<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>finance - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/finance-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/finance-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 08 Jan 2025 16:45:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>finance - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/finance-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DORA – The Challenges of Digital Resilience in the Financial Sector by 2025</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/01/dora-the-challenges-of-digital-resilience-in-the-financial-sector-by-2025/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/01/dora-the-challenges-of-digital-resilience-in-the-financial-sector-by-2025/#respond</comments>
		
		<dc:creator><![CDATA[Damien Lachiver]]></dc:creator>
		<pubDate>Wed, 08 Jan 2025 16:45:14 +0000</pubDate>
				<category><![CDATA[Cyber for Financial Services]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DORA]]></category>
		<category><![CDATA[finance]]></category>
		<category><![CDATA[Operational Resilience]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25079</guid>

					<description><![CDATA[<p>The Digital Operational Resilience Act (DORA) is a European regulation designed to enhance the resilience of financial entities against IT and cybersecurity risks. Its ambitious objective is to improve organizations’ ability to anticipate and manage crises while optimizing their operational...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/dora-the-challenges-of-digital-resilience-in-the-financial-sector-by-2025/">DORA – The Challenges of Digital Resilience in the Financial Sector by 2025</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The Digital Operational Resilience Act (DORA) is a European regulation designed to enhance the resilience of financial entities against IT and cybersecurity risks. Its ambitious objective is to improve organizations’ ability to anticipate and manage crises while optimizing their operational resilience.</p>
<p style="text-align: justify;">To learn more about the regulation’s details, you can refer to this article: <a href="https://www.riskinsight-wavestone.com/en/2020/12/decrypting-dora-what-does-it-mean-for-resilience-of-financial-organisations/">What does DORA mean for Resilience of financial organisations?</a></p>
<p style="text-align: justify;">The key deadline of January 17, 2025, marks the theoretical compliance date for financial entities. It also signals the beginning of supervisory operations by regulatory authorities.</p>
<p style="text-align: justify;">In this context, <strong>Damien LACHIVER</strong> and <strong>Etienne BOUET</strong>, Senior Managers at Wavestone and experts in DORA compliance, with extensive experience supporting CAC40 entities, share their insights into the practical challenges and opportunities brought by this regulation, as well as the regulators&#8217; expectations and essential actions for effective preparation.</p>
<p> </p>
<h4 style="text-align: justify;"><strong><u>How does DORA go beyond mere regulatory compliance?</u></strong></h4>
<p style="text-align: justify;"><strong>E.BOUET:</strong> DORA should not be seen merely as a compliance exercise. Yes, there are regulatory requirements to meet, but the real challenge lies in building resilience. The question to ask is: how can compliance with DORA effectively enhance operational resilience? This connection is not always straightforward. For instance, gap analyses or cybersecurity audits often reveal vulnerabilities, and compliance alone is insufficient if it doesn’t come with genuine improvements in resilience.</p>
<p style="text-align: justify;"><strong>D.LACHIVER: </strong>Many entities are still focused on compliance since DORA addresses areas already well established, such as cybersecurity, business continuity, and IT risk management. Large organizations, in particular, already benefit from high compliance levels due to decades of experience.</p>
<p style="text-align: justify;">However, beyond this compliance phase, it is crucial to shift towards remediation and anticipation, implementing initiatives that will not be fundamentally different from the historical programs already initiated. The real focus should be on identifying new scenarios or solutions that can strengthen resilience.</p>
<p> </p>
<h4 style="text-align: justify;"><strong><u>What are the critical scenarios to consider for improving resilience?</u></strong></h4>
<p style="text-align: justify;"><strong>D.LACHIVER: </strong>Two major scenarios require significant attention and investment:</p>
<ul style="text-align: justify;">
<li><strong>Total loss of internal IT systems:</strong> how can information systems be restored and fully rebuilt after a large scale cyberattack?</li>
