<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>risk - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/risk/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/risk/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 03 Dec 2025 08:53:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>risk - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/risk/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem </title>
		<link>https://www.riskinsight-wavestone.com/en/2025/11/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/11/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem/#respond</comments>
		
		<dc:creator><![CDATA[Louis-marie Marcille]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 15:30:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI-Generated]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Deepfake]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=28246</guid>

					<description><![CDATA[<p> A deepfake is a form of synthetic content that emerged in 2017, leveraging artificial intelligence to create or manipulate text, images, videos, and audio with high realism. Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/11/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem/">Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;" aria-level="1"><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span><span data-contrast="auto">A deepfake is a form of synthetic content that emerged in 2017, leveraging artificial intelligence to create or manipulate text, images, videos, and audio with high realism. Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now overshadows these original purposes, representing a growing threat and a significant challenge to digital trust. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Malicious uses of deepfakes can be grouped into three main categories:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li><b><span data-contrast="auto">Disinformation and enhanced phishing: F</span></b><span data-contrast="auto">alsified videos with carefully crafted messages can be exploited to manipulate public opinion, influence political debates, or spread false information. These videos may prompt targets to click on phishing links, increasing the credibility of attacks. Such identity theft has already targeted public figures and company CEOs, sometimes encouraging fraudulent investments.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">CEO fraud and social engineering: </span></b><span data-contrast="auto">Traditional telephone scams and CEO fraud are harder to detect when attackers use deepfakes to imitate an executive’s voice or fully impersonate someone (face and voice) to obtain sensitive information. Such live identity theft scams, especially via videoconferencing, have already resulted in significant financial losses, as seen in Hong Kong in early 2024</span><span data-contrast="auto">1</span><span data-contrast="auto">. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Identity theft to circumvent KYC solutions</span></b><b><span data-contrast="auto">2</span></b><b><span data-contrast="auto"> : </span></b><span data-contrast="auto">Increasingly, applications, especially in banking, use real-time facial verification for identity checks. By digitally altering the facial image submitted, malicious actors can impersonate others during these verification processes.</span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">The rapid growth of generative artificial intelligence has led to a steady increase in both the number and sophistication of deepfake generation models. It is increasingly common for companies to suffer such attacks (as evidenced by our latest CERT-W annual report</span><span data-contrast="auto"> ) and increasingly difficult to detect and counter them. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335551550&quot;:2,&quot;335551620&quot;:2}"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-28202" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/11/Diapositive1-e1764164832688.jpg" alt="Augmentation des technologies deepfakes et des pertes financières en résultant" width="1280" height="720" /><i style="font-size: revert; color: initial;"><span data-contrast="none">Figure</span></i><i style="font-size: revert; color: initial;"><span data-contrast="none">1</span></i><i style="font-size: revert; color: initial;"><span data-contrast="none"> &#8211; Increase in deepfake technologies and resulting financial losses</span></i></span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Humans remain the primary target and therefore the first line of defense in the information system against this type of attack. However, we have seen a significant evolution in the maturity of these technologies over the past year, and it is becoming increasingly difficult to distinguish between what is real and what is fake with the naked eye. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">After supporting many companies with employee training and awareness, we saw the need to analyze tools that could strengthen their defenses. Having reliable deepfake detection solutions is no longer just a technical issue: it is a necessity to protect IT systems against intrusions, maintain trust in digital exchanges, and preserve the reputation of individuals and companies.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-28204" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/11/Diapositive2-e1764165727521.jpg" alt="" width="1280" height="720" /></p>
<p style="text-align: justify;"><span data-contrast="auto">Our </span><b><i><span data-contrast="auto">Radar of deepfake detection solutions </span></i></b><span data-contrast="auto">presents about 30 mature providers we have tested rigorously, allowing us to identify initial trends in this emerging market.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;" aria-level="1"><span data-contrast="auto">For our technical tests, some stakeholders provided versions of their solutions deployed in environments similar to those used by their customers. We then built a database of multiple deepfake content of various types: media type (audio only, image, video, live interaction); format (sample size, duration, extension) and deepfake tools used to generate these samples:</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span></p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter wp-image-28253 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/11/Presentation1-e1764167420572.jpg" alt="" width="958" height="140" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/11/Presentation1-e1764167420572.jpg 958w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/11/Presentation1-e1764167420572-437x64.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/11/Presentation1-e1764167420572-71x10.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/11/Presentation1-e1764167420572-768x112.jpg 768w" sizes="(max-width: 958px) 100vw, 958px" /></p>
<p style="text-align: justify;"><span data-contrast="auto">To best extract market trends from these tests, we considered three distinct evaluation criteria:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li><span data-contrast="auto">Performance (deepfake detection capability, accuracy of false positive results, response time, etc.)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Deployment (ease of integration into a client environment, deployment support and documentation)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">User experience (understanding of results, ease of use of the tool, etc.)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<h1 style="text-align: justify;" aria-level="1"> </h1>
<h1 style="text-align: justify;" aria-level="1"><span data-contrast="none">An emerging market that has already proven itself in real-world conditions</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span></h1>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;" aria-level="2"><span data-contrast="none">Two different technologies to achieve the same goal </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">We first categorized the different solutions offered according to the type of content detected:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li><span data-contrast="auto">56% of solutions detect based on </span><b><span data-contrast="auto">visual media data </span></b><span data-contrast="auto">(image, video)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">50% of solutions opt for detection based on </span><b><span data-contrast="auto">audio data </span></b><span data-contrast="auto">(simple audio file or audio from a video) </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">This balanced distribution of content types enabled us to compare the performance of each technology. While most of the solutions developed rely on artificial intelligence models trained to classify AI-generated content, the processing of a visual file (such as a photo) or an audio file (such as an MP3) differs greatly in the types of AI models used. We could therefore expect differences in performance between these two technologies.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">However, our technical tests show that the accuracy of the solutions is relatively similar for both image and audio processing.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<table style="width: 100%;" data-tablestyle="MsoTableGrid" data-tablelook="1184" aria-rowcount="1">
<tbody>
<tr aria-rowindex="1">
<td style="width: 46.3095%;" data-celllook="4369">
<p><b><span data-contrast="auto">92.5%</span></b><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p><span data-contrast="auto">Deepfake images or videos were detected as malicious by </span><b><span data-contrast="auto">image processing</span></b><span data-contrast="auto"> solutions</span><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
</td>
<td style="width: 5.83333%;" data-celllook="4369">
<p style="text-align: center;"><b><span data-contrast="auto">VS</span></b><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
</td>
<td style="width: 46.6667%;" data-celllook="4369">
<p><b><span data-contrast="auto">96</span></b><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p><span data-contrast="auto">Deepfake audio sources were detected as malicious by solutions </span><b><span data-contrast="auto">processing audio.</span></b><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">We also identified leading providers developing live audio and video deepfake detection, capable of processing sources in under 10 seconds, which addresses today’s most dangerous attack vectors.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<table data-tablestyle="MsoTableGrid" data-tablelook="1184" aria-rowcount="1">
<tbody>
<tr aria-rowindex="1">
<td data-celllook="4369">
<p><b><span data-contrast="auto">19% </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:3,&quot;335551620&quot;:3,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
</td>
<td data-celllook="4369">
<p><b><span data-contrast="auto">Solutions offer </span></b><b><span data-contrast="auto">live</span></b><b><span data-contrast="auto"> detection of deepfakes, integrated into videoconferencing software or devices</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:64,&quot;335559739&quot;:160,&quot;335559740&quot;:278}"> </span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;" aria-level="2"><span data-contrast="auto">These solutions, which mainly process audio, achieved an accuracy score of 73% of deepfakes detected as such. This shows the potential for improvement for these young players in detecting state-of-the-art live attacks.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></p>
<h2 style="text-align: justify;" aria-level="2"> </h2>
<h2 style="text-align: justify;" aria-level="2"><span data-contrast="none">From PoC to deployment at scale, a step already taken by some</span></h2>
<h2 style="text-align: justify;" aria-level="2"><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">The maturity of solutions also varies on our radar. While some providers are start-ups emerging to meet this specific need, others are not new to the market. In fact, some of the companies we met had their core business in other areas before entering this market (we can mention biometric identification, artificial intelligence tools, and even AI-powered multimedia content generators!). These players therefore have the knowledge and experience to offer their customers a packaged service that can be deployed on a large scale, as well as post-deployment support.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Younger startups are also maturing and moving beyond the PoC phase by offering companies a range of deployment options:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li><span data-contrast="auto">API requests, which can be integrated into other software, remain the preferred way to call on the services of tools that enable deepfake detection.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Comprehensive SaaS GUI</span><span data-contrast="auto">6</span><span data-contrast="auto"> platforms. Some of these platforms have already been deployed on-premises in certain contexts, particularly in the banking and insurance sectors.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">On-device Docker containers, which allow plug-ins to be added to audio and video devices or videoconferencing software for integration tailored to specific detection needs.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<h1 style="text-align: justify;" aria-level="1"> </h1>
<h1 style="text-align: justify;" aria-level="1"><span data-contrast="none">Use cases for deepfake detection solutions: trends and developments</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span></h1>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;" aria-level="2"><span data-contrast="none">Use cases specific to critical business needs that require protection</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To meet diverse market needs, solution providers have specialized in specific use cases. In addition to answering the question &#8220;deepfake or original content?&#8221;, some providers are developing and offering additional features to target specific uses for their solutions.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">We have grouped the various offerings from providers into broad categories to help us understand market trends:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li><b><span data-contrast="auto">KYC and identity verification</span></b><span data-contrast="auto">: in banking onboarding or online account opening processes, deepfake detection makes it possible to distinguish between a real video of a user and an AI-generated imitation. This protects financial institutions against identity theft and money laundering. These solutions will be able to give &#8220;liveness&#8221; scores or match rates to the person being identified in order to refine detection.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Social media watch and source identification</span></b><span data-contrast="auto">: To prevent fake media or information from damaging their clients&#8217; reputations, some solution providers have deployed watch on social media or multimedia content analysis tools for email attachments to enable rapid response. The features of these solutions make it possible to understand how and by which deepfake model this malicious content was produced, helping to trace the source of the attack.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Falsified documents and insurance fraud</span></b><span data-contrast="auto">: A number of players have turned their attention to combating insurance fraud and false identity documents. Their solutions seek to detect alterations in supporting documents or photos of damage by highlighting how and which parts of the original image have been modified.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Detection of telephone scams and identity theft in video calls</span></b><span data-contrast="auto">: these types of attacks are on the rise and rely on the creation of realistic imitations of a manager&#8217;s voice or face, in particular to deceive employees and obtain transfers or sensitive information. Most detection systems targeting these attacks have developed capabilities for full integration into video call software or sound cards on the devices to be protected.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">Each solution is designed with specific features aligned with market needs to maximize the relevance and operational effectiveness of detection solutions.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;" aria-level="2"><span data-contrast="none">Open source as the initiator, proprietary solutions to take over</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">While proprietary solutions dominate, open-source approaches also play a role in this field. These initiatives play an important role in academic research and experimentation, but they often remain less effective and less robust in the face of sophisticated deepfakes.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">While some offer very good results on controlled test benches ( up to 90% detection performance</span><span data-contrast="auto">7</span><span data-contrast="auto"> ), proprietary solutions offered by specialized publishers generally offer better performance in production. They also stand out in terms of support: regular updates, technical support, and maintenance services, which are essential for critical environments such as finance, insurance, and public sector. This difference is gradually creating a gap between open source research and commercial offerings, where reliability and integration into complex environments are becoming key selling points.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;" aria-level="2"><span data-contrast="none">False positives: the remaining challenge</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Many vendors emphasize their deepfake detection capabilities. We felt it was important to extend our testing to understand how these solutions perform on false positives: is </span><b><span data-contrast="auto">real</span></b><span data-contrast="auto"> content detected as natural content or as deepfake content?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto"> The evaluations we conducted on several detection solutions highlight contrasting results depending on the type of content. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li><span data-contrast="auto">For images and video: nearly 40% of the solutions tested still have difficulty correctly managing false positives. With these solutions, between 50% and 70% of the real images analyzed are considered deepfakes. This limits their reliability, especially when they are subjected to large amounts of content. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">On the audio side, the solutions stand out with more robust performance on false positives: only 7%. Only a few particularly altered (but non-AI) or poor-quality samples were detected as deepfakes by some solutions.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">To address these issues, some vendors are combining image/video and audio processing. Currently, these modalities are usually scored separately, but efforts are underway to integrate their results for greater accuracy. Some publishers are working on ways </span><b><span data-contrast="auto">to use these two scores more complementarily to limit false positives</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:142}"> </span></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;" aria-level="1"><span data-contrast="none">What does the future hold for deepfake detection?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Current solutions are effective under most present conditions. However, as technologies and attack methods rapidly evolve, vendors will face two major challenges. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The first challenge is detecting content from unknown generative tools. While most solutions handle common technologies well, their performance drops with newer, less-documented methods. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The second challenge is real-time detection. Currently, only 19% of solutions offer this feature, and their performance is still insufficient to meet future needs. In contrast, notable progress is already being made in audio detection, which is emerging as a promising advance for enhancing security in critical scenarios involving phishing or CEO fraud via deepfake audio calls.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The market maturity of these cutting-edge technologies is accelerating, and there is every reason to believe that detection solutions will quickly catch up with the latest advances in deepfake creation. The next few years will be decisive in seeing the emergence of more reliable, faster tools that are better integrated with business needs. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/11/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem/">Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/11/anti-deepfake-solutions-radar-an-analysis-of-the-ai-generated-content-detection-ecosystem/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Agentic AI: typology of risks and security measures</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/07/agentic-ai-typology-of-risks-and-security-measures/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/07/agentic-ai-typology-of-risks-and-security-measures/#respond</comments>
		
		<dc:creator><![CDATA[Pierre Aubret]]></dc:creator>
		<pubDate>Mon, 28 Jul 2025 09:01:01 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Acces control]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[digital privacy]]></category>
		<category><![CDATA[generative AI]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk management strategy & governance]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26872</guid>

					<description><![CDATA[<p>While AI has proven to be highly effective at increasing productivity in business environments, the next step in its evolution involves enhancing its autonomy and enabling it to perform actions independently. To this end, one notable development in the AI...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/agentic-ai-typology-of-risks-and-security-measures/">Agentic AI: typology of risks and security measures</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">While AI has proven to be highly effective at increasing productivity in business environments, the next step in its evolution involves enhancing its autonomy and enabling it to perform actions independently. To this end, one notable development in the AI landscape is the uptick in use of Agentic AI, with Gartner naming it the top strategic technology trend for 2025. Whereas traditional AI typically follows rules and algorithms with a minimal level of autonomy, AI Agents are able to autonomously plan their actions based on their understanding of the environment, in order to achieve a set of objectives within their scope of actions. The boom in AI agents is a direct result of the integration of LLMs into their core systems, allowing them to process complex inputs, expanding their capability for autonomous decision making.</p>
<p style="text-align: justify;">The projected impact of agentic AI is significant. By 2028, it could automate 15% of routine<a href="#_ftn1" name="_ftnref1">[1]</a> decision-making and be embedded in a third of enterprise applications, up from virtually none today. At the same time, perceptions of risk are shifting. In early 2024, Gartner surveyed 345 senior risk executives and identified malicious AI-driven activity and misinformation as the top two emerging threats<a href="#_ftn2" name="_ftnref2">[2]</a>. Yet despite these concerns, organisations are accelerating adoption. By 2029, agentic AI could autonomously resolve up to 80% of common customer service issues, reducing costs by as much as 30%<a href="#_ftn3" name="_ftnref3">[3]</a>. This tension, between the growing promise of agentic AI and the expanding risk surface it introduces, raises a critical question:</p>
<p style="text-align: justify;"><em>“How can organisations securely deploy agentic AI at scale, balancing innovation with accountability, and automation with control?”</em></p>
<p style="text-align: justify;">This article explores that question, outlining key risks, security principles, and practical guidance to help CISOs and technology leaders navigate the next wave of AI adoption.</p>
<h2 style="text-align: justify;"><strong>An AI agent is an autonomous AI system in the decision-making process</strong></h2>
<p style="text-align: justify;">In AI systems, agents are designed to process external stimuli and respond through specific actions. The capabilities of these agents can vary significantly, especially depending on whether they are powered by LLMs.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26867" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-1-e1753455946878.jpg" alt="A diagram to show the different constituent parts of an LLM-enabled agent, showing 1) external stimuli, 2) the agents core processes (reasoning and tools) and 3) the agent’s actions" width="1280" height="720" /></p>
<p style="text-align: justify;"><em>Figure 1: A diagram to show the different constituent parts of an LLM-enabled agent, showing 1) external stimuli, 2) the agents core processes (reasoning and tools) and 3) the agent’s actions</em></p>
<p style="text-align: justify;">Traditional agents typically follow a rule-based or pre-programmed workflow: they receive input, classify it, and execute a predefined action. In contrast, agentic AI introduces a new dimension by incorporating LLMs to perform reasoning and decision-making between perception and action. This, with only few words to configure it. This enables more flexible, context-aware responses, and in many cases, allows AI agents to behave more like human intermediaries.</p>
<p style="text-align: justify;">As illustrated in Figure 1, the agentic AI workflow unfolds in several stages:</p>
<ol style="text-align: justify;">
<li><strong>Perception</strong>: The AI agent receives external stimuli, such as text, images, or sound.</li>
<li><strong>Reasoning</strong>: These inputs are processed through an orchestration layer, which transforms them into structured formats using classification rules and machine learning techniques.</li>
</ol>
<p style="text-align: justify;">Here, the LLM plays a central role. It adds a layer of adaptive thinking that enables the agent to analyse context, select tools, query external data sources, and plan multi-step actions.</p>
<ol style="text-align: justify;" start="3">
<li><strong>Action</strong>: With refined data and a reasoning layer applied, the agent executes complex tasks, often with greater autonomy than traditional systems.</li>
</ol>
<p style="text-align: justify;">This architecture gives agentic AI the ability to operate across dynamic environments, adapt in real time, and coordinate with other agents or systems, a key differentiator from earlier, more static automation.</p>
<p style="text-align: justify;">In summary, AI agents with LLM capabilities can perform more complex actions by applying “AI reasoning” to transformed and refined data, making them more powerful and versatile than traditional agents.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Field insights on Agentic AI use-cases in client environments</strong></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Businesses have rightfully recognised the potential of these AI agents in a variety of use cases, ranging from the simple, to the more complex. We will now take a deeper look at some of the different common use cases across these different levels of agent autonomy.</p>
<p style="text-align: justify;"><strong>Basic Use Cases: </strong>Chatbot/Virtual Agents</p>
<p style="text-align: justify;">AI agents can be configured to provide instant answers to complex questions and can be designed to only answer from certain information repositories. This allows them to smoothly and effectively guide users through extensive SharePoint libraries or other document repositories. Acting as both a search function and an assistant, these agents can dramatically improve the productivity of employees by reducing the time spent searching for information and ensuring that users have quick access to the data they need. For example, a chatbot integrated into SharePoint can help employees locate specific documents, understand company policies, or even assist with onboarding processes by providing relevant information and resources. These agents have no autonomy, and only directly respond to requests as they are made by users.</p>
<p style="text-align: justify;"><strong>Intermediate Use Cases: </strong>Routine Task Automation</p>
<p style="text-align: justify;">Agents can be used to streamline repetitive tasks such as managing scheduling, processing customer enquiries, and handling transactions. These agents can be designed to follow specified processes and workflows, offering significant advantages over humans by reducing human error and increasing productivity. For instance, an AI agent can automatically schedule meetings by coordinating with participants&#8217; calendars, send reminders, and process routine customer service requests such as order tracking or account updates. This automation not only saves time but also ensures consistency and accuracy in task execution. Additionally, by handling routine tasks, AI agents free up human employees to focus on more complex and strategic activities, thereby contributing to higher efficiency and productivity within the organisation.</p>
<p style="text-align: justify;"><strong>Advanced Use Cases: </strong>Complex data analysis &amp; vulnerability management</p>
<p style="text-align: justify;">Agents can also be used for more complex use cases, specifically in a security context. For example, Microsoft has recently announced the release of AI agents as part of their security copilot offering, with previews releasing in April 2025. One particularly interesting use case is regarding vulnerability remediation agents. These agents will work within Microsoft Intune to monitor endpoints for vulnerabilities, assess these vulnerabilities for potential risks and impacts, and then produce a prioritised list of remediation actions. This provides a large increase in productivity for security teams, as they can then focus on the most critical issues and streamline the decision-making process. By automating the identification and prioritisation of vulnerabilities, these agents help ensure that security teams can address the most pressing threats promptly, reducing the risk of security breaches and improving overall security posture.</p>
<p style="text-align: justify;">The promise of intelligent automation and cost efficiency is compelling, but it also introduces a strategic trade-off. CISOs will face the growing challenge of securing increasingly autonomous systems. Without robust guardrails, organisations expose themselves to operational disruption, governance failures, and reputational damage. Transparency, asset visibility, and cloud security are areas which will also require heightened vigilance and a proactive security posture. The benefits are clear, but so are the risks. Without a security-first approach, agentic AI could quickly become a liability for organisations as much as an asset.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Risks mainly known but with increased likelihood and impact</strong></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Agentic AI introduces a new level of security complexity. Unlike traditional AI systems, where threat surfaces are generally limited to inputs, model behaviour, outputs, and infrastructure, agentic AI systems operate across dynamic, autonomous chains of interaction. This covers exchanges such as agent-to-agent, agent-to-human, and human-to-agent, many of which are difficult to trace, monitor, or control in real time. As a result, the security perimeter expands beyond static models to encompass unpredictable behaviours and interactions.</p>
<p style="text-align: justify;">Recent work by OWASP on Agents’ security<a href="#_ftn4" name="_ftnref4">[4]</a> highlights the breadth of threats facing AI systems today. These risks span multiple domains:</p>
<ul style="text-align: justify;">
<li>Some are <strong>traditional cybersecurity risks</strong> (e.g., data extraction, and supply chain attacks),</li>
<li>Others are <strong>general GenAI risks</strong> (e.g., hallucinations, model poisonning),</li>
<li>A third emerging category relates specifically to <strong>agents’ autonomy in realising actions in real world.</strong></li>
</ul>
<p style="text-align: justify;">In addition to traditional risks, agentic AI systems introduce new security threats, such as data exfiltration through agent-driven workflows, unauthorised or unintended code execution, and &#8220;agent hijacking,&#8221; where agents are manipulated to perform harmful or malicious actions. These risks are amplified by the way many agentic AI applications are built today. Around 90% of current AI agent use cases rely on low-code platforms, prized for their speed and flexibility. However, these platforms often depend heavily on third-party libraries and components, introducing significant supply chain vulnerabilities and further expanding the overall attack surface.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26869 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive2-3-e1753690964191.jpg" alt="The new features and techniques of agents create new attack surfaces" width="860" height="430" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive2-3-e1753690964191.jpg 860w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive2-3-e1753690964191-382x191.jpg 382w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive2-3-e1753690964191-71x36.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive2-3-e1753690964191-768x384.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive2-3-e1753690964191-800x400.jpg 800w" sizes="auto, (max-width: 860px) 100vw, 860px" /></p>
<p style="text-align: justify;">Agentic AI represents a shift from passive prediction to action-oriented intelligence, enabling more advanced automation and interactive workflows. As organisations deploy networks of interacting agents, the systems become more complex, and their exposure to security risks increases. With more interfaces and autonomous exchanges, it becomes essential to establish strong security foundations early. A critical first step is mapping agent activities to maintain transparency, support effective auditing, and enable meaningful oversight.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Security Best Practices</strong></h2>
<p style="text-align: justify;"> </p>
<ol>
<li><strong>Activity Mapping &amp; Security Audits</strong></li>
</ol>
<p style="text-align: justify;">Since AI agents operate autonomously and interact with other systems, mapping all agent activities, processes, connections, and data flows is crucial. This visibility enables the detection of anomalies and ensures alignment with security policies.</p>
<p style="text-align: justify;">Regular audits are vital for identifying vulnerabilities, ensuring compliance, and preventing shadow AI where agents act without oversight. Unauthorised agents can expose systems to significant risks, and shadow AI, especially unsanctioned models, pose major data security threats. Auditing decision-making processes, data access, and agent interactions, along with maintaining an immutable audit trail, supports overall accountability and traceability.</p>
<p style="text-align: justify;">To mitigate these risks, organisations should adopt clear governance policies, comprehensive training, and effective detection strategies. These practices should be backed by a strong library of AI controls and data governance policies. However, audits and governance alone aren&#8217;t enough. Robust access controls for AI agents are necessary to restrict actions and protect the system&#8217;s integrity.</p>
<p style="text-align: justify;"><strong>      2. AI Filtering</strong></p>
<p style="text-align: justify;">To avoid the agent performing inappropriate actions, the first step is to ensure that its decision-making system is protected. One of the most efficient ways is by filtering potentially malicious inputs and outputs of the Decision-Maker, often composed of an orchestrator &amp; an LLM.</p>
<p style="text-align: justify;">Several technical ways to perform AI filtering:</p>
<p><strong>Keyword filtering – Medium-Low Efficiency: </strong>Prevent the LLM from considering any input containing specified keywords and from generating any output containing these keywords.</p>
<ul>
<li><strong>Pro: </strong>Quick win, particularly on the outputs, for example preventing a chatbot from generating any rude words.</li>
<li><strong>Con: </strong>Can easily be bypassed by using obfuscated inputs or requiring obfuscated outputs. For example, “p@ssword” or “p,a,s,s,w,o,r,d” can be ways to bypass the keyword “password”</li>
</ul>
<p><strong>LLM as-a-judge – High Efficiency:</strong> Ask to the LLM to analyse both inputs &amp; outputs and identify if they are malicious.</p>
<ul>
<li><strong>Pro: </strong>Extend the analysis to the whole answer.</li>
<li><strong>Con: </strong>Can be bypassed by overflowing the agent’s inputs, so it has trouble dealing with the whole input.</li>
</ul>
<p><strong>AI Classification – Very-High Efficiency:</strong> Define categories of topic that the LLM can answer or not. It can be done through whitelisting (the LLM can answer to only some categories of topics) and blacklisting (the LLM cannot answer to some precise categories of topics). Use a specialised AI system to analyse each input and output.</p>
<ul>
<li><strong>Pro: </strong>Ensure the agent’s alignment by not letting it receive inputs on topics it should not be able to answer.</li>
<li><strong>Con:</strong> High cost, as it requires additional LLM analysis.</li>
</ul>
<p style="text-align: justify;"><strong>These filtering actions need to be performed for the users’ inputs, but sometimes also for the data retrieved from external sources (they can be poisoned).</strong></p>
<p><strong>      3. AI-specific Security Measures </strong></p>
<p style="text-align: justify;">Human-in-the-loop (HITL) oversight is essential for ensuring the responsible and secure operation of agentic AI. While AI agents can autonomously perform tasks, human review in high-risk or ethically sensitive situations provides an extra layer of judgment and accountability. This oversight helps prevent errors, biases, and unintended consequences, while allowing organisations to intervene when AI actions deviate from guidelines or ethical standards. HITL also fosters trust in AI systems and ensures alignment with business objectives and regulatory requirements. To maximise the benefits of automation, a hybrid AI-human approach is critical, supported by ongoing training to address compliance and inherent risks.</p>
<p style="text-align: justify;">Some actions may be strictly forbidden to the agent, some should require human validation, and some could be done without human supervision. These actions should be determined through classical risk analysis, based on the agent’s impact &amp; autonomy.</p>
<p style="text-align: justify;">Triggers should be set-up to determine if and when human validation is needed. This can be set-up in the LLM Master Prompt, and access can be restricted by using an appropriate IAM model.</p>
<p><strong>      4. Access Controls &amp; IAM</strong></p>
<p style="text-align: justify;">As AI agents take on more active roles in enterprise workflows, they must be managed as non-human identities (NHIs), with their own identity lifecycle, access permissions, and governance policies. Accordingly, this requires integrating agents into existing identity and IAM frameworks, applying the same rigor used for human users.</p>
<p style="text-align: justify;">Managing AI agents introduces new requirements. When acting on behalf of end-users, agents must be constrained to operate strictly within the permissions of those users, without exceeding or retaining elevated privileges. To achieve this, organisations should enforce key IAM principles:</p>
<ul>
<li>Just Enough Access (JEA): Limit agents to the minimum set of permissions required to complete specific tasks.</li>
<li>Just in Time (JIT) access: Provision access temporarily and contextually to reduce standing privileges and exposure.</li>
<li>Segregation of duties and scoped credentials: Define clear boundaries between roles and prevent unauthorised privilege escalation.</li>
</ul>
<p style="text-align: justify;">In addition, to further enhance control, security teams should implement real-time anomaly detection to monitor agent behaviour, flag policy violations, and automatically remediate or escalate issues when necessary.</p>
<p style="text-align: justify;">Access to sensitive data must also be tightly restricted. Violations should trigger immediate revocation of privileges and deny lists should be used to block known malicious patterns or endpoints.</p>
<p style="text-align: justify;">Ultimately, while technical controls are essential, they should be supported by human oversight and governance mechanisms, particularly when agents operate in high-impact or sensitive contexts. IAM for agentic AI must evolve in step with these systems’ increasing autonomy and integration into critical business functions.</p>
<p><strong>      5. AI Crisis Response &amp; Red teaming</strong></p>
<p style="text-align: justify;">While AI-specific controls are essential, traditional measures like crisis management must also extend into the AI landscape. As cyberattacks become more sophisticated, organisations should consider crisis management strategies for potential AI failures or compromises; by ensuring all teams such as AI scientists, operational teams, and security teams are equipped to respond quickly and effectively to minimise disruption.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>Concrete guidelines for CISOs</strong></h2>
<p> </p>
<p style="text-align: justify;">This year CISOs will be exposed to increased threats introduced by agentic AI alongside ongoing regulatory pressure from complex regulations such as DORA, NIS 2 and the AI Act. Both CISOs and CTOs will collaborate closely, with CISOs overseeing the secure deployment of AI systems to ensure that agent interactions are carefully mapped and secured to safeguard the security of their organisations, workforce and customers.</p>
<p style="text-align: justify;"><strong>Key starting points for CISOs:</strong></p>
<ul>
<li>Limit access to AI agents by enforcing strong access controls and aligning with existing IAM policies.</li>
<li>Monitor agent behaviour by tracking activity and conducting regular audits to identify vulnerabilities.</li>
<li>Filter the agent’s inputs and outputs to ensure that the decision-maker does not launch any unwilled action.</li>
<li>Implement Human-in-the-Loop oversight to validate AI outputs for critical decisions/tasks.</li>
<li>Provide agentic AI awareness training to educate employees on the risks, security best practices and identifying potential attacks.</li>
<li>Perform AI red teaming on the agent, to identify potential weaknesses.</li>
<li>Despite all security measures, AI operates on probabilistic principles rather than deterministic ones. This means that the agent might occasionally behave inappropriately. Therefore, it&#8217;s crucial to establish clear accountability for any wrongful actions taken by AI agents.</li>
<li>Prepare for AI crises early by initiating discussions with relevant teams to ensure a coordinated response if an incident occurs.</li>
</ul>
<p style="text-align: justify;">Over the past several years, Wavestone has observed a marked increase in client maturity around AI security. Many organisations have already implemented robust processes to assess the sensitivity of AI initiatives and to manage associated risks. These early efforts have proven valuable in reducing exposure and strengthening governance.</p>
<p style="text-align: justify;">While agentic AI does not fundamentally rewrite the AI security playbook, it does introduce a meaningful shift in the risk landscape. Its inherently autonomous, interconnected nature increases both the impact and likelihood of certain threats. The complexity of these systems can be challenging at first, but they are manageable. With a clear understanding of these dynamics and the emergence of new market standards and security protocols, agentic AI can deliver on its transformative potential.</p>
<p style="text-align: justify;">As this transition unfolds, we remain committed to helping CISOs and their teams navigate the evolving risk environment with confidence.</p>
<p style="text-align: justify;"> </p>
<h2 id="tw-target-text" class="tw-data-text tw-text-large tw-ta" dir="ltr" data-placeholder="Traduction" data-ved="2ahUKEwj63vXzi-SOAxVCVqQEHVMHF3YQ3ewLegQICRAW" aria-label="Texte traduit : References"><span class="Y2IQFc" lang="en">References</span></h2>
<p> </p>
<p style="text-align: justify;"><a href="https://www.riskinsight-wavestone.com/en/2025/07/agentic-ai-typology-of-risks-and-security-measures/#_ftnref1" name="_ftn1">[1]</a> Orlando, Fla., <em>Gartner Identifies the Top 10 Strategic Technology Trends for 2025, </em>October 21, 2024. <a href="https://www.gartner.com/en/newsroom/press-releases/2024-10-21-gartner-identifies-the-top-10-strategic-technology-trends-for-2025">https://www.gartner.com/en/newsroom/press-releases/2024-10-21-gartner-identifies-the-top-10-strategic-technology-trends-for-2025</a></p>
<p style="text-align: justify;"><a href="https://www.riskinsight-wavestone.com/en/2025/07/agentic-ai-typology-of-risks-and-security-measures/#_ftnref2" name="_ftn2">[2]</a> Stamford, Conn., <em>Gartner Predicts Agentic AI Will Autonomously Resolve 80% of Common Customer Service Issues Without Human Intervention by 2029, </em>March 5, 2025. <a href="https://www.gartner.com/en/newsroom/press-releases/2025-03-05-gartner-predicts-agentic-ai-will-autonomously-resolve-80-percent-of-common-customer-service-issues-without-human-intervention-by-20290">https://www.gartner.com/en/newsroom/press-releases/2025-03-05-gartner-predicts-agentic-ai-will-autonomously-resolve-80-percent-of-common-customer-service-issues-without-human-intervention-by-20290</a></p>
<p style="text-align: justify;"><a href="https://www.riskinsight-wavestone.com/en/2025/07/agentic-ai-typology-of-risks-and-security-measures/#_ftnref3" name="_ftn3">[3]</a> Stamford, Conn. <em>Gartner Survey Shows AI-Enhanced Malicious Attacks Are a New Top Emerging Risk for Enterprises, May 22, 2024. </em><a href="https://www.gartner.com/en/newsroom/press-releases/2024-05-22-gartner-survey-shows-ai-enhanced-malicious-attacks-are-new0"><em>https://www.gartner.com/en/newsroom/press-releases/2024-05-22-gartner-survey-shows-ai-enhanced-malicious-attacks-are-new0</em></a></p>
<p style="text-align: justify;"><a href="https://www.riskinsight-wavestone.com/en/2025/07/agentic-ai-typology-of-risks-and-security-measures/#_ftnref4" name="_ftn4">[4]</a> OWASP, <em>OWASP Top 10 threats and mitigation for AI Agents, </em>2025. <a href="https://github.com/precize/OWASP-Agentic-AI/blob/main/README.md">OWASP-Agentic-AI/README.md at main · precize/OWASP-Agentic-AI · GitHub</a></p>
<p> </p>
<p style="text-align: center;"><em>Thank you to Leina HATCH for her valuable assistance in writing this article.</em></p>






<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/agentic-ai-typology-of-risks-and-security-measures/">Agentic AI: typology of risks and security measures</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/07/agentic-ai-typology-of-risks-and-security-measures/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Leaking Minds: How Your Data Could Slip Through AI Chatbots </title>
		<link>https://www.riskinsight-wavestone.com/en/2025/05/leaking-minds-how-your-data-could-slip-through-ai-chatbots/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/05/leaking-minds-how-your-data-could-slip-through-ai-chatbots/#respond</comments>
		
		<dc:creator><![CDATA[Jeanne PIGASSOU]]></dc:creator>
		<pubDate>Wed, 21 May 2025 14:21:32 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Chatbots]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[genai]]></category>
		<category><![CDATA[LLM]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26043</guid>

					<description><![CDATA[<p>OpenAI’s flagship ChatGPT was over the news 18 months ago for accidentally leaking a CEO’s personal information after being asked to repeat a word forever. This is among the many  exploits that have been discovered in recent months.   Figure 1...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/05/leaking-minds-how-your-data-could-slip-through-ai-chatbots/">Leaking Minds: How Your Data Could Slip Through AI Chatbots </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">OpenAI’s flagship ChatGPT was over the news 18 months ago for accidentally leaking a CEO’s personal information after being asked to repeat a word forever. This is among the many  exploits that have been discovered in recent months. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-26024 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/05/Diapositive1-e1747818653646.jpg" alt="Example of the PII Leaking exploit found in ChatGPT in December 2023" width="1280" height="720" /></p>
<p style="text-align: center;"><em>Figure 1 : Example of the Leaking exploit found in ChatGPT in December </em></p>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">Scandals like these highlight a deeper truth: the core architecture of Large Language Models (LLMs) such as GPT and Google’s Gemini is inherently prone to data leakage. This leakage can involve Personally Identifiable Information (PII) or confidential company data. The techniques used by attackers will continue to evolve in response to improved defenses from tech giants, the underlying vectors remain unchanged.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Today, three main vectors exist through which PIIs (Personally Identifiable Information) or sensitive data might be exposed to such attacks: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">The use of publicly available web content in training datasets</span><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></li>
<li><span data-contrast="auto">The continuous re-training of models using user prompts and conversations</span><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></li>
<li><span data-contrast="auto">The introduction of persistent memory features in chatbots</span> <br /><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></li>
</ul>
<h2 style="text-align: justify;"><b><span data-contrast="none">LLM Pre-Training Data Leakage </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Most models available right now are transformer models, specifically GPTs or Generative Pre-Trained Transformers. The Pre-Trained in GPT refers to the initial training phase, where the model is exposed to a massive, diverse corpus of data unrelated to its final application. This helps the model learn foundational knowledge such as grammar, vocabulary, and factual information. When GPTs were first released, companies were transparent on where this training data came from, but currently the largest models on the web have datasets that are too large and too diverse and are often kept confidential. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">A major source of the data used in GPT pre-training are online forums such as Reddit (for Google’s models), Stack Overflow, and other social media platforms. This poses a significant risk since these social media forums often contain PIIs . Although companies claim to filter out PII during training, there have been many instances where LLMs have leaked personal data from their pre-training data corpus to users after some prompt engineering and jail breaking. This danger will become ever more present as companies race to gather more data through web scraping to train larger and more sophisticated models. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Known leaks of this type are mostly uncovered by researchers who develop more and more creative methods to bypass the defenses of chatbots. The example mentioned earlier is one such case. By prompting the chatbot to repeat forever a word, it &#8220;forgets&#8221; its task and begins to exhibit a behavior known as memorization. In this state, the chatbot regurgitates data from its training set. While this attack has been patched, new prompt techniques continue to be found to change the behavior of the chatbot.</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;"><b><span data-contrast="none">User Input Re-Usage and Re-Training </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">User Inputs re-training is the process of continuously improving the LLM by training it on user inputs. This can be done in several ways, the most popular of which is RLHF or Reinforcement Learning from Human Feedback.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="wp-image-26026 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/05/Diapositive2-e1747818997148.jpg" alt="The feedback button used for RHLF in chatGPT" width="1280" height="720" /><em>Figure 3 : The feedback buttons used for RLHF in ChatGPT </em></p>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">This method is built on top of collecting user feedback on the LLM’s output. Many users of LLMs might have seen the “Thumbs Up” or “Thumbs Down” buttons in ChatGPT or other LLM platforms. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">These buttons collect feedback from the user and use the feedback to re-train the model. If the user signifies the response as positive, the platform takes the user input / model output pair and encourages the model to replicate the behavior. Similarly, if the user indicates that the model performed poorly, the user input / model output pair will be used to discourage the model from replicating the behavior. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">However, continuous re-training can also occur without any user interaction. Models may occasionally use user input / model output to re-train in seemingly random ways. The lack of transparency from model providers and developers makes it difficult to pinpoint exactly how this happens. However, many users across the internet have reported models gaining new knowledge through re-training from other users’ chats all the way back to 2022. For example, OpenAI’s GPT 3.5 should not be able to know any information after Sept 2021, its cut-off date. Yet, asking it about recent information such as Elon Musk’s new position as CEO of Twitter (now X) will provide you with a different reality as it confidently answers your question with accuracy.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Essentially, what this means for end-users is that their chats are not kept confidential at all and any information given to the LLM through internal documents, meeting minutes or development codebases may show up in the chats of other users thus leaking it. This poses significant privacy risks not only for individuals but also for companies, many of which have already taken action, like Samsung. In April 2023, Samsung banned the use of ChatGPT and similar chatbots after a group of employees used the tool for coding assistance and summarizing meeting notes. Although Samsung has no concrete evidence that the data was used by OpenAI, the potential risk was deemed too high to allow employees to continue using the tool. This is a classic example of Shadow AI, where unauthorized use of AI tools leads to the possible leakage of confidential or proprietary information.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Many companies globally are waiting for stricter AI and data regulations before using LLMs for commercial use. We are seeing certain industries such as consulting open up but at an incredibly slow pace. Other companies, however, are tightening their control over internal LLM use to avoid leaking confidential data and client information. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="none">Memory Persistence</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">While the two precedent risks have been recognized to exist for a few years, a new threat has emerged with the introduction of a feature by ChatGPT in September 2024. This feature enables the model to retain long-term memory of user conversations. The idea is to reduce redundancy by allowing the chatbot to remember user preferences, context, and previous interactions, thereby improving the relevance and personalization of responses. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">However, this convenience comes at a significant security cost. Unlike earlier cases, where leaked information was more or less random, persistent memory introduces account-level targeting. Now, attackers could potentially exploit this memory to extract specific details from a particular user’s history, significantly raising the stakes.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Security researcher Johannes Rehberger demonstrated how this vulnerability could be exploited through a technique known as context poisoning. In his proof-of-concept, he crafted a site with a malicious image containing instructions. Once the targeted chatbot views the URL, its persistent memory is poisoned. This covert instruction allows the chatbot to be manipulated into extracting sensitive information from the victim’s conversation history and transmitting it to an external URL.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This attack is particularly dangerous because it combines persistence and stealth. Once it infiltrates the chatbot, it remains active indefinitely, continuously exfiltrating user data until the memory is cleaned. At the same time, it is subtle enough to go unnoticed, requiring careful human analysis of the memory to be detected.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0}"> </span></p>
<h2 style="text-align: justify;"><b><span data-contrast="none">LLM Data Privacy and Mitigation </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">LLM developers often intentionally make it hard to disable re-training since it benefits their LLM development. If your personal information is already out in public, it has probably been scraped and used for pre-training an LLM. Additionally, if you gave ChatGPT or another LLM a confidential document in your prompt (without manually turning re-training OFF), it has most probably been used for re-training. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Currently, there is no reliable technique that allows an individual to request the deletion of their data once it has been used for model training. Addressing this challenge is the goal of an emerging research area known as Machine Unlearning. This field focuses on developing methods to selectively remove the influence of specific data points from a trained model, thus deleting those data from the memory of the model. The field is evolving rapidly, particularly in response to GDPR regulations that enforce the right to erasure. For this reason, it is important to mitigate and minimize these risks in the future by controlling what data individuals and organizations put out on the internet and what information employees add to their prompts. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It is vital for many business operations to stay confidential. However, the productivity boost that LLMs add to employee workflows cannot be overlooked. For this reason, we constructed a 3-step framework to ensure that organizations can harness the power of LLMs without losing control over their data. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<h3 style="text-align: justify;"><strong>Choose the most optimal model, environment and configuration  </strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">Ensure that the environment and model you are using are well-secured. Check over the model’s data retention period and the provider’s policy on re-training on user conversations. Ensure that you have “Auto-delete” as ON when available and “Chat History” to OFF.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">At Wavestone we made a </span><a href="https://digiplace.sharepoint.com/:x:/s/WOOHK-HONGKONGOFFICE/EcyjrooJw_hPlkQBjpuYod4Brkuf8-pVV1uKtb5ejJfQLQ?e=i7KITB"><span data-contrast="none">tool</span></a><span data-contrast="auto"> that compares the top 3 closed-source and open-source models in terms of pricing, data retention period, guard rails, and confidentiality to empower organizations in their AI journey. </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3 style="text-align: justify;"><strong>Raise employee awareness on best practices when using LLMs  </strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">Ensure that your employees know the danger of providing confidential and client information to LLMs and what they can do to minimize including corporate or personal information in an LLM’s pre-training and re-training data corpus. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<h3 style="text-align: justify;"><strong>Implement a robust AI policy   </strong></h3>
<p style="text-align: justify;"><span data-contrast="auto">Forward-looking companies should implement a robust internal AI policy that specifies: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li><span data-contrast="auto">What information can and can’t be shared with LLMs internally </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Monitoring of AI behavior </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Limiting their online presence </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Anonymization of prompt data </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Limiting use to secure AI tools only </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">Following these steps, organizations can minimize the digital risk they face by using the latest GenAI tools while also benefiting from their productivity increases. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><b><span data-contrast="none">Moving Forward </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Although the data privacy vulnerabilities mentioned in this article impact individuals like you and me, their cause is the LLM developers’ greed for data. This greed produces higher-quality end products but at the cost of data privacy and autonomy. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">New regulations and technologies have come out to combat this issue such as the EU AI Act and OWASP top 10 LLM checklist. However, relying solely on responsible governance is not enough. Individuals and organizations must actively recognize the critical role PIIs play in today&#8217;s digital landscape and take proactive steps to protect them. This is especially important as we move toward more agentic AI systems, which autonomously interact with multiple third-party services. Not only will these systems process an increasing amount of personal and sensitive data, but this data will also be transmitted and handled by numerous different services, complicating oversight and control.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span class="TextRun SCXW172884042 BCX8" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW172884042 BCX8">References and Further Reading </span></span><span class="EOP SCXW172884042 BCX8" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[1] D. Goodin, “OpenAI says mysterious chat histories resulted from account takeover,” Ars Technica, https://arstechnica.com/security/2024/01/ars-reader-reports-chatgpt-is-sending-him-conversations-from-unrelated-ai-users/ (accessed Jul. 13, 2024). </p>
<p style="text-align: justify;">[2] M. Nasr et al., “Extracting Training Data from ChatGPT,” not-just-memorization , Nov. 28, 2023. Available: <a href="https://not-just-memorization.github.io/extracting-training-data-from-chatgpt.html">https://not-just-memorization.github.io/extracting-training-data-from-chatgpt.html</a> </p>
<p style="text-align: justify;">[3] “What Is Confidential Computing? Defined and Explained,” Fortinet. Available: <a href="https://www.fortinet.com/resources/cyberglossary/confidential-computing#:~:text=Confidential%20computing%20refers%20to%20cloud">https://www.fortinet.com/resources/cyberglossary/confidential-computing#:~:text=Confidential%20computing%20refers%20to%20cloud</a> </p>
<p style="text-align: justify;">[4] S. Wilson, “OWASP Top 10 for Large Language Model Applications | OWASP Foundation,” owasp.org, Oct. 18, 2023. Available: <a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/">https://owasp.org/www-project-top-10-for-large-language-model-applications/</a> </p>
<p style="text-align: justify;">[5] “Explaining the Einstein Trust Layer,” Salesforce. Available: https://www.salesforce.com/news/stories/video/explaining-the-einstein-gpt-trust-layer/ </p>
<p style="text-align: justify;">[6] “Hacker plants false memories in ChatGPT to steal user data in perpetuity” Ars Technica , 24 sept. 2024 Available: <a href="https://arstechnica.com/security/2024/09/false-memories-planted-in-chatgpt-give-hacker-persistent-exfiltration-channel/">https://arstechnica.com/security/2024/09/false-memories-planted-in-chatgpt-give-hacker-persistent-exfiltration-channel/</a></p>
<p style="text-align: justify;">[7] “Why we’re teaching LLMs to forget things” IBM, 07 Oct 2024 Available: https://research.ibm.com/blog/llm-unlearning</p>
<p style="text-align: justify;"> </p>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/05/leaking-minds-how-your-data-could-slip-through-ai-chatbots/">Leaking Minds: How Your Data Could Slip Through AI Chatbots </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/05/leaking-minds-how-your-data-could-slip-through-ai-chatbots/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fighting fraud: a new challenge for digital identity?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/09/fighting-fraud-a-new-challenge-for-digital-identity/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/09/fighting-fraud-a-new-challenge-for-digital-identity/#respond</comments>
		
