<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Maturity - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/maturity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/maturity/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 30 May 2023 06:46:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Maturity - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/maturity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>[INTERVIEW] IAM Maturity Assessment &#8211; Where do you stand and why is it crucial?</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/05/interview-iam-will-no-longer-hold-any-secrets-for-you-thanks-to-the-iam-framework/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/05/interview-iam-will-no-longer-hold-any-secrets-for-you-thanks-to-the-iam-framework/#respond</comments>
		
		<dc:creator><![CDATA[Anatole Catherin]]></dc:creator>
		<pubDate>Mon, 22 May 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Framework]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Maturity]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20502</guid>

					<description><![CDATA[<p>For over twenty years, Wavestone has been supporting clients develop and strengthen their Identity and Access Management programs. Within this area, Wavestone has observed  that organizations do not always approach IAM in a comprehensive manner. While Security is an obvious...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/05/interview-iam-will-no-longer-hold-any-secrets-for-you-thanks-to-the-iam-framework/">[INTERVIEW] IAM Maturity Assessment &#8211; Where do you stand and why is it crucial?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">For over twenty years, Wavestone has been supporting clients develop and strengthen their Identity and Access Management programs. Within this area, Wavestone has observed  that organizations do not always approach IAM in a comprehensive manner. While Security is an obvious dimension covered by IAM, other dimensions (e.g. UX enhancement, internal procedures improvement, etc.) are often overlooked. Additionally, accurately assessing  maturity in IAM is complex &#8211; market standards, such as NIST, does not allow evaluation across all issues.</p>
<p style="text-align: justify;">To dive deeper into IAM, our experts have created an IAM maturity assessment tool.</p>
<p style="text-align: justify;">Interview with Anatole CATHERIN, Manager and IAM expert for almost 10 years at Wavestone.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h1 style="text-align: justify;">Hi Anatole, thanks for your time! First of all, can you explain what IAM really is?</h1>
<p style="text-align: justify;">Identity and Access Management (IAM) is a discipline that sits at the crossroads of three worlds:</p>
<ol style="text-align: justify;">
<li>Cybersecurity strengthening: It comprises managing identities, the rights granted to these identities and user access to company resources. Each user has access confined to the limits of their role within an organization. To successfully achieve this, <strong>organizations need to know who, within their information system, can perform which actions and why</strong>. IAM is therefore an essential component of cybersecurity, especially during implementation of a Zero Trust policy.</li>
<li>Business enablement: Identity and Access Management is also a business enabler and a <strong>facilitator for successful digital transformation within organizations as it increases operational process efficiency to </strong>employees and customers. For example, IAM enables the control and fluidity of arrivals, departures or mobility by ensuring that new employee benefit from accurate accesses. In case of subsequent mobility or departure, the relevant accesses are removed and no information is lost.</li>
<li>UX enhancement: <strong>IAM facilitates a seamless user experience for employees</strong> within an organization. Moreover, the best IAM systems operate behind the scenes to enable work on arrival and enhanced connectivity based on security requirements.</li>
</ol>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Why is it so difficult to build an IAM system that works?</h1>
<p style="text-align: justify;">As you can imagine, the challenge and complexity of IAM is striking (and maintaining) the balance between security and fluidity of navigation.</p>
<p style="text-align: justify;">To successfully implement IAM, it is important to assess the current state. With good reason, <strong>clients have difficulty measuring the effectiveness of their existing IAM system</strong>. There is no dedicated benchmark in the market evaluation.. The NIST pillars are high-level and do not cover all the challenges related to IAM; the existing benchmarks only deal with the cybersecurity aspect of IAM and ignores the impact on the operational efficiency of an organization&#8217;s internal procedures and the fluidity of the user experience.</p>
