<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>threat - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/threat/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/threat/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 01 Dec 2022 15:54:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>threat - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/threat/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CDT Watch – November 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 15:54:26 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ENISA]]></category>
		<category><![CDATA[SUPPLY CHAIN]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19173</guid>

					<description><![CDATA[<p>EDITO What are the supply chain threats? What’s a picture of the current situation? Since 2019, there has been a growing focus on third-party attacks. With good reason: CyberArck estimates in a study from 2022 that 71% of organizations suffered...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/">CDT Watch – November 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>EDITO</strong></h1>
<h2 style="text-align: center;">What are the supply chain threats?</h2>
<p><strong>What’s a picture of the current situation? </strong></p>
<p>Since 2019, there has been a growing focus on third-party attacks. With good reason: CyberArck estimates in a study from 2022 that <a href="http://www.cyberview.com.tw/wp-content/uploads/2022/05/cyberark-2022-identity-security-threat-landscape-report.pdf">71% of organizations</a> suffered a successful</p>
<p>software supply chain-related attack that resulted in data loss or asset compromise. According to Argon Security – recently acquired by Aqua Security – published the latest edition of its annual Software Supply Chain Security Review this week. The Software Supply Chain Security Review from Argon’s report that software supply chain attacks grew by <a href="https://www.developer-tech.com/news/2022/jan/20/software-supply-chain-attacks-increased-over-300-percent-in-2021/">more than 300% in 2021</a> compared to 2020.</p>
<p>In terms of maturity, in 2022: a survey of 1,000 CIOs found that 82% said their organization is vulnerable to cyber-attacks targeting software supply chains <a href="https://www.venafi.com/sites/default/files/2022-05/Venafi_WhitePaper_CIOStudy_SoftwareBuildPipelinesAttackSurfaceExpanding_2022_f%20.pdf">(Venafi)</a>. From our own Cyberbenchmark, we can see that 50% of our interviewee don’t control their security requirements with their third party and 15% conduct audits on their most critical suppliers in 2022.</p>
<p> </p>
<p><strong>What kind of attacks are we talking about?  </strong></p>
<p>Attacks on the supply chain are related to threats around third parties. <a href="https://www.enisa.europa.eu/publications/threat-landscape-for-supply-chain-attacks">ENISA</a> defines this type of attack as follows: “ A supply chain attack is a combination of at least two attacks. The first attack is on a supplier that is then used to attack the target to gain access to its assets. The target can be the final customer or another supplier. Therefore, for an attack to be classified as a supply chain one, both the supplier and the customer have to be targets.”</p>
<p>As a reminder the supply chain involves a wide range of resources (hardware and software), storage (cloud or local), distribution mechanisms (web applications, online stores), and management software</p>
<ul>
<li><strong>Indirect or bounce attack:</strong> An attack on one or more intermediate information systems. The attacker uses the supplier as an entry vector to retrieve the information needed to access the final target.</li>
<li><strong>Supply chain attack:</strong> the attacker relies on a software production chain to infect a legitimate program and distribute it to third parties.</li>
</ul>
<p> </p>
<p><strong>Why is it serious?</strong></p>
<p>First because these attacks are <strong>complicated to detect:</strong> originally used for espionage, these are attacks where the attacker aims to remain discreet until the attack is launched. Second because it is a <strong>one-to-</strong><strong>many kind of attack</strong>. A small change in software source code can affect the entire supply chain (plus, the chains are increasingly interconnected). The most known example is Kaseya and its 800 and 1,500 total businesses affected victims. Thirdly, many enterprises don’t have <strong>enough visibility on their ecosystem</strong> to anticipate or even detect the flaws in their IS. As we have seen, the security maturity in this field is currently quite low.</p>
<p><strong>There are some aggravating factors:</strong></p>
<ul>
<li>The cyber criminal’s ecosystem has matured and industrialized, allowing more sophisticated attacks to target matured victims. ​They can therefore afford this kind of sophisticated attack which used to take time, financial investment, and expertise&#8230;</li>
<li>Expansion of the attack surface: The IS ecosystem is increasingly large, and increasingly interconnected, and more and more third parties are involved. They have potentially less control of the IS and less visibility, therefore potentially less control of the security of all these third parties, particularly in IAM management: who has very privileged access rights to its IS&#8230;</li>
<li>The risk is to give access to third parties who can represent entry points for attackers: to one&#8217;s IS and to one&#8217;s sensitive data since one shares them with third parties</li>
<li>In 2021, in an analysis conducted with 1200 CISOs (in America, Europe and Singapore), about 38% of respondents said that they had no way of knowing when or whether an issue arises with a third-party supplier&#8217;s cybersecurity (in 2020, it was 31%) <a href="https://www.bluevoyant.com/press-releases/bluevoyant-research-reveals-rise-in-supply-chain-cybersecurity-breaches-as-firms-struggle-to-effectively-monitor-third-party-cyber-risk">(BlueVoyant66)</a></li>
<li>Github estimates that there is 203 dependencies on an average software project in 2022.  If a popular app includes one compromised dependency, every business that downloads from the vendor is compromised as well, so the number of victims can grow exponentially.</li>
</ul>
<p> </p>
<p><strong>Examples of attacks</strong></p>
<ul>
<li><strong>Compromise intermediate elements of the supply chain​</strong> (i.e. source code tools) ​</li>
</ul>
<p>Midstream attacks target intermediate elements such as software development tools, manipulating the build process of the artifact​</p>
<ul>
<li>Ex: SolarWinds</li>
<li><strong>Compromise upstream software </strong>​(i.e. compromising the source code)​</li>
</ul>
<p>Infects a system that is &#8216;upstream&#8217; of users, for example through a malicious update, which then infects all &#8216;downstream&#8217; users who download it. ​</p>
<ul>
<li>One of the biggest was the compromise of CCleaner 2017 update  with 2.3 million users impacted</li>
</ul>
<ul>
<li><strong>Compromise project interdependencies​</strong></li>
</ul>
<p>Compromise third-party components, such as an open-source package​</p>
<p>Dependencies confusion: the attackers provide a fake “new” upgrade of a software’s project needed component for the targeted software to automatically download it and implement it in the project. ​</p>
<ul>
<li>Ex: Apple, Microsoft, Uber, Paypal (BugBounty 2020)</li>
</ul>
<p>Within these strategies, one of the most impactful methods is <strong>to target the CI/CD pipeline</strong>. If the infrastructure is not secured enough and there is a poor access management (our audit teams often see this), it can be easily targeted. Once compromised, the attacker has access to a part of the critical &#8216;linfra, to the source code of the application and the infrastructure and can generally do what he wants</p>
<p><strong>The impacts are high: </strong></p>
<ul>
<li>Attackers have access to critical IT infrastructure, development processes, source code, libraries, and applications: ​</li>
<li>Modify the code or inject malicious code during the build process and alter the application ​</li>
<li>Deploy malware via the orchestrator directly on production environments</li>
</ul>
<p> </p>
<p> </p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<p><img fetchpriority="high" decoding="async" class="alignnone  wp-image-19175" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-366x191.png" alt="" width="863" height="450" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-366x191.png 366w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-768x401.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image.png 1486w" sizes="(max-width: 863px) 100vw, 863px" /></p>
<p> </p>
<p> </p>
<h1 style="text-align: center;"><strong>READING OF THE MONTH</strong></h1>