<li><strong>The sudden loss of a critical third party:</strong> what happens if I lose a partner or service provider whose operational disruption has a significant structural impact on my business?</li>
</ul>
<p style="text-align: justify;"><strong>E.BOUET:</strong> The growing dependence on third parties has noy yet been fully recognized as a major risk. The associated scenarios are not sufficiently integrated into strategic priorities, leading to a lack of investment in preparedness.</p>
<p> </p>
<h4 style="text-align: justify;"><strong><u>Will financial entities be ready by January 17, 2025?</u></strong></h4>
<p style="text-align: justify;"><strong>E.BOUET:</strong> It is unlikely that all companies will be fully ready by January. The market as a whole faces delays, although significant progress has been made. For instance, most of the normative documents required for compliance have been finalized, and priorities have been aligned with risk management needs.</p>
<p style="text-align: justify;"><strong>D.LACHIVER: </strong>Indeed, January 17, 2025, will mark more of a milestone than a conclusion. Most operational projects, such as third-party management, remain to be addressed and will require ongoing effort.</p>
<p> </p>
<h4 style="text-align: justify;"><strong><u>What are the main challenges in implementing DORA?</u></strong></h4>
<p style="text-align: justify;"><strong>E.BOUET:</strong> Initially, the main challenge was mobilizing a wide range of stakeholders: cybersecurity, risk management, procurement, legal, business, IT… While the topics addressed by DORA were already familiar to these teams, the regulation raises expectations and introduces additional requirements to roles thar are already well-defined.</p>
<p style="text-align: justify;"><strong>D.LACHIVER: </strong>Historically, these areas have often been handled in a fragmented, siloed manner. However, DORA demands significant and measurable progress in resilience, which requires a more coherent and integrated approach. Today, two key priorities stand out:</p>
<ul style="text-align: justify;">
<li><strong>Third-party management</strong>, which represents a massive challenge.</li>
<li><strong>Threat-Led Penetration Testing (TLPT)</strong>, an ambitious but complex novelty.</li>
</ul>
<p> </p>
<h4 style="text-align: justify;"><strong><u>Why is third-party management such a significant challenge?</u></strong></h4>
<p style="text-align: justify;"><strong>E.BOUET:</strong> Third-party management (TPRM) is one of the key challenges posed by DORA. Third parties are everywhere, but they are often poorly managed. It’s not always clear whether they are critical or not, and relationships often lack proper structure. Managing reliance on critical third parties is common sense, but it goes far beyond contractualization: organizations need to identify their third parties, assess their criticality, and manage this dependency operationally, a challenge for many.</p>
<p style="text-align: justify;"><strong>D.LACHIVER: </strong>Historically, this has been a neglected area, often handled in silos by procurement, cybersecurity, business continuity, and other functions. There is a lack of a comprehensive view of third-party risks. DORA’s aims is precisely to move beyond this fragmented approach and build a cohesive end-to-end management framework throughout the contract lifecycle.</p>
<p> </p>
<h4 style="text-align: justify;"><strong><u>What does “testing exit strategies” with critical third parties mean?</u></strong></h4>
<p style="text-align: justify;"><strong>D.LACHIVER: </strong>Testing exit strategies means anticipating how an organization would respond if a third party’s services were interrupted, whether voluntarily or involuntarily. For example, in the case of a cyberattack on a service provider, it may be necessary to sever the relationship to protect the organization’s own information systems.</p>
<p style="text-align: justify;"><strong>E.BOUET:</strong> Tabletop exercises help assess reliance on third parties and theoretically simulate the procedures to follow in different scenarios. They also encourage organizations to rethink their relationships with certain providers, particularly those unable to align with DORA’s requirements.</p>
<p> </p>
<h4 style="text-align: justify;"><strong><u>What makes TLPT (<em>Threat-Led Penetration Testing</em>) a specific challenge?</u></strong></h4>
