<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber crisis - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/cyber-crisis/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/cyber-crisis/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 02 Jan 2020 14:19:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>cyber crisis - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/cyber-crisis/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Preparing for a Cyber Crisis</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/06/preparing-for-a-cyber-crisis/</link>
		
		<dc:creator><![CDATA[Nick Prescot]]></dc:creator>
		<pubDate>Thu, 13 Jun 2019 08:21:12 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[c-level]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[cyber crisis]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[préparation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11911</guid>

					<description><![CDATA[<p>The number of cyber-attacks is increasing at an unprecedented rate with no two being the same. We sat down with Nick Prescot (Senior Manager, UK Cybersecurity practice) to discuss cyber crisis management and some key considerations to help C-level executives prepare for...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/06/preparing-for-a-cyber-crisis/">Preparing for a Cyber Crisis</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="uncode_text_column">
<div class="wavestone-intro"><em>The number of cyber-attacks is increasing at an unprecedented rate with no two being the same. We sat down with Nick Prescot (Senior Manager, UK Cybersecurity practice) to discuss cyber crisis management and some key considerations to help C-level executives prepare for a cyber-attack.</em></div>
</div>
<div class="uncode_text_column"></div>
<div>
<h2>What do we mean by Cyber Crisis Management?</h2>
<p>Cyber crisis management encompasses 3 key areas:</p>
<ol>
<li>Firstly, there is the <strong>cyber resilience</strong> side of things. You can liken this to an elastic band – how far it stretches is representative of how much a business can take away from its day-to-day operations in the face of a cyber-attack, how much redundancy is in place and how many layers of triage exist. High availability businesses  with a strong resilience strategy for example, may be able to deal with 1-2 incidents at the same time before operations are compromised.</li>
<li>Secondly, you’ve got the actual <strong>cyber response</strong> element. This is about the ability to detect and respond to the cyber-attack as quickly and effectively as possible. Well-established cyber playbooks covering a variety of incidents and scenarios will allow you detect, react and respond accordingly. They will help answer key questions such as: <em>how do you detect the bad guys actually getting in?</em> … <em>and what do you do once they’re in?</em></li>
<li>Finally, there’s <strong>cyber recovery</strong>. This occurs post-crisis and looks at how a business returns its IT estate to BAU operations. Cyber recovery is all about having a strategy to rebuild on the assumption that everything has gone (e.g. ‘earth-scorched’ scenario). For example, some organisations have pre-stored copies of critical information in a secure vault to allow them to rebuild and restore as necessary.</li>
</ol>
</div>
<figure id="post-11913 media-11913" class="align-none"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-11913 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/3-Cyber-Crisis-Elements-768x169.jpg" alt="" width="768" height="169" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/3-Cyber-Crisis-Elements-768x169.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/3-Cyber-Crisis-Elements-768x169-437x96.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/3-Cyber-Crisis-Elements-768x169-71x16.jpg 71w" sizes="(max-width: 768px) 100vw, 768px" /></figure>
<p>&nbsp;</p>
<div class="vc_custom_1557450197979 row-container" data-parent="true" data-section="1">
<div class="row single-top-padding no-bottom-padding single-h-padding limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column vc_custom_1557444574319">
<h2>How can C-level executives understand and make sure they’re prepared for those attacks?</h2>
<p>Simply, <strong>prepare for the worst</strong>; not too distant from that saying in the military of…<em>train hard and fight easy</em>. A key message for top management in any organisation is that an effective response starts way before the attack might occur. Have those crisis management plans in place, <strong>test, refine and test again</strong>. Know likely attack-scenarios and build flexibility into your plans to ensure that they are not too dogmatic in their application and still allow you to respond to the real-time threat.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="2">
<div class="row single-top-padding single-bottom-padding penta-h-padding limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<blockquote><p><em>C-level executives need to have a pragmatic and robust security posture, making sure that they practice table-top exercises and run red-team tests on a routine basis.</em></p></blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="3">
<div class="row no-top-padding no-bottom-padding single-h-padding limit-width row-parent" data-height-ratio="3" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<p>We’ve found that the real effectiveness of running simulation exercises, comes when you <strong>mix the cyber</strong> and <strong>the real world</strong> together. For example, previously we’ve helped a global insurer understand what they might do if the crisis team’s situation room was suddenly unavailable due to terrorist attack <em>(… an extreme example of course).</em></p>
<p>On a similar note, top management must prepare for the <strong><em>‘n+1’</em> type scenarios</strong>. For example, many crisis response plans assume there is still email access, but what if this has been knocked out as part of the cyber-attack?  In this situation, one solution may be to use a predefined WhatsApp network to call, message and share information. I’ve even worked with a couple of companies who have their<strong> business continuity plans on WhatsApp</strong>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="4">