		<dc:creator><![CDATA[Maryeme BOUSSOUIS]]></dc:creator>
		<pubDate>Wed, 18 Sep 2024 08:08:23 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[fraud fighting]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk management strategy & governance]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23932</guid>

					<description><![CDATA[<p>The banking sector has rapidly modernized, and online banking has become a matter of course for both banks and their customers. These players are increasingly reliant on the Internet, with all the advantages that implies, but also the risks. At...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/fighting-fraud-a-new-challenge-for-digital-identity/">Fighting fraud: a new challenge for digital identity?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The banking sector has rapidly modernized, and online banking has become a matter of course for both banks and their customers. These players are increasingly reliant on the Internet, with all the advantages that implies, but also the risks.</p>
<p style="text-align: justify;">At the same time, fraud has grown in scale and complexity. According to the Banque de France, payment fraud will represent <strong>a loss of 1.2 billion euros by 2022</strong>, a considerable sum which is unlikely to diminish as fraudulent transactions continue to increase. Around 70% of these fraudulent transactions come from online banking.</p>
<p style="text-align: justify;">The fight against fraud is therefore one of the most important concerns for online banking, but other sectors are also beginning to address the issue.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Identity fraud, business fraud</h2>
<p style="text-align: justify;">The term fraud is part of everyday language and can have a wide variety of definitions. It&#8217;s possible to “defraud” a metro ticket, an insurance policy, or a loyalty account with a major retailer.</p>
<p style="text-align: justify;">When it comes to <strong>computer fraud</strong>, particularly banking fraud, <strong>we distinguish between identity fraud and business fraud. </strong></p>
<p style="text-align: justify;">The former involves manipulation of the <strong>issuer&#8217;s identity data</strong>, the context in which he/she accesses the service, or information relating to his/her authentication and authorization. This can be detected by analyzing the user&#8217;s authentication behavior, the machine he is using, the IP address from which he is connecting, and so on.</p>
<p style="text-align: justify;">The second involves manipulating <strong>data relating to the transaction</strong> itself, the banking profile of the sender and receiver, and the context in which the transaction was carried out. Indicators of business fraud could be, for example, a receiving IBAN from an unusual country, a large transaction amount, etc.</p>
<p style="text-align: justify;">The two types of fraud and their detection rely on different signals, but these two protection mechanisms can and must exchange and <strong>feed off each other</strong> to provide additional context and enable a more holistic analysis of risk.</p>
<p style="text-align: justify;">This need for synchronization has led to a recent <strong>organizational rapprochement</strong> between business fraud and IAM teams.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What risks are covered by identity fraud detection?</h2>
<p style="text-align: justify;">Identity fraud conceals many different uses. Detecting it therefore covers a wide range of risks that are difficult to apprehend today. Here is a non-exhaustive list of techniques used by attackers that could be detected by an anti-fraud tool:</p>
<ul style="text-align: justify;">
<li><strong>SIM swapping</strong>: SIM swapping involves convincing the victim&#8217;s telephone provider to send a new SIM card to the attacker, who can then validate double authentication requests via OTP by pretending to be the victim.</li>
<li><strong>MFA fatigue</strong>: MFA fatigue involves sending a large number of MFA validation notifications, to the point where the victim ends up accepting the request and inadvertently authorizing access to one of their accounts.</li>
<li><strong>Social engineering</strong>: social engineering is used in attacks targeting an individual, where the attacker gathers information about them and their bank account, then exploits it to extract money from them. An increasingly common example is bank advisor fraud, in which an attacker poses as the victim&#8217;s advisor and urges him or her to make a bank transfer, often under the pretext of a risk of&#8230; fraud.</li>
<li><strong>Bots</strong>: attack automation opens up new possibilities for attackers, who can target a large number of accounts in a single campaign. By emulating devices or launching massive phishing campaigns, it is becoming increasingly easy to recover personal information and passwords.</li>
</ul>
<figure id="attachment_23913" aria-describedby="caption-attachment-23913" style="width: 559px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23913" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image1-ENG.png" alt="les identités peuvent être attaquées par social engineering, des attaques automatiques, des attaques qui joue sur la fatigue face aux nombreux MFA demandés, et l'impersonification d'une personne." width="559" height="326" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image1-ENG.png 559w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image1-ENG-328x191.png 328w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image1-ENG-67x39.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image1-ENG-120x70.png 120w" sizes="auto, (max-width: 559px) 100vw, 559px" /><figcaption id="caption-attachment-23913" class="wp-caption-text"><em>Figure 1: Identities face many risks</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Banks in the lead, but joined by new players</h2>
<p style="text-align: justify;">Unsurprisingly, the banking sector has a head start on these issues. Firstly, because the impact of fraud is very real, and <strong>the bank is a prime target</strong>. Secondly, because users are accustomed to, and even reassured by, significant security processes at the expense of their user experience. Finally, because the massive shift to online banking has raised questions that other sectors didn&#8217;t have to ask themselves immediately.</p>
<p style="text-align: justify;">Today, fraud detection for an online bank focuses on <strong>three key stages of the user journey</strong>:</p>
<ul style="text-align: justify;">
<li>Enrolling a new device.</li>
<li>Validating a payment.</li>
<li>Performing sensitive actions on the account, such as adding a beneficiary for transfers.</li>
</ul>
<p style="text-align: justify;">While the banking sector is undoubtedly the most affected and the most protected, other sectors are beginning to address the issue of fraud detection. <strong>Retail</strong>, <strong>e-commerce,</strong> and <strong>luxury goods</strong>, for example, are all in the crosshairs of attackers. This is forcing these sectors to devise new processes and invest in the fight against fraud, in turn driving the evolution of solutions and practices to limit the impact on business.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">New technological advances: protocols and algorithms</h2>
<p style="text-align: justify;">The pressure of attacks explains much of the interest in fraud detection solutions. These have developed rapidly, embedding more and more functions and demonstrating a <strong>growing capacity to combat the complex attacks</strong> that are on the rise.</p>
<p style="text-align: justify;">Recent technological advances in fraud detection are manifold, but two main mechanisms have made these solutions more powerful: the ability to <strong>exchange information</strong> between detection bricks, and the <strong>precision of risk estimation algorithms</strong>.</p>
<p style="text-align: justify;">The first mechanism is a product of the current trend towards <strong>standardization of detection protocols and signals</strong>, enabling the various IS bricks to pool the information gathered and the appropriate reactions. The <a href="https://sharedsignals.guide/"><em>Shared Signals</em></a> working group (Okta, Cisco, Disney, OpenID Foundation, etc.), for example, has produced a framework used in two protocols: <em>Continuous Access Evaluation Protocol</em> (CAEP) and <em>Risk Incident Sharing and Coordination protocol</em> (RISC).</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The second mechanism &#8211; the precision of algorithms &#8211; is based on the <strong>growing number of criteria that can be exploited</strong>. A few years ago, a detection engine relied on IP analysis, geolocation and a few identity attributes. Today, the criteria are multiplied, including the <strong>user&#8217;s own behavior</strong> (mouse movements, typing speed), analysis of the<strong> devices used</strong> (model, OS, browser), <strong>account history</strong>, <strong>common user paths</strong>, as well as a panoply of weak signals from other applications or IS bricks. This multiplication of signals entering the algorithms enables a much more refined analysis of each transaction, and an ever more pertinent estimation of risk.</p>
<figure id="attachment_23915" aria-describedby="caption-attachment-23915" style="width: 605px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23915" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image2-ENG.png" alt="de la détection des différents risque, puis l'analyse et jusqu'à la réponse, tout peut être automatisé" width="605" height="348" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image2-ENG.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image2-ENG-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image2-ENG-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image2-ENG-120x70.png 120w" sizes="auto, (max-width: 605px) 100vw, 605px" /><figcaption id="caption-attachment-23915" class="wp-caption-text"><em>Figure 2: From telemetry to automatic response</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">AI and orchestration in the fight against fraud</h2>
<p style="text-align: justify;">Increasing the number of criteria helps to improve algorithms, but to get the most out of this information it is essential to take advantage of the capabilities of <strong>Machine Learning</strong> and artificial intelligence. Each criterion becomes a dimension enabling AI to <strong>dynamically</strong> learn user behaviours (such as common paths, mouse click locations or typing speed) and what constitutes a normal, non-risky access context, in order to better detect anything that deviates from it.</p>
<p style="text-align: justify;">Despite AI&#8217;s ability to produce a decision from a very large number of parameters, it remains a victim of the setbacks of all decision algorithms: false positives. And with the interest of new sectors, which need to <strong>balance security and user experience to limit negative impacts on business</strong>, the management of false positives is an issue in its own right for software publishers. Today, detection models can be adjusted in several ways: by training them recurrently, to adapt them to new use cases; by playing with the weights of the criteria, according to the customer&#8217;s context; and by going back over the decisions taken by the algorithm in order to report false positives.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Beyond these adjustments, fraud detection solutions offer great flexibility in terms of <strong>orchestration</strong>, i.e. the reaction to be implemented in response to the algorithm&#8217;s recommendations. In this way, it is possible to limit the impact on users, by using <strong>invisible challenges</strong> for low-risk transactions, and by limiting constraining requests such as MFA or deferred manual processing to high-risk transactions. Orchestration also makes it possible to <strong>implement the tool progressively</strong>: reactions can be limited to raising alerts transmitted to a SIEM tool, for example, to refine the algorithm, then moving on to effective, real-time blocking.</p>
<figure id="attachment_23917" aria-describedby="caption-attachment-23917" style="width: 605px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23917" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image3-ENG.png" alt="" width="605" height="359" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image3-ENG.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image3-ENG-322x191.png 322w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image3-ENG-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Image3-ENG-120x70.png 120w" sizes="auto, (max-width: 605px) 100vw, 605px" /><figcaption id="caption-attachment-23917" class="wp-caption-text"><em>Figure 3: two user paths, two orchestrations</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">The fight against fraud is a subject that concerns many sectors. While the banking sector is ahead of the game, with e-commerce and luxury goods following suit, any organization can be targeted by fraud. This implies <strong>a wide range of use cases and issues</strong> to which fraud detection solutions can often, but not always, respond.</p>
<p style="text-align: justify;">The sector of activity, the context, the recurrence and type of attacks, the impact and associated risk, as well as the resources that can be deployed &#8211; all these dimensions need to be taken into account to <strong>contextualize countermeasure solutions</strong>. These solutions may be expensive or unsuitable, despite the innovative mechanisms put in place, and other remediation mechanisms may need to be considered depending on the context.</p>
<p style="text-align: justify;">This is the case with anti-bot solutions, for example, or risk-based authentication mechanisms, or simply the redesign of certain business processes to make them intrinsically more resilient to fraud. These remedies can accompany a fraud detection solution or be sufficient to counter the cases of fraud observed in the context studied.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/fighting-fraud-a-new-challenge-for-digital-identity/">Fighting fraud: a new challenge for digital identity?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/09/fighting-fraud-a-new-challenge-for-digital-identity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – March 2023</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Fri, 24 Mar 2023 15:08:27 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20080</guid>

					<description><![CDATA[<p>An overview of the different cybercriminal uses case of ChatGPT The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU CHATGPT What opportunities for the underground world of cybercrime ?   Need a refresh about...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/">CDT Watch – March 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<ul>
<li>An overview of the different cybercriminal uses case of ChatGPT</li>
<li>The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU</li>
</ul>
<h1 style="text-align: center;">CHATGPT</h1>
<h2 style="text-align: center;">What opportunities for the underground world of cybercrime ?</h2>
<h2> </h2>
<h2 style="text-align: left;"><strong>Need a refresh about ChatGPT?</strong></h2>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-20082 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1.png" alt="" width="1129" height="231" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1.png 1129w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-437x89.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-768x157.png 768w" sizes="auto, (max-width: 1129px) 100vw, 1129px" /></p>
<p style="text-align: center;"><em>Figure 1 &#8211; Screenshot from ChatGPT when prompted &#8220;Introduce ChatGPT in a funny way and at the first person&#8221;</em></p>
<p> </p>
<p style="text-align: justify;">Unless living under a rock, you have heard about the incredibly notorious <span style="color: #503078;"><strong>AI powered chatbot</strong> </span>developed by OpenAI: Chat GPT, a tool that relies on the Generative Pre-trained Transformer architecture. But just in case, you must know that ChatGPT has been trained on a <span style="color: #503078;"><strong>vast amount of data from the Internet</strong> </span>and is able to <span style="color: #503078;"><strong>understand human speech</strong></span> and <span style="color: #503078;"><strong>interact</strong> </span>with users. Chat GPT has not finished to be talked about: on March 14<sup>th</sup> 2023, Open AI has announced the <strong><span style="color: #503078;">arrival of Chat GPT 4.0</span><a href="#_edn1" name="_ednref1">[i]</a></strong>.</p>
<p style="text-align: justify;">The growing popularity and potential future applications of ChatGPT have also caught the attention of cybercriminals. Nord VPN&#8217;s examination of Dark Web posts from January 13th to February 13th revealed a significant increase in Darkweb forum threads discussing ChatGPT, <span style="color: #503078;"><strong>jumping from 37 to 91 in just a month</strong></span>. The main topics of these threads included:</p>
<ul style="text-align: justify;">
<li>Breaking ChatGPT</li>
<li>Using ChatGPT to create Dark Web Marketplace scripts</li>
<li>A new ChatGPT Trojan Binder</li>
<li>ChatGPT as a phishing tool with answers indistinguishable from humans</li>
<li>ChatGPT trojan</li>
<li>ChatGPT jailbreak 2.0</li>
<li>Progression of ChatGPT malware</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20084 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2.jpg" alt="" width="245" height="230" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2.jpg 245w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-203x191.jpg 203w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-42x39.jpg 42w" sizes="auto, (max-width: 245px) 100vw, 245px" /></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Screenshot from CheckPoint: Cybercriminal is using ChatGPT to improve Infostealer’s code</em></p>
<p> </p>
<p style="text-align: justify;">These threads give a first <span style="color: #503000;"><strong><span style="color: #503078;">interesting overview of all the rogue usage that can involves ChatGPT or be carried out via the chatbot</span>.</strong></span> Another key security concern could also be included in this list when thinking about ChatGPT’s limitations in terms of cybersecurity, which is the risk of personal and/or corporate data leak, that could lead to identity theft, fraud, or other malicious uses.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>What are the plausible cybercriminal use cases?</strong></h2>
<p style="text-align: justify;"><strong><em> <img loading="lazy" decoding="async" class="aligncenter wp-image-20086 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1.png" alt="" width="883" height="468" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1.png 883w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-768x407.png 768w" sizes="auto, (max-width: 883px) 100vw, 883px" /></em></strong></p>
<p style="text-align: center;"><strong><em> </em></strong><em>Figure 3 &#8211; Screenshot of a ChatGPT answer when prompted “Talk at the first person about possible cybercriminal usage of ChatGPT”</em></p>
<p> </p>
<h3 style="text-align: justify;"><strong>Use Case #1 – Support malware creation and kill chain attack</strong></h3>
<p style="text-align: justify;">ChatGPT is designed to decline inappropriate requests but there are ways to bypass its restrictions and generate malicious code. For example, instead of directly requesting a ransomware script, users can describe step-by-step functions needed for such a script, ultimately receiving functional parts of malicious code.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20088 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2.png" alt="" width="569" height="460" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2.png 569w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2-236x191.png 236w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2-48x39.png 48w" sizes="auto, (max-width: 569px) 100vw, 569px" /></p>
<p style="text-align: center;"><em>Figure 4 – Screenshot of a ChatGPT answer to the request “Write me a function named &#8220;find_files&#8221; in Python that searches all files that end up with &#8220;txt, pdf, docx, ppt, xlsm&#8221; starting from the root directory and that return all paths of files that match with the criteria”.</em></p>
<p> </p>
<p style="text-align: justify;">It has been proven possible to use ChatGPT to insert harmful code into a commonly used <a href="https://www.cyberark.com/resources/threat-research-blog/chatting-our-way-into-creating-a-polymorphic-malware">computer program and create programs that constantly change their appearance</a>, making them harder for security software to detect and block and to obtain an <a href="https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/">entire process of an artificial intelligence-driven cyberattack</a>, starting with targeted phishing emails and ending with gaining unauthorized access to someone&#8217;s computer.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20090 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5.png" alt="" width="569" height="440" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5.png 569w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-247x191.png 247w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-50x39.png 50w" sizes="auto, (max-width: 569px) 100vw, 569px" /></p>
<p style="text-align: center;"><em>Figure 5 &#8211; Screenshot from CheckPoint: Example of the ability to create a malware code without anti-abuse restrictions in a Telegram bot utilizing the OpenAI API</em></p>
<p> </p>
<p style="text-align: justify;">However, as highlighted by <a href="https://www.ncsc.gov.uk/blog-post/chatgpt-and-large-language-models-whats-the-risk">NCSC</a> and <a href="https://www.kaspersky.fr/blog/chatgpt-cybersecurity/20052/">Kaspersky</a>, <span style="color: #503078;"><strong>using ChatGPT</strong></span> for creating malware is not that reliable, due to potential errors and logical loopholes in the generated code, and even if it provides a certain level of support, <span style="color: #503078;"><strong>the tool doesn’t currently reach the level of cyber professional.</strong></span></p>
<p style="text-align: justify;"><strong> </strong></p>
<h3 style="text-align: justify;"><strong>Use Case #2 – Discover and exploit vulnerabilities</strong></h3>
<p style="text-align: justify;">When it comes to code vulnerabilities, ChatGPT raises several challenges in terms of detection and exploitation.</p>
<p style="text-align: justify;">In terms of <span style="color: #503078;"><strong>detection</strong></span>, ChatGPT is currently able to detect vulnerabilities in any piece of code submitted if properly prompted to do so, but it can also debug code. For example, when a computer security researcher asked ChatGPT to solve a capture-the-flag challenge, it successfully detected a buffer overflow vulnerability and wrote code to exploit it, with only a minor error that was later corrected.</p>
<p style="text-align: justify;">In terms of <span style="color: #503078;"><strong>exploitation</strong></span>, the risks posed by ChatGPT, and more generally Large Language Models (LLMs) can be used to produce malicious code or exploits despite restrictions, as they can be bypassed. Additionally, LLMs may generate vulnerable and misaligned code, and while future models will be trained to produce more secure code, it&#8217;s not the case yet. Moreover, some security researchers remain skeptical about AI&#8217;s ability to create modern exploits that require new techniques.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #3 – Create persuasive content for phishing and scam operations</strong></h3>
<p style="text-align: justify;">Creating persuasive text is a major strength of GPT-3.5/ChatGPT, and GPT-4 performs even better in this area. Consequently, it&#8217;s highly probable that automated spear phishing attacks using chatbots already exist. Crafting targeted phishing messages for individual victims is more resource-intensive, which is why this technique is typically reserved for specific attacks.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20092 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6.jpg" alt="" width="266" height="254" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6.jpg 266w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-200x191.jpg 200w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-41x39.jpg 41w" sizes="auto, (max-width: 266px) 100vw, 266px" /></p>
<p style="text-align: center;"><em>Figure 6 &#8211; Screenshot from chatGPT, pishing mail generation</em></p>
<p> </p>
<p style="text-align: justify;">ChatGPT has the potential to significantly change this dynamic, as it allows cybercriminals to <span style="color: #503078;"><strong>produce personalized and compelling messages for each target</strong>.</span> To include all necessary components, however, the chatbot requires detailed instructions.</p>
<p style="text-align: justify;">A notable advantage of ChatGPT is its capability to interact and create content in multiple languages, complete with reliable translation. In the past, this was a key way to identify scams and phishing attempts. While some methods are being developed to detect content created by ChatGPT, they haven&#8217;t yet proven entirely effective.</p>
<p style="text-align: justify;">This poses a significant risk to all companies, as it makes their employees more susceptible to such attacks and may expose their resources if passwords are stolen in this manner. As mentioned earlier, it is essential to raise awareness about this issue while also strengthening authentication methods, such as implementing two-factor authentication as a potential solution.</p>
<p style="text-align: justify;">Interestingly, other uses have been made of ChatGPT notoriety to develop scams without using the tool itself, such as <strong><span style="color: #503078;">phishing mails/Scams</span></strong> in order to push towards the purchase of a (fake)<span style="color: #503078;"><strong> ChatGPT subscription</strong> </span>and <a href="https://www.hackread.com/scammers-chatgpt-phishing-scam/?web_view=true">to provide personal data details</a></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #4 Exploit companies’ data</strong></h3>
<p style="text-align: justify;">ChatGPT has been trained on a massive amount of internet data, including personal sites and media content, meaning that it may have access to personal data that is currently hard to remove or control, as no &#8220;right to be forgotten&#8221; measures exist to date. Consequently, ChatGPT&#8217;s compliance with regulations like GDPR is under debate. GPT-4 can manage basic tasks related to personal and geographic information, such as identifying locations connected to phone numbers or educational institutions. By combining these capabilities, GPT-4 could be used to <span style="color: #503078;"><strong>identify individuals when paired with external data.</strong></span></p>
<p style="text-align: justify;">Another significant concern is the <span style="color: #503078;"><strong>sensitive information</strong></span> users might <span style="color: #503078;"><strong>provide through prompts</strong></span>. Users could inadvertently share confidential information when seeking assistance or using the chatbot for tasks, like reviewing and enhancing a draft contract. This information may appear in future responses to other users&#8217; prompts. They might not only find their confidential documents or research leaked on such platforms due to employees&#8217; inattention, but also reveal <span style="color: #503078;"><strong>information about their system or employees</strong></span> which will be used by hacker to <span style="color: #503078;"><strong>facilitate an intrusion</strong></span>. The primary course of action should be to increase awareness on this subject by providing formation and explanation or to restrict access to the website in the sensitive domains until there is a better comprehension of how data is utilized.</p>
<p style="text-align: justify;">Not only the real ChatGPT can be used for this objective, but the creation of <span style="color: #503078;"><strong>other chatbots</strong></span> using the same model as ChatGPT but configured to <span style="color: #503078;"><strong>trick victims into disclosing sensitive information</strong></span> or <span style="color: #503078;"><strong>downloading malware </strong></span>has also been observed.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #5 Disinformation campaigns </strong></h3>
<p style="text-align: justify;">ChatGPT can be used to quickly write very convincing articles and speeches <a href="https://www.nextinpact.com/article/70999/chatgpt-bard-et-autres-agents-desinformation-massive">based on fake news.</a> The American startup Newsguard <a href="https://www.newsguardtech.com/misinformation-monitor/jan-2023/">has conducted an experience</a> on ChatGPT to demonstrate its disinformation potential: on 100 fake information submitted to ChatGPT, the tool has produced fake detailed articles, essays and TV scripts for 80 of them, including significant topics such as Covid-19 and Ukraine<a href="#_edn2" name="_ednref2">[ii]</a>.</p>
<p style="text-align: justify;">As highlighted (again) by the war between Ukraine and Russia, <a href="https://www.nytimes.com/2023/02/08/technology/ai-chatbots-disinformation.html">the crucial role of information and disinformation</a> through cyber channels, can have significant consequences.</p>
<h3 style="text-align: justify;"><strong>Use Case #6 Create darknet marketplace</strong></h3>
<p style="text-align: justify;">Cybercriminals have also been observed using ChatGPT to support <span style="color: #503078;"><strong>the creation of DarkWeb marketplaces</strong>.</span> ChekPoint has illustrated this phenomenon with some examples<a href="#_edn3" name="_ednref3">[iii]</a>:</p>
<ul style="text-align: justify;">
<li>A cybercriminal post on a Darkweb forum showing how to code with ChatGPT a DarkWeb Market script that does not rely on Python or Java Script, using third-party API to get up-to-date cryptocurrency (Monero, Bitcoin and Etherium) prices as part of the Dark Web market payment system.</li>
<li>Dark web discussions threads linked to fraudulent usage of ChatGPT, such as how to generate an e-book or a short chapter using ChatGPT and then sell its content online.</li>
</ul>
<p> </p>
<p style="text-align: justify;"><strong> <img loading="lazy" decoding="async" class="aligncenter wp-image-20094 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7.png" alt="" width="675" height="242" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7.png 675w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-437x157.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-71x25.png 71w" sizes="auto, (max-width: 675px) 100vw, 675px" /></strong></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Screenshot from CheckPoint: Multiple threads in the underground forums on how to use ChatGPT for fraud activity</em></p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>What are the key take aways? </strong></h2>
<p style="text-align: justify;">Even if ChatGPT tends to lack of the necessary level of features, it can still be a useful tool to facilitate cyberattacks. Even if it is an obvious support tool mostly for script kiddies and unexperimented actors, ChatGPT &#8211; as any AI tool &#8211; can be a facilitator for any type of hackers, either to completely conceive a malware, to accelerate malicious actions such as phishing or to increase the sophistication level of cyberattacks.</p>
<p style="text-align: justify;">With the release of GPT-4, OpenAI has made efforts to counter inappropriate requests, however ChatGPT  still raise serious security issues and challenges for business security. It is important to keep in mind that the malicious use cases detailed in the previous section are only hypothetical scenarios: malicious use of ChatGPT has already been observed and it is essential to convey strong cybersecurity messages on the topic:</p>
<ul style="text-align: justify;">
<li>Don&#8217;t include sensitive info in queries to <a href="https://www.linkedin.com/feed/hashtag/?keywords=chatgpt&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7041697316570849280">#ChatGPT</a> : Avoid personal/sensitive information sharing while using ChatGPT</li>
<li>Stay informed and vigilant: AI-related topics are evolving quickly, it is central to stay put regarding tools evolution (e.g. release of Chat GPT 4.0), and new security topics that can emerged over time</li>
<li>Scams and phishing are likely to become more and more realistic in their crafting: continue raising awareness about this risk and train yourself and your ecosystem</li>
<li>Basic cybersecurity practices are still true: have a regular vulnerability management, set up doble authentication, train your teams and raise awareness…</li>
<li>ChatGPT opening the door to the possibility of creating realistic fake content, it is central to stay informed about tooling initiatives aiming at detecting machine-written text such as <a href="https://gptzero.me/">GPT Zero</a>, a tool developed by Princeton student (<em>Note: OpenAI is also working on a tool to detect machine-written text, but is for now far from being perfect since it </em><a href="https://www.nextinpact.com/article/70999/chatgpt-bard-et-autres-agents-desinformation-massive"><em>detect machine-written text only one in four times</em></a>)</li>
</ul>
<h1 style="text-align: center;">Reading of the Month</h1>
<h1 style="text-align: center;">CERT-EU : RUSSIA&#8217;S WAR ON UKRAINE: ONE YEAR OF CYBER OPERATIONS</h1>
<p style="text-align: justify;"><strong> <img loading="lazy" decoding="async" class="aligncenter wp-image-20096 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8.png" alt="" width="233" height="190" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8.png 233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8-48x39.png 48w" sizes="auto, (max-width: 233px) 100vw, 233px" /></strong></p>
<p style="text-align: center;"><a href="https://cert.europa.eu/static/MEMO/2023/TLP-CLEAR-CERT-EU-1YUA-CyberOps.pdf">https://cert.europa.eu/static/MEMO/2023/TLP-CLEAR-CERT-EU-1YUA-CyberOps.pdf</a></p>
<p style="text-align: justify;"><a href="#_ednref1" name="_edn1">[i]</a> <a href="https://cdn.openai.com/papers/gpt-4.pd">https://cdn.openai.com/papers/gpt-4.pd</a></p>
<p style="text-align: justify;"><a href="#_ednref2" name="_edn2">[ii]</a> <a href="https://www.newsguardtech.com/misinformation-monitor/jan-2023/">https://www.newsguardtech.com/misinformation-monitor/jan-2023/</a></p>
<p style="text-align: justify;"><a href="#_ednref3" name="_edn3">[iii]</a> <a href="https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/">https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/">CDT Watch – March 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber-attacks: what are the risks for backups and how to protect yourself?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/11/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/11/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself/#respond</comments>
		
		<dc:creator><![CDATA[Wajih JMAIEL]]></dc:creator>
		<pubDate>Mon, 29 Nov 2021 08:39:18 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Resilience]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17395</guid>

					<description><![CDATA[<p>Backup security is a topic of increasing concern to large accounts, often as part of initiatives to improve their cyber-resilience. When all the protection, detection and response measures have not been sufficient: the information system must be restored quickly from...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself/">Cyber-attacks: what are the risks for backups and how to protect yourself?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Backup </strong>security is a topic of increasing concern to large accounts, often as part of initiatives to improve their <strong>cyber-resilience</strong>. When all the protection, detection and response measures have not been sufficient: the information system must be restored quickly from the backups. Backups are indeed the <strong>last resort in the event of a cyber-attack.</strong></p>
<p>Attackers have understood this issue and we are seeing more and more cyber-attacks affecting backups. As highlighted in the <a href="https://uk.wavestone.com/en/insight/cyberattacks-in-2021-ransomwares-still-threat-n1">2021 benchmark of cyber-attacks in France</a>, <strong>in 21% of ransomware attacks, backup systems were targeted until they were rendered unusable</strong>.</p>
<h1>What is the attackers’ modus operandi for reaching backups?</h1>
<p>First, backups can be affected as <strong>collateral damage</strong>. This was the case a few years ago during a cyber-attack at one of CERT-Wavestone&#8217;s clients. In this, the backup management infrastructure was itself encrypted by the ransomware and had to be rebuilt before backups could be restored.</p>
<p>In ransomware attacks, attackers can also <strong>directly target backups </strong>to <strong>force their target to pay the ransom</strong>. For example, less than a year ago during a CERT-Wavestone incident response, the attacker took care to destroy all backups before encrypting the customer&#8217;s information system. The attacker was able to do this because the backup management infrastructure was administered through an account in the Active Directory. The attacker was able to elevate its privileges to the highest level and was able to easily connect to the backup infrastructure and delete all the backed up data.</p>
<h1>Some initial protective measures can significantly reduce the risk</h1>
<p>In <a href="https://uk.wavestone.com/en/insight/cyberattacks-in-2021-ransomwares-still-threat-n1">100% of the ransomware crises managed by CERT-Wavestone</a>, the attacker had Active Directory domain administration accounts. To prevent the attacker from reaching the backups by this mean, it is therefore necessary to <strong>separate the backup infrastructure from the Active Directory</strong>. To do this,  make sure that the backup administration accounts as well as the backup servers are outside the Active Directory (NB: this will not prevent this infrastructure from backing up the resources managed in the Active Directory).</p>
<p>To further reduce the risk of an administration account being compromised, backup administration access should also be strengthened, for example with <strong>multi-factor authentication </strong>(MFA).</p>
<p>Furthermore, since ransomware attacks often propagate on the same operating system, it may be worthwhile to <strong>adopt a different operating system for the backup infrastructure</strong>. Alternatively, at the very least, make a <strong>copy of the backup catalogue </strong>(database containing pointers to backups) <strong>on a different operating system</strong>. This enables rapid restoration of the backup infrastructure in the event of a compromise.</p>
<p>In addition, it is sometimes possible to apply <strong>retention measures to the backup storage technology, </strong>such as applying a delay before the actual deletion of the data or keeping a copy (or snapshot) on the storage array. This allows for a delay of one or more days before the data is completely lost in the event of a deletion.</p>
<h1>To go further&#8230;</h1>
<p>Various initiatives are emerging to standardize data protection measures to face the growing threat (e.g. <a href="https://www.hkma.gov.hk/media/eng/doc/key-information/guidelines-and-circular/2021/20210518e1.pdf">Secure Tertiary Data Backup Guideline </a>by the HKAB &#8211; <em>Hong Kong Association of Banks</em>, <a href="https://www.shelteredharbor.org/how-it-works">Sheltered Harbor </a>in the United States&#8230;).</p>
<p>In addition, backup vendors are building their solutions with the cyber threat in mind, with <strong>ransomware detection features</strong>, <strong>immutability features </strong>(to make backed up data completely unalterable, even for an administrator) or even <strong>&#8220;offline&#8221; backup isolation </strong>capabilities<strong>. </strong></p>
<p>These solutions can be adopted to <strong>replace or complement </strong>existing backup solutions. Nevertheless, they <strong>often require significant investments</strong>. As we have seen, a certain number of initial protection measures can already greatly reduce the risk. It is therefore important to identify the feared threat scenarios and your level of exposure. It is also important to identify any compliance requirements (regulations, standards, etc.), in order to define an appropriate roadmap of maturity improvement.</p>
<p><em>This article is intended as an introduction to protecting backups against cyber-attacks. We will have the opportunity to go into more detail on this subject in future publications.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself/">Cyber-attacks: what are the risks for backups and how to protect yourself?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/11/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Risk analysis and IoT: a marriage of love or reason?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/01/risk-analysis-and-iot-a-marriage-of-love-or-reason/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Wed, 27 Jan 2021 06:00:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[connected devices]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[IoT risk]]></category>
		<category><![CDATA[methodology]]></category>
		<category><![CDATA[project management]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk analysis]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14988</guid>

					<description><![CDATA[<p>Wavestone and Sigfox share a common passion for tech, innovation and security. Our discussions led us to explore the foundation of all cybersecurity initiatives (the risk analysis), why this is different for an IoT project and, most importantly, how you...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/risk-analysis-and-iot-a-marriage-of-love-or-reason/">Risk analysis and IoT: a marriage of love or reason?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wavestone and Sigfox share a common passion for tech, innovation and security. Our discussions led us to explore the foundation of all cybersecurity initiatives (the risk analysis), why this is different for an IoT project and, most importantly, how you can get started.</p>
<p>&nbsp;</p>
<h2>What is a cyber risk analysis?</h2>
<p>Did you ever wonder what would happen if a device your company developed and sells leak the data it collects? Or if that data were corrupted or suddenly made unavailable? What would be the most detrimental? <strong>What if your solution was vulnerable to a cyberattack?</strong> Could the consequences be a takeover of device(s) which leads to a safety hazard such as a building taking fire or even a human casualty? Or maybe it could “just” be a pivot attack onto your customer’s network that leads to a full incapacity for your and your customer’s businesses to operate.</p>
<p>If you are currently developing an IoT solution and are not having a nervous breakdown when considering such possibilities, you are probably wondering though how your CISO (Chief Information Security Officer) is not having one.</p>
<p>Well it is probably because your CISO<strong> has a method</strong>: they consider every risk from <strong>an unbiased perspective and in a comparable manner</strong>. Ensuring each risk is correctly evaluated (i.e. not overestimated or underestimated) and sharing the outcome of this evaluation with all project stakeholders is the first important step. Once all stakeholders agree upon every risk your company has the right basis to decide control measures.</p>
<p>This approach does not mean you should address every risk to the point that your solution is virtually <em>unhackable</em>. Frankly, this is not technically possible, and your budget would vanish far before achieving a so called zero cyber risk solution. Each control measure must be prioritized and proportional to the risk likelihood and severity.</p>
<p>What we described above is known as a <strong>risk analysis methodology</strong>. Cybersecurity professionals use this methodology as the baseline to their company’s cybersecurity initiatives. The professionals evaluate risk scenarios (often tied to service availability, data integrity, confidentiality and/or traceability of actions) and the impacts on their company’s brand image, legal liabilities, safety consequences and of course financial outcomes. The higher the risk is evaluated, the higher the priority is set to lower the likelihood of the risk occurring (e.g. add barriers to an attack, reduce the attack surface, etc.) or the severity of outcomes if the risk occurs (e.g. apply segmentation to reduce the spread of an attack).</p>
<p>If you want to learn more about the existing risk analysis methodologies you should start with ISO27005 which has a wide scope of adoption and understanding across various industries.</p>
<p>Be reassured that <strong>talking about risks will not increase the likelihood of the problem occurring </strong>(if you ever feared that), however not talking about them puts the project at great risk.</p>
<p>&nbsp;</p>
<h2>What makes an IoT Project risk analysis different?</h2>
<p>Hopefully we have convinced you that doing a risk analysis of your project is an important task; we will touch upon how you can get started quickly in the next chapter. Before we get there, we will detail what makes the exercise specific for an IoT project: what are the characteristics of such projects and what makes the risk analysis more difficult or simpler?</p>
<p>Let us start with the common characteristics that should be considered for a risk analysis. First of all, an IoT initiative often relies on a very decentralized network of hardware (sensors, gateways, servers, etc.). These devices can be spread over a large geographical area, sometimes all over the world, and are meant to remain in the field for a long time with little to no onsite maintenance. It is common to see B2B IoT devices that aim for a lifetime of more than 10 years (e.g. a water metering project for utility companies). B2C devices can also aim for such lifetimes – think of connected vehicles for instance. It is also noteworthy that IoT devices usually have limited user interfaces such as a screen and keyboard. Despite this, the buttons, LED and mobile applications allow the necessary interactions or customizations to the IoT device for you to collect data from the field. Remember, the data collected from connected devices is where the value resides. Thus, whether that data is critical or not is essential in the risk evaluation. Finally, we need to remind ourselves that an IoT project is still an IT project. If the devices are not typical laptops, the application servers and storage remain central in most cases. This is where a large part of the risk remains, but fortunately, there are many best practices for this portion of the solution as well.</p>
<p>From a cybersecurity perspective such characteristics can make IoT projects riskier. For instance:</p>
<ul>
<li>The physical security of a decentralized network is very hard to enforce. Where are the devices located? Are the devices accessible to the public? Can someone easily steal, damage or tamper the devices? For example, a tracker installed on a pallet travels outside trusted premises and can be damaged or removed – intentionally or not. Of course, this risk is amplified by a wider geographical footprint.</li>
<li>Given the limited user interactions and the longer device lifetime, it can become very costly and time-consuming to maintain the devices, especially if you must physically dispatch technicians. Hands-on intervention can be simply unrealistic, but even firmware upgrades have a failure rate. Because of all this, the controls must be relevant for the long run.</li>
<li>In any IoT project, the sensitivity of the data is a factor that must be considered. Is it critical for your company? For consumer projects the sensitivity of the data can be perceived as very high because the devices will collect data from the “real” world.</li>
<li>IoT solutions consist of many different technologies and vendors. This is a challenge for us: what are the security practices followed by each of these vendors and do these practices sufficiently cover my risks?</li>
<li>Finally, the security controls that can be applied are dependent on the capacities of the devices and softwares. For example, many sensors run on 8-bits MCU and thus cannot run complicated encryption algorithms.</li>
</ul>
<p>Fortunately, all these characteristics also play a role in reducing the cyber risks for IoT projects.</p>
<ul>
<li>With very decentralized deployments, the level of effort required by an attacker to access a large number of devices is burdensome. Compromising a single device is one thing but compromising the entire fleet of devices is an entirely different task. This is especially true if physical tampering or proximity is required.</li>
<li>The application of the IoT devices are rarely handled directly by a user and there are limited user interactions after installation. Thus, attackers have limited opportunities to trick the user into misusing the application.</li>
<li>Depending on the context, the value of the data can be very limited for attackers (e.g. room temperature monitoring used to control AC systems). What is more, the value can also decrease sharply with time. Production data can be critical for real-time control of processes, but it becomes a lot less valuable a few minutes after.</li>
<li>The architecture of IoT solutions is usually segregated from the IT systems including servers or data centers. This segregation enables companies to easily define and protect integration points.</li>
<li>Finally, the limited capacities of the device play a role in preventing any harmful attempt. Attackers simply cannot access, implant malware or effectively control sensors with 8-bit MCUs.</li>
</ul>
<p>&nbsp;</p>
<div class="slate-resizable-image-embed slate-image-embed__resize-full-width">
<figure id="post-15039 media-15039" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15039 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3.png" alt="" width="1845" height="883" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3.png 1845w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3-399x191.png 399w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3-768x368.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3-1536x735.png 1536w" sizes="auto, (max-width: 1845px) 100vw, 1845px" /></figure>
</div>
<div></div>
<h2>So now, how can I get started?</h2>
<p>Well, take a deep breath and involve your CISO.</p>
<p>The CISO must identify and evaluate applicable regulations, decide what level of risks is acceptable, provide policies to follow and tools to implement security measures. Perhaps you should appoint Product Security Officer to specifically address IoT security in your company or even a given IoT product’s security if the stakes require it.</p>
<p>Getting to an acceptable level of security will require expertise on the various areas of the IoT solution. If you are that expert, then you should probably be ready to get involved. This will drive the whole team to consider the:</p>
<ul>
<li>End-to-end security on the technology stack: from hardware to cloud including embedded software, network connectivity, mobile apps, etc.</li>
<li>End-to-end security from a device lifecycle perspective. When you design your device, think about all phases: from manufacturing to distribution; from initial use to normal usage; resell, refurbish, recycle or trash.</li>
<li>Partners involvement: make sure not to forget them and assess their maturity. You might need to take measures to support them or upskill them (<em>hint</em>: ask your CISO or PSO for it).</li>
<li>Audit of your device and the whole technology stack. Do this regularly because your software may not have changed but the threats and known vulnerabilities may have.</li>
<li>Long-term security updates and maintenance: define for how long you will update and deploy your devices.</li>
<li>Incident response organization: define how you can be notified of vulnerabilities or breaches and how you can plan to respond (from a technical and a communication point of view).</li>
</ul>
<p>IoT cybersecurity is not impossible. It actually provides methodologies and tools to help achieve a secure landscape.</p>
<p>Project stakeholders and customers are seeking and pressuring for secure products. Regulation to enforce security are imminent and frameworks to help align every actor regarding its duties will continue to be applied. It is time to get ahead now if you are looking to make cybersecurity an asset for your product on your market!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/risk-analysis-and-iot-a-marriage-of-love-or-reason/">Risk analysis and IoT: a marriage of love or reason?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quantified risk estimate (2/2): What data, what tools?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/12/quantified-risk-estimate-2-2-what-data-what-tools/</link>
		
		<dc:creator><![CDATA[Charles Dubos]]></dc:creator>
		<pubDate>Mon, 14 Dec 2020 14:32:13 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[estimation]]></category>
		<category><![CDATA[FAIR]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[quantified]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14826</guid>

