<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>risks - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/risks/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/risks/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 12 Dec 2023 14:01:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>risks - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/risks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>AI: Discover the 5 most frequent questions asked by our clients!</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/#respond</comments>
		
		<dc:creator><![CDATA[Florian Pouchet]]></dc:creator>
		<pubDate>Wed, 08 Nov 2023 11:00:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[chatgpt]]></category>
		<category><![CDATA[Regulations]]></category>
		<category><![CDATA[risks]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=21818</guid>

					<description><![CDATA[<p>The dawn of generative Artificial Intelligence (GenAI) in the corporate sphere signals a turning point in the digital narrative. It is exemplified by pioneering tools like OpenAI’s ChatGPT (which found its way into Bing as “Bing Chat, leveraging the GPT-4...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/">AI: Discover the 5 most frequent questions asked by our clients!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The dawn of generative Artificial Intelligence (GenAI) in the corporate sphere signals a turning point in the digital narrative. It is exemplified by pioneering tools like OpenAI’s ChatGPT (which found its way into Bing as “Bing Chat, leveraging the GPT-4 language model) and Microsoft 365’s Copilot. These technologies have graduated from being mere experimental subjects or media fodder. Today, they lie at the heart of businesses, redefining workflows and outlining the future trajectory of entire industries.</p>
<p style="text-align: justify;">While there have been significant advancements, there are also challenges. For instance, Samsung’s sensitive data was exposed on ChatGPT by employees (the entire source code of a database download program)<a href="#_ftn1" name="_ftnref1">[1]</a>. Compounding these challenges, ChatGPT [OpenAI] itself underwent a security breach that affected over 100 000 users between June 2022 and May 2023, with those compromised credentials now being traded on the Dark web<a href="#_ftn2" name="_ftnref2">[2]</a>.</p>
<p style="text-align: justify;">At this digital crossroad, it’s no wonder that there’s both enthusiasm and caution about embracing the potential of generative AI. Given these complexities, it’s understandable why many grapple with determining the optimal approach to AI. With that in mind, the article aims to address the most representative questions asked by our clients.</p>
<h2 style="text-align: justify;"><span style="color: #732196;">Question 1: Is Generative AI just a buzz?</span></h2>
<p style="text-align: justify;">AI is a collection of theories and techniques implemented with the aim of creating machines capable of simulating the cognitive functions of human intelligence (vision, writing, moving&#8230;). A particularly captivating subfield of AI is “Generative AI”. This can be defined as a discipline that employs advanced algorithms, including artificial neural networks, to <strong>autonomously craft content</strong>, whether it’s text, images, or music. Moving on from your basic banking chatbot answering aside all your question, GenAI not only just mimics capabilities in a remarkable way, but in some cases, enhances them.</p>
<p style="text-align: justify;">Our observation on the market: the reach of generative AI is broad and profound. It contributes to diverse areas such as content creation, data analysis, decision-making, customer support and even cybersecurity (for example, by identifying abnormal data patterns to counter threats). We’ve observed 3 fields where GenAI is particularly useful.</p>
<p> </p>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-21820" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1.png" alt="" width="605" height="341" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture1-69x39.png 69w" sizes="(max-width: 605px) 100vw, 605px" /></p>
<h3> </h3>
<h3>Marketing and customer experience personalisation</h3>
<p style="text-align: justify;">GenAI offers insights into customer behaviours and preferences. By analysing data patterns, it allows businesses to craft tailored messages and visuals, enhancing engagement, and ensuring personalized interactions.</p>
<h3>No-code solutions and enhanced customer support</h3>
<p style="text-align: justify;">In today’s rapidly changing digital world, the ideas of no-code solutions and improved customer service are increasingly at the forefront. Bouygues Telecom is a good example of a leveraging advanced tools. They are actively analysing voice interactions from recorded conversations between advisors and customers, aiming to improve customer relationships<a href="#_ftn3" name="_ftnref3">[3]</a>. On a similar note, Tesla employs the AI tool “<a href="https://www.youtube.com/watch?v=1mP5e5-dujg">Air AI</a>” for seamless customer interaction, handling sales calls with potential customers, even going so far as to schedule test drives.</p>
<p style="text-align: justify;">As for coding, an interesting experiment from one of our clients stands out. Involving 50 developers, the test found that 25% of the AI-generated code suggestions were accepted, leading to a significant 10% boost in productivity. It is still early to conclude on the actual efficiency of GenAI for coding, but the first results are promising and should be improved. However, the intricate issue of intellectual property rights concerning this AI-generated code continues to be a topic of discussion.</p>
<h3>Documentary watch and research tool</h3>
<p style="text-align: justify;">Using AI as a research tool can help save hours in domains where regulatory and documentary corpus are very extensive (e.g.: financial sector). At Wavestone, we internally developed two AI tools. The first, CISO GPT, allows users to ask specific security questions in their native language. Once a question is asked, the tool scans through extensive security documentation, efficiently extracting and presenting relevant information. The second one, a Library and credential GPT, provides specific CVs from Wavestone employees, as well as references from previous engagements for the writing of commercial proposals.</p>
<p style="text-align: justify;">However, while tools like ChatGPT (which draws data from public databases) are undeniably beneficial, the game-changing potential emerges when companies tap into their proprietary data. For this, companies need to implement GenAI capabilities internally or setup systems that ensure the protection of their data (cloud-based solution like Azure OpenAI or proprietary models). <strong>From our standpoint, GenAI is worth more than just the buzz around it and is here to stay. </strong>There are real business applications and true added value, but also security risks. Your company needs to kick-off the dynamic to be able to implement GenAI projects in a secure way.</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #9727b3;"><span style="color: #732196;">Question 2: What is the market reaction to the use of ChatGPT?</span></span></h2>