<div class="row single-top-padding no-bottom-padding single-h-padding limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<p>Additionally, C-level executives need to take a pragmatic look at <strong>what information they’re really looking to protect</strong>; is it financial, personal, employee-related? Notably, for an increasing number of organisations, their operations are not dependent on the bricks and mortar of the office but making sure that there is <strong>availability</strong> and <strong>flow of informatio</strong>n e.g. by moving infrastructure to the cloud and improving their digital workplace can help run the business remotely.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="5">
<div class="row single-top-padding single-bottom-padding penta-h-padding limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<blockquote><p><em>What critical information can your business not function without? I think a lot of companies, from a crisis management perspective, never really answer that question unfortunately.</em></p></blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="6">
<div class="row no-top-padding no-bottom-padding single-h-padding limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<p>Given their high positions with organisations, C-level executives will likely come under scrutiny for their <strong>external response</strong>. This is important in the fast-paced world of <strong>social media</strong>, in which hackers will socialise the attack before they do. For example, with the 2017 <strong>Equifax breach</strong>, their communications were delayed <em>(breach discovered on July 29<sup>th</sup> but wasn’t publicly announced until September 7<sup>th</sup>)</em>, often confused at times <em>(some information about the severity of the attack muddling previous versions)</em>, and their apology lacked customer empathy <em>(more corporate than sincere).</em> Here, you can see how imperative it is to have a <strong>robust crisis communications strategy</strong> as the way senior management respond and react publicly will be <strong>scrutinised</strong> to the n<sup>th</sup> degree; it should be <strong>transparent, consistent and accurate.</strong></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="7">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<p>&nbsp;</p>
<p><em>Although there are many different crisis management strategies out there, the key takeaway for top management is that rigorous preparation, testing and refinement of your cyber crisis management capability will go a long way when the time comes to use it for real.</em></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/06/preparing-for-a-cyber-crisis/">Preparing for a Cyber Crisis</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber-resilience: bend without breaking (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-22/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Mon, 30 Oct 2017 11:43:42 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyber crisis]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberresilience]]></category>
		<category><![CDATA[IS compromission]]></category>
		<category><![CDATA[Notpetya]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Wannacry]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10168/</guid>

					<description><![CDATA[<p>The first article was about vulnerabilities in Business Continuity Plans (BCP) and an overview on recent major cyber attacks that paralyzed a significant amount of an Information System (IS). This second article introduces some leads and means to improve cyber-resilience...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-22/">Cyber-resilience: bend without breaking (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>The <a href="https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-12/">first article</a> was about vulnerabilities in Business Continuity Plans (BCP) and an overview on recent major cyber attacks that paralyzed a significant amount of an Information System (IS). This second article introduces some leads and means to improve cyber-resilience strategy.<br />
</em></p>
<h2>Strengthening crisis management</h2>
<p>Cyber crises are specific: they are often long (several weeks) and sometimes difficult to grasp (what has the attacker been able to do? For how long? What is the impact?). Often, affected external parties such as lawyers, authorities, suppliers, and sometimes even clients themselves are not well-prepared on the subject matter. Thus, it is necessary to adjust existing plans that have not been designed to cater to the cyber threat aspects.</p>
<p>Even if they is an operational player in cyber crisis management, the CIO should not be over-utilized in either the investigation or the defense measures if it is detrimental to overall production and recovery. Anticipation of these kinds of measures is vital to the recovery effort.  It is necessary to clearly identify the teams which need to be mobilized to respond to the crisis in a timely manner, and to organize the parallel interventions on both the investigation and the construction of the defense plan.</p>
<p>Beyond the organizational point of view, the CIO will have to ensure that they also have the investigation tools (mapping, search for attack signature, independent crisis management IS, capability to analyze unknown malware, etc.), remediation tools (Capabilities to rapidly deploy technical corrections, fragmentation of the IS to save what could be saved, IS surveillance toolkit) and reconstruction tools (access to backup, access to minimal documentation, capabilities to deploy workstation) required to understand the position the attacker took in the IS, to repel it and to ensure it doesn’t return.</p>
<p>Writing a crisis management guide that defines the essential steps, the macro-level responsibilities, and the key decision points can be done as an added bonus. With that, it is essential to conduct crisis exercises to ensure readiness for when one actually occurs.</p>
<p>Here is a functional integrity control chain :</p>
<figure id="post-10171 media-10171" class="align-center"><img decoding="async" class="aligncenter size-full wp-image-10171" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-article-cyber-resilience.png" alt="" width="955" height="419" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-article-cyber-resilience.png 955w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-article-cyber-resilience-435x191.png 435w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-article-cyber-resilience-768x337.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-article-cyber-resilience-71x31.png 71w" sizes="(max-width: 955px) 100vw, 955px" /></figure>
