<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>shake&#039;up - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/shakeup/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/shakeup/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 09 Feb 2021 18:26:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>shake&#039;up - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/shakeup/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hackuity &#124; Shake&#8217;Up &#8211; The future of vulnerability management: towards new approaches based on risk and prioritization (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shakeup-the-future-of-vulnerability-management-towards-new-approaches-based-on-risk-and-prioritization-2-2/</link>
		
		<dc:creator><![CDATA[Patrick Ragaru]]></dc:creator>
		<pubDate>Mon, 15 Feb 2021 07:00:24 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[hackuity]]></category>
		<category><![CDATA[prioritization]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[shake'up]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15143</guid>

					<description><![CDATA[<p>We have recently opened the contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hackuity rethinks vulnerability management with a platform that collects, standardizes and orchestrates automated and manual security assessment practices and enriches them with Cyber Threat...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shakeup-the-future-of-vulnerability-management-towards-new-approaches-based-on-risk-and-prioritization-2-2/">Hackuity | Shake&#8217;Up &#8211; The future of vulnerability management: towards new approaches based on risk and prioritization (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>We have recently opened the contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hackuity rethinks vulnerability management with a platform that collects, standardizes and orchestrates automated and manual security assessment practices and enriches them with Cyber Threat Intelligence data sources, technical context elements and business impacts. Hackuity enables you to leverage your existing vulnerability detection arsenal, to prioritize the most important vulnerabilities, to save time on low-value tasks and reduce remediation costs, to gain access to a comprehensive and continuous view of the company&#8217;s security posture, and to meet compliance obligations.</em></p>
<p><em>After having seen in a first article the state of the threat and the current issues related to vulnerability management, we will see in this second article the new approaches to be considered to better manage vulnerabilities, in particular through the prioritization of vulnerability remediation proposed by Hackuity.</em></p>
<p>&nbsp;</p>
<h2>The advent of Risk-Based Vulnerability Management (RBVM)</h2>
<p>Risk Based Vulnerability Management (RBVM) is an approach that treats each vulnerability according to the risk it represents for each company.</p>
<p>In this context, the classic formula for calculating a risk applies:</p>
<p>&nbsp;</p>
<figure id="post-15089 media-15089" class="align-none"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-15089" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.1.png" alt="" width="943" height="57" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.1.png 943w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.1-437x26.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.1-71x4.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.1-768x46.png 768w" sizes="(max-width: 943px) 100vw, 943px" /></figure>
<p>&nbsp;</p>
<p>The first part of the formula, vulnerability × threat, can also be considered as a probability. This probability describes the chances that a given vulnerability will be discovered and used by a threat actor in the specific technical context of the organization.The last part of the formula describes the consequences, or impact, of a successful attack by a threat actor in the company&#8217;s business context.</p>
<p>This is in synthesis the approach adopted by CVSS, a standard developed by FIRST (Forum of Incident Response and Security Teams), initially to quantify the technical severity of a vulnerability. Through 3 metrics (basic, temporal, environmental), the full CVSS score (now in its version 3.1) is supposed to reflect the real risk of each vulnerability, in the context of each company.</p>
<p>&nbsp;</p>
<figure id="post-15091 media-15091" class="align-none"><img decoding="async" class="wp-image-15091 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-5.png" alt="" width="721" height="275" /></figure>
<p style="text-align: center;">Source: FIRST (<a href="https://www.first.org/cvss/specification-document">https://www.first.org/cvss/specification-document</a>)</p>
<p>&nbsp;</p>
<p>Our purpose here is not to describe CVSS, so we assume that the reader is familiar with the concept. The CVSS score has <strong>many advantages</strong>, among the main ones:</p>
<ul>
<li>The only standard on the market available to quantify the criticality of a vulnerability,</li>
<li>A detailed and transparent algorithm,</li>
<li>A scoring widely adopted by the industry,</li>
<li>Several world-wide reference databases available (in particular to qualify the criticality of CVE).</li>
</ul>
<p>However, it has many limitations, the main ones of which can be listed here:</p>
<ol>
<li><span style="text-decoration: underline;">Its low granularity:</span> each of the metrics is composed of categorical values with predetermined values (e.g., low, medium, high) which limits its discrimination capabilities.</li>
<li><span style="text-decoration: underline;">Its vocation to unitarily qualify vulnerabilities:</span> it is thus impossible to evaluate the criticality of a complete attack scenario with CVSS. For example, some cyber-attacks exploit several low vulnerabilities to compromise an entire perimeter. However, the CVSS assessment will only cover each of the vulnerabilities independently; it is necessary for the auditor to present a global scenario to highlight the overall risk, and they cannot rely solely on CVSS to do so since it was not designed to be aggregated.</li>
<li><span style="text-decoration: underline;">Its arbitrary nature:</span> the weights in the algorithm sometimes seem to be composed of <span style="text-decoration: underline;">arbitrary figures</span> making the interpretation of these values complex. In the end, there is sometimes a significant margin of error in the CVSS quantification of the same vulnerability by two professionals.</li>
</ol>
<p>On the other hand, should it be reminded, the public CVSS scores, such as those referenced in the NVD, are only <strong>base scores</strong>. They represent the intrinsic criticality of a vulnerability, but do not reflect the risk that this vulnerability represents for the company. In other words, they answer the question “Is it dangerous?” but not “Is it dangerous for my company right now?”.</p>
<p>Effective vulnerability management must take into account not only the base score, but also temporal and environmental metrics. The FIRST provides the framework, but the NIST cannot compute the CVSS score for the enterprise, as it requires knowledge of the criticality of the assets, identification of controls in place, the exploitability of the vulnerability in this specific context, or the intensity of the actual and current threat.</p>
<p>In the field, however, we note that nearly 45% of the companies surveyed &#8211; of all sizes &#8211; only use the CVSS base score as the sole metric for quantifying the criticality of vulnerabilities.</p>
<p>Beyond the relevance of this approach, the use of this single metric does not solve the major problem of the industry, which remains the <strong>volume of vulnerabilities to be addressed.</strong></p>
<p>&nbsp;</p>
<figure id="post-15093 media-15093" class="align-none"><img decoding="async" class=" wp-image-15093 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-6.png" alt="" width="635" height="413" /></figure>
<p>&nbsp;</p>
<p>Of the 123,454 vulnerabilities (CVE) identified as of 01/15/2020, more than 16K had a CVSS base score (V2.0) deemed critical (i.e., more than 13% of the total).</p>
<p>&nbsp;</p>
<h2>Beyond CVSS ?</h2>
<p>The objective of prioritization is therefore to reduce the stock of vulnerabilities by discriminating the most critical in order to allow the teams and means of remediation to focus on the vulnerabilities that matter the most.</p>
<p>&nbsp;</p>
<figure id="post-15106 media-15106" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15106 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-7.png" alt="" width="1337" height="309" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-7.png 1337w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-7-437x101.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-7-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-7-768x177.png 768w" sizes="auto, (max-width: 1337px) 100vw, 1337px" /></figure>
<p>&nbsp;</p>
<p>On the other hand, there is no doubt that the daily flood of new vulnerabilities brought up by the detection arsenal <strong>can no longer be managed manually</strong>. It is totally unrealistic to manually examine, analyze and prioritize all identified vulnerabilities.</p>
<p><strong>Automation</strong> should enable teams to work more efficiently, reducing repetitive and/or low value-added manual tasks and processes.</p>
<p>To meet these needs and respond to the limitations of CVSS, the RBVM players are introducing:</p>
<ul>
<li>New risk metrics (scores) &#8211; proprietary &#8211; that complete, overload or replace CVSS,</li>
<li>Automation of analysis and measurement tasks, including correlation with threat sources (CTI) to continuously qualify the threat intensity associated with each vulnerability.</li>
</ul>
<p>More generally, the RBVM approach takes into account numerous evaluation metrics to establish a score based on context and threat. There seems to be a consensus on 4 main categories of criteria:</p>
<h3>1/ The vulnerability or the individual &#8211; intrinsic &#8211; characteristics of the vulnerability itself.</h3>