<p style="text-align: justify;">To delve deeper into the perspective of those at the forefront of cybersecurity, we’ve asked our client’s CISO’s, their opinions on the implications and opportunities of GenAI. Therefore, the following graph illustrates the opinions of CISOs on this subject.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-21822" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2.png" alt="" width="601" height="279" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2.png 601w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2-411x191.png 411w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture2-71x33.png 71w" sizes="(max-width: 601px) 100vw, 601px" /></p>
<p style="text-align: justify;">Based on our survey, the feedback from the CISOs can be grouped into three distinct categories:</p>
<h3>The Pragmatists (65%)</h3>
<p style="text-align: justify;">Most of our respondents recognize the potential data leakage risks with ChatGPT, but they equate them to risk encountered on forums or during exchanges on platforms or forums such as Stack Overflow (for developers). They believe that the risk of data leaks hasn’t significantly changed with ChatGPT. However, the current buzz justifies dedicated sensibilization campaigns to emphasize the importance of not using company-specific or sensitive data.</p>
<h3>The Visionaries (25%)</h3>
<p style="text-align: justify;">A quarter of the respondents view ChatGPT as a ground-breaking tool. They’ve noticed its adoption in departments such as communication and legal. They’ve taken proactive steps to understanding its use (which data, which use cases) and have subsequently established a set of guidelines. This is a more collaborative approach to define a use case framework.</p>
<h3>The Sceptics (10%)</h3>
<p style="text-align: justify;">A segment of the market has reservations about ChatGPT. To them, it’s a tool that’s too easy to misuse, receives excessive media attention and carries inherent risks, according to various business sectors. Depending on your activity, this can be relevant when judging that the risk of data leakage and loss of intellectual property is too high compared to the potential benefits.</p>
<p> </p>
<h2><span style="color: #9727b3;"><span style="color: #732196;">Question 3: What are the risks of Generative AI?</span></span></h2>
<p style="text-align: justify;">In evaluating the diverse perspectives on generative AI within organizations, we’ve classified the concerns into four distinct categories of risks, presented from the least severe to the most critical:</p>
<h3>Content alteration and misrepresentation</h3>
<p style="text-align: justify;">Organizations using generative AI must safeguard the integrity of their integrated systems. When AI is maliciously tampered with, it can distort genuine content, leading to misinformation. This can produce biased outputs, undermining the reliability and effectiveness of AI-driven solutions. Specifically, for Large Language Models (LLMs) like GenAI, there’s a notable concern of prompt injections. To mitigate this, organizations should:</p>
<ol style="text-align: justify;">
<li>Develop a malicious input classification system that assesses the legitimacy of a user’s input, ensuring that only genuine prompts are processed.</li>
<li>Limit the size and change the format of user inputs. By adjusting these parameters, the chances of successful prompt injection are significantly reduced.</li>
</ol>
<h3>Deceptive and manipulative threats</h3>
<p style="text-align: justify;">Even if an organization decides to prohibit the use of generative AI, it must remain vigilant about the potential surge in phishing, scams and deepfake attacks. While one might argue that these threats have been around in the cybersecurity realm for some time, the introduction of generative AI intensifies both their frequency and sophistication.</p>
<p style="text-align: justify;">This potential is vividly illustrated through a range of compelling examples. For instance, Deutsche Telekom released an awareness <a href="https://www.youtube.com/watch?v=F4WZ_k0vUDM">video</a> that demonstrates the ability, by using GenAI, to age a young girl’s image from photos/videos available on social media.</p>
<p style="text-align: justify;">Furthermore, HeyGen is a generative AI software capable of dubbing <a href="https://www.youtube.com/watch?v=gQYm_aia5No">videos</a> into multiple languages while retaining the original voice. It’s now feasible to hear Donald Trump articulating in French or Charles de Gaulle conversing in Portuguese.</p>
<p style="text-align: justify;">These instances highlight the potential for attackers to use these tools to mimic a CEO’s voice, create convincing phishing emails, or produce realistic video deepfakes, intensifying detection and defence challenges.</p>
<p style="text-align: justify;">For more information on the use of GenAI by cybercriminals, consult the dedicated RiskInsight <a href="https://www.riskinsight-wavestone.com/en/2023/10/the-industrialization-of-ai-by-cybercriminals-should-we-really-be-worried/">article</a>.</p>
<h3>Data confidentiality and privacy concerns</h3>
<p style="text-align: justify;">If organizations choose to allow the use of generative AI, they must consider that the vast data processing capabilities of this technology can pose unintended confidentiality and privacy risks. First, while these models excel in generating content, they might leak sensitive training data or replicate copyrighted content.</p>
<p style="text-align: justify;">Furthermore, concerning data privacy rights, if we examine ChatGPT’s privacy policy, the chatbot can gather information such as account details, identification data extracted from your device or browser, and information entered in the chatbot (that can be used to train the generative AI)<a href="#_ftn4" name="_ftnref4">[4]</a>. According to article 3 (a) of OpenAI’s general terms and conditions, input and output belong to the user. However, since these data are stored and recorded by Open AI, it poses risks related to intellectual property and potential data breaches (as previously noted in the Samsung case). Such risks can have significant reputational and commercial impact on your organization.</p>
<p style="text-align: justify;">Precisely for these reasons, OpenAI developed the ChatGPT Business subscription, which provides enhanced control over organizational data (such as AES-256 encryption for data at rest, TLS 1.2+ for data in transit, SSO SAML authentication, and a dedicated administration console)<a href="#_ftn5" name="_ftnref5">[5]</a>. But in reality, it&#8217;s all about the trust you have in your provider and the respect of contractual commitments. Additionally, there&#8217;s the option to develop or train internal AI models using one&#8217;s own data for a more tailored solution.</p>
<h3>Model vulnerabilities and attacks</h3>
<p style="text-align: justify;">As more organizations use machine learning models, it’s crucial to understand that these models aren’t fool proof. They can face threats that affect their reliability, accuracy or confidentiality, as it will be explained in the following section.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span style="color: #9727b3;"><span style="color: #732196;">Question 4: How can an AI model be attacked?</span></span></h2>