<h2>Rethinking continuity plans</h2>
<p>Continuity plans have to evolve to adapt to cyberthreats. Sometimes, this means they may have to be completely rebuilt.</p>
<p>There are many possible solutions that can cover all types of continuity plans.</p>
<p>The user recovery plan, for example, can evolve to integrate USB keys containing an alternative system which could be used in case of logical destruction of employee workstations. Some organizations have also decided to provision an allotted number of workstations directly with their suppliers to have them delivered quickly in case of physical destruction.</p>
<p>The IT continuity plan, on the other hand, can include new solutions which could be efficient in the event of a cyberattack. The most publicized one aims to build “non- similar facilities” by duplicating an application without using the same software, operating system, or production teams. It is an extreme solution, very costly and difficult to maintain, but one that is considered for specific, critical applications in the financial industry &#8211; most notably, payment system infrastructure.</p>
<p>Other less complex solutions such as adding functional integrity control in the business process have also been considered. The concept relies on the implementation of regular controls, at various levels and at different places within the application chain (“multi-level controls”). This enables quick detection of attacks. An alert could be raised in case of an interaction with technical layers, such as a modification of a value directly inside a database, without passing through regular business workflows (via graphical interfaces), for example. In another case, these mechanisms can also be applied to infrastructure systems by reconciling admin account creation request tickets with the number of accounts really in the system.</p>
<p>As a more intermediate complexity level solution, it is possible to implement a “floodgate”, or as a system and network isolation zone. This floodgate – for example, the industrial IS – can be activated in the event of an attack and could isolate the most sensitive systems from the rest of the IS.</p>
<p>These, often major, evolutions must be part of an existing recovery strategy review so that one can assess their vulnerability and the interest of deploying new cyber-resilience solutions, particularly on the most critical systems. The evolution of Business Impact Analysis (BIA) to include this dimension can be a key first step.</p>
<figure id="post-10174 media-10174" class="align-center"><img decoding="async" class="aligncenter size-full wp-image-10174" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-4-article-cyber-resilience.png" alt="" width="1113" height="533" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-4-article-cyber-resilience.png 1113w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-4-article-cyber-resilience-399x191.png 399w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-4-article-cyber-resilience-768x368.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-4-article-cyber-resilience-71x34.png 71w" sizes="(max-width: 1113px) 100vw, 1113px" /></figure>
<p>&nbsp;</p>
<h2>Without cybersecurity, cyber-resilience is nothing</h2>
<p>Implementing these new cyber-resilience measures requires significant efforts. Note that these efforts can be wasted if both these recovery solutions and the regular systems are not already appropriately secured and under detailed surveillance. The CISO is the key player to ensure that these often started but rarely finalized initiatives come to fruition. Help from the Risk Manager (RM), or the Business Continuity Manager (BCM) if such a position is in place, will be valuable. It is widely acknowledged today that it is impossible to secure a system 100%, which means that organizations have to accept the inevitability of an attack occurring, at which moment the RM or the BCM will make full use of their role.</p>
<p>Protect, detect, respond, remediate, and rebuild. These are the pillars of a strong cyber-resilience program which can only be attained if the BCM and the CISO roles combine their full range of capabilities and work hard, hand-in-hand!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-22/">Cyber-resilience: bend without breaking (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber-resilience: bend without breaking (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-12/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Mon, 30 Oct 2017 10:52:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyber crisis]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberresilience]]></category>
		<category><![CDATA[IS compromission]]></category>
		<category><![CDATA[Notpetya]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Wannacry]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10148/</guid>

					<description><![CDATA[<p>Successive cyber attacks, Wannacry and NotPetya, have highlighted the limits of current resilience and business continuity plans, as well as the full capacity of cyberthreats to cripple Information Systems. The affected organizations paid a high price. What can we learn?...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-12/">Cyber-resilience: bend without breaking (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;"><em>Successive cyber attacks, Wannacry and NotPetya, have highlighted the limits of current resilience and business continuity plans, as well as the full capacity of cyberthreats to cripple Information Systems. The affected organizations paid a high price. What can we learn? What actions can we take to prepare for major cyberattacks? How can we ensure cyber-resilience?<br />
</em></p>
<p style="text-align: left;">When confronted with a major cyber attack, whether destructive or leading to a loss of trust in vital systems, the first reaction of a majority of companies is to activate their business continuity plan (BCP). This strategic element of resiliency is enacted  to ensure the organization’s survival against disasters whose magnitude causes computing resources, communication infrastructures, buildings, and possibly even users to be unavailable.</p>