<p style="text-align: justify;"><strong>D.LACHIVER: </strong>TLPT is one of the key innovations introduced by DORA. It involves threat-led penetration tests guided by the DORA regulation, the theoretical TIBER framework and adapted by national authorities. While the theoretical framework is well-defined, practical implementation remains challenging, as these tests are not yet common in the financial sector. Their limited frequency (one test every three years) and the regulator&#8217;s resources reduce the immediate urgency, but they are crucial for strengthening resilience.</p>
<p style="text-align: justify;"><strong>E.BOUET:</strong> These tests still raise many questions, as they require a new approach for some players, especially those less experienced with this type of exercise. Currently, we are in a waiting phase, with a few dry-run initiatives underway. The actual implementation will depend on the regulator&#8217;s planning and the lessons learned from the first fully executed TLPTs in the coming months.</p>
<p> </p>
<h4 style="text-align: justify;"><strong><u>How can DORA transform IT risk governance?</u></strong></h4>
<p style="text-align: justify;"><strong>D.LACHIVER: </strong>DORA promotes a unified approach to IT risk management by breaking down silos between various functions, such as cybersecurity, business continuity, and procurement. This involves:</p>
<ul style="text-align: justify;">
<li><strong>Harmonizing key terminologies and concepts</strong> (for example, ensuring that the concept of criticality is understood consistently across all functions) to streamline and improve interactions with business units.</li>
<li><strong>Implementing structural changes</strong> (such as adopting a CSO model – Chief Security Officer) to establish unified governance across functions, enabling more effective and coherent decision-making.</li>
</ul>
<p> </p>
<h4 style="text-align: justify;"><strong><u>What are the concrete requirements to comply with DORA by January 17, 2025, and beyond?</u></strong></h4>
<p style="text-align: justify;"><strong>E.BOUET: </strong>The first major expectation for January 17 is the ability to identify a major incident according to DORA’s criteria and notify the regulator. This requires well-defined operational processes to ensure rapid detection and reporting. This requirement is justified, given the history of IT and security teams in a sector accustomed to managing critical incidents.</p>
<p style="text-align: justify;"><strong>D.LACHIVER: </strong>Then, by April 30, 2025, financial entities will need to produce a register of information on their third parties. I believe organizations will be able to provide such a register by this date. However, additional work will likely be needed to improve its quality and completeness.</p>
<p style="text-align: justify;"><strong>E.BOUET: </strong>Finally, throughout 2025, what matters is demonstrating that entities are making progress. Regulators expect projects to be initiated, identified gaps to be gradually addressed, and tangible advancements to be made. The key is to have a clear and structured roadmap to meet DORA’s expectations.</p>
<p> </p>
<h4 style="text-align: justify;"><strong><u>What are the long-term benefits expected from DORA?</u></strong></h4>
<p style="text-align: justify;"><strong>D.LACHIVER: </strong>DORA has the potential to create a virtuous cycle by strengthening risk management, business alignment, and operational resilience within the sector. It encourages entities to go beyond compliance and integrate these priorities into their overall strategy.</p>
<p style="text-align: justify;"><strong>E.BOUET: </strong>One key aspect is the reaffirmed responsibility of executive leadership. Their involvement, particularly through regular risk validation, enhances overall awareness and drives the investments necessary to improve resilience.</p>
<p style="text-align: justify;"><strong>D.LACHIVER: </strong>This connection between operational teams and leadership aligns strategic and operational priorities, fostering a culture of continuous improvement. It also empowers IT risk teams and supports the transformation of organizations toward greater digital resilience.</p>
<p> </p>
<p style="text-align: justify;">For any support in achieving DORA compliance, you can contact:</p>
<ul style="text-align: justify;">
<li><a href="mailto:damien.lachiver@wavestone.com">damien.lachiver@wavestone.com</a></li>
<li><a href="mailto:etienne.bouet@wavestone.com">etienne.bouet@wavestone.com</a></li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/dora-the-challenges-of-digital-resilience-in-the-financial-sector-by-2025/">DORA – The Challenges of Digital Resilience in the Financial Sector by 2025</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/01/dora-the-challenges-of-digital-resilience-in-the-financial-sector-by-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Citalid &#124; Shake Up &#8211; Cyber Threat Intelligence for optimizing cyber budgets</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/cyber-threat-intelligence-for-optimizing-cyber-budgets/</link>
		