					<description><![CDATA[<p>If we have seen in a previous article the predominance of FAIR in the world of quantification[1],  another article published here in early June[2] (detailing the FAIR method in its second part) emphasizes the care to be taken in the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/quantified-risk-estimate-2-2-what-data-what-tools/">Quantified risk estimate (2/2): What data, what tools?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If we have seen in a previous article the predominance of FAIR in the world of quantification<a href="#_ftn1" name="_ftnref1">[1]</a>,  another article published here in early June<a href="#_ftn2" name="_ftnref2">[2]</a> (detailing the FAIR method in its second part) emphasizes the care to be taken in the method workflow, whose results of the calculations (possibly  being automated) allow to obtain precise  values. .</p>
<p>However, how to model these different FAIR input data?  How to compute with these data? Are there tools to simplify their collection or estimate their quality, and what efforts do they require to be implemented?</p>
<p>Having seen previously how trustworthy the risk quantification method was in its processes, let&#8217;s now see how the inevitable part of subjectivity can be isolated, and which facilitators can help to obtain reliable results.</p>
<p>&nbsp;</p>
<h2>The FAIR fuel: data</h2>
<p>The risk analysis proposed by FAIR (according to the standardization document published by openGroup)<a href="#_ftn3" name="_ftnref3">[3]</a>  is carried out in four stages:</p>
<ul>
<li>At first, in a fairly conventional way, it is a question of specifying the scope of the examined risk : what is the asset (subject to risk), what is the threat context (agent and scenario), and what is the loss event (the dreaded event in terms of losses);</li>
<li>The second step (called Evaluate Loss Event Frequency) aims at collecting all the frequency data related to the loss event (and thus intimately linked to the threat agent). This consists of collecting the values for the left branch of the arborescence below.</li>
<li>The third one (called Evaluate Loss Magnitude), because it assesses the loss, is focused on the asset. It is then a question of estimating the various primary losses (i.e. the inevitable loss in case of risk occurrence) and secondary (or possible loss, i.e. not occurring systematically when the risk advent). Its goal is to collect the values of the right branch in the tree below.</li>
<li>Finally, the last step (called Derive and Articulate Risk) consists in merging the collected data as defined in the FAIR tree by the various calculations, to obtain the result in the form of usable outputs.</li>
</ul>
<p>&nbsp;</p>
<figure id="post-14806 media-14806" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14806 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1.png" alt="" width="1904" height="468" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1.png 1904w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1-437x107.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1-768x189.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-1-1536x378.png 1536w" sizes="auto, (max-width: 1904px) 100vw, 1904px" /></figure>
<p style="text-align: center;">Link between FAIR analysis and taxonomy</p>
<p>&nbsp;</p>
<p>Without detailing more the taxonomy, already discussed in the article presented before2, one can note that the standard analysis of a single risk requires seven data  (corresponding to the elements at the base of the tree):</p>
<ol>
<li><em>Contact frequency;</em></li>
<li><em>Possibility of action;</em></li>
<li><em>Threat capability;</em></li>
<li><em>Resistance strength;</em></li>
<li><em>Primary loss magnitude;</em></li>
<li><em>Secondary loss magnitude;</em></li>
<li><em>Secondary loss event frequency.</em></li>
</ol>
<p>It should be added that FAIR invites to decline losses (primary and secondary) into six categories (in order to ease and accurate estimate of the loss):</p>
<ul>
<li>The <em>production</em> losses: related to the interruption of the service produced by the asset;</li>
<li>The <em>response</em> cost: related to the incident response;</li>
<li>The <em>replacement</em> costs: related to the replacement of damaged constituents of the asset;</li>
<li>The <em>fine/judgement</em> costs: related to fines, court fees and legal proceedings;</li>
<li>The financial impact on <em>competitive advantage</em>: related to the impact on the organization in its sector;</li>
<li>The <em>reputation</em> costs: related to the impact on the public image of the organization.</li>
</ul>
<p>&nbsp;</p>
<h2>How do we correctly model risk uncertainty?</h2>
<p>Furthermore, it is good to ask the question of what a FAIR data is actually.</p>
<p>Indeed, it is too reductive to define a data by a single numerical value. For example, lets consider a ransomware attack: it would be incorrect to say that an occurrence of this risk would cost exactly 475k €<a href="#_ftn4" name="_ftnref4">[4]</a> (illustrated by the blue curve on graph 1).</p>
<p>&nbsp;</p>
<figure id="post-14808 media-14808" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-14808 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/image-2-286x191.png" alt="" width="286" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-2-286x191.png 286w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-2-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-2.png 352w" sizes="auto, (max-width: 286px) 100vw, 286px" /></figure>
<p style="text-align: center;">Graph 1: A distribution, a more realistic model than a single value</p>
<p>&nbsp;</p>
<p>However, adding uncertainty to this data by accompanying it with a minimum value (which could be  1€ in our example) and a maximum one (of  300 M€ in the same example), while keeping the most likely value stated above, would allow to model much more accurately the reality (purple curve of graph 1).</p>
<p>A data is then defined by a minimum, a maximum and a most likely value (corresponding to the peak of the distribution). We can also, note that such a probability distribution is independent of the kind of values considered: it may as well be a loss in any currency  (cf. the previous example), than an occurrence (for example, between once a year and once every 10 years, and a value more likely around once every two years), or even a ratio (between  30% and 70%, more likely 45%). Hence, we can use these distributions to model all the  data of the FAIR taxonomy.</p>
<p>Another advantage of predicting uncertainty through distribution is that it is possible to fine-tune the degree of confidence in the most likely value, via the kurtosis coefficient of the curve. The higher it would be, the greater the data will be trusted (corresponding to a very marked peak, see the green curve on graph 2). On the other hand, an unreliable data will be modelled by a much more homogeneous distribution (see the red curve on graph 2).</p>
<p>&nbsp;</p>
<figure id="post-14810 media-14810" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-14810 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/image-3-286x191.png" alt="" width="286" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-3-286x191.png 286w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-3-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-3.png 352w" sizes="auto, (max-width: 286px) 100vw, 286px" /></figure>
<p style="text-align: center;">Graph 2: Reflecting the level of trust through distributions</p>
<p>&nbsp;</p>
<p>However, using distributions rather than fixed values is a problem when it comes to combine them, which will necessarily be the case when we will make the computations of the FAIR tree. As we can indeed see on graph 3 (the addition of the green distribution and the red one giving the violet), the addition of two distribution does not allow to obtain a distribution as &#8216;simple&#8217; as the previous ones (it no longer follows a log-normal distribution). This is also the case in the context of a multiplication (the result of which is also complex).</p>
<p>&nbsp;</p>
<figure id="post-14812 media-14812" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-14812 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/image-4-286x191.png" alt="" width="286" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-4-286x191.png 286w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-4-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-4.png 550w" sizes="auto, (max-width: 286px) 100vw, 286px" /></figure>
<p style="text-align: center;">Graph 3: addition of two distributions.</p>
<p>&nbsp;</p>
<p>To obtain a mathematically consistent result, game theory gives us a simple way: The Monte Carlo simulations. It is in fact a matter of dissecting the distributions (the green and the red of the graph 3), in a predefined number of random values (called number of simulations), distributed in such a way as to correspond to the given distribution. We can then combine the distributions thus dissected by performing the calculations on pairs of values of each distribution. The new distribution can then be approximated, and will be all the more precise as the number of simulations will be large.</p>
<p>&nbsp;</p>
<h2>Hands on toolboxes to automate FAIR&#8230;</h2>
<p>To make these calculations and obtain a numerical value of risk, solutions have emerged (mainly from the FAIR method). We will therefore address here the pros and cons of these tools, which are also cited in the previous article1.</p>
<h3>The OpenFAIR Analysis Tool</h3>
<p>The first we can cite hire is the OpenFAIR Analysis Tool<a href="#_ftn5" name="_ftnref5">[5]</a>. While this tool has a pedagogical purpose, it nevertheless helps to understand how FAIR works. It is thus possible to have a first concrete application of the method, and to obtain simply results (only for the analysis of a single risk). Developed by the University of San José (California) in collaboration with the OpenGroup, this tool relies on an Excel sheet to obtain a risk assessment from a predetermined number of  simulations, scrupulously respecting the FAIR taxonomy.</p>
<p>&nbsp;</p>
<figure id="post-14814 media-14814" class="align-none"><img loading="lazy" decoding="async" class="wp-image-14814 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5.png" alt="" width="1931" height="1091" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5.png 1931w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5-768x434.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-5-1536x868.png 1536w" sizes="auto, (max-width: 1931px) 100vw, 1931px" /></figure>
<p style="text-align: center;">OpenFAIR Risk Analysis Tool: a tool that is first and foremost educational</p>
<p>&nbsp;</p>
<p>Very useful to have a first contact with quantification, this tool remains however very limited in terms of use. Finally, one should note that Excel is needed, and it is only accessible with an evaluation license limited to 90 day.</p>
<h3>Riskquant</h3>
<p>For a larger scale use, Netflix&#8217;s R&amp;D department has developed Riskquant<a href="#_ftn6" name="_ftnref6">[6]</a> solution. It is a Python programming library, relying more particularly on tensorflow (a specialized python module for massive statistical calculation). Riskquant&#8217;s particularity is to propose a quantification of risk inspired by the FAIR taxonomy, but with a great freedom in its approach and its implementation. Developed to facilitate the use on containers, it would allow by its design very fast evaluations from csv files.</p>
<p>&nbsp;</p>
<figure id="post-14816 media-14816" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14816 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6.png" alt="" width="1920" height="1020" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6.png 1920w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6-768x408.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-6-1536x816.png 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></figure>
<p style="text-align: center;">Riskquant: an original approach but lacking maturity</p>
<p>&nbsp;</p>
<p>However, keeping of FAIR taxonomy only a single loss value and a single frequency makes it not very usable, especially in the context of an organization that would seek to precisely scope its risks. In addition, it provides so far only a few exploitable results and clearly lacks maturity. Finally, it seems to have been dormant since May 1<sup>st</sup>, 2020 (the date of the last commit on the GitHub page of the solution).</p>
<h3>PyFAIR</h3>
<p>To conclude on this paragraph on solutions that can be used for a basic implementation of FAIR, the PyFAIR library is available on the official python repository (downloadable via the pip tool). Now mature, the tool allows a decomposition of risk according to the FAIR taxonomy. It also allows the feed of the FAIR tree with intermediates values, or the aggregation of data that can be used for several risks (e.g. allowing groupings by asset or threats). It is capable of calculating overall and global risks, and provides easily usable distributions (exploitable with other simple python modules), but also gives access to advanced charts and HTML pre-formatted reports.</p>
<p>&nbsp;</p>
<figure id="post-14818 media-14818" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14818 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-7.png" alt="" width="532" height="274" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-7.png 532w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-7-371x191.png 371w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-7-71x37.png 71w" sizes="auto, (max-width: 532px) 100vw, 532px" /></figure>
<p style="text-align: center;">PyFAIR, a complete and efficient library in Python</p>
<p>&nbsp;</p>
<p>Although it remains a programming toolbox, hence requiring an appetence and time to develop and maintain a Python solution, PyFAIR is well-designed. It facilitates the implementation of FAIR by staying very close to the taxonomy, and provides functions facilitating implementation and the exploitation of the results. Suitable to be operated on multiple levels (i.e. using it only to calculate results by influencing the fine settings of FAIR and Monte Carlo, or by exploiting its high-level reporting functions), it makes it possible to envisage a use of quantification technically facilitated and on a large scale.</p>
<p>&nbsp;</p>
<h2>&#8216;Turnkey&#8217; platforms to make data acquisition easier:</h2>
<p>Nevertheless, the main difficulty of FAIR remains, as we have seen before, obtaining the data and their trust level. To deal effectively, the most efficient solution is to rely on a platform that integrates a CTI database.</p>
<p>These platforms provide risk threat statistics (very few company-dependent). They also support in deploying and implementing the quantification method in the organization, which includes a guidance in obtaining the appropriate loss data.</p>
<h3>RiskLens</h3>
<p>The first of these solutions is the RiskLens<a href="#_ftn7" name="_ftnref7">[7]</a> platform. This solution, directly derived from the FAIR methodology, was co-founded by Jack Jones. It is used as technical support for the development of the method, linked to the FAIR Institute. Emphasing on a technical approach of the method, it focuses on the respect of the standards of analysis  in general  and the definition of the perimeter (first  step  of FAIR) in particular.</p>
<p>&nbsp;</p>
<figure id="post-14820 media-14820" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14820 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-8.png" alt="" width="776" height="431" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-8.png 776w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-8-344x191.png 344w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-8-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-8-768x427.png 768w" sizes="auto, (max-width: 776px) 100vw, 776px" /></figure>
<p style="text-align: center;">RiskLens, FAIR&#8217;s application to the letter</p>
<p>&nbsp;</p>
<p>Nevertheless, it should be noted that, on the one hand, this solution requires advanced notions in the FAIR methodology to be easily operable. Indeed, the platform does not provide a consequent help in obtaining data (which, as we have seen, remains the keystone of quantification), on the basis that the definition of the perimeter is enough to define precisely the data, and thus to obtain it easily. On the other hand, it is an American platform, which implies that the interface (quite unintuitive) is only available in that language, and that the data collected is also subject to U.S. regulations.</p>
<h3>CITALID</h3>
<p>The second platform we will mention here is the French startup CITALID, whose approach is fundamentally different. Indeed, it has been founded by two ANSSI analysts, who wanted to link the CTI to the risk management. Thus, using FAIR as the tool to make this link, it makes its effort on the conception and the maintenance of the database, made of solid figures kept up to date, to closely monitor the local and international cyber geopolitical situation.</p>
<p>&nbsp;</p>
<figure id="post-14822 media-14822" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14822 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9.png" alt="" width="1920" height="1080" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9.png 1920w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/image-9-1536x864.png 1536w" sizes="auto, (max-width: 1920px) 100vw, 1920px" /></figure>
<p style="text-align: center;">CITALID, a high value-added database</p>
<p>&nbsp;</p>
<p>The CITALID platform provides real support in the definition and the collection of the FAIR data, thus allowing to identify precisely where is the remaining part of subjectivity undeniably linked to risk. Available in French and English, it facilitates the management of cyber risk by taking into account all the parameters of the organization (location, size, sector of industry, level of maturity, compliance with standards, etc.), to provide data originating from appropriate contexts. Furthermore, and in addition to an interactive explanation of each of the platform&#8217;s fields, the startup supports its customers in collecting the needed inner data of their organization.</p>
<p>&nbsp;</p>
<h2>First step with FAIR&#8230;</h2>
<p>Anyhow, the difficulty will always be to succeed in the transition from qualitative to quantitative estimation. Even if solutions can facilitate this shift, leaving a controlled qualitative method for a new unassimilated assessment method remains a challenge, despite all the benefits the new method promises.</p>
<p>If three points were to be highlighted to pursue on the quantitative way, they could be:</p>
<ul>
<li>First, to make sure the required maturity is reached. Quantification requires a good understanding of the level of security of the concerned IS, and a pre-existing and well-established risk management method. If quantification provides solutions to assess the cost of a risk, provision it or estimate  the  ROI  of a measure, it is however useless  (or even counterproductive) to embark on this path too early (at best it will be a waste of time, at worst it will degrade the existing risk management process).</li>
<li>Then, to have a gradual approach in the deployment of quantification. In a mature IS with stable risk management, it is preferable to gradually adopt the quantitative method. This allows to gain confidence in the estimates produced (potentially by making it coexist with the elder qualitative estimation method) and to assimilate the methodology, while ensuring its integration into the existing risk management workflow.</li>
<li>Finally, rely on existing experience in collecting cyber risk data. As the difficulty stays confined in obtaining reliable data, it is crucial (to be confident in the method) to have trusted figures. It then seems appropriate make use of a platform that can provide data of quality, and a support in the collection of our own data. It will furthermore have more experience deploying the methodology to various customers. The quality of the provided results will then be the key element in the confidence that the organization will have in the quantitative method.</li>
</ul>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://www.riskinsight-wavestone.com/en/2020/11/quantified-risk-assessment-1-2-a-quantification-odyssey/">https://www.riskinsight-wavestone.com/en/2020/11/quantified-risk-assessment-1-2-a-quantification-odyssey/</a></p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://www.riskinsight-wavestone.com/en/2020/06/la-quantification-du-risque-cybersecurite/">https://www.riskinsight-wavestone.com/2020/06/la-quantification-du-risque-cybersecurite/</a></p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://publications.opengroup.org/c13g">https://publications.opengroup.org/c13g</a></p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> <a href="https://www.sophos.com/fr-fr/medialibrary/Gated-Assets/white-papers/sophos-the-state-of-ransomware-2020-wp.pdf">https://www.sophos.com/fr-fr/medialibrary/Gated-Assets/white-papers/sophos-the-state-of-ransomware-2020-wp.pdf</a></p>
<p><a href="#_ftnref5" name="_ftn5">[5]</a> <a href="https://blog.opengroup.org/2018/03/29/introducing-the-open-group-open-fair-risk-analysis-tool/">https://blog.opengroup.org/2018/03/29/introducing-the-open-group-open-fair-risk-analysis-tool/</a></p>
<p><a href="#_ftnref6" name="_ftn6">[6]</a> <a href="https://netflixtechblog.com/open-sourcing-riskquant-a-library-for-quantifying-risk-6720cc1e4968">https://netflixtechblog.com/open-sourcing-riskquant-a-library-for-quantifying-risk-6720cc1e4968</a></p>
<p><a href="#_ftnref7" name="_ftn7">[7]</a> <a href="https://www.risklens.com/">https://www.risklens.com/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/quantified-risk-estimate-2-2-what-data-what-tools/">Quantified risk estimate (2/2): What data, what tools?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quantified Risk Assessment (1/2): A Quantification Odyssey</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/quantified-risk-assessment-1-2-a-quantification-odyssey/</link>
		
		<dc:creator><![CDATA[Charles Dubos]]></dc:creator>
		<pubDate>Mon, 30 Nov 2020 17:42:47 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[FAIR]]></category>
		<category><![CDATA[FAIR methodology]]></category>
		<category><![CDATA[ISO27k]]></category>
		<category><![CDATA[OpenFAIR]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14448</guid>

					<description><![CDATA[<p>A few months ago, François LUCQUET and Anaïs ETIENNE told us of the growing interest in quantifying cyber risks[1], but also warned us against going to the path of quantification without prior reflection. Their analysis, which is still relevant, emphasized...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/quantified-risk-assessment-1-2-a-quantification-odyssey/">Quantified Risk Assessment (1/2): A Quantification Odyssey</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A few months ago, François LUCQUET and Anaïs ETIENNE told us of the growing interest in quantifying cyber risks<a href="#_ftn1" name="_ftnref1">[1]</a>, but also warned us against going to the path of quantification without prior reflection. Their analysis, which is still relevant, emphasized in particular the level of maturity required to engage in a method of quantitative estimation. This latter point of maturity level drastically reduces the scope of organizations which are likely try it out. However, some methods of quantification are the source of solutions that give hope in the ability of quantifying its risks in financial terms, and by the same logic of being capable to estimate a return on investment.</p>
<p>It is therefore useful at this point to take a look at the existing methods and the theories that could lead us to concrete results. In the big bang of cyber risk quantification, what are the theoretical foundation for the development of a method? Which ones have succeeded, which ones seem mature? Can we expect in the short or medium term, alternatives to the current quantitative assessment methods?</p>
<p>&nbsp;</p>
<h2>Roadmap: Risk analysis and quantification:  what can we expect of it?</h2>
<p>To locate the quantification in the field of risk management, let&#8217;s start by clarifying what we are looking for. Within the risk management process, the primary objective is to define an efficient numerical value, illustrating a level of risk (usually a financial cost).</p>
<p>It is therefore, according to the ISO27k standard, only a new risk assessment. Indeed, preceding phases of risk contextualization and identification have no reason to be affected by quantification. The phases of risk treatment, acceptance, supervision or communication, while they will benefit from the results of the quantitative analysis, are unchanged in their workflow. Simply put, it is only question of changing the way each risk is estimated and computed.</p>
<p>&nbsp;</p>
<figure id="post-14762 media-14762" class="align-none"><img loading="lazy" decoding="async" class="wp-image-14762 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image4.png" alt="" width="761" height="553" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image4.png 761w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image4-263x191.png 263w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image4-54x39.png 54w" sizes="auto, (max-width: 761px) 100vw, 761px" /></figure>
<p>&nbsp;</p>
<p>This point, rather trivial but crucial, allows us to ensure that, even if they are fundamentally different from the qualitative methods in their results, the quantitative ones will in any case support pre-existing methods. So, we can be reassured that, although it is necessary to use them to have a mature risk management process, it will also be the basis for the quantification (that will thus exploit the pre-existing risk identification phase).</p>
<p>Now that we have framed the contribution of quantification in an organization&#8217;s overall risk analysis, let us specify what we would expect (regardless of the possibility of achieving these assertions):</p>
<ul>
<li>On the one hand, it is imperative for this method to be more precise in its result, compared to the qualitative method that it has to replace. This means above all that, from the first occurrence and without having previous results records, it must give a precise numerical estimation (which may as far as possible contain several values: maximum risk or probable risk in particular).</li>
<li>We may also want it to be faster to achieve (or at least to be carried out in an acceptable time), in order to be able to completely replace the qualitative estimate in the long-term. We are here talking about the time it would take to implement the analysis, without worrying a lot about the time it would take for computations (which can now be efficiently delegated, especially via the cloud). In the end, correlating this with the previous point, it is only question of having a better efficiency than the qualitative evaluation.</li>
<li>Furthermore, we wish the quantitative assessment to be based on concrete data, in order to gain credibility in the results that will be produced. Indeed, since the workflow of a quantitative method is based on mathematical theories, only an incorrect implementation could introduce subjectivity into the values obtained. This last point would justify that in a time equivalent to qualitative analysis, we have finer results.</li>
<li>Finally, and this stems from the previous point, we need to have a precise taxonomy, for the collected data to be clearly defined (regardless of the kind of risk). Indeed, if the quantitative estimate is based on proven mathematical theories, the quality of the data produced will then depend only on the quality of the data used as input, and in particular on the relevance and the consistency of the data, depending largely on its definition..</li>
</ul>
<p>&nbsp;</p>
<h2>At the core of the galaxy: moving from theory to practice</h2>
<p>Having specified what are the characteristics of quantification, let us now see what mathematical theories would take into account the hazard associated with a risk.</p>
<p>Consider, for example, the fuzzy sets theory. This mathematical theory is based on the principle that an element, instead of classically belonging or not to a mathematical ensemble, may only partially belong to it, according to a stated degree. This could be useful to highlight the occurrence or the impact of a risk with the degree of belonging of that risk to ensembles. This theory, while interesting, has not led to concrete applications.</p>
<p>Another approach, which could be called correlative, would be based on the use of self-learning neural networks, to determine from CTI data what the level of risk of a company would be, according to its characteristics. This theory has benefited from the current popularity for artificial intelligence. This led to academics’ studies comparing different modes of machine learning (notably BP<a href="#_ftn2" name="_ftnref2">[2]</a> or RBF)<a href="#_ftn3" name="_ftnref3">[3]</a>, in order to be used in cyber risk analysis. However, to date, it does not appear mature enough to lead to a realistic method.</p>
<p>Finally, the only mathematical solution that has paid off has been the statistical analysis (and game theory, which offers the means to combine statistical distributions, see the &#8220;Risk Quantification and Data: Advice and Tools&#8221;<a href="#_ftn4" name="_ftnref4">[4]</a> article about this subject). The principle of statistical analysis is to rely on statistical observations to estimate the level of a risk. The hazard of risk is then, in large part, taken into account by the distribution of the statistics.</p>
<p>Based on these statistics, two approaches are practicable:</p>
<ul>
<li>The first is illustrated by a method proposed by the IMF<a href="#_ftn5" name="_ftnref5">[5]</a>. It proposes to assess a cyber risk by a detailed statistical analysis. However, it is highly computational and inaccessible for regular use or as a part of a quantified risk estimate. However, it retains an undoubted interest in an analysis of a level of cyber risk on several entities that would have similar data, which may be useful for an insurer or in the banking community. However, it remains confined to this use. Reduced to the already limited scope of entities with acceptable cyber maturity, this method does not seem to be able to offer in the short or medium term an exploitable solution for the IS level of an organization.</li>
<li>The second is to break down any cyber risk based on common characteristics. This is in particular the approach of the FAIR methodology: it proposes in its taxonomy (see &#8216;how to apply the FAIR method’1) a dissociation of risk according to its occurrence and the estimated impact, from a financial point of view. FAIR then proposes a declination of these two parameters which, because of their universal nature, may therefore be applied to any cyber risk. This type of method has the advantage of proposing an identical process for the analysis of any cyber risk, facilitating its use in an organizational context (that can then compare cyber risks of distinct natures).</li>
</ul>
<p>&nbsp;</p>
<figure id="post-14758 media-14758" class="align-none">
<figure id="post-14760 media-14760" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14760 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1.png" alt="" width="1865" height="593" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1.png 1865w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1-768x244.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1-1536x488.png 1536w" sizes="auto, (max-width: 1865px) 100vw, 1865px" /></figure>
</figure>
<p style="text-align: center;">The galaxy of quantification</p>
<p>&nbsp;</p>
<h2>The FAIR method: a supermassive black hole</h2>
<p>Currently, only the FAIR method has risen to applicated quantification solutions for a company. Its monopoly in the field is such that it has become an inescapable reference for a solution or methodology to remain credible. Like a black hole, it attracts to it all the current solutions of quantification. We can, for example, illustrate this with the Risquant Library, developed by Netflix&#8217;s R&amp;D department<a href="#_ftn6" name="_ftnref6">[6]</a>. This one clearly announces that it relies on the FAIR methodology. Nevertheless, he takes great freedom in the interpretation of taxonomy and analysis, but the fact of quoting it allows him to be more easily accepted and recognized.</p>
<p>This hegemony of FAIR can be explained quite easily:</p>
<ul>
<li>To begin with, it&#8217;s a pragmatic method by design. Its inventor, Jack Jones, set it up when he was an RSSI of a large American group, and was asked to justify cyber ROI. It was therefore initiated for operational purposes, then refined and gained credibility by relying on mathematical tools and theories. This concept of development  (i.e.  the fact that the method was born out of a need, and then mathematically justified) makes of FAIR a method particularly appreciated by the first concerned, that are the CISO and the other cyber-risk managers.</li>
<li>Then, it was particularly visionary, as she preceded all other methods. Appeared in 2001, the first book about the method was published in 2006, detailing its operation and taxonomy. As time went on, a community was made up around Jack Jones and his method: the FAIR Institute. This community continued the maturation and thz diffusion of the method. More precisely, it helped developing the efficiency of the method by placing facilitators to make it ever usable.</li>
<li>The FAIR method also has a particularly solid basis: in addition to the publication mentioned above and which was the subject of an enriched reissue in 2016, it is based on two  standardization documents, published by the OpenGroup (the consortium behind the architecture standard of SI TOGAF). The OpenGroup also offers certification to the method, based on its two standards, and which add to the interest laying on the method.</li>
<li>Finally, FAIR is strongly supported (particularly across the Atlantic): the community that drives it is particularly active, and contributes as much to its evolution as to its promotion: the links between the OpenFAIR and the FAIR Institute, both mentioned above, are substantially close. The strength of his ties is ensured by the fact that Jack Jones, father of the method, plays a central role in both organizations.</li>
</ul>
<p>Thus, in the world of cyber-risk quantification, the only operational solutions to date all rely on the FAIR methodology, with a more or less large but still displayed parentage.</p>
<p>If the maturity of this method seems now acquired, its monopoly in the field of quantification allows with little doubt to envisage, at least for next years, that it will remain the only method of quantification. In order for another method to be equal, and in addition to the fact that it will have to establish its conceptual credibility, it will above all have to make a place for itself  alongside the hegemony of FAIR, while proving that it is more efficient.</p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://www.riskinsight-wavestone.com/en/2020/06/la-quantification-du-risque-cybersecurite/">https://www.riskinsight-wavestone.com/2020/06/la-quantification-du-risque-cybersecurite/</a></p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> Back-propagation</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> Radial basis functions</p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> See the 2nd article on Risk Insight</p>
<p><a href="#_ftnref5" name="_ftn5">[5]</a> <a href="https://www.imf.org/en/Publications/WP/Issues/2018/06/22/Cyber-Risk-for-the-Financial-Sector-A-Framework-for-Quantitative-Assessment-45924">https://www.imf.org/en/Publications/WP/Issues/2018/06/22/Cyber-Risk-for-the-Financial-Sector-A-Framework-for-Quantitative-Assessment-45924</a></p>
<p><a href="#_ftnref6" name="_ftn6">[6]</a> <a href="https://netflixtechblog.com/open-sourcing-riskquant-a-library-for-quantifying-risk-6720cc1e4968">https://netflixtechblog.com/open-sourcing-riskquant-a-library-for-quantifying-risk-6720cc1e4968</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/quantified-risk-assessment-1-2-a-quantification-odyssey/">Quantified Risk Assessment (1/2): A Quantification Odyssey</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to define an effective third-party cyber risk management strategy?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/how-to-define-an-effective-third-party-cyber-risk-management-strategy/</link>
		
		<dc:creator><![CDATA[Matthieu Péquin]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 09:00:56 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[contracts]]></category>
		<category><![CDATA[know your supplier]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security Insurance Plan]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[third party]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14491</guid>

					<description><![CDATA[<p>More and more clients request our help regarding their third-party cyber risk management strategy. Indeed, third parties constitute a privileged attack vector. A recent study from Soha Systems showed that 60% of security incidents involve directly or indirectly a supplier....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/how-to-define-an-effective-third-party-cyber-risk-management-strategy/">How to define an effective third-party cyber risk management strategy?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>More and more clients request our help regarding their third-party cyber risk management strategy. Indeed, third parties constitute a privileged attack vector. A recent study from Soha Systems showed that 60% of security incidents involve directly or indirectly a supplier. The most glaring examples are the accounting software M.E.Doc identified as the patient zero of NotPetya and Cloud Hopper attacks which aim at compromising cloud service providers to attack a targeted company.</p>
<p>Paradoxically, only 35% of organizations consider their third-party cybersecurity management process as effective (according to a study conducted by the Ponemon Institute).</p>
<p>How to define an effective third-party cyber risk management strategy? What are the key success factors?</p>
<p>&nbsp;</p>
<h2>Adapt your third-party cybersecurity strategy to the risks</h2>
<p>From business partners to subcontractors and IT service providers, a lot of your suppliers manage or have access to your assets. Therefore, they represent a risk for your organization and thus it is important to ensure they are committed to respect a cybersecurity level that meets your requirements.</p>
<p>Depending on which business perimeter they operate and which type of service they provide, the level of risk would be more or less critical. Therefore, our recommendation is to classify your suppliers to adapt your cybersecurity strategy according to the risks they imply.</p>
<p>Since your suppliers can be thousands, this classification will also allow you to prioritize and keep an acceptable workload for your teams.</p>
<p>In order to do that, our first piece of advice is to inventory your suppliers. We notice that few organizations have an exhaustive cartography and that its realization is a tedious project that requires the involvement of many stakeholders (purchasing, legal, department, business…). Therefore, we advise you to start by defining a process to capture your new third parties and by identifying your suppliers involved in the critical business activities identified in your BIA (Business Impact Assessment). Afterwards, you will be able to extend progressively to other third parties.</p>
<p>From this cartography, you will be able to assess your supplier’s criticality and classify them on a scale with several levels. We advise you to consider the following criteria:</p>
<ul>
<li>The business criticality of the project or the asset the supplier is working on;</li>
<li>The degree of interconnection to your information system;</li>
<li>The access to sensitive or confidential data;</li>
<li>The service exposure on the Internet.</li>
</ul>
<p>Nevertheless, we can observe in our client’s environment that applying those criteria can be challenging due to the lack of information about some third parties. Then, we suggest organizing workshops with cybersecurity teams, IT teams and business teams to validate your cybersecurity classification by expert knowledge.</p>
<p>&nbsp;</p>
<figure id="post-14492 media-14492" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14492 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2.png" alt="" width="1443" height="398" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2.png 1443w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2-437x121.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-2-768x212.png 768w" sizes="auto, (max-width: 1443px) 100vw, 1443px" /></figure>
<p style="text-align: center;">Example of a classification scale with 3 levels</p>
<p>&nbsp;</p>
<h2>Consider cybersecurity throughout the whole lifecycle</h2>
<p>The feedbacks from the field show that most organizations assess their third party’s cybersecurity level before contracting and include cybersecurity clauses into their contracts. Nevertheless, cybersecurity is not always taken into account thereafter.</p>
<p>We recommend integrating cybersecurity throughout the whole third-party lifecycle by empowering them and adopting a control position.</p>
<p>&nbsp;</p>
<figure id="post-14494 media-14494" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14494 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2.png" alt="" width="1503" height="391" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2.png 1503w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2-437x114.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2-71x18.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-2-768x200.png 768w" sizes="auto, (max-width: 1503px) 100vw, 1503px" /></figure>
<p style="text-align: center;">Third party management lifecycle</p>
<p><em> </em></p>
<h3>During contractualisation</h3>
<p>Before the contract signature, the objective is to ensure that the supplier chosen by your business meets your cybersecurity requirements. To do so, we advise you to integrate cybersecurity at each step of the supplier selection process:</p>
<ul>
<li>Include your cybersecurity requirements in your Request For Proposals;</li>
<li>Assess the maturity level of the suppliers responding to your Request For Proposals;</li>
<li>Provide a cybersecurity recommendation to your business according to the project sensitivity and the risk implied by the third party,</li>
<li>Include in the contract cybersecurity requirements adapted to the criticality and the type of service delivered.</li>
</ul>
<p>&nbsp;</p>
<h3> During the contract period</h3>
<p><em> </em>To ensure your third parties respect their cybersecurity commitments throughout the contract period, we advise to:</p>
<ul>
<li>Integrate your third parties into your risk analysis when they operate on the scope of a project. For instance, the methodology allows you to identify all the stakeholders involved in a project and to define an action plan to secure and monitor your ecosystem. The implementation of the security measures must be followed-up with the third-party;</li>
<li>Organize cybersecurity reviews at a frequency adapted to the risks and thus the level of classification. For instance, the most critical third parties can be reviewed at least annually while the less critical ones can be reviewed at contract renewal;</li>
<li>Define a process dedicated to cybersecurity incidents involving a third party and create emergency instructions;</li>
<li>Perform audits only when necessary (for instance following a major cybersecurity incident or after identifying a critical risk…)</li>
</ul>
<p>&nbsp;</p>
<h3>At the end of the contract</h3>
<p><em> </em>A contract renewal is an opportunity to perform a new assessment of the third-party cybersecurity posture and if necessary, update the contractual requirements.</p>
<p>If the contract ends, you must apply your reversibility clauses and ensure that cybersecurity is part of the decommissioning of the service provided.</p>
<p>&nbsp;</p>
<h2>Industrialize third parties’ assessments thanks to market solutions</h2>
<p>We observe that many organizations assess and monitor the cybersecurity level of their third parties with proprietary and non-automated questionnaires that require many external resources. In addition, big-sized suppliers may refuse to complete these questionnaires while smaller ones may not always answer correctly.<br />
Furthermore, we also notice that few organizations have yet adopted a mass assessment approach.</p>
<p>In order to rationalize the approach, we therefore suggest giving-up these historical assessment tools to adopt solutions adapted to the supplier classification level and thus be able to scale up.</p>
<p>&nbsp;</p>
<h3>For the most critical third parties</h3>
<p>We advise you to adopt a co-constructive approach with your most critical suppliers, while adopting a position of control. This translates into the following actions throughout the lifecycle:</p>
<ul>
<li>Assess your most critical suppliers based on their cybersecurity certifications and compliance reports on the scope of the service provided;</li>
<li>Define a contractual Security Assurance Plan to precise the security governance of the service;</li>
<li>Organize security reviews (at least once a year) to control the security level of your suppliers based on the indicators defined in the Security Assurance Plan (maintaining certifications, security incidents, audits, security roadmap&#8230;). These committees are also an opportunity to build a relationship of trust with your suppliers, for example by discussing security news and events as well as the conferences that you could do together.</li>
</ul>
<p>&nbsp;</p>
<h3>For third parties with a medium to low criticality</h3>
<p>In order to take a massive approach in assessing and reviewing the cybersecurity level of your non-critical third parties, market solutions can be used. Indeed, editors and startups (such as CyberVadis, CyberGRX, Risk Ledger…) are positioned on the industrialization of third party’s cybersecurity assessments. This will be the topic of one of our next articles.</p>
<p>Their solutions are based on maturity questionnaires whose results are shared with all their customers. More concretely, these platforms work as follows:</p>
<p>&nbsp;</p>
<figure id="post-14496 media-14496" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14496 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2.png" alt="" width="1120" height="329" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2.png 1120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2-437x128.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-2-768x226.png 768w" sizes="auto, (max-width: 1120px) 100vw, 1120px" /></figure>
<p style="text-align: center;">Third party maturity assessment platforms</p>
<p>&nbsp;</p>
<p>Although these solutions are currently not customizable according to your organization&#8217;s specific requirements, they will allow you to:</p>
<ul>
<li>Get cybersecurity assessments tailored to non-critical third parties;</li>
<li>Reduce the workload of your cybersecurity teams;</li>
<li>Share third-party assessments with other customers and therefore be able to quickly access assessments already performed;</li>
<li>Adopt a win-win approach with your suppliers who will share a single questionnaire with all their customers and will be proposed action plans to remedy any discrepancies;</li>
<li>Popularize third-party cybersecurity management to your business or purchasing teams thanks to didactic scores on different topics.</li>
</ul>
<p>&nbsp;</p>
<h2>Ensure the effectiveness of your third-party cybersecurity management process</h2>
<p>From business to IT project managers and including purchasing and legal teams, third-party cybersecurity management involves many players in your organization. It can only be successful if your process is well-known and applied by all. Therefore, it is key to train and raise the awareness of all stakeholders.</p>
<p>To ensure that your process is properly implemented, it is important to define and implement controls covering all stages of the supplier management life cycle. As a first step, we recommend that you define realistic targets by focusing on your most critical third parties. Over time, these targets may evolve to consider your suppliers with lower levels of criticality. Your controls may include the classification of your third parties, their assessment and their review at an appropriate frequency during the contract period.</p>
<p>&nbsp;</p>
<h2>Integrate third-party cybersecurity management in a &#8220;Know Your Supplier&#8221; approach</h2>
<p>Just as the KYC (Know Your Customer) approach in B2C sectors, we suggest that you include third-party cybersecurity management in a KYS (Know Your Supplier) spirit where the objective is to take all supplier risks into account in a consolidated way.</p>
<p>Cybersecurity assessments and notably maturity assessment platforms can be integrated within supplier management tools (source to contract), as well as financial, CSR, environmental impact, anti-corruption and anti-money laundering assessments. This will ease the integration of cybersecurity into your sourcing and supplier review processes.</p>
<p>See you next episode for an article about market solutions that automate the cybersecurity assessments of your suppliers.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/how-to-define-an-effective-third-party-cyber-risk-management-strategy/">How to define an effective third-party cyber risk management strategy?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Test, test and increase your Resilience: how to build your testing programme</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/09/test-test-and-increase-your-resilience-how-to-build-your-testing-programme/</link>
		
		<dc:creator><![CDATA[m@THIEU]]></dc:creator>
		<pubDate>Mon, 14 Sep 2020 11:03:17 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[BC]]></category>
		<category><![CDATA[CM]]></category>
		<category><![CDATA[CR]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[DR]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[programme]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14194</guid>

					<description><![CDATA[<p>This year has been exceptionally trying for individuals, businesses and governments globally. Living and working in a crisis mode introduced an array of challenges, with some firms dealing with them better and faster than others. What is the common denominator?...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/test-test-and-increase-your-resilience-how-to-build-your-testing-programme/">Test, test and increase your Resilience: how to build your testing programme</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 style="text-align: justify;">This year has been exceptionally trying for individuals, businesses and governments globally. Living and working in a crisis mode introduced an array of challenges, with some firms dealing with them better and faster than others. What is the common denominator? The answer in most cases is strong crisis reflexes, built over the years with consistent effort.</h3>
<p style="text-align: justify;">Testing is an important part of <b>operational </b><b>resilience</b> and can take <b>many shapes and forms, </b>from disaster recovery testing for ensuring service continuity to end-to-end crisis simulations examining decision-making. It enables to proactively <b>manage risk, embed crisis management framework</b>, and allows to continuously improve capabilities such as <b>business continuity </b>(BC), <b>crisis management </b>(CM), <b>disaster recovery </b>(DR), and <b>cyber resilience </b>(CR). Needless to say, training plays an important role in such a testing programme.</p>
<h3 style="text-align: justify;"><i>“Better awareness nurtures an organisational culture that embraces operational resilience and, as a result, improves the company’s preparedness to deal with adversity.”</i></h3>
<p style="text-align: justify;">From firm to firm, good testing programmes vary in nature, scale and complexity. Depending on how a firm is structured and what it does, testing is addressed at different organisational levels and locations, with involvement of external parties (i.e. critical suppliers). In reality, given little guidance from the regulators on what ‘good’ looks like, programmes are often fragmented and can cause a real headache.</p>
<p>&nbsp;</p>
<h2>Principles for creating a successful testing programme</h2>
<div class="uncode_text_column">
<p style="text-align: justify;">While there is no silver bullet to creating a fit-for-purpose testing programme, we recommend following <b>6 guiding </b><b>principles </b>to devise one that is successful and tailored to your organisation’s needs. Following these could significantly improve the outcomes of the programme.</p>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3 style="text-align: justify;">1. Think long term</h3>
<p style="text-align: justify;">When constructing a testing programme, it is of paramount importance to define what you want to achieve in 3 years. A <b>focus on outcomes </b>provides the required direction yet allows the flexibility to re-shape the testing programme each year in order to respond to changes while focusing on the end goal. Begin with small and less complex tests, such as <b>test walkthroughs</b>, and progress to very involved, <b>realistic crisis simulation exercises.</b></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<div class="uncode_text_column">
<h3 style="text-align: justify;">2. Start with threats</h3>
<p style="text-align: justify;">Every test needs to link to threat(s) resulting in one or several plausible major incident scenarios (and impacts). <b>Anticipate and understand new threats </b>through market watch and leverage audit reports and risk assessments when building or reviewing your programme.</p>
<p>&nbsp;</p>
</div>
<div id="gallery-146195" class="isotope-system">
<div class="isotope-wrapper no-gutter style-color-xsdn-bg">
<div class="isotope-container isotope-layout style-masonry" data-type="masonry" data-layout="masonry" data-lg="1000" data-md="600" data-sm="480">
<div class="tmb tmb-iso-w10 tmb-iso-h4 tmb-light tmb-overlay-text-anim tmb-overlay-anim tmb-overlay-middle tmb-overlay-text-left tmb-text-space-reduced tmb-image-anim tmb-bordered tmb-media-first tmb-media-last tmb-content-overlay">
<div class="t-inside style-color-xsdn-bg">
<div class="t-entry-visual" tabindex="0">
<div class="t-entry-visual-tc">
<div class="t-entry-visual-cont">
<div class="dummy">
<figure id="post-14195 media-14195" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14195 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3.jpg" alt="" width="1866" height="333" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3.jpg 1866w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-437x78.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-71x13.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-768x137.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-1536x274.jpg 1536w" sizes="auto, (max-width: 1866px) 100vw, 1866px" /></figure>
</div>
<div class="t-entry-visual-overlay-in style-dark-bg">
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3></h3>
<h3 style="text-align: justify;"><b>3. Focus on Important Business Services (IBS)</b></h3>
<p style="text-align: justify;"><b>Align testing of existing contingency arrangements </b>to important business services and key processes. This ensures preparedness when a situation of high business impact occurs and avoids challenges arising from lack of end-to-end vision.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-internal row-container" style="text-align: justify;">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3><b>4. Diversify testing</b></h3>
<p>The most likely and most impactful scenarios should be examined with <b>different stakeholder groups </b>through different types of testing. This ensures that the theory works in practice and different reflexes are <b>embedded in the organisation’s DNA</b>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="t-overlay-wrap">
<div class="t-overlay-inner">
<div class="t-overlay-content">
<div class="t-overlay-text single-block-padding">
<div class="uncode_text_column">
<p style="text-align: justify;">To achieve more benefits, go beyond standalone contingency plans and comms tooling testing and examine a combination of them with internal and external, business and technical stakeholders.</p>
<p>&nbsp;</p>
</div>
<div id="gallery-342260" class="isotope-system">
<div class="isotope-wrapper no-gutter">
<div class="isotope-container isotope-layout style-masonry" data-type="masonry" data-layout="masonry" data-lg="1000" data-md="600" data-sm="480">
<div class="tmb tmb-iso-w10 tmb-iso-h4 tmb-light tmb-overlay-text-anim tmb-overlay-anim tmb-overlay-middle tmb-overlay-text-left tmb-image-anim tmb-bordered tmb-media-first tmb-media-last tmb-content-overlay tmb-no-bg">
<div class="t-inside">
<div class="t-entry-visual-cont">
<figure id="post-14197 media-14197" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14197 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1.jpg" alt="" width="1440" height="594" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1.jpg 1440w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1-437x180.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1-71x29.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1-768x317.jpg 768w" sizes="auto, (max-width: 1440px) 100vw, 1440px" /></figure>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<p style="text-align: center;"><i>The radar above is an indicative example of what a good testing programme would consist of. The threat categories considered are random and could be selected differently as long as diversification is maintained (mix-and-match).</i></p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="uncode-accordion" data-collapsible="no" data-active-tab="1">
<div id="accordion_1849304804" class="panel-group" role="tablist" aria-multiselectable="true">
<div class="panel panel-default">
<div class="panel-heading" role="tab">
<p><strong>Crisis simulation</strong></p>
<div id="crisis-simulations" class="panel-collapse collapse in" role="tabpanel">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">Crisis simulations examine a <b>hypothetical disaster situation </b>with defined parties and multi-cells of stimulus. They allow to rehearse the establishment and communication of recovery requirements and carry out relevant activities effectively. Crisis simulation can be a tabletop exercise (level 1), a hands-on simulation (level 2), a multi-cell hands-on crisis simulation (level 3) or an international hands-on multi-cell multi-party simulation (level 4).</p>
<div class="panel-heading" style="text-align: justify;" role="tab"><strong>Work area recovery testing</strong></div>
<div id="work-area-recovery-testing" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">Work area recovery testing checks whether <b>full end-to-end business processes</b> can be run offsite, <b>ensuring</b> <b>that</b> <b>all elements of a process can be completed during a test </b>and not just the technical aspects. They can involve a team (level 2) or a number of geographically dispersed teams (level 3) working from recovery sites or home. Both third parties (i.e. outsourced teams) and internal teams should be considered.</p>
<div class="panel-heading" role="tab"><strong>IT disaster recovery plan and cyber range testing</strong></div>
<div id="it-disaster-recovery-plan-and-cyber-range-testing" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">IT DRP and Cyber range testing practically examines <b>each step in a specific disaster recovery plan</b> or <b>tests cyber forensics capabilities</b>. This ensures the possibility to <b>recover data, restore critical IT system </b>after an interruption of its services, critical IT failure or complete disruption due to cyber attacks or IT disruptions. This testing can happen as a standalone (level 2) or as part of a crisis simulation (level 3-4).</p>
<div class="panel-heading" style="text-align: justify;" role="tab"><strong>Business recovery plan walkthroughs</strong></div>
<div id="business-recovery-plan-walkthroughs" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">Business Recovery Plan walkthroughs for group/business divisions/business units are undertaken following a major revision of a plan or team and are <b>designed to increase the understanding of the recovery processes, roles and responsibilities</b>, <b>and</b> <b>question the suitability and completeness of the plan</b>. Normally this would be carried out as a review-and-challenge session with the plan owner and a BC expert (level 1) or to test the efficiency of the specific measures and planned workarounds (level 2).</p>
<div class="panel-heading" role="tab"><strong>Communication cascade tests</strong></div>
<div id="communication-cascade-tests" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column" style="text-align: justify;">
<p>Communication cascade tests establish whether <b>contact details </b>are accurate, determine whether <b>cascade roles and responsibilities </b>are understood by staff, and establish whether or not the <b>documented procedures </b>are robust. They can be completed in one of three ways – either a standalone live test (e.g. text cascade; level 2), as part of a crisis simulation exercise (level 2-4), or an audit involving review of plans and interview of staff with key responsibilities (level 1).</p>
</div>
<div class="row-internal row-container" style="text-align: justify;">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3><b>5. Stay current</b></h3>
<p>Review your testing programme at least once a year in order to <b>adapt to the changing threats landscape</b> and ultimately <b>ensure operational resilience</b>. Make sure your crisis management framework and contingency plans are regularly improved based on the testing outcomes and changes in the business.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3 style="text-align: justify;"><b>6. Engage and drive</b></h3>
<p style="text-align: justify;"><b>Involve different parties </b>in shaping and running your testing programme (e.g. cyber, risk, Ops, DPO, legal, business resilience champions, etc.). Use MI to share progress and alignment with the 3-year operational resilience vision.</p>
<p>&nbsp;</p>
</div>
<div class="heading-text el-text">
<h2>What next: how do you structure your testing programme?</h2>
</div>
<div class="uncode_text_column">
<p>While it is not possible to prescribe a testing programme without better understanding the organisation of interest and deep-diving into the specifics of a threat landscape, it is clear that investing time and resources is worthwhile from operational resilience and regulatory standpoints.</p>
<h3><i>“Having recently gone through a pandemic, it is a high time to keep the momentum and continue fostering the right culture and correct reflexes for the next </i><i>major </i><i>crisis.”</i></h3>
</div>
<div class="uncode_text_column">
<h4><b>A few concluding tips</b></h4>
</div>
<div class="uncode-wrapper uncode-list">
<ul>
<li><b>Make it realistic: </b>Where maturity allows, aim for more <b>complex and realistic tests </b>as they are essential to effectively respond to real events and increase end-to-end resilience. This means engaging more internal and external parties in the ‘live’ exercises.</li>
<li><b>Leverage internal and market crises: </b>Continuously <b>monitor</b> events happening on the market (major incidents and crises) as well as your internal major incidents to feed your testing program, prioritise your threats and devise your scenarios making it more tangible for your stakeholders.</li>
<li><b>Engage early: </b>Share the vision for testing with <b>key stakeholder groups </b>so they understand the journey on which you want to bring the organisation. This will enhance collaboration and, therefore, outcomes.</li>
<li><b>Facilitate remotely:</b> Remote working arrangements should not put your whole testing programme on hold &#8211; use collaborative solutions or leverage tools from the market for carrying out the exercises. This is especially relevant for cyber range testing and follow-the-sun testing. Experience shows that <b>digital workplace solutions </b>introduce a more democratic participation and is an excellent way to record interactions.</li>
<li><b>Continuously improve:</b> Reflect on tests by producing post-test reports and defining an action plan to <b>drive and track improvements</b>. Involve key stakeholders throughout so they understand the gravitas of the outcomes and help with driving positive changes.</li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/test-test-and-increase-your-resilience-how-to-build-your-testing-programme/">Test, test and increase your Resilience: how to build your testing programme</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Belgian ESO and ISO 27001: which way to more cyber security?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/belgian-eso-and-iso-27001-which-way-to-more-cyber-security/</link>
		