<h2 style="text-align: center;">ENISA</h2>
<p style="text-align: center;">This is the tenth edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape. It identifies the top threats, major trends observed with respect to threats, threat actors and attack techniques, as well as impact and motivation analysis.</p>
<p><img decoding="async" class="wp-image-19177 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-315x191.png" alt="" width="400" height="243" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-315x191.png 315w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-64x39.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-768x466.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2.png 963w" sizes="(max-width: 400px) 100vw, 400px" /></p>
<p style="text-align: center;"><a href="https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022">Link to the report</a></p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/">CDT Watch – November 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackuity &#124; Shake&#8217;Up &#8211; The future of vulnerability management: threat status and current issues in vulnerability management (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shake-up-the-future-of-vulnerability-management-threat-status-and-current-issues-in-vulnerability-management-1-2/</link>
		
		<dc:creator><![CDATA[Patrick Ragaru]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 07:00:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[#vulnerability]]></category>
		<category><![CDATA[hackuity]]></category>
		<category><![CDATA[patching]]></category>
		<category><![CDATA[shake'up]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15135</guid>

					<description><![CDATA[<p>We have recently opened the contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hackuity rethinks vulnerability management with a platform that collects, standardizes and orchestrates automated and manual security assessment practices and enriches them with Cyber Threat...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shake-up-the-future-of-vulnerability-management-threat-status-and-current-issues-in-vulnerability-management-1-2/">Hackuity | Shake&#8217;Up &#8211; The future of vulnerability management: threat status and current issues in vulnerability management (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>We have recently opened the contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hackuity rethinks vulnerability management with a platform that collects, standardizes and orchestrates automated and manual security assessment practices and enriches them with Cyber Threat Intelligence data sources, technical context elements and business impacts. Hackuity enables you to leverage your existing vulnerability detection arsenal, to prioritize the most important vulnerabilities, to save time on low-value tasks and reduce remediation costs, to gain access to a comprehensive and continuous view of the company&#8217;s security posture, and to meet compliance obligations.</em></p>
<p>&nbsp;</p>
<h2>What are we talking about?</h2>
<p>ISO 27005 defines a <strong>vulnerability</strong> as “<em>a weakness of an asset or group of assets that can be exploited by one or more cyber threats where an asset is anything that has value to the organization, its business operations and their continuity, including information resources that support the organization&#8217;s mission</em>”. For the SANS Institute, <strong>vulnerability management</strong> is “<em>the process in which vulnerabilities in IT are identified and the risks of these vulnerabilities are evaluated. This evaluation leads to correcting the vulnerabilities and removing the risk or a formal risk acceptance by the management of an organization</em>”. Over time, Vulnerability Management has become a fundamental practice in cybersecurity, and now all industry professionals would agree to say that it is an essential process for minimizing the company&#8217;s attack surface.</p>
<p>&nbsp;</p>
<figure id="post-15081 media-15081" class="align-none"><img decoding="async" class="wp-image-15081 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-1.jpg" alt="" width="675" height="571" /></figure>
<p style="text-align: center;">Source: <a href="https://blogs.gartner.com/augusto-barros/2019/10/25/new-vulnerability-management-guidance-framework/">https://blogs.gartner.com/augusto-barros/2019/10/25/new-vulnerability-management-guidance-framework/</a></p>
<p>&nbsp;</p>
<p>Nowadays, vulnerability management is integrated into all the major security frameworks, standards, sector regulations, guides and good security practices (ISO, PCI-DSS, GDPR, Basel agreements, French LPM, NIS, etc.) and is even regulatory in some contexts. Every “good” corporate security policy includes a significant chapter on this topic. Many would consider that a necessary evil.</p>
<p>&nbsp;</p>
<h2>Vulnérabilités : état de la menace</h2>
<p>However, in 2019, according to a study conducted by the Ponemon Institute<a href="#_ftn1" name="_ftnref1">[1]</a>, “<em>60% of security incidents were [still] the consequence of exploiting a vulnerability that is known but not yet corrected by companies”</em>. To illustrate the current extent of the phenomenon, let&#8217;s consider ransomwares, the main cyber threat of 2020 and probably 2021. Although ransomwares are generally spread through user-initiated actions, such as clicking on a malicious link in a spam or visiting a compromised website, a large proportion of ransomwares also exploits computer vulnerabilities. Thus, if we look at the top-5 most virulent 2020 ransomwares ranked by intel471<a href="#_ftn2" name="_ftnref1">[2]</a>, we can see that their “kill-chains” all exploit vulnerabilities (CVE).</p>
<table style="border-collapse: collapse; width: 100%; height: 868px;">
<tbody>
<tr style="height: 45px;">
<td style="width: 16.6667%; height: 45px; text-align: center;">Ransomware Name</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">First known occurrence</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">Known exploited CVE</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">CVE publication date</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">Patch / workaround</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">CVSS V2.0 Score</td>
</tr>
<tr style="height: 211px;">
<td style="width: 16.6667%; height: 211px; text-align: center;" width="123">Maze(aka ChaCha)</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="123">05-2019</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="123">CVE-2018-15982CVE-2018-4878</p>
<p>CVE-2019-11510</p>
<p>CVE-2018-8174</p>
<p>CVE-2019-19781</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="113">18/01/201906/02/2018</p>
<p>08/05/2019</p>
<p>05/09/2018</p>
<p>27/12/2019</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="85">12-201802-2018</p>
<p>04-2019</p>
<p>08-2018</p>
<p>12-2019</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="76">107.5</p>
<p>7.5</p>
<p>7.6</p>
<p>7.5</td>
</tr>
<tr style="height: 133px;">
<td style="width: 16.6667%; height: 133px; text-align: center;" width="123">REvil(aka Sodinokibi)</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="123">04-2019</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="123">CVE-2018-8453CVE-2019-11510</p>
<p>CVE-2019-2725</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="113">10/10/201808/05/2019</p>
<p>26/04/2019</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="85">10-201805-2019</p>
<p>04-2019</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="76">7,27,5</p>
<p>7,5</td>
</tr>
<tr style="height: 173px;">
<td style="width: 16.6667%; height: 173px; text-align: center;" width="123">Netwalker</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="123">09-2019</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="123">CVE-2015-1701CVE-2017-0213</p>
<p>CVE-2020-0796</p>
<p>CVE-2019-1458</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="113">21/04/201512/05/2017</p>
<p>12/03/2020</p>
<p>10/12/2019</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="85">05-201505-2017</p>
<p>03-2020</p>
<p>12-2019</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="76">7,21.9</p>
<p>7,5</p>
<p>7.2</td>
</tr>
<tr style="height: 212px;">
<td style="width: 16.6667%; height: 212px; text-align: center;" width="123">Ryuk</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="123">08-2018</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="123">CVE-2013-2618CVE-2017-6884</p>
<p>CVE-2018-8389</p>
<p>CVE-2018-12808</p>
<p>CVE-2020-1472</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="113">05/06/201406/04/2017</p>
<p>15/08/2018</p>
<p>29/08/2018</p>
<p>17/08/2020</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="85">*-201404-2017</p>