<p style="text-align: justify;">AI introduces added complexities atop existing network and infrastructure vulnerabilities. It’s crucial to note that these complexities are not specific to generative AI, but they are present in various AI models. Understanding these attack models is essential to reinforcing defences and ensuring the secure deployment of AI. There are three main attack models (non-exhaustive list):</p>
<p style="text-align: justify;">For detailed insights on vulnerabilities in Large Language Models and generative AI, refer to the <a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/assets/PDF/OWASP-Top-10-for-LLMs-2023-v05.pdf">“OWASP Top 10 for LLM”</a> by the Open Web Application Security Project (OWASP).</p>
<h3>Evasion attacks</h3>
<p style="text-align: justify;">These attacks target AI by manipulating the inputs of machine learning algorithms to introduce minor disturbances that result in significant alterations to the outputs. Such manipulations can cause the AI model to classify inaccurately or overlook certain inputs. A classic example would be altering signs to deceive AI self-driving cars (have identify a “stop” sign into a “priority” sign). However, evasion attacks can also apply to facial recognition. One might use subtle makeup patterns, strategically placed stickers, special glasses, or specific lighting conditions to confuse the system, leading to misidentification.</p>
<p style="text-align: justify;">Moreover, evasion attacks extend beyond visual manipulation. In voice command systems, attackers can embed malicious commands within regular audio content in such a way that they’re imperceptible to humans but recognizable by voice assistants. For instance, researchers have demonstrated adversarial audio techniques targeting speech recognition systems, like those in voice-activated smart speaker systems such as Amazon’s Alexa. In one scenario, a seemingly ordinary song or commercial could contain a concealed command instructing the voice assistant to make an unauthorized purchase or divulge personal information, all without the user’s awareness<a href="#_ftn6" name="_ftnref6">[6]</a>.</p>
<h3>Poisoning</h3>
<p style="text-align: justify;">Poisoning is a type of attack in which the attacker altered data or model to modify the ML algorithm’s behaviour in a chosen direction (e.g to sabotage its results, to insert a backdoor). It is as if the attacker conditioned the algorithm according to its motivations. Such attacks are also called causative attacks.</p>
<p style="text-align: justify;">In line with this definition, attackers use causative attacks to guide a machine learning algorithm towards their intended outcome. They introduced malicious samples into the training dataset, leading the algorithm to behave in unpredictable ways. A notorious example is Microsoft’s chatbot, TAY, that was unveiled on Twitter in 2016. Designed to emulate and converse with American teenagers, it soon began acting like a far-right activist<a href="#_ftn7" name="_ftnref7">[7]</a>. This highlights the fact that, in their early learning stages, AI systems are susceptible to the data they encounter. 4Chan users intentionally poisoned TAY’s data with their controversial humour and conversations.</p>
<p style="text-align: justify;">However, data poisoning can also be unintentional, stemming from biases inherent in the data sources or the unconscious prejudices of those curating the datasets. This became evident when early facial recognition technology had difficulties identifying darker skin tones. This underscores the need for diverse and unbiased training data to guard against both deliberate and inadvertent data distortions.</p>
<p style="text-align: justify;">Finally, the proliferation of open-source AI algorithms online, such as those on platforms like Hugging Face, presents another risk. Malicious actors could modify and poison these algorithms to favour specific biases, leading unsuspecting developers to inadvertently integrate tainted algorithms into their projects, further perpetuating biases or malicious intents.</p>
<h3>Oracle attacks</h3>
<p style="text-align: justify;">This type of attack involves probing a model with a sequence of meticulously designed inputs while analysing the outputs. Through the application of diverse optimization strategies and repeated querying, attackers can deduce confidential information, thereby jeopardizing both user privacy, overall system security, or internal operating rules.</p>
<p style="text-align: justify;">A pertinent example is the case of Microsoft’s AI-powered Bing chatbot. Shortly after its unveiling, a Stanford student, Kevin Liu, exploited the chatbot using a prompt injection attack, leading it to reveal its internal guidelines and code name “Sidney”, even though one of the fundamental internal operating rules of the system was to never reveal such information<a href="#_ftn8" name="_ftnref8">[8]</a>.</p>
<p style="text-align: justify;">A previous RiskInsight <a href="https://www.riskinsight-wavestone.com/en/2023/06/attacking-ai-a-real-life-example/">article</a> showed an example of Evasion and Oracle attacks and explained other attack models that are not specific to AI, but that are nonetheless an important risk for these technologies.</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #732196;">Question 5: What is the status of regulations? How is generative AI regulated?</span></h2>
<p style="text-align: justify;">Since our <a href="https://www.riskinsight-wavestone.com/en/2022/06/artificial-intelligence-soon-to-be-regulated/">2022 article</a>, there has been significant development in AI regulations across the globe.</p>
<h3 style="text-align: justify;">EU</h3>
<p style="text-align: justify;">The EU’s digital strategy aims to regulate AI, ensuring its innovative development and use, as well as the safety and fundamental rights of individuals and businesses regarding AI. On June 14, 2023, the European Parliament adopted and amended the proposal for a regulation on Artificial Intelligence, categorizing AI risks into four distinct levels: unacceptable, high, limited, and minimal<a href="#_ftn9" name="_ftnref9">[9]</a>.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-21824" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3.png" alt="" width="605" height="322" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3-359x191.png 359w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture3-71x39.png 71w" sizes="(max-width: 605px) 100vw, 605px" /></p>
<h3 style="text-align: justify;">US</h3>
<p style="text-align: justify;">The White House Office of Science and Technology Policy, guided by diverse stakeholder insights, presented the “Blueprint for an AI Bill of Rights”<a href="#_ftn10" name="_ftnref10">[10]</a>. Although non-binding, it underscores a commitment to civil rights and democratic values in AI’s governance and deployment.</p>
<h3 style="text-align: justify;">China</h3>
<p style="text-align: justify;">China’s Cyberspace Administration, considering rising AI concerns, proposed the Administrative Measures for Generative Artificial Intelligence Services. Aimed at securing national interests and upholding user rights, these measures offer a holistic approach to AI governance. Additionally, the measures seek to mitigate potential risks associated with Generative AI services, such as the spread of misinformation, privacy violations, intellectual property infringement, and discrimination. However, its territorial reach might pose challenges for foreign AI service providers in China<a href="#_ftn11" name="_ftnref11">[11]</a>.</p>
