<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/cyber-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/cyber-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 02 Jan 2020 10:30:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>cyber - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/cyber-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyberating: more than just a rating, a vital aspect of governance</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/09/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance/</link>
		
		<dc:creator><![CDATA[Matthieu Péquin]]></dc:creator>
		<pubDate>Mon, 23 Sep 2019 05:51:08 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberating]]></category>
		<category><![CDATA[évaluation]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[risk estimation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12120</guid>

					<description><![CDATA[<p>From finance to cybersecurity The major rating agencies, such as Moody&#8217;s and Standard &#38; Poor&#8217;s, are well known to the general public—especially after the 2008 financial crisis. They now shape financial markets, de facto, through their generation of comparison grids,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance/">Cyberating: more than just a rating, a vital aspect of governance</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>From finance to cybersecurity</h1>
<p>The major rating agencies, such as Moody&#8217;s and Standard &amp; Poor&#8217;s, are well known to the general public—especially after the 2008 financial crisis. They now shape financial markets, <em>de facto</em>, through their generation of comparison grids, which are used, at global scale, to rate the solvency risks associated with companies.</p>
<p>And today, it’s clear that this approach of third-party organizations producing corporate ratings isn’t just limited to the financial sector: it’s gradually being extended into the sphere of cybersecurity.</p>
<p><strong>Cyber rating agencies are now assigning &#8220;cyber scores&#8221;</strong> to companies which quantify the levels of cyber risk that companies are exposed to. The players doing this are mainly American (BitSight, Security ScoreCard, Panorays, and UpGuard, for example), but European start-up, Cyrating, also generates ratings by collecting and analyzing publicly available information, including:</p>
<ul>
<li>The vulnerabilities present on the company&#8217;s websites and the robustness of the TLS encryption in use;</li>
<li>The reputation of the company&#8217;s public IP addresses, computed from a range of data, such as the number of complaints about spam, their appearance on blacklists used by internet and email service providers, bounce rates, etc.</li>
<li>Whether corporate email address protection measures (such as DMARC, DKIM, and SPF) are in place;</li>
<li>DNS analysis (whois, root and NS servers, verification of Start of Authority, MX records, etc.);</li>
<li>Whether company data is present on the Dark Web.</li>
</ul>
<p>Apart from this public-domain data, cyber rating platforms capture and analyze a large amount of exchanged data to determine, for example, , or the versions of browsers being used.</p>
<p>The algorithms used to do such analysis are particular to each cyber rating platform; and the platforms then monetizes the results by offering access to results as a subscription-based service.</p>
<p><strong>Companies, then, get to know their rating by subscribing to a cyber rating platform service!</strong></p>
<p>These scores are widely accessible, given that the rating can also be viewed by other players who subscribe to the platform. Firms can therefore compare themselves with competitors . Cyber insurers are also starting to take such ratings into account when calculating . But, more worryingly, it&#8217;s also easy to imagine that ratings might facilitate reconnaissance for cyber attackers, by helping them to target lower-rated companies—whose defensive measures are likely to be weaker.</p>
<p>Given all this, it seems <strong>essential that firms integrate the question of cyber ratings into their cybersecurity governance.</strong></p>
<h1>Some obvious limitations to the current cyber rating model</h1>
<p>To put it bluntly, a large part of the cyber community has serious reservations about cyber ratings; this mistrust can be summarized in the following view:</p>
<p><em>&#8220;How much confidence can be placed in a security level assessment carried out by a third-party algorithm, using only a selection of the relevant parameters, and with no control mechanism for the quality of information collected? “</em></p>
<p><em> </em><em>There is still considerable work to do to perfect the model, which has a number of inherent flaws</em>; these, if not addressed, risk rendering the rating irrelevant:</p>
<ul>
<li>doesn’t reflect a firm’s overall level of security. Many factors are ignored: internal network segmentation, system and data protection measures, detection capability, etc.;</li>
<li>The rating can be &#8220;polluted&#8221; by false positives: IP addresses or domain names that do not belong to the company (registration errors), traffic originating from sandboxes considered to be malicious, etc. This therefore requires the to carry out a degree of detailed work (the sorting of IP addresses, excluding certain data) in order to obtain as accurate a result as possible;</li>
<li>A lack of transparency about rating algorithms makes it difficult to evaluate the elements that have led to a given score, and to identify parameters where corrections are needed.</li>
</ul>
<p>It’s misleading to reduce a company’s entire level of security to a single score. Moreover, in the future, it wouldn’t be surprising to see players like Qualys propose the taking into account of the results of internal tests conducted on a company&#8217;s IS, in order to refine its rating system.</p>
<h1>A wide range of use cases</h1>
<p>However, these limitations shouldn’t obscure <strong>the opportunities offered by subscribing to a cyber rating service</strong>.</p>