		<dc:creator><![CDATA[Maxime Cartan]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 17:48:01 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[citalid]]></category>
		<category><![CDATA[CTI]]></category>
		<category><![CDATA[FAIR]]></category>
		<category><![CDATA[finance]]></category>
		<category><![CDATA[investment]]></category>
		<category><![CDATA[optimization]]></category>
		<category><![CDATA[quantification]]></category>
		<category><![CDATA[shake'up]]></category>
		<category><![CDATA[startups]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14585</guid>

					<description><![CDATA[<p>Citalid is a French tech startup founded in 2017 that provides CISOs and Risk Managers with a software for quantifying and managing cyber risk. Citalid&#8216;s highly innovative technology enables its clients to benefit from simulations, metrics and recommendations that are...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/cyber-threat-intelligence-for-optimizing-cyber-budgets/">Citalid | Shake Up &#8211; Cyber Threat Intelligence for optimizing cyber budgets</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><em>Citalid</em></strong><em> is a French tech startup founded in 2017 that provides CISOs and Risk Managers with a software for quantifying and managing cyber risk. <strong>Citalid</strong>&#8216;s highly innovative technology enables its clients to benefit from simulations, metrics and recommendations that are directly operational to optimize their ROSI (Return On Security Investments) thanks to its unique ability to cross-reference technical, contextual and financial data. <strong>Citalid</strong> is part of Wavestone&#8217;s startup acceleration programme, Shake&#8217;Up.</em></p>
<p>&nbsp;</p>
<p><img fetchpriority="high" decoding="async" class="size-full wp-image-14516 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2.png" alt="" width="1082" height="378" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2.png 1082w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2-437x153.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2-768x268.png 768w" sizes="(max-width: 1082px) 100vw, 1082px" /></p>
<p><strong><em> </em></strong></p>
<p>For the time being less well known and less widespread in Europe than its sisters <strong>EBIOS RM &amp; Mehari</strong> (among others), the FAIR risk analysis method nevertheless fills the gaps left by other approaches. Already highlighted by <strong>Wavestone</strong> in a <a href="https://www.riskinsight-wavestone.com/en/2020/10/cyber-risk-quantification-understanding-the-fair-methodology/">previous article</a>, its main assets lie in the perspective of data usually ignored by traditional risk analysis on the one hand, and on the other hand in its ability to generate metrics dedicated to strategic decision support and adapted to the language of decision-makers, such as <em>Value at Risk</em>.</p>
<p>Nevertheless, as this same article points out, this approach is a priori undermined by time, human resources and the multiplicity of knowledge required to carry it out. Therefore, although the concept is attractive, is it realistic to deploy the <strong>FAIR</strong> method? How can its nomenclature be translated operationally? What about its automation? More generally, does it provide enough added value to justify its use?</p>
<p>Despite its undeniable effectiveness in quantifying risks, such an approach requires both an appropriate technical system and functional support, which is essential in the collection of data. Quantifying its potential financial losses in the event of a cyber incident is not enough: it is also necessary to have the capacity to put them into perspective in an ecosystem of polymorphous and evolving threats. This is <strong>Citalid</strong>&#8216;s innovation: to be able to carry out a dynamic quantification of cyber risk for decision-makers, by automatically crossing the reality of the threat that weighs on a company, its business context and its defensive maturity. And, above all, not to stop at analysis alone: to generate an action plan that reflects the optimal balance between efficiency and profitability.</p>
<p>&nbsp;</p>
<h2>Empiricism as FAIR&#8217;s automation framework</h2>
<h3>Contextualizing the external environment</h3>
<p>As in any analysis, the objectivity of the observation increases with the number of parameters considered. If it is frequent, even usual, that the internal context of an information system is studied, it is rarer for the analyst to be interested in all the external dynamics that can influence the analysis. These dynamics, which can take on a variety of realities as we shall see, can however strongly influence the frequency and intensity of cyber threats. However, it is difficult to draw up an exhaustive typology of these data, and taking them into account is almost systematically a mixture of two ingredients:</p>