<h3 style="text-align: justify;">UK</h3>
<p style="text-align: justify;">The United Kingdom is charting a distinct path, emphasizing a pro-innovation approach in its National AI Strategy. The Department for Science, Innovation &amp; Technology released a white paper titled “AI Regulation: A Pro-Innovation Approach”, with a focus on fostering growth through minimal regulations and increased AI investments. The UK framework doesn’t prescribe rules or risk levels to specific sectors or technologies. Instead, it focuses on regulating the outcomes AI produces in specific applications. This approach is guided by five core principles: safety &amp; security, transparency, fairness, accountability &amp; governance, and contestability &amp; redress<a href="#_ftn12" name="_ftnref12">[12]</a>.</p>
<h3 style="text-align: justify;">Frameworks</h3>
<p style="text-align: justify;">Besides formal regulations, there are several guidance documents, such as NIST’s AI Risk Management Framework and ISO/IEC 23894, that provide recommendations to manage AI-associated risks. They focus on criteria aimed at trusting the algorithms in fine, and this is not just about cybersecurity! It’s about trust.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-21826" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4.png" alt="" width="605" height="340" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4.png 605w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/11/Picture4-69x39.png 69w" sizes="auto, (max-width: 605px) 100vw, 605px" /></p>
<p> </p>
<p style="text-align: justify;">With such a broad regulatory landscape, organizations might feel overwhelmed. To assist, we suggest focusing on key considerations when integrating AI into operations, in order to setup the roadmap towards being compliant.</p>
<ul style="text-align: justify;">
<li><strong>Identify all existing AI systems</strong> within the organization and establish a procedure/protocol to identify new AI endeavours.</li>
<li><strong>Evaluate AI systems</strong> using criteria derived from reference frameworks, such as NIST.</li>
<li><strong>Categorize AI systems according to the AI Act’s classification</strong> (unacceptable, high, low or minimal).</li>
<li><strong>Determine the tailored risk management approach</strong> for each category.</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><span style="color: #732196;">Bonus Question: This being said, what can I do right now?</span></h2>
<p style="text-align: justify;">As the digital landscape evolves, Wavestone emphasizes a comprehensive approach to generative AI integration. We advocate that every AI deployment undergo a rigorous sensitivity analysis, ranging from outright prohibition to guided implementation and stringent compliance. For systems classified as high risk, it’s paramount to apply a detailed risk analysis anchored in the standards set by ENISA and NIST. While AI introduces a sophisticated layer, foundational IT hygiene should never be side lined. We recommend the following approach:</p>
<ul style="text-align: justify;">
<li><span style="color: #732196;"><strong><em>Pilot &amp; Validate:</em></strong></span> Begin by gauging the transformative potential of generative AI within your organizational context. Moreover, it’s essential to understand the tools at your disposal, navigate the array of available choices, and make informed decisions based on specific needs and use cases.</li>
<li><span style="color: #732196;"><strong><em>Strategic Insight:</em></strong> </span>Based on our client CISO survey, ascertain your ideal AI adoption intensity. Do you resonate with the 10%, 65% or 25% adoption benchmarks shared by your industry peers?</li>
<li><span style="color: #732196;"><strong><em>Risk Mitigation: </em></strong></span>Ground your strategy in a comprehensive risk assessment, proportional to your intended adoption intensity.</li>
<li><span style="color: #732196;"><strong><em>Policy Formulation:</em> </strong></span>Use your risk-benefit analysis as a foundation to craft AI policies that are both robust and agile.</li>
<li><span style="color: #732196;"><strong><em>Continuous Learning &amp; Regulatory Vigilance:</em> </strong></span>Maintain an unwavering commitment to staying updated with the evolving regulatory landscape. Both locally and globally, it’s crucial to stay informed about the latest tools, attack methods, and defensive strategies.</li>
</ul>
<p style="text-align: justify;"><a href="#_ftnref1" name="_ftn1">[1]</a>  <a href="https://www.rfi.fr/fr/technologies/20230409-des-donn%C3%A9es-sensibles-de-samsung-divulgu%C3%A9s-sur-chatgpt-par-des-employ%C3%A9s">Des données sensibles de Samsung divulgués sur ChatGPT par des employés (rfi.fr)</a></p>
<p style="text-align: justify;"><a href="#_ftnref2" name="_ftn2">[2]</a> <a href="https://www.phonandroid.com/chatgpt-100-000-comptes-pirates-se-retrouvent-en-vente-sur-le-dark-web.html">https://www.phonandroid.com/chatgpt-100-000-comptes-pirates-se-retrouvent-en-vente-sur-le-dark-web.html</a></p>
<p style="text-align: justify;"><a href="#_ftnref3" name="_ftn3">[3]</a> <a href="https://www.cio-online.com/actualites/lire-bouygues-telecom-mise-sur-l-ia-generative-pour-transformer-sa-relation-client-14869.html">Bouygues Telecom mise sur l&#8217;IA générative pour transformer sa relation client (cio-online.com)</a></p>
<p style="text-align: justify;"><a href="#_ftnref4" name="_ftn4">[4]</a> <a href="https://www.bitdefender.fr/blog/hotforsecurity/quelles-donnees-chat-gpt-collecte-a-votre-sujet-et-pourquoi-est-ce-important-pour-votre-confidentialite-numerique/">Quelles données Chat GPT collecte à votre sujet et pourquoi est-ce important pour votre vie privée en ligne ? (bitdefender.fr)</a></p>
<p style="text-align: justify;"><a href="#_ftnref5" name="_ftn5">[5]</a> <a href="https://www.lemondeinformatique.fr/actualites/lire-openai-lance-un-chatgpt-plus-securise-pour-les-entreprises-91387.html">OpenAI lance un ChatGPT plus sécurisé pour les entreprises &#8211; Le Monde Informatique</a></p>
<p style="text-align: justify;"><a href="#_ftnref6" name="_ftn6">[6]</a> <a href="https://ieeexplore.ieee.org/document/8747397">Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System | IEEE Journals &amp; Magazine | IEEE Xplore</a></p>
<p style="text-align: justify;"><a href="#_ftnref7" name="_ftn7">[7]</a> <a href="https://www.washingtonpost.com/news/the-intersect/wp/2016/03/25/not-just-tay-a-recent-history-of-the-internets-racist-bots/">Not just Tay: A recent history of the Internet’s racist bots &#8211; The Washington Post</a></p>
<p style="text-align: justify;"><a href="#_ftnref8" name="_ftn8">[8]</a> <a href="https://www.phonandroid.com/microsoft-comment-un-etudiant-a-oblige-lia-de-bing-a-reveler-ses-secrets.html">Microsoft : comment un étudiant a obligé l&#8217;IA de Bing à révéler ses secrets (phonandroid.com)</a></p>
<p style="text-align: justify;"><a href="#_ftnref9" name="_ftn9">[9]</a> <a href="https://www.europarl.europa.eu/RegData/etudes/BRIE/2021/698792/EPRS_BRI(2021)698792_EN.pdf">Artificial intelligence act (europa.eu)</a></p>