<p style="text-align: justify;">The goal in creating the IAM Framework was to create a <strong>framework that evaluates the entire discipline and that can be used to build an efficient roadmap.</strong></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Can you tell us a bit about the IAM maturity assessment tool?</h1>
<p style="text-align: justify;"><strong>More than a tool, it&#8217;s a framework and a tool-based methodology</strong> that supports customers and provides them an overview of their IAM maturity.</p>
<p style="text-align: justify;">The Framework enables the understanding of an<strong> organization’s current state (</strong>which IAM perimeters are deployed (or not), which IAM axes require further work, etc.). It provides an overview, with the right framework, the right angle and the right resolution to cover all IAM topics.</p>
<p style="text-align: justify;">The maturity assessment consequently <strong>allows the prioritization of workstreams that culminates in an IAM action</strong> <strong>plan</strong>!  Thanks to this framework, we can identify the main areas for improvement, while accounting for organizational nuances by introducing the notion of scope.</p>
<p style="text-align: justify;">In short, it meets <strong>three objectives: Evaluate, Improve and Extend </strong>IAM to other perimeters (beyond internal and service providers, with customers or partners). It was intended to be exhaustive to highlight our customers&#8217; shortcomings and subsequently measure their progress and the effectiveness of their transformation program.</p>
<p style="text-align: justify;">Our ambition is to make it <strong>the primary evaluation standard, entirely dedicated to IAM</strong>, with a sufficient level of granularity to cover all issues!</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">How is it structured?</h1>
<p style="text-align: justify;">Concretely, our tool is composed of about fifty questions that cover the <strong>6 IAM themes</strong>:</p>
<ol style="text-align: justify;">
<li>Governance</li>
<li>Identity management</li>
<li>Entitlement management</li>
<li>Access control</li>
<li>Privileged access management</li>
<li>Reporting and controls</li>
</ol>
<p style="text-align: justify;">It can be used in several cases, here are 2 examples:</p>
<table>
<tbody>
<tr>
<td style="background-color: #503078; width: 601px;" width="601">
<p><span style="color: #ffffff;"><u>Use case 1: </u></span></p>
<p><span style="color: #ffffff;">During an audit or (pre)scoping mission, i.e. when you do not know your level of maturity in terms of access and identity management.</span></p>
<p><span style="color: #ffffff;">In this case, the questions allow you to identify areas for improvement in order to launch IAM evolution projects.</span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<table>
<tbody>
<tr>
<td style="background-color: #503078; width: 601px;" width="601">
<p><span style="color: #ffffff;"><u>Use Case 2: </u></span></p>
<p><span style="color: #ffffff;">As part of a transformation program (medium or long term). This type of maturity assessment can be relevant at the halfway point of a transformation program in order to determine the progress made and to redirect the strategy if necessary.</span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Can you tell us about the last time you used it with a concrete example?</h1>
<p style="text-align: justify;">We tested the questionnaire in the field through several missions, during which the use of the IAM Framework helped accelerate the process. These missions comprised:</p>
<ul style="text-align: justify;">
<li>the definition of an IAM roadmap for a large energy company</li>
<li>the framing of a migration to an IAM tool for a banking group, which allowed the measurement of gaps between their existing solution and the new one</li>
<li>IAM maturity assessment for an insurance company, to identify friction points and areas for improvement and to establish a roadmap</li>
</ul>
<p style="text-align: justify;">For these three projects, the assessment grid made it possible to identify all addressable topics (regardless of whether the client was aware of them at the outset) in order to provide an actionable roadmap covering all IAM issues. In other words, the Framework can be used as an analysis framework for the implementation of a project.</p>
<p style="text-align: justify;">We plan to launch new missions on the subject and we are looking forward to supporting new customers in their journey to improve their IAM structure!</p>
<p> </p>
<h1 style="text-align: justify;">A final word?</h1>
<p style="text-align: justify;">I will end by reminding you of the key components of the Framework:</p>
<ul style="text-align: justify;">
<li><strong>It is “ready to use”</strong>: the fifty questions encompassed in the framework designed by Wavestone experts covers all IAM topics</li>
<li>It offers a <strong>standardized and formalized vision of its maturity</strong> on the subject of access and identity management: this assessment is also an opportunity to involve all the key players impacted by IAM: cyber teams, IT teams, internal audit teams and business teams,</li>