		<dc:creator><![CDATA[Noëmie Honoré]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 11:46:07 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[belgium]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[ESO]]></category>
		<category><![CDATA[ISMS]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14032</guid>

					<description><![CDATA[<p>How can the ISO 27001 framework be used to continuously improve the security level? In a previous article, we told you all about the new European NIS directive and Belgium&#8217;s choice to use the ISO 27001 standard as a basis...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/belgian-eso-and-iso-27001-which-way-to-more-cyber-security/">Belgian ESO and ISO 27001: which way to more cyber security?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How can the ISO 27001 framework be used to continuously improve the security level?</h2>
<p>In a previous article, we told you all about the new European NIS directive and Belgium&#8217;s choice to use the ISO 27001 standard as a basis for increasing the security of Essential Service Operators (ESOs) with all that it entailed for the newly designated organizations.</p>
<p>A European directive does not mean a European regulation: it is therefore up to each member country to transpose the requirements of the NIS directive into its national law. <strong>Belgium has chosen to use an existing standard (ISO 27001)</strong>, while some of its neighbours, including France, have chosen an approach based on the definition of a precise reference system of requirements combining both technical and governance measures (administrative IS, partitioning, approval process, etc.).</p>
<p>Today, let’s try to understand what it means for Belgian ESOs, and more broadly for all organizations attracted by international standards, to follow the requirements of ISO 27001.</p>
<p>&nbsp;</p>
<h2>The ISO 27001 standard, adulated by some and criticized by others</h2>
<p>Some voices are rising up against the reference in the field, castigating in particular its bureaucratic aspect and its red tape which, however, can help to set up a useful reference system for the continuity of services and the training of people through the sharing of practices &#8211; especially when it is thought out pragmatically. Criticism is also rife about the added level of complexity, which is even more present for smaller structures. Here again, <strong>pragmatism is the rule, and measures must be adapted to the size of the organization</strong> and integrated into existing structures to avoid ex nihilo structures that are too cumbersome to manage.</p>
<p>Finally, some preconceptions have a hard time and often reduce ISO 27001 compliance to a list of checkboxes, with no real implications for the security of the organization. But the famous Declaration of Applicability (DoA), required by ISO 27001 for all those seeking certification, is not the same as listing all the controls of ISO 27002. It requires a real assessment regarding the issues and risks. This will provide concrete elements for the security of the organization.</p>
<p>&nbsp;</p>
<h2>ISO 27001, ISO 27002, are there many like that?</h2>
<p>In the ISO family, a lot, really a lot. For cybersecurity, on the other hand, it is these two that are the most used, with ISO 27005 for risk management (if it is data protection that interests you, read also <a href="https://www.riskinsight-wavestone.com/en/2020/01/iso-27701-international-framework-privacy/">our article</a> on the newcomer ISO 27701).</p>
<p>The ISO 27001 standard <strong>provides a framework for cybersecurity and aims to set up an ISMS</strong> (Information Security Management System). To help organizations in this direction, it is accompanied by the ISO 27002 standard which details the good security practices presented in Annex A of ISO 27001. The certification (the Belgian ESOs&#8217; holy grail) is based on the ISO 27001 standard but the two standards work well together.</p>
<p><strong>Certification is obtained on a perimeter defined from a business and IT point of view</strong> on which the main risks are identified. This risk assessment, combined with the consideration of the organization&#8217;s context, helps to select the relevant ISO 27002 good practices to formalize the Declaration of Applicability (DoA) and to exclude controls that are not applicable (be careful to justify these exclusions: they will be analyzed by the certification body). If less useful practices can be removed, other practices can also be added: the organization can thus complete the existing list of 114 security measures regarding its risks. The ISO 27002 standard does not address the exhaustiveness of possible security measures. This is where cybersecurity expertise comes into its own.</p>
<p>&nbsp;</p>
<h2>5 tips to find the right balance and achieve ISO 27001 compliance</h2>
<p>Of course, seen as a whole, an ISO 27001 compliance program can quickly make you dizzy&#8230; Here are <strong>5 reflexes to keep in mind</strong> to facilitate the launch of an ISMS and the maintenance of its performance over time:</p>
<p>&nbsp;</p>
<figure id="post-14035 media-14035" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14035 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1.png" alt="" width="1876" height="833" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1.png 1876w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-430x191.png 430w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-768x341.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/Image-1-1536x682.png 1536w" sizes="auto, (max-width: 1876px) 100vw, 1876px" /></figure>
<p>&nbsp;</p>
<p><strong>1. Identify a sponsor invested in the service of the security objective.</strong> As with cinema, there is no film without a director, and no director without the support of the producer. The perfect match must be fully aware of the added value of compliance with ISO 27001 to improve the security level, beyond pure compliance with the legal framework. He must use normative frameworks for the benefit of a better security level and must therefore see this project as a security project rather than a compliance project.</p>
<p>Implementing a sustainable ISMS requires human, organizational, physical and financial resources and means. Steering the compliance project will only work if it is <strong>supported by a manager who has the authority to allocate the resources and means necessary to manage the risks and ensure an acceptable level of security regarding the business challenges.</strong> Compliance with the NIS directive, at European or Belgian level through compliance with the ISO 27001 standard, is above all a means of increasing the security level and not an end in itself.</p>
<p>&nbsp;</p>
<p><strong>2. Manage by risk.</strong> This is the basis of security; the key concept to always keep in mind. This management makes it possible to identify the risks within the perimeter and to ensure that the business challenges are considered. Risk management does not stop at the identification and initial treatment of risks. It requires the mobilization of teams and activities to deal with existing risks and monitor the evolution of risks (existing and new risks that emerge) and their treatment, through periodic updates and during major events within the scope.</p>
<p>By implementing this global approach to risks, the organization ensures a cross-functional vision of risks that allows it to focus its security measures where the stakes are highest. This validation and arbitration must be carried out in consultation with the owners of the risks (business or IT) who are responsible for the risk within their perimeters and must position themselves on the possible treatments (acceptance, reduction, transfer or avoidance). <strong>Refined and tightened risk management thus enables real, informed decisions to be taken</strong>, by players who are sometimes far removed from security.</p>
<p>&nbsp;</p>
<p><strong>3. Establish a pragmatic documentary repository.</strong> This step helps to define and document practices and thus promote business continuity, control and continuous improvement. This documentation must reflect reality while ensuring consistency with the requirements of the ISO 27001 standard to help define the practices to be implemented and manage them on a daily basis (implementation and updates as changes occur, etc.).</p>
<p>The key words when setting up this reference system are <strong>pragmatism and usefulness</strong>: it must be integrated into the existing system by completing existing procedures and creating new ones that were missing; it must not unnecessarily complicate the situation but be based on a relevant interpretation of the standard; it must be useful to the teams carrying out the activities to enable operations to be maintained. Therefore, <strong>avoid copying and pasting requirements from the standards.</strong> They create a useless referential for the field teams and will arouse the curiosity of your auditors who will then doubt the effectiveness of the measures&#8230;</p>
<p>&nbsp;</p>
<p><strong>4. Regularly evaluate performance.</strong> Any self-respecting management system requires a control loop to assess its performance and, in the case of ISMS, its non-compliance with the ISO 27001 standard and with the reference system in place in the organization (summarized in the DoA). The identification of these non-conformities must make it possible to trace them back to their source and initiate reflection on the best way to manage them. The reflection to be carried out must focus on how the non-conformity will be resolved to ensure an increase in the level of security while ensuring that the measures correspond to the requirements of the standard and are adapted to the context, the risks and the stakes of the organization.</p>
<p>The different levels of control (self-monitoring by the teams, internal/external audits, management reviews) must all keep the objective of improving the security level in mind by pragmatically using the requirements of the standard and the company&#8217;s reference framework, and if necessary, make the latter evolve in the light of the practical reality of the organization. It is a question of finding the right balance between the context of the organization and the management of the identified risks. If your challenges are mainly related to the availability of an activity, focus your efforts (measures and controls) on this issue as a priority. To be relevant, <strong>this assessment cycle must distribute efforts on the most relevant perimeters for the organization</strong> (according to its risks and impacts) and feed the next steps of the ISMS life cycle.</p>
<p>&nbsp;</p>
<p><strong>5. Engage the teams.</strong> An ISMS implementation project is not only the prerogative of the CISO or a team of documentalists. It is first and foremost a large-scale project that requires a wide range of expertise, from cyber security to business, IT, legal, procurement, human resources, etc. It is a real change management process that needs to be organized with the full and complete involvement of the various teams and the organization&#8217;s management to <strong>ensure an ISMS that serves the sustainable improvement of the security level for the entire perimeter.</strong></p>
<p>&nbsp;</p>
<h2>ISO 27001 certification, yes but pragmatic!</h2>
<p>The real strength of ISO 27001 certification is above all to <strong>trigger a security dynamic within the organization.</strong> Documentation can certainly make practices more cumbersome but does not detract from the philosophy of continuous improvement of the level of security. By providing a minimal basis for cybersecurity, without defining strict requirements, the standard leaves the organization the choice of placing the security cursor at a level that is suitable and to obtain positive results &#8211; as long as you surround yourself with good people who are aware of the topic.</p>
<p>Treated with a <strong>critical and pragmatic eye</strong>, the standard thus provides a framework for installing cybersecurity governance within each organization by mobilizing key concepts while leaving the necessary room to propose complementary measures that, together, serve to improve the level of security.</p>
<p>The free implementation of the NIS Directive at the European level offers a new testing ground where different cultures and different visions of cybersecurity are mixed. Only the future will be able to tell us what works at European level, but the <strong>Belgian approach once again demonstrates the culture of compromise between strict framework and freedom of movement.</strong> For Belgian ESOs and certification bodies alike, the unknown is above</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/belgian-eso-and-iso-27001-which-way-to-more-cyber-security/">Belgian ESO and ISO 27001: which way to more cyber security?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Deep dive into deepfake &#8211; How to face increasingly believable fake news? (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-2-2/</link>
		
		<dc:creator><![CDATA[Carole Meyziat]]></dc:creator>
		<pubDate>Mon, 18 May 2020 08:25:27 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[media]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13034</guid>

					<description><![CDATA[<p>We have seen in the first part of the article the risks that represent the deepfakes for the businesses. In this part, we are going to focus on the strategies available to pre-empt deepfakes and the concrete actions to implement...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-2-2/">Deep dive into deepfake &#8211; How to face increasingly believable fake news? (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">We have seen in the first part of the article the risks that represent the deepfakes for the businesses. In this part, we are going to focus on the strategies available to pre-empt deepfakes and the concrete actions to implement as of now to reduce their risks.</p>
<p>&nbsp;</p>
<h2>DIFFERENT STRATEGIES TO safeguard AGAINST DEEPFAKES</h2>
<p style="text-align: justify;">Concurrently with the legal framework, public and private organisations get organised to put forward solutions allowing to detect and prevent the malicious spread of deepfakes. We can distinguish <strong>four strategies to safeguard against deepfakes.</strong></p>
<p>&nbsp;</p>
<h3>1/ Detecting the imperfections</h3>
<p style="text-align: justify;">Detecting the deepfakes by their imperfections is one of the main existing methods. Some irregularities remain in the generated contents, such as the lack of blinks and of synchronisation between the lips and the voice, distortions of the face and accessories (arms of the glasses), or the inaccuracy of the context (weather, location).</p>
<p style="text-align: justify;"><strong>The deepfakes are however built to learn from their mistakes </strong>and generate a content that is increasingly alike the original, making the imperfections less perceptible. The tools using this deepfake detection strategy can be effective but require a constant improvement to <strong>detect ever more subtle anomalies</strong>.</p>
<p style="text-align: justify;">We can cite in this category Assembler, a tool intended for journalists developed by Jigsaw (branch of Alphabet, parent company of Google). It enables to verify the authenticity of contents through their analysis via five detectors, amongst which the detection of anomalies of patterns and colours, of copied and pasted areas, and of known characteristics of deepfakes algorithms.</p>
<p>&nbsp;</p>
<h3>2/ Screening and comparative analysis</h3>
<p style="text-align: justify;">Comparing the contents with a <strong>database of authentic content</strong> or by <strong>looking for similar content</strong> on search engines to see whether they have been manipulated (for instance, by finding the same video with a different face) is another strategy allowing to pre-empt deepfakes.</p>
<p style="text-align: justify;">In 2020, the AI Foundation should make available a plugin, Reality Defender, to integrate to web browsers and over time to social networks. It will allow the detection of manipulations of contents, targeting first the politicians. Users will be led to adjust the sensitivity of this tool, according to the manipulations they will want to detect or not, not to be notified for every manipulation of content, notably for the most ordinary manipulations (photo retouch on a web page done on Photoshop for example).</p>
<p>&nbsp;</p>
<h3>3/ Watermarking</h3>
<p style="text-align: justify;">A third method consists in marking the contents with a watermark, or digital tattoo, to <strong>facilitate the authentication process</strong> by filling in their source and following the manipulations undertaken on these contents.</p>
<p style="text-align: justify;">A team from the New York University works on a research project to create a camera embedding a watermarking technology meant to mark the photographed contents, in order not only to authenticate the original photography, but also to mark and follow all the manipulations carried out on it throughout its lifecycle.</p>
<p>&nbsp;</p>
<h3>4/ Involving the human factor</h3>
<p style="text-align: justify;">Involving the users in the detection process allows <strong>both mitigating deepfakes’ impacts</strong> by making them realise that the alteration of the acceded contents is possible, and to <strong>reduce deepfakes’ occurrence</strong> by allowing them to report the ones they suspect.</p>
<p style="text-align: justify;">The plugin Reality Defender already mentioned will give users the possibility to report the contents they judge as fake so as to inform the other users – which once added to the analysis realised by the tool, will be able to see if the contents have been reported by other users, offering a second level of indication.</p>
<p>&nbsp;</p>
<p style="text-align: justify;">Some <strong>initiatives carried by cooperation of cross-sector actors combine these four strategies</strong> for a maximal efficiency against deepfakes. Some are already used or tested by journalists. It is the case of InVID, initiative developed within the scope of the European Union Horizon 2020 program of financing of research and innovation, used by the French press agency (AFP).</p>
<p style="text-align: justify;">Solutions and strategies are therefore emerging, the market is developing, and new innovative solutions should appear very shortly with the results of the Deepfake Detection Challenge. This contest anti-deepfake was launched by Facebook upon the approach of the American presidential election, and more than 2,600 teams signed up. Results the 22<sup>nd</sup> of April!</p>
<p style="text-align: justify;">Below a table presenting examples of initiatives combining different strategies to safeguard against deepfakes.<strong><br />
</strong> <strong><br />
</strong></p>
<figure id="post-13038 media-13038" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13038 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6.png" alt="" width="1198" height="655" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6.png 1198w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6-349x191.png 349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image6-768x420.png 768w" sizes="auto, (max-width: 1198px) 100vw, 1198px" /></figure>
<p>&nbsp;</p>
<h2>Different means to protect one’s activity</h2>
<p style="text-align: justify;">The risk deepfakes present for businesses is genuine, and a few actions can be taken to protect one’s activity and mitigate its impacts from now on.</p>
<ul>
<li style="text-align: justify;"><strong>Estimating the exposure: </strong>The use cases of deepfakes and the worst-case scenario of their use must be determined on the <strong>perimeters of the company</strong>, taking the fraud and undermining risks into consideration, and identifying the appropriate security strategies.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Raising awareness: </strong>The collaborators must be made aware of the <strong>detection </strong>of deepfakes (to avoid the cases of fraud) but also of the <strong>limitation of shared contents </strong>on social media that can be reused to create deepfakes (to avoid the undermining). Just like anti-phishing campaigns, this awareness campaign focuses both on the detection of technical faults (form) of the deepfakes (although they will be led to disappear with the improvement of techniques), but mostly on the detection of the suspicious nature of information (content), encouraging the audience’s suspicion, cross checking of information and notification of the suspicions to the appropriate teams (what to do if I see a suspect video of my head of communications on the social networks during the weekend? What to do if I receive a vocal message of my chief asking me to execute a punctual operation that is slightly out of my perimeter?).</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Adapting the verification processes: </strong>The existing anti-fraud plans can be redesigned to be applied to deepfakes. For instance, for a Fake President fraud via deepfakes, one of the recommendations is to suggest to the interlocutor to hang up and call him back (if possible on a known number, and after an internal check). For the <strong>most</strong> <strong>sensitive fraud scenarios, </strong>these reaction processes must be <strong>finely defined,</strong> and the concerned collaborators regularly <strong>trained to the reflexes to adopt</strong>. Tools such as the ones defined earlier can also be used to verify all or any part of the media used by the collaborators.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Protect the contents: </strong>The contents representing collaborators shared internally or externally by the company can be <strong>controlled to avoid them being reused to generate deepfakes. </strong>Businesses can limit the <strong>diversity </strong>(angle of the people and types of media) of the data potentially usable by malicious actors, and play on the <strong>digital quality</strong> (definition) of the shared contents. In fact, the more the malicious actors benefit from diverse and good quality contents representing the collaborators, the more it facilitates their reuse to generate deepfakes. Moreover, businesses can limit their means of communication to an <strong>official channel, verified social networks and their official websites </strong>– which creates contents’ consumer habits for the audience, that will be suspicious of all diffusion out of these habits.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li style="text-align: justify;"><strong>Anticipate the crises: </strong>The communications requirements in the case of a <strong>proven incident</strong> linked to deepfakes must be anticipated, and the management of the deepfake case must include the “generic” communications scenarios addressed in the crisis communication plans.</li>
</ul>
<p>&nbsp;</p>
<figure id="post-13040 media-13040" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13040 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7.png" alt="" width="1092" height="545" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7.png 1092w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7-383x191.png 383w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image7-768x383.png 768w" sizes="auto, (max-width: 1092px) 100vw, 1092px" /></figure>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-2-2/">Deep dive into deepfake &#8211; How to face increasingly believable fake news? (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Deep dive into deepfake &#8211; How to face increasingly believable fake news? (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2/</link>
		
		<dc:creator><![CDATA[Carole Meyziat]]></dc:creator>
		<pubDate>Tue, 05 May 2020 17:00:18 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[media]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13024</guid>

					<description><![CDATA[<p>Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses. The recent...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2/">Deep dive into deepfake &#8211; How to face increasingly believable fake news? (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><strong>Online media and social networks expand the attack surface usable by the malicious actors, and deepfakes are the ultimate weapon. Well-known as a disinformation tool for the society, they bring about other risks to be considered by businesses. </strong></p>
<p style="text-align: justify;">The recent events linked to the COVID-19 outbreak have proven the necessity of acceding to reliable and true news for all the society. More than the epidemic, we have witnessed an « <strong>infodemic</strong> », rapid spread of false or misleading information on the social networks, raising the question of the trust given to the platforms relaying the news and of the authenticity of the information they pass on.</p>
<p>&nbsp;</p>
<figure id="post-13025 media-13025" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13025 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Capture.png" alt="" width="1000" height="213" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Capture.png 1000w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Capture-437x93.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Capture-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Capture-768x164.png 768w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">The use of deepfakes is a topical phenomenon affecting <strong>firstly the general public</strong>. It is inherently linked to the importance gained by the social and online media in our daily life.</p>
<p style="text-align: justify;">In September 2019, we counted near 15,000 deepfake videos online, twice more than in December 2018. If 96% of these videos were pornographic deepfakes posted on specialised websites, the extent of the affected topics has however increased to reach all the famous social networks (YouTube, Vimeo, Dailymotion).  Amongst the deepfakes posted on YouTube, <strong>20% already represented politicians, business owners and journalists</strong><a href="#_ftn1" name="_ftnref1">[1]</a>. Their <strong>disinformation power</strong> on the general public allows them to <strong>influence major political and societal events </strong>from the moment they star famous personalities.</p>
<p style="text-align: justify;">Deepfakes keep getting better, while the tools to generate them become more accessible (such as Lyrebird, for the audio deepfakes, Zao, for face-swapping, and the most recent one, Avatarify, integrated to Zoom and Skype, for the video). <strong>Their harmful power weighs more and more not only on public actors and organisations, but also on private ones, and must be taken into account in every business sector.</strong></p>
<p><strong> </strong></p>
<h2>A RISK WORTH CONSIDERING FOR BUSINESSES</h2>
<p style="text-align: justify;">Deepfakes can also be used against businesses. They offer a new playground for malicious actors, particularly through two means of action:</p>
<ul>
<li style="text-align: justify;"><strong>The improvement of Fake president frauds, </strong>whose impacts and probability are increased by deepfakes. The fraud becomes more credible thanks to photos, videos and audios copying the person who is impersonated. The targeted collaborators therefore consider these contents as an authentication in itself of the interlocutor, and the chances of successful attacks are increased – which is an incentive to ask for larger sums. Besides, the tools to generate deepfakes being accessible to the large public, the use of these frauds by malicious people increases.</li>
<li style="text-align: justify;"><strong>The undermining of the business </strong>through relayed false information can strongly damage its image, leading to a certain number of consequences, notably financial and legal. We can wonder what would be the impacts of an ExCom member’s video speech sharing fake results or strategic orientations on the price of his firm’s share or on the trust of its prospects; or those of the disclosure of a product anomaly on the direct order intake. Moreover, denying the rumours is harder when deepfakes are used. Today, many businesses still feel afar from the subject: <strong>How many have already wondered what would the impacts of a deepfake be on their activities?</strong></li>
</ul>
<p><strong> </strong></p>
<figure id="post-13027 media-13027" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13027 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image5.png" alt="" width="880" height="701" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image5.png 880w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image5-240x191.png 240w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image5-49x39.png 49w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/05/Image5-768x612.png 768w" sizes="auto, (max-width: 880px) 100vw, 880px" /></figure>
<p><strong> </strong></p>
<h2>A legal framework IN PROGRESS</h2>
<p style="text-align: justify;">The states start putting together an answer to the deepfake concern and legislating to regulate their diffusion. Some countries such as <strong>China</strong> criminalise the diffusion of deepfakes without notifying the audience about it (since the 1<sup>st</sup> of January 2020). In the <strong>United States</strong>, the treatment of the deepfakes’ question is speeding up as the presidential election of November 2020 approaches, and it is dealt with both at the federal level (bills prohibiting the diffusion of deepfakes in California, Virginia and Texas) and at the national one (the DEEPFAKE Accountability Act<a href="#_ftn2" name="_ftnref2"><em><strong>[2]</strong></em></a>  is being discussed by the Congress to “combat the spread of disinformation through restrictions on deep-fake video alteration technology”). In <strong>France, </strong>the question of deepfakes is included in the law of the 22<sup>nd</sup> of December 2019, related to the fight against the manipulation of information – and is therefore not dealt with specifically.</p>
<p style="text-align: justify;">These legal frameworks remain dawning and heterogeneous, and only represent one part of the answer to provide to this technology. <strong>More than condemning their malicious use, the issue is mostly to be able to detect and avoid them. </strong></p>
<p>&nbsp;</p>
<p style="text-align: justify;">In this first part, we have given an overview of the risks presented by deepfakes for the businesses. In the second part of the article, we will focus on the technical and organisational means available today to safeguard oneself.</p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> Study published by Deeptrace in September 2019.</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> <em>Defending Each and Every Person from False Appearances by Keeping Exploitation Subject to Accountability Act.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/05/deep-dive-into-deepfake-how-to-face-increasingly-believable-fake-news-1-2/">Deep dive into deepfake &#8211; How to face increasingly believable fake news? (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Saga (3/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/03/saga-3-3-protection-and-security-maintenance-of-industrial-iss/</link>
		
		<dc:creator><![CDATA[Ali Fawaz]]></dc:creator>
		<pubDate>Mon, 02 Mar 2020 17:37:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[incidents]]></category>
		<category><![CDATA[industrial IS]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[information system]]></category>
		<category><![CDATA[planning]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[SCADA]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12738</guid>

					<description><![CDATA[<p>We have seen through the previous articles the solutions allowing to initiate the security of Industrial IS. Once this securing has been achieved, the maintenance in security conditions must be ensured as well as the implementation of detection means. Managing...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/03/saga-3-3-protection-and-security-maintenance-of-industrial-iss/">Saga (3/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>We have seen through the previous articles the solutions allowing to initiate the security of Industrial IS. Once this securing has been achieved, the maintenance in security conditions must be ensured as well as the implementation of detection means.</em></p>
<h2>Managing risks in the long term</h2>
<h3>Equipment hardening</h3>
<p>In addition to secure architecture and administration tools, security levels for each item of equipment should be increased according to the strict necessity principle. A generic <strong>hardening</strong> guide can be created and then adapted to each of the technologies identified by the industrial IS mapping. This allows some of the vulnerabilities to be remedied at configuration and system levels.</p>
<p>Additional security can be provided by adding complementary solutions, such as:</p>
<ul>
<li><strong>Antivirus software</strong>, which will cover industrial workstations against the most common viruses, whether connected to the network or not (although the latter will require manual updates);</li>
<li>Implementing strict rules on <strong>local machine firewalls</strong>, which can be used to prevent communications, and therefore intrusions, on unused ports, and to filter the origin of flows according to the protocols used – which means attempted attacks can be more easily detected;</li>
<li><strong>Local administrator account-management solutions</strong> (for example, LAPS for Windows) finally make it possible to manage native administrator accounts on workstations in a central and individualized way.</li>
</ul>
<p>However, sometimes it may no longer be possible to harden equipment due to obsolescence. In such cases, there is a need to work with the relevant business functions <strong>on obsolescence management</strong> of the equipment – its potential replacement and, as a last resort, options to isolate it from the rest of the IS. On obsolete workstations, <strong>configuration blockers</strong> can be used to ensure the installation and use of components is limited only to those that are strictly necessary.</p>
<p>It’s important to remember that, while industrial ISs have vulnerabilities, they are, above all, part of the company&#8217;s means of production. Dialog with the relevant teams is therefore essential in understanding how equipment is used – in order to resolve the vulnerabilities while limiting effects on the business as far as possible.</p>
<h3>Security maintenance</h3>
<p>Once equipment has been brought up to the right level of security, a plan will be needed to maintain this over time. <strong>A choice of options for managing security patches</strong> can be developed to meet the needs of the business (in terms of availability, integrity, etc.) and synchronized with the maintenance of the industrial equipment through:</p>
<ol>
<li><strong>Integration into standard operating processes;</strong> for example, an installation’s qualification/quality processes may require that equipment be up to date. The updating and administering of equipment can therefore take advantage of plant shutdowns, especially where recertification is needed.</li>
</ol>
<p>&nbsp;</p>
<figure id="post-12741 media-12741" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12741 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2.png" alt="" width="1137" height="655" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2.png 1137w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-2-768x442.png 768w" sizes="auto, (max-width: 1137px) 100vw, 1137px" /></figure>
<p>&nbsp;</p>
<ol start="2">
<li>Planning a <strong>“hot swap” update process</strong> in the event of a critical security breach and a procedure for the preventive isolation of production lines – until it&#8217;s possible to interrupt the production process;</li>
<li><strong>The identification of redundant</strong> or peripheral equipment where interventions can be carried out on the basis of straightforward interaction with production managers.</li>
</ol>
<p>&nbsp;</p>
<figure id="post-12759 media-12759" class="align-none"></figure>
<figure id="post-12759 media-12759" class="align-none"></figure>
<figure></figure>
<figure></figure>
<figure id="post-12767 media-12767" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12767" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.1.png" alt="" width="1159" height="660" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.1.png 1159w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.1-335x191.png 335w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.1-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.1-768x437.png 768w" sizes="auto, (max-width: 1159px) 100vw, 1159px" /></figure>
<p>&nbsp;</p>
<p>To put in place these patching processes, the mapping carried out previously must have generated <strong>a precise equipment inventory</strong>, including:</p>
<ul>
<li>The identification of the equipment: type, location, and number of units;</li>
<li>The industrial processes that each item of equipment is used for, and the associated criticality;</li>
<li>The version of the operating system and/or firmware, and the tools and configurations deployed;</li>
<li>The cybersecurity needs of supported processes;</li>
<li>The availability of redundancy, data buffering, and cold spares;</li>
<li>The required patching frequency and patching history.</li>
</ul>
<p>But maintaining security levels isn’t simply about applying patches to equipment, it should also:</p>
<ul>
<li>Define the process for updating the <strong>security solutions installed</strong> on equipment isolated from the network;</li>
<li>Install <strong>removable media cleaning solutions</strong>, given that these types of tool remain in widespread use on industrial sites. Here, the use of portable solutions allows such media to be analyzed while moving around the site;</li>
<li>Ensure the <strong>safeguarding of equipment configurations</strong> and their <strong>integration into the DRP</strong> in order to guarantee that equipment can be restarted following an incident while still meeting availability needs;</li>
<li>Set up <strong>monitoring of the industrial IAM<a href="#_ftn1" name="_ftnref1">[1]</a></strong> to ensure robust physical and logical access control. This can also be used to automate a number of time-consuming activities that are still sometimes done manually.</li>
</ul>
<p>&nbsp;</p>
<h2>Detecting cybersecurity incidents</h2>
<p>The measures set out above help reduce the likelihood of risks occurring and increase the availability of equipment, which benefits the business. Nevertheless, there will still be a need to prepare for the worst and to have in place the tools needed <strong>to detect an incident</strong> – to be able to remedy such events as quickly as possible and minimize interruption times.</p>
<h3>Putting in place detection</h3>
<p>The first step is to activate the IDPS<a href="#_ftn2" name="_ftnref2">[2]</a> functions on networked equipment to ensure that a first stage of detection, and potentially automatic blocking, is in place.</p>
<p>The next step is to collect information by deploying a concentrator on site. The network equipment and server logs can then be sent to existing or dedicated SIEMs<a href="#_ftn3" name="_ftnref3">[3]</a> where correlation and detection can take place. SOC<a href="#_ftn4" name="_ftnref4">[4]</a> and CERT<a href="#_ftn5" name="_ftnref5">[5]</a> teams can then carry out analysis and detection, and respond, if needed, to an incident, by working through standard scenarios.</p>
<p>&nbsp;</p>
<figure id="post-12769 media-12769" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12769 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.1.png" alt="" width="1152" height="292" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.1.png 1152w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.1-437x111.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.1-71x18.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.1-768x195.png 768w" sizes="auto, (max-width: 1152px) 100vw, 1152px" /></figure>
<p>&nbsp;</p>
<h3>Anticipating specific risks</h3>
<p>However, detection based on standard scenarios may offer only limited value to the business functions. Considering the entirety of sources (PC, Linux, UNIX, etc.) and setting up dedicated industrial IS probes, capable of interfacing with the SCADA systems, can enhance the detection system. Such solutions, however, can be costly.</p>
<p>The key factor is to ensure a progressive and rapid increase in the maturity and value added by the SOC. Agile methods are a good fit here and involve the iterative application of the cycle described in the text box below.</p>
<p>&nbsp;</p>
<figure id="post-12771 media-12771" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12771" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.1.png" alt="" width="1149" height="553" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.1.png 1149w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.1-397x191.png 397w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.1-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.1-768x370.png 768w" sizes="auto, (max-width: 1149px) 100vw, 1149px" /></figure>
<p>&nbsp;</p>
<h3>Planning for remedial activities</h3>
<p>Lastly, detecting an incident will only result in effective remediation if the business-function teams are involved. As with equipment updates, <strong>emergency stop procedures</strong> should be reviewed jointly with industrial IS users. A formal <strong>Incident Response Plan</strong> enables the actions for an industrial cyber-incident to be planned.</p>
<p><strong>Dedicated industrial IS crisis-management exercises</strong> should also be carried out to ensure that teams are optimally prepared and to highlight any shortcomings.</p>
<p>&nbsp;</p>
<h2>Taking a progressive and participative approach guarantees an initiative&#8217;s success</h2>
<p>The security maintenance of an industrial IS is a complicated undertaking that can only be successful if it is carried out in partnership with the business functions. A progressive and participative approach should be taken to work with them in each of the following areas:</p>
<ul>
<li><strong>Understanding the industrial IS</strong>, by mapping and prioritizing the most critical elements;</li>
<li><strong>Mitigating the risks on the industrial IS</strong>, by implementing state-of-the-art secure network architecture and defining the administration processes – due to their criticality, safety ISs must be given particular attention;</li>
<li><strong>Ensuring an adequate level of safety</strong>, by hardening and ongoing security maintenance – in particular, this will involve discussions with equipment suppliers and manufacturers;</li>
<li><strong>Putting in place the tools needed to detect security incidents</strong> – these can have a bearing on production and define the response processes.</li>
</ul>
<p>The actions above can’t always be carried out in parallel. <strong>Defining a clear roadmap</strong> will enable such actions to be prioritized. This will aid cost control and maximize the value added for the business functions.</p>
<p>Given that such significant undertakings are often driven centrally, the challenge is to engage the individual industrial sites (which may be spread across the world) to ensure security levels can be maintained in the long term. In general, we observe that companies take a two-stage approach:</p>
<ol>
<li><strong>A multiyear cybersecurity program</strong> (typically carried out over three years), with a budget of €10m-15m, aimed at:
<ul>
<li>Creating the industrial IS inventory</li>
<li>Raising the security levels of existing assets by putting in place protective measures, often involving separation and filtering, and remedying the most critical vulnerabilities – here, defining procedures is essential;</li>
<li>Putting in place an initial network of local cybersecurity coordinators;</li>
</ul>
</li>
<li>Create <strong>an industrial cybersecurity team</strong> and its <strong>associated management structures</strong> that bring together:
<ul>
<li>A framework of key activities that local players will need to manage;</li>
<li>The participative construction of the tools that will help this network of local managers carry out their cybersecurity activities;</li>
<li>The development of approaches to manage the increase in security maturity levels and change (such as maturity matrices, site-level budget-modeling tools, the definition of steering indicators, central services that the sites can draw on, etc.).</li>
</ul>
</li>
</ol>
<p>Implementing the management processes can start immediately after the program and therefore benefit from the initial network of site-level cybersecurity coordinators put in place.</p>
<p>Once constructed, it becomes a question of energizing the initiative and steering progress on the sites and industrial ISs, in terms of both security and maturity levels.</p>
<p>Doing this typically involves:</p>
<ul>
<li>A network of local cybersecurity coordinators, of size 0.5 to 2 FTEs<a href="#_ftn6" name="_ftnref6">[6]</a> per site, who are responsible for carrying out projects, implementing ongoing cybersecurity activities, continuous security improvements, and reporting;</li>
<li>A central team of 3 to 10 FTEs, to provide overall steering and support local managers – especially in terms of expertise.</li>
</ul>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> IAM i.e. <em>Identity and Access Management</em>.</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> IDPS i.e. <em>Introduction Detection and Prevention Systems</em>.</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> SIEM i.e. <em>Security Incident and Event Management</em>.</p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> SOC i.e. <em>Security Operation Center</em>.</p>
<p><a href="#_ftnref5" name="_ftn5">[5]</a> CERT i.e. Computer Emergency Response Team.</p>
<p><a href="#_ftnref6" name="_ftn6">[6]</a> These figures can vary significantly depending on the size and number of local sites; they are the typical arrangements we observe in the large international organizations that Wavestone supports</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/03/saga-3-3-protection-and-security-maintenance-of-industrial-iss/">Saga (3/3) – Feedback from the field and good practices for the protection and the security maintenance of industrial ISs</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Prévention des risques cyber : sensibiliser les plus jeunes par le jeu !</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/09/prevention-des-risques-cyber-sensibiliser-les-plus-jeunes-par-le-jeu/</link>
		
		<dc:creator><![CDATA[3tienneC@pgras]]></dc:creator>
		<pubDate>Mon, 09 Sep 2019 11:59:29 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyberawareness]]></category>
		<category><![CDATA[Risque]]></category>
		<category><![CDATA[sensibilisation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12071</guid>

					<description><![CDATA[<p>Un sondage IFOP*, publié en début d’année 2019, révélait que 22% des jeunes avaient déjà fait les frais de « cyber harcèlement » et, selon l&#8217;association e-enfance, qui gère le numéro Net Écoute, 2 à 3 enfants par classe seraient...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/prevention-des-risques-cyber-sensibiliser-les-plus-jeunes-par-le-jeu/">Prévention des risques cyber : sensibiliser les plus jeunes par le jeu !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Un sondage IFOP*, publié en début d’année 2019, révélait que 22% des jeunes avaient déjà fait les frais de « cyber harcèlement » et, selon l&#8217;association e-enfance, qui gère le numéro Net Écoute, 2 à 3 enfants par classe seraient concernés… Des chiffres alarmants qui s’inscrivent plus largement dans les nouvelles menaces présentes sur Internet : chantage en ligne, challenges tels que le « blue whale challenge » ou le « momo challenge », prédateurs sur internet, contenu inadapté, usurpation d’identité, etc. Autant de dangers virtuels qui ont des conséquences bien réelles et parfois dramatiques.</p>
<p><strong>La prévention des risques cyber auprès des plus jeunes, mais aussi des parents, </strong><strong>est</strong><strong> un véritable enjeu de société.</strong> C’est pour apporter une <strong>nouvelle solution de sensibilisation et d’accompagnement</strong> que le Centre de la Cybersécurité pour les Jeunes (CCJ) et le cabinet de conseil Wavestone – avec la contribution de Cybermalveillance.gouv.fr – lancent le kit de jeu &#8220;1,2,3 CYBER!&#8221;, une initiative ludique et participative.</p>
<h1>Une approche ludique pour sensibiliser les plus jeunes aux dangers du net</h1>
<p>Face au constat de l’exposition croissante des plus jeunes aux multiples visages de la menace cyber, l’association « Centre de la Cybersécurité pour les Jeunes » (CCJ) s’est rapprochée du cabinet de conseil Wavestone au début de l’année 2019. L’objectif : relever le défi de la création d’un jeu destiné à <strong>sensibiliser les 11-14 ans aux dangers du net tout en s’amusant</strong>, mais également <strong>outiller les éducateurs et les parents </strong>pour un accompagnement adapté à cette tranche d’âge. De cette collaboration est né le jeu « 1, 2, 3 Cyber ! ».</p>
<figure id="post-12073 media-12073" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-12073 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/Image-1-1.png" alt="1,2,3 CYBER - un jeu pour sensibiliser les plus jeunes à la cybersécurité" width="841" height="632" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/Image-1-1.png 841w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/Image-1-1-254x191.png 254w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/Image-1-1-768x577.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/Image-1-1-52x39.png 52w" sizes="auto, (max-width: 841px) 100vw, 841px" /></figure>
<p style="text-align: center;"><em>1,2,3 CYBER &#8211; un jeu de sensibilisation des plus jeunes au risque cyber</em></p>
<p>Le jeu de société met en avant <strong>35 thématiques clés</strong> telles que le cyberharcèlement, l’ami virtuel, la vie privée, le hameçonnage, les mots de passe, le signalement, le chantage, le challenge, la cellule d’écoute, sans oublier les <em>fake news</em>…. Une session, qui peut compter de 6 à 12 joueurs, dure environ 1h15 (l’introduction, le temps de jeu et le bilan).</p>
<p>Le jeu est inspiré du Time&#8217;s Up, souvent connu et apprécié par la population visée, et se déroule en trois manches. Le but étant, à chacune de ces manches, de faire deviner un maximum de mots inscrits sur les cartes mises à disposition.</p>
<ul>
<li>Lors de la première manche, les joueurs doivent<strong> user de leur voix</strong> pour faire deviner les mots inscrits sur la carte. Si le jeu est trop simple et que les joueurs sont particulièrement sachants en la matière, il est possible d&#8217;apporter une complication : trois mots sont inscrits sur la carte qu&#8217;il ne faut pas prononcer, et ce sous peine de pénalité.</li>
<li>Lors de la deuxième manche, les joueurs doivent faire deviner les mots grâce <strong>au dessin.</strong> Pour cela, il vous est conseillé de vous munir d&#8217;ardoises / feutres véledas.</li>
<li>Enfin lors de la troisième manche, les joueurs ne <strong>peuvent prononcer qu&#8217;un mot</strong> afin de faire deviner celui inscrit sur la carte.</li>
</ul>
<p>Les mêmes cartes sont utilisées pour les trois parties, et le niveau de difficulté est croissant pour assurer <strong>la bonne appropriation des termes par tous les participants.</strong> En déroulant le jeu, il est possible que les participants rencontrent des difficultés pour faire deviner certains mots. C&#8217;est notamment le cas de hameçonnage, vie privée, etc. Pas de panique pour autant, la difficulté permet de s&#8217;imprégner davantage de leur signification et les jeunes trouvent toujours un moyen de s&#8217;en défaire (rébus, devinette, etc.).</p>
<p><strong>L’animateur joue un rôle clé dans ce jeu</strong> : à la fin de chaque manche, celui-ci doit déboucher sur un moment d’échange sur plusieurs mots. Il devra ainsi faciliter les échanges avec et entre les joueurs, orienter les discussions pour en déduire les bonnes pratiques à adopter sur Internet. Pour ce faire, un livret est mis à sa disposition. Il contient les règles du jeu détaillées ainsi qu’un guide leur permettant de rebondir sur certains termes clés et les bonnes pratiques qui devront être partagées.</p>
<table style="width: 100%; border-collapse: collapse; background-color: #dbdbdb;">
<tbody>
<tr>
<td style="width: 100%;"><strong>Une synthèse des bons comportements à partager aux joueurs<br />
</strong></p>
<ul>
<li style="text-align: left;">En cas de doute sur les intentions d’un message reçu, le plus simple est de ne pas donner suite. Si ce doute arrive dans un second temps, il n’est jamais trop tard : parlez-en autour de vous à des personnes de confiance. Selon les cas, un signalement sur le site <a href="http://www.internet-signalement.gouv.fr">internet-signalement.gouv.fr</a>peut être fait et de l&#8217;aide peut être apportée via le site <a href="http://www.cybermalveillance.gouv.fr">www.cybermalveillance.gouv.fr</a>.</li>
<li style="text-align: left;">De manière plus générale : vous n’êtes pas seuls ! Victime ou témoin de comportements anormaux, il est nécessaire et important d’en parler pour trouver des solutions : vos parents, le signalement, les cellules d’écoute</li>
<li style="text-align: left;">Restreindre aux seules personnes de confiance les informations personnelles ou sensibles que vous ne voudriez pas voir diffusées sur Internet : ne pas communiquer ces informations à des inconnus, configurer ses paramètres de sécurité et confidentialité sur les réseaux sociaux, désactiver la géolocalisation des photos partagées publiquement, etc.</li>
<li style="text-align: left;">Protéger l’accès à vos comptes : vos mots de passe doivent rester secrets en toute circonstance, compliqués à deviner pour les autres et faciles à retenir par vous. Ils ne doivent pas être partagés et doivent régulièrement être changés, par précaution. Pour qu’ils soient plus sécurisés, préférez les mots de passe longs aux courts et faîtes une combinaison de lettres minuscules, majuscules, chiffres et caractères spéciaux.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<h1>Un jeu testé en conditions réelles à diverses occasions</h1>
<p>La période de mai à juillet a été l’occasion de tester le jeu en conditions réelles à plusieurs dizaines de reprises, auprès de plusieurs tranches d’âge, potentiels joueurs ou animateurs (11-14 ans, 15-18 ans, etc.). Un franc succès, tant auprès des joueurs que des animateurs rencontrés ! Jusque-là, nous sommes ravis de l&#8217;engouement des jeunes et des animateurs pour ce jeu. Les premières sessions de test nous ont conforté sur le format qui permet d’<strong>échanger librement sur les </strong><strong>usages d’Internet et les </strong><strong>bonnes pratiques</strong><strong> associées</strong>.</p>
<p>Nous avons notamment pu constater que la sensibilisation effectuée dans les écoles ou par les diverses organisations portent leurs fruits : beaucoup de jeunes sont d&#8217;ores et déjà à l&#8217;aise avec certains termes inscrits sur les cartes, ce qui constitue une base solide au développement d&#8217;une meilleure hygiène numérique. L&#8217;objectif de ce jeu sera ainsi d&#8217;approfondir ces connaissances, de découvrir de nouvelles notions mais surtout de leur permettre d&#8217;en retirer des bonnes pratiques concrètes, à mettre en application sans plus attendre.</p>
<figure id="post-12075 media-12075" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-12075" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/Image-2.png" alt="" width="1286" height="369" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/Image-2.png 1286w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/Image-2-437x125.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/Image-2-768x220.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/Image-2-71x20.png 71w" sizes="auto, (max-width: 1286px) 100vw, 1286px" /></figure>
<h1>Un jeu gratuit et accessible à tous</h1>
<p>Pour une diffusion et une utilisation les plus larges possible, <strong><a href="https://github.com/wavestone-cdt/1-2-3-Cyber">le kit 1, 2, 3 Cyber est en téléchargement libre et gratuit depuis début août sur la plateforme Github</a></strong>. Ainsi, tous les parents, éducateurs et toute autre personne ayant des jeunes de cette tranche d’âge dans leur entourage peuvent sans difficultés dérouler le jeu.</p>
<p>Pour répondre aux besoins de tous et continuer à le faire évoluer, le jeu est diffusé en licence libre : <em>« la mise à disposition du jeu en open source n&#8217;est que le début, le but est que chacun puisse participer à son amélioration dans le temps ! » </em>affirme Etienne Capgras, manager cybersécurité chez Wavestone. Création de nouvelles cartes de jeu, ajout d’informations pratiques spécifiques à d’autres pays que la France, traduction dans d’autres langues… Toute volonté de contribuer sera la bienvenue ! Pour cela, il suffit de se rendre sur la plateforme Github ou de contacter le CCJ (<a href="mailto:contact@cyberccj.com">contact@cyberccj.com</a>) et Wavestone (<a href="mailto:123cyber@wavestone.com">123cyber@wavestone.com</a>).</p>
<p>&nbsp;</p>
<p>* Sondage réalisé par questionnaire auto-administré en ligne du 13 au 14 février 2019 auprès d‘un échantillon de 1 003 personnes, représentatif de la population âgée de 18 ans et plus résidant en France métropolitaine.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/prevention-des-risques-cyber-sensibiliser-les-plus-jeunes-par-le-jeu/">Prévention des risques cyber : sensibiliser les plus jeunes par le jeu !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ERPs: how to control permission-related risks (Part 1)</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-1/</link>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Mon, 01 Jul 2019 13:24:08 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[authorization]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ERP]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11945</guid>