<p style="text-align: justify;"><a href="#_ftnref10" name="_ftn10">[10]</a> <a href="https://www.whitehouse.gov/wp-content/uploads/2022/10/Blueprint-for-an-AI-Bill-of-Rights.pdf">https://www.whitehouse.gov/wp-content/uploads/2022/10/Blueprint-for-an-AI-Bill-of-Rights.pdf</a></p>
<p style="text-align: left;"><a href="#_ftnref11" name="_ftn11">[11]</a> <a href="https://www.china-briefing.com/news/china-to-regulate-deep-synthesis-deep-fake-technology-starting-january-2023/">https://www.china-briefing.com/news/china-to-regulate-deep-synthesis-deep-fake-technology-starting-january-2023/</a></p>
<p style="text-align: justify;"><a href="#_ftnref12" name="_ftn12">[12]</a> <a href="https://www.gov.uk/government/publications/ai-regulation-a-pro-innovation-approach/white-paper">A pro-innovation approach to AI regulation &#8211; GOV.UK (www.gov.uk)</a></p>
<p style="text-align: justify;"> </p>


<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/">AI: Discover the 5 most frequent questions asked by our clients!</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/11/ai-discover-the-5-most-frequent-questions-asked-by-our-clients/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Industrial Cybersecurity in the Age of Industry 4.0 : how can we secure these new use cases and support business projects?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/industrial-cybersecurity-in-the-age-of-industry-4-0-how-can-we-secure-these-new-use-cases-and-support-business-projects/</link>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Mon, 22 Feb 2021 13:14:51 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[industrial IS]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[use case]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15280</guid>

					<description><![CDATA[<p>Industry 4.0, a milestone in the history of the technology race Let us make a detour through a page of history, before plunging into the heart of our subject : In the 18th century, James Watt&#8217;s steam engine and coal...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/industrial-cybersecurity-in-the-age-of-industry-4-0-how-can-we-secure-these-new-use-cases-and-support-business-projects/">Industrial Cybersecurity in the Age of Industry 4.0 : how can we secure these new use cases and support business projects?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: justify;">Industry 4.0, a milestone in the history of the technology race</h2>
<p style="text-align: justify;">Let us make a detour through a page of history, before plunging into the heart of our subject :</p>
<ul style="text-align: justify;">
<li>In the 18th century, James Watt&#8217;s <strong>steam engine</strong> and coal mining changed the way of working. The use of <strong>hydraulic machines</strong> made the artisan workshops evolve into much more efficient factories: the 1st industrial revolution was in full swing.</li>
<li>Then, the 2nd industrial revolution known for <strong>Taylorism and mass production</strong> is based on the use of <strong>electricity and oil</strong>. The long assembly lines, dear to Charlie Chaplin, replace the hydraulic and steam engines that are now obsolete.</li>
<li>The development of <strong>new information technologies, from 1970 onwards,</strong> supporting operators in the most difficult tasks characterizes the 3rd industrial revolution. In particular, it allowed for increased <strong>robotization</strong> and <strong>production of larger batches</strong>.</li>
</ul>
<figure id="post-15305 media-15305" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15305 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1.png" alt="" width="1328" height="472" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1.png 1328w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1-437x155.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1-768x273.png 768w" sizes="auto, (max-width: 1328px) 100vw, 1328px" /></figure>
<p>&nbsp;</p>
<h2>This 4th industrial revolution marks the arrival of new technologies that are increasingly connected, leading to a high level of dependence on information technology.</h2>
<p style="text-align: justify;">Industry 4.0 brings together a <strong>set of technological advances and technical tools for optimising industrial processes.</strong></p>
<figure id="post-15319 media-15319" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15319 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2.png" alt="" width="1451" height="577" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2.png 1451w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2-437x174.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2-768x305.png 768w" sizes="auto, (max-width: 1451px) 100vw, 1451px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">Let&#8217;s take a concrete example of a use case:</p>
<figure id="post-15324 media-15324" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15324 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3.jpg" alt="" width="291" height="599" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3.jpg 291w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3-93x191.jpg 93w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3-19x39.jpg 19w" sizes="auto, (max-width: 291px) 100vw, 291px" /></figure>
<p style="text-align: justify;">A company needs to accelerate its production rate and to robotise part of its actions to save time. For example, screwing actions. It chooses to use a collaborative robot, also called a « cobot »<a href="#_ftn1" name="_ftnref1"><sup>[1]</sup></a>, capable of carrying out actions simultaneously or on the same workspace as an operator. The operator will be responsible for presenting the parts to be screwed to the cobot.</p>
<p style="text-align: justify;">In addition to <strong>reducing turnaround time</strong>, the implementation of this binomial makes it possible to <strong>increase the quality of the finished product.</strong></p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Industry 4.0 use cases increase the cyber risk to business processes. There are two reasons for this: the need for new interconnections of industrial systems with the outside world and the increased potential impact in the event of compromise..</h2>
<p style="text-align: justify;">What are the impacts for cybersecurity in this whole story? If we continue with this cobot, the screwing, initially done manually by an operator, is now made easier by the use of the cobot. The cobot has to be connected to receive orders and be updated.</p>
<ul style="text-align: justify;">
<li>The manual operation is replaced by a computerised operation that is now exposed to a cyber attack</li>
</ul>
<p style="text-align: justify;">On a conventional robot, a &#8220;safety cage&#8221; is present to prevent intrusion by an operator during the operation of the machine tool. On a cobot, as there is collaboration with the operator, this protection does not exist. <strong>An impact in case of contact between the cobot&#8217;s screwdriver and the operator&#8217;s hand would be particularly serious for the operator</strong> <strong>!</strong></p>
<ul style="text-align: justify;">
<li>The introduction of new technologies can increase the severity of a cyber attack</li>
</ul>
<p style="text-align: justify;">This is not the only consequence of unsafe use of such technology :</p>
<ul style="text-align: justify;">