<p>08-2018</p>
<p>08-2018</p>
<p>08-2020</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="76">4,39,0</p>
<p>7,6</p>
<p>7,5</p>
<p>9,3</td>
</tr>
<tr style="height: 94px;">
<td style="width: 16.6667%; height: 94px; text-align: center;" width="123">DopplePaymer</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="123">04-2019</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="123">CVE-2019-1978CVE-2019-19781</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="113">05/11/201927/12/2019</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="85">*-201901-2020</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="76">5,07,5</td>
</tr>
</tbody>
</table>
<p style="text-align: center;">Source: Hackuity &amp; National Vulnerability Database (<a href="https://nvd.nist.gov/">https://nvd.nist.gov/</a>)</p>
<p>&nbsp;</p>
<p>It is worth noticing that such vulnerabilities have often been referenced by the NIST when the ransomware first appeared, sometimes for several years. Moreover, patches or workarounds have often been released in most cases. A recent CheckPoint<a href="#_ftn3" name="_ftnref1">[3]</a> study confirms that the <strong>oldest vulnerabilities are always the most exploited.</strong> In mid-2020, more than 80% of the cyberattacks identified used a vulnerability published before 2017 and more than 20% of these attacks even exploited a vulnerability that had been known for more than 7 years.</p>
<p>&nbsp;</p>
<figure id="post-15083 media-15083" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15083 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-2.png" alt="" width="722" height="334" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2.png 1196w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2-413x191.png 413w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2-768x355.png 768w" sizes="auto, (max-width: 722px) 100vw, 722px" /></figure>
<p>&nbsp;</p>
<p>This highlights the importance &#8211; even today &#8211; of rapid installation of security patch as a defense mechanism to minimize cyber risks. Therefore, it’s not surprising that Vulnerability Management &#8211; one of the oldest practices in cybersecurity &#8211; remains one of the major 2021 CISO challenges for Wavestone<a href="#_ftn4" name="_ftnref1">[4]</a>. Does this mean that we should try to correct all the vulnerabilities? Let&#8217;s go back in time.</p>
<p>&nbsp;</p>
<h2>« Vulnerability Assessment » vs. « Vulnerability Management »</h2>
<p>When they first appeared on the market at the end of the 1990s, the vulnerability management solutions worked similarly to an antivirus: the objective was to detect as many potential threats as possible. They were more commonly referred to as “vulnerability scanners”.</p>
<p>The volume of vulnerabilities then was relatively low compared to today. In 2000, the NVD identified about 1,000 new vulnerabilities over the year, compared to more than 18,000 in 2020.</p>
<p>A comprehensive and manual treatment of vulnerabilities was still possible at that time. Scanners provided a list of vulnerabilities, their relevance in the business context was analyzed by IT teams and a report was sent to business managers. Once the report was approved, administrators would fix the vulnerabilities and re-test to ensure that patches were properly implemented.</p>
<p>&nbsp;</p>
<figure id="post-15085 media-15085" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15085 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-3.png" alt="" width="522" height="365" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.png 832w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-273x191.png 273w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-56x39.png 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-768x537.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-245x170.png 245w" sizes="auto, (max-width: 522px) 100vw, 522px" /></figure>
<p style="text-align: center;">Source : National Vulnerability Database (<a href="https://nvd.nist.gov/">https://nvd.nist.gov/</a>)</p>
<p>&nbsp;</p>
<p>Over the next two decades, the number of discovered vulnerabilities has increased steadily at first, then started to skyrocket in 2017, a trend that is still continuing today. In 2020, a record of more than 18,000 new vulnerabilities were published by the NIST. But no, the code quality is not worse than ever! There are several reasons behind the growing number of vulnerabilities being disclosed:</p>
<ol>
<li>Innovation and the accelerated digitization of business lead to an increase in published hardware and software products. In 2010, the NIST recorded 22,188 new entries in its CPE repository, including 1,332 new products and 406 publishers. In 2020, 324,810 entries (+1,460 %), 35,794 new products (+2,690 %) and 6,060 publishers (+1,490%) have appeared in the repository.</li>
<li>Demand for faster time-to-market is driving vendors to shorten development cycles to release and sell products faster, even if it means saving on resources needed for quality assurance and security testing.</li>
<li>Cybercrime has become a lucrative business. A growing number of vulnerabilities are now attributed to cybercriminals seeking new tools to support their attacks.</li>
<li>At the same time, the number of experts and independent organizations involved in the research and disclosure of vulnerabilities is increasing. The democratization and industrialization of <a href="https://www.riskinsight-wavestone.com/en/2021/01/bug-bounty-insight-and-benchmark-on-the-banking-industry-2021/">Bug-Bounty programs</a> are not unrelated to this.</li>
<li>And finally, with rare exceptions such as GDPR, in the lack of adequate legislation and regulations to protect consumer rights in the event of software vulnerabilities, the industry has no incentive to invest in safer products nor take responsibility for the damage caused.</li>
</ol>
<p>However, <strong>the problem is not only the higher number of vulnerabilities identified in the NVD databases or other repositories.</strong> With the advent of ultra-mobility, home-office, cloud-computing, social media, IoT, but also the convergence between IT and OT, Information Systems have continued to become more complex and to expand, open up and multiply the number of their suppliers, &#8230;creating as many potential new entry points for cybercriminals.</p>
<p>At the same time, companies are deploying and operating a vulnerabilities detection arsenal that is continually growing and has become more mature in recent years, or even commoditized:</p>
<ul>
<li>Intrusion tests &amp; red-teams,</li>
<li>Vulnerability scanners: on the entire external and/or internal park</li>
<li>Vulnerability Watch</li>
<li>SAST, DAST &amp; SCA: often directly integrated into development pipelines</li>
<li>Bounty Bug Campaigns</li>
</ul>
<p>All these detection practices are complementary and generally stacked in a best-of-breed approach to evaluate specific parts of the IS or SDLC. Unfortunately, it is often once the arsenal in place that the problems are obvious (non-exhaustive list):</p>
<ul>
<li><strong>The heterogeneity in the deliverables’ formats:</strong> pentest reports in PDF or Excel files, results of scans in the tool own console, vulnerabilities on the bug bounty platform, &#8230;, often force the company to adopt a siloed Vulnerability Management approach. It’s the same for vulnerability scores, which in the end turns out to be a patchwork of CVSS and its multiple versions, proprietary scales and a clever (J) mix of the two.</li>
<li>This results in the <strong>inability to prioritize remediation efforts</strong> globally due to a fragmented and heterogeneous perception of vulnerabilities stock.</li>
<li>Managing <strong>volumes of data that have become far too large to be processed manually</strong>: it is not uncommon for a company that performs authenticated scans on its fleet to see the volume of vulnerabilities exceed several million entries in the scanner&#8217;s console.</li>
<li><strong>Difficulty in coordinating remediation actions:</strong> identification of the asset owner and the holder of a share, exchange of e-mails, progress monitoring, Excel reporting, etc&#8230;</li>
<li>The frustration of the teams in charge of remediation, <strong>who do not have factual reporting</strong> reflecting the remediation effort on the company&#8217;s overall security posture.</li>
</ul>
<p>Facing these problems, companies have no choice but to work on the implementation of processes that are often costly because they rely on manual actions, the development of ad-hoc tooling or an assembly of bits and pieces of solutions gleaned here and there. The lack of automation of this process is all the more absurd since it generally mobilizes rare and expensive cyber security experts on low-value tasks such as compiling data in Excel, endlessly searching for the right stakeholder or tracking email threads.</p>