<p>Through these criteria, the aim is to measure the severity of a vulnerability by taking into account metrics that are constant over time and regardless of the environment, such as the privileges required to exploit the vulnerability or its attack vector (remotely, on the same local network, with physical access, etc.).</p>
<p>For this category, the CVSS base score (generally taken in its version 2.0 to ensure anteriority) is a solid starting point for analyzing the intrinsic criticality of the vulnerability. This is the score used by most solutions on the market.</p>
<h3>2/ The external threats that will be used to quantify the current intensity of the threat associated with each vulnerability.</h3>
<p>The metrics used reflect characteristics that may change over time but not from one technical environment to another.</p>
<p>“Is the vulnerability associated with hot topics on discussion forums, the darknet and social networks? Does it have an exploitation mechanism been published or is it currently being exploited by a particularly virulent ransomware?”</p>
<p>The availability of an “exploit” associated with a vulnerability is, for example, an important factor taken up by most risk-based vulnerability management solutions. According to a Tenable Research study, <strong>76% of vulnerabilities with a CVSS baseline score &gt; 7 do not have an exploit available.</strong></p>
<p>&nbsp;</p>
<figure id="post-15108 media-15108" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15108 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-8.png" alt="" width="728" height="310" /></figure>
<p style="text-align: center;">Source: (<a href="https://fr.tenable.com/research">https://fr.tenable.com/research</a>)</p>
<p>&nbsp;</p>
<p>This means that companies that are focusing on fixing all their vulnerabilities with a “high” or “critical” risk according to CVSS would spend three thirds of their time filling in holes that ultimately represent little risk. For better operational efficiency, it is therefore appropriate to focus remediation efforts on vulnerabilities for which an exploit has already been released.</p>
<p>&nbsp;</p>
<figure id="post-15110 media-15110" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15110 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-9.png" alt="" width="852" height="358" /></figure>
<p>&nbsp;</p>
<p>But this is far from being the only relevant criteria. Without known exploit, the age of the vulnerability can be taken into account to compute its probability of exploitation, using a statistical approach based on the occurrences of exploitation measured. Some initiatives such as EPSS (Exploit Prediction Scoring System<a href="#_ftn1" name="_ftnref1">[1]</a> ) even try to predict the “weaponization” of vulnerabilities.</p>
<p>Like the age of the vulnerability, the age of the exploit is also a factor that will highly influence the probability of exploitation. For example, the CVE exploitation rate skyrockets as soon as an exploit is published, and then progressively decreases.</p>
<p>More generally, the threat intensity is an important metric in the prioritization algorithm. Beyond statistical approaches, it can be measured by monitoring CTI sources, social networks or various publications, such as quantifying the number of occurrences of these vulnerabilities in cybercriminal forum discussions. It will thus be possible to determine that a new or particularly active malware exploits a vulnerability and therefore to increase its criticality score.</p>
<p>Many other indicators can be integrated to refine the relevance of vulnerability prioritization. The Hackuity solution takes into account more than 10 criteria in addition to the CVSS metrics to compute its “True Risk Score”:</p>
<p>&nbsp;</p>
<figure id="post-15112 media-15112" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15112 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-10.png" alt="" width="1310" height="629" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-10.png 1310w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-10-398x191.png 398w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-10-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-10-768x369.png 768w" sizes="auto, (max-width: 1310px) 100vw, 1310px" /></figure>
<p>&nbsp;</p>
<p>In addition to the relevance of the choice of these criteria and the algorithm itself, the type and quality of the CTI sources monitored to continuously feed these metrics represent an important issue.</p>
<p>Some of the sources used include the numerous open sources (OSINT) on vulnerabilities and threats (NIST-NVD, Exploit-db, Metasploit, Vuldb, PacketStorm, &#8230;), some of which are consolidated through open-source initiatives such as VIA4CVE (<a href="https://github.com/cve-search/VIA4CVE">https://github.com/cve-search/VIA4CVE</a>).</p>
<p>There are also a large number of private and commercial players offering CTI feeds with virous levels of specialization in vulnerability intelligence.</p>
<h3>3/ The technical context or the unique characteristics of the environment in which the asset is located.</h3>
<p>This category is used to measure the probability / difficulty to exploit a vulnerability in the specific context of each organization.</p>
<p>“Is the asset exposed on the Internet or hidden somewhere in the company&#8217;s datacenter? What are the technical measures (protection, detection) that make it more or less vulnerable to attacks?”</p>
<p>If some market actors just determine that an asset is exposed on the Internet based on its IP addressing scheme, others like Hackuity will seek to measure the depth of the attack trees needed to exploit the vulnerability in the company&#8217;s IS.</p>
<p>These characteristics are by definition specific to each environment. It is therefore necessary to have, take from, or determine such information, in particular by feeding the prioritization formula with contextual data linked to the assets. For example, the data may exist and therefore be extracted from internal repositories.</p>
<h3>4/ The business criticality of the asset.</h3>
<p>This involves measuring the consequences, or impact, of a successful attack by a threat player in the business context of the company.</p>
<p>“Is the asset impacted by the vulnerability critical to the organization in one way or another? Does it host sensitive or nominative information? What are the impacts for the company in terms of financial, reputation or compliance if the vulnerability is exploited?”</p>
<p>As much as for the technical context, these characteristics are specific to each environment. They may be manually entered or derived from risk analysis results such as Business Impact Analyses.</p>
<p>To conclude on RBVM, whatever the degree of automation brought by the Solution, it will only take its full strength with the contribution of contextual elements that the tool cannot guess (business impacts, technical environment of the assets, organization, processes, etc.).</p>
<p>&nbsp;</p>
<h2>Beyond RBVM: Vulnerability Prioritization Technologies (VPTs)</h2>
<p>While the major market leaders in vulnerability detection have adopted a risk-based approach to Vulnerability Management, they have not addressed the main problem associated with the “best-of-breed” approach to detection: companies use multiple detection tools and practices to ensure complete and effective coverage of their technical perimeter.</p>
<p>&nbsp;</p>
<figure id="post-15114 media-15114" class="align-none"><img loading="lazy" decoding="async" class="wp-image-15114 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-11.png" alt="" width="746" height="270" /></figure>
<p style="text-align: center;">Average number of detection tools by company size / Hackuity &#8211; Panel of 93 companies</p>
<p>&nbsp;</p>
<p>As mentioned above, this necessary use to a heterogeneous arsenal promotes a fragmented and unconsolidated view of the situation, which limits the ability to scale and, with the growing volume of vulnerabilities, leads to an explosion of costs.</p>
<p>To address this problem, emerging market players named VPTs (Vulnerability Prioritization Technologies) by Gartner, such as Hackuity, agnostically exploit existing sources of vulnerability.</p>
<p>They collect and centralize vulnerabilities from any company&#8217;s detection arsenal: multiple practices (pentest, bug-bounty, red team, etc.), vulnerability detection solution providers (vulnerability scans, SAST, DAST, IAST, SCA, etc.) and vulnerability watch feeds. The main features of VPT solutions are described below.</p>
<p>&nbsp;</p>
<figure id="post-15116 media-15116" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15116 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-12.png" alt="" width="1298" height="384" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-12.png 1298w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-12-437x129.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-12-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-12-768x227.png 768w" sizes="auto, (max-width: 1298px) 100vw, 1298px" /></figure>
<p style="text-align: center;">Functional diagram of the Hackuity solution</p>
<p>&nbsp;</p>
<h3>A comprehensive view of the state of the stock of vulnerabilities</h3>
<p>Automating the collection of vulnerabilities enables security teams to have, sometimes for the first time, a consolidated and centralized view of the company&#8217;s stock of vulnerabilities, regardless of the solutions or detection practices implemented.</p>
<p>A crucial operation &#8211; and one that is very rarely performed &#8211; is the conversion of proprietary formats into a normalized format. This allows clones of the same vulnerability, which have been identified by several sources, to de deduplicated (e.g. the same SQL injection identified during an intrusion test and during a vulnerability scan).</p>
<p>As such, Hackuity&#8217;s vulnerability’s meta-repository is a multilingual knowledge base that provides a unified and standardized description of all vulnerabilities, including corrective actions, patches, remediation costs, or exploitability, with no loss of information from the original source.</p>
<h3>The establishment and enrichment of an inventory of assets</h3>