<li>Changing a value in the cobot regarding the screwing torque can lead to <strong>a quality defect in case of incorrect tightening ;</strong></li>
<li>Greater importance of assisted operations means that in the event of a failure, the impact on production will be greater&#8230; which will quickly lead to a financial impact.</li>
</ul>
<p style="text-align: justify;">Let&#8217;s sum up a little simplistically :</p>
<p>&nbsp;</p>
<figure id="post-15327 media-15327" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15327 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4.png" alt="" width="748" height="599" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4.png 748w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4-239x191.png 239w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4-49x39.png 49w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4-155x125.png 155w" sizes="auto, (max-width: 748px) 100vw, 748px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">The question now is <strong>how to deal with these risks, without blocking the legitimate demands</strong> of operational staff. Spoiler: no, refusing the project is not the solution!</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">The teams responsible for cybersecurity can anticipate the needs for the implementation of 4.0 technologies by drawing up adapted reflex sheets</h2>
<p style="text-align: justify;">From a technical point of view, we can group the advances linked to Industry 4.0 around a few major themes: augmented reality, connected objects, additive manufacturing, etc. Upstream of projects and with a few well-informed industry players around the table, it is possible to anticipate potential demands.</p>
<p style="text-align: justify;">The objective for the cyber security team will then be to <strong>draw up a profile of typical use cases</strong>, deduce the potential risks and begin to identify appropriate security measures to respond to them. It is also an opportunity to propose <strong>&#8220;Industry 4.0&#8221; checklists to raise awareness upstream of projects.</strong></p>
<p style="text-align: justify;">Concretely, here is an example of a typical reflex card applied to our cobot seen previously :</p>
<figure id="post-15329 media-15329" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15329 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5.png" alt="" width="650" height="450" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5.png 650w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5-276x191.png 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5-56x39.png 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5-245x170.png 245w" sizes="auto, (max-width: 650px) 100vw, 650px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">By preparing upstream, cybersecurity teams are more relevant and effective when a new project is about to start.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Ready to embark on a &#8220;4.0&#8221; project? This is the ideal opportunity to support the industry in the transformation of its factory by offering adapted cyber security services.</h2>
<p style="text-align: justify;">The advantage of &#8220;Industry 4.0&#8221; projects lies in their ability to make in-depth changes to the foundations, sometimes a little dusty, of systems and networks already installed in the factory.</p>
<p style="text-align: justify;">Does a conveyor project need to exchange information with the outside world? This is an opportunity to propose a secure file exchange server in your industrial DMZ (if you don&#8217;t have one, this is also a good time to think about it). Does an augmented reality system need a more stable wireless connection? This is the time to start thinking about strengthening the control of the devices that can be connected to it…</p>
<p style="text-align: justify;">At the risk of repeating the obvious here, the ideal is to arrive upstream of the projects, through a constructive approach, rather than through a 100-page ISSP and guides to standards and technical rules that are not adapted to the cases of use presented.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">For the risk analysis of an &#8220;Industry 4.0&#8221; project, the EBIOS RM risk analysis method facilitates exchanges by sharing strategic scenarios that can be understood by the business</h2>
<p style="text-align: justify;">Once discussions have begun on a concrete project, it is useful to carry out a risk analysis to support the discussions. Its depth and method will depend on the size and risks of the project.</p>
<p style="text-align: justify;">This analysis will make it possible to refine the objectives we wish to protect, take a step back from the existing ecosystem and define the most convincing attack scenarios.</p>
<p style="text-align: justify;">Here are some examples of frequently found scenarios :</p>
<ul style="text-align: justify;">
<li><strong>Logical sabotage for financial purposes </strong>(long version of the Ransomware scenario): A targeted or non-targeted attack, making equipment unavailable for financial gain.</li>
<li><strong>Stopping/Slowing down production: </strong>Targeted sabotage to gain a competitive advantage, revenge by ideology or just by defiance can be carried out by a malicious competitor, an avenger, a terrorist, an activist or even a thrill-seeking amateur. Also be careful not to forget the errors of manipulation !</li>
<li><strong>The alteration of the quality of the part produced: </strong>rather sophisticated and targeted sabotage impacting the quality of the products to discredit the company or simply create damage.</li>
</ul>
<figure id="post-15331 media-15331" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15331 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6.png" alt="" width="847" height="144" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6.png 847w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6-437x74.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6-768x131.png 768w" sizes="auto, (max-width: 847px) 100vw, 847px" /></figure>
<p style="text-align: justify;">The conclusion of the risk analysis will make it possible to precisely define the cybersecurity measures to be put in place and the associated residual risks.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">To move away from the &#8220;fortified castle&#8221; model, i.e. to focus on the isolation of its industrial IS and perimeter security, and to propose adapted security measures: finer detection, encryption, MCS &#8230; in a way, it&#8217;s time to move on to &#8220;4.0&#8221; measures</h2>
<p style="text-align: justify;">Our feedback shows that the definition of an action plan is a balancing act in these &#8220;4.0&#8221; projects. Indeed, by applying an overly restrictive safety model, based on IEC 62443-3-3 type zones and ducts, we run the risk of misunderstanding between the stakeholders. In fact, <strong>not all business solutions are compatible or mature, and many have not yet integrated the standards we would like to see applied.</strong></p>
<p style="text-align: justify;">So what to do? One way might be to propose appropriate security measures, &#8220;4.0&#8221; measures (for the industrial environment in any case) that have already proved their worth in other environments:</p>
<ul style="text-align: justify;">