<ul>
<li>Curiosity and the logical mind of the analyst (<em>in fine</em>, his capacity to project himself into / adapt to a context);</li>
<li>The good visibility of the person(s) responsible for the system and the activities within their perimeters;</li>
</ul>
<p>Among the exogenous criteria that can influence the risk analysis are: the competitive environment, the company&#8217;s position on its market, its geographical locations, geopolitical dynamics, internal policies, the normative framework, the socio-economic climate, the diversity of its activities, etc.</p>
<p>However, it would be easy to get lost in this labyrinth of criteria. It is therefore necessary to support the decision-maker in the creation of a cartography of its environment in the most comprehensive sense of the term. It is therefore through exchange and collective intelligence that a first level of filter is created, by drawing up a perimeter of analysis that is both structured and flexible.</p>
<p>While defining the perimeter of the analysis makes it possible to establish a coherent framework, a multitude of risks can nevertheless be inserted into it. It should also be noted that the defined perimeter can itself be a component of a broader scope of analysis. In this sense, the various perimeters determined can be articulated in the form of a hierarchical tree, often tracing the internal organisation of the company (see diagram below).</p>
<p>&nbsp;</p>
<p><img decoding="async" class="size-full wp-image-14452 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1.png" alt="" width="601" height="433" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1.png 601w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-265x191.png 265w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-54x39.png 54w" sizes="(max-width: 601px) 100vw, 601px" /></p>
<p>&nbsp;</p>
<p>Thus, in the example opposite, the group level is represented by the &#8220;<em>Energy Company</em>&#8221; perimeter, which aggregates the risk of all its &#8220;children&#8221; perimeters (here its &#8220;<em>business units</em>&#8220;). However, each perimeter has its own context and risks. This tree structure plays a predominant role in the construction of a relevant library of related risk scenarios. One could easily be tempted to go back up to the group level to globalize its scenarios, but this often <em>de facto</em> deteriorates the granularity, and therefore the quality, of the analysis due to the particularities of each perimeter.</p>
<p>&nbsp;</p>
<h3>Build a relevant library of scenarios</h3>
<p>This framing work therefore conditions the choice and parameterisation of risk scenarios. This parameterisation and the resulting calculation is made complex by the number of criteria to be taken into account and the uncertainty inherent in cyber risk. Without going back over the FAIR methodology already discussed on this blog, it can therefore be long and tedious to build a large number of scenarios of risk while considering the specificities of each perimeter. A solution to this problem therefore lies in the construction of a library of scenarios that can be adapted to each business context and encompass several types of threats. Based on operators&#8217; experience and accumulated data, Citalid now has several libraries of scenarios and losses, listed in &#8216;Business&#8217; directories. These are easily exportable on the platform, while retaining a degree of flexibility that allows the scenarios indicated to adapt very precisely to the business context. Following on from the use-case used above, the image below illustrates a &#8216;fictitious&#8217; library of scenarios related to the Energy sector. As this is a &#8216;Demo&#8217; version, this panel is however not exhaustive.</p>
<p>&nbsp;</p>
<p><img decoding="async" class="size-full wp-image-14454 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2.png" alt="" width="1862" height="629" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2.png 1862w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-437x148.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-768x259.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-1536x519.png 1536w" sizes="(max-width: 1862px) 100vw, 1862px" /></p>
<p>&nbsp;</p>