					<description><![CDATA[<p>Enterprise Resource Planning (ERP) applications support businesses’ most critical processes and workflows. As such, it carries many inherent risks—the main ones being internal fraud and human error. And statutory auditors, internal controllers, and auditors, are only too well aware of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-1/">ERPs: how to control permission-related risks (Part 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Enterprise Resource Planning (ERP) applications support businesses’ most critical processes and workflows. As such, it carries many inherent risks—the main ones being <strong>internal fraud and human error</strong>.</p>
<p>And statutory auditors, internal controllers, and auditors, are only too well aware of this; they’ve been increasing pressure for several years now to bring these risks under control and ensure <strong>compliance </strong>with the relevant regulations.</p>
<p>&nbsp;</p>
<figure id="post-11948 media-11948" class="align-none"></figure>
<figure id="post-11950 media-11950" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-11950 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1.png" alt="" width="1182" height="635" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1.png 1182w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1-356x191.png 356w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1-768x413.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image1-71x39.png 71w" sizes="auto, (max-width: 1182px) 100vw, 1182px" /></figure>
<p style="text-align: center;"><em>ERP permission-related risks that need to be brought under control</em></p>
<p>&nbsp;</p>
<p>What’s needed is to take a serious look at the topic of &#8220;<strong>permissions </strong>&#8221; (which are also called rights, authorizations, roles, or access profiles). In fact, the permissions granted to users on a company’s ERP enable them to carry out a large part of their activities—legitimate or otherwise. By ensuring you provide only the right people with the right permissions at the right time, you can significantly reduce the risks mentioned above.</p>
<p><strong>Over two articles, we present our vision for this area, and share proven good practices that can bring the risks associated with ERP permissions under control.</strong></p>
<p>&nbsp;</p>
<h2>Companies show little rigor when it comes to ERP permissions</h2>
<p>ERP ecosystems are complex, and companies typically spend a great deal of time and energy setting their ERPs up. <em>Yet a minimalist approach is often taken to the &#8220;identity and access management&#8221; aspect of ERPs. </em>Over time, this results in a deterioration in levels of control and security:</p>
<ul>
<li>Obsolete, generic, and shared accounts accumulate.</li>
<li>The number of roles explodes.</li>
<li>The principle of least privilege is not properly applied.</li>
<li>Toxic combinations of rights (infractions of the segregation of duties principle) occur, etc.</li>
</ul>
<p>All of these factors tend to increase the risks mentioned above.</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="alignnone wp-image-11952 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2.png" alt="" width="1477" height="807" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2.png 1477w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-350x191.png 350w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-768x420.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/Image2-71x39.png 71w" sizes="auto, (max-width: 1477px) 100vw, 1477px" /><em>Key Success Factors for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>As a result, few companies can claim to have complete mastery of the identities and permissions aspects of their ERPs. To illustrate this, consider the <em>indicative questions</em> below to assess your understanding of the subject:</p>
<ul>
<li>How many accounts can’t actually be associated with a single individual (generic accounts, accounts not reconciled with an HR repository or Active Directory, etc.)?</li>
<li>How many users can change the access rights of other users?</li>
<li>How many users have profiles with high levels of privilege (such as &#8220;SAP_ALL&#8221; and &#8220;SAP_NEW&#8221; in SAP ECC)? Of these, how many are really legitimate?</li>
<li>How many users can change the suppliers master data?</li>
<li>On average, how many roles are assigned to users? Is it typically two or three roles per user, or do numbers of roles often reach double digits?</li>
<li>How many IT roles are assigned to business-function users and <em>vice versa</em>?</li>
<li>How many roles give more rights in reality than they should theoretically provide (roles that should be read-only but have write permissions too; roles whose applicability is broader than it should be; etc.)?</li>
</ul>
<p>&nbsp;</p>
<h2>How can you address the issue?</h2>
<p>Now that the problem has been defined, what can be done about it? It’s important not to feel overwhelmed or discouraged by the apparently huge task that the issue suggests! It is possible to improve the situation and bring risks related to ERP permissions under control. In addition to the obvious point of providing sufficient resources to do it, there are a number of key success factors that must be met; and these that are the subject matter of our two articles.</p>
<h3>1. Steering things carefully</h3>
<p>When embarking on such a project, you clearly can&#8217;t address everything straight away. It’s more a case of <strong>strategically targeting defined scopes</strong> which will yield significant results within a reasonable amount of time. For example, it might be a key application or a central ERP module, a process that’s been highlighted in a recent audit, or a series of risks already identified as critical in the corporate risk register. <strong>The analysis of real data </strong>extracted from ERP systems can be a great help in knowing what to prioritize, and in justifying the priorities chosen.</p>
<p>In terms of approach, there are three areas that the project must cover:</p>
<ul>
<li>The analysis and control of permission-related risks—the core work of such a project.</li>
<li>Implementing a technical solution that supports the chosen methodology.</li>
<li>Steering and change management—both essential for the success of such a project.</li>
</ul>
<p>It’s important to <strong>pace the project by incorporating regular milestones</strong> for each of the three areas—and for each project phase:</p>
<ul>
<li>The preparation phase, which includes the detailed framing of the project, putting in place the tools, and completing the prerequisites.</li>
<li>The deployment phase—known as Get-Clean—aims to control the current risks, by demonstrating the approach at pilot scale, rolling it out more widely, and adjusting the tools according to user feedback.</li>
</ul>
<p>The ongoing operating mode—known as Stay-Clean—can take the project to the next stage, but the groundwork for it must be done during the initial phase, if the risks are to be controlled over the long term.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11954 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3.png" alt="" width="1526" height="594" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3.png 1526w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3-437x170.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3-768x299.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image3-71x28.png 71w" sizes="auto, (max-width: 1526px) 100vw, 1526px" /></p>
<p style="text-align: center;"><em>A model approach to an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p>It’s imperative to <strong>closely monitor </strong>the actions taken by the various people and decision makers involved, and, more generally, to check that the commitments made at each step are being successfully achieved. These commitments can be represented by results that are both quantitative (a reduction of X% in the number of critical risks; no more than 5 risks per user, etc.) and qualitative (the development of processes or compensatory controls). There will also be a need to <strong>measure and demonstrate the value of these results to the project’s sponsors</strong> and representatives from the business functions.</p>
<h3>2. Preparing the ground</h3>
<p>Technical and business-function-related questions are closely linked in projects that address permissions, something especially true in the case of ERPs. As a result, you need to put in place the <em>right sponsors</em> from the start: from both the security and IT sides, and the business-function and Internal Control sides.</p>
<p>There may also be a need to involve numerous other players: access rights officers, security managers, representatives from the business functions, process managers, team managers, internal controllers, etc. Coordination is essential throughout the project, and future contributors, as well as those affected by the changes, need to be <strong>brought on board and engaged </strong>from the start—in terms of sharing the challenges, objectives, and approach. <strong>The approach must be framed positively</strong>: it must not be about stigmatizing states of affairs or behaviors, or comparing one part of the business with another; rather, it should be about moving the company and its employees forward in the management of risks.</p>
<p>The preparation phase first involves <strong>gathering the various inputs </strong>needed for the project, and especially those that will enable an initial analysis of the data: organizational information about users (department, function, etc.), permissions, access logs, control repositories, segregation of duties matrices, etc. For this last item, in particular, workshops are a must if the matrices are to be completed and &#8220;translated&#8221; into technical permissions that can become automated controls within a tool.</p>
<p>There is also a need to define the indicators, dashboards, and reports that will be used both during the project phase and also in the long term by those in charge of continuous monitoring.</p>
<p>Another important activity during this preparatory phase is <strong>to improve data quality</strong>. This prerequisite becomes all the more indispensable when a company’s maturity level, in identity and access management terms, is low. Improving quality isn’t just about user accounts though, it’s also—and especially—about the ERP authorization model. If the roles or access profiles themselves carry risks (in particular, in terms of the segregation of duties), this must be remedied before tackling the individual risks introduced by users.</p>
<p>&nbsp;</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-11948 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4.png" alt="" width="1323" height="737" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4.png 1323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4-343x191.png 343w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4-768x428.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/07/image4-71x39.png 71w" sizes="auto, (max-width: 1323px) 100vw, 1323px" /></p>
<p style="text-align: center;"><em>Examples of prerequisites for an ERP permissions risk-remediation project</em></p>
<p>&nbsp;</p>
<p><em>We’ve now discussed the first two key success factors in an ERP permissions risk-remediation project: close steering and preparing the ground. Three other key success factors will be discussed in a <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-2/">second article</a>, to follow.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/erps-how-to-control-permission-related-risks-part-1/">ERPs: how to control permission-related risks (Part 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>EBIOS (2010) est mort, vive EBIOS (RM) ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/01/ebios-2010-est-mort-vive-ebios-rm/</link>
		
		<dc:creator><![CDATA[Yvain TAVERNIER]]></dc:creator>
		<pubDate>Wed, 23 Jan 2019 18:12:04 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[analyse de risques]]></category>
		<category><![CDATA[ANSSI]]></category>
		<category><![CDATA[EBIOS]]></category>
		<category><![CDATA[EBIOS RM]]></category>
		<category><![CDATA[EBIOS RM/homologation]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11577/</guid>

					<description><![CDATA[<p>Résultat d’un travail d’envergure porté durant deux ans par l’ANSSI et le Club EBIOS, EBIOS Risk Manager (EBIOS RM) est la nouvelle déclinaison de la méthodologie d’analyse de risque EBIOS. Bien que les principes fondamentaux d’identification des enjeux, des risques...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/01/ebios-2010-est-mort-vive-ebios-rm/">EBIOS (2010) est mort, vive EBIOS (RM) ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Résultat d’un travail d’envergure porté durant deux ans par l’ANSSI et le Club EBIOS, <strong>EBIOS Risk Manager</strong> (EBIOS RM) est la nouvelle déclinaison de la méthodologie d’analyse de risque EBIOS.</p>
<p>Bien que les principes fondamentaux d’identification des enjeux, des risques et des actions de remédiation demeurent, la méthode s’illustre par son appel à des <strong>scénarios d’attaque complexes</strong> <strong>tirant partie de vulnérabilités multiples,</strong> à la manière d’attaques réelles comme celle contre les systèmes de connexion à SWIFT de la Banque Centrale du Bangladesh en 2016 ou contre Sony Pictures en 2014&#8230; Autre évolution majeure, l’apparition d’une <strong>analyse approfondie des attaquants potentiels, de l’écosystème et des parties prenantes</strong> du périmètre étudié.</p>
<p>Ce changement de posture permet à EBIOS RM de répondre spécifiquement aux problématiques posées par des<strong> attaquants toujours plus professionnalisés </strong>qui étudieront méthodiquement les vulnérabilités d’une cible ainsi que l’ensemble de son écosystème pour parvenir à leurs fins. Elle vient ainsi remplir une zone de vide dans l&#8217;espace des méthodologies d’analyse de risques.</p>
<p>Néanmoins, malgré cette approche réellement innovante et comme nous allons l’étayer ci-dessous, EBIOS RM ne doit<strong> pas forcément être considérée comme la nouvelle démarche globale</strong> d’analyse des risques mais plutôt comme une <strong>nouvelle corde à l’arc</strong> méthodologique du RSSI pour traiter les scénarios d’attaque les plus complexes.</p>
<p>S’appuyant sur nos premiers retours d’expérience de l’application concrète de cette méthode, nous présenterons en détail les évolutions qu’elle apporte ainsi que leurs implications sur la gouvernance plus générale des risques SSI.</p>
<h1>EBIOS RM, une nouvelle méthodologie pour mieux appréhender les risques complexes de cybersécurité<code></code></h1>
<p>Depuis bientôt 10 ans, EBIOS 2010 propose une méthode centrée sur la notion de <strong>menaces unitaires</strong> tirant partie de <strong>vulnérabilités</strong> et de prévention de leurs <strong>impacts sur des processus métiers</strong>. Cette méthode, qui remettait à l’époque le métier au centre de l’analyse de risques, n’est cependant <strong>pas conçue pour </strong>identifier et traiter<strong> des menaces complexes. </strong>Ces menaces, composées de rebonds de l’attaquant d’une vulnérabilité à une autre pour atteindre ses fins, constituent pourtant aujourd’hui une part majeure de l’univers des risques SSI et ont été mises <strong>à l’ordre du jour de nombreux comités exécutifs</strong> à la suite des dernières attaques majeures comme NotPetya ou WannaCry.</p>
<p>EBIOS RM vise à compléter ce manque par une approche intégrant dans un premier temps de l’étude poussée<strong> des intentions des attaquants</strong> potentiels, puis la prise en compte formelle de <strong>l’écosystème</strong> et enfin l’identification de <strong>scénarios d’attaque complexes de type <em>kill chain</em></strong>. L’objectif final de cette étude n’est plus l’alignement des mesures de sécurité à des failles unitaires comme pour EBIOS 2010 mais bien la capacité à maîtriser des risques aux facettes multiples.</p>
<h1 style="text-align: left;">En préalable, mener un travail préparatoire concernant les vulnérabilités</h1>
<p>EBIOS RM propose dans un premier temps la mise place d’une étude structurée du niveau de sécurité du périmètre analysé par une revue de conformité. Cette vérification permet d’identifier un premier panel de vulnérabilités, <strong>comme le ferait un attaquant</strong> en testant par exemple la version des infrastructures ou les vulnérabilités de l’OWASP.</p>
<p>Contrairement à ce qui est proposé dans la méthode EBIOS 2010, la principale finalité de cette approche n’est pas de remédier à des vulnérabilités unitaires mais bien d’alimenter la définition des scénarios d’attaque complexes en identifiant les potentiels <strong>points de rebond</strong> de l’attaquant.</p>
<h1>Ensuite, mieux prendre en compte l’écosystème et les sources d’attaque</h1>
<p>Par ailleurs, afin d’adapter l’analyse des risques à la réalité des SI contemporains et de l’univers de menace, EBIOS RM intègre une innovation majeure sous la forme de la <strong>revue systématique de l’écosystème</strong> du périmètre étudié, depuis les <strong>tiers de confiance</strong> connectés à celui-ci jusqu’aux <strong>tiers présumés hostiles</strong> tels que des concurrents, des états voire des activistes.</p>
<p>L’étude des tiers de confiance met en lumière leurs interactions avec le périmètre étudié, <strong>trop souvent acquises comme sûres</strong>, qui constituent un vecteur d’attaque idéal pour un attaquant contournant ainsi les défenses périmétriques voire les mesures de gestion des accès internes.</p>
<p>L’étude des tiers hostiles place quant à elle la notion <strong>d’intentionnalité de la malveillance </strong>au cœur de l’étude. EBIOS RM propose donc de les identifier précisément et d’analyser les objectifs possiblement visés. Ce changement d’angle de vue sert de base au développement de scénarios d’attaque complexes dans la suite de la démarche.</p>
<p>Cette nouvelle approche vise notamment à faire face aux attaques par <em>water-holing</em> ou encore des conséquences de la compromission d’un SI tiers comme les fuites de données de l’enseigne américaine Target en 2013.</p>
<h1>Enfin, un travail itératif de construction des scénarios d’attaque</h1>
<p>Sur la base de cette connaissance approfondie du contexte, la démarche EBIOS RM vise à réaliser une <strong>étude préliminaire et plus fonctionnelle</strong> des évènements pouvant survenir sous la forme de scénarios stratégiques, puis un <strong>zoom plus technique</strong> sous la forme de scénarios opérationnels détaillés. L’objectif est que ces deux visions s’alimentent tout au long de l’étude dans une <strong>réflexion itérative</strong>.</p>
<p>EBIOS RM demande tout d’abord de définir de 3 à 5 scénarios stratégiques combinant source d’attaque, objectif visé et principaux moyens utilisés pour atteindre cet objectif. Cette <strong>vision de haut niveau et aux aspects techniques très limités</strong>, atout clef pour présenter les risques cyber <strong>aux métiers voire aux instances dirigeantes </strong>d’une organisation, permet également de préciser le périmètre de la réflexion plus technique qui sera réalisée au travers de 10 à 15 scénarios opérationnels.</p>
<p>Ces <strong>scénarios opérationnels</strong> racontent un fil détaillé d’évènements qui, combinés, mènent à un impact majeur. EBIOS RM structure ce cheminement au travers de quatre phases. Tout d’abord, la <strong>prise de connaissance</strong> par l’attaquant du SI ciblé, de son fonctionnement et de ses acteurs. Ensuite, la phase <strong>d’entrée </strong>dans ce SI au travers d’actions comme le phishing ou l’exploitation d’une <em>backdoor</em>. Puis vient la phase de <strong>recherche</strong> des données ou du SI critique que l’attaquant souhaite compromettre. Enfin, c’est la phase <strong>d’exploitation</strong> de cette cible via par exemple l’exfiltration de données ou l’implantation d’une bombe logique.</p>
<p>Chaque scénario d’attaque opérationnel aura donc <strong>sa propre histoire à raconter, sa propre <em>kill chain</em></strong><em>,</em> dont la vraisemblance sera déterminée. Cette spécificité est une des forces de l’étude, facilitant sa restitution, mais lui permettant également <strong>d’alimenter la réflexion d’un SOC</strong> concernant la définition de scénarios de corrélation à implémenter dans un SIEM.</p>
<p>Cette hauteur d’analyse en fait d’ailleurs un outil de choix pour l’étude des risques des périmètres les plus critiques d’une entreprise, comme par exemple les SI d’importance vitale.</p>
<h1>Un outil ambitieux dont il faut cadrer l’utilisation</h1>
<p>EBIOS RM présente des atouts séduisants par la prise en compte des motivations et méthodes des attaquants, de l’étude approfondie des tiers de confiance comme potentiels vecteurs d’attaque ou encore par sa capacité à produire des scénarios d’attaques complexes mais capables de convaincre des publics non-initiés.</p>
<p>L’une des principales qualités d’EBIOS RM, imposer réflexion et créativité pour définir les scénarios stratégiques et opérationnels pertinents, a néanmoins un revers notable : EBIOS RM ne pourra ainsi pas, exception faite de l’étude du socle et des acteurs menaçants, <strong>faire l’objet d’une industrialisation poussée</strong> des outils associés <strong>sans craindre</strong> une perte de créativité et donc <strong>une perte de qualité</strong> dans ses résultats. Cette logique s’écarte donc de celle en vigueur pour EBIOS 2010 qui rendait par exemple possible une revue exhaustive des menaces, permise par la complexité très souvent limitée de celles-ci.</p>
<p>En l’absence de cadre largement outillé et afin d’éviter que la subjectivité des participants n’y fasse son lit, EBIOS RM va ainsi exiger <strong>de son pilote un éventail de compétences qui reste rare</strong> sur le marché : des <strong>connaissances techniques pointues et orientées test d’intrusion </strong>pour déterminer ce que serait capable de réaliser un attaquant selon son niveau d’expertise, de la <strong>créativité,</strong> une <strong>capacité au <em>story telling</em>, à la synthèse et à la pédagogie</strong>, afin de définir des scénarios d’attaques qui auront à la fois <strong>suffisamment d’impact et de pertinence</strong> pour convaincre à la fois les équipes métiers et techniques tout en illustrant avec justesse et moins de quinze scénarios opérationnels <strong>toutes les facettes</strong> remarquables de la situation étudiée.</p>
<p>Ces différentes qualités renforceront par ailleurs la <strong>légitimité</strong> du pilote de l’étude, indispensable <strong>pour animer et recadrer efficacement</strong> les différents groupes de travail demandés par la méthodologie, afin d’éviter les discussions sans fin qu’elle peut risquer d’entraîner par ses aspects subjectifs. Il faut en outre garder à l’esprit que par son aspect <strong>itératif</strong> et les nombreux groupes de travail qu’elle implique, EBIOS RM sera une démarche <strong>significativement plus coûteuse en temps</strong> qu’EBIOS 2010. De plus, ses résultats seront <strong>difficilement réutilisables d’une étude à l’autre</strong>, en cela qu’elle se concentre justement sur les spécificités des périmètres étudiés.</p>
<h1>Les sources accidentelles écartées</h1>
<p>Dernier point d’attention, EBIOS RM, en plaçant l’intentionnalité au cœur de sa démarche, <strong>écarte les sources accidentelles</strong>. Pourtant, celles-ci se produisent régulièrement, qu’il s’agisse d’un coup de pelleteuse, d’une corruption d’une base de données ou de l’erreur d’un administrateur. Par ailleurs, le cœur de la démarche EBIOS RM, en générant un nombre limité de scénarios opérationnels, <strong>ne vise pas à l’exhaustivité</strong> qui était une des forces d’EBIOS 2010. La réponse de la démarche à ce biais méthodologique est l’étape d’étude du socle, mais celle-ci <strong>n’est qu’une revue de conformité</strong>. Si on imagine appliquer la démarche à un périmètre existant présentant de nombreux axes d’améliorations et qu’on utilise un référentiel de conformité suffisamment exhaustif (les 42 règles de l’ANSSI ou ISO27002), on pourra se retrouver avec une liste à la Prévert des mesures correctives à mettre en œuvre, <strong>sans moyen rigoureux de les prioriser</strong>, sauf à faire appel à EBIOS 2010 qu’EBIOS RM visait à remplacer…</p>
<h1>Vers une refonte de la gouvernance de la gestion des risques</h1>
<p>EBIOS RM est donc une démarche qui nécessite un temps de mise en œuvre certain ainsi que des expertises à la disponibilité souvent déjà limitée, et dont les résultats seront difficiles à réutiliser. En tenant également compte de ses priorités méthodologiques, nous pensons préférable de <strong>concentrer</strong> l’application de cette démarche aux systèmes présentant <strong>des enjeux forts</strong> et dont le niveau de sécurité a déjà <strong>un certain niveau de maturité</strong>, par exemple parce qu’ils seront passés par l’étape EBIOS 2010. Il nous semble également préférable d’utiliser EBIOS RM <strong>pour des ensembles cohérents de SI </strong>(exemple : une voiture ou les activités marketing) afin de conserver un périmètre d’étude suffisamment important pour permettre des attaques avancées. Enfin, sur des <strong>ensembles cohérents de SI appartenant à des acteurs différents</strong>, il est possible d’appliquer la méthode jusqu’aux scénarios stratégiques afin de fixer des priorités d’étude pour les analyse de risques plus détaillées qui seront mises en œuvre par chaque entité sur ses périmètres propres. EBIOS RM sera dans ces cas d’autant plus pertinente qu’elle se concentrera uniquement sur des scénarios <strong>au plus proche des pratiques métiers</strong>.</p>
<h1>EBIOS RM, une brique dans l’offre de services d’analyse de risque</h1>
<p>L’arrivée d’EBIOS RM, démarche novatrice quoique à utiliser avec mesure, et qui finalement <strong>complète plus qu’elle ne remplace</strong> EBIOS 2010, participe donc à créer ce qu’on pourrait appeler une <strong>offre de service EBIOS</strong>. L<strong>es ressources et les compétences nombreuses qu’elle nécessite</strong> pour être mise en œuvre la réserveront ainsi à des périmètres spécifiques,<strong> fortement exposés ou porteurs d’enjeux majeurs</strong> comme par exemples les SI d’importance vitale, <strong>ayant déjà fait l’objet d’un socle de mesures d’hygiène SSI</strong>.</p>
<p>Tout ceci plaide en faveur de la mise en œuvre<strong>, en amont des projets, d’une démarche de gouvernance des risques, transverse à l’entité,</strong> qui permettra de déterminer rapidement les <strong>enjeux, l’exposition et la maturité sécurité</strong> de ses périmètres fonctionnels et applicatifs, puis de décider en fonction quelle méthodologie de sécurisation mettre en place : simple revue de conformité à un socle minimal de règles de sécurité, étude EBIOS 2010 plus ou moins approfondie ou enfin, sur les périmètres à la fois sensibles et matures, étude EBIOS RM.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/01/ebios-2010-est-mort-vive-ebios-rm/">EBIOS (2010) est mort, vive EBIOS (RM) ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Les As du Web : Participez à l’initiative de sensibilisation des 7-11 ans aux risques du web</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/11/les-as-du-web/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Tue, 27 Nov 2018 08:25:51 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyberawareness]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[ISSA]]></category>
		<category><![CDATA[Risque]]></category>
		<category><![CDATA[sensibilisation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11430/</guid>

					<description><![CDATA[<p>« Va parler à la maitresse si quelqu’un t’embête à l’école », « Je ne te louerai pas ce DVD, ce film est trop violent pour toi » ou encore le classique « Surtout, ne suis pas un inconnu, même s’il t’offre des bonbons ». On...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/11/les-as-du-web/">Les As du Web : Participez à l’initiative de sensibilisation des 7-11 ans aux risques du web</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-11434 media-11434" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11434" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/11/Sans-titre.png" alt="" width="660" height="282" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/11/Sans-titre.png 660w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/11/Sans-titre-437x187.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/11/Sans-titre-71x30.png 71w" sizes="auto, (max-width: 660px) 100vw, 660px" /></figure>
<p><em>« Va parler à la maitresse si quelqu’un t’embête à l’école », « Je ne te louerai pas ce DVD, ce film est trop violent pour toi » ou encore le classique « Surtout, ne suis pas un inconnu, même s’il t’offre des bonbons ». On a tous encore en tête, même après des décennies, les conseils de nos parents concernant notre sécurité dans la vie de tous les jours. Mais avec une utilisation de plus en plus précoce d’Internet par les enfants, cette vie de tous les jours s’est maintenant étendue à la toile. Il est donc devenu impératif de sensibiliser les plus jeunes aux risques auxquels ils s’exposent en surfant sur le web pour qu’ils puissent en tirer tous les bénéfices !</em></p>
<h2>L&#8217;éducation aux risques numérique, une nécessité</h2>
<p>C’est la mission que se donne ISSA France sous le patronage du secrétariat d’état chargé du numérique avec <a href="http://securitytuesday.com/wp-content/uploads/2018/10/ISSA.Cahier.SecNum777.pdf">son cahier de vacances « Les As du Web ».</a> Et le besoin est là : selon un récent <a href="https://www.ipsos.com/fr-fr/les-enfants-et-internet-56-des-jeunes-pensent-pouvoir-aller-sur-internet-en-toute-impunite">sondage IPSOS</a>, plus d’un tiers des jeunes interrogés (entre 9 et 17 ans) ne protègent en rien les informations personnelles qu’ils mettent en ligne. Plus inquiétant, un cinquième de ces enfants pourrait envisager de donner rendez-vous à un étranger rencontré sur Internet, et 10% discutent d’ailleurs régulièrement avec de parfaits inconnus.</p>
<p>La sensibilisation de cette population à ces dangers est d’autant plus importante que l’autorité parentale ne suffit pas toujours : ils sont 65% à déclarer ne pas respecter au moins une règle de conduite édictée par leurs parents&#8230; Ces derniers ne sont d’ailleurs pas toujours très au courant eux-mêmes des dangers de la toile.</p>
<p>Sensibiliser les enfants, et par transitivité des parents, est donc un enjeu qui a déjà fait l’objet d’initiatives, avec notamment la création du <em>Permis Internet</em> par le Ministère de l’Intérieur. La publication de ce cahier de vacances « Les As du Web » est une étape supplémentaire dans l’intégration du numérique au sein de l’éducation des jeunes générations.</p>
<h2>Comment parler simplement d&#8217;un sujet complexe</h2>
<p>Pour autant, aborder une thématique technologique avec un public aussi particulier peut relever d’une véritable gageure, et ce d’autant plus qu’ISSA France a choisi de s’adresser aux 7 – 11 ans. Cibler cette tranche d’âge tombe sous le sens car c’est l’âge auquel ces internautes en herbe accèdent à Internet et sont les plus vulnérables.</p>
<p>Le premier challenge est donc d’arriver à isoler les sujets à aborder dans l’ouvrage. Ils doivent traiter les grands risques auxquels les enfants seront exposés de la manière la plus didactique et rassurante possible. Le choix d’un cahier de vacances, avec ses jeux et son graphisme ludique répond à cet objectif. Ensuite, il s’agit de trouver les bons mots. Le monde du numérique est truffé d’anglicismes et utilise un vocabulaire très particulier qu’il faut simplifier et expliquer si besoin au jeune lecteur afin de faciliter sa compréhension.</p>
<h2>Les grands thèmes du petit cahier</h2>
<p>Le cahier de vacances « Les As du Web » aborde donc dans un ouvrage ludique et pédagogique d’une vingtaine de pages les six thématiques suivantes :</p>
<ul>
<li><strong>Qui se cache derrière ton écran ? Et pour quoi faire ?</strong> Pour bien expliquer que l’on peut facilement masquer son identité et prétendre être celui que l’on n’est pas.</li>
<li><strong>Tes données personnelles : apprends à les reconnaitre et protège-les !</strong> Pour montrer la valeur de ses données et les enjeux à long terme.</li>
<li><strong>Le monde numérique n’est pas que pour les enfants. Ne t’y promène pas seul.</strong> Pour démontrer que le web n’est finalement pas si différent du monde « réel ».</li>
<li><strong>Le cyberharcèlement : c’est grave !</strong> Cette partie donne les bons réflexes sur comment réagir lorsque l’on est visé ou témoin ?</li>
<li><strong>Internet ne dit pas toujours la vérité.</strong> Gare aux mensonges pour ne pas les répéter. Important en ces temps-de « fake news ».</li>
<li><strong>Sur Internet, reste cool et toi-même</strong>. Afin de démystifier et donner les bons réflexes de posture.</li>
</ul>
<h2>De la page web aux enfants, il reste du chemin à parcourir</h2>
<p>Le projet est maintenant arrivé au bout de sa première phase : la création du contenu. Wavestone est d’ailleurs très heureux d’y avoir, avec d’autres, participé. Mais cette première étape ne constitue que 10% du chemin car tout l’enjeu maintenant est de faire que ce contenu atteigne sa cible !</p>
<p>Pour se donner les moyens d’y arriver, ISSA France souhaite imprimer un million de copies papier d’ici cet été. Car si pour le moment, le cahier n’est disponible qu’en ligne, l’association souhaite en effet placer de nombreux exemplaires physiques à des endroits stratégiques, comme les gares, les aéroports ou les aires d’autoroute lors des départs en vacances. Et c’est là que vous pouvez aider et participer au succès de cette initiative. A votre échelle en partageant autour de vous le cahier de vacances mais aussi à l’échelle de votre entreprise, puisqu’ISSA France est toujours à la recherche de partenaires pour participer à la diffusion de cet ouvrage et lui permettre d’atteindre sa cible.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/11/les-as-du-web/">Les As du Web : Participez à l’initiative de sensibilisation des 7-11 ans aux risques du web</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security certification: the key to complying with the french military programming Law (MPL)</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/07/security-certification-the-key-to-complying-with-the-french-military-programming-law-mpl/</link>
		
		<dc:creator><![CDATA[Fr@Nc0isLuqu3t]]></dc:creator>
		<pubDate>Mon, 09 Jul 2018 10:09:51 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[ANSSI]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[certification]]></category>
		<category><![CDATA[MPL]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk analysis]]></category>
		<category><![CDATA[VIIS]]></category>
		<category><![CDATA[VOI]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10951/</guid>

					<description><![CDATA[<p>Security certification, taking a risk-bases approach to ISS Under the French Military Programming Act (MPL), certification is a mandatory procedure that applies to Vitally Important Operators (VOI). It helps to manage the issues and security levels for all Vitally Important...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/security-certification-the-key-to-complying-with-the-french-military-programming-law-mpl/">Security certification: the key to complying with the french military programming Law (MPL)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Security certification, taking a risk-bases approach to ISS<strong><br />
</strong></h2>
<p>Under the French Military Programming Act (MPL), certification is a mandatory procedure that applies to Vitally Important Operators (VOI). It helps to manage the issues and security levels for all<strong> Vitally Important Information Systems (VIIS)</strong></p>
<p>Certification is a core issue to the MPL compliance strategy, because it provides <strong>a concrete and operational means of breaking down the MPL’s requirements</strong> while reducing security risks.</p>
<p>ANSSI—The French National Cybersecurity Agency—has produced a guide that describes the key steps in certification. These steps are:</p>
<ul>
<li>Defining a certification strategy (a scoping document describing how to achieve certification)</li>
<li>Performing a risk analysis on a VIIS</li>
<li>Conducting a certification audit</li>
<li>The certification decision</li>
<li>Post-certification monitoring</li>
</ul>
<p><strong>The approval decision must be made by the Certification Authority (CA), </strong>which is the legal entity responsible for certifying VIIS. It is assisted by the Certification Commission, an internal group of experts responsible for doing the preparatory work for the certification decision.</p>
<p>The information required to make the decision is compiled in the certification file. This allows the Certification Commission to attest to the level of security and accept the residual risks. Ultimately then, it is the Certification Commission that attests to the fact that the risks are being properly managed.</p>
<h2>An approach to quickly assess existing VIIS<strong><br />
</strong></h2>
<h3>Retro-certification: how to certify VIIS already in production</h3>
<p>For existing VIIS, the certification model is different, although the objectives remain the same. An assessment of existing VIIS is the starting point for certification, and performing <strong>a dry-run audit (or using a previous audit report)</strong> serves to speed up the gathering of information and the identification of risks.</p>
<p>Conversely, the security measures have to be applied to a history that can be challenging to transpose. <strong>Compensatory measures</strong> therefore have to be identified, prioritized, and implemented.</p>
<p>This retrospective certification, or retro-certification, must enable <strong>the business to consider the risks in an exhaustive fashion, and prioritize the actions,</strong> in order to reduce them to an acceptable level by making the necessary investments.</p>
<p>While it’s important to design the certification process such that it has the capacity to process future VIIS, <strong>it is mostly for existing VIIS that VOI are actually busy with,</strong> and retro-certification is, therefore, a priority.</p>
<h3>Adopting a test &amp; learn approach</h3>
<p>In order to define and deploy a certification procedure within the framework of the MPL, VOI can <strong>define an initial pilot stage</strong> to test and refine the process before using it—at full scale—on a VIIS.</p>
<p>The objective of this pilot phase is to <strong>compare the methodology and the reality on the field</strong>, with the aim of validating the approach and the steps defined (procedures, people who need to be involved, etc.). Taking such approach highlights areas of difficulty (related to IS administration, partitioning, patch management, etc.), and enables <strong>a concrete and achievable remediation plan </strong>to be put together.</p>
<p>The choice of pilot VIIS is essential in<strong> anticipating the problems that will be encountered.</strong> It makes sense to choose a pilot VIIS that is representative of all the other VIIS (typical size, limited interactions, etc.).</p>
<h3>Demonstrating the security level generated by the MPL</h3>
<p>Among the various work streams and projects triggered by the MPL, it’s the certification program that enables <strong>security to be strengthened effectively</strong>. This can be achieved not just by <strong>highlighting</strong> security at high level both internally (with senior management and those with accountability for certification) and externally (with ANSSI and the government), but also by <strong>quantifying the degree of risk reduction</strong> required (through risk analysis) and achieved (through audit).</p>
<p>Achieving certification enables <strong>actual risks to be communicated</strong>, and <strong>the players involved</strong> to be made responsible and aware (particularly senior management—as a result of interactions with those accountable for certification).</p>
<p>All the activities undertaken for MPL compliance are compiled in a <strong>certification file,</strong> which gives them a practical reality. This includes observations about security, obstacles encountered, and an overview of the complexity involved in compliance.</p>
<p>The certification file must be made <strong>available to ANSSI.</strong> The file represents a showcase for ANSSI with respect to the VOI&#8217;s compliance with the MPL—and it pays not to cut corners! The VOI must demonstrate the gains made in security and the clear validation of the theoretical responses to compliance.</p>
<h2>Maintaining a high level of security over time<strong><br />
</strong></h2>
<h3>Creating a certification mindset</h3>
<p>Certification doesn’t end when the certification decision has been made and the system put into production. This only marks the start of the risk-management process. It’s then a question of maintaining momentum, increasing visibility, and ensuring the ongoing management of security. Certification must be renewed at least <strong>every three years,</strong> or during <strong>periods of major change to the VIIS, something that forces a reconsideration of whether the VIIS is actually secure</strong> in the way described in the risk analysis.</p>
<p>Therefore, for an existing VIIS, a process needs to be set up to monitor and identify security-related changes to it. This must be carried out in the context of an organizational structure, for example with <strong>a named person holding the responsibility to identify and assess any changes.</strong> This person, can, in particular, establish a <strong>list of key events</strong>, for example: changes to the level of exposure of the VIIS, the arrival of new Service Providers, functional developments in the VIIS, or modifications to infrastructure or operational management); these will provide a basis for assessing any requirements for the system to be overhauled.</p>
<p>The establishment of a certification governance committee ensures <strong>a degree of momentum in the certification process.</strong> Updating the methodology for integrating security into projects enables new projects to be taken into account, risk management to be applied from the beginning, and advance preparation for VIIS compliance.</p>
<h3>Providing a clear and understandable framework for application owners</h3>
<p>Application owners are key players in maintaining security and certification over time. This is not just because they have a good overview of their VIIS, but also because they are aware of developments to it. If their attitude is one of fear of the MPL, this can lead to a poor approach to security. Conversely, a <strong>good understanding of MPL issues</strong>, certification, and continuous improvement, can enhance VIIS security.</p>
<p>Special attention should be paid to <strong>supporting application owners, and raising their awareness about security</strong> in general, and the certification process in particular. To achieve a win-win approach, and improve security over time, you must bring application owners together and get their buy-in.</p>
<h2>Security certification: an approach that enhances risk management over time<strong><br />
</strong></h2>
<p>Beyond essential regulatory requirements, the MPL has to be seen as a catalyst that can <strong>enhance risk management within a VOI:</strong> from operational level, through application owners, right up to the senior management.</p>
<p>After taking the first step of overhauling and implementing risk-reduction measures on an existing VIIS, certification ensures that levels of security are maintained right across it. Given this, it’s vital that <strong>the players involved remain engaged over time</strong> to ensure that the initial momentum is maintained.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/security-certification-the-key-to-complying-with-the-french-military-programming-law-mpl/">Security certification: the key to complying with the french military programming Law (MPL)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The EU NIS directive: what are the issues and how can you prepare for it?</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/12/the-eu-nis-directive-what-are-the-issues-and-how-can-you-prepare-for-it/</link>
		
		<dc:creator><![CDATA[RomainSoul3tis]]></dc:creator>
		<pubDate>Sun, 17 Dec 2017 21:41:17 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Critical systems]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[dsp]]></category>
		<category><![CDATA[European directive]]></category>
		<category><![CDATA[législation]]></category>
		<category><![CDATA[Member States]]></category>
		<category><![CDATA[NIS]]></category>
		<category><![CDATA[OES]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[sectoral regulations]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10268/</guid>