<p>In its study “<em>Cost and consequences of gaps in vulnerability management responses</em>” (2019), the Ponemon institute estimates that companies with more than 10,000 employees spent an average of more than <strong>21,000 hours (or nearly 12 FTEs)</strong> in 2019 on the prevention, detection and treatment of vulnerabilities. This represents a total of more than $1M for a very disappointing quality/price ratio.</p>
<h2>The « patching paradox »</h2>
<p>In theory, the best way to stay protected is to keep each system up to date by correcting each new vulnerability, as soon as it is identified. IRL, this task has become impossible due to the volume of vulnerabilities too large, the human or financial resources too limited, the existence of legacy systems, and the time of availability of the fix or operational constraints on patch deployment.</p>
<p>Ultimately, no matter how large or small an organization may be, it will never have enough human or financial resources to address all of its vulnerabilities. In fact, the mistaken belief that more people dedicated to addressing vulnerabilities equals better security is called the “Patching Paradox” in the industry.</p>
<p>To reduce the pressure to increase staff at a time when there is a shortage of qualified security experts, and to prevent Vulnerability Management from becoming a frantic and lost race to fix more and more vulnerabilities, organizations today need to determine which ones of their vulnarabilities should be addressed first.</p>
<p>&nbsp;</p>
<p><em>After having seen in this first article the threat status and the current issues related to the management of vulnerabilities, we will see in a second article the new approaches to be taken into account to better manage vulnerabilities.</em></p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> Ponemon Institute &#8211; Cost and consequences of gapes in vulnerability management responses &#8211; 2019</p>
<p><a href="#_ftnref2" name="_ftn1">[2]</a> <a href="https://intel471.com/blog/ransomware-as-a-service-2020-ryuk-maze-revil-egregor-doppelpaymer/">https://intel471.com/blog/ransomware-as-a-service-2020-ryuk-maze-revil-egregor-doppelpaymer/</a></p>
<p><a href="#_ftnref3" name="_ftn1">[3]</a> <a href="https://www.checkpoint.com/downloads/resources/cyber-attack-trends-report-mid-year-2020.pdf">https://www.checkpoint.com/downloads/resources/cyber-attack-trends-report-mid-year-2020.pdf</a></p>
<p><a href="#_ftnref4" name="_ftn1">[4]</a> <a href="https://www.wavestone.com/fr/insight/radar-rssi-quelles-priorites-2021/">https://www.wavestone.com/fr/insight/radar-rssi-quelles-priorites-2021/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shake-up-the-future-of-vulnerability-management-threat-status-and-current-issues-in-vulnerability-management-1-2/">Hackuity | Shake&#8217;Up &#8211; The future of vulnerability management: threat status and current issues in vulnerability management (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISO, between post-COVID world and persistent threats, what are the priorities for 2021?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/ciso-between-post-covid-world-and-persistent-threats-what-are-the-priorities-for-2021/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 10:21:29 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[2021]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[emerging topics]]></category>
		<category><![CDATA[opportunities]]></category>
		<category><![CDATA[priorities]]></category>
		<category><![CDATA[radar]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15064</guid>

					<description><![CDATA[<p>Since the last edition of the radar, the world has been hit hard by an unprecedented viral pandemic. This has piled on the pressure to fast track digital transformations set in a context of increasingly active cybercriminals and an ever-growing threat. Against...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/ciso-between-post-covid-world-and-persistent-threats-what-are-the-priorities-for-2021/">CISO, between post-COVID world and persistent threats, what are the priorities for 2021?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Since <a href="https://www.wavestone.com/en/insight/ciso-radar-2020/">the last edition of the radar</a>, the world has been hit hard by <a href="https://www.wavestone.com/en/insight/cybersecurity-in-the-face-of-the-health-crisis/">an unprecedented viral pandemic</a>. This has piled on the pressure to fast track digital transformations set in a context of increasingly active cybercriminals and an ever-growing threat. Against this twin backdrop of public-health and economic crises, what should you do to plan for 2021? And what are the trends to watch to assure cybersecurity in large organizations?</p>
<p style="text-align: justify;">One fundamental theme won’t change: the threat – the starting point for all thinking about cybersecurity. In our view, unsurprisingly, ransomware will remain the major threat facing businesses. Since the end of 2019, and the exploits of <strong>Maze</strong>, <strong>Sodinokibi</strong>, and, more recently <strong>Egregor</strong>, these destructive attacks have been paired with massive data exfiltration – adding a new dimension to criminal blackmail operations. All types of organizations are affected: from local authorities, through SMEs, to large international groups – wherever they are in the world.</p>
<p style="text-align: justify;">In addition, as we recently discussed in <a href="https://www.lemonde.fr/economie/article/2020/11/15/comment-le-cybercrime-se-professionnalise-en-s-attaquant-aux-particuliers-et-aux-entreprises_6059830_3234.html"><em>Le Monde</em></a>, cybercriminal operations have become <strong>highly professionalized</strong>, ensuring the perpetrators reap a <strong>return on their considerable investments</strong>. These investments will enable them to mount increasingly deep, and technically sophisticated, attacks in the future – attacks that will have no qualms about <strong>targeting activities that are core to business functions</strong> (such as industrial networks, payment systems, etc.). In 2021, the stakes in <strong>the tug of war over the payment of ransoms</strong> are likely to be raised – with a determined effort by criminal groups to achieve higher <strong>profile</strong> attacks.<strong> We saw some early signs</strong> this year with the use of <strong>sophisticated procedures</strong>: from an attack being announced via Facebook advertisements, through direct negotiation with patients in healthcare-sector attacks, to the printing of ransom demands via in-store cash registers… There will be a need to anticipate such situations to the maximum extent possible, either by simulating them in crisis exercises or by tailoring specific, well-thought-out responses in advance.</p>
<p style="text-align: justify;">In addition to the many-headed beast of ransomware, our teams out in the field anticipate strong growth in two other threat areas in 2021. First, <strong>indirect attacks, using third-party services</strong>: cybercriminals are heavily focused on circumventing the security arrangements of major players by exploiting vulnerabilities in their less-protected partners or targeting their IT service providers. In addition, <strong>attacks that target cloud-based systems are expected to accelerate and manifest new types of compromise</strong>. Exploiting vulnerabilities in identity and access management (<strong>IAM</strong>), in particular via supplier APIs to compromise ever more critical areas of business, will be one of the hallmarks of incidents in 2021. Today, this area represents a real challenge for IT teams, who are still much too unfamiliar with the fast-developing particularities of these platforms.</p>
<p style="text-align: justify;">Faced with such a range of threats, CISOs will need to be both agile and robust, especially in their mastery <strong>of security fundamentals</strong> (in particular, the Active Directory, the application of patches, and multi-factor authentication) and in solidly demonstrating their <strong>cyber-resilience</strong> capabilities (with ever-more demanding commitments in terms of reconstruction times and the ability of business functions to be resilient without IT capacity).</p>
<p style="text-align: justify;">In parallel, there are several areas that will be central to developments in IT departments, and CISOs can turn them into <strong>opportunities</strong> to improve cybersecurity within their organizations. In particular, we have in mind “Digital Workplace” projects – and the work to optimize available security measures, which will have to be done against the current backdrop of constrained budgets. Previous years’ investments in cybersecurity have often added new functionalities that are little known or used, especially when it comes to the cloud. Looking to these may offer a way to improve cybersecurity at lower cost.</p>