<p><strong>Citalid</strong>&#8216;s library of scenarios is thus part of a double dynamic that at first sight seems contradictory: capable of meeting the requirements of efficiency and automation of the analysis, it remains flexible enough to be implemented with precision and relevance in any context. Each typology of threat, combined with the characteristics of the perimeter analyzed, determines the frequency of occurrence and the financial losses, whether primary or secondary, inherent in the chosen scenario. In the case of an economic espionage scenario, for example, it is safe to say that there will systematically be a loss related to the remediation of the incident, a loss related to the exfiltration of data and a loss resulting from damage to the entity&#8217;s reputation if the attack were to become public.</p>
<p>In addition, for the quantitative parameters (frequency of the threat, IS resistance to the attack, frequency and magnitude of losses, targeted assets, etc.) of the scenario to remain relevant, they must be profiled on the characteristics of the target perimeter. Therefore, Citalid&#8217;s expertise lies in part in defining and keeping up to date &#8211; cyber threats and available abacus evolving rapidly &#8211; a library of <em>templates</em> from which the analyst must be able to draw to easily and automatically initiate his risk assessment.</p>
<p>Accumulating data on cyber threats and their impacts therefore makes it possible to calibrate scenario &#8220;templates&#8221; and thus gradually automate the <strong>FAIR</strong> analysis. By combining threat intelligence, technical models and abacuses from open source analysis and customer feedback to assist analysts, <strong>Citalid</strong>&#8216;s award-winning innovation platform leverages collective intelligence to ensure scientific rigor and unparalleled accuracy in quantifying financial losses.</p>
<p>&nbsp;</p>
<h2>Putting risks in perspective with the defense ecosystem</h2>
<h3>The CISO as pilot of his IS</h3>
<p>In terms of cybersecurity management, the CISO is, unsurprisingly, the focal point of the system. To do this, he must be able to quickly visualize the entire panorama of cyber risks weighing on his IS &#8211; a &#8220;cockpit&#8221; view, in order to then inflect orientations on a larger scale. He therefore needs a GPS to guide him in his decisions: how to take his IS from point A (current risk situation) to point B (desired risk exposure), taking care to optimize his trajectory (cyber investments) while avoiding obstacles (threats) that appear dynamically along the way.</p>
<p><strong> </strong></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14456 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3.png" alt="" width="1877" height="818" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3.png 1877w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-768x335.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-1536x669.png 1536w" sizes="auto, (max-width: 1877px) 100vw, 1877px" /></p>
<p style="text-align: center;">Example of a <em>risk dashboard</em>, illustrating the ISSM&#8217;s cockpit vision<strong>. </strong></p>
<p>&nbsp;</p>
<p>Once the various scenarios have been established and the quantification carried out, the difficulty lies in the possibility of translating these &#8220;raw&#8221; risks into a strategic roadmap. The first step is to put these risks into perspective by comparing them with the current defensive infrastructure of the IS. Knowledge of its environment is a prerequisite for the CISO&#8217;s analysis. All the more so as, in terms of defensive infrastructure, two major options exist and sometimes complement each other: opting for a logic of defensive maturity based on compliance with one or more reference systems (ISO 27k, NIST, CIS, etc.) or carrying out &#8211; and then comparing with peers &#8211; an inventory and evaluation of all the security solutions deployed on the perimeter.</p>
<p>&#8220;A permanent confrontation between theory and experience is a necessary condition for the expression of creativity&#8221; [1]. 1] The aphorism could not be more revealing of the method described here: that of the confrontation between theory (raw risks) and experience (evaluation of defensive maturity based on a multitude of feedback and incidents) as a necessary condition for the creation of a roadmap. The confrontation makes it possible to obtain the &#8220;net&#8221; risk with which the company is really confronted, lower than the gross risk since it considers the defenses of the IS.</p>
<p>Fueled by &#8220;actionable&#8221; metrics, the decision-maker will now be able to have visibility on his real risk in his own language, and consequently be able to arbitrate and determine its destination &#8211; his B point &#8211; according to his appetite for risk and the company&#8217;s policy. Which scenarios should be dealt with by investing to reduce the associated risk? Which ones should be maintained, given their low economic impact? Which ones to share with a cyber insurer? However, as we will see, the modelling of net risk described in the previous paragraph requires a consequent knowledge of the threat ecosystem in which it is embedded.</p>