					<description><![CDATA[<p>On July 6, 2016, the NIS (Network and Information Security) directive went into effect. With only a short time to go until the deadline for transposition (May 9, 2018), discussions about the directive  are picking up steam. But what exactly...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/12/the-eu-nis-directive-what-are-the-issues-and-how-can-you-prepare-for-it/">The EU NIS directive: what are the issues and how can you prepare for it?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>On July 6, 2016, the <strong>NIS</strong> (Network and Information Security) <strong>directive</strong> went into effect. With <strong>only a short time to go until the deadline for transposition</strong> (May 9, 2018), discussions about the directive  are picking up steam. But what exactly are the directive&#8217;s requirements?</em></p>
<h2>The NIS directive: a major piece of legislation</h2>
<p>At a national level, the directive requires the establishment of a cybersecurity strategy and the establishment of a CSIRT, along with an authority figure to oversee these matters. For companies, it introduces two new areas of responsibility for two different types of players:</p>
<ul>
<li><strong>Operators of Essential Services</strong> must implement <strong>technical and organizational measures</strong> to manage network and information system security risks</li>
<li><strong>Digital Service Providers</strong> are required to notify the appropriate authority of security incidents</li>
</ul>
<p>&nbsp;</p>
<figure id="post-10271 media-10271" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-10271" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/12/image-NIS.png" alt="" width="1059" height="390" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/12/image-NIS.png 1059w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/12/image-NIS-437x161.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/12/image-NIS-768x283.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/12/image-NIS-71x26.png 71w" sizes="auto, (max-width: 1059px) 100vw, 1059px" /></figure>
<h2>The need for a robust and standardized approach</h2>
<p>The NIS Directive is the <strong>security counterpart to the</strong> <a href="https://ec.europa.eu/commission/priorities/digital-single-market_fr"><strong>European Digital Single Market strategy,</strong></a> which was launched in 2015 and aims to turn digital systems into an engine of growth. Business and consumer trust is essential to this project: because without trust, there will be no growth!</p>
<p>European countries are becoming increasingly dependent on digital and information systems while their networks are becoming ever-more interconnected. <strong>This interconnectivity is both a strength and a weakness</strong> because an information system’s level of security is only as good as its weakest link.</p>
<p>However, there are marked differences when it comes to Member States because to date, cybersecurity issues have been handled at national level.</p>
<p>It is this inherent <strong>systemic risk</strong> that Europe is seeking to remedy with the NIS Directive, which is the first piece of European legislation to govern cybersecurity practices in a cross-sectoral manner.</p>
<p>The NIS Directive  differs from regulations designed to deal with specific issues, such as the GDPR. Though often associated with the NIS Directive, the GDPR does not have the same objectives –  its scope is solely about the protection of personal data. Conversely, the directive aims to ensure a base level of cybersecurity through the implementation of security standards and a requirement to give notice when incidents occur (whether they are personal-data related or not). Having said that, a cyber-attack often involves both areas, and it doesn’t make sense to not(?) consider the two pieces of legislation when thinking about compliance.</p>
<h2>A transposition process already in motion</h2>
<p>As the text is a directive and not a regulation, each Member State has to transpose the directive’s provisions into its own national legislative framework.</p>
<p>Many countries have already announced their first steps:</p>
<ul>
<li>The <strong>UK</strong> has confirmed that it plans to transpose the text, despite Brexit; the levels of penalties provided for in the text, <a href="https://www.gov.uk/government/news/new-fines-for-essential-service-operators-with-poor-cyber-security">which are particularly heavy</a>, have recently been announced;</li>
<li><strong>Poland</strong> has announced the opening of a new national center dedicated to cybersecurity (NC Cyber);</li>
<li><strong>Belgium</strong> has set out six flagship measures to strengthen cybersecurity: a reaction to WannaCry, a global cyber-attack that paralyzed many businesses in recent months;</li>
<li>The <strong>Czech Republic (Czehia)</strong> has amended its cybersecurity laws to take account of more critical sectors and comply with the directive’s requirements;</li>
<li><strong>Italy</strong> has revised its National Plan for Cyber Protection and Digital Security to align with the directive’s provisions;</li>
<li><strong>Croatia</strong> has set up a working group to determine how the directive will be transposed;</li>
<li><strong>Sweden</strong> has already revealed some of the details of its transposition, such as the levels of penalties and the bodies responsible for implementation.</li>
</ul>
<p>In several respects, the <strong>text is very “non-directive”</strong> –  setting out objectives but not specifying how they should be achieved. It will be up to <strong>each country to work out its own interpretation</strong> and draw up the concrete measures that will meet the objectives.</p>
<p>The challenge, therefore, is to <strong>reduce the degree of difference</strong> between European countries, while standardizing the levels of cybersecurity to a greater extent by avoiding large differences so that players operating in several countries don&#8217;t face undue complexity..</p>
<p>To achieve this goal, collaboration is taking place at the EU level:</p>
<ul>
<li>A <strong>review of the remit of ENISA </strong>(the European agency in charge of network and information security) is being considered with the aim of, among other things, giving it the powers needed to carry out directive-related activities.</li>
<li>A <strong>Cooperation Group</strong> made up of national representatives, ENISA, and the European Commission, will provide strategic direction;</li>
<li>A <strong>network of CSIRTs</strong> will also be active and able to ensure that good practice is communicated and exchanged, as well as supporting Member States on directive-related matters.</li>
</ul>
<h2>How should you prepare for the directive coming into effect ?</h2>
<p>Or, more specifically, how can you prepare for this new legislation now and what plan of action will you need to have in place? In practice, that depends on the type of entity in view (an OES or DSP).</p>
<p>For <strong>Digital Service Providers (DSPs)</strong>, a standardized approach is needed: Member States cannot impose additional security or notification requirements and, therefore, for this type of player the directive is closer to an EU regulation. This particular treatment, compared with OESs, arises from the cross-border nature of their activities and the fact that many are foreign companies without bases in Europe.  DSPs will have to appoint an entity which is based in a member state to be their official representative on NIS-related issues (as required by Article 18 of the directive). Thus, it is essential that each Member State has the same requirements, ensuring that future decisions to  enter an EU country are not influenced by uneven interpretation of these criteria.</p>
<p>The obligations for DSPs are somewhat less onerous. For example, they are obliged to notify regulator about an incident only in cases where they have access to the information needed to assess its impact against the criteria defined in the directive (Article 16).</p>
<p>It is already time for DSPs to begin the process of compliance since the implementing acts were published In August of 2016.</p>
<p>For the Operators of Essential Services (OESs) in France, there are two main scenarios.</p>
<p>First, let’s consider the <strong>operators already identified as VIOs—Vitally Important Operators—</strong>under the French Military Programming Act. For them, the issue of compliance is less significant given that the Act already introduces numerous obligations. The directive probably will not impose more onerous requirements. Some elements such as reporting may be adapted, but there are <strong>no major changes in sight</strong>.</p>
<p>However, the scope of the directive is likely to be wider than that of the Act, and some <strong>operators within the critical sectors defined by each state under the directive</strong> will need to begin complying. Member States have until November 2018 to designate operators as “OESs” based on the criteria defined in the text. This list will then be reviewed by the European Commission in May 2019.</p>
<p>Those involved will then have to ensure that they <strong>monitor legislation</strong> in order to follow developments in the transposition process, which is important because Member States have the power to impose measures that go beyond the common, base-level requirements set out in the directive.</p>
<p><em>Much of the development of the directive’s provisions must now be carried out by Member States: the specification of the security measures to be put in place, the definition of notification procedures, the penalties to be applied—not to mention the designation of critical sectors and OESs in each country.</em></p>
<p><em>The upshot of all this is a <strong>genuine renewal of the European cybersecurity legislative landscape</strong>, with the primary aim of increasing standardization of IS security levels between Member States—a process that will prove interesting to follow.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/12/the-eu-nis-directive-what-are-the-issues-and-how-can-you-prepare-for-it/">The EU NIS directive: what are the issues and how can you prepare for it?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Directive NIS : quels enjeux et comment s’y préparer ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/08/nis-comment-sy-preparer/</link>
		
		<dc:creator><![CDATA[C8ndiceDubois]]></dc:creator>
		<pubDate>Wed, 23 Aug 2017 16:09:08 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[législation]]></category>
		<category><![CDATA[NIS]]></category>
		<category><![CDATA[OSE]]></category>
		<category><![CDATA[Risque]]></category>
		<category><![CDATA[sectoral regulations]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9931/</guid>

					<description><![CDATA[<p>Le 6 juillet 2016 entrait en vigueur la directive NIS (Network and Information Security). Alors que l’on arrive à moins d’un an de la date limite pour la transposition de la directive (9 mai 2018), elle fait de plus en...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/08/nis-comment-sy-preparer/">Directive NIS : quels enjeux et comment s’y préparer ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Le 6 juillet 2016 entrait en vigueur la <strong>directive NIS</strong> (Network and Information Security). Alors que l’on arrive à <strong>moins d’un an de la date limite pour la transposition</strong> de la directive (9 mai 2018), elle fait de plus en plus parler d’elle. Mais quelles obligations cette directive introduit-elle ?</em></p>
<h2>La directive NIS : un texte majeur</h2>
<p>Au niveau national, la directive requiert notamment l’établissement d’une stratégie cybersécurité et la mise en place d’un CSIRT ainsi que d’une autorité en charge de ces sujets. Pour les entreprises, elle introduit deux volets d’obligation pour deux types d’acteurs :</p>
<ul>
<li>Les <strong>Opérateurs de Services Essentiels</strong> doivent mettre en œuvre des <strong>mesures techniques et organisationnelles</strong> pour gérer les risques menaçant la sécurité des réseaux et et des systèmes d’information</li>
<li>Les<strong> Fournisseurs de Services Numériques</strong> sont tenus de notifier les incidents de sécurité à l’autorité compétente</li>
</ul>
<figure id="post-9945 media-9945" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-9945 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/08/image-NIS.png" alt="" width="1067" height="312" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/08/image-NIS.png 1067w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/08/image-NIS-437x128.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/08/image-NIS-768x225.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/08/image-NIS-71x21.png 71w" sizes="auto, (max-width: 1067px) 100vw, 1067px" /></figure>
<figure id="post-9932 media-9932" class="align-none"></figure>
<figure id="post-9934 media-9934" class="align-none"></figure>
<h2>La nécessité d&#8217;orientations fortes et communes</h2>
<p>La directive NIS est le <strong>pendant sécurité de la <a href="https://ec.europa.eu/commission/priorities/digital-single-market_fr">stratégie européenne du Marché Unique Numérique,</a></strong> lancée en 2015, qui vise à faire du numérique un moteur de la croissance : la confiance des entreprises et des consommateurs est indispensable pour ce projet, car sans confiance, pas de croissance !</p>
<p>Les pays européens sont de plus en plus dépendants du numérique et des systèmes d’information, et leurs réseaux sont de plus en plus reliés. Et <strong>cette interconnectivité fait leur force comme leur faiblesse</strong>, puisque le niveau de sécurité d’un système d’information est équivalent à celui de son point le plus faible.</p>
<p>Or, on observe une très forte hétérogénéité entre les Etats Membres au regard de ces enjeux, étant donné que la prise en charge de la cybersécurité se faisait jusqu’ici au niveau national.</p>
<p>C’est à ce <strong>risque systémique</strong> que l’Europe cherche à remédier avec la directive NIS. Il s’agit de la première législation européenne régissant les pratiques cybersécurité de façon cross-sectorielle.</p>
<p>Elle se démarque des textes spécifiques à une problématique particulière, tels que le GDPR. Souvent associé à la directive NIS, il n’a pourtant pas les mêmes objectifs puisqu’il se concentre sur le seul périmètre de la protection des données personnelles tandis que la directive vise à assurer un certain niveau de cybersécurité via la définition de standards de sécurité et la notification des incidents (qu’ils touchent à des données personnelles ou non). Reste qu’une cyber-attaque mettra souvent en jeu les deux domaines, et qu’il fait donc sens de ne pas considérer ces deux textes séparément lors de la mise en conformité.</p>
<figure id="post-9945 media-9945" class="align-none"></figure>
<h2>Un processus de transposition déjà engagé</h2>
<p>Le texte étant une directive et non un règlement, il est nécessaire que chaque Etat Membre transpose ces orientations dans son cadre législatif national.</p>
<p>De nombreux pays ont déjà annoncé des premières mesures s’inscrivant dans le cadre de la directive :</p>
<ul>
<li>Le <strong>Royaume-Uni</strong> a confirmé son intention de transposer le texte malgré le Brexit ; le montant des pénalités prévues dans le texte vient d’être communiqué et <a href="https://www.gov.uk/government/news/new-fines-for-essential-service-operators-with-poor-cyber-security">celles-ci sont particulièrement importantes</a></li>
<li>La <strong>Pologne</strong> a annoncé l’ouverture d’un nouveau centre national dédié à la cybersécurité (NC Cyber) ;</li>
<li>La <strong>Belgique</strong> a présenté six mesures phares pour renforcer la cybersécurité, à la suite de WannaCry, cyberattaque mondiale qui a paralysé de nombreuses entreprises le mois dernier ;</li>
<li>La <strong>République Tchèque</strong> a amendé sa loi cybersécurité pour prendre un compte plus de secteurs critiques et se conformer aux exigences de la directive ;</li>
<li>L’<strong>Italie</strong> a révisé son Plan National pour la Cyber Protection et la Sécurité Digital, en accord avec les orientations données par la directive ;</li>
<li>La <strong>Croatie</strong> a mis en place un groupe de travail pour préciser les modalités de transposition de la directive ;</li>
<li>La <strong>Suède</strong> a d’ores et déjà fourni des détails sur la transposition, tels que l’ordre de grandeur des pénalités applicables, ou encore les entités responsables de la mise en œuvre.</li>
</ul>
<p>Sur un certain nombre d’aspects, le <strong>texte est très peu directif</strong> et fixe des objectifs sans imposer de moyens. Il est du ressort de <strong>chaque pays de travailler à l’interprétation</strong> et de définir des mesures plus concrètes permettant l’atteinte de ces objectifs.</p>
<p>L’enjeu est donc d’<strong>atténuer l’hétérogénéité</strong> entre les pays européens et de parvenir à lisser le niveau de cybersécurité en limitant les écarts trop importants, afin de réduire la complexité de mise en conformité pour les acteurs présents dans plusieurs pays.</p>
<p>Pour ce faire, une collaboration structurée s’organise à l’échelle de l’UE :</p>
<ul>
<li>Une <strong>révision du mandat de l’ENISA</strong>, l’agence européenne en charge de la sécurité des réseaux et de l’information, est à l’étude, avec entre autres l’objectif de lui donner la latitude nécessaire à l’accomplissement des missions relatives à la directive ;</li>
<li>Un <strong>Groupe de Coopération</strong>, composé de représentants nationaux ainsi que de l’ENISA et la Commission Européenne, donnera des orientations stratégiques ;</li>
<li>Un <strong>réseau de CSIRT</strong> s’organise aussi, et sera en mesure d’assurer la communication et l’échange de bonnes pratiques, ainsi que d’appuyer les Etats Membres pour les sujets relatifs à la directive.</li>
</ul>
<h2>Comment se préparer à l&#8217;arrivée de la directive ?</h2>
<p>Concrètement, comment anticiper dès maintenant ce nouveau texte et quel plan d’actions déployer ? Cela dépend en pratique du type de structure (OSE ou FSN).</p>
<p>Concernant les <strong>fournisseurs de service numériques (FSN)</strong>, une approche harmonisée est requise : les Etats Membres ne peuvent pas imposer d’autres exigences liées à la sécurité ou aux notifications, et en ce sens, la directive se rapproche d’un règlement pour ce type d’acteur. Cette singularité par rapport aux OSE provient du caractère transfrontalier de leurs activités et du fait que beaucoup sont des entreprises étrangères non implantées sur le territoire européen, qui devront désigner un représentant basé dans un Etat Membre pour être l’interlocuteur attitré concernant les questions liées à NIS (Article 18 de la directive). Il est donc essentiel que chaque pays impose les mêmes obligations, dans l’objectif d’éviter que le choix du pays d’implantation ne soit orienté par ce critère.</p>
<p>Les obligations pour les FSN sont d’ailleurs un peu moins contraignantes : par exemple, ils ne sont dans l’obligation de notifier un incident que s’ils ont accès aux informations nécessaires pour évaluer son impact au regard des critères définis dans la directive (Article 16).</p>
<p><strong>D’ici le 9 août prochain, la Commission Européenne publiera les actes d’exécution</strong> et il sera alors possible de commencer le processus de mise en conformité.</p>
<p>Pour les Opérateurs de Services Essentiels (OSE), en France, il y a deux principaux cas de figure.</p>
<p>D’abord, les <strong>opérateurs déjà identifiés comme OIV</strong>, opérateurs d’importance vitale, dans le cadre de la Loi de programmation militaire française (LPM). Pour eux, l’enjeu de mise en conformité est moins significatif, puisque la LPM introduit déjà de nombreuses obligations ; la directive n’en introduira probablement pas de plus exigeantes. Quelques éléments tels que le reporting pourraient être à adapter, mais il n’y a <strong>pas de changement majeur à prévoir</strong>.</p>
<p>Toutefois le périmètre de la directive est susceptible d’être plus large que celui de la LPM, et certains <strong>opérateurs des secteurs critiques définis par chaque Etat</strong> devront alors commencer leur mise en conformité. Les Etats Membres ont jusqu’à novembre 2018 pour désigner les OSEà partir des critères définis dans le texte. La liste des opérateurs désignés sera ensuite passée en revue par la Commission Européenne en mai 2019.</p>
<p>Les structures concernées devront ensuite mettre en place une <strong>veille juridique</strong> pour suivre l’évolution du processus de transposition, puisque pour les OSE, les Etats Membres sont en droit d’imposer des mesures allant au-delà du socle commun défini par la directive.</p>
<p>&nbsp;</p>
<p><em>Beaucoup de chantiers restent maintenant à mener par les Etats Membres : spécification des mesures de sécurité à mettre en place, définition des procédures de notification, sanctions applicables, sans oublier la désignation des secteurs critiques et des OES par chaque pays. </em></p>
<p><em>On assiste ainsi à un <strong>véritable renouveau du paysage législatif de la cybersécurité en Europe </strong>visant avant tout à homogénéiser le niveau de sécurité des SI entre états membres, dont il sera intéressant de suivre l’évolution.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/08/nis-comment-sy-preparer/">Directive NIS : quels enjeux et comment s’y préparer ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>L&#8217;habit ne fait pas le moine &#8211; Ou l&#8217;importance du facteur humain dans la maîtrise du risque USB</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/07/facteur-humain-maitrise-du-risque-usb/</link>
		
		<dc:creator><![CDATA[Axel Petersen]]></dc:creator>
		<pubDate>Thu, 13 Jul 2017 15:12:24 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Cyberattaque]]></category>
		<category><![CDATA[facteur humain]]></category>
		<category><![CDATA[Risk management]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9882/</guid>

					<description><![CDATA[<p>L&#8217;USB est quasiment incontournable. L&#8217;interconnexion non maîtrisée des dispositifs avec le SI est facilitée par les comportements humains. Les moyens d&#8217;attaques se perfectionnent et le risque s&#8217;accroît, notamment vis-à-vis des attaques ciblées. Une vigilance toute particulière doit être accordée à...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/07/facteur-humain-maitrise-du-risque-usb/">L&#8217;habit ne fait pas le moine &#8211; Ou l&#8217;importance du facteur humain dans la maîtrise du risque USB</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>L&#8217;USB est quasiment incontournable. L&#8217;interconnexion non maîtrisée des dispositifs avec le SI est facilitée par les comportements humains.<br />
</em><em>Les moyens d&#8217;attaques se perfectionnent et le risque s&#8217;accroît, notamment vis-à-vis des attaques ciblées.<br />
</em><em>Une vigilance toute particulière doit être accordée à son usage sur les périmètres les plus sensibles, du SI et des populations utilisatrices.<br />
</em><em>La prise en compte du facteur humain via une sensibilisation adaptée est une mesure essentielle ; les solutions techniques restent un complément d&#8217;efficacité variable.</em></p>
<p>&nbsp;</p>
<h2>L&#8217;IMPORTANCE DU FACTEUR HUMAIN</h2>
<p style="margin: 0cm; margin-bottom: .0001pt;">Selon la légende, un homme déguisé en moine pénétra sans attirer la méfiance dans une forteresse du sud-est de la France (actuel Monaco), une nuit de janvier 1297. Il put ainsi ouvrir à des soldats qui s&#8217;en emparèrent facilement. Il en va de même pour des attaques perpétrées à l&#8217;aide de dispositifs USB familiers, que l&#8217;utilisateur branche en tout confiance sur le port d&#8217;une machine.</p>
<p style="margin: 0cm; margin-bottom: .0001pt;">Une étude publiée au Blackhat USA en 2016 a montré que<b> 45% des 297 clefs USB disséminées</b> sur un campus universitaire ont été <b>connectées à des ordinateurs et leurs fichiers ouverts</b>. Cette étude illustre bien la capacité à mener des attaques efficaces via des clefs USB et pour un coût minime.</p>
<p style="margin: 0cm; margin-bottom: .0001pt;">Par ailleurs qui n&#8217;a jamais laissé un téléphone portable se recharger sur l&#8217;un des ports USB de son PC ?</p>
<p style="margin: 0cm; margin-bottom: .0001pt;">Si la connexion au réseau fait le plus souvent l&#8217;objet de nombreuses mesures de sécurité, les autres portes que constituent les ports USB font, généralement, l&#8217;objet d&#8217;une attention moindre, sur les serveurs, les postes de travail et désormais les tablettes et smartphones qui intègrent la technologie USB On-The-Go.</p>
<p style="margin: 0cm; margin-bottom: .0001pt;"><b>Les dispositifs USB sont présents partout</b>, tirant partie de l&#8217;interopérabilité de l&#8217;<b><u>U</u></b><u>niversal </u><b>S</b>erial Bus.</p>
<p>Le revers de la médaille de ce développement historique et de sa compatibilité descendante, est qu&#8217;il n&#8217;a <b>pas été techniquement conçu &#8220;security by design&#8221;</b> et que ces dispositifs offrent une large surface d&#8217;attaque.</p>
<figure id="post-9883 media-9883"><a href="https://www.youtube.com/attribution_link?a=yXIKuk59k6ynP4nP&amp;u=/watch?v%3Dyjc_xvlwMa8%26feature%3Dem-share_video_user"><img loading="lazy" decoding="async" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/07/image-1.jpg" alt="" width="320" height="180" /></a></figure>
<p><em>Figure -Vidéo illustrative de sensibilisation sur la sécurité des clefs USB</em></p>
<p>&nbsp;</p>
<h2 style="margin: 0cm; margin-bottom: .0001pt;">UN LARGE PANEL D&#8217;ATTAQUES RENDUES POSSIBLES PAR L&#8217;USAGE (PRESQUE) INCONTOURNABLE DES DISPOSITIFS USB ET AU MANQUE INTRINSÈQUE DE SÉCURITÉ DES STANDARDS HISTORIQUES</h2>
<p>Les périphériques de stockage amovibles, clefs ou disques USB, peuvent servir de vecteur à la propagation d&#8217;un code malicieux. D&#8217;autres types de périphériques USB (ex : webcam, clef 4G) peuvent également intégrer une fonction de stockage amovible, par exemple pour faciliter l&#8217;installation du pilote logiciel du périphérique.</p>
<p><strong>La</strong> <strong>provenance légitime d&#8217;une clef USB ne peut garantir entièrement son innocuité</strong>, si celle-ci a été compromise en usine ou avant l&#8217;envoi aux clients, comme cela a pu arriver récemment à un fournisseur de systèmes de stockage.</p>
<p>Par ailleurs, <strong>un périphérique USB d&#8217;apparence banale, peut avoir été reprogrammé ou modifié physiquement</strong> pour compromettre ou endommager le système sur lequel il est branché, par exemple :</p>
<ul>
<li>En se <a href="http://usbrubberducky.com">faisant passer pour <strong>un clavier</strong> et envoyer des commandes au système hôte</a>, lesquelles vont par exemple permettre sa prise de contrôle à distance. Il est à cet effet possible de reprogrammer une clef USB du commerce (voir cas d&#8217;usage illustratif dans la vidéo ci-dessus) ou d&#8217;utiliser un dispositif ayant l&#8217;apparence d&#8217;une clef USB classique ;</li>
<li>En <a href="https://samy.pl/poisontap/">se faisant passer pour <strong>une interface réseau</strong> </a>et un serveur DHCP/DNS, afin notamment d&#8217;intercepter le trafic de l&#8217;utilisateur, d&#8217;introduire des portes dérobées sur le poste de l&#8217;utilisateur, de faire exécuter par son navigateur des codes malveillants sur des sites sur lesquels il est autorisé à se connecter, voire d&#8217;exposer un  routeur interne ;</li>
<li>Pour <strong>détruire le système hôte</strong> en <a href="https://www.usbkill.com">délivrant au connecteur des tensions élevées</a>.</li>
</ul>
<p>Une clef USB peut également être utilisée pour attaquer des <a href="https://wikileaks.org/vault7/document/Emotional_Simian-v2_3-User_Guide/Emotional_Simian-v2_3-User_Guide.pdf"><strong>équipements sensibles déconnectés </strong></a>du réseau de l&#8217;entreprise, par exemple des équipements industriels, lorsque celle-ci est utilisée en &#8220;navette&#8221; avec des postes connectés internet, donc à un attaquant externe potentiel.</p>
<p>Il est également possible de tirer parti du <a href="http://cyber.bgu.ac.il/blog/can-we-rely-air-gap-secure-our-critical-systems">rayonnement électromagnétique </a>qui peut se produire au travers d&#8217;un périphérique/câble USB, d&#8217;un <strong>poste isolé de tout réseau</strong>, pour permettre à un code malicieux, introduit via le dispositif USB, d&#8217;exfiltrer des informations à quelques mètres.</p>
<p>Les attaques consécutives à la modification de périphériques USB restent encore limitées, assez ciblées et potentiellement très efficaces (ex : Stuxnet en milieu industriel). La <strong>mise au point</strong> de certaines de ces attaques est <strong>facilitée par les sources d&#8217;informations</strong>, les tutoriels et les outils librement accessibles sur Internet.</p>
<p>L&#8217;arrivée de l&#8217;<strong>USB-C</strong>, également <strong>utilisé comme alimentation électrique</strong> des nouveaux ordinateurs portables, peut contribuer à <strong>augmenter un peu plus la surface d&#8217;attaque</strong> (chargeurs, packs de batterie), tant que la compatibilité avec des standards non sécurisés devra être maintenue pour des raisons de compatibilité descendante avec les autres versions d’USB et dans l&#8217;attente de la généralisation de futurs chargeurs sécurisés.</p>
<p>&nbsp;</p>
<h2>LES CONTRE-MESURES DOIVENT ÊTRE CIBLÉES SUR LES RISQUES LES PLUS ÉLEVÉS (ET DONC ÉGALEMENT SUR L&#8217;HUMAIN)</h2>
<p>L&#8217;évaluation des risques liés aux dispositifs USB doit permettre d&#8217;identifier les périmètres du SI et les populations vers lesquels <strong>cibler en priorité les contre-mesures</strong> :</p>
<ul>
<li>Sensibilité des populations (VIP, mainteneurs, administrateurs systèmes …) ;</li>
<li>Sensibilité de l&#8217;équipement sur lequel il est possible de connecter un dispositif USB (poste utilisateur, poste sensible déconnecté du réseau, station d&#8217;administration, serveur, équipement industriel …).</li>
</ul>
<p>La connexion d&#8217;un périphérique USB à un équipement passe par un <strong>choix humain</strong>. Il est donc essentiel de <strong>sensibiliser les acteurs</strong>, <strong>y compris leur management opérationne</strong>l, par des actions classiques (supports de communication des risques et des bonnes pratiques, …) voire plus innovantes (ex : disperser des <strong>clefs USB témoins</strong> remontant une alerte une fois connectées à un poste de travail, effectuer des <strong>démonstrations</strong>, organiser des <strong>jeux de plateau</strong> pour <strong>entraîner</strong> des populations plus ciblées à évaluer certaines prises de risque, …).</p>
<p>Les contre-mesures techniques sont un complément. Leur efficacité demeure toutefois variable.</p>
<ul>
<li>Un <strong>antivirus</strong> pourra le plus souvent détecter un fichier infecté sur un périphérique de stockage USB avec la <strong>même efficacité que si ce fichier se trouvait sur un autre espace de stockage</strong>. Certains produits pourront <strong>n&#8217;autoriser la lecture du contenu d&#8217;un stockage amovible</strong>, que si celui-ci a préalablement été chiffré <strong>avec une clef</strong> permettant d&#8217;y accéder seulement depuis des postes de l&#8217;entreprise ;</li>
<li>Des équipements de <strong>&#8216;sas&#8217; de décontamination</strong> peuvent également être utilisés pour sécuriser les échanges de fichiers entre une clef USB et le SI de l&#8217;entreprise ;</li>
<li>Des solutions logicielles permettent de <strong>contrôler la connexion</strong> d&#8217;un dispositif USB à des groupes de postes ou serveurs, <strong>en fonction de caractéristiques annoncées lors de son branchement</strong>. Il s&#8217;agit du moyen le plus répandu pour maîtriser la connexion des dispositifs USB. Cependant, un dispositif USB modifié peut dans certains cas arriver à tromper cette protection logicielle ;</li>
<li>Le marché propose également des clefs USB avec un <strong>micrologiciel sécurisé</strong>, qui permettent de s&#8217;assurer que celui-ci n&#8217;a pas été reprogrammé. Néanmoins, il reste toutefois possible d&#8217;introduire dans l&#8217;entreprise des dispositifs piégés reprenant ou imitant le packaging extérieur de clefs USB sécurisées ;</li>
<li>La <strong>neutralisation ou le blocage physique des ports USB</strong>, en particulier sur les postes les plus sensibles, tels que des stations d&#8217;administration ou des stations de conduite dans le milieu industriel, reste toutefois une solution assez efficace pour des périmètres spécifiques.</li>
</ul>
<p>Nous devrons attendre encore un peu avant de pouvoir pleinement bénéficier d&#8217;une <strong>sécurité efficace portée par de nouveaux standards USB</strong>. En attendant, le parc non sécurisé et le risque s&#8217;accroissent. Pour y faire face, <strong>ne comptons pas uniquement sur des réponses techniques et ne négligeons pas le facteur humain</strong>.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/07/facteur-humain-maitrise-du-risque-usb/">L&#8217;habit ne fait pas le moine &#8211; Ou l&#8217;importance du facteur humain dans la maîtrise du risque USB</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8220;Cyber&#8221; due diligence is the new asset for business valuation</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/04/cyber-due-diligence-business-valuation/</link>
		
		<dc:creator><![CDATA[Chadi Hantouche]]></dc:creator>
		<pubDate>Thu, 20 Apr 2017 07:50:23 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyberinsurance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[due diligence]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9742/</guid>

					<description><![CDATA[<p>Theoretically, when a company is for sale, its potential buyer carries out a preliminary investigation phase to ensure that the company, as advertised in its published documents, is the same in reality. This is otherwise known as due diligence. This...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/04/cyber-due-diligence-business-valuation/">&#8220;Cyber&#8221; due diligence is the new asset for business valuation</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Theoretically, when a company is for sale, its potential buyer carries out a preliminary investigation phase to ensure that the company, as advertised in its published documents, is the same in reality. This is otherwise known as due diligence.</em></p>
<p>This can take different forms; the following aspects are usually examined:</p>
<ul>
<li><strong>Finance and accounting</strong> (auditing, personnel inventory, balance sheet and profit and loss accounts analysis, forecasted business activity, etc.)</li>
<li><strong>Legal</strong> (company statutes, proceedings in process, patent and intellectual property ownership&#8230;)</li>
<li><strong>Strategy</strong> (competitor identification, company strengths, distribution channels, etc.)</li>
</ul>
<p>Although current affairs and news offer plentiful examples of companies that have been impacted by cyberattacks, <strong>the issue of cybersecurity is all too often overlooked with regards to mergers and acquisitions</strong>.</p>
<p>But mindsets are evolving: in a recent survey conducted by Freshfields Bruckhaus Deringer, specialists in corporate law, 90% of respondents considered that a confirmed cyber-attack could lead to<strong> revise the acquisition cost downwards</strong>, and 83% of them thought that an attack during the due diligence phase could simply lead to abandon the deal.</p>
<p>Still, the cyber risk is real: as soon as two IT environments are interconnected, the resulting environment often inherits <em>de facto</em> the lowest level of security of the two. Besides, a merger or acquisition can highlight possible compliance gaps, in a context of increasing scrutiny by regulators all over the world.</p>
<h2></h2>
<h2>Is cyber-risk assessment the next pillar of M&amp;A?</h2>
<p>Increasingly aware of this risk, companies progressively integrate the notion of &#8220;cyber risk&#8221; into their reconciliation strategies. The objective is, in principle, simple: to understand whether the merger of two companies, and thus the likely merger of their Information Systems, increases cyber risk.</p>
<p>There is, however, a major difference between standard due diligence and its cybersecurity equivalent. While accounting and legal regulations are clearly understood and shared at the international level, there is as yet no equivalent in the cybersecurity world. <strong>Standards are multiplying</strong> (by system type, data to protect, industry, country&#8230;), <strong>but they only remain good practice references</strong> which indicate how to properly implement considerations around cybersecurity – not if they actually were implemented properly. There are some notable exceptions, such as PCI-DSS (protection of credit card data) certified environments, or classified, Defense-type environments. These examples, however, are specific, with very restricted scopes.</p>
<p>For the purchaser, acting in good faith and being unaware of security breaches will do nothing to prevent cyberattacks:<strong> in cyber risk, we not only endorse responsibility, but directly the risk itself!</strong></p>
<p>In the same manner, it is neither easy (yet, nor impossible) for a company to ensure that its cyber security is &#8220;good&#8221;. Managing the Information System in line with today’s best practices does not guarantee that its weaknesses will not be exploited tomorrow.</p>
<p>An M&amp;A context is not the only context of interest for examining the IS security aspects through cyber due diligence. For several years, large international insurers have launched their cyber-insurance offers. In this context, they legitimately seek to know the level of information security of companies for which they will provide insurance. At the minimum, insurers seek to know what general level of cyber-risk they will have to cover. Thus, by upstreaming this type of underwriting, cyber-insurers are now supported by IT security experts, whose role it is to carry out <em>due diligence</em> at a fairly high level.</p>
<p>&nbsp;</p>
<h2>What approach should be taken for cybersecurity due diligence ?</h2>
<p>What is security due diligence? <strong>It is neither an innovative technology nor a revolutionary method</strong>; rather it refers to the balanced and targeted use of different information security tools.</p>
<p>Several approaches are possible:</p>
<ul>
<li><strong>A &#8220;comprehensive&#8221; approach</strong>, consisting of both a theoretical and organizational analysis of security, supplemented by penetration tests to gain a vision as closely aligned to reality as possible. This approach, ideal in essence, is often used in the case of start-up buyouts. However, it is almost never used in larger deals, for reasons relating to both cost and a lack of time.</li>
<li><strong>An “interview” approach</strong>, which involves an evaluation of the situation in relation to a known and adapted reference framework during exchanges with security managers at the company in question. The limitation of this approach is that it is based only on statements and declarations. As such, it does not provide any proof of for what is being put forward. Led by a seasoned expert in this activity, this approach nonetheless facilitates a general view of the type of security practices that have been implemented.</li>
<li><strong>A “questionnaire” approach</strong> is offered as a matter of dealing with answers to a series of questions, usually with multiple choice answers. Beyond the lack of depth of such an approach, its outcome strongly depends on the respondents of the questionnaire, and the manner in which the questionnaire is used. Unfortunately, it is often the case that it is barely read or referenced.</li>
</ul>
<p>Irrespective of the chosen approach, it can be rolled-out at two stages: an initial analysis to <strong>provide knowledge and understanding of the security risks</strong>, which must feed directly into the “<strong>go / nogo</strong>” considerations behind the deal. A possible second step involves more detailed analysis for a more precise evaluation of risk(s) in order to <strong>determine the corrective actions</strong>.</p>
<p>&nbsp;</p>
<h2>Cyber due diligence as an input for valuation</h2>
<p>Whether it is for acquiring a company or assessing the risk taken by cyber insurers, due diligence must serve as a platform for encouraging further reflection on the<strong> feasibility of a deal</strong>.</p>
<p>It must also constitute an element of added value for the company, to the extent that conforming to and respecting market best practices can prove to be <strong>costly</strong>.</p>
<p>Finally, cyber due diligence helps to <strong>identify the regulatory aspects that must be respected</strong>, such as laws affecting Critical Information Infrastructures (USA PCII Program, China’s Cyber Security Law, France’s “LPM”, Singapore’s upcoming New Cybersecurity Act…) and which may require a certain number of adaptations foreseen on the Information System of the company for sale, and / or the purchaser.</p>
<p>Have we ever seen a cybersecurity due diligence lead to the abandonment of a company purchase? Not publicly. We rather witness the rapid correction of the most serious identified vulnerabilities, or sometimes a decision to not connect certain components of the Information Systems.</p>
<p>Will cybersecurity due diligence have any real impact on transactions? To this question, Verizon provided a response with a figure: in February 2017, the operator decreased its offer to purchase Yahoo by US$350 million. This corresponds to more than 7% of the value (US$4.8 billion) initially offered.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/04/cyber-due-diligence-business-valuation/">&#8220;Cyber&#8221; due diligence is the new asset for business valuation</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quels risques pour la transformation numérique ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/06/risques-transformation-numerique/</link>
		
		<dc:creator><![CDATA[m@THIEU]]></dc:creator>
		<pubDate>Wed, 22 Jun 2016 16:19:37 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[Risk management]]></category>
		<category><![CDATA[Risque]]></category>
		<category><![CDATA[stratégie]]></category>
		<guid isPermaLink="false">https://www.solucominsight.fr/?p=9058</guid>

					<description><![CDATA[<p>Depuis plusieurs années les entreprises se sont tournées vers la transformation numérique de leurs processus. Comme le montre certains palmarès récents, cette transformation est devenue un enjeu fort pour les entreprises afin de gagner en agilité et en compétitivité auprès...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/06/risques-transformation-numerique/">Quels risques pour la transformation numérique ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Depuis plusieurs années les entreprises se sont tournées vers la transformation numérique de leurs processus. Comme le montre </em><a href="http://business.lesechos.fr/directions-numeriques/digital/transformation-digitale/021399853503-exclusif-le-classement-des-entreprises-du-cac-40-les-plus-numeriques-203700.php"><em>certains palmarès récents</em></a><em>, cette transformation est devenue un enjeu fort pour les entreprises afin de gagner en agilité et en compétitivité auprès des clients et des collaborateurs. Toutefois, comme tout changement majeur, elle est porteuse de risques qu’il s’avère nécessaire d’appréhender afin de limiter les impacts sur l’organisation.</em></p>
<h1>La transformation numérique : entre enjeu stratégique et menaces</h1>
<p>La transformation numérique actuelle des entreprises se manifeste par une concentration et une circulation accrue de données. Ces dernières sont de plus en plus <strong>manipulées par des systèmes généralement non maîtrisés de bout en bout</strong> (big data, cloud, réseau social d’entreprise, etc.). Cette transformation numérique s’inscrit de plus dans un contexte d’allongement de la chaîne de prestataires et de partenaires (<a href="http://www.insurancespeaker-solucom.fr/2015/11/5240/">entreprise étendue</a>), d’une mobilité et d’usages facilités (BYOD) et d’une attente forte d’immédiateté et de disponibilité de la part des clients et des collaborateurs. Concrètement cela engendre la <strong>mise en place d’outils transverses</strong> permettant de répondre à des enjeux d’agilité et de collaboration en cassant les silos entre les entités, mais avec des collaborateurs ou des clients peu formés aux nouveaux usages apportés.</p>
<p>Cette évolution rapide à laquelle <a href="https://www.solucominsight.fr/2015/01/transformation-numerique-la-banque-traditionnelle-en-peril/">aucun secteur d’activité n’échappe</a>, entraine des risques qu’ils s’avèrent nécessaire d’identifier et de maitriser. Ces risques, loin d’être limités aux systèmes d’information, sont éminemment <strong>transverses et représentatifs de l’interconnexion existante entre les différents métiers</strong>.</p>
<p>Dans ce contexte, l’enjeu pour les directions en charge des risques (Juridique, Conformité, Risque, Contrôle Interne, Sécurité IT et Audit, etc.) est d’évaluer les risques liés à la transformation numérique et de garantir la continuité, la disponibilité ainsi que la protection des données et des applications.</p>
<h1>La transformation numérique : révélateur et catalyseur des risques</h1>
<p>La transformation numérique <strong>ne va pas générer de nouveaux risques mais va agir comme un catalyseur des problématiques déjà existantes</strong>. En effet, un tel programme va nécessiter de prendre en compte les besoins des métiers et de regarder les impacts potentiels (outils, processus métiers, etc.). Une lecture par les risques va permettre de faire resurgir toutes les problématiques et de réévaluer les risques et les dispositifs de couverture à la lumière du nouveau contexte.</p>
<p>L’identification des risques doit être accompagnée par la réalisation d’une cartographie des risques afin d’y intégrer les différentes problématiques concernées. En d’autres termes cela revient à regarder l’ensemble des risques qui pèsent sur la « donnée » dans ce nouveau contexte : compliance/juridique, sécurité, RH. À cela, peuvent également s’ajouter des risques d’image ou liés à la gouvernance.</p>
<p>Trois typologies de risques doivent être regardées avec une attention toute particulière :</p>
<h2>Les risques réglementaires : l’identification des contraintes réglementaires sur la donnée</h2>
<p>Depuis plusieurs années, les régulateurs ont commencé à s’intéresser à la manière dont les entreprises manipulent et sécurisent les données, ce qui a eu pour conséquence un renforcement croissant des contraintes réglementaires autour de ce sujet : <a href="https://www.solucominsight.fr/2015/09/nouveau-reglement-europeen-sur-la-protection-des-donnees-personnelles-anticiper-les-3-impacts-majeurs/">nouveau règlement européen</a>, <a href="http://www.silicon.fr/stockage-donnees-personnelles-russie-priorite-dsi-124232.html">durcissement du droit Russe</a>, etc.</p>
<p>Compte tenu de cet environnement, les entreprises doivent identifier les <strong>réglementations auxquelles elles sont assujetties</strong>, les contraintes potentielles qu’elles peuvent générer et qui éventuellement ne sont pas respectées (partage de données bancaires ou de données industrielles hors du pays propriétaire, partage non encadré de données à caractère personnel hors de l’Union Européenne, etc.).</p>
<p>Une fois les contraintes identifiées, il est nécessaire de mettre en place les dispositifs adéquats pour y répondre : par exemple les <em>Binding Corporate Rules</em> (BCR) qui assurent une protection et une manipulation conforme des données à caractère personnel.</p>
<h2>Les risques de sécurité SI : la sécurisation des données et des outils</h2>
<p>Dans un monde digitalisé, les données peuvent être volatiles passant d’un outil à un autre facilement (emails, outils collaboratifs, applications mobiles, etc.). Il est donc nécessaire de formaliser un cadre clair (principes, règles, etc.) pour sécuriser l’information de bout en bout.</p>
<p>Au-delà du volet organisationnel et fonctionnel, il est également important de prendre en compte les contraintes d’architecture des systèmes d’information afin d’être en adéquation avec les enjeux de sécurisation (serveurs locaux, synchronisation ou non des données, enregistrement de population, etc.).</p>
<h2>Les risques liés à la « conduite du changement » : l’évolution des dispositifs RH</h2>
<p>La conduite du changement ne doit pas être limitée à la sensibilisation des collaborateurs sur les nouveaux outils ou les nouvelles modalités de travail. En effet, la transformation numérique peut avoir un impact profond sur le fonctionnement même d’une entreprise (management 2.0, mobilité, télétravail, Flex office, etc.). Il convient donc d’adapter les dispositifs RH existants et d’accompagner le collaborateur.</p>
<p>Par conséquent, un travail de formation et de sensibilisation doit être mené d’une part auprès des collaborateurs et des managers, mais également auprès des instances représentatives du personnel en les impliquant dès le départ dans le projet.</p>
<h1>Traitement des risques liés à la transformation numérique : adopter une approche collaborative</h1>
<p>Les risques liés à la transformation numérique embarquent une transversalité qui peut entrainer une difficulté lors de l’identification des porteurs et des actions à réaliser pour traiter lesdits risques. Cette difficulté est due à un périmètre des risques très large qui peut s’étendre sur plusieurs métiers ou sur plusieurs fonctions risques. Ainsi, il est nécessaire d’organiser une collaboration entre tous les acteurs pour prendre en compte cette transversalité et pour s’assurer <em>in fine </em>qu’il ne réside pas de zones de vulnérabilités pouvant être exploitées (cyber-attaque, fraude, indisponibilité, non-respect de la réglementation, etc.).</p>
<p>Cette collaboration doit être organisée à l’aide de quatre principes structurants :</p>
<ul>
<li><strong>S’appuyer sur les programmes de transformation pour lancer les travaux sur les risques</strong>. En effet, les différents acteurs à mobiliser ont souvent peu l’habitude de travailler ensemble. Le « prétexte » d’un programme sur un sujet d’actualité doit permettre de créer une véritable dynamique,</li>
</ul>
<ul>
<li><strong>Réunir une équipe pluridisciplinaire</strong> composée de différentes fonctions et domaines d’expertises afin de confronter l’ensemble des points de vue,</li>
</ul>
<ul>
<li><strong>Accepter la remise en cause des dispositifs existants</strong>. La transformation numérique peut entrainer de profondes modifications dans l’organisation de l’entreprise, par conséquent, il peut également s’avérer nécessaire de faire évoluer le cadre normatif (dispositif de contrôle interne, nouvelles règles de gestion, etc.),</li>
</ul>
<ul>
<li><strong>Mettre en place une instance transverse</strong> afin de partager les avancements sur les travaux et disposer d’un niveau de validation nécessaire pour entériner les productions.</li>
</ul>
<p>&nbsp;</p>
<p><em>Aujourd’hui les entreprises s’appuient sur de nombreux référentiels pour aider l’identification et le traitement des risques (méthodologies internes, ISO 27005, ISO 31000, etc.).  Toutefois, le nouveau cadre que vient imposer la transformation numérique montre les limites de ces modèles qui ne prennent pas ou peu en compte la transversalité et les nouvelles connexions entre les métiers et les technologies. L’un des objectifs à venir pour les acteurs de la maitrise des risques est de faire évoluer rapidement les dispositifs et méthodologies existants afin de faire face à ces nouveaux enjeux. </em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/06/risques-transformation-numerique/">Quels risques pour la transformation numérique ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Big data dans l&#8217;Assurance : gérer les risques liés aux données manipulées</title>
		<link>https://www.riskinsight-wavestone.com/en/2015/11/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees/</link>
		
		<dc:creator><![CDATA[Laurence Al Neimi]]></dc:creator>
		<pubDate>Mon, 09 Nov 2015 15:00:14 +0000</pubDate>
				<category><![CDATA[Métiers - Assurance]]></category>
		<category><![CDATA[Métiers - Digital & innovation]]></category>
		<category><![CDATA[assurance]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=8505</guid>