<p style="text-align: justify;">From a regulatory perspective, 2021 will see another increase in issues linked to <strong>cyber borders</strong> or even cyber-protectionism. It will mean considering demanding <strong>isolation and protection requirements</strong>, and also the issue of the interconnection of <strong>new and little-known systems</strong> (for example, Alibaba in China, Yandex in Russia, etc.) with organizational networks.</p>
<p style="text-align: justify;">In terms of technological developments to keep in mind, we have identified three trends: <strong>Zero-trust, <a href="https://www.wavestone.com/en/insight/quantum-computing-cybersecurity-wavestone-francedigitale/">Confidential Computing</a></strong>, and<strong> Quantum Computing.</strong> We discuss these in more detail below and set out the minimum level of monitoring that you should plan for.</p>
<p style="text-align: justify;">Threats are becoming more complex and resources increasingly limited… CISOs will need to demonstrate their agility in 2021, by addressing a range of issues while still maintaining a clear strategic direction: they’ll need to be able to protect their organizations against cyber criminals while supporting, or even developing, new digital uses.</p>
<figure id="post-15058 media-15058" class="align-none" style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-15058 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1.jpg" alt="" width="2048" height="1418" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1.jpg 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-768x532.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-1536x1064.jpg 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-245x170.jpg 245w" sizes="auto, (max-width: 2048px) 100vw, 2048px" /></figure>
<div class="heading-text el-text" style="text-align: justify;">
<h2>Methodology</h2>
</div>
<div class="uncode_text_column">
<p style="text-align: justify;">The <strong>CISO Radar</strong> is a tool that Wavestone has developed and published since 2011. More than <strong>40 experts</strong> meet <strong>three times a year</strong> to discuss news and key topics, based on what they’ve observed while working with Wavestone’s clients. This assessment includes all Wavestone’s offices – from New York to Hong Kong – taking in Paris and several others.</p>
<p style="text-align: justify;">Every year, the Radar presents <strong>a broad selection of the topics that CISOs have to grapple with in their role</strong>. It covers over 100 topics, which are considered and analyzed by our experts.</p>
<div class="row-container" style="text-align: justify;" data-parent="true" data-section="1">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="uncode_text_column">
<p>It’s presented as a series of dials covering <strong>key themes</strong> (identity, protection, detection, risk management, compliance, and continuity) <strong>on three levels:</strong> <strong>Mature, News, </strong>and<strong> Emergent</strong>. The “Mature” level covers topics that every CISO can, and must, master. The “News” level covers topics currently being addressed; these are new areas where initial feedback can be shared. The “Emergent” level covers topics on the horizon that are still little known or that have no obvious solutions. These topics are included to better predict future developments and prepare for their emergence in organizations.</p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="2">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width" style="text-align: justify;">
<div class="heading-text el-text">
<h2>What are the threads to develop in 2021?</h2>
<h3>Mastery of cybersecurity fundamentals</h3>
<p>Patches not being applied; weaknesses in Active Directories; vulnerabilities in attack channels… In 2020, cybercriminals have regularly reminded us of the importance of mastering cybersecurity fundamentals. Unsurprisingly, we believe these fundamentals will remain key in 2021 – a time when cyber attackers are likely to remain highly opportunistic (<strong>58%</strong> according to an assessment of recent incidents where Wavestone has <a href="https://www.wavestone.com/en/insight/cyberattack-france-situation-on-the-ground/">provided support</a>) and where we continue to see a daily stream of new fixes to critical vulnerabilities.</p>
<p>Now is the time for cybersecurity teams to act on their responsibilities: they can no longer operate in the background in their key areas – such as the management and maintenance of security, which are core to digital trust and other key systems. CISOs will need to be robust and responsive in opening up these areas with production teams. We should note that startups like <a href="https://www.hackuity.io/">Hackuity</a> can bring new impetus and help unlock the complex process of vulnerability management.</p>
<h3>Consolidate work on cyber-resilience</h3>
<p>For several years now, cyber-resilience has been a phrase on everybody’s lips – and rightly so. As we observe, cybercriminals are an increasingly active menace. It’s no longer a question of “Will we be attacked?” but “<em>When</em> will we be attacked?”  Against this backdrop, it’s essential to have in place an appropriate strategy and be prepared to respond to an attack – by limiting its impact, in order to restart as securely and quickly as possible. In 2021, the involvement of business functions will remain an issue that continues to occupy security teams as they work to increase efficiency.</p>
<p>Nevertheless, we’re now seeing a new trend in cyber-resilience: CISOs are increasingly being asked to provide concrete evidence of the organization’s capacity to resist and recover from a cyber-attack. Percentage of production capacity preserved in the event of a loss of IT and the resilience of business activities; the precise timescale for rebuilding core confidence; and the restoration of data under time constraints… Both regulators and business leaders are asking for guarantees and defined commitments to provide them with reassurance. In such a context, we should be prepared to push systems to their limits; for example, by conducting realistic reconstruction tests, working in partnership with operational teams.</p>
<p>&nbsp;</p>
</div>
</div>
<div class="heading-text el-text" style="text-align: justify;">
<h2>Which areas represent opportunities for cybersecurity?</h2>
</div>
<h3 class="clear" style="text-align: justify;">Continuing pressure to make progress on digital transformation</h3>
<div style="text-align: justify;">
<p>It’s a matter of fact that the public-health crisis has allowed many organizations to take major steps toward creating latest-generation digital workspaces. This situation presents a real opportunity for CISOs, who can capitalize on it by becoming involved in numerous innovative projects and help their organizations move to an in-depth<em>, </em>cloud-based approach.</p>
<p>More than ever, it offers an opportunity for cybersecurity teams to deliver a step change in approach and overcome numerous long-standing challenges: the simplification of remote access, authentication that reduces the use of passwords (Passwordless), enhanced detection of data leaks, expansion of SOCs and cloud-related detection capacities, etc.</p>
<h3>Cyber-effectiveness</h3>
<p>In a period when expenditure is under greater scrutiny than ever, CISOs must continue to rationalize the use of their budgets, while also demonstrating the effectiveness of the interventions they make. Given this, one of the first actions you should consider is the scope to capitalize on investments made in previous years: teams already in place and, for technical solutions or cloud-based services undergoing rapid changes, unlocking functionalities that can be easily activated at no additional cost. A genuinely rich seam to provide better security in the year ahead. In some areas, outsourcing may be an option in the interests of rationalizing costs.</p>
<p>For some business sectors, cybersecurity may become, or may already be, a market differentiator. CISOs, then, have an opportunity to develop their role – by getting closer to the business functions and unlocking cross-functional projects that were previously unworkable.</p>
<h3>Borders in cyberspace</h3>
