve even worked with a couple of companies who have their<strong> business continuity plans on WhatsApp</strong>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="4">
<div class="row single-top-padding no-bottom-padding single-h-padding limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<p>Additionally, C-level executives need to take a pragmatic look at <strong>what information they’re really looking to protect</strong>; is it financial, personal, employee-related? Notably, for an increasing number of organisations, their operations are not dependent on the bricks and mortar of the office but making sure that there is <strong>availability</strong> and <strong>flow of informatio</strong>n e.g. by moving infrastructure to the cloud and improving their digital workplace can help run the business remotely.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="5">
<div class="row single-top-padding single-bottom-padding penta-h-padding limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<blockquote><p><em>What critical information can your business not function without? I think a lot of companies, from a crisis management perspective, never really answer that question unfortunately.</em></p></blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="6">
<div class="row no-top-padding no-bottom-padding single-h-padding limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<p>Given their high positions with organisations, C-level executives will likely come under scrutiny for their <strong>external response</strong>. This is important in the fast-paced world of <strong>social media</strong>, in which hackers will socialise the attack before they do. For example, with the 2017 <strong>Equifax breach</strong>, their communications were delayed <em>(breach discovered on July 29<sup>th</sup> but wasn’t publicly announced until September 7<sup>th</sup>)</em>, often confused at times <em>(some information about the severity of the attack muddling previous versions)</em>, and their apology lacked customer empathy <em>(more corporate than sincere).</em> Here, you can see how imperative it is to have a <strong>robust crisis communications strategy</strong> as the way senior management respond and react publicly will be <strong>scrutinised</strong> to the n<sup>th</sup> degree; it should be <strong>transparent, consistent and accurate.</strong></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="7">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<p>&nbsp;</p>
<p><em>Although there are many different crisis management strategies out there, the key takeaway for top management is that rigorous preparation, testing and refinement of your cyber crisis management capability will go a long way when the time comes to use it for real.</em></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/06/preparing-for-a-cyber-crisis/">Preparing for a Cyber Crisis</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybercrisis, a fully-fledged media topic</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/04/cybercrisis-media-topic/</link>
		
		<dc:creator><![CDATA[Swann Lassiva]]></dc:creator>
		<pubDate>Sat, 14 Apr 2018 11:21:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[communication]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[media]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10728/</guid>

					<description><![CDATA[<p>Although they are based on similar objectives, methods and tools, crisis management and crisis communication necessarily appropriate the specifics of the issues they deal with to be relevant and therefore effective. In the case of a crisis of cyber origin,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/04/cybercrisis-media-topic/">Cybercrisis, a fully-fledged media topic</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Although they are based on similar objectives, methods and tools, crisis management and crisis communication necessarily appropriate the specifics of the issues they deal with to be relevant and therefore effective. In the case of a crisis of cyber origin, considering its characteristics and its exposure to often large numbers of users, requires specific anticipation and preparation. The first step is understanding the expected scale of media exposure.</em></p>
<p>&nbsp;</p>
<h2>Addressing the need to know and the need for reassurance</h2>
<p>Supported by the increased number of incidents and attacks on information systems, the cybercrisis has moved into the public realm. The democratisation of its vocabulary is a clear indicator of the place that this subject takes up in the media. Data leakage, ransomware, hacktivist, DDoS, phishing, whistle-blower, these terms have left the server rooms and specialist blogs to make their way into national newspaper columns and most people’s vocabulary. The cybercrisis is no longer a mere quality incident discreetly handled in-house but has become an event that arouses the interest of a broad audience. This interest transforms the cybercrisis into a communicational crisis. However, while this theme’s new popularity is logically transposing into an increase in coverage, other elements justify a significant increase in solicitations, whether internal or external to the organisation in crisis.</p>
<p>When the cybercrisis results in data leakage, for example, it is not only the subject of the crisis that is newsworthy, but its very object. In fact, when the data leaks or is stolen, its nature arouses curiosity, whether it is personal data, a State secret or simply a private conversation. This mechanic logically generates for many audiences both the need to know the unknown, and to make sure that they are not the victim. These two primary needs of curiosity and reassurance are the essential drivers of media coverage and more generally encourage the information consumer, the stakeholder, the client to fill that need and seek to obtain this information. The same logic assumes that the source of this information, in this case the legitimate data holder, addresses these requests and communicates on the incident.</p>
<p>Whether it’s strategic events such as presidential elections or everyday private conversations on digital media that are compromised, the crisis’ media effect is magnified by the extraordinary nature of the event. This is the result of both its supposed impossibility and the confidence that the public entrusts it. The sudden rupture of the trust placed in these &#8220;institutions&#8221; of major importance, erected in good stead in a 2.0 version of Maslow’s pyramid, then generates itself the interest and the need to know, translated into an explosion of the number of requests for information to the organisation in crisis.</p>