<p>The main argument advanced by cyber rating players is that a score represents a <strong>powerful and easy-to-understand indicator for senior management</strong>—a concept already well-established in finance but still lacking in cybersecurity. An improvement in the rating could also be used to justify and <strong>quantify the effectiveness of any corrective action plan</strong> applied to the company’s IS services.</p>
<p>In addition, cyber rating platforms make it possible to see how all the companies that have been assessed score, which enables a company to:</p>
<ul>
<li>Calibrate its performance against competitors on a common basis; and, potentially, to make an asset of cybersecurity for marketing purposes;</li>
<li>Assess its suppliers’ levels of cybersecurity maturity on a more objective basis than that of questionnaires completed for a Security Assurance Plan.</li>
</ul>
<h1>Cyber rating: an essential issue for companies</h1>
<p>Given the challenges firms face, and the opportunities on offer, <em>it seems inevitable that cyber ratings will take off</em>, something noted by ANSSI (the French National Cybersecurity Agency) in its strategic review of cyber defense: &#8221; <em>The major players in the field will therefore become benchmarks whose market position will be difficult to challenge.”</em></p>
<p>Despite the current limitations, it’s vital that companies—some of whom are already talking about giving countries financial-sector-type cyber ratings—identify how such ratings could be used as an asset increase awareness about cybersecurity among senior management, without, of course, stigmatizing .</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance/">Cyberating: more than just a rating, a vital aspect of governance</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybercrisis, a fully-fledged media topic</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/04/cybercrisis-media-topic/</link>
		
		<dc:creator><![CDATA[Swann Lassiva]]></dc:creator>
		<pubDate>Sat, 14 Apr 2018 11:21:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[communication]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[media]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10728/</guid>

					<description><![CDATA[<p>Although they are based on similar objectives, methods and tools, crisis management and crisis communication necessarily appropriate the specifics of the issues they deal with to be relevant and therefore effective. In the case of a crisis of cyber origin,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/04/cybercrisis-media-topic/">Cybercrisis, a fully-fledged media topic</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Although they are based on similar objectives, methods and tools, crisis management and crisis communication necessarily appropriate the specifics of the issues they deal with to be relevant and therefore effective. In the case of a crisis of cyber origin, considering its characteristics and its exposure to often large numbers of users, requires specific anticipation and preparation. The first step is understanding the expected scale of media exposure.</em></p>
<p>&nbsp;</p>
<h2>Addressing the need to know and the need for reassurance</h2>
<p>Supported by the increased number of incidents and attacks on information systems, the cybercrisis has moved into the public realm. The democratisation of its vocabulary is a clear indicator of the place that this subject takes up in the media. Data leakage, ransomware, hacktivist, DDoS, phishing, whistle-blower, these terms have left the server rooms and specialist blogs to make their way into national newspaper columns and most people’s vocabulary. The cybercrisis is no longer a mere quality incident discreetly handled in-house but has become an event that arouses the interest of a broad audience. This interest transforms the cybercrisis into a communicational crisis. However, while this theme’s new popularity is logically transposing into an increase in coverage, other elements justify a significant increase in solicitations, whether internal or external to the organisation in crisis.</p>
<p>When the cybercrisis results in data leakage, for example, it is not only the subject of the crisis that is newsworthy, but its very object. In fact, when the data leaks or is stolen, its nature arouses curiosity, whether it is personal data, a State secret or simply a private conversation. This mechanic logically generates for many audiences both the need to know the unknown, and to make sure that they are not the victim. These two primary needs of curiosity and reassurance are the essential drivers of media coverage and more generally encourage the information consumer, the stakeholder, the client to fill that need and seek to obtain this information. The same logic assumes that the source of this information, in this case the legitimate data holder, addresses these requests and communicates on the incident.</p>
<p>Whether it’s strategic events such as presidential elections or everyday private conversations on digital media that are compromised, the crisis’ media effect is magnified by the extraordinary nature of the event. This is the result of both its supposed impossibility and the confidence that the public entrusts it. The sudden rupture of the trust placed in these &#8220;institutions&#8221; of major importance, erected in good stead in a 2.0 version of Maslow’s pyramid, then generates itself the interest and the need to know, translated into an explosion of the number of requests for information to the organisation in crisis.</p>
<p>&nbsp;</p>
<figure id="post-10730 media-10730" class="align-none"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-10730" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1.png" alt="" width="600" height="497" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1.png 1160w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1-231x191.png 231w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1-768x636.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/Image1-47x39.png 47w" sizes="(max-width: 600px) 100vw, 600px" /></figure>