<p>In the field, there are only rare exceptions of companies that have an inventory of their assets that is considered complete or at least reliable (CMDB, ITAM, &#8230;). This is an endemic problem in the practice and sometimes the main obstacle to the implementation of an efficient vulnerability management policy in companies. In order to solve this problem, some solutions integrate into their operations the <strong>dynamic and continuous establishment of the repository of the company&#8217;s assets</strong> inventory. This inventory is established by analyzing and correlating the technical data collected (e.g. the software stack installed on a server, its various aliases, etc.) and provides an asset database that is continuously kept up to date with data from multiple sources.</p>
<p>Asset criticality is also a key element in the vulnerability risk measurement process and accounts for nearly 50% in a prioritization approach. Without an accurate inventory of assets and an assessment of their criticality in the company&#8217;s business environment, it is impossible to accurately compute the real risk associated with each vulnerability. Some solutions, such as Hackuity, will compensate for the absence or non-completeness of risk analyses by <strong>automatically assessing the criticality of assets</strong> based on their technical and operational properties (types and families of tools installed, density of interconnections, hosted databases, etc.).</p>
<p><strong>In the end, to have consolidated information about vulnerabilities or the company’s assets, you no longer need to master dozens of tools or formats: the cost and workload associated with managing disparate tools is significantly reduced.</strong></p>
<h3>The missing link between detection and remediation of vulnerabilities</h3>
<p>Finally, the bidirectional link with the teams in charge of remediation or security supervision provides a collaborative approach in managing the stock of vulnerabilities.</p>
<p>Indeed, while automation has become a key lever for vulnerability management, the human factor remains at the heart of the process.</p>
<p>In most companies, Vulnerability Management involves 3 actors who must work together:</p>
<ol>
<li>The security teams in charge of operating the detection tools and managing remediation plans,</li>
<li>The business managers who arbitrate or clarify the remediation plans in the light of business constraints,</li>
<li>Operational staff in charge of deploying corrective measures (patch management, configuration, development, etc.).</li>
</ol>
<p>&nbsp;</p>
<p>&nbsp;</p>
<figure id="post-15118 media-15118" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15118 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-13.png" alt="" width="1336" height="579" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-13.png 1336w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-13-437x189.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-13-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-13-768x333.png 768w" sizes="auto, (max-width: 1336px) 100vw, 1336px" /></figure>
<p>&nbsp;</p>
<p>The efficiency of the process is therefore not limited to the automation of vulnerability collection. In the downstream part of the process (remediation management), play-books can be used to mobilize the resources needed to implement corrective measures: identification of the person in charge of the task, automatic creation of incident tickets, generation of scripts for Infrastructure as Code solutions, etc.</p>
<p>Upstream, the CISO finally has, and often for the first time, a real-time perception of the progress of remediation plans.</p>
<p>The vulnerability management solution is then the <strong>orchestrator of the ecosystem</strong> of solutions aiming at detecting, qualifying, correcting and monitoring vulnerabilities affecting the company.</p>
<p>&nbsp;</p>
<figure id="post-15120 media-15120" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15120 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-14.png" alt="" width="792" height="511" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-14-295x191.png 295w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-14-60x39.png 60w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-14-768x497.png 768w" sizes="auto, (max-width: 792px) 100vw, 792px" /></figure>
<p>&nbsp;</p>
<p>Designed as an open system, it also allows third party tools and processes (SIEM, GRC, Compliance, Forensics, &#8230;) to be fed with consolidated and structured data on vulnerabilities, assets and threats affecting the business.</p>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p>As a true cornerstone of corporate cyber security, vulnerability management can finally be synonymous with a scalable, effective practice for which it is now possible to have factual indicators reflecting the efforts made by security teams and teams in charge of remediation.</p>
<p>Besides the direct impact on the company&#8217;s security posture, through a reduction in the vulnerability exploitation window, or even the mobilization of experts on high added-value tasks, the integration of a vulnerability management orchestration solution can also have indirect benefits, such as better understanding the information system thanks or even a tenfold increase in the commitment of the teams thanks to the quantification of the impact of their actions on the company&#8217;s security.</p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://arxiv.org/pdf/1908.04856.pdf">https://arxiv.org/pdf/1908.04856.pdf</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shakeup-the-future-of-vulnerability-management-towards-new-approaches-based-on-risk-and-prioritization-2-2/">Hackuity | Shake&#8217;Up &#8211; The future of vulnerability management: towards new approaches based on risk and prioritization (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackuity &#124; Shake&#8217;Up &#8211; The future of vulnerability management: threat status and current issues in vulnerability management (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shake-up-the-future-of-vulnerability-management-threat-status-and-current-issues-in-vulnerability-management-1-2/</link>
		
		<dc:creator><![CDATA[Patrick Ragaru]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 07:00:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[#vulnerability]]></category>
		<category><![CDATA[hackuity]]></category>
		<category><![CDATA[patching]]></category>
		<category><![CDATA[shake'up]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15135</guid>

					<description><![CDATA[<p>We have recently opened the contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hackuity rethinks vulnerability management with a platform that collects, standardizes and orchestrates automated and manual security assessment practices and enriches them with Cyber Threat...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shake-up-the-future-of-vulnerability-management-threat-status-and-current-issues-in-vulnerability-management-1-2/">Hackuity | Shake&#8217;Up &#8211; The future of vulnerability management: threat status and current issues in vulnerability management (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>We have recently opened the contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hackuity rethinks vulnerability management with a platform that collects, standardizes and orchestrates automated and manual security assessment practices and enriches them with Cyber Threat Intelligence data sources, technical context elements and business impacts. Hackuity enables you to leverage your existing vulnerability detection arsenal, to prioritize the most important vulnerabilities, to save time on low-value tasks and reduce remediation costs, to gain access to a comprehensive and continuous view of the company&#8217;s security posture, and to meet compliance obligations.</em></p>
<p>&nbsp;</p>
<h2>What are we talking about?</h2>
<p>ISO 27005 defines a <strong>vulnerability</strong> as “<em>a weakness of an asset or group of assets that can be exploited by one or more cyber threats where an asset is anything that has value to the organization, its business operations and their continuity, including information resources that support the organization&#8217;s mission</em>”. For the SANS Institute, <strong>vulnerability management</strong> is “<em>the process in which vulnerabilities in IT are identified and the risks of these vulnerabilities are evaluated. This evaluation leads to correcting the vulnerabilities and removing the risk or a formal risk acceptance by the management of an organization</em>”. Over time, Vulnerability Management has become a fundamental practice in cybersecurity, and now all industry professionals would agree to say that it is an essential process for minimizing the company&#8217;s attack surface.</p>
<p>&nbsp;</p>
<figure id="post-15081 media-15081" class="align-none"><img loading="lazy" decoding="async" class="wp-image-15081 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-1.jpg" alt="" width="675" height="571" /></figure>
<p style="text-align: center;">Source: <a href="https://blogs.gartner.com/augusto-barros/2019/10/25/new-vulnerability-management-guidance-framework/">https://blogs.gartner.com/augusto-barros/2019/10/25/new-vulnerability-management-guidance-framework/</a></p>
<p>&nbsp;</p>
<p>Nowadays, vulnerability management is integrated into all the major security frameworks, standards, sector regulations, guides and good security practices (ISO, PCI-DSS, GDPR, Basel agreements, French LPM, NIS, etc.) and is even regulatory in some contexts. Every “good” corporate security policy includes a significant chapter on this topic. Many would consider that a necessary evil.</p>
<p>&nbsp;</p>
<h2>Vulnérabilités : état de la menace</h2>
<p>However, in 2019, according to a study conducted by the Ponemon Institute<a href="#_ftn1" name="_ftnref1">[1]</a>, “<em>60% of security incidents were [still] the consequence of exploiting a vulnerability that is known but not yet corrected by companies”</em>. To illustrate the current extent of the phenomenon, let&#8217;s consider ransomwares, the main cyber threat of 2020 and probably 2021. Although ransomwares are generally spread through user-initiated actions, such as clicking on a malicious link in a spam or visiting a compromised website, a large proportion of ransomwares also exploits computer vulnerabilities. Thus, if we look at the top-5 most virulent 2020 ransomwares ranked by intel471<a href="#_ftn2" name="_ftnref1">[2]</a>, we can see that their “kill-chains” all exploit vulnerabilities (CVE).</p>