<p>&nbsp;</p>
<h3>Cyber Threat Intelligence, a catalyst for optimal risk management</h3>
<p>One of the main shortcomings of risk management in cybersecurity is the difficulty in deploying an approach that reflects the reality of the risk &#8220;on the ground&#8221;. The CISO or Risk Manager must therefore also have a radar to dynamically detect obstacles in his path (threats) and, as far as possible, anticipate and prevent impediments.</p>
<p>Thus, just as a rock slide on a road is the result of a conjunction of multiple factors (weather conditions, geological characteristics, human activity, etc.), an attacker&#8217;s action depends on many elements. These elements should, as far as possible, be observed and included in the risk analysis. Consequently, Cyber Threat Intelligence (CTI), a discipline dedicated to the study and contextualization of attackers&#8217; operating modes, enriches and energizes traditional risk analyses. The mastery and inclusion of this discipline in cyber risk management is one of Citalid&#8217;s major differentiators and permeates its entire corporate culture.</p>
<p>How can CTI data be operationally and sustainably combined with the risk calculations announced in the previous paragraph? We can get an intuition of this by noting the following three facts:</p>
<ul>
<li>The company&#8217;s market segment helps to determine the operating methods most likely to be of interest to the company;</li>
<li>The attack techniques used by these operating methods and their centers of interest within the targeted information systems make it possible to identify the most critical assets and to know how to improve their protection;</li>
<li>By comparing again the CTI data defined in the two previous points with its defensive infrastructure, the entity can identify which scope (in the sense of a security repository) or which defense solution is not cost-effective enough (reduction of the risk in relation to the cost).</li>
</ul>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14458 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4.png" alt="" width="1190" height="519" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4.png 1190w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-768x335.png 768w" sizes="auto, (max-width: 1190px) 100vw, 1190px" /></p>
<p>&nbsp;</p>
<p>The diagram above represents a concrete example of the application of CTI to risk analysis, acting as a real catalyst for drawing up guidelines. A modus operandi is technically expressed through its &#8220;Kill Chain&#8221;, i.e. the sequence of attack techniques it uses to achieve its objective. Citalid has mapped the links between these TTPs (Tactics-Techniques-Procedures) and specific points of different security reference systems (here the CIS20), the latter being the defensive measures best adapted to the TTPs defined in the diagram. On the first line, for example, the CIS 16.3 measure (among others) is sufficiently deployed at the target entity to limit the impact of the TTPs indicated at this stage of the Kill Chain. On the second line, on the other hand, the opposite occurs: the CIS 11.1 measure is not mature enough to provide effective protection against the sophistication of the attacker.  It is therefore on this line that the defender potentially needs to concentrate.</p>
<p>The last line crystallizes the interests of the enrichment of the analysis by the CTI. The yellow square determines the maturity progression due to the implementation of security solutions relevant to the CIS 11.1 measure (e.g. a network device management system), which are automatically determined and recommended to the user in the case of the Citalid calculation engine. In other words, this differential indirectly expresses a path towards optimal maturity and resilience for this specific scenario, the starting point for the definition of a tailor-made cyber investment strategy.</p>
<p>&nbsp;</p>
<h2>Turning analysis into strategy</h2>
<h3>Formulate a cyber strategy aligned with group objectives</h3>
<p>A successful and relevant risk analysis is characterized by the ease with which the observer can immediately visualize how to translate data into action. It must therefore be intelligible and coherent for the recipient, whatever his or her technical level and position in the organization chart. In other words, risk analysis alone is insufficient: it can only be truly useful if it gives rise to a long-term strategy.</p>