<p>&nbsp;</p>
<figure id="post-10730 media-10730" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-10730" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1.png" alt="" width="600" height="497" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1.png 1160w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1-231x191.png 231w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1-768x636.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1-47x39.png 47w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>
<p style="text-align: center;"><em>Figure 1: Maslow Pyramid Example</em></p>
<p>&nbsp;</p>
<h2>Communication war between the attacker and the communicator</h2>
<p>Cybercrisis communication is thus a specific exercise given the subject it deals with, but also by the nature of the actors present. In fact, when immeasurable sums of money are stolen without warning or institutions fall under &#8220;citizens&#8221; hacktivist attacks, opinion tends to sympathise towards the attacker perceived as a modern hero, a romantic pirate or a anonymous vigilante.</p>
<p>This public figure, aware of its image and the codes of the communication world, will of course be able to play this environment. Thus, the very methods of the attackers reinforce the central place of communication in the management of cybercrises. Attacks on political, ideological and militant grounds are no longer confined to the compromise of a system but send a message whose publicity must be maximised.</p>
<p>This obvious appropriation of the activists’ specific methods is illustrated in several ways: prior warning of a DDoS, defacing a website, publication over time of proofs of a theft on social networks, dissemination of information such as exchanges of compromising private mail conversations, etc. If the attackers have learned to maximize the reputational impact of their attacks, they also use this lever to disrupt their target’s crisis management and make a noise that will buy them time once their attack is discovered. While one of crisis management’s key success factors of is regaining control of this rhythm and the publication of new elements, the cybercrisis inevitably leaves this power to a malicious third party.</p>
<p>This third party can also, if the compromise goes deeply, alter the company’s means of communication. While it tries to respond to the need to express itself urgently and widely, this can severely hinder the fluidity of its communication. Without email, how to spread a message to employees? Without social networks, how to be close to the community and answer their questions?</p>
<p>&nbsp;</p>
<h2>Restoring the trust relationship through communication</h2>
<p>Fascinated by the attackers and the magnitude of the attacks, the general public is nonetheless intransigent at a time when trust and data are the very value of a company. Intrinsically, preserving the first assumes the protection of the second. When the organisation fails to achieve this goal, crisis communication is the only one able to restore this relationship of trust on which depends the future of the relation with customers and partners, who will or will not continue to entrust their data or the management of their tools, as well as their services to an organisation.</p>
<p>This trust requirement also brings about, when it’s is broken, the search for whom to point the blame. Although the reality of the facts is much more complex, the general public will easily assume that information system attacks are made possible by exploiting a vulnerability and therefore a fault.</p>
<p>A data leak is thus not only perceived as an attack perpetuated by a malicious third party, but also as negligence in the defences of the company victim to the theft. The latter is automatically designated as responsible and its reputation is logically impacted. Even as the attackers have become professional, the attacks complexify and the absence of vulnerabilities is a myth, cyber-attacks are now a subject of crisis management and communication in their own right. Because of its potential impact on the general public’s daily life and therefore its newsworthy nature, it forces the victim, considered to be co-responsible for its loss, to express itself.</p>
<p>&nbsp;</p>
<h2>Try to Keep It Simple for Better Crisis Communication</h2>
<p>Beyond defining a clear, shared and timely strategy, managing a cybercrisis with its particular rhythm and the obstacles caused by the attackers must be accompanied by a special communication which implies a final effort: keeping it simple.</p>
<p>Confronted by a cybercrisis, like any type of crisis, communicating implies being able to translate the events and corrective actions into clear impacts and to address them in a coherent manner. Of course, the complexity of the terms and the mechanics of a cybercrisis makes this exercise tricky and is another particularity to take into account.</p>
<p>In this context, through their ability to translate the technical cause into business consequences and more generally into layman’s terms, the CISO and their team’s role is central. During business as usual as well as in times of crisis, the CISO’s mission is the responsibility for translating the facts and technical components not only into business impacts but also into understandable and convincing impacts for diverse non-expert audiences. They may also have to conceive or even bear responsibility for elements of crisis communication language in the same way that a human resources representative is exposed during a social crisis.</p>
<p>Without presupposing their exposure on a major TV channel’s news programme, information security experts’ words will be expected on social networks, on professional networks, in the specialized press or in-house. In crisis communication, everyone is responsible for everything and everyone has to be prepared for it.</p>
<p>Thus, the subject of cyber carries a media power of its own; the immediate consequence of which is the considerable increase in expectations and requests to be informed from different divisions of an organisation as well as from the public. If the impending occurrence of an information security incident involves a specific defence and continuity of operations planning, it also requires anticipation of these requests and an active preparation for this overall communication effort.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/04/cybercrisis-media-topic/">Cybercrisis, a fully-fledged media topic</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