					<description><![CDATA[<p>Initier un projet Big data, c’est se poser la question de nouvelles données à collecter, stocker et manipuler pour de nouveaux usages. Autant de besoins qui font peser des risques sur les données concernées et la conformité vis- à-vis des...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/11/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees/">Big data dans l&#8217;Assurance : gérer les risques liés aux données manipulées</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Initier un projet Big data, c’est se poser la question de nouvelles données à collecter, stocker et manipuler pour de nouveaux usages. Autant de besoins qui font peser des risques sur les données concernées et la conformité vis- à-vis des lois de protection des données à caractère personnel.</p>
<h2>Données personnelles : le cadre réglementaire</h2>
<p>Un cadre légal existe déjà et repose sur la Loi informatique et libertés du 6 janvier 1978, plus particulièrement l’article 34 qui impose aux responsables de traitement de « prendre toutes les précautions utiles, au regard de la nature des données et des risques présentés par le traitement, pour préserver la sécurité des données ».</p>
<p>Ce cadre est en évolution. Un projet de règlement européen sur la protection des données devrait aboutir fin 2015, remettant au goût du jour la Directive européenne 95 / 46 relative à la protection des données.</p>
<p>Ces textes sont complétés par des réflexions du G29, groupe de travail des CNIL européennes émettant des opinions sur l’approche par les risques (Article 29 Data Protection Working Party).</p>
<p>Les principes de collecte, transmission, hébergement et traitement des données personnelles doivent suivre des exigences de protection légale très strictes : recueillir le consentement explicite; informer sur la finalité ; collecter uniquement les données liées et nécessaires à cette finalité ; détruire les données une fois la finalité atteinte ; respecter les droits à l’accès, la rectification et la suppression de ces données ; sécuriser la collecte, le transfert, l’hébergement et le traitement des données ; effectuer le traitement de façon loyale et licite.</p>
<p>Ceci donne un cadre légal aux démarches Big data avec un processus d’amélioration continue qui requiert parfois plusieurs itérations pour parvenir à un dispositif de protection de la vie privée acceptable. Il exige en outre une surveillance des évolutions dans le temps et des mises à jour régulières.</p>
<p>Pour faciliter la mise en œuvre concrète de ce cadre juridique, la CNIL a publié le 2 juillet 2015 une méthode pour mener une étude d’impacts sur la vie privée (EIVP). L’objectif est d’aider les responsables de traitement dans leur démarche de conformité, de leur permettre de justifier les mesures choisies et de montrer que les solutions ne portent pas atteinte à la vie privée.</p>
<p>Cette méthode est complétée par un guide d’outillage et par un guide de bonnes pratiques. Cette démarche de conformité se déroule en 4 étapes : délimitation et description du contexte du traitement considéré et de ses enjeux ; identification des mesures existantes ou prévues pour respecter les exigences légales et traiter les risques sur la vie privée de manière proportionnée ; appréciation des risques sur la vie privée pour vérifier qu’ils sont convenablement traités; décision de valider la manière dont il est prévu de respecter les principes de protection de la vie privée et de traiter les risques, ou bien de réviser les étapes précédentes.</p>
<h3>L&#8217;accès aux données de Santé</h3>
<p>L’article 47 du projet de loi de Santé de Marisol Touraine a été adopté par les députés le 11 septembre 2015. Il prévoit la création d’un système national des données de santé (SNDS), grande base de données médicales centralisées accessible au public, afin de faciliter l’accès aux données médicales issues des divers organismes du secteur.</p>
<p>Suivant l’avis favorable de la CNIL à la création d’un numéro d’identification unique, condition sine qua non de la création d’une plateforme numérique unique, le Numéro d’Inscription au Répertoire National (NIR), plus communément appelé numéro de sécurité sociale, deviendra l’identifiant unique de santé.</p>
<p>Pour protéger la vie privée des patients et le secret médical, qui reste la principale critique apportée par le Syndicat des Médecins Libéraux à cet article, de nombreuses garanties ont été apportées par le législateur :</p>
<ul style="list-style-type: disc;">
<li>Open data : les données agrégées et anonymisées ne contenant « ni les noms et prénoms des personnes, ni leur numéro d’inscription au répertoire national d’identification des personnes physiques, ni leur adresse » seront accessibles à tous, gratuitement et sans restriction. La réutilisation de ces données sera autorisée si elle n’a « ni pour objet, ni pour effet, d’identifier les personnes concernées ».</li>
<li>Données personnelles : les données rendant l’identification possible seront détenues par une structure distincte et ne pourront être utilisées que sur autorisation de la CNIL et de l’Institut National des Données de Santé (INDS) à des fins de recherche ou d’étude pour l’accomplissement de missions poursuivant un motif d’intérêt public uniquement. L’article 47 interdit expressément l’utilisation de ces données à des fins commerciales ou d’évolution des primes et contrats d’assurance.</li>
</ul>
<p>En leur permettant d’analyser une population donnée, le Big data dans le domaine de la Santé permettrait aux médecins d’améliorer leurs pratiques de prévention et de soin en matière de maladies chroniques, ainsi que leur connaissance de maladies rares et / ou orphelines. Cependant, selon un sondage Odexa paru le 19 janvier 2015, un médecin sur deux considère que l’utilisation de la santé connectée menace le secret médical et 1/4 à 1/3 d’entre eux qu’elle porte atteinte à la liberté des patients. En effet, à l’heure actuelle, la donnée de santé est qualifiée de « sensible » par la loi « Informatique et libertés » et est par conséquent très protégée. Mais, bien qu’un projet de règlement européen prenant position sur le sujet soit en cours de rédaction, les données de santé et les données de bien-être ne sont toujours pas juridiquement différenciables. Or, si l’on prend l’exemple du « quantified self », les agissements de l’utilisateur sont enregistrés et peuvent être utilisés. Cette limite doit donc être clarifiée pour lever les réticences des médecins.</p>
<h2>Un contrat de confiance pour anticiper les craintes</h2>
<p>Citoyens et autorités de régulation des données à caractère personnel expriment des craintes régulièrement relayées par les médias. Maîtriser les risques autour du Big data revient à anticiper ces craintes en communiquant : sur les usages envisagés, la proposition de valeur au regard de ce partage de données, les compétences des équipes en charge des technologies concernées et les mesures de sécurité permettant de garantir la protection des données manipulées.</p>
<p>Il faut donner à l’assuré la maîtrise de ses données personnelles, l’informer sur celles qui seront collectées et l’usage qui en sera fait. Il convient ensuite de lui laisser la possibilité d’arbitrer en permanence sur le partage de celles-ci. Les informations demandées doivent être nécessaires à la réalisation de la finalité. L’objet est d’obtenir un consentement, puis détruire les données brutes pour ne conserver que la finalité. Il est également envisageable de se limiter aux données anonymisées qui s’avèrent suffisantes dans de nombreux cas. Enfin, un rapport de proportionnalité est impératif : le service proposé grâce à ces données partagées doit être à la hauteur du niveau d’intrusion ressenti.</p>
<p>Ce contrat de confiance pourrait être « géré » via l’espace client / adhérent, donnant à ce dernier la possibilité d’exprimer explicitement son accord ou désaccord avec un historique des décisions.</p>
<p>Tout cela permettra de gagner la confiance du client, de mieux le connaître et de passer du diagnostic à une position prescriptive.</p>
<p>La transparence sur les données utilisées ne fera pas entrave aux secrets de fabrication qui se logent de manière plus structurante sur les algorithmes et sur le volume de données manipulées</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/11/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees/">Big data dans l&#8217;Assurance : gérer les risques liés aux données manipulées</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersécurité dans l’aérien : pirater un avion, c’est possible ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2015/09/cybersecurite-dans-laerien-pirater-un-avion-cest-possible/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Thu, 17 Sep 2015 10:00:12 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[Métiers - Transport]]></category>
		<category><![CDATA[Cyberattaque]]></category>
		<category><![CDATA[manuf & industry 4.0]]></category>
		<category><![CDATA[piratage]]></category>
		<category><![CDATA[Risque]]></category>
		<category><![CDATA[transport]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=8265</guid>

					<description><![CDATA[<p>Nous avons vu dans notre précédent article que les risques de piratage des systèmes de contrôle au sol étaient bien réels et pouvaient potentiellement immobiliser une flotte de plusieurs dizaines d’avions pendant plusieurs heures. Mais il existe d’autres manières de...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/09/cybersecurite-dans-laerien-pirater-un-avion-cest-possible/">Cybersécurité dans l’aérien : pirater un avion, c’est possible ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Nous avons vu dans notre <a href="http://www.solucominsight.fr/2015/09/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien/" target="_blank" rel="noopener noreferrer">précédent article</a> que les risques de piratage des systèmes de contrôle au sol étaient bien réels et pouvaient potentiellement immobiliser une flotte de plusieurs dizaines d’avions pendant plusieurs heures. Mais il existe d’autres manières de pirater un avion. Ainsi, en avril dernier, le consultant en cybersécurité Chris Roberts a publié sur Twitter qu’il était <a href="http://aptn.ca/news/2015/05/15/hacker-told-f-b-made-plane-fly-sideways-cracking-entertainment-system/">parvenu à s’introduire dans le système de navigation et de sécurité</a> d’un avion alors qu’il se trouvait à bord.</p>
<p>Il ne s’agit pas de la seule méthode qui peut être imaginée pour pirater un avion, et la maintenance au sol peut aussi être un moment de choix pour s’infiltrer dans le système informatique d’un avion.<br />
Quels sont les risques et comment s’en prémunir ?</p>
<h2>Piratage d’un avion depuis le siège passager : un scénario probable ?</h2>
<p>Si le récit fait par Chris Roberts a rendu <a href="https://lejournal.cnrs.fr/articles/y-a-t-il-un-pirate-dans-lavion">quelques experts dubitatifs</a>, le FBI prend la menace très au sérieux. En effet, l’événement a suscité l’ouverture d’un mandat d’investigation. Celui-ci a révélé que le matériel saisi à sa descente d’avion par le bureau fédéral se composait notamment d’un câble réseau modifié qui lui aurait permis de connecter son ordinateur au système.</p>
<h3>Quelle réalité du risque ?</h3>
<p>L’utilisation de plus en plus courante de technologies standardisées ou universelles (type port Ethernet) à la différence des particularités de la construction aéronautique conduit à faciliter les cyberattaques puisqu’elles nécessitent moins de connaissances spécifiques à l’aviation.</p>
<p>En raison de l’utilisation de réseaux multiplexés, des passerelles existent entre le système destiné aux passagers et le système avionique qui permet de contrôler l’avion (navigation, communication, pilote automatique…).</p>
<h3>Quels scenarii de risque ?</h3>
<p>Plusieurs scenarii peuvent être imaginés à partir de ces risques d’intrusion. En effet, le piratage des outils informatiques des autres passagers par le biais du WiFi ou d’un câble Ethernet branché sur le système ouvert est une possibilité. Il serait également possible d’accéder aux informations de communication de l’avion pour diffuser de faux messages sur les écrans des passagers afin de créer des mouvements de panique.</p>
<p>Mais on pourrait également imaginer des injections de logiciels malveillants, des actions sur des systèmes critiques (désactivation ou activation d’équipements de sécurité…).</p>
<h2>Maintenance au sol : des avions connectés par 3G ou Wi-Fi</h2>
<p>Aujourd’hui, les opérations de maintenance logicielle sur les avions les plus modernes (B787, A380 et A350) peuvent être réalisées à distance. Elles nécessitent une suite logicielle sol, développée par le constructeur, déployée dans la zone de confiance de la compagnie. Ce système sol communique avec l’appareil, lorsqu’il est au sol uniquement, par une connexion 3G ou Wi-Fi avec l’avion afin d’opérer diverses opérations de maintenance informatique. La chaîne de liaison se veut très sécurisée : infrastructure d’authentification en partie cloisonnée, lien VPN, signature de tous les composants. Néanmoins, elle constitue une faille potentielle supplémentaire d’intrusion et de corruption du système.</p>
<h3>Quels risques peuvent être identifiés ?</h3>
<p>Dans ce cas de figure, le risque de sabotage est prépondérant. Les fonctions avioniques critiques ont peu de chances d’être touchées. Mais des données EFB erronées donneraient déjà des sueurs froides aux pilotes. Les EFB (Electronic Flight Bag) sont des équipements d’aide au vol (carte, approche d’aéroport, procédures…). Une intervention frauduleuse sur ces données semble alors plus probable par une corruption du système que par une attaque directe de l’avion. En effet, elle ne permettrait pas de contourner les mécanismes de signature électronique. Néanmoins, elle est loin d’être infaillible. En effet, de nombreuses attaques reposent désormais sur du vol de certificats, voire des attaques par rebond visant déjà l’émetteur des certificats afin de produire des certificats falsifiés, qui permettent par la suite de conduire l’attaque finale.</p>
<h3>Comment atténuer les risques ?</h3>
<p>Face à la multiplication des cyberattaques, une coordination européenne est nécessaire pour mettre à jour les mécanismes de sécurité. Elle permettrait d’assurer leur bon déroulement, afin de tenir compte des attaques et des failles les plus récentes. Elle développerait également davantage la certification des systèmes au sol comme à bord. Ces opérations sont potentiellement complexes dans le monde de l’aérien avec les principes de certification des équipements.</p>
<p>La mise en place d’une évaluation du risque selon une approche holistique, qui prendrait en compte tous les cas de figure possibles (risques internes et externes à l’entreprise), permettrait une meilleure identification des acteurs se connectant aux systèmes impliqués dans le fonctionnement de l’aviation civile.</p>
<p><a href="http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/">Les récentes annonces</a> sur la sécurité des automobiles connectées montrent que les problèmes de cybersécurité sont de plus en plus prégnants dans les systèmes embarqués, quel que soit le secteur d’activité !</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/09/cybersecurite-dans-laerien-pirater-un-avion-cest-possible/">Cybersécurité dans l’aérien : pirater un avion, c’est possible ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Passage au protocole IP : quelles conséquences pour la cybersécurité dans l’espace aérien ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2015/09/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien/</link>
		
		<dc:creator><![CDATA[anne cecile klein]]></dc:creator>
		<pubDate>Mon, 14 Sep 2015 15:01:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[Métiers - Transport]]></category>
		<category><![CDATA[Cyberattaque]]></category>
		<category><![CDATA[manuf & industry 4.0]]></category>
		<category><![CDATA[piratage]]></category>
		<category><![CDATA[Risque]]></category>
		<category><![CDATA[transport]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=8250</guid>

					<description><![CDATA[<p>Le 21 juin dernier, la compagnie LOT était victime d’une attaque sur son système d’opérations au sol, clouant ainsi sur le tarmac une vingtaine d’avions pendant plusieurs heures. Quelques mois auparavant, un rapport du GAO, l’équivalent américain de la Cour...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/09/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien/">Passage au protocole IP : quelles conséquences pour la cybersécurité dans l’espace aérien ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="Tableau">Le 21 juin dernier, la compagnie LOT était <a href="http://www.lemonde.fr/pixels/article/2015/06/22/des-avions-cloues-au-sol-a-l-aeroport-de-varsovie-en-raison-d-une-attaque-informatique_4659146_4408996.html#mf_sid=1198790490" target="_blank" rel="noopener noreferrer">victime d’une attaque</a> sur son système d’opérations au sol, clouant ainsi sur le tarmac une vingtaine d’avions pendant plusieurs heures. Quelques mois auparavant, <a href="http://www.gao.gov/products/GAO-15-221">un rapport du GAO</a>, l’équivalent américain de la Cour des Comptes, publiait un rapport pointant du doigt les faiblesses du contrôle aérien en matière de sécurité. Cette exploitation de la vulnérabilité des systèmes alerte les prestataires de services de la navigation aérienne, les compagnies aériennes et les autorités publiques, alors même que les standards d’échange de données sont en pleine mutation.</p>
<p class="Tableau">Quels sont les risques de ces évolutions dans l’environnement aérien ? Comment s’en prémunir ?</p>
<h1>Pourquoi le passage au protocole IP</h1>
<p>Le protocole IP va devenir le standard général d’échange de données pour le contrôle aérien, dans le but de mettre en place un système de communication performant entre le sol et l’avion, ainsi qu’entre les avions eux-mêmes.</p>
<p>Les avions, naviguant désormais très précisément, peuvent ainsi négocier des ajustements de trajectoire en permanence. À terme, l’usage du protocole IP et des moyens de navigation satellitaires permettront de fluidifier le trafic aérien et d’améliorer la performance de l’espace aérien. Cette nouvelle génération de gestion du trafic aérien est mise en place aux États-Unis (programme <em>NextGen</em>) comme en Europe (<a href="http://www.sesarju.eu/newsroom/all-news/study-launched-address-cyber-security-sesar">programme SESAR</a> &#8211; <em>Single European Sky Air Traffic Management Research</em>).</p>
<p>De nombreux acteurs seront connectés en même temps par le biais du système de gestion des données au sol SWIM (<em>System Wide Information Management). </em>Ce système permet de connecter de nombreux services comme la météo, le contrôle aérien, ainsi que différentes informations transmises par les compagnies aériennes et les aéroports.</p>
<h1>À quels risques doit faire face l’environnement aérien ?</h1>
<p>L’augmentation de la connectivité entre les différents systèmes d’information multiplie donc les possibles points d’entrée pour une attaque informatique. Des vulnérabilités nouvelles sont à prendre en compte, notamment par l’attaque des points les plus faibles comme les systèmes d’information des compagnies aériennes qui sont, par nature, plus ouverts vers le monde extérieur. Même si des systèmes de protection peuvent être mis en place pour protéger les différents SI communicant entre eux, la découverte et l’exploitation d’une faille n’est jamais qu’une question de temps.</p>
<p>Par ailleurs, les aéronefs communiquent sur le réseau hertzien, notamment avec des liaisons de données non cryptées (ADS-B &#8211; <em>Automatic Dependent Surveillance Broadcast</em>). Il est donc possible de capter des données en mode lecture en se connectant à la bonne fréquence et, par exemple, de géolocaliser des avions facilement. C’est ce que font certains sites internet comme <a href="http://www.flightradar24.com">flightradar24</a> qui présente une carte des avions en temps réel.</p>
<p>Des attaques par déni de service ou dans l’objectif de déstructurer le système afin de provoquer une crise de confiance (forcer l’envoi de fausses informations) sont donc plausibles. Elles pourraient rendre des centres de contrôles, et donc des espaces aériens entiers, inopérants pour des durées potentiellement longues comme dans le cas des avions de LOT.</p>
<h1>Face aux diverses menaces, comment réagir ?</h1>
<p>Le rapport du GAO est un signal d’alerte pour les problématiques similaires que peut rencontrer l’Europe notamment avec le programme SESAR. Il est nécessaire de réestimer les programmes en cours à l’aune de la cybersécurité. Une plus grande coordination à l’échelle européenne permettrait de prendre conscience d’un plus grand nombre de risques et de mettre en place des mesures de protection appropriées.</p>
<p>Le développement d’un domaine réglementaire fixant clairement les dispositifs de gouvernance et dont les rôles de chacun permettraient également de coordonner les efforts de chaque acteur afin d’éviter les redondances ou les impasses sur certains sujets de sécurité.</p>
<p>Toutes ces thématiques sont actuellement un sujet d’intérêt pour nombre d’autorités européennes comme en témoignent l’étude lancée par la SESAR <em>Joint Undertaking</em> en mai 2014 et la conférence  organisée par l’EASA (<em>European Aviation Safety Agency</em>) sur la cybersécurité pour l’aérien en mai dernier. À l’échelle de la France, des groupes de travail existent sur ces sujets au niveau de l’ANSSI et de la DGAC.</p>
<p>Les risques sont donc connus, les acteurs identifiés, il faut maintenant aller vite et bien accompagner les acteurs qui conçoivent les systèmes pour éviter l’apparition de dispositifs vulnérables qui ne pourraient pas, notamment, être mis à jour en cas d’apparition de nouvelles menaces !</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/09/passage-au-protocoleip-quelles-consequences-pour-la-cybersecurite-dans-lespace-aerien/">Passage au protocole IP : quelles conséquences pour la cybersécurité dans l’espace aérien ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Les exercices de gestion de crise : pourquoi, pour qui, comment ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2015/07/les-exercices-de-gestion-de-crise-pourquoi-pour-qui-comment/</link>
		
		<dc:creator><![CDATA[Thomas Pierret]]></dc:creator>
		<pubDate>Mon, 27 Jul 2015 06:00:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Métiers - Banque]]></category>
		<category><![CDATA[Banque]]></category>
		<category><![CDATA[crise]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=8018</guid>

					<description><![CDATA[<p>De nos jours et plus que jamais, les organisations sont exposées à de multiples facteurs de risques aussi bien exogènes qu’endogènes. Les événements récents nous montrent à quel point le pilotage des crises est à la fois sensible et complexe...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/07/les-exercices-de-gestion-de-crise-pourquoi-pour-qui-comment/">Les exercices de gestion de crise : pourquoi, pour qui, comment ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>De nos jours et plus que jamais, les organisations sont exposées à de multiples facteurs de risques aussi bien exogènes qu’endogènes. Les événements récents nous montrent à quel point le pilotage des crises est à la fois sensible et complexe et peut impacter durablement l’image et les actifs d’une entité. Parce que l’actualité nous le rappelle constamment et parce que non, cela n’arrive pas qu’aux autres : s’entraîner à gérer une crise n’est plus une opportunité mais une nécessité !</em></p>
<p>La notion de « crise » est perçue, dans nos sociétés modernes actuelles, de manière assez hétérogène, ce qui induit une certaine difficulté à en définir les contours précis. En effet, le terme de crise (économique, sociale, ou encore de réputation) est abondamment employé et ce, dans tous types de situations ou d’événements qui sont notamment relayés à la une des médias.</p>
<p><a href="http://fr.wikipedia.org/wiki/%C3%89tymologie">Étymologiquement</a> parlant, le mot crise -issu du grec « Κρίσις »- associe les sens de « jugement » et de « décision » mis en œuvre pour dégager une décision entre plusieurs positions ou tendances opposées sinon conflictuelles.</p>
<p>Il s’agit bien ici d’exercer et donc d’entraîner une organisation à faire face à un ou plusieurs événements majeurs (quelles qu’en soient l’origine ou la nature – soudaine ou progressive), ayant des impacts considérables sur son fonctionnement et pouvant potentiellement mettre en péril ses ressources et donc ses actifs.</p>
<h2>Pourquoi réaliser des exercices de gestion de crise ?</h2>
<p>Avant tout parce qu’il s’agit du seul moyen tangible de s’assurer que les dispositifs mis en place sont opérationnels et en mesure de faire face à tous types de situations de crise. En effet, chaque organisation doit se préparer à gérer des situations complexes et déstabilisantes, y compris celles qu’elle n’a pas prévues voire imaginées.</p>
<p>Les objectifs d’un exercice de gestion de crise sont la validation du caractère opérationnel en termes organisationnel et humain des cellules de crise de l’entité dans le cas d’un événement majeur menaçant la bonne réalisation de tout ou partie de ses activités.</p>
<p>Les exercices permettent, dans un premier temps, de valider les procédures de remontée d’alerte jusqu’à la mobilisation des cellules de crise et, dans un second temps, de valider l’ensemble des procédures de gestion de crise prévues qui sont éprouvées tout au long de la session d’entraînement. Les exercices contribuent, bien évidemment, à faire monter en compétence les participants qui acquièrent, au fur et à mesure des exercices, l’expertise et les réflexes nécessaires à une gestion efficace de la situation.</p>
<p>Parce que la gestion de crise s’appuie sur des capacités humaines (capacité à anticiper, à prendre des décisions) et parce que chacun peut être amené à réagir de manière différente face à l’inconnu et au stress, s’entraîner c’est être prêt !</p>
<p>Enfin, il est à noter que la réalisation d’exercices de gestion de crise est une obligation réglementaire pour les établissements bancaires et financiers. Le régulateur s’assure que l’organisme a réalisé <em>a minima </em>une fois par an une action significative permettant d’attester que le dispositif a été éprouvé et qu’un plan d’actions d’amélioration a été établi. Idéalement, le niveau de difficulté des exercices devra être croissant et couvrir, à terme, les différentes typologies de crise.</p>
<h2>Qui doit participer aux exercices de gestion de crise ?</h2>
<p>Comme évoqué précédemment, les exercices de gestion de crise ont pour objectif d’éprouver les capacités d’une organisation à prendre des décisions dans un contexte inhabituel. Ils s’adressent donc en particulier aux membres des cellules de crises décisionnelles (CCD) qui sont généralement constituées des représentants du plus haut niveau de management de l’entité (Comité Exécutif ou Comité de Direction).</p>
<p>Lors d’un exercice de gestion de crise, les fonctions mobilisées au sein de la CCD peuvent varier selon le type de scénario joué ; cependant les expertises inhérentes aux ressources humaines, à la communication (interne et externe), au juridique, à la logistique, à l’informatique et au métier impacté sont habituellement sollicitées.</p>
<p>Afin de renforcer la robustesse du dispositif, il convient d’impliquer également les membres suppléants dans les exercices de gestion de crise, ceci permettant de se prémunir de tout défaut d’expertise au sein de la cellule de crise en cas d’indisponibilité du titulaire.</p>
<p>Il est aussi possible d’entraîner les cellules de crise opérationnelles qui ont pour rôle de mettre en œuvre les décisions prises par la cellule de crise décisionnelle.</p>
<p>Des exercices de crise au niveau national et international sont également organisés : le Groupe de Place Robustesse (composé d&#8217;établissements de crédit ou assimilés, d&#8217;infrastructures de marché, du HFDS du ministère de l&#8217;Économie et des Finances, de la Direction générale du Trésor, de la Fédération bancaire française, de la Banque de France, des autorités de supervision et de régulation telles que l&#8217;Autorité de contrôle prudentiel et de résolution et l&#8217;Autorité des marchés financiers) se réunit régulièrement pour améliorer la robustesse de la place financière de Paris et pour échanger sur les expériences menées tant au sein des établissements que sur les autres grandes places financières. Des exercices de grande ampleur sont ainsi réalisés annuellement (panne d’électricité,  pandémie H1N1, crue centennale de la Seine, Cyber-attaque…)</p>
<h2>Quelles sont les étapes à réaliser pour la mise en place d’un exercice de gestion de crise ?</h2>
<p>La première étape consiste à définir et valider les objectifs de l’exercice qui devront prendre en considération le degré de maturité de l’entité en termes de pilotage de crise (une ou plusieurs cellules de crise impliquées dans l’exercice). En effet, il s’agit de positionner le degré d’exigence attendu au niveau adéquat afin que les objectifs soient à la fois ambitieux mais atteignables (les objectifs doivent tenir compte des axes d’amélioration identifiés lors des précédents exercices afin de valider que les actions correctives ont bien été mises en œuvre).</p>
<p>La seconde étape consiste à retenir un macro scénario adapté à la fois au contexte de l’entreprise et aux objectifs fixés. Les scénarios envisageables sont divers et variés en fonction de l’origine (interne ou externe) et de la dimension (technique, économique ou sociale et organisationnelle) de la typologie de crise retenue. La palette de scénarios est vaste et s’étend du plus commun au plus inattendu :</p>
<ul>
<li>Incendie / explosion de gaz avec ou sans victime</li>
<li>Cyber-attaque avec vols de données ou destruction du SI</li>
<li>Panne informatique de grande ampleur</li>
<li>Fraude interne ou externe</li>
<li>Pandémie</li>
<li>Mouvements sociaux</li>
<li>Rumeur</li>
<li>Catastrophe naturelle</li>
<li>Attentats</li>
<li>Enlèvement / séquestration voire disparition de dirigeants…</li>
</ul>
<p>Le macro scénario est ensuite décliné en chronogramme détaillé qui reprend l’ensemble des stimuli qui seront adressés à la (ou aux) cellule(s) de crise tout au long de l’exercice (la durée de l’exercice peut s’étendre d’une à deux heures jusqu’à plusieurs jours !). Chaque stimulus constituant le chronogramme devra être formulé de manière concise et précise en reprenant les termes propres à l’entité (processus, noms et contacts des personnes simulées…) permettant ainsi de se rapprocher au maximum de l’organisation et de la configuration réelle de l’entité.</p>
<p>La phase d’animation consiste à jouer le scénario tel qu’il est prévu au sein du chronogramme. Une cellule d’animation, qui représente à la fois le monde extérieur et les autres acteurs de l’organisation, adresse aux cellules de crise testées (via mails, appels téléphoniques, captures d’écran d’articles de presse…) les stimuli en fonction du timing prédéfini. Les membres des cellules de crise jouent leur propre rôle et les observateurs présents dans la salle de crise consignent leurs observations en vue du débriefing. L’équipe d’animation veille à ce qu’aucune information ne sorte du cadre de l’exercice ceci permettant d’éviter tout déclenchement de crise « réelle ».</p>
<p>A l’issue de l’exercice, un débriefing à chaud est animé par le directeur de l’exercice au cours duquel chaque participant interagit et alimente les débats. Un rapport d’exercice reprenant les forces et faiblesses du dispositif est par la suite formalisé et adressé aux membres de la cellule de crise.</p>
<p>Les constats réalisés au cours des exercices permettent d’identifier les failles potentielles du dispositif qui font l’objet d’un plan de recommandation priorisé. L’entité devra établir, mettre en œuvre et suivre un plan d’action lui permettant de s’assurer de la résilience du dispositif mis en place. L’efficacité et la robustesse du dispositif de gestion de crise devront ensuite être éprouvées au cours des prochains exercices.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/07/les-exercices-de-gestion-de-crise-pourquoi-pour-qui-comment/">Les exercices de gestion de crise : pourquoi, pour qui, comment ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Les chocs extrêmes : des risques que les entreprises globales ne peuvent plus se permettre d’ignorer (partie 2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/12/les-chocs-extremes-des-risques-que-les-entreprises-globales-ne-peuvent-plus-se-permettre-dignorer-partie-2/</link>
		
		<dc:creator><![CDATA[Florian Carrière]]></dc:creator>
		<pubDate>Fri, 06 Dec 2013 07:00:25 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[black swan]]></category>
		<category><![CDATA[Cybercriminalité]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[résilience]]></category>
		<category><![CDATA[Risk management]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=4726</guid>

					<description><![CDATA[<p>Nous évoquions dans la tribune précédente les fameux Cygnes Noirs de Nassim Nicholas Taleb (événements aux probabilités non mesurables mais aux impacts extrêmes), et leur occurrence de plus en plus forte ces dernières années. Bien que leur nature ne s’y...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/12/les-chocs-extremes-des-risques-que-les-entreprises-globales-ne-peuvent-plus-se-permettre-dignorer-partie-2/">Les chocs extrêmes : des risques que les entreprises globales ne peuvent plus se permettre d’ignorer (partie 2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Nous évoquions dans la <a title="SolucomINSIGHT - Les chocs extrêmes : des risques que les entreprises globales ne peuvent plus se permettre d’ignorer (partie 1)" href="http://www.solucominsight.fr/2013/07/les-chocs-extremes-des-risques-que-les-entreprises-globales-ne-peuvent-plus-se-permettre-dignorer-partie-1/" target="_blank" rel="noopener noreferrer">tribune précédente</a> les fameux Cygnes Noirs de Nassim Nicholas Taleb (événements aux probabilités non mesurables mais aux impacts extrêmes), et leur occurrence de plus en plus forte ces dernières années.</em></p>
<p><em>Bien que leur nature ne s’y prête pas facilement, il est pourtant devenu incontournable de faire rentrer ces risques dans le champ de réflexion des entreprises, et d’y apporter des réponses.</em></p>
<h2>Mieux appréhender l’incertitude : raisonner à partir des impacts</h2>
<p>Dans un premier temps, il convient sans doute d’arrêter de considérer ces risques comme imprévisibles « par nature ». Bien souvent, ils n’ont été tenus éloignés des réflexions du management que par une posture de déni (« impossible que ça arrive, c’est trop énorme »), parfois masquée derrière un apparent rationalisme (« on a déjà bien d’autres risques, beaucoup plus probables, à traiter »).</p>
<p>Si l’histoire récente a parfois obligé les entreprises à s’améliorer sur ce point, il semble possible de progresser encore, en développant une réflexion « inversée » sur les risques, consistant à partir des conséquences (en l’occurrence catastrophiques), et à en déduire la liste des causes potentielles.</p>
<p>Déjà appliquée dans le domaine financier (« reverse stress-testing »), et bien connue des experts en continuité d’activité, elle permet souvent de « décoincer » les esprits, et par ailleurs d’ébaucher une réflexion pertinente sur les modalités de traitement de ces risques.</p>
<h2>Capitaliser sur le <em>risk management</em> en place, via la notion de « cascade de risques »</h2>
<p>Il faut ensuite mobiliser le dispositif de gestion des risques déjà en place (les processus d’Enterprise Risk Management &#8211; ERM), qui a généralement permis de cartographier les risques financiers et opérationnels, en laissant souvent de côté nos fameux Cygnes Noirs.</p>
<p>Il s’agit alors d’établir les liens entre ces risques si particuliers et les risques classiques déjà identifiés, en travaillant sur les interdépendances et en faisant apparaître les cascades de risques, qui sont le plus souvent à l’origine des vraies catastrophes (cf. l’exemple classique de la défaillance – à cause du froid – d’un joint de la navette Challenger en 1986).</p>
<p>Le résultat de ce travail montrera sans doute que les Cygnes Noirs ont une fâcheuse tendance à entraîner dans leur sillage la concrétisation de plusieurs risques « classiques » simultanément… mais il permettra de faire le lien avec une réalité connue.</p>
<h2>Bâtir une organisation résiliente</h2>
<p>Enfin, puisqu’identifier des risques sans les traiter reste un exercice théorique assez vide de sens, la question des solutions doit être posée.</p>
<p>La multiplicité des menaces potentielles rend difficile l’identification d’une solution miracle, mais on peut néanmoins remarquer qu’elles sont pour la plupart géographiquement concentrées : dès lors, les solutions classiques de continuité (repli des utilisateurs sur un site distant, redémarrage du SI sur un datacenter distant) peuvent être envisagées.</p>
<p>A la difficulté près qu’elles sont parfois invalidées par les risques eux-mêmes, et que des solutions alternatives doivent être pensées en amont: par exemple, comment déplacer les équipes quand un ouragan bloque tout le trafic aérien ? (élément de réponse : en faisant porter l’activité par d’autres équipes).</p>
<p>Les organisations les plus matures ont déjà intégré cela dans leur réflexion, et bâtissent nativement des processus et organisations résilients entre plusieurs sites distants : certaines banques d’investissement ont ainsi réparti leurs <em>desks</em> les plus critiques entre les plates-formes londonienne et parisienne, chaque opérateur disposant d’un <em>back-up</em> sur l’autre plate-forme. Pour plus de réactivité, un flux vidéo entre les deux est même mis en œuvre, afin de pour pouvoir rapidement évaluer la nécessité de « reprendre la main » sur les opérations en cours. Dans ce cas, aucun impact… si ce n’est la capacité à absorber le volume d’opérations habituel.</p>
<p>Même dans ce cas, attention toutefois à ne pas se sentir totalement protégé : les nouvelles menaces de type cyber-attaques n’ont que faire de la localisation de leurs cibles. Dans ce cas d’autres mesures, déjà <a title="SolucomINSIGHT - cybercriminalité" href="http://www.solucominsight.fr/?s=cybercriminalit%C3%A9" target="_blank" rel="noopener noreferrer">largement développées sur ce site</a>, sont alors à envisager !</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/12/les-chocs-extremes-des-risques-que-les-entreprises-globales-ne-peuvent-plus-se-permettre-dignorer-partie-2/">Les chocs extrêmes : des risques que les entreprises globales ne peuvent plus se permettre d’ignorer (partie 2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Les chocs extrêmes : des risques que les entreprises globales ne peuvent plus se permettre d’ignorer (partie 1)</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/07/les-chocs-extremes-des-risques-que-les-entreprises-globales-ne-peuvent-plus-se-permettre-dignorer-partie-1/</link>
		
		<dc:creator><![CDATA[Frederic Chollet]]></dc:creator>
		<pubDate>Fri, 26 Jul 2013 12:43:43 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[black swan]]></category>
		<category><![CDATA[Risk management]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=3956</guid>

					<description><![CDATA[<p>Le risque &#8230; selon Donald Rumsfeld Parmi les maximes bien connues des risk managers, il y a cette phrase de Donald Rumsfeld en 2002, alors qu’il défendait l’intervention américaine en Irak : “ […] there are known knowns; there are things we...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/07/les-chocs-extremes-des-risques-que-les-entreprises-globales-ne-peuvent-plus-se-permettre-dignorer-partie-1/">Les chocs extrêmes : des risques que les entreprises globales ne peuvent plus se permettre d’ignorer (partie 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Le risque &#8230; selon Donald Rumsfeld</h2>
<p>Parmi les maximes bien connues des risk managers, il y a cette phrase de Donald Rumsfeld en 2002, alors qu’il défendait l’intervention américaine en Irak :</p>
<p align="left"><em>“ […] there are <strong>known knowns</strong>; there are things we know we know.<br />
We also know there are <strong>known unknowns</strong>; that is to say we know there are some things we do not know.<br />
But there are also <strong>unknown unknowns</strong> &#8211; the ones we don&#8217;t know we don&#8217;t know.<br />
And […] it is the </em><em>latter category that tend to be the difficult ones</em><em>. ”</em></p>
<p>Cette citation traduit bien la situation à laquelle les organisations font face :</p>
<ul>
<li>« <strong><em>known knowns</em></strong> » : ce sont les risques maîtrisés, dont l’occurrence et les conséquences sont évaluées et connues ;</li>
<li>« <strong><em>known unknowns</em></strong> » : ce sont les risques identifiés et recensés que les organisations ont choisis d’adresser à court ou moyen terme ;</li>
<li>« <em><strong>unknown unknowns</strong> »</em> : ce sont les événements qui n’ont pas été repérés par le « radar » de la gestion des risques ou dont l’occurrence apparaît infime aux regards des autres risques.</li>
</ul>
<h2><strong>Le Cygne Noir de Nassim Nicholas Taleb : théoriser l’imprévisible</strong></h2>
<p>En 2007, Nassim Nicholas Taleb développe dans (<em>The Black Swan</em>, publié en 2007) la théorie dite du « cygne noir ». Elle englobe les « unknown unknows » et caractérise les évènements imprévisibles aux impacts majeurs de nature à totalement changer l’environnement ou le destin d’une organisation. Les exemples sont malheureusement de plus en plus nombreux :</p>
<ul>
<li><strong>Catastrophes naturelles : </strong>ouragan Katrina aux USA (2005), séisme et tsunami dans l’océan indien (2004) ou au Japon (2011), éruption d’Eyjafjöll en Islande (2010), inondations en Thaïlande et en Australie (2011), etc.</li>
<li><strong>Catastrophes industrielles :</strong> explosion de l’usine AZF (2001), incendie de la plateforme Deepwater Horizon (2010), sinistre des centrales de Fukushima (2011), etc.</li>
<li><strong>Chocs financiers : </strong>choc pétrolier (1973 et 1979), chute d’Enron (2001), faillite Lehman Brothers (2008), fraude Madoff (2008), défauts d’Etats (Mexique 1982, Russie 1998, Argentine 2001, Grèce 2011), etc.</li>
<li><strong>Phénomènes géopolitiques : </strong>chute du mur de Berlin (1989), attentats du World Trade Center (2001), guerre en Irak (2003), printemps Arabe (2011), etc.</li>
</ul>
<p>Par nature, ces évènements se produisent à une fréquence imprévisible. Toutefois notre dernière décennie a montré l’accroissement de leur résurgence. Pour les seules catastrophes naturelles, 2011 a constitué l’année la plus coûteuse de toute l’histoire de l’industrie de l’assurance (~380 milliards de dollars selon l’ONU).</p>
<p>De plus, conséquence d’un monde globalisé et interconnecté, ces phénomènes ont des impacts collatéraux sur l’ensemble des économies de la planète (entre pays producteurs et consommateurs).</p>
<h2><strong>Des évènements que les entreprises ne peuvent plus ignorer</strong></h2>
<p>Les grandes organisations, qui agissent aujourd’hui sur un périmètre global, ne peuvent plus ignorer ces risques, susceptibles de les impacter directement ou indirectement via leurs fournisseurs, leurs partenaires et leurs clients.</p>
<p>Mais comment les appréhender ? A la différence des risques « traditionnels », impossible de prévoir où, quand et comment ces évènements peuvent se produire. Cela impose un changement de paradigme dans la manière de les adresser, qui fera l’objet d’une prochaine tribune.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/07/les-chocs-extremes-des-risques-que-les-entreprises-globales-ne-peuvent-plus-se-permettre-dignorer-partie-1/">Les chocs extrêmes : des risques que les entreprises globales ne peuvent plus se permettre d’ignorer (partie 1)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Souscrire une cyber-assurance : mode d’emploi</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/06/souscrire-une-cyber-assurance-mode-demploi/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Fri, 28 Jun 2013 11:53:47 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[analyse de risques]]></category>
		<category><![CDATA[cyberassurance]]></category>
		<category><![CDATA[Cybercriminalité]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[Risk management]]></category>
		<category><![CDATA[Risque]]></category>
		<category><![CDATA[RSSI]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=3874</guid>

					<description><![CDATA[<p>Après avoir dans une précédente tribune évalué l’intérêt de souscrire ou non à une cyber-assurance (produit dédié à la couverture des risques liés à la cybercriminalité), il convient de s’intéresser désormais aux modalités de souscription d’une telle offre. En effet,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/06/souscrire-une-cyber-assurance-mode-demploi/">Souscrire une cyber-assurance : mode d’emploi</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Après avoir dans une <a href="http://www.solucominsight.fr/2013/03/cyber-assurance-souscrire-ou-ne-pas-souscrire-telle-est-la-question/" target="_blank" rel="noopener noreferrer">précédente tribune</a> évalué l’intérêt de souscrire ou non à une cyber-assurance (produit dédié à la couverture des risques liés à la cybercriminalité), il convient de s’intéresser désormais aux <strong>modalités de souscription</strong> d’une telle offre.</em></p>
<p><em>En effet, le processus de souscription constitue le<strong> pilier fondateur</strong> d’un transfert de risques réussi. Il est donc primordial pour toute entreprise désirant franchir le pas de la cyber-assurance de connaître toutes les caractéristiques d’une telle opération.</em></p>
<h2>Quels sont les acteurs majeurs de ce processus ?</h2>
<p>Les acteurs du processus de souscription sont peu nombreux et bien définis. Participent aux négociations :</p>
<ul>
<li>Le <strong>client </strong>: il s’agit d’une organisation ou d’une entreprise souhaitant disposer d’une prestation (généralement financière) en cas de survenance d’un incident. C’est lui qui exprime le besoin, que ce soit par ses Risk Manager, ses RSSI, sa Direction Générale ou encore ses acteurs métiers.</li>
<li>Le <strong>courtier </strong>: il est l’intermédiaire entre le souscripteur et l’assureur, et joue de ce fait un rôle central tout au long du processus. Il base son travail sur une excellente connaissance du marché et du besoin remonté par son client.</li>
<li>L’<strong>assureur </strong>: il crée les polices d’assurances, en définissant leurs périmètres de couverture, leurs plafonds de garanties ainsi que leurs primes ou franchises. Ces paramètres sont toutefois largement négociés et fortement corrélés avec la maturité du client.</li>
</ul>
<h2>Comment se déroule le processus de souscription à une cyber-assurance?</h2>
<p>En premier lieu, le client doit faire le point sur son besoin et confronter les risques résiduels identifiés comme nécessaires à couvrir avec ceux déjà couverts par une assurance. Pour ce faire, une <strong>analyse de risques récurrente</strong> et un <strong>bilan assurantiel</strong> (évaluation de la couverture actuelle et des manques) impliquant toutes les parties de l’entreprise sont nécessaires.</p>
<p>Dans un second temps, il convient de <strong>choisir le courtier</strong> le mieux à même de répondre aux attentes du client. Dans le contexte de grandes entreprises, il sera jugé sur son expertise sur le sujet cyber, sa capacité à offrir une couverture multi-assureurs et des modalités de son accompagnement au cours des différentes étapes, du choix à la vie du contrat.</p>
<p>Courtier et client échangent alors sur la nature même des risques à traiter, ainsi que sur la maturité de ce dernier. Le courtier <strong>identifie</strong> ensuite, grâce à sa connaissance poussée du marché, les <strong>assureurs</strong> les plus à même de répondre au besoin.</p>
<p>Le client et le courtier présentent ensuite à l’assureur leurs exigences en termes de <strong>périmètre de couverture</strong> et de <strong>plafond de garantie.</strong> Dans le cas de montants très élevés, le courtier peut mettre en place des <strong>montages d’assurances</strong> qui permettent d’atteindre des plafonds plus élevés que ceux proposés dans les offres standards. En réponse, l’assureur évalue la maturité du client, par l’intermédiaire de <strong>questionnaires</strong> ou par une <strong>analyse de risques</strong>. L’assureur propose alors un <strong>montant de prime d’assurance</strong> en fonction de la maturité observée chez le client. Ce montant, qui varie généralement entre 1 et 5% du plafond de la garantie, est ensuite négocié entre les différents partis.</p>
<p>Le périmètre de couverture, le plafond de garantie et le montant de la prime constituent la <strong>police d’assurance.</strong></p>
<h2>Comment faire vivre le contrat ?</h2>
<p>Le contrat reposant essentiellement sur le code des assurances français, le client est tenu à certaines obligations vis-à-vis de l’assureur, notamment sur le devoir d’information en cas de modification significative des risques sur son système d’information. Cette obligation se concrétise généralement par des réunions annuelles entre l’assureur, l’assuré et le courtier dans le but d’établir un bilan de l’évolution de la maturité du client et d’adapter le contrat en conséquence.</p>
<p>La souplesse dans l’évolution du contrat a deux principaux intérêts. Pour le client, il est de <strong>faire baisser le montant des primes</strong> en <strong>améliorant sa sécurité</strong>. Pour l’assureur, il est d’<strong>adapter le montant des primes</strong> en fonction de l’<strong>évolution du risque</strong>. Cette démarche encourage et valorise donc les travaux effectués en faveur de la sécurité du SI.</p>
<h2>Comment déclencher les garanties ?</h2>
<p>Les <strong>délais de notification</strong> en cas d’attaque constituent l’élément central du déclenchement. Le code des assurances rappelle : «<em>L’assuré est obligé de donner avis à l&#8217;assureur, dès qu&#8217;il en a eu connaissance et au plus tard dans le délai fixé par le contrat, de tout sinistre de nature à entraîner la garantie de l&#8217;assureur. Ce délai ne peut être inférieur à cinq jours ouvrés » </em>(<a href="http://www.legifrance.gouv.fr/affichCodeArticle.do?cidTexte=LEGITEXT000006073984&amp;idArticle=LEGIARTI000006791999">Article L113-2</a>)<em>. </em>En cas de faute vis-à-vis de cette règle, le client peut se voir refuser ses garanties. L’enjeu est donc d’<strong>alerter au plus tôt l’assureur</strong>, même s’il n’y a que suspicion d’intrusion, mais aussi de <strong>cadrer les preuves</strong> à recueillir pour l’indemnisation – et ce dès l’établissement du contrat. Le déclenchement des garanties et le déblocage des fonds ne peuvent se faire que si  l’assureur a été notifié dans les délais, et l’évaluation du sinistre réalisée.</p>
<p>En fonction des assureurs, la <strong>mise à disposition d’experts</strong> peut relever d’une option ou ne pas être proposée. Le souscripteur doit par ailleurs veiller à bien préciser les modalités d’intervention de ces experts (obligation d’utiliser les prestataires de l’assureur, …).</p>
<p>Le processus de souscription est donc bien identifié et cadré. La connaissance la plus fine possible du marché ainsi que de ses propres risques sont des atouts indispensables pour bien choisir sa cyber-assurance. Cette dernière gagne considérablement en souplesse de négociation (périmètre, plafond, prime) de par la nouveauté de son marché, de son évolution rapide et de la concurrence naissante.</p>
<p><span id="more-3874"></span></p>
<p>&nbsp;</p>
<p>Retrouvez tous nos articles sur le secteur de l’assurance sur <a title="Insurance speaker - le blog assurance des consultants Solucom" href="http://www.insurancespeaker-solucom.fr/" target="_blank" rel="noopener noreferrer">Insurance speaker</a>, le blog assurance des consultants Solucom</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/06/souscrire-une-cyber-assurance-mode-demploi/">Souscrire une cyber-assurance : mode d’emploi</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber-assurance : souscrire ou ne pas souscrire telle est la question !</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/03/cyber-assurance-souscrire-ou-ne-pas-souscrire-telle-est-la-question/</link>
		