<p style="text-align: left;">Yet major cyber attacks, have not been taken into account when developing most BCPs, even though they can be as destructive in scale as either Wannacry or NotPetya, or, more often, lead to a loss of trust in the basic components of the infrastructure (network, access control, inventory, etc.). By Focusing on an availability agenda, organizations fail to address the issue arising from the simultaneous destruction or the loss of confidence in Information System (IS) caused by cyber attacks.</p>
<p style="text-align: left;">Moreover, these IS continuity plans are frequently intimately linked to the resources they protect and are equally affected by the attacks. For over a decade, continuity processes (either user fallback or IT recovery) have adopted principles of infrastructure pooling and “hot” recovery to cope with both rapid business recovery and the need for better operability.</p>
<p style="text-align: left;">In effect, this « proximity » between the regular IS and its recovery counterpart makes continuity plans vulnerable to cyber attacks.</p>
<h2>What vulnerabilities in business continuity systems?</h2>
<p style="text-align: left;">As an example, various dedicated and connected recovery stations of fallback sites were contaminated by NotPetya and were useless for the remediation.</p>
<p style="text-align: left;">Legacy « cold » recovery/emergency plans (often consisting  of activating a recovery system in case of incident) concern fewer and fewer applications, and the remaining ones are often secondary.</p>
<p style="text-align: left;">Unfortunately, when dealing with a deep compromise of systems, backups often onboard malevolent elements such as malwares, base camps, or modifications meticulously operated by attackers beforehand, due to the fact that intrusions go undetected for long period of time (detection often happens hundreds of days following the initial infection). Not to mention that the continuity of the backup systems themselves is often neglected. During the management of the NotPetya crisis, the backup management servers were also destroyed. Restoring them took several days, due to their complexity and nested nature within the information system; an ActiveDirectory was necessary to launch the restorations while the ActiveDirectory backup was a prerequisite to rebuild it.</p>
<p style="text-align: left;">The same findings hold for industrial IS. Industrial digital systems are resilient against technical breakdowns or anticipated mechanical incidents. However, they were rarely designed with the consideration of the possibility of human malice and as a result often lack advanced security systems. To compound on this, industrial IS has lifecycles of several decades which expose them to old vulnerabilities. Finally, the independence of control channels from the digital systems which they oversee is not always implemented.</p>
<figure id="post-10151 media-10151" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-10151" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-1-cyber-resilience.png" alt="" width="1447" height="680" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-1-cyber-resilience.png 1447w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-1-cyber-resilience-406x191.png 406w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-1-cyber-resilience-768x361.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-1-cyber-resilience-71x33.png 71w" sizes="auto, (max-width: 1447px) 100vw, 1447px" /></figure>
<h2>Two illustrated major attack scenarii</h2>
<h3>Logical destruction or the unavailability of a large chunck of an Information System</h3>
<p>Made real by attacks from true-false ransomware, Wannacry and NotPetya. This type of attack causes mass unavailability of services due to the encryption of data files and/or the operating system. The companies affected by this attack (Merck, Maersk, Saint Gobain, Fedex&#8230; as well as Sony Pictures and Saudi Amramco) lost up to 95% of their Information Systems (tens of thousands of computers and servers) in a timeframe that often lasts less than an hour. At the start of such crisis, the situation is highly difficult since there is no longer any means of communication or exchange mechanism within the affected company, including ISD. Victims have outlined losses of several hundred of million euros following these attacks.</p>
<h3>A compromise and loss of confidence in Information Systems</h3>
<p>It concerns a targeted attack does not challenge the proper functioning of the system. Rather, it aims to give attackers access to all of the company&#8217;s information systems (email and messaging, files, business applications, etc.) allowing them to steal the identity of any employee and carry out actions in their name. The attackers may then extract any type of data or carry out business actions which require several successive validations. These attacks affected a large number of companies across all sectors incurring massive fraud as a result, including the bank of Banglasdesh. These attacks also affected financial and payment data theft as was the case for several distribution groups in the United States including Target and Home Depot. The situation at the start of the crisis is complex since there is no confidence in the Information System and there is considerable uncertainty about what the attacker could do and their motives. It involves quietly investigating until being able to remove the attacker and rebuild a secure system. Victims affected by these attacks have also reported financial impacts worth several hundred million euros.</p>
<figure id="post-10157 media-10157" class="align-center"><img loading="lazy" decoding="async" class="wp-image-10160 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-2-cyber-resilience-1.png" alt="" width="266" height="336" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-2-cyber-resilience-1.png 435w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-2-cyber-resilience-1-151x191.png 151w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-2-cyber-resilience-1-31x39.png 31w" sizes="auto, (max-width: 266px) 100vw, 266px" /></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-12/">Cyber-resilience: bend without breaking (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