<p>While the internet is often considered a borderless space, there is an increasing tendency among regulators, and some countries, to want to ringfence data within their borders and prevent it from being hosted elsewhere. This trend is firming in Europe, where we saw the GDPR come into effect in 2018, and, more recently, a ruling that <a href="https://curia.europa.eu/jcms/upload/docs/application/pdf/2020-07/cp200091fr.pdf">the US Privacy Shield is invalid</a>; but also in China and Russia, where new regulations are proliferating, some of which could be classed as examples of “cyber-protectionism.”</p>
<p>As a result, many regulators and authorities are imposing rules that only encrypted data can be stored abroad, the key to which is a closely guarded secret (HYOK). This situation requires rethinking on data flows, the systems that will host them, and especially the need to adapt to local solutions. This presents a real challenge for CISOs; for example, when considering connections between the networks of global organizations that are using French, American, Russian, and Chinese systems… Integrating these systems into an overall cybersecurity approach is a real challenge in the face of their fragmentation and the difficulties in making a concrete assessment of the risks and the quality of the systems to be used.</p>
<p>&nbsp;</p>
<div class="heading-text el-text">
<h2>What are the emerging topics for 2021 and beyond?</h2>
<h3>Taking a new, entirely cloud-based approach, with Zero trust</h3>
<p>Promoted by Forrester in the late noughties, use of the <strong>Zero Trust</strong> security model is on the rise. As a reminder, this system is the opposite of the traditional <strong>castle</strong> approach, which aimed to defend the periphery using sizable ramparts (i.e., firewalls), but which is gradually being rendered impotent in the face of new threats.</p>
<p>Digital transformation has had profound impacts on system architecture and interconnections with third parties. As a result, it is no longer enough to protect oneself from the outside only; so much so, that even the concept of “the outside” is no longer that meaningful: nowadays threats can more easily use their target’s ecosystem to penetrate systems and compromise them. Access management, identities, and privileged accounts are central to the <strong>Zero Trust</strong> model – areas pertinent to many of the problems we face today. In 2021, businesses will continue their move toward the cloud. This provides a real opportunity to gradually base architectures and systems on the <strong>Zero-Trust</strong> principle, or, for latecomers, to begin to clear the way for it.</p>
<h3>Get ready for a data-protection revolution with confidential computing</h3>
<p>One of the major challenges for the cloud remains that of trust with the various partners involved, especially when it comes to organizations’ most sensitive data. In response to this problem, concepts like Confidential Computing and Data Privacy by Design have emerged gradually over recent years, in parallel with more concrete solutions.</p>
<p>Among these, <strong>homomorphic encryption</strong> enables algorithms to encrypt data while maintaining the option of processing it, something that greatly reduces the risks of disclosure and data leakage. IBM is one step ahead here, and, in the summer of 2020, shared its open-source library, <a href="https://github.com/shaih/HElib">HElib</a>, on the topic. French startups Cosmian and Zama are also active in the area.</p>
<p>Lastly, <strong>synthetic data</strong> can also offer an original response to the issue. By using algorithms enhanced by artificial intelligence, synthetic data generators, such as the one offered by British startup Hazy make it possible to create data sets that retain the characteristics and logic of the real data without featuring that data in any way. Yet another way to avoid any risk of a data breach in the cloud.</p>
<h3>Anticipate longer-term threats from Quantum computing</h3>
<p>Eight hours: this is the time it will take a sufficiently powerful and reliable quantum computer to undermine the security of our communications by breaking today’s commonly used encryption algorithms. <a href="https://www.wavestone.com/en/insight/informatique-quantique-et-cybersecurite_francedigitale_wavestone/">The global technological race has already begun</a>, and companies and institutions must begin preparing themselves now, because considerable investments will be needed to put in place the required <strong>technical migrations</strong>. Which data must be protected as a priority, because it needs to remain confidential in the years to come? Which clauses should I include in my contracts today, to ensure the systems I purchase are compatible with the new encryption solutions? And which providers can support these migrations?</p>
<p>In France, several players have already taken the initiative for example the INRIA-Sorbonne spin-off <strong>CryptoNext-Security</strong> – the winner of several innovation competitions, which offers a quantum-safe cryptography solution that has already been tested by the French army for use with an instant-messaging application on mobiles.</p>
<div class="post-content">
<div class="row-container" data-parent="true" data-section="5">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="uncode-accordion" data-collapsible="no" data-active-tab="1">
<div id="accordion_308999376" class="panel-group" role="tablist" aria-multiselectable="true">
<div class="panel panel-default">
<div id="anticipate-longer-term-threats-from-quantum-computing" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p>It’s an area that raises many questions, which will all need to be rapidly addressed. One thing is certain though: CISOs will have a major role in these developments and need to anticipate the many related activities that will be required.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/ciso-between-post-covid-world-and-persistent-threats-what-are-the-priorities-for-2021/">CISO, between post-COVID world and persistent threats, what are the priorities for 2021?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fileless attack : Le retour à la terre</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/10/fileless-attack-le-retour-a-la-terre/</link>
		
		<dc:creator><![CDATA[ThomasSghedon1]]></dc:creator>
		<pubDate>Tue, 23 Oct 2018 09:01:53 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Cyberattaque]]></category>
		<category><![CDATA[fileless]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[menace]]></category>
		<category><![CDATA[Threat intelligence]]></category>
		<category><![CDATA[veille]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11361/</guid>

					<description><![CDATA[<p>Le panorama des menaces informatiques évolue constamment, et chaque année se retrouve baptisée du nom de la nouvelle tendance ou innovation qui semble bousculer le monde de la sécurité informatique. Si 2017 était l’année du ransomware, il se pourrait que...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/10/fileless-attack-le-retour-a-la-terre/">Fileless attack : Le retour à la terre</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Le panorama des menaces informatiques évolue constamment, et chaque année se retrouve baptisée du nom de la nouvelle tendance ou innovation qui semble bousculer le monde de la sécurité informatique. Si 2017 était l’année du ransomware, il se pourrait que 2018 soit celle des fileless attacks (comprendre « les attaques sans fichiers »). Si le concept de ce mode d’attaque n’est pas nouveau, sa popularité croissante auprès des pirates, elle, l’est. Cela signifie-t-il que qui va nous imposer de repenser notre façon d’appréhender la sécurité des systèmes d’information ?</em></p>
<h2>Tu quoque mi programme</h2>
<p>Pour se faire une idée un peu plus détaillée et précise de cette menace, commençons par définir ce qu’est une <em>fileless attack</em>. Également nommée <em>non-malware attack</em> (attaque sans <em>malware</em>), <em>zero-footprint attack</em> (attaque sans empreinte) ou <em>living-off-the-land attack</em> (attaque hors sol), la particularité de ce type de menace est qu’elle n’impose pas à l’attaquant d’installer un programme sur la machine cible pour exécuter des actions malveillantes. En effet, le principe même de l’attaque est de détourner l’usage d’outils ou de programmes parfaitement licites et déjà installés sur les équipements informatiques à des fins, elles, illicites. Comment procèdent donc les attaquants pour arriver à leurs fins ?</p>
<p>Dans la majorité des cas, Pour établir cette tête de pont, ils utilisent la plupart du temps des techniques classiques de <em>phishing</em> ou <em>spear-phishing</em>. En effet, il est important de bien garder à l’esprit que la particularité de cette typologie d’attaque consiste dans la non-installation du programme malveillant chez la cible, ce qui ne préjuge pas de l’utilisation de fichiers à d’autres moments (comme lors d’un <em>phishing</em>). Alternativement, des attaques par force brute ou la mise à profit d’<em>exploit</em> permettant l’exécution de code à distance peuvent également permettre d’accéder à la machine cible et de perpétrer des attaques sans fichiers.</p>