<li>To prevent a threat from spreading, one shall <strong>strengthen detection resources</strong>, especially the flows from and to industrial IS. This is the time to take advantage of this opportunity to dock with the Group SOC if it has not already done so.</li>
</ul>
<ul style="text-align: justify;">
<li>To ensure the integrity and traceability of transmitted/received data, <strong>encryption and authentication can be implemented.</strong> Do you already have a Group PKI? Why not think about extending it to industrial perimeters.</li>
</ul>
<ul style="text-align: justify;">
<li>It is also the right time to <strong>strengthen its OCM / SCM process.</strong> Is the solution connected with the outside? No more excuses for not <strong>installing an antivirus, updating it, installing security patches</strong> for your favourite OS, etc. This point should be anticipated prior to purchasing the solution, rather than once the product has already been installed!</li>
</ul>
<ul style="text-align: justify;">
<li>Finally the solution is critical for the business? A cyber-resilience component must be anticipated so that the solution can be quickly rebuilt and restarted in the event of an attack.</li>
</ul>
<p style="text-align: justify;">As we have just seen, there is no shortage of solutions, but they require adapted support from the cybersecurity teams and going beyond theoretical models. So<strong>, let&#8217;s take advantage of these &#8220;4.0&#8221; projects to make our industrial cyber security models evolve</strong> without a priori!</p>
<p>&nbsp;</p>
<p style="text-align: left;"><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://commons.wikimedia.org/wiki/File:Cobot.jpg">https://commons.wikimedia.org/wiki/File:Cobot.jpg</a> license CC : https://creativecommons.org/licenses/by-sa/4.0/deed.en</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/industrial-cybersecurity-in-the-age-of-industry-4-0-how-can-we-secure-these-new-use-cases-and-support-business-projects/">Industrial Cybersecurity in the Age of Industry 4.0 : how can we secure these new use cases and support business projects?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity issues around Smart City (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/</link>
		
		<dc:creator><![CDATA[Hervé Guillou-Hely]]></dc:creator>
		<pubDate>Wed, 15 Apr 2020 09:00:51 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[architecture]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[smart city]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12966</guid>

					<description><![CDATA[<p>In a previous article, we saw that the Smart City was inducing a paradigm shift which, combined with the general public&#8217;s high expectations on the security of its data, required adapting the approach to such a project. Indeed, as the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/">Cybersecurity issues around Smart City (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>In a previous </em><a href="https://www.riskinsight-wavestone.com/en/2020/03/cybersecurity-issues-around-smart-city-1-2/"><em>article</em></a><em>, we saw that the Smart City was inducing a paradigm shift which, combined with the general public&#8217;s high expectations on the security of its data, required adapting the approach to such a project. Indeed, as the Smart City develops, urban activity becomes more and more dependent on its services, increasing not only its security needs, but also the interest of cyber attackers. Based on these observations, the challenge will therefore be to identify a new approach to take account of Cyber ​​Security risks and, if not completely eliminate them, to reduce them. This is the purpose of this second article.</em></p>
<p>&nbsp;</p>
<h2>Building a Smart City project with Cybersecurity</h2>
<p>It is essential to integrate cyber security aspects from the start of a Smart City project. Indeed, carrying it out later in the project may prove to be more complex and expensive, with the risk of not dealing with it / not being able to deal with all the risks.</p>
<p>This requires <strong>rethinking the organization of the project regarding data and security governance</strong>: security principles must be defined at the global project level and considered by each of the sub-projects composing the Smart City, depending on their constraints. This is particularly true as Smart Cities involve many actors with different core businesses, means and cybersecurity maturity. A global and shared vision is essential to ensure that each element processes the data with the appropriate level of security.</p>
<p>It is then necessary <strong>to define the main principles of architecture and interoperability</strong>, according to the constraints inherent to the Smart City, related to Edge Computing and the deployment of objects in a hostile environment. System resilience must be at the heart of safety requirements, as the fall or compromise of one element should not cause the entire system to fall.</p>
<p>To this end, common <strong>standards</strong> must be adopted, based on specific frameworks such as ETSI or OneM2M. These increase the chances of maintaining scalable interoperable systems. More generally, the NIST or the ISO 27002 standard are proven Cybersecurity frameworks on which it would be interesting to rely.</p>
<p>The development mode must be <a href="https://www.riskinsight-wavestone.com/en/2019/07/cybersecurity-in-an-agile-world/">agile</a>, integrating a long-term vision to anticipate new use cases, and with short milestones in order to quickly deliver the first services. <strong>Cybersecurity must be included in the development process</strong>, by defining Evil User Stories, enabling risks to be identified and considered each time services or the information system evolves, and by appointing cybersecurity experts in a support and validation role.</p>
<p>&nbsp;</p>
<figure id="post-12967 media-12967" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12967 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1.png" alt="" width="1740" height="571" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1.png 1740w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-437x143.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-768x252.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1536x504.png 1536w" sizes="auto, (max-width: 1740px) 100vw, 1740px" /></figure>
<p>&nbsp;</p>
<p>Defining and maintaining a satisfactory level of security will, more than ever, require the rigorous integration of security in all phases of the project, which may lead to greater but necessary human and technological investments.</p>
<p>&nbsp;</p>
<h2>Protecting critical and regulated data</h2>
<p>Given the propensity of the Smart City to collect and process large amounts of data, their protection will primarily involve <strong>identifying critical data and assets.</strong></p>
<p>&nbsp;</p>
<figure id="post-12969 media-12969" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12969 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2.png" alt="" width="1340" height="661" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2.png 1340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-387x191.png 387w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-768x379.png 768w" sizes="auto, (max-width: 1340px) 100vw, 1340px" /></figure>