<li>It <strong>facilitates the prioritization of actions</strong> within a transformation program:as explained above, it can be used at different times and can therefore be used as a support for a broader reflection,</li>
<li>Finally, <strong>it is a flexible means of use:</strong> It can be used at a very high level (a strategic level) or to develop very specific actions.</li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><strong>Want to evaluate yourself? Please contact us!</strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/05/interview-iam-will-no-longer-hold-any-secrets-for-you-thanks-to-the-iam-framework/">[INTERVIEW] IAM Maturity Assessment &#8211; Where do you stand and why is it crucial?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/05/interview-iam-will-no-longer-hold-any-secrets-for-you-thanks-to-the-iam-framework/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>One month to assess your cybersecurity posture!</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/one-month-to-assess-your-cybersecurity-posture/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/one-month-to-assess-your-cybersecurity-posture/#respond</comments>
		
		<dc:creator><![CDATA[Anthony GUIEU]]></dc:creator>
		<pubDate>Mon, 16 Jan 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[Assessment]]></category>
		<category><![CDATA[CyberBenchmark]]></category>
		<category><![CDATA[Maturity]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19438</guid>

					<description><![CDATA[<p>Regularly rethinking your cyber strategy is a must for cybersecurity teams. Changes in the threat, regulations, business priorities, etc., necessitate an in-depth review of the action plan at least once every three years, or yearly, if necessary. To accomplish this,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/one-month-to-assess-your-cybersecurity-posture/">One month to assess your cybersecurity posture!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Regularly rethinking your cyber strategy is a must for cybersecurity teams. Changes in the threat, regulations, business priorities, etc., necessitate an in-depth review of the action plan at least once every three years, or yearly, if necessary.</p>
<p style="text-align: justify;">To accomplish this, you must understand your starting point and your market position. Wavestone&#8217;s cybersecurity maturity assessment framework, which currently has the support of over 100 international organisations, was developed with this conviction.</p>
<p style="text-align: justify;"><strong><em>Discover how the CyberBenchmark works with Anthony GUIEU, the Cybersecurity Manager at Wavestone.</em></strong></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Hello Anthony. As a start, can you present CyberBenchmark in one sentence?</h2>
<p style="text-align: justify;">The CyberBenchmark is a comprehensive tool that allows companies to assess their level of cybersecurity, position themselves in relation to the market, and establish a roadmap- thanks to a questionnaire and a database of nearly 100 customers worldwide.</p>
<p> </p>
<h2 style="text-align: justify;">Why did you create the CyberBenchmark when there are already many frameworks in the market?</h2>
<p style="text-align: justify;"><strong>We created the CyberBenchmark because many of our clients were concerned about where they stood in relation to the market.</strong> Historically, our clients were looking for absolute ratings against known frameworks such as NIST or ISO. But now, they are very much interested in knowing their relative position within their ecosystem. Our CyberBenchmark allows them to deal with both of these approaches simultaneously.</p>
<p style="text-align: justify;">CyberBenchmark also enables to come up with slightly different angles of attack: there are issues that our clients are not mature as per the market and prioritising these actions can make them progress. On the other hand, there are areas where they are not good and the market is also not mature, here the subject&#8217;s urgency must be put in context. Companies such as Gartner and Forrester provide general trends on major cyber issues, to which we add a <strong>concrete perspective based on our field observations with clients.</strong></p>
<p style="text-align: justify;">As soon as we built the CyberBenchmark, we realized that numerous competitors offer their own augmented versions of cyber security questionnaires. <strong>Our real added value is the market comparison: to date, nearly 100 clients have trusted us and been evaluated using this reference framework!</strong></p>
<p> </p>
<h2 style="text-align: justify;">How does the CyberBenchmark work?</h2>
<p style="text-align: justify;">To have a coherent framework, we based ourselves on the existing frameworks, i.e., the security standards as per the market: ISO 27001/2, NIST, etc. This was necessary because our clients used these standards for assessing themselves. We <strong>added a questionnaire with our own feedback from the field</strong> to refine the maturity levels by theme. </p>