<p style="text-align: center;"><em>Figure 1: Maslow Pyramid Example</em></p>
<p>&nbsp;</p>
<h2>Communication war between the attacker and the communicator</h2>
<p>Cybercrisis communication is thus a specific exercise given the subject it deals with, but also by the nature of the actors present. In fact, when immeasurable sums of money are stolen without warning or institutions fall under &#8220;citizens&#8221; hacktivist attacks, opinion tends to sympathise towards the attacker perceived as a modern hero, a romantic pirate or a anonymous vigilante.</p>
<p>This public figure, aware of its image and the codes of the communication world, will of course be able to play this environment. Thus, the very methods of the attackers reinforce the central place of communication in the management of cybercrises. Attacks on political, ideological and militant grounds are no longer confined to the compromise of a system but send a message whose publicity must be maximised.</p>
<p>This obvious appropriation of the activists’ specific methods is illustrated in several ways: prior warning of a DDoS, defacing a website, publication over time of proofs of a theft on social networks, dissemination of information such as exchanges of compromising private mail conversations, etc. If the attackers have learned to maximize the reputational impact of their attacks, they also use this lever to disrupt their target’s crisis management and make a noise that will buy them time once their attack is discovered. While one of crisis management’s key success factors of is regaining control of this rhythm and the publication of new elements, the cybercrisis inevitably leaves this power to a malicious third party.</p>
<p>This third party can also, if the compromise goes deeply, alter the company’s means of communication. While it tries to respond to the need to express itself urgently and widely, this can severely hinder the fluidity of its communication. Without email, how to spread a message to employees? Without social networks, how to be close to the community and answer their questions?</p>
<p>&nbsp;</p>
<h2>Restoring the trust relationship through communication</h2>
<p>Fascinated by the attackers and the magnitude of the attacks, the general public is nonetheless intransigent at a time when trust and data are the very value of a company. Intrinsically, preserving the first assumes the protection of the second. When the organisation fails to achieve this goal, crisis communication is the only one able to restore this relationship of trust on which depends the future of the relation with customers and partners, who will or will not continue to entrust their data or the management of their tools, as well as their services to an organisation.</p>
<p>This trust requirement also brings about, when it’s is broken, the search for whom to point the blame. Although the reality of the facts is much more complex, the general public will easily assume that information system attacks are made possible by exploiting a vulnerability and therefore a fault.</p>
<p>A data leak is thus not only perceived as an attack perpetuated by a malicious third party, but also as negligence in the defences of the company victim to the theft. The latter is automatically designated as responsible and its reputation is logically impacted. Even as the attackers have become professional, the attacks complexify and the absence of vulnerabilities is a myth, cyber-attacks are now a subject of crisis management and communication in their own right. Because of its potential impact on the general public’s daily life and therefore its newsworthy nature, it forces the victim, considered to be co-responsible for its loss, to express itself.</p>
<p>&nbsp;</p>
<h2>Try to Keep It Simple for Better Crisis Communication</h2>
<p>Beyond defining a clear, shared and timely strategy, managing a cybercrisis with its particular rhythm and the obstacles caused by the attackers must be accompanied by a special communication which implies a final effort: keeping it simple.</p>
<p>Confronted by a cybercrisis, like any type of crisis, communicating implies being able to translate the events and corrective actions into clear impacts and to address them in a coherent manner. Of course, the complexity of the terms and the mechanics of a cybercrisis makes this exercise tricky and is another particularity to take into account.</p>
<p>In this context, through their ability to translate the technical cause into business consequences and more generally into layman’s terms, the CISO and their team’s role is central. During business as usual as well as in times of crisis, the CISO’s mission is the responsibility for translating the facts and technical components not only into business impacts but also into understandable and convincing impacts for diverse non-expert audiences. They may also have to conceive or even bear responsibility for elements of crisis communication language in the same way that a human resources representative is exposed during a social crisis.</p>
<p>Without presupposing their exposure on a major TV channel’s news programme, information security experts’ words will be expected on social networks, on professional networks, in the specialized press or in-house. In crisis communication, everyone is responsible for everything and everyone has to be prepared for it.</p>
<p>Thus, the subject of cyber carries a media power of its own; the immediate consequence of which is the considerable increase in expectations and requests to be informed from different divisions of an organisation as well as from the public. If the impending occurrence of an information security incident involves a specific defence and continuity of operations planning, it also requires anticipation of these requests and an active preparation for this overall communication effort.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/04/cybercrisis-media-topic/">Cybercrisis, a fully-fledged media topic</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