<p>This vision, strongly oriented towards the most strategic levels, marks the very DNA of Citalid. Behind the calculation of the risks (raw and real) and the most effective recommendations (referential as solutions) thanks to CTI, the objective is to be able to propose an indicator of the return on investment (ROI) of the security solutions. By visualizing his initial position (A), his desired position (B) and the different possible paths (defense investments), the final decision-maker must be able to compare the ROI of the different options and draw up a cyber investment strategy in line with his budget and real objectives.</p>
<p>Moreover, the objective behind this singular approach is twofold. Firstly, it is a question of accompanying our clients in the definition of their cyber security strategies and in the application of a co-constructed action plan, aimed at compensating for the flaws made visible by the analysis. However, in order to keep this strategy realistic, it is essential to ensure that it can be part of a global dynamic and therefore quickly assimilated by a higher hierarchical body (COMEX). To meet this need, Citalid has refined its service so that it is in line with the realities of the CISO:</p>
<ul>
<li>By adapting the platform in terms of ergonomics, level of technicality and language, so that the dashboards are transparent and easy to interpret;</li>
<li>By assisting our clients in defining budgets and in their legitimization and justification (advocacy) in view of the reality of the threat.</li>
</ul>
<p>By aligning cybersecurity strategies with broader investment strategies, in line with the objectives set by the group, Citalid intends to guarantee and reinforce the predominant role of the CISO in steering cyber resilience.</p>
<p>&nbsp;</p>
<h3>Capitalizing on the approach through the deployment of a risk index</h3>
<p>The major advantage in choosing to take a global approach to security lies in its potential for aggregating risk at any level (group, business unit, application, project, etc.) and for standardization (comparison between perimeters and peers). Like rating agencies, this &#8220;scoring&#8221; of the entity, which takes into account not only its level of maturity on its exposed assets but also its risk management strategy, internal organization, the reality of the threat, its own business context, etc., can be transformed into a global risk index, symbol of the entity&#8217;s resilience and monitored by its management. This is truer since a scientific approach based on many heterogeneous parameters presents a desirable objectivity, for the entity as well as for its partners and collaborators.</p>
<p>This time, it is no longer just a question of positioning oneself in one&#8217;s environment, but of positioning oneself in relation to possible peers (comparison) and partners (guarantees). A risk index reflecting high resilience and sound risk management will ensure that its suppliers or end customers have optimal security and respect for their data, while reassuring investors that their funds are being used correctly.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14460 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5.png" alt="" width="1387" height="606" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5.png 1387w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-768x336.png 768w" sizes="auto, (max-width: 1387px) 100vw, 1387px" /></p>
<p style="text-align: center;">Examples of risk indices produced by <strong>Citalid</strong>: in this case, a &#8216;Cyber Weather&#8217; that identifies variations in a client&#8217;s media exposure.</p>
<p>&nbsp;</p>
<p>Other players could also benefit from such an index: the insurance industry, and cyber-insurers. The quantification of cyber risk remains an obstacle for them, as traditional actuarial approaches are limited by the lack of historical cyber security data. Citalid&#8217;s model, presented here, combines threat expertise, advanced probabilistic models and innovative attack-defense simulations to overcome this lack of data. Our scoring and metrics, based on risks rather than on a simple level of defense, allow us to refine the insurance model to be as close as possible to the real needs of our clients.</p>
<p>Thus, quantifying cyber risk and the return on investment of security solutions is one of the biggest challenges facing today&#8217;s CISOs, Risk Managers and insurers. Through its innovative approach, Citalid responds to this need to reposition cyber security at the heart of corporate strategies and to optimize its action plans and investments.</p>
<p><sup>[1]</sup> Attributed to Pierre Joliot-Curie</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/cyber-threat-intelligence-for-optimizing-cyber-budgets/">Citalid | Shake Up &#8211; Cyber Threat Intelligence for optimizing cyber budgets</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