<p style="text-align: justify;"><strong>One of the added values of the CyberBenchmark is the granularity of the evaluation.</strong> It allows precise perimeter measurement in relation to their level of maturity. In concrete terms, it is possible to distribute the level of maturity for a given question with different levels: for example, 30% level 2, 60% level 3 and 10% level 4, which may be due to heterogeneous perimeters, initiatives in progress, etc. This <strong>enables us to quantify the value of projects that take a longer time to complete and are complex to implement over several perimeters</strong>: particularly in large groups by materialising their progress.</p>
<p style="text-align: justify;"><strong>Subsequently, each evaluation gives rise to a report in two parts-</strong></p>
<ul>
<li style="text-align: justify;">One part is for top management with budgetary ratios, human resources, and the level of maturity in relation to international standards.</li>
<li style="text-align: justify;">Second part is for the operational security staff, who identifies good and bad practices as well as the actions to be launched as a priority. The objective is to develop recommendations and concrete measures to elevate the level of the organisation.</li>
</ul>
<p> </p>
<h2 style="text-align: justify;"><strong>When should the CyberBenchmark be used?</strong></h2>
<ul style="text-align: justify;">
<li>In my opinion, this tool will be ideal for an organisation that wishes to rapidly identify its cybersecurity priorities</li>
<li><strong>The first results are quick</strong>: within a month itself, we were able to produce a deliverable for the Executive Committee that included specific action proposals</li>
<li>It is one of the few tools in the market that offers a <strong>comparison with competitors</strong></li>
<li>Unlike the traditional frameworks, our questionnaire addresses both <strong>governance and operational concerns</strong></li>
</ul>
<p><strong>The CyberBenchmark is also adaptable to all requirements and budgets</strong></p>
<ul style="text-align: justify;">
<li>The <strong>&#8220;quick&#8221; approach </strong>requires only a few interviews. It is based on a declarative evaluation to quickly determine the company&#8217;s level of maturity and the projects to be launched</li>
<li>The <strong>&#8220;complete&#8221; approach </strong>is based on an in-depth audit, dozens of interviews, a review of the evidence, and even additional technical tests (intrusion tests, Red Team, etc.)</li>
</ul>
<p> </p>
<h2 style="text-align: justify;"><strong>Can you provide an example of a specific application of the CyberBenchmark?</strong></h2>
<p style="text-align: justify;">To illustrate the &#8220;rapid&#8221; approach, we recently used it to support a large industrial group in <strong>initiating a security process and challenging its executive committee</strong>. After 2 months of work and 5 workshops, we were able to provide a clear vision of the structure&#8217;s cybersecurity level and project a target level for 3 years, which got accepted by the Executive Committee.</p>
<p style="text-align: justify;">In terms of a comprehensive approach, over the last few months, we have been working with a British bank for <strong>assessing its general cybersecurity posture and level of compliance with the reference frameworks</strong>. We mobilised a team of 10 consultants in 3 different countries for conducting more than 50 workshops and collecting evidence. With this we were able to provide concrete and reliable feedback on the level of security as well as for identifying market-related investment priorities. Likewise, these elements are utilised in exchanges with their main regulators.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>A final word?</strong></h2>
<p style="text-align: justify;">Wavestone&#8217;s CyberBenchmark provides a broad view of the market&#8217;s level of maturity while delving deep into its specific technical subjects. This is <strong>what makes it a differentiating asset for our clients, as they could position themselves against competitors within their sector on each of their topics</strong>. The priorities in terms of cybersecurity would then emerge clearly for the client, allowing them for an effective cyber budget. It is a real cyber strategy accelerator, that has been tried and tested by numerous clients!</p>
<p style="text-align: justify;">We can easily generate statistics and trends using CyberBenchmark&#8217;s exclusive data: how many companies have deployed a security tool (EDR, bastion, probes, etc.), where they stand in terms of deployment, who is leading the market, and so on. According to the <a href="https://www.wavestone.com/fr/insight/cyberbenchmark-ou-en-sont-les-grandes-entreprises-francaises/"><strong>latest study on the maturity of French companies</strong></a>, <strong>the general level of maturity on our benchmark based on international standards (NIST CSF Framework and ISO 27001/2) is&#8230; 46%</strong>. Each year, we formalise our market knowledge and forecast strong sector and technical subject trends.</p>