<table style="border-collapse: collapse; width: 100%; height: 868px;">
<tbody>
<tr style="height: 45px;">
<td style="width: 16.6667%; height: 45px; text-align: center;">Ransomware Name</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">First known occurrence</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">Known exploited CVE</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">CVE publication date</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">Patch / workaround</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">CVSS V2.0 Score</td>
</tr>
<tr style="height: 211px;">
<td style="width: 16.6667%; height: 211px; text-align: center;" width="123">Maze(aka ChaCha)</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="123">05-2019</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="123">CVE-2018-15982CVE-2018-4878</p>
<p>CVE-2019-11510</p>
<p>CVE-2018-8174</p>
<p>CVE-2019-19781</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="113">18/01/201906/02/2018</p>
<p>08/05/2019</p>
<p>05/09/2018</p>
<p>27/12/2019</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="85">12-201802-2018</p>
<p>04-2019</p>
<p>08-2018</p>
<p>12-2019</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="76">107.5</p>
<p>7.5</p>
<p>7.6</p>
<p>7.5</td>
</tr>
<tr style="height: 133px;">
<td style="width: 16.6667%; height: 133px; text-align: center;" width="123">REvil(aka Sodinokibi)</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="123">04-2019</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="123">CVE-2018-8453CVE-2019-11510</p>
<p>CVE-2019-2725</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="113">10/10/201808/05/2019</p>
<p>26/04/2019</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="85">10-201805-2019</p>
<p>04-2019</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="76">7,27,5</p>
<p>7,5</td>
</tr>
<tr style="height: 173px;">
<td style="width: 16.6667%; height: 173px; text-align: center;" width="123">Netwalker</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="123">09-2019</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="123">CVE-2015-1701CVE-2017-0213</p>
<p>CVE-2020-0796</p>
<p>CVE-2019-1458</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="113">21/04/201512/05/2017</p>
<p>12/03/2020</p>
<p>10/12/2019</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="85">05-201505-2017</p>
<p>03-2020</p>
<p>12-2019</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="76">7,21.9</p>
<p>7,5</p>
<p>7.2</td>
</tr>
<tr style="height: 212px;">
<td style="width: 16.6667%; height: 212px; text-align: center;" width="123">Ryuk</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="123">08-2018</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="123">CVE-2013-2618CVE-2017-6884</p>
<p>CVE-2018-8389</p>
<p>CVE-2018-12808</p>
<p>CVE-2020-1472</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="113">05/06/201406/04/2017</p>
<p>15/08/2018</p>
<p>29/08/2018</p>
<p>17/08/2020</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="85">*-201404-2017</p>
<p>08-2018</p>
<p>08-2018</p>
<p>08-2020</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="76">4,39,0</p>
<p>7,6</p>
<p>7,5</p>
<p>9,3</td>
</tr>
<tr style="height: 94px;">
<td style="width: 16.6667%; height: 94px; text-align: center;" width="123">DopplePaymer</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="123">04-2019</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="123">CVE-2019-1978CVE-2019-19781</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="113">05/11/201927/12/2019</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="85">*-201901-2020</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="76">5,07,5</td>
</tr>
</tbody>
</table>
<p style="text-align: center;">Source: Hackuity &amp; National Vulnerability Database (<a href="https://nvd.nist.gov/">https://nvd.nist.gov/</a>)</p>
<p>&nbsp;</p>
<p>It is worth noticing that such vulnerabilities have often been referenced by the NIST when the ransomware first appeared, sometimes for several years. Moreover, patches or workarounds have often been released in most cases. A recent CheckPoint<a href="#_ftn3" name="_ftnref1">[3]</a> study confirms that the <strong>oldest vulnerabilities are always the most exploited.</strong> In mid-2020, more than 80% of the cyberattacks identified used a vulnerability published before 2017 and more than 20% of these attacks even exploited a vulnerability that had been known for more than 7 years.</p>
<p>&nbsp;</p>
<figure id="post-15083 media-15083" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15083 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-2.png" alt="" width="722" height="334" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2.png 1196w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2-413x191.png 413w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2-768x355.png 768w" sizes="auto, (max-width: 722px) 100vw, 722px" /></figure>
<p>&nbsp;</p>
<p>This highlights the importance &#8211; even today &#8211; of rapid installation of security patch as a defense mechanism to minimize cyber risks. Therefore, it’s not surprising that Vulnerability Management &#8211; one of the oldest practices in cybersecurity &#8211; remains one of the major 2021 CISO challenges for Wavestone<a href="#_ftn4" name="_ftnref1">[4]</a>. Does this mean that we should try to correct all the vulnerabilities? Let&#8217;s go back in time.</p>
<p>&nbsp;</p>
<h2>« Vulnerability Assessment » vs. « Vulnerability Management »</h2>
<p>When they first appeared on the market at the end of the 1990s, the vulnerability management solutions worked similarly to an antivirus: the objective was to detect as many potential threats as possible. They were more commonly referred to as “vulnerability scanners”.</p>
<p>The volume of vulnerabilities then was relatively low compared to today. In 2000, the NVD identified about 1,000 new vulnerabilities over the year, compared to more than 18,000 in 2020.</p>
<p>A comprehensive and manual treatment of vulnerabilities was still possible at that time. Scanners provided a list of vulnerabilities, their relevance in the business context was analyzed by IT teams and a report was sent to business managers. Once the report was approved, administrators would fix the vulnerabilities and re-test to ensure that patches were properly implemented.</p>
<p>&nbsp;</p>
<figure id="post-15085 media-15085" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15085 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-3.png" alt="" width="522" height="365" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.png 832w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-273x191.png 273w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-56x39.png 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-768x537.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-245x170.png 245w" sizes="auto, (max-width: 522px) 100vw, 522px" /></figure>
<p style="text-align: center;">Source : National Vulnerability Database (<a href="https://nvd.nist.gov/">https://nvd.nist.gov/</a>)</p>
<p>&nbsp;</p>
<p>Over the next two decades, the number of discovered vulnerabilities has increased steadily at first, then started to skyrocket in 2017, a trend that is still continuing today. In 2020, a record of more than 18,000 new vulnerabilities were published by the NIST. But no, the code quality is not worse than ever! There are several reasons behind the growing number of vulnerabilities being disclosed:</p>
<ol>
<li>Innovation and the accelerated digitization of business lead to an increase in published hardware and software products. In 2010, the NIST recorded 22,188 new entries in its CPE repository, including 1,332 new products and 406 publishers. In 2020, 324,810 entries (+1,460 %), 35,794 new products (+2,690 %) and 6,060 publishers (+1,490%) have appeared in the repository.</li>
<li>Demand for faster time-to-market is driving vendors to shorten development cycles to release and sell products faster, even if it means saving on resources needed for quality assurance and security testing.</li>
<li>Cybercrime has become a lucrative business. A growing number of vulnerabilities are now attributed to cybercriminals seeking new tools to support their attacks.</li>
<li>At the same time, the number of experts and independent organizations involved in the research and disclosure of vulnerabilities is increasing. The democratization and industrialization of <a href="https://www.riskinsight-wavestone.com/en/2021/01/bug-bounty-insight-and-benchmark-on-the-banking-industry-2021/">Bug-Bounty programs</a> are not unrelated to this.</li>
<li>And finally, with rare exceptions such as GDPR, in the lack of adequate legislation and regulations to protect consumer rights in the event of software vulnerabilities, the industry has no incentive to invest in safer products nor take responsibility for the damage caused.</li>
</ol>
<p>However, <strong>the problem is not only the higher number of vulnerabilities identified in the NVD databases or other repositories.</strong> With the advent of ultra-mobility, home-office, cloud-computing, social media, IoT, but also the convergence between IT and OT, Information Systems have continued to become more complex and to expand, open up and multiply the number of their suppliers, &#8230;creating as many potential new entry points for cybercriminals.</p>
<p>At the same time, companies are deploying and operating a vulnerabilities detection arsenal that is continually growing and has become more mature in recent years, or even commoditized:</p>
<ul>
<li>Intrusion tests &amp; red-teams,</li>
<li>Vulnerability scanners: on the entire external and/or internal park</li>
<li>Vulnerability Watch</li>
<li>SAST, DAST &amp; SCA: often directly integrated into development pipelines</li>
<li>Bounty Bug Campaigns</li>
</ul>
<p>All these detection practices are complementary and generally stacked in a best-of-breed approach to evaluate specific parts of the IS or SDLC. Unfortunately, it is often once the arsenal in place that the problems are obvious (non-exhaustive list):</p>