		<dc:creator><![CDATA[zephSolucomBO]]></dc:creator>
		<pubDate>Fri, 15 Mar 2013 13:54:20 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Métiers - Assurance]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[cyberassurance]]></category>
		<category><![CDATA[e-commerce]]></category>
		<category><![CDATA[protection des données]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=3498</guid>

					<description><![CDATA[<p>Les assurances dédiées à la couverture des risques liés à la cybercriminalité (communément appelées « cyber-assurances ») font de plus en plus parler d’elles ces derniers mois. Pourtant, si le marché outre atlantique est déjà florissant, les volumes de primes souscrites en...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/03/cyber-assurance-souscrire-ou-ne-pas-souscrire-telle-est-la-question/">Cyber-assurance : souscrire ou ne pas souscrire telle est la question !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Les assurances dédiées à la couverture des risques liés à la cybercriminalité (communément appelées « cyber-assurances ») font de plus en plus parler d’elles ces derniers mois. Pourtant, si le marché outre atlantique est déjà florissant, les volumes de primes souscrites en France restent limités. Assureurs et courtiers constatent pourtant un fort accroissement des demandes de cotation en 2012, faisant penser à un réel démarrage de ce segment de marché en France en 2014. Alors les cyber-assurances : bonne ou mauvaise solution ?</em></p>
<h2>La cyber-assurance : pour quoi faire ?</h2>
<p>Traditionnellement, l’assurance est vue comme une manière de transférer un risque, en permettant de recouvrer une perte en cas d’occurrence de ce risque. Cela implique d’être en mesure de correctement évaluer le risque et la perte associée. S’il est relativement aisé de le faire sur des risques « matures » en matière d’assurance, comme l’incendie par exemple, cela devient beaucoup plus complexe lorsque l’on parle de cybercriminalité. L’interconnexion des SI et leur globalisation rendent difficile l’évaluation des risques et des pertes : quelle valeur pour les informations que l’on m’a dérobées ? Quels impacts pour mes partenaires et mes clients ? Quels coûts pour réparer la faille ?</p>
<p>Ainsi, <strong>le souscripteur doit aujourd’hui percevoir la cyber-assurance non pas uniquement comme un moyen de « recouvrer une perte » mais plutôt comme un levier lui permettant de réagir plus vite aux attaques et en diminuer les impacts.</strong></p>
<p>Si elles couvrent en partie les pertes d’exploitation, les offres des cyber-assureurs sont souvent accompagnées d’assistances juridiques et d’expertises sur les investigations techniques ou la gestion de crise. C’est cet apport immédiat d’expertise packagée qui peut intéresser le souscripteur à une offre « cyber-assurance », en complément du recouvrement d’une partie souvent limitée de ses pertes.</p>
<h2>La cyber-assurance : pour quels risques ?</h2>
<p>Les cyber-assurances permettent de faire face aux risques liés à trois grands enjeux actuels en matière de systèmes d’information.</p>
<ul>
<li>L’évolution de la règlementation concernant la protection des données personnelles et la notification en cas de fuite.</li>
</ul>
<p>Ces deux sujets très liés feront probablement l’objet dans un avenir proche de renforcements législatifs visant à protéger davantage les consommateurs. La notification des fuites peut s’avérer extrêmement coûteuse pour les entreprises. L’obligation de notification est déjà en vigueur en France pour les opérateurs télécoms, et sera sans doute étendue prochainement à l’ensemble des entreprises gérant des données personnelles  en application d’une nouvelle législation européenne. C’est d’ailleurs en grande partie cette obligation qui a fait exploser le marché de la cyber-assurance aux États-Unis.</p>
<ul>
<li>L’entreprise étendue, génératrice de nouveaux risques</li>
</ul>
<p>Les mouvements incessants des entreprises (fusions, cession de certaines activités, …), les interconnexions SI avec des clients et partenaires ou encore le développement du cloud computing sont autant de facteurs qui exposent le SI de l’entreprise à des attaques. Par ailleurs, en cas d’incident avéré, l’entreprise peut être considérée comme responsable de perturbations chez ses clients et partenaires. Attention cependant sur ce point : si un volet responsabilité civile est souvent inclus dans les offres de cyber-assurances, il fait parfois doublon avec les contrats responsabilité civile traditionnellement souscrits, qui couvrent souvent (en France) les dommages immatériels.</p>
<ul>
<li>Le développement du e-commerce</li>
</ul>
<p>De plus en plus d’entreprises vendent aujourd’hui leurs produits sur Internet. L’indisponibilité du portail web de vente peut ainsi générer des pertes importantes de chiffre d’affaires, qu’il peut être relativement facile de chiffrer. Dans ce cas, une cyber-assurance peut jouer pleinement son rôle traditionnel de solution permettant de recouvrer une perte.</p>
<h2>En conclusion : dans quels cas prendre une cyber-assurance ?</h2>
<p>En conclusion, il est sans doute bon de s’intéresser au sujet de la cyber-assurance si l’entreprise est dans un ou plusieurs des cas suivants :</p>
<ul>
<li>Elle est susceptible de faire face à une <strong>attaque dont certaines conséquences sont facilement mesurables</strong> (sites de e-commerce par exemple). Dans ce cas, l’entreprise cherchera à jouer sur l’aspect « traditionnel » de l’assurance pour recouvrer une perte d’exploitation.</li>
<li>Elle dispose d’un <strong>SI fortement interconnecté avec l’extérieur</strong>. Il sera alors utile dans un premier temps de vérifier quelle couverture lui offre son contrat en responsabilité civile (RC) actuel pour indemniser les tiers à qui elle porterait atteinte en cas d’attaque. Au besoin, elle pourra compléter cette couverture par le volet RC d’une cyber-assurance.</li>
<li>Elle <strong>gère de nombreuses données personnelles</strong>. Elle sera alors attentive aux évolutions législatives en matière de notification et prendra si possible les devants sur le sujet en commençant à étudier la solution cyber-assurance.</li>
<li>Elle dispose d’un <strong>manque d’expertises sur le sujet de la cybercriminalité</strong> et souhaite pouvoir disposer d’une capacité de réaction rapide. Elle s’intéressera alors aux offres packagées des cyber-assureurs, qui lui apporteront en cas de sinistre des experts dans plusieurs domaines (juridique, gestion de crise, forensics, …)</li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/03/cyber-assurance-souscrire-ou-ne-pas-souscrire-telle-est-la-question/">Cyber-assurance : souscrire ou ne pas souscrire telle est la question !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Management des risques : comment mettre en place une organisation de gestion des risques ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2012/07/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Wed, 25 Jul 2012 06:50:12 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[Risk management]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=2053</guid>

					<description><![CDATA[<p>Les précédents articles consacrés à la thématique de la gestion des risques nous ont permis de décrire un modèle d&#8217;organisation facilitant une gestion des risques intégrée : la &#8220;tour de contrôle&#8221;.  Dans ce dernier article, nous aborderons la question de...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/07/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques/">Management des risques : comment mettre en place une organisation de gestion des risques ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Les précédents articles consacrés à la thématique de la gestion des risques nous ont permis de décrire un modèle d&#8217;organisation facilitant une gestion des risques intégrée : la &#8220;tour de contrôle&#8221;.  Dans ce dernier article, nous aborderons la question de sa mise en place,  que l&#8217;on peut découper en 4 étapes :  utilisation d’une échelle commune, définition d’un portefeuille de risques,  optimisation du travail avec les métiers et mise en commun des plans d’actions.</p>
<h2>Étape 1 : utiliser une échelle commune, un pré-requis à la démarche</h2>
<p>Disposer d’une échelle commune visant à mesurer les risques semble une évi­dence. Pourtant, il est rare que cette bonne pratique soit en place, ce qui complexifie la collaboration entre les filières. Cette lacune rend impossible une lecture d’ensemble des cartogra­phies des risques élaborées. C’est donc la pre­mière étape pour intégrer les filières ! La collecte des échelles en vigueur, leur analyse et la rencontre des porteurs des filières doivent permettre d’iden­tifier les points de dépendance clés.</p>
<p>Cette phase d’analyse passée, il s’agit ensuite de construire les échelles cibles, en trouvant un compromis entre les visions des différents acteurs. L’atteinte d’un consensus n’est pas toujours aisée, mais il est nécessaire de rester ferme sur l’utilisation d’une échelle commune pour permettre la suite de la démarche.</p>
<h2>Étape 2 &#8211; Construire un portefeuille de risques : un référentiel de pilotage unique</h2>
<p>La constitution d’un portefeuille de risques commence par l’analyse de l’existant : quels sont les objectifs de chacun ? Quels types de risques sont traités ? Cette première étape permet de structurer les types de risques gérés au sein de grands domaines constituant le portefeuille, dans une logique de « catalogue » de risques génériques.</p>
<p>Il convient ensuite d’identifier les zones de recouvrement. En effet, il est bien souvent impossible de posi­tionner un risque dans une seule et unique filière. Une fois ces recouvrements identifiés, il devient possible de formaliser les responsa­bilités sur ces risques pour éviter, dans le meilleur des cas, un travail redondant et dans le pire des cas des démarches contradictoires.</p>
<h2>Étape 3 : transformer la relation avec les métiers</h2>
<p>Les métiers souffrent des nombreuses sollicitations des filières risques qui créent une lassitude et leur rejet. La coordination et l’optimisation de la relation avec les métiers est donc un enjeu majeur, l’objectif étant de repositionner les filières risques en conseillers et non en demandeurs.</p>
<p>Plusieurs leviers d’optimisation sont à mettre en œuvre :</p>
<ul>
<li> Le travail sur les zones d’adhérence des risques doit être remis à profit pour anticiper les redondances et les contourner au tra­vers d’entretiens ou de questionnaires communs sur ces périmètres.</li>
<li>L’échange des informations collectées auprès des métiers doit permettre d’enrichir la réflexion de tous et de garantir une sollicitation efficace des métiers.</li>
<li>La mutualisation de la restitu­tion et du <em>reporting</em> doit permettre la mise en perspective des risques et les éventuels arbitrages lors de la valida­tion des risques.</li>
</ul>
<h2>Étape 4 : partager les plans d’actions</h2>
<p>En intégrant la vision des risques, la définition des plans d’ac­tions est plus simple à optimiser. Les actions identifiées par chaque filière sont partagées, des synergies peu­vent être dégagées et les budgets mieux alloués sur l’ensemble du périmètre :</p>
<ul>
<li>Les actions de réduction des risques sur les zones d’adhé­rence peuvent ainsi être défi­nies collégialement, chaque filière traitant d’une compo­sante du risque ;</li>
<li>Les actions redondantes, voire contradictoires, peuvent être identifiées et arbitrées.</li>
</ul>
<p>Chaque filière dispose alors de sa feuille de route projet, dont elle porte la mise en œuvre et/ou le suivi selon les cas. Un suivi régu­lier et commun doit alors être mis en place, afin de mesurer l’évolution du niveau de risque en intégrant l’en­semble des composantes des plans de traitement.</p>
<p>La démarche de gestion des risques SI se doit donc d’être transverse : c’est seulement en avançant ensemble vers une organisation intégrée et en se dotant d’outils partagés que la maîtrise globale des risques pourra s’améliorer. La transformation des filières nécessitera une mise en œuvre progressive en s’appuyant sur les périmètres les plus mûrs pour amorcer la dynamique et ensuite étendre la démarche à d’autres domaines de risques. Comme tous les changements d’organisation associés, elle nécessitera un accompagnement par une conduite du changement.</p>
<p>Lire les précédents articles <a title="Management des risques : une gestion des risques SI au cœur de l’innovation et des métiers" href="http://www.solucominsight.fr/2012/07/une-gestion-des-risques-si-au-coeur-de-linnovation-et-des-metiers/">une gestion des risques SI au cœur de l’innovation et des métiers</a> et <a title="Management des risques : casser les silos en articulant les filières de gestion de risques" href="http://www.solucominsight.fr/2012/07/management-des-risques-casser-les-silos-en-articulant-les-filieres-de-gestion-de-risques/">casser les silos en articulant les filières de gestion de risques</a>.</p>
<p>Pour en savoir plus, vous pouvez également consulter notre synthèse :  <a href="http://www.solucom.fr/Publications" target="_blank" rel="noopener noreferrer">&#8220;Management des risques : plaidoyer pour une vision unifiée&#8221;</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/07/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques/">Management des risques : comment mettre en place une organisation de gestion des risques ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Management des risques : casser les silos en articulant les filières de gestion de risques</title>
		<link>https://www.riskinsight-wavestone.com/en/2012/07/management-des-risques-casser-les-silos-en-articulant-les-filieres-de-gestion-de-risques/</link>
		
		<dc:creator><![CDATA[Marion Couturier]]></dc:creator>
		<pubDate>Tue, 17 Jul 2012 11:16:07 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[Risk management]]></category>
		<category><![CDATA[Risque]]></category>
		<category><![CDATA[système d'information]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=2027</guid>

					<description><![CDATA[<p>Comme nous l&#8217;avons vu dans la première partie de notre dossier sur le management des risques, la gestion des risques SI s’est progressivement mise en place au travers de filières dédiées à chaque type de risques (lire l&#8217;article  : &#8220;une...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/07/management-des-risques-casser-les-silos-en-articulant-les-filieres-de-gestion-de-risques/">Management des risques : casser les silos en articulant les filières de gestion de risques</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Comme nous l&#8217;avons vu dans la première partie de notre dossier sur le management des risques, la gestion des risques SI s’est progressivement mise en place au travers de filières dédiées à chaque type de risques (lire l&#8217;article  : <a href="http://www.solucominsight.fr/2012/07/une-gestion-des-risques-si-au-coeur-de-l%E2%80%99innovation-et-des-metiers/" target="_blank" rel="noopener noreferrer">&#8220;une gestion des risques SI au cœur de l&#8217;innovation et des métiers&#8221;</a>).</p>
<p>Mais face à cette multiplicité des gestionnaires de risques et des démarches, comment obtenir une vision d’ensemble ? Telle est la question à laquelle nous nous proposons de répondre dans la deuxième partie de notre dossier consacré au Management des risques.</p>
<h2>Une vision d’ensemble difficile à obtenir…</h2>
<p>Les multiples acteurs qui composent les filières de gestion des risques SI (DSI, RSSI, RPCA…) agissent le plus souvent indépen­damment les uns des autres. Chaque responsable traite ses risques avec sa propre méthode, sa propre échelle, son propre référentiel&#8230; tout en ayant peu voire même aucun échange avec les autres acteurs.</p>
<p>L’existence de filières de gestion des risques dédiées démontre une certaine maturité : elles apportent des réponses expertes aux risques qu’elles prennent en charge. Ce fonctionnement en silos n’optimise ni l’identification, ni l’éva­luation et le traitement des risques. Ces silos pénalisent l’entre­prise dans son processus de prise de décision car ils ne permettent pas de répondre aux questions essentielles qu’elle se pose :</p>
<ul>
<li>Quelle est globalement mon exposition aux risques ?</li>
<li>Ai-je bien mis les priorités aux bons endroits ?</li>
</ul>
<p>Dès lors, il ne peut y avoir de réponse globale. Or c’est bien au niveau « entreprise » que la gestion des risques prend tout son sens.</p>
<h2>… et d’inévitables redondances</h2>
<p>L’approche en silos a un second inconvénient : elle génère natu­rellement une sur-sollicitation des métiers : on constate souvent autant de sollici­tations que de filières ! Or, s’il est nécessaire que les acteurs de la gestion des risques SI collaborent avec les directions métiers, notam­ment pour évaluer les impacts des risques, il ne faut pas que cette implication devienne excessive et donc contre-productive.</p>
<p>La solution réside donc dans l’or­chestration d’une collaboration entre les différents acteurs de la gestion des risques SI. Il ne s’agit pas de fusionner complètement les silos, mais de les transformer et de les faire collaborer pour assurer une gestion efficace des risques SI au niveau entreprise.</p>
<h2> Vers une cible d’organisation intégrée : la « tour de contrôle »</h2>
<p><a href="http://www.solucominsight.fr/?attachment_id=2032"><img loading="lazy" decoding="async" class="size-full wp-image-2032 alignleft" title="schéma tour de contrôle" src="http://www.solucominsight.fr/wp-content/uploads/2012/07/schéma-tour-de-contrôle.jpg" alt="" width="205" height="156" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2012/07/schéma-tour-de-contrôle.jpg 205w, https://www.riskinsight-wavestone.com/wp-content/uploads/2012/07/schéma-tour-de-contrôle-51x39.jpg 51w" sizes="auto, (max-width: 205px) 100vw, 205px" /></a></p>
<p>L’organisation la plus optimale est la « tour de contrôle », symbole d’une vision d’ensemble ainsi que d’une information partagée et consolidée. Dans cette situation, tous les acteurs de la gestion du risque SI partagent la même démarche. Ils se concertent sur la méthode, utilisent les mêmes échelles d’évaluation des risques et centralisent les résultats. Ce rappro­chement favorise ainsi la consolida­tion d’une information validée par tous et la construction d’une vision cohérente de l’ensemble des risques de l’entreprise. L’approche « tour de contrôle » favorise par ailleurs l’opti­misation budgétaire dans la mesure où elle permet de se concentrer sur les plans de réduction des risques jugés prioritaires.</p>
<p>Mais attention : rapprochement des filières ne veut pas dire fusion des filières.</p>
<p>Chacune a recours à des compétences, des expertises et des normes spécifiques.</p>
<p>Si la « tour de contrôle » est l’orga­nisation optimale cible, il n’est pas évident de l’implémenter immédia­tement. Une mise en place progressive est, de ce fait préférable. Elle doit permettre de poser les  bases d’une approche des risques partagée et introduire un changement de culture.  Ce sont les premières étapes de cette mise en place que nous détaillerons dans la 3ème partie de notre dossier sur le management des risques.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/07/management-des-risques-casser-les-silos-en-articulant-les-filieres-de-gestion-de-risques/">Management des risques : casser les silos en articulant les filières de gestion de risques</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Gestion des risques : de la perception à la réaction &#8230;</title>
		<link>https://www.riskinsight-wavestone.com/en/2012/06/gestion-des-risques-de-la-perception-a-la-reaction/</link>
		
		<dc:creator><![CDATA[SolucomINSIGHT]]></dc:creator>
		<pubDate>Thu, 21 Jun 2012 09:02:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[Risk management]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=1947</guid>

					<description><![CDATA[<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/06/gestion-des-risques-de-la-perception-a-la-reaction/">Gestion des risques : de la perception à la réaction &#8230;</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;"><a href="http://www.solucominsight.fr/2012/06/gestion-des-risques-de-la-perception-a-la-reaction/solucom-gestion-risques-nb/" rel="attachment wp-att-1948"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1948" title="solucom gestion risques n&amp;b" src="http://www.solucominsight.fr/wp-content/uploads/2012/06/solucom-gestion-risques-nb.jpg" alt="" width="454" height="413" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2012/06/solucom-gestion-risques-nb.jpg 2100w, https://www.riskinsight-wavestone.com/wp-content/uploads/2012/06/solucom-gestion-risques-nb-209x191.jpg 209w, https://www.riskinsight-wavestone.com/wp-content/uploads/2012/06/solucom-gestion-risques-nb-43x39.jpg 43w" sizes="auto, (max-width: 454px) 100vw, 454px" /></a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/06/gestion-des-risques-de-la-perception-a-la-reaction/">Gestion des risques : de la perception à la réaction &#8230;</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quelle perception du risque dans la société ? La vision de Patrick Peretti-Watel</title>
		<link>https://www.riskinsight-wavestone.com/en/2012/05/quelle-perception-du-risque-dans-la-societe-vue-par-patrick-peretti-watel/</link>
		
		<dc:creator><![CDATA[Patrick Peretti Watel]]></dc:creator>
		<pubDate>Thu, 24 May 2012 14:07:07 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[acceptabilité du risque]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[Risk management]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=1852</guid>

					<description><![CDATA[<p>Agrégé en sciences sociales, Patrick Peretti-Watel est docteur en sociologie du risque et statisticien. Il a écrit de nombreux ouvrages sur le risque dans la société et a présenté, lors de l’Atelier Solucom, son point de vue sur cette thématique...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/05/quelle-perception-du-risque-dans-la-societe-vue-par-patrick-peretti-watel/">Quelle perception du risque dans la société ? La vision de Patrick Peretti-Watel</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Agrégé en sciences sociales, Patrick Peretti-Watel est docteur en sociologie du risque et statisticien. Il a écrit de nombreux ouvrages sur le risque dans la société et a présenté, lors de l’Atelier Solucom, son point de vue sur cette thématique au cœur de nos préoccupations.</em></p>
<h2>Dans un monde moins dangereux mais plus risqué, quel comportement adopte-t-on face au risque ?</h2>
<p>Alors que notre monde est de moins en moins dangereux, nous avons aujourd’hui le sentiment de vivre dans un monde de plus en plus risqué. Risques alimentaires, écologiques, technologiques, financiers, métiers à risques, populations à risques… Le risque est omniprésent et sans cesse mis sur le devant de la scène médiatique.</p>
<p>Pour paraphraser le philosophe François Ewald, rien n’est en soi un risque, mais tout peut en devenir un. Le risque est plus une façon d’appréhender le réel, associée à une volonté de maîtriser l’avenir. Cette « mise en risque » progressive du monde est justement ce qui caractérise l’histoire du 20<sup>ème</sup> siècle.</p>
<p>Erving Goffman, sociologue américain, remarquait que les hommes, comme les animaux, oscillent en permanence entre deux états d’activité, la veille et l’alarme, passant de l’un à l’autre lorsqu’un signal attire leur attention sur un danger dans leur environnement. Pour lui, certains individus sont plus sensibles que d’autres à ces signaux et plus prompts à réagir. On pourrait dire que l’homme moderne possède les aptitudes perceptives d’une biche, toujours prête à s’effrayer, mais la réactivité d’une vache, lente à se mobiliser. Évidemment, ce décalage est anxiogène !</p>
<h2>Pourquoi les hommes ressentent-ils le besoin d’atteindre le risque zéro ?</h2>
<p>La « mise en risque » progressive du monde a été au 20<sup>ème</sup> siècle corrélative d’une nouvelle utopie : celle du risque zéro. L’expansion continue du risque est portée par un espoir qui peut sembler rétrospectivement un peu naïf : on a longtemps pensé que la science, grâce aux techniques du risque, allait parvenir à éradiquer certains dangers pour nous garantir une sécurité totale.</p>
<p>Cependant, les experts ont dû admettre que le risque nul n’existe pas, que certains risques sont rémanents, que d’autres sont concurrents, et que la réduction des uns peut renforcer les autres.</p>
<p>Ces dernières décennies ont également été marquées par ce que l’on appelle le principe de précaution qui, dans une certaine mesure, marque une forme de retour à l’utopie du risque zéro. Ce principe implique que « l’absence de certitudes, compte tenu des connaissances scientifiques et techniques du moment, ne doit pas retarder l’adoption de mesures effectives et proportionnées visant à prévenir un risque de dommages graves et irréversibles à l’environnement à un coût économiquement acceptable ». Aujourd’hui est fait un usage galvaudé de ce principe de précaution, ce dernier se transformant en principe d’abstention. Il est invoqué à tort et à travers, passe outre les garde-fous posés par la loi, fait seulement mention des risques « graves et irréversibles » et n’envisage que des mesures « proportionnées », à un coût « économiquement acceptable ». Sans ces restrictions de bon sens, ce principe conduit à toujours envisager le pire, et à payer très cher pour viser un « risque zéro » hors d’atteinte.</p>
<h2>Pourquoi le risque zéro est-il utopique et incongru ?</h2>
<p>L’intrusion du facteur humain est une des explications de l’échec de l’utopie du risque zéro. Selon la théorie du risque homéostatique, les individus ne recherchent pas forcément le risque zéro, ils sont même prêts à s’exposer à un certain niveau de risque qu’ils jugent « acceptable », pour en retirer un bénéfice.</p>
<p>Plus généralement, les experts de la sécurité ont souvent tendance à se focaliser sur le risque qu’ils ont à gérer, et peinent à se rendre compte que les individus qui sont exposés à ce risque peuvent très bien avoir d’autres contraintes, d’autres risques.</p>
<p>Par ailleurs, ces experts doivent prendre en compte le phénomène de déni du risque qui peut être redoutable. Le déni du risque s’appuie souvent sur une stratégie de « bouc émissaire », qui consiste à mettre un risque à distance en estimant que ce risque ne concerne qu’une catégorie d’individus bien particulière, à laquelle on n’appartient pas soi-même.</p>
<p>&nbsp;</p>
<p>Aujourd’hui, la gestion d’un risque, dans la société comme au sein d’une entreprise, implique au moins deux dimensions interdépendantes. D’abord une dimension technique, qui doit déterminer les coûts et les bénéfices attendus, ainsi que le degré d’acceptabilité du risque. Ensuite une dimension humaine, qui implique un dialogue avec les personnes concernées, et en particulier, au sein d’une entreprise, avec les salariés, avec les métiers, pour que leurs points de vue, leurs besoins et leurs objectifs propres soient pris en compte.</p>
<p>&nbsp;</p>
<p>Lire l&#8217;article : <a href="http://www.solucominsight.fr/2012/05/transformer-la-relation-avec-les-metiers-une-evolution-necessaire-pour-la-filiere-risques/" target="_blank" rel="noopener noreferrer">Transformer la relation avec les métiers : une évolution nécessaire pour la filière risques</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/05/quelle-perception-du-risque-dans-la-societe-vue-par-patrick-peretti-watel/">Quelle perception du risque dans la société ? La vision de Patrick Peretti-Watel</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Transformer la relation avec les métiers : une évolution nécessaire pour la filière risques</title>
		<link>https://www.riskinsight-wavestone.com/en/2012/05/transformer-la-relation-avec-les-metiers-une-evolution-necessaire-pour-la-filiere-risques/</link>
		
		<dc:creator><![CDATA[Mickael Avoledo]]></dc:creator>
		<pubDate>Fri, 11 May 2012 08:45:20 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[convergence]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[gouvernance]]></category>
		<category><![CDATA[métiers]]></category>
		<category><![CDATA[rationalisation]]></category>
		<category><![CDATA[Risk management]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=1791</guid>

					<description><![CDATA[<p>Dans la plupart des grandes entreprises, des filières risques (RH, juridique, SI, …) sont désormais structurées et ont itéré plusieurs fois leurs principaux processus (cartographie et traitement des risques, contrôle, …). Cette évolution positive n’a toutefois pas modifié un constat...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/05/transformer-la-relation-avec-les-metiers-une-evolution-necessaire-pour-la-filiere-risques/">Transformer la relation avec les métiers : une évolution nécessaire pour la filière risques</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p align="left">Dans la plupart des grandes entreprises, des filières risques (RH, juridique, SI, …) sont désormais structurées et ont itéré plusieurs fois leurs principaux processus (cartographie et traitement des risques, contrôle, …). Cette évolution positive n’a toutefois pas modifié un constat partagé par la majorité des Risk managers et des Responsables métiers : la filière risques est aujourd’hui plus perçue comme un frein que comme un véritable soutien pour les métiers.</p>
<h2 align="left">Des métiers sur-sollicités</h2>
<p align="left">Les Directions métiers sont aujourd’hui sur-sollicitées par une filière risques qui peine souvent à mettre en cohérence les démarches de recensement et de traitement des différentes typologies de risques (RH, juridique, SI, qualité, continuité…). La multiplicité des acteurs, démarches et planning entraîne une perte générale de lisibilité pour les métiers, qui en réaction s’impliquent moins dans le processus de management des risques.</p>
<p align="left"><strong>Créer un cadre unifié pour la gestion des risques</strong></p>
<p align="left">Il est nécessaire de repenser les filières risques pour une meilleure intégration des différents canaux de remontée et de traitement des risques. Vis-à-vis des métiers, ces changements doivent se traduire par des sollicitations plus cohérentes, favorisant ainsi leur adhésion.</p>
<p align="left">Deux axes majeurs pour opérer cette transformation : la convergence des pratiques et la rationalisation de la gouvernance des risques <a href="http://www.solucominsight.fr/2011/05/globaliser-la-gestion-des-risques-vers-la-mise-en-place-d%E2%80%99un-cadre-unique/" target="_blank" rel="noopener noreferrer"> (voir notre article à ce sujet)</a>.</p>
<h2 align="left">Un retour sur investissement difficile à percevoir</h2>
<p align="left">Difficile pour le métier d’évaluer à quel point le travail fourni dans le cadre de la gestion des risques a permis d’atteindre le résultat escompté si on ne le lui montre pas clairement ! Le gain associé aux efforts consentis est en effet difficilement perceptible, car le premier résultat d’une gestion de risques efficace, c’est bien l’absence de perturbations majeures sur les activités. La filière risques doit ainsi faire l’effort de mesurer les gains associés à ses actions, afin de mieux valoriser ces dernières auprès des métiers et leur faire comprendre l’intérêt qu’ils ont à s’impliquer.</p>
<p align="left"><strong>Développer le « marketing de la filière risques »</strong></p>
<p align="left">Pour favoriser l’adhésion des Métiers, la filière risques doit développer sa capacité à intervenir en mode projet ou en phases d’étude à leur demande, en sortant d’un mode de fonctionnement aujourd’hui trop basé sur le récurrent.</p>
<p align="left">Elle doit pour cela apprendre à se vendre, en assurant la promotion des services qu’elle peut offrir aux Métiers et des résultats qu’elle obtient. Cela doit contribuer, si ce n’est à inverser, au moins à rééquilibrer les flux de sollicitations entre les deux parties. Ces derniers partent en effet aujourd’hui majoritairement de la filière risques et non des Métiers, contrairement à la quasi-totalité des autres directions support ! La filière risque dispose de plusieurs moyens pour ce faire, au travers par exemple :</p>
<ul>
<li>de la structuration de « l’offre de la filière risque » : comment et sur quoi cette dernière se propose d’intervenir auprès des métiers, à leur demande ;</li>
<li>de la valorisation des résultats obtenus, en trouvant des indicateurs pertinents et des exemples concrets pour les différentes typologies de risques ;</li>
<li>de la détection des nouvelles opportunités qui apparaissent aux Métiers grâce à la bonne gestion des risques (moyens de valorisation en externe par exemple)</li>
</ul>
<h2 align="left">Un refus trop fréquent du risque</h2>
<p align="left">La filière risques est souvent perçue comme l’entité qui « sur-traite » voire refuse systématiquement le risque, plutôt que celle qui valorise la prise de risque maîtrisée.</p>
<p align="left">Les métiers, au cours du processus de décision, attendent pourtant que les pertes potentielles soient analysées au regard des gains attendus. Réaliser cet exercice difficile et décider « en toute connaissance de cause » est de plus en plus complexe pour eux, et la filière risque peut les aider en cela, que ce soit sur un plan stratégique ou opérationnel.</p>
<p align="left"><strong>S’aligner sur les objectifs des Métiers et veiller à ne pas sur-traiter les risques</strong></p>
<p>La filière risques doit passer du refus trop fréquent du risque à l’assistance au métier dans la conduite de ses choix stratégiques et opérationnels, pour lui permettre d’atteindre ses objectifs en prenant des risques maîtrisés. Le gestionnaire de risques doit devenir un des soutiens indispensables dans les équipes chargées de mener des études ou projets stratégiques, via sa capacité à analyser de manière large et détaillée les risques et valider que la prise de risques permettra de générer de la valeur et est conforme à « l’appétence au risque » qu’exprime le métier. Dans un cadre plus opérationnel, il doit s’assurer que les projets intègrent bien la notion de risque tout en conservant ses missions récurrentes de cartographie et traitement.</p>
<p>Mais il doit surtout développer son rôle de conseil « à la demande du métier », en veillant à ne pas imposer des processus et solutions qui viseraient à « sur-traiter » les risques et donc à diminuer la performance de l’entreprise.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/05/transformer-la-relation-avec-les-metiers-une-evolution-necessaire-pour-la-filiere-risques/">Transformer la relation avec les métiers : une évolution nécessaire pour la filière risques</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>La virtualisation ne virtualise pas les risques humains !</title>
		<link>https://www.riskinsight-wavestone.com/en/2012/02/la-virtualisation-ne-virtualise-pas-les-risques-humains/</link>
		
		<dc:creator><![CDATA[SolucomINSIGHT]]></dc:creator>
		<pubDate>Mon, 27 Feb 2012 11:02:17 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Métiers - Stratégie & projets IT]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[optimisation]]></category>
		<category><![CDATA[poste de travail]]></category>
		<category><![CDATA[Risque]]></category>
		<category><![CDATA[virtualisation]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=1477</guid>

					<description><![CDATA[<p>La virtualisation : un buzzword aux origines lointaines Le concept de virtualisation existe depuis plus de 40 ans (avec les mainframe et systèmes IBM), mais s’est véritablement démocratisé dans les années 2000 lorsqu’il est devenu possible d’exécuter simultanément plusieurs systèmes...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/02/la-virtualisation-ne-virtualise-pas-les-risques-humains/">La virtualisation ne virtualise pas les risques humains !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>La virtualisation : un buzzword aux origines lointaines</h2>
<p>Le concept de virtualisation existe <strong>depuis plus de 40 ans</strong> (avec les mainframe et systèmes IBM), mais s’est véritablement démocratisé dans les années 2000 lorsqu’il est devenu possible d’exécuter simultanément plusieurs systèmes d’exploitation sur un même poste de travail. C&#8217;est essentiellement grâce à la virtualisation système (Microsoft, VMware) qu&#8217;il est aujourd’hui connu et son succès a atteint des sommets avec le développement du « <strong>cloud computing</strong> » (Amazon, Google Apps&#8230;).</p>
<p>La virtualisation consiste à faire fonctionner sur une machine physique unique <strong>plusieurs systèmes</strong> comme s&#8217;ils fonctionnaient sur des <strong>machines physiques distinctes</strong>. Ceci repose sur un concept simple : des instances virtuelles sont orchestrées par un hyperviseur, garant de l’accès, la répartition des ressources et l’isolation entre les instances.</p>
<p><a href="http://www.solucominsight.fr/2012/02/la-virtualisation-ne-virtualise-pas-les-risques-humains/image-virtualisation-solucominsight/" rel="attachment wp-att-1478"><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-1478" title="Image virtualisation SolucomINSIGHT" src="http://www.solucominsight.fr/wp-content/uploads/2012/02/Image-virtualisation-SolucomINSIGHT-437x120.jpg" alt="" width="437" height="120" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2012/02/Image-virtualisation-SolucomINSIGHT-437x120.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2012/02/Image-virtualisation-SolucomINSIGHT-71x20.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2012/02/Image-virtualisation-SolucomINSIGHT.jpg 1411w" sizes="auto, (max-width: 437px) 100vw, 437px" /></a></p>
<p>La virtualisation doit avant tout son utilisation aux <strong>gains financiers</strong> qu&#8217;elle apporte en favorisant la consolidation des infrastructures et l’optimisation des ressources utilisées. Elle engendre en même temps des <strong>bénéfices opérationnels</strong> importants en permettant la mise en place rapide de solutions en haute disponibilité : le passage au &#8220;tout logique&#8221; apporte une facilité de déploiement et une souplesse de provisionning non offerts dans le monde physique.</p>
<p>En 40 ans, au vu de ces bénéfices, les technologies de virtualisation se sont orientées vers des utilisations diverses, s&#8217;étendant à d’<strong>autres composants du SI</strong> que les systèmes d&#8217;exploitation d&#8217;origine : postes de travail (sessions virtuelles, VDI…), réseaux (VDC, VRF…), équipements de sécurité (Firewalls, IDS-IPS&#8230;).</p>
<h2>Des risques technologiques … à relativiser !</h2>
<p>Les premières craintes des entreprises vis-à-vis de la virtualisation sont liées à la <strong>fiabilité des</strong> <strong>nouveautés technologiques impliquées</strong> : les nouveaux composants introduits, en particulier l&#8217;hyperviseur, me garantissent-ils l&#8217;étanchéité des systèmes supportés par une même machine physique ?</p>
<p>Il existe effectivement un certain nombre de vulnérabilités exploitables sur ces technologies… mais les risques associés sont finalement peu rencontrés : les technologies phares du marché sont des technologies éprouvées et ces risques peuvent être traités, comme pour tout système, par des mesures de gestion opérationnelles de la sécurité qui sont déjà en place dans les entreprises (patch management, durcissement…). Attention cependant ces processus doivent fonctionner avec efficacité vu l’impact en cas d’incident sur les infrastructures de virtualisation.</p>
<h2>Des risques humains … à ne pas négliger !</h2>
<p>Si les risques les plus courants de la virtualisation ne proviennent pas de la technique elle-même, ils se situent plutôt dans <strong>la gestion de ces nouvelles technologies</strong>. La virtualisation introduit dans le SI de nouveaux composants (hyperviseur, consoles…), de nouvelles notions d&#8217;infrastructure (réseau virtuel…) et les principaux risques de la virtualisation sont le plus souvent issus d&#8217;un défaut d&#8217;encadrement liés à ces nouveautés :</p>
<ul>
<li><strong>Mauvais usage des consoles d’administration</strong>, avec des impacts immédiats « effet boule de neige » en cas de mauvaise configuration : arrêt multiple d&#8217;instances, activation de fonctions de décloisonnement&#8230;</li>
<li><strong>Mauvaises pratiques de gestion de la plate-forme de virtualisation</strong>, notamment sur les aspects de gestion des inventaires et de capacity planning qui doivent être redéfinis.</li>
<li><strong>Défaut de séparation des tâches entre les équipes système et réseau</strong>, avec tous les risques d’erreur, voire de malveillance, dus à la concentration de ces responsabilités.</li>
</ul>
<p><a href="http://www.solucominsight.fr/2012/02/la-virtualisation-ne-virtualise-pas-les-risques-humains/image-virtualisation-solucominsight2/" rel="attachment wp-att-1479"><img loading="lazy" decoding="async" class="aligncenter size-medium wp-image-1479" title="Image virtualisation SolucomINSIGHT2" src="http://www.solucominsight.fr/wp-content/uploads/2012/02/Image-virtualisation-SolucomINSIGHT2-402x191.jpg" alt="" width="402" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2012/02/Image-virtualisation-SolucomINSIGHT2-402x191.jpg 402w, https://www.riskinsight-wavestone.com/wp-content/uploads/2012/02/Image-virtualisation-SolucomINSIGHT2-71x34.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2012/02/Image-virtualisation-SolucomINSIGHT2.jpg 1537w" sizes="auto, (max-width: 402px) 100vw, 402px" /></a></p>
<p>Les <strong>risques &#8220;humains&#8221;</strong> (erreur, malveillance, absence de séparation des responsabilités) prédominent donc sur des risques &#8220;technologiques&#8221; relativement moins probables et pouvant être limités grâce à des recommandations classiques.</p>
<p><strong>Un projet de sécurisation de la virtualisation, c’est donc bien entendu un projet d’intégration des nouvelles technologies dans la gouvernance opérationnelle de la sécurité pour traiter les risques techniques liés à son utilisation… Mais aussi et avant tout un projet de réflexion sur les rôles, les responsabilités et les compétences de ses administrateurs, afin de traiter les principaux risques de la virtualisation, à savoir les risques humains ! </strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/02/la-virtualisation-ne-virtualise-pas-les-risques-humains/">La virtualisation ne virtualise pas les risques humains !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sécurité et réseaux sociaux : maîtriser l’exposition de l’entreprise</title>
		<link>https://www.riskinsight-wavestone.com/en/2012/01/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise/</link>
		
		<dc:creator><![CDATA[Marion Couturier]]></dc:creator>
		<pubDate>Mon, 30 Jan 2012 09:10:07 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[réseaux sociaux]]></category>
		<category><![CDATA[Risque]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=1243</guid>

					<description><![CDATA[<p>Les réseaux sociaux font partie de notre paysage quotidien : en France, 92% des internautes les utilisent tous les jours (source : TNS Sofres 2011).  Après avoir séduit des millions d’internautes, Facebook, Google+, Twitter ou encore LinkedIn poussent la porte des...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/01/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise/">Sécurité et réseaux sociaux : maîtriser l’exposition de l’entreprise</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Les réseaux sociaux font partie de notre paysage quotidien : en France, 92% des internautes les utilisent tous les jours (source : TNS Sofres 2011).  Après avoir séduit des millions d’internautes, Facebook, Google+, Twitter ou encore LinkedIn poussent la porte des entreprises qui s’engouffrent rapidement dans la brèche.</p>
<p>Les opportunités sont multiples face à des clients qui ont largement adopté ces réseaux sociaux. Gestion de la relation client, campagnes marketing ou encore recrutement sont autant d’utilisations possibles pour les différents métiers, qui sont séduits par la facilité d’utilisation de ces plates-formes.</p>
<h4>Des risques bien réels à maîtriser !</h4>
<p>Mais ces nouveaux usages amènent de nouveaux risques pour l’entreprise qui va s’exposer au travers de pages Facebook, de fils Twitter, etc. En tête de ces risques, le détournement de pages et les atteintes à l’image résultant d’une mauvaise utilisation de ces outils. Une page Facebook mal paramétrée peut aussi conduire à une usurpation d’identité, un détournement de la finalité du site… Les exemples récents de Fox News annonçant la mort d’Obama (<a href="http://www.guardian.co.uk/news/blog/2011/jul/04/fox-news-hacked-twitter-obama-dead">http://www.guardian.co.uk/news/blog/2011/jul/04/fox-news-hacked-twitter-obama-dead</a>) ou encore de Microsoft et de sa chaîne YouTube sont assez représentatifs (<a href="http://nakedsecurity.sophos.com/2011/10/23/microsofts-youtube-channel-has-been-hacked/">http://nakedsecurity.sophos.com/2011/10/23/microsofts-youtube-channel-has-been-hacked/</a>).</p>
<h4>Des projets à ne pas sous-estimer</h4>
<p>La facilité d’utilisation des réseaux sociaux par les métiers leur permet de lancer des initiatives sans aucune aide de la DSI ou du RSSI. Pourtant, il s’agit d’un projet comme un autre, même si l’outil utilisé est en libre-service ! Il est donc primordial que les équipes sécurité soient informées et qu’elles sensibilisent et appuient les métiers sur leurs actions relatives aux réseaux sociaux : guide de paramétrage d’une page, règles de gestion des accès, etc.</p>
<h4>Après la charte administrateur, la charte « Community Manager »</h4>
<p>Au-delà de l’administration « technique » du compte ou de la page, les métiers doivent être conscients de l’importance d’une animation régulière pour éviter les pages à l’abandon. Cette démarche de « community management » permet d’assurer une maîtrise du discours vers les clients et de gérer les interactions avec eux au quotidien, mais aussi d’assurer la sécurité grâce à la sensibilisation et la responsabilisation des gestionnaires de communauté sur la confidentialité du mot de passe, la gestion du contenu, des abonnés, la déconnexion, etc. Autant de thèmes qui justifient la création d’une charte des gestionnaires de réseaux sociaux au sein de l’entreprise, qui formalise leurs rôles et responsabilités.</p>
<h4>Des outils dédiés et sécurisés de gestion de communauté</h4>
<p>En complément de la charte et de la sensibilisation, des outils viennent maintenant au secours des métiers et des RSSI pour éviter les mauvaises pratiques comme le partage du mot de passe d’accès à un compte ou une page à tout le service : les cas de départs malheureux ont déjà causé des incidents visibles (<a href="http://www.webmastertalkforums.com/social-networks/75948-mark-davidson-fires-employee-twitter-account-hacked.html">http://www.webmastertalkforums.com/social-networks/75948-mark-davidson-fires-employee-twitter-account-hacked.html</a>) ! Heureusement, ces nouveaux outils de gestion de réseaux sociaux en équipe (par exemple CoTweet ou HootSuite) font enfin leur apparition et permettent de mettre en application des règles de sécurité élémentaires telles que la gestion des accès, la traçabilité, ou encore l’imputabilité des actions.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/01/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise/">Sécurité et réseaux sociaux : maîtriser l’exposition de l’entreprise</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