<p style="text-align: justify;">Finally, as you would have understood, the <strong>CyberBenchmark evolves and develops</strong> as it is used by new companies. We now have a database of over 100 companies, which will enable us to open a new category in January: <strong>&#8220;Luxury goods &amp; Retail&#8221;</strong>, with more than ten companies with which we can refine the sector-specific analysis.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">If you are interested in positioning your organisation within the market, please do not hesitate to contact me or one of our experts. We will be able to guide you through this process. <a href="https://www.linkedin.com/in/anthony-guieu-5b699458/"><img decoding="async" class="alignnone  wp-image-19487" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/logo-linkedin-officiel-225x191.webp" alt="" width="31" height="26" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/logo-linkedin-officiel-225x191.webp 225w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/logo-linkedin-officiel-46x39.webp 46w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/logo-linkedin-officiel.webp 635w" sizes="(max-width: 31px) 100vw, 31px" /></a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/one-month-to-assess-your-cybersecurity-posture/">One month to assess your cybersecurity posture!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/one-month-to-assess-your-cybersecurity-posture/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Creating a relationship of trust with the EXCOM: first step, raising awareness!</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/creating-a-relationship-of-trust-with-the-excom-first-step-raising-awareness/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 12:00:11 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Sections]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[EXCOM]]></category>
		<category><![CDATA[How-to]]></category>
		<category><![CDATA[Maturity]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13916</guid>

					<description><![CDATA[<p>The cybersecurity topic requires involvement at all levels of the company, but also and above all with the executive committee! Obviously, management must be an example, but it will also decide on major investments and will know how to unlock...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/creating-a-relationship-of-trust-with-the-excom-first-step-raising-awareness/">Creating a relationship of trust with the EXCOM: first step, raising awareness!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The cybersecurity topic requires involvement at all levels of the company, but also and above all with the executive committee! Obviously, management must be an example, but it will also decide on major investments and will know how to unlock the most complex situations in the company. It is therefore a key issue for all cybersecurity managers to create a lasting relationship of trust with their EXCOM. But it is also a high-risk exercise, which requires a gradual approach and consistency in commitments.</p>
<p>After having made several dozen speeches to executive committees, audit committees and boards of directors, I wanted to share with you the essential steps for advancing the relationship over the long term. The first phase of this trip should make it possible to create an initial contact and raise the EXCOM&#8217;s awareness on cybersecurity issues. First step, awareness! The objective for these sessions is often to manage to attract attention so as to be able to trigger further reflection within the organization. Later on, we will see the following steps: presenting a balance sheet, obtaining a budget, monitoring the progress on the security level&#8230;</p>
<p>&nbsp;</p>
<h2>An essential prerequisite, knowing where you are starting from and who you are going to deal with</h2>
<p>This may seem like a cliché, but it is certainly the most important element before going to meet an executive committee or a board of directors. Thanks to its wide media coverage, cybersecurity is often already present in executives&#8217; minds. But their degree of digital literacy and their level of appetite for the topic can completely change the way the topic is raised. Will it be necessary to be very didactic (going so far as to re-explain the principle of data, applications, if any) or will it be necessary to immediately address complex points such as the latest attacks observed and their methodologies? You would be surprised to see the diversity of levels between companies, but also within the same EXCOM. And it is necessary to interest each of the stakeholders, at the cost of having comments that are not very helpful during the intervention.</p>