<p>&nbsp;</p>
<p>Most of the services offered by the Smart City are aimed at citizens. Therefore, personal and potentially sensitive data will be collected. Furthermore, a loss of availability or integrity of certain services could have serious repercussions since some components of the IS have a direct hold on the physical world. <strong>Smart Cities are not exempt from regulations</strong>, in particular the General Data Protection Regulations (GDPR), but also, depending on usage, from the General Security Regulations (GSR), the Military Programming Law (MPL) or the Network and Information Security (NIS) directive, whose data protection requirements will have to be integrated into the programs.</p>
<p>Levels of data sensitivity classification must therefore be formalized in order to enable the prioritization of actions and the setting up of an appropriate framework for the processing of critical data such as encryption and anonymization.</p>
<p>The problem of access to data should also be raised. There are many actors in the Smart City and it will be necessary to segment the &#8220;vision&#8221; they may have of the IS. This will involve a preliminary phase of defining the authorization profiles, necessary to respect the principle of least privilege, combined with a regular review of their assignments to ensure that they are still legitimate.</p>
<p>&nbsp;</p>
<h2>Operating in trusted environments</h2>
<figure id="post-12971 media-12971" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12971 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4.png" alt="" width="1612" height="203" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4.png 1612w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-437x55.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-71x9.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-768x97.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-1536x193.png 1536w" sizes="auto, (max-width: 1612px) 100vw, 1612px" /></figure>
<p>&nbsp;</p>
<p>The Smart City project will necessarily rely on <strong>different technical and organizational foundations</strong>. If these bases are to the Information System what foundations are to a house, it is easy to understand that it will be difficult to build anything if this base is fragile.</p>
<p>As always, these technical bases must be covered by fundamental security measures: implementation of trust bubbles, hardening of systems, patch management, securing of privileged accounts and their use, etc.</p>
<p>Furthermore, an information system with a large attack area such as the Smart City will necessarily have to break with the traditional security model known as &#8220;castle security&#8221;, by relying more on aspects of partitioning and access control of the data itself. The conformity of assets within the information system will have to be continuously evaluated using common configuration and hardening frameworks. Exposed systems and applications must be subject to controls and audits, particularly during the development phase, but also during the operational phase.</p>
<p>In addition, business continuity and disaster recovery will have to be at the heart of the security strategy. Plans will have to be formalized, but also tested, including both technical considerations such as the resilience of different systems, with the ability to restore systems independently of each other, and organizational considerations through crisis management exercises.</p>
<p>Finally, as Smart City involves many players, all stakeholders should ensure the implementation of significant means in the protection of the information systems involved and comply with the requirements of the project&#8217;s security policy. To do this, they will have to be contractually committed, at the very least by including security requirements in contracts, but also by formalizing and implementing security assurance plans, particularly for the most critical service providers. Regular controls may be commissioned to ensure that the security level is maintained over time and to address future risk scenarios.</p>
<p>&nbsp;</p>
<h2>Detecting, reacting and sharing</h2>
<p>The Smart City cannot do without <strong>a service to detect and deal with security incidents.</strong></p>
<p>It will be necessary to collect traces of activity on the systems and look for weak signals. In view of the large number of events to be processed, it will be essential to define the risks to be guarded against and to rely on correlation solutions to facilitate these searches. The use of automation tools will allow a first sorting of false positives, facilitating the work of analysts in the qualification of security alerts.</p>
<p>The detection and response service can be built using the PDIS and PRIS standards. Qualified external suppliers may be used for these two services as required.</p>
<p>The use of <strong>Cyber Threat Intelligence services</strong> will bring a significant efficiency gain in the creation and enrichment of SOC detection rules. Indeed, it will be possible to adopt a proactive detection posture by monitoring attacks that have targeted Smart Cities and the operating modes used. This will also have the advantage of improving the efficiency of the response service by saving precious investigation time.</p>
<p>Finally, the process of handling significant and major security incidents cannot be carried out without the formalization of a <strong>crisis management unit</strong>, composed of actors with well-defined roles and trained for this exercise. Particular attention will be paid to the external communication system, since the &#8220;severity&#8221; of a crisis depends as much on the event that caused it as on how it is perceived by the outside world.</p>
<p>&nbsp;</p>
<figure id="post-12973 media-12973" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12973" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3.png" alt="" width="1647" height="873" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3.png 1647w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-768x407.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1536x814.png 1536w" sizes="auto, (max-width: 1647px) 100vw, 1647px" /></figure>
<p>&nbsp;</p>
<p>In conclusion, and as we have seen through these two articles, the Smart City is a self-evident development in an era where demographic, ecological and economic issues are all intertwined. Its promises are seductive, but the implementation framework may give rise to some fears.</p>
<p>As with any digital transformation, ensuring a level of security in line with the challenges of the project will necessarily involve identifying the vulnerabilities and security risks it generates.</p>
<p><strong>In the era of cyber-warfare and cyber-threats</strong>, the Smart City should be considered as a Digital Service Provider, within the meaning of the NIS directive, and be protected by security measures adapted to this status.</p>
<p>The provision of secure services, respectful of their users&#8217; data, is a sine qua non condition for the success of a Smart City project, the benefits of which will only be matched by the magnitude of the impact of a successful cyberattack.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/">Cybersecurity issues around Smart City (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