<p>Quelle que soit la technique utilisée, l’objectif final est, comme on l’a vu, de détourner l’usage d’un programme légitime. La cible principale de ce « programme-jacking » est PowerShell (Windows Management Instrumentation étant également un bon client). Cet outil système, installé de manière native sur certaines machines tournant avec un système d’exploitation Windows, a la particularité de pouvoir exécuter des tâches instruites depuis la console de commande directement dans la mémoire vive de l’appareil. Dans certains cas, une simple macro bien construite sur un fichier Word malveillant, l’exploitation d’une faille de Flash ou la redirection vers un site malveillant suffit à invoquer PowerShell. Une fois celui-ci ouvert, il se connecte alors à un serveur de <em>command &amp; control</em> et télécharge un script malveillant qui s’exécute donc depuis la mémoire vive et qui peut procéder à toute une variété d’actions, comme par exemple localiser et envoyer des données vers l’attaquant ou miner des crypto-monnaies. Des <em>fileless attacks</em> exploitant les vulnérabilités de Java (Java Process) sont également connues.</p>
<h2> Malware : le grand remplacement</h2>
<p>Et il faut croire que cette typologie d’attaque est facile à mettre en œuvre si on jette un œil aux chiffres. <a href="https://www.barkly.com/ponemon-2018-endpoint-security-statistics-trends"> </a>, pour 77% des entreprises reconnaissant avoir subi une attaque ayant réussi à compromettre le système d’information de l’entreprise, la technique utilisée est une <em>fileless attack</em>. <a href="https://www.symantec.com/blogs/threat-intelligence/powershell-threats-grow-further-and-operate-plain-sight">Symantec a signalé en juillet dernier qu’entre le premier semestre 2017 et le premier semestre 2018, l’usage malveillant de PowerShell avait augmenté de 661%</a>. Ainsi, Carbon Black a annoncé dans son rapport de menace 2017 que 97% de ses clients avaient subi une tentative de la sorte et que les attaques sans fichier utilisant des failles PowerShell ou WMI ont représenté au global 52% du total des attaques en 2017, dépassant pour la première fois de l’histoire les attaques classiques utilisant des <em>malwares</em> installés en dur sur la machine cible.</p>
<p>La raison principale de l’explosion de cette typologie de menaces trouve son origine dans la façon même qu’ont les organisations de se défendre. d’analyser de manière statique les signatures des fichiers sur le disque afin d’identifier les programmes illicites, et éventuellement de les exécuter dans des bacs à sables. La plupart de ces antivirus utilisent une fonctionnalité de l’OS pour être notifiés des nouvelles écritures sur le disque et ainsi déclencher un scan. Or, pas de fichier, pas de notification, et pas de notification, pas de scan. Les attaquants étant des personnes pragmatiques, ils ont simplement décidé de court-circuiter cette étape et de mettre ainsi en défaut l’ensemble des défenses basées sur ces anti-virus traditionnels fonctionnant par base de signatures, ces derniers devenant de plus en plus performants.</p>
<p>Les pirates de leur côté s’équipent afin de procéder plus facilement aux attaques en systématisant et simplifiant les manipulations à faire pour contourner ces anti-virus. Certains outils d’attaque actuels, comme Metasploit, facilitent les <em>fileless attacks</em> grâce à la construction de charges utiles malveillantes clefs en main à charger directement depuis Powershell.</p>
<h2>Comment chasser un malware qui n’existe pas ?</h2>
<p>Les méthodes de défense traditionnelles étant peu adaptées, il est nécessaire de repenser son approche. Si certaines menaces peuvent être stoppées simplement en redémarrant la machine (son arrêt stoppant les programmes actifs), les hackers ont trouvé la parade par l’installation d’un script dans le <em>registry</em> de Windows, entraînant la résurgence de la brèche au redémarrage par son exécution automatique avec le reste des scripts systèmes, eux légitimes. Si ce script est suffisamment court, il n’a même pas besoin d’être enregistré dans un fichier. Certaines attaques plus complexes peuvent demander l’enregistrement de leur script dans un fichier, ce qui en fait une catégorie hybride de <em>fileless attack,</em> où si un fichier est effectivement nécessaire, ça n’est toujours pas le <em>malware</em> en lui-même.</p>
<p>Depuis quelques années, le développement des solutions de type <em>Endpoint Detection Response</em> se trouve être au cœur de l’activité des éditeurs antivirus. Ces produits ne se limitent plus à la simple analyse de fichiers mais adoptent des techniques d’étude comportementale. L’idée derrière cette nouvelle façon de procéder est d’identifier les activations de programmes qui, individuellement, seraient légitimes mais dont l’exécution en parallèle ou séquentielle est suspicieuse. Par exemple, la consultation du web, l’utilisation d’une macro Microsoft Word ou l’exécution de PowerShell est légitime. En revanche, leur activation concomitante peut résulter d’un <em>phishing</em> réussi emmenant l’utilisateur sur un site web malveillant, déclenchant l’activation en cascade de PowerShell à travers une faille du premier. La solution antivirale peut donc réaliser qu’il ne s’agit pas d’une situation normale de fonctionnement et procéder aux actions de sécurité nécessaires.</p>
<p>Néanmoins, ces solutions étant basées sur des heuristiques, elles sont par définition faillibles. L’équilibre entre l’exhaustivité des détections et le nombre de faux positifs, entraînant potentiellement des incidents d’exploitation, est difficile à atteindre. Des solutions de plus en plus stables et performantes apparaissent néanmoins progressivement sur le marché, et permettent de lutter contre cette menace grandissante de manière efficace, pour peu que les terminaux utilisateurs en soient équipés.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/10/fileless-attack-le-retour-a-la-terre/">Fileless attack : Le retour à la terre</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FinTech: at the time of the digital revolution how well are the risks understood?</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/06/fintech-risk-undestanding/</link>
		
		<dc:creator><![CDATA[B3noitL4diEu]]></dc:creator>
		<pubDate>Thu, 08 Jun 2017 15:36:21 +0000</pubDate>
				<category><![CDATA[Cyber for Financial Services]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[2020]]></category>
		<category><![CDATA[cyberspace]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[new technologies]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9846/</guid>

					<description><![CDATA[<p>The FinTech phenomenon is on the rise around the world, and also in France where numerous start-ups are making their presence felt. In June 2015, the association France Fintech was created for the purpose of uniting and promoting the activities...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/06/fintech-risk-undestanding/">FinTech: at the time of the digital revolution how well are the risks understood?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>The FinTech phenomenon is on the rise around the world, and also in France where numerous start-ups are making their presence felt. In June 2015, the association <a href="http://www.francefintech.org/">France Fintech </a>was created for the purpose of uniting and promoting the activities of the different players in this sector by putting them in touch with customers, investors, public authorities and the banking ecosystem.</em></p>
<p>&nbsp;</p>
<h2>A rapidly growing market</h2>
<p>On the global scale, <strong>investments in the FinTech sector multiplied tenfold between 2010 and 2015 to reach $22 billion</strong>. The amount invested in 2016 is <a href="https://letstalkpayments.com/global-fintech-funding-36-bn-2016/%20">estimated to be $36 billion</a>, with this substantial increase being due to the arrival of <a href="https://www.bbva.com/en/news/economy/computerstudies-sciences-and-development/bbva-increases-fintech-fund-250m/">several major financial players wishing to secure their share in this very promising market</a>.</p>
<p>&nbsp;</p>
<figure id="post-9864 media-9864" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9864 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/05/Image2-2.png" alt="" width="590" height="337" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/05/Image2-2.png 590w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/05/Image2-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/05/Image2-2-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/05/Image2-2-68x39.png 68w" sizes="auto, (max-width: 590px) 100vw, 590px" /></figure>