<p>It is therefore important to prepare this first meeting by talking with other members of the ECOM their deputies or with people familiar with this forum to determine the tone to be adopted and the level of the speech to be given. Obviously, the operating rules will also have to be known: is it common for questions to be asked as they arise? Can a member be questioned? Should subjects relating to the company be raised from the outset? Plan to clear the ground upstream! And even if there is no perfect recipe, I will give you below the elements I use most often to make these meetings useful and effective.</p>
<p>&nbsp;</p>
<h2>To start, draw the attention by revealing the behind-the-scenes of an attack&#8230;</h2>
<p>The topics quickly follow one another during the EXCOM. The directors think very, very quickly, so it is necessary to be concrete and to give food for thought and experience. The element that I find most effective consists in presenting a recent attack, published in the press or having affected the sector, and deciphering the stakes and the background: what is the timeframe? what motivation for the attackers? what weaknesses in the company? what is the reaction internally? publicly? with the authorities? This will have the effect of mentally projecting the directors concerned into their role as if they were going through the same thing. <a href="https://www.wavestone.com/app/uploads/2019/10/2019-Security-incident-response-benchmark-Wavestone.pdf">We at Wavestone are fortunate enough to frequently manage major cyber crises</a> and we use these elements, both as a benchmark but also by anonymizing them or in agreement with the victims, to give a very concrete meaning to our feedback.</p>
<p>&nbsp;</p>
<h2>Follow-up with a generalization about cybercrime</h2>
<p>An case is good to understand, but it doesn&#8217;t explain everything! After zooming in on a case, it is a question of generalizing it by explaining what are the mainsprings cybercriminality ways of proceeding. We then analyze the motivations of criminal groups, their organizations, but also and perhaps above all how they make money!</p>
<p>&nbsp;</p>
<figure id="post-13920 media-13920" class="align-none"><img fetchpriority="high" decoding="async" class="wp-image-13920 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-1-1.jpg" alt="" width="569" height="332" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-1-1.jpg 390w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-1-1-327x191.jpg 327w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-1-1-67x39.jpg 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-1-1-120x70.jpg 120w" sizes="(max-width: 569px) 100vw, 569px" /></figure>
<p>&nbsp;</p>
<p>For an EXCOM to know that it is a DDoS attack or ransomware that has done damage is of little interest, it is especially important to show them that cybercriminal activities are profitable, even very profitable. We have calculated the ROI of several types of attacks and I can tell you that when you explain a 600% profitable attack like a ransomware, the eyes of the directors are wide open. We then highlight very concretely why their structure could be attacked and especially how much money the criminals would make. This often puts an end to the question &#8220;but why would we be targeted by an attack? We&#8217;re not known/we&#8217;re small/we don&#8217;t do anything strategic&#8221;.</p>
<p>&nbsp;</p>
<h2>Explain the company&#8217;s current situation in concrete terms</h2>
<p>This is the right time to present the company&#8217;s IT posture and its current organization in terms of security. It is then a question of presenting it simply, with clear and meaningful images: are you rather in an old-fashioned &#8220;fortress&#8221; model? Or have you already opened your doors as a result of the digital transformation and have you adopted a porch model where security is reinforced the further you go towards critical systems? This will help to make the situation more concrete.</p>
<p>After this phase of mobilization and explanation, comes naturally the phase of questioning by the members of the executive committee. &#8220;But then, where are we now, or are we facing this risk of a cyberattack? ». Faced with this question, either you are lucky enough <a href="https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/">to have a detailed maturity assessment</a> and you can present it immediately, or you can bring in initial qualitative or even partial quantitative elements and explain that today you need to have more visibility. The elements that speak for themselves are the latest audit reports, the latest incidents, budgetary elements.</p>
<p>&nbsp;</p>
<figure id="post-13917 media-13917" class="align-none"><img decoding="async" class="size-full wp-image-13917 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3.jpg" alt="" width="598" height="461" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3.jpg 598w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3-248x191.jpg 248w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3-51x39.jpg 51w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3-156x121.jpg 156w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/0-3-155x120.jpg 155w" sizes="(max-width: 598px) 100vw, 598px" /></figure>