<ul>
<li><strong>The heterogeneity in the deliverables’ formats:</strong> pentest reports in PDF or Excel files, results of scans in the tool own console, vulnerabilities on the bug bounty platform, &#8230;, often force the company to adopt a siloed Vulnerability Management approach. It’s the same for vulnerability scores, which in the end turns out to be a patchwork of CVSS and its multiple versions, proprietary scales and a clever (J) mix of the two.</li>
<li>This results in the <strong>inability to prioritize remediation efforts</strong> globally due to a fragmented and heterogeneous perception of vulnerabilities stock.</li>
<li>Managing <strong>volumes of data that have become far too large to be processed manually</strong>: it is not uncommon for a company that performs authenticated scans on its fleet to see the volume of vulnerabilities exceed several million entries in the scanner&#8217;s console.</li>
<li><strong>Difficulty in coordinating remediation actions:</strong> identification of the asset owner and the holder of a share, exchange of e-mails, progress monitoring, Excel reporting, etc&#8230;</li>
<li>The frustration of the teams in charge of remediation, <strong>who do not have factual reporting</strong> reflecting the remediation effort on the company&#8217;s overall security posture.</li>
</ul>
<p>Facing these problems, companies have no choice but to work on the implementation of processes that are often costly because they rely on manual actions, the development of ad-hoc tooling or an assembly of bits and pieces of solutions gleaned here and there. The lack of automation of this process is all the more absurd since it generally mobilizes rare and expensive cyber security experts on low-value tasks such as compiling data in Excel, endlessly searching for the right stakeholder or tracking email threads.</p>
<p>In its study “<em>Cost and consequences of gaps in vulnerability management responses</em>” (2019), the Ponemon institute estimates that companies with more than 10,000 employees spent an average of more than <strong>21,000 hours (or nearly 12 FTEs)</strong> in 2019 on the prevention, detection and treatment of vulnerabilities. This represents a total of more than $1M for a very disappointing quality/price ratio.</p>
<h2>The « patching paradox »</h2>
<p>In theory, the best way to stay protected is to keep each system up to date by correcting each new vulnerability, as soon as it is identified. IRL, this task has become impossible due to the volume of vulnerabilities too large, the human or financial resources too limited, the existence of legacy systems, and the time of availability of the fix or operational constraints on patch deployment.</p>
<p>Ultimately, no matter how large or small an organization may be, it will never have enough human or financial resources to address all of its vulnerabilities. In fact, the mistaken belief that more people dedicated to addressing vulnerabilities equals better security is called the “Patching Paradox” in the industry.</p>
<p>To reduce the pressure to increase staff at a time when there is a shortage of qualified security experts, and to prevent Vulnerability Management from becoming a frantic and lost race to fix more and more vulnerabilities, organizations today need to determine which ones of their vulnarabilities should be addressed first.</p>
<p>&nbsp;</p>
<p><em>After having seen in this first article the threat status and the current issues related to the management of vulnerabilities, we will see in a second article the new approaches to be taken into account to better manage vulnerabilities.</em></p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> Ponemon Institute &#8211; Cost and consequences of gapes in vulnerability management responses &#8211; 2019</p>
<p><a href="#_ftnref2" name="_ftn1">[2]</a> <a href="https://intel471.com/blog/ransomware-as-a-service-2020-ryuk-maze-revil-egregor-doppelpaymer/">https://intel471.com/blog/ransomware-as-a-service-2020-ryuk-maze-revil-egregor-doppelpaymer/</a></p>
<p><a href="#_ftnref3" name="_ftn1">[3]</a> <a href="https://www.checkpoint.com/downloads/resources/cyber-attack-trends-report-mid-year-2020.pdf">https://www.checkpoint.com/downloads/resources/cyber-attack-trends-report-mid-year-2020.pdf</a></p>
<p><a href="#_ftnref4" name="_ftn1">[4]</a> <a href="https://www.wavestone.com/fr/insight/radar-rssi-quelles-priorites-2021/">https://www.wavestone.com/fr/insight/radar-rssi-quelles-priorites-2021/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shake-up-the-future-of-vulnerability-management-threat-status-and-current-issues-in-vulnerability-management-1-2/">Hackuity | Shake&#8217;Up &#8211; The future of vulnerability management: threat status and current issues in vulnerability management (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Citalid &#124; Shake Up &#8211; Cyber Threat Intelligence for optimizing cyber budgets</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/cyber-threat-intelligence-for-optimizing-cyber-budgets/</link>
		
		<dc:creator><![CDATA[Maxime Cartan]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 17:48:01 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[citalid]]></category>
		<category><![CDATA[CTI]]></category>
		<category><![CDATA[FAIR]]></category>
		<category><![CDATA[finance]]></category>
		<category><![CDATA[investment]]></category>
		<category><![CDATA[optimization]]></category>
		<category><![CDATA[quantification]]></category>
		<category><![CDATA[shake'up]]></category>
		<category><![CDATA[startups]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14585</guid>

					<description><![CDATA[<p>Citalid is a French tech startup founded in 2017 that provides CISOs and Risk Managers with a software for quantifying and managing cyber risk. Citalid&#8216;s highly innovative technology enables its clients to benefit from simulations, metrics and recommendations that are...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/cyber-threat-intelligence-for-optimizing-cyber-budgets/">Citalid | Shake Up &#8211; Cyber Threat Intelligence for optimizing cyber budgets</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><em>Citalid</em></strong><em> is a French tech startup founded in 2017 that provides CISOs and Risk Managers with a software for quantifying and managing cyber risk. <strong>Citalid</strong>&#8216;s highly innovative technology enables its clients to benefit from simulations, metrics and recommendations that are directly operational to optimize their ROSI (Return On Security Investments) thanks to its unique ability to cross-reference technical, contextual and financial data. <strong>Citalid</strong> is part of Wavestone&#8217;s startup acceleration programme, Shake&#8217;Up.</em></p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14516 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2.png" alt="" width="1082" height="378" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2.png 1082w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2-437x153.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/citalid-2-768x268.png 768w" sizes="auto, (max-width: 1082px) 100vw, 1082px" /></p>
<p><strong><em> </em></strong></p>
<p>For the time being less well known and less widespread in Europe than its sisters <strong>EBIOS RM &amp; Mehari</strong> (among others), the FAIR risk analysis method nevertheless fills the gaps left by other approaches. Already highlighted by <strong>Wavestone</strong> in a <a href="https://www.riskinsight-wavestone.com/en/2020/10/cyber-risk-quantification-understanding-the-fair-methodology/">previous article</a>, its main assets lie in the perspective of data usually ignored by traditional risk analysis on the one hand, and on the other hand in its ability to generate metrics dedicated to strategic decision support and adapted to the language of decision-makers, such as <em>Value at Risk</em>.</p>
<p>Nevertheless, as this same article points out, this approach is a priori undermined by time, human resources and the multiplicity of knowledge required to carry it out. Therefore, although the concept is attractive, is it realistic to deploy the <strong>FAIR</strong> method? How can its nomenclature be translated operationally? What about its automation? More generally, does it provide enough added value to justify its use?</p>
<p>Despite its undeniable effectiveness in quantifying risks, such an approach requires both an appropriate technical system and functional support, which is essential in the collection of data. Quantifying its potential financial losses in the event of a cyber incident is not enough: it is also necessary to have the capacity to put them into perspective in an ecosystem of polymorphous and evolving threats. This is <strong>Citalid</strong>&#8216;s innovation: to be able to carry out a dynamic quantification of cyber risk for decision-makers, by automatically crossing the reality of the threat that weighs on a company, its business context and its defensive maturity. And, above all, not to stop at analysis alone: to generate an action plan that reflects the optimal balance between efficiency and profitability.</p>
<p>&nbsp;</p>
<h2>Empiricism as FAIR&#8217;s automation framework</h2>
<h3>Contextualizing the external environment</h3>
<p>As in any analysis, the objectivity of the observation increases with the number of parameters considered. If it is frequent, even usual, that the internal context of an information system is studied, it is rarer for the analyst to be interested in all the external dynamics that can influence the analysis. These dynamics, which can take on a variety of realities as we shall see, can however strongly influence the frequency and intensity of cyber threats. However, it is difficult to draw up an exhaustive typology of these data, and taking them into account is almost systematically a mixture of two ingredients:</p>
<ul>
<li>Curiosity and the logical mind of the analyst (<em>in fine</em>, his capacity to project himself into / adapt to a context);</li>
<li>The good visibility of the person(s) responsible for the system and the activities within their perimeters;</li>
</ul>