<p>&nbsp;</p>
<p>If it is difficult at the beginning of the process to talk about the budget and to compare oneself because of a lack of data, it is possible to use a simple and effective indicator, that of your staff dedicated to cybersecurity. We have a database on this point and we can quickly show a EXCOM where it is just by mobilizing its HR. It&#8217;s simple and effective to convince them!</p>
<p>&nbsp;</p>
<h2>Don&#8217;t leave emprty-handed</h2>
<p>The major risk of this awareness is that everything goes well but nothing moves. Indeed, you may have a positive message, &#8220;thank you and see you in a year for an update&#8221;, you will be happy but you will not have helped cybersecurity situation moving forward. It is then necessary to prepare the next step by indicating from this presentation the main points of weakness or strength felt and how you would like to evaluate them more precisely.</p>
<p>Indeed, the second step is often the realization of a dedicated maturity assessment in order to know how to position yourself! If at this point the meeting has taken place, the EXCOM, intrigued and interested in the topic, will want to know more and will give an agreement in principle. Beware that this may not be a budget directly, it will certainly refer you to the CIO or the Risk Director to get it, but with their agreement you will have a great lever to move on to the next step! See you on the next episode.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/creating-a-relationship-of-trust-with-the-excom-first-step-raising-awareness/">Creating a relationship of trust with the EXCOM: first step, raising awareness!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to effectively evaluate your cybersecurity</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/</link>
		
		<dc:creator><![CDATA[Anthony GUIEU]]></dc:creator>
		<pubDate>Tue, 30 Jun 2020 13:00:04 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Analyze]]></category>
		<category><![CDATA[How-to]]></category>
		<category><![CDATA[ISO27k]]></category>
		<category><![CDATA[Level]]></category>
		<category><![CDATA[Maturity]]></category>
		<category><![CDATA[REX]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Roadmap]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13312</guid>

					<description><![CDATA[<p>Security managers often bring us in to evaluate their cybersecurity maturity level. We help firms analyze the return on investment for cybersecurity, properly allocating the budget, comparing level of security to that of others in similar sectors or common standards,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/">How to effectively evaluate your cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Security managers often bring us in to <strong>evaluate their cybersecurity maturity level</strong>. We help firms analyze the return on investment for cybersecurity, properly allocating the budget, comparing level of security to that of others in similar sectors or common standards, and measure exposure to recent attacks.</p>
<p>But these projects are not only the work of systems security managers. These projects also come from executive committees who seek a<strong> 360 view of the security of their institution</strong> to better evaluate potential risk. So, what are key success factors that we have seen in the field?</p>
<p>&nbsp;</p>
<h2>Step 1: Know the purpose and expectations of your evaluation</h2>
<p>Evaluations can be entirely different <strong>levels of depth</strong>. From a high-level interview with the Chief Security officer to an in-depth assessment of the security mechanisms and processes of all the subsidiaries of a multinational group, everyone can choose their areas of focus and advance step-by-step.</p>
<p>Our first advice is to <strong>keep in mind the objectives of your evaluation</strong>. This will allow you to orient yourself toward the right security benchmarks and ultimately define the depth of the evaluation. Do you only want to measure the security maturity of your subsidiary’s information systems or also its efficiency? Perfectly documented security processes and an ISO 27001 certification can unfortunately hide problems on the ground that can expose you to vulnerabilities. It can be judicious to combine a technical test (pentest, red team, etc.) to the evaluation in order to <strong>avoid situations that seem fine on the surface but hide underlying issues</strong>.</p>
<p>&nbsp;</p>
<h2>Step 2: Find and mobilize the right people at the right level, easy to say but harder to do…</h2>
<p>The next difficulty that you can encounter in your assessment is to succeed at meeting the right people. From experience, we advise you to confirm your list of the necessary collaborators as soon as possible.</p>