<p>Among the exogenous criteria that can influence the risk analysis are: the competitive environment, the company&#8217;s position on its market, its geographical locations, geopolitical dynamics, internal policies, the normative framework, the socio-economic climate, the diversity of its activities, etc.</p>
<p>However, it would be easy to get lost in this labyrinth of criteria. It is therefore necessary to support the decision-maker in the creation of a cartography of its environment in the most comprehensive sense of the term. It is therefore through exchange and collective intelligence that a first level of filter is created, by drawing up a perimeter of analysis that is both structured and flexible.</p>
<p>While defining the perimeter of the analysis makes it possible to establish a coherent framework, a multitude of risks can nevertheless be inserted into it. It should also be noted that the defined perimeter can itself be a component of a broader scope of analysis. In this sense, the various perimeters determined can be articulated in the form of a hierarchical tree, often tracing the internal organisation of the company (see diagram below).</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14452 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1.png" alt="" width="601" height="433" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1.png 601w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-265x191.png 265w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-54x39.png 54w" sizes="auto, (max-width: 601px) 100vw, 601px" /></p>
<p>&nbsp;</p>
<p>Thus, in the example opposite, the group level is represented by the &#8220;<em>Energy Company</em>&#8221; perimeter, which aggregates the risk of all its &#8220;children&#8221; perimeters (here its &#8220;<em>business units</em>&#8220;). However, each perimeter has its own context and risks. This tree structure plays a predominant role in the construction of a relevant library of related risk scenarios. One could easily be tempted to go back up to the group level to globalize its scenarios, but this often <em>de facto</em> deteriorates the granularity, and therefore the quality, of the analysis due to the particularities of each perimeter.</p>
<p>&nbsp;</p>
<h3>Build a relevant library of scenarios</h3>
<p>This framing work therefore conditions the choice and parameterisation of risk scenarios. This parameterisation and the resulting calculation is made complex by the number of criteria to be taken into account and the uncertainty inherent in cyber risk. Without going back over the FAIR methodology already discussed on this blog, it can therefore be long and tedious to build a large number of scenarios of risk while considering the specificities of each perimeter. A solution to this problem therefore lies in the construction of a library of scenarios that can be adapted to each business context and encompass several types of threats. Based on operators&#8217; experience and accumulated data, Citalid now has several libraries of scenarios and losses, listed in &#8216;Business&#8217; directories. These are easily exportable on the platform, while retaining a degree of flexibility that allows the scenarios indicated to adapt very precisely to the business context. Following on from the use-case used above, the image below illustrates a &#8216;fictitious&#8217; library of scenarios related to the Energy sector. As this is a &#8216;Demo&#8217; version, this panel is however not exhaustive.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14454 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2.png" alt="" width="1862" height="629" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2.png 1862w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-437x148.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-768x259.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-2-1536x519.png 1536w" sizes="auto, (max-width: 1862px) 100vw, 1862px" /></p>
<p>&nbsp;</p>
<p><strong>Citalid</strong>&#8216;s library of scenarios is thus part of a double dynamic that at first sight seems contradictory: capable of meeting the requirements of efficiency and automation of the analysis, it remains flexible enough to be implemented with precision and relevance in any context. Each typology of threat, combined with the characteristics of the perimeter analyzed, determines the frequency of occurrence and the financial losses, whether primary or secondary, inherent in the chosen scenario. In the case of an economic espionage scenario, for example, it is safe to say that there will systematically be a loss related to the remediation of the incident, a loss related to the exfiltration of data and a loss resulting from damage to the entity&#8217;s reputation if the attack were to become public.</p>
<p>In addition, for the quantitative parameters (frequency of the threat, IS resistance to the attack, frequency and magnitude of losses, targeted assets, etc.) of the scenario to remain relevant, they must be profiled on the characteristics of the target perimeter. Therefore, Citalid&#8217;s expertise lies in part in defining and keeping up to date &#8211; cyber threats and available abacus evolving rapidly &#8211; a library of <em>templates</em> from which the analyst must be able to draw to easily and automatically initiate his risk assessment.</p>
<p>Accumulating data on cyber threats and their impacts therefore makes it possible to calibrate scenario &#8220;templates&#8221; and thus gradually automate the <strong>FAIR</strong> analysis. By combining threat intelligence, technical models and abacuses from open source analysis and customer feedback to assist analysts, <strong>Citalid</strong>&#8216;s award-winning innovation platform leverages collective intelligence to ensure scientific rigor and unparalleled accuracy in quantifying financial losses.</p>
<p>&nbsp;</p>
<h2>Putting risks in perspective with the defense ecosystem</h2>
<h3>The CISO as pilot of his IS</h3>
<p>In terms of cybersecurity management, the CISO is, unsurprisingly, the focal point of the system. To do this, he must be able to quickly visualize the entire panorama of cyber risks weighing on his IS &#8211; a &#8220;cockpit&#8221; view, in order to then inflect orientations on a larger scale. He therefore needs a GPS to guide him in his decisions: how to take his IS from point A (current risk situation) to point B (desired risk exposure), taking care to optimize his trajectory (cyber investments) while avoiding obstacles (threats) that appear dynamically along the way.</p>
<p><strong> </strong></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14456 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3.png" alt="" width="1877" height="818" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3.png 1877w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-768x335.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-3-1536x669.png 1536w" sizes="auto, (max-width: 1877px) 100vw, 1877px" /></p>
<p style="text-align: center;">Example of a <em>risk dashboard</em>, illustrating the ISSM&#8217;s cockpit vision<strong>. </strong></p>
<p>&nbsp;</p>
<p>Once the various scenarios have been established and the quantification carried out, the difficulty lies in the possibility of translating these &#8220;raw&#8221; risks into a strategic roadmap. The first step is to put these risks into perspective by comparing them with the current defensive infrastructure of the IS. Knowledge of its environment is a prerequisite for the CISO&#8217;s analysis. All the more so as, in terms of defensive infrastructure, two major options exist and sometimes complement each other: opting for a logic of defensive maturity based on compliance with one or more reference systems (ISO 27k, NIST, CIS, etc.) or carrying out &#8211; and then comparing with peers &#8211; an inventory and evaluation of all the security solutions deployed on the perimeter.</p>
<p>&#8220;A permanent confrontation between theory and experience is a necessary condition for the expression of creativity&#8221; [1]. 1] The aphorism could not be more revealing of the method described here: that of the confrontation between theory (raw risks) and experience (evaluation of defensive maturity based on a multitude of feedback and incidents) as a necessary condition for the creation of a roadmap. The confrontation makes it possible to obtain the &#8220;net&#8221; risk with which the company is really confronted, lower than the gross risk since it considers the defenses of the IS.</p>
<p>Fueled by &#8220;actionable&#8221; metrics, the decision-maker will now be able to have visibility on his real risk in his own language, and consequently be able to arbitrate and determine its destination &#8211; his B point &#8211; according to his appetite for risk and the company&#8217;s policy. Which scenarios should be dealt with by investing to reduce the associated risk? Which ones should be maintained, given their low economic impact? Which ones to share with a cyber insurer? However, as we will see, the modelling of net risk described in the previous paragraph requires a consequent knowledge of the threat ecosystem in which it is embedded.</p>
<p>&nbsp;</p>
<h3>Cyber Threat Intelligence, a catalyst for optimal risk management</h3>
<p>One of the main shortcomings of risk management in cybersecurity is the difficulty in deploying an approach that reflects the reality of the risk &#8220;on the ground&#8221;. The CISO or Risk Manager must therefore also have a radar to dynamically detect obstacles in his path (threats) and, as far as possible, anticipate and prevent impediments.</p>
<p>Thus, just as a rock slide on a road is the result of a conjunction of multiple factors (weather conditions, geological characteristics, human activity, etc.), an attacker&#8217;s action depends on many elements. These elements should, as far as possible, be observed and included in the risk analysis. Consequently, Cyber Threat Intelligence (CTI), a discipline dedicated to the study and contextualization of attackers&#8217; operating modes, enriches and energizes traditional risk analyses. The mastery and inclusion of this discipline in cyber risk management is one of Citalid&#8217;s major differentiators and permeates its entire corporate culture.</p>
<p>How can CTI data be operationally and sustainably combined with the risk calculations announced in the previous paragraph? We can get an intuition of this by noting the following three facts:</p>