<p>Logically, this list will certainly depend on the granularity of the analysis but also on the organization of the business. For example, the necessary people will differ if the security staff are at the group level and function as a service center or if they are merged into each entity and service. Consequently, if you want to have a high-level estimate first, it could suffice to only have a half day exchange with the Chief Security Officer, who generally has a sufficient and global vision of the subject.</p>
<p>The second stage of analysis can be performed in gathering information from all actors involved in cybersecurity at the group level. In this group, it can be interesting to meet a large group of people involved in information systems and the cloud.</p>
<p>Finally, when the assessment must be thorough and exhaustive, it becomes necessary to widen the list of collaborators to all of the concerned entities. Obviously, you should expect a larger workload, so do not skimp on preparation and tools to help you in your work. It can also be the right moment to think about your presentation format: face-to-face, distance, strategic, operational, etc.</p>
<p>&nbsp;</p>
<h2>Step 3: Equipment, finding the right balance between too much and not enough</h2>
<p>Choosing the right tools is one of the main assessment challenges that you will face. The more complete the assessment, the more it will require tools that ensure simplification and understanding of the whole project. Indeed, for large evaluations, the <strong>consolidation and restitution of results are two of the great challenges that you will encounter</strong>. In particular, commonly used tools don’t take into account the organizational complexity of large groups or the effectiveness of allocated resources. It is for these reasons that, from our side, we have chosen to develop a specific tool.</p>
<p>A good tool also allows you to position yourself against your competitors and understand your exposure to current attack trends and points where your COMEX is particularly sensitive, ensuring you can legitimize the assessment.</p>
<p>So it begins! It’s time to get your hands dirty and start the work of collecting information! There is a classic phrase that applies to these situations: entirely feasible from a distance. Be aware and transparent about the limits of the exercise: those questioned will sometimes have the impression that the assessment is too theoretical and this is normal, according to their objectives. During this phase, it will also be necessary to be able to juggle between the various unknowns because it is not uncommon to have people who are ultimately absent for long periods of time, added parameters, changes in methodology. Make it a point of honor to remain agile.</p>
<p>&nbsp;</p>
<h2>Step 4: Reforming at the right level to act, everything is a question of the point of view</h2>
<p>A good habit to keep is to honestly adapt each reform to each person. From the managerial summaries where we talk about trends without much detail to presentations for technical teams that are highly detailed, adapting the discourse to the necessary format is important to convey the right messages to the right people.</p>
<p>Usually, we start the reforms in terms of the organization’s budget and workforce dedicated to cybersecurity. These very concrete points allow you to attract attention and be able to then analyze the situation from four different angles:<br />
· Compliance with different global benchmarks (ISO/NIST)<br />
· Assessment of the level of maturity of different entities compared to others in the same sector or market<br />
· Quantification of the effort reach the market level and/or the required level according to cybersecurity benchmarks<br />
· Evaluation of the level of robustness of the organization against the last known cyberattacks</p>
<p>With senior management, the restitution is often going to focus on organizational and governance matters. However, there can always be surprises. In cases where businesses have already been hit by serious cyber attacks, we have had surprisingly precise and technical questions from executive committees. For example, we have been asked for details on encryption algorithms and “How secure is my active directory?”</p>
<p>&nbsp;</p>
<h2>Get started</h2>
<p>As mentioned earlier, the maturity assessment is an effective means for <strong>measuring the effectiveness and progress of your cybersecurity roadmap</strong>. Consequently, even if you don’t want to immediately begin an assessment involving all security systems and dozens of teams at your business, <strong>we advise you to familiarize yourself with the approach</strong> and its usefulness in starting out with more modest goals.</p>
<p>At Wavestone, with years of experience and expertise, we have developed the <strong>W-Cyber-Benchmark</strong>, a multi-use tool that has been implemented by dozens of clients. We know that just writing about it isn’t enough, <a href="https://www.wavestone.com/en/contact/">so don’t hesitate to contact us to discuss further</a>!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/">How to effectively evaluate your cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