<ul>
<li>The company&#8217;s market segment helps to determine the operating methods most likely to be of interest to the company;</li>
<li>The attack techniques used by these operating methods and their centers of interest within the targeted information systems make it possible to identify the most critical assets and to know how to improve their protection;</li>
<li>By comparing again the CTI data defined in the two previous points with its defensive infrastructure, the entity can identify which scope (in the sense of a security repository) or which defense solution is not cost-effective enough (reduction of the risk in relation to the cost).</li>
</ul>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14458 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4.png" alt="" width="1190" height="519" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4.png 1190w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-4-768x335.png 768w" sizes="auto, (max-width: 1190px) 100vw, 1190px" /></p>
<p>&nbsp;</p>
<p>The diagram above represents a concrete example of the application of CTI to risk analysis, acting as a real catalyst for drawing up guidelines. A modus operandi is technically expressed through its &#8220;Kill Chain&#8221;, i.e. the sequence of attack techniques it uses to achieve its objective. Citalid has mapped the links between these TTPs (Tactics-Techniques-Procedures) and specific points of different security reference systems (here the CIS20), the latter being the defensive measures best adapted to the TTPs defined in the diagram. On the first line, for example, the CIS 16.3 measure (among others) is sufficiently deployed at the target entity to limit the impact of the TTPs indicated at this stage of the Kill Chain. On the second line, on the other hand, the opposite occurs: the CIS 11.1 measure is not mature enough to provide effective protection against the sophistication of the attacker.  It is therefore on this line that the defender potentially needs to concentrate.</p>
<p>The last line crystallizes the interests of the enrichment of the analysis by the CTI. The yellow square determines the maturity progression due to the implementation of security solutions relevant to the CIS 11.1 measure (e.g. a network device management system), which are automatically determined and recommended to the user in the case of the Citalid calculation engine. In other words, this differential indirectly expresses a path towards optimal maturity and resilience for this specific scenario, the starting point for the definition of a tailor-made cyber investment strategy.</p>
<p>&nbsp;</p>
<h2>Turning analysis into strategy</h2>
<h3>Formulate a cyber strategy aligned with group objectives</h3>
<p>A successful and relevant risk analysis is characterized by the ease with which the observer can immediately visualize how to translate data into action. It must therefore be intelligible and coherent for the recipient, whatever his or her technical level and position in the organization chart. In other words, risk analysis alone is insufficient: it can only be truly useful if it gives rise to a long-term strategy.</p>
<p>This vision, strongly oriented towards the most strategic levels, marks the very DNA of Citalid. Behind the calculation of the risks (raw and real) and the most effective recommendations (referential as solutions) thanks to CTI, the objective is to be able to propose an indicator of the return on investment (ROI) of the security solutions. By visualizing his initial position (A), his desired position (B) and the different possible paths (defense investments), the final decision-maker must be able to compare the ROI of the different options and draw up a cyber investment strategy in line with his budget and real objectives.</p>
<p>Moreover, the objective behind this singular approach is twofold. Firstly, it is a question of accompanying our clients in the definition of their cyber security strategies and in the application of a co-constructed action plan, aimed at compensating for the flaws made visible by the analysis. However, in order to keep this strategy realistic, it is essential to ensure that it can be part of a global dynamic and therefore quickly assimilated by a higher hierarchical body (COMEX). To meet this need, Citalid has refined its service so that it is in line with the realities of the CISO:</p>
<ul>
<li>By adapting the platform in terms of ergonomics, level of technicality and language, so that the dashboards are transparent and easy to interpret;</li>
<li>By assisting our clients in defining budgets and in their legitimization and justification (advocacy) in view of the reality of the threat.</li>
</ul>
<p>By aligning cybersecurity strategies with broader investment strategies, in line with the objectives set by the group, Citalid intends to guarantee and reinforce the predominant role of the CISO in steering cyber resilience.</p>
<p>&nbsp;</p>
<h3>Capitalizing on the approach through the deployment of a risk index</h3>
<p>The major advantage in choosing to take a global approach to security lies in its potential for aggregating risk at any level (group, business unit, application, project, etc.) and for standardization (comparison between perimeters and peers). Like rating agencies, this &#8220;scoring&#8221; of the entity, which takes into account not only its level of maturity on its exposed assets but also its risk management strategy, internal organization, the reality of the threat, its own business context, etc., can be transformed into a global risk index, symbol of the entity&#8217;s resilience and monitored by its management. This is truer since a scientific approach based on many heterogeneous parameters presents a desirable objectivity, for the entity as well as for its partners and collaborators.</p>
<p>This time, it is no longer just a question of positioning oneself in one&#8217;s environment, but of positioning oneself in relation to possible peers (comparison) and partners (guarantees). A risk index reflecting high resilience and sound risk management will ensure that its suppliers or end customers have optimal security and respect for their data, while reassuring investors that their funds are being used correctly.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-14460 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5.png" alt="" width="1387" height="606" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5.png 1387w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-5-768x336.png 768w" sizes="auto, (max-width: 1387px) 100vw, 1387px" /></p>
<p style="text-align: center;">Examples of risk indices produced by <strong>Citalid</strong>: in this case, a &#8216;Cyber Weather&#8217; that identifies variations in a client&#8217;s media exposure.</p>
<p>&nbsp;</p>
<p>Other players could also benefit from such an index: the insurance industry, and cyber-insurers. The quantification of cyber risk remains an obstacle for them, as traditional actuarial approaches are limited by the lack of historical cyber security data. Citalid&#8217;s model, presented here, combines threat expertise, advanced probabilistic models and innovative attack-defense simulations to overcome this lack of data. Our scoring and metrics, based on risks rather than on a simple level of defense, allow us to refine the insurance model to be as close as possible to the real needs of our clients.</p>
<p>Thus, quantifying cyber risk and the return on investment of security solutions is one of the biggest challenges facing today&#8217;s CISOs, Risk Managers and insurers. Through its innovative approach, Citalid responds to this need to reposition cyber security at the heart of corporate strategies and to optimize its action plans and investments.</p>
<p><sup>[1]</sup> Attributed to Pierre Joliot-Curie</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/cyber-threat-intelligence-for-optimizing-cyber-budgets/">Citalid | Shake Up &#8211; Cyber Threat Intelligence for optimizing cyber budgets</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hazy &#124; Shake&#8217;Up &#8211; How synthetic data could have let us prepare for this pandemic?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/hazy-shakeup-how-synthetic-data-could-have-let-us-prepare-for-this-pandemic/</link>
		
		<dc:creator><![CDATA[Jennifer Riggins]]></dc:creator>
		<pubDate>Fri, 31 Jul 2020 13:00:12 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cyber for Financial Services]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Sections]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data analysis]]></category>
		<category><![CDATA[hazy]]></category>
		<category><![CDATA[shake'up]]></category>
		<category><![CDATA[synthetic]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13992</guid>

					<description><![CDATA[<p>We are now opening contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hazy offers a synthetic data generator, combining differential confidentiality, referential integrity, multi-table database support and aerial deployment. Contingency planning. It’s what the few orgs that...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/hazy-shakeup-how-synthetic-data-could-have-let-us-prepare-for-this-pandemic/">Hazy | Shake&#8217;Up &#8211; How synthetic data could have let us prepare for this pandemic?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-14003 media-14003" class="align-none"></figure>
<p id="tw-target-text" class="tw-data-text tw-text-large XcVN5d tw-ta" dir="ltr" data-placeholder="Translation"><span lang="en">We are now opening contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hazy offers a synthetic data generator, combining differential confidentiality, referential integrity, multi-table database support and aerial deployment.</span></p>
<p dir="ltr" data-placeholder="Translation">
<p dir="ltr" data-placeholder="Translation"><img loading="lazy" decoding="async" class="size-full wp-image-14006 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Capture-1.png" alt="" width="898" height="254" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Capture-1.png 898w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Capture-1-437x124.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Capture-1-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Capture-1-768x217.png 768w" sizes="auto, (max-width: 898px) 100vw, 898px" /></p>
<p dir="ltr" data-placeholder="Translation">
<p>Contingency planning. It’s what the few orgs that are thriving during these multilayered crises have done well.</p>
<p>For those success cases, this planning started at the personnel level. From the CEO and CTO on down, these orgs asked, if a member of the staff gets sick, who is next? What if multiple key players are hospitalized at once? They logged the Internet providers and regions for all on-call engineers and created a chain of replacements if there’s an outage. These orgs made sure not only their internal and customer-facing systems have backups, but that their third-party integration partners did, too.</p>
<p>But some would call all this reacting, not planning. Or simply luck. After all, each organization and industry has its own barriers to overcome. How could any company really prepare for the unknown?</p>
<p>How could any org prepare for a global pandemic if there hasn’t been one of this magnitude for a hundred years?</p>
<p>This is where synthetic data offers an interesting opportunity to <strong>hope for the best, but prepare for the worst</strong>. Synthetic data — which is highly accurate but highly private, utterly artificial data — can allow your organization to simulate unforeseen events like pandemics and natural disasters.</p>
<p>Synthetic data allows you to contingency plan for <strong>even the unpredictable.</strong></p>
<p>&nbsp;</p>
<h2>What is synthetic data and how is it used?</h2>
<figure id="post-13993 media-13993" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-13993 alignnone" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Hazy-002.png" alt="" width="928" height="1120" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Hazy-002.png 928w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Hazy-002-158x191.png 158w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Hazy-002-32x39.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Hazy-002-768x927.png 768w" sizes="auto, (max-width: 928px) 100vw, 928px" /></figure>
<p>As its name suggests, synthetic data is completely artificial. In the case of <a href="http://hazy.com">Hazy</a>, synthetic data is generated by cutting-edge machine learning algorithms that offer certain mathematical guarantees of both utility and privacy. This is essential because <strong>no customer data is really used, while the curves or patterns of their collective profiles and behaviors are preserved.</strong></p>
<p>This is incredibly useful for breaking down barriers to innovation and testing. You can learn all the need-to-know information about your customers, demographics, and habits while dramatically decreasing the risk of re-identification. You can then easily and securely port that synthetic data and insights across different divisions, government agencies, nongovernmental organizations, and geographical restrictions. And you can quickly evaluate third-party integrations partners.</p>
<p>Since smart synthetic data retains both value and compliance, its potential is nearing limitless. It can be applied to solving some of the world’s biggest problems, from escalating international pandemic research and tracing to fairer access to banking to fraud and money laundering detection at a cross-border, cross-organizational scale. It can be used to break down boundaries and optimise cross-governmental collaboration, up until now hindered by divergent databases stuck behind regulatory walls.</p>
<p>Synthetic data allows organizations and governments <strong>to overcome both geographical and resource barriers</strong>.</p>
<p>Then that synthetic data can even be applied to events that haven’t happened yet.</p>
<p>The world’s leading organizations are starting to leverage synthetic data to build predictive scenarios in order to better respond to future economic, health, political and environmental crises.</p>
<p>It should be noted that synthetic data is not as advanced and mainstream as other enterprise tooling. Since each organization has very complex and varied datasets, they have to be transformed, pre-processed and configured in order to make them accessible to machine learning models. This means while anyone in your org can benefit from synthetic data, y<strong>our data scientists still have to be involved in this data preparation</strong>.</p>
<p>&nbsp;</p>
<h2>Synthetic data to simulate unforeseen events</h2>
<p>Synthetic data is created by g<strong>enerative machine learning models</strong>, which, in a way, can be thought of as simulators of the world.</p>
<p>Hazy synthetic data is already being used at major financial institutions for app developers to simulate realistic client behavior patterns before there are even users. This can carry over to machine learning engineers who can better model for this sort of future-demand scenarios.</p>
<p>Our most innovative customers are beginning to extend the use cases of this vanguard technology to these mostly unforeseeable events.</p>
<p>This has only been made a possibility quite recently through <strong>conditional synthetic data generation</strong>, which allows for the exploration of how some relationships in a dataset can play out with other relationships when their effects are amplified or diminished.</p>
<p>Right now, it’s making headlines in the <strong>deep fake images space</strong>. Someone could ask a conditional generator for faces that have pink hair, glasses and a nose piercing. Now, the generator may have never seen someone with all of those characteristics combined, but it knows roughly how each of these entities logically combine at a higher level. The machine learning model has learned how lower level entities come together to build<strong> meta entities</strong> —  for example it knows that a nose has a fairly predictable relationship with eyes and mouth. This allows the generator <strong>to take what it knows and to accurately fill in the gaps</strong> and predict what those punk rockers would look like.</p>
<p>This works slightly differently with customer data like sequential financial data, as these tables often include thousands of columns and have a lot of categorical values — each column can be thought of as a dimension. Working out how categorical values in a table interrelate within a dataset is often more challenging than when working with a dataset consisting of the pixel dimensions of a data set of human faces.</p>
<p>The positive is that <strong>banks indisputably have lots of data to work with</strong>. Banks also often have access to additional datasets like stock measurements, interest rates, and exchange rates. The interrelationships across different datasets can potentially be combined to better model relationships and explore scenarios and model tradeoffs. With these, machine learning models you can ask questions like how a product might behave when you have a combination like high interest rates and low unemployment.</p>
<p>Maybe the world hasn’t seen that happen in real life, but the generators can be used to extrapolate and fill in the blanks because <strong>it generally knows how they trend together</strong>.</p>
<p>Insurance companies live in a world of “if then, then this”, but so much of their actuarial insights are based on past data. What can you do if you have no data because these events haven’t happened yet? Synthetic data is a good way to build predictive scenarios that can help organizations adequately price the risk of unforeseen events.</p>
<p>And this crystal ball reading doesn’t have to just be applied to world changing events. You can use synthetic data generators to understand how a new market would react to your launching of a new product.</p>
<p>Say you have a million clients in the UK and only 50,000 in France. And you know the income variability, the geographical zones they live in, and the ages, income and educational level for each customer. First you create synthetic data<strong> that protects all the personally identifiable information</strong> across two distinct geographic regions. The model then learns both t<strong>he predictable way</strong> the product sold in the UK and it knows the behavioral differences between the two countries. This model can even learn to cleverly extrapolate UK consumer behavior into French consumer behaviour to predict the best way an expansion in the French market might play out. These disparate insights turn into a solid predictor for global expansion KPIs.</p>
<p>These results can again be combined with more probabilities like how your customers or local markets will react depending on how many points the stock market falls or how summer temperatures impact sales. However, if you want to predict very rare events or a combination of rare events with limited data, <strong>making predictions remains very challenging</strong> without enough data to meaningfully extrapolate trends and relationships in the data.</p>
<p>&nbsp;</p>
<h2>The limitless potential of securely synthetic data</h2>
<p>Synthetic data is the best way to <strong>safely unlock the potential of the data economy</strong>. Because synthetic data — by being completely artificial — can <strong>solve the essential privacy problem</strong>, it can significantly reduce data leaks and protect your customers’ personal information, while still retaining utility.</p>
<p>Synthetic data becomes the best way for multinational organizations to stay as competitive, responsive and innovative as startups. And to allow you to capacity plan, based on the completely unknown.</p>
<p>Because large financial institutions have such a wealth of data, they are perfectly positioned to take advantage of the unique potential of data and synthetic data. Organizations can now limit risk-taking by predicting responses for an unpredictable future.</p>
<p>The world is changing rapidly. <strong>Your business has to be ready for it</strong>.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/hazy-shakeup-how-synthetic-data-could-have-let-us-prepare-for-this-pandemic/">Hazy | Shake&#8217;Up &#8211; How synthetic data could have let us prepare for this pandemic?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