<p>&nbsp;</p>
<p>In October 2015, <strong>the European Commission also adopted Directive PSD2</strong>, providing a legal framework promoting the use of innovative and disruptive solutions for banking and payment services. This new Directive has helped to change the definition of &#8220;payment institution&#8221; by making it more flexible and enabling new third parties to enter the market for banking services, which represents a real opportunity for the FinTech players.</p>
<p>This Directive has been in force since January 1<sup>st</sup> 2016 in all countries within the European Union and has substantially modified the role of these new entrants into the banking landscape. <strong>These new regulations require the banks to open up to these new entrants by developing APIs</strong> that allow the FinTech players to interact with their banking applications and have access to some customer data. This new context, seen initially as a threat by the traditional financial institutions, has turned into an opportunity for the banks that have speeded up their digitalization process.</p>
<p>In fact, the banking institutions’ digital transformation strategy has embraced this change and the <strong>big banks have not hesitated to create partnerships or acquire FinTech start-ups</strong>. Societe Generale, for example, which bought Fiduceo, and BNP that joined the project by Xavier Niel, Station F, the biggest campus of start-ups in the world, located in Paris. The disruption caused in the banking industry by FinTech is due to both the evolution and simplification of services to customers thanks to an improved user experience and greater flexibility, and to the new technologies which are becoming the medium for these innovative services.</p>
<p>&nbsp;</p>
<h2>Smartphones: Pillar of the FinTech companies</h2>
<p>The way that FinTech companies have evolved over the past few years has been driven by two major factors that have been the catalyst for growth in the sector. On the one hand, the financial crisis in 2008: the markets collapsed and the big investment banks went under. Investors no longer trusted the big financial institutions that were losing money, and a certain number of them preferred to turn to the promising digital enterprises in Silicon Valley.</p>
<p>Second factor: 2008 was also the year in which the blockchain was created, and the year when smartphones appeared, following the revolution initiated by Apple in 2007 with the launch of the iPhone. As the solutions offered by the FinTech players were disruptive and based on flexibility and simplicity of use, their growth was further boosted by the widespread availability of smartphones, which have become an everyday necessity. The expansion of the FinTech sector was thus encouraged by the level of maturity attained by smartphones and the applications that they host, which in turn helped them to develop and provide their services directly to users.</p>
<p>The smartphone is also a major vector in the transformation of payment methods, generally agreed to be one of the areas most remodeled by the FinTech revolution. The smartphone is not only the device that provides access to the services, but is also becoming the means of payment with NFC chips, in the same way as a bank card. Applications such as Lydia also make it possible for users to transfer money to their contacts free-of-charge and without having to make the normal bank transfer.</p>
<p>From the very launch of Apple Pay on iPhone, vulnerabilities in the design of the function <a href="http://info.rippleshot.com/blog/apple-pay-and-fraud-what-you-need-to-know">had led to a rate of 6% of fraudulent transactions in 2016 </a>as it was possible to use any card, without the CVV number and without any verification of the user&#8217;s identity, to make payments.</p>
<p>However,<strong> the security of FinTech companies cannot simply rely on that of smartphones and it must take into account all the links in the chain</strong>: from the design of the service to the data center where the company hosts its infrastructures.</p>
<p>&nbsp;</p>
<h2>Control of technology and security of the devices: major risk factors</h2>
<p>The programming, the infrastructures used and the user&#8217;s device are the keyelements that are critical to the reliability, robustness, security and integrity of a financial service. Each of them has inherent weaknesses that it is important to make secure by suitable means that satisfy both the relevant regulations and correspond to external and internal risks. The main weaknesses that have been identified for the elements that are essential to the services provided by FinTech companies are as follows:</p>
<h3>1) Devices</h3>
<p>As mentioned above, the majority of financial services offered by FinTech companies are accessible to users through their own devices (PCs, tablets, smartphones, etc.). <strong>The security of the transactions carried out depends therefore to a large extent on the level of security of the device that is used</strong>. In 2016, it became apparent that smartphones were, in just the same way as computers, a target for Trojan Horse type malware that attempts to retrieve the login information of users on the home pages of their online banks. This weakness, which is inherent to the operating system of smartphones, is generally detected when it is too late when it has already been exploited by the hackers. As for the FinTech companies, the solution they most often use to protect themselves against fraudulent operations, following the theft of an ID or password, is multiple factor authentication. This method, already widely used by businesses, is now increasingly widespread among private individuals when they log on to a sensitive online application. The second factor is generally a code sent by SMS or generated by a special application, or biometric authentication using fingerprint sensors embedded in smartphones. However, even a two factors identification along with a code sent by SMS can be ineffectual against a determined hacker who might be able to intercept the SMS if they have managed to compromise the smartphone beforehand.</p>
<p>The manufacturers are therefore working on making their mobile devices secure, and have even made it a priority with regular security updates for the purpose of covering the vulnerabilities that are detected. <strong>Every weakness discovered in the operating system of a device receives widespread media coverage and could have a significant impact on sales in this very competitive market, in which the customer&#8217;s growing awareness of security can influence the final purchase decision</strong>. The most recent smartphones are, therefore, generally considered to be less vulnerable than an aging laptop.</p>
<h3>2) Programming</h3>
<p>The case of the mutualized investor-led capital fund <a href="https://www.nextinpact.com/news/100336-the-dao-pirate-derobe-50-millions-dollars-contre-attaque-se-prepare.htm">The DAO</a> <em>,</em> based on the blockchain &#8220;Ethereum&#8221;, a network that uses a cryptographic currency, is an interesting example to illustrate how a programming error can lead to a substantial financial loss. In this case, an error present in the code that made it possible to carry out false transactions resulted in the embezzlement of $50 million belonging to the various &#8220;shareholders&#8221; in The DAO.</p>
<p>This risk of hacking using a flaw in the programming is omnipresent for businesses seeking to develop applications and other web services. <strong>It is, however, possible to limit the risks arising from these programming errors by carrying out audits on the source codes and using vulnerability scanners on the applications.</strong></p>
<p>In 2016, the researcher <a href="https://www.nextinpact.com/news/102672-n26-corrige-plusieurs-failles-securite-neo-banques-en-question.htm">Vincent Haupert in hacking the mobile application of the German 100% online neo-bank N26 </a>, not by compromising the smartphone but based on weaknesses in the application architecture. He was able to take full control and carry out illicit transactions. Following his discovery, the bank launched &#8220;Bug Bounty&#8221; campaign, an operation designed to reward people who report security breaches. Many companies, like the GAFA, but also of a more modest size, have already resorted to this type of campaign to detect potential weaknesses in their products.</p>
<p>FinTech companies therefore need to put security at the heart of their preoccupations when developing their services by integrating it in the design stage. All the more so because the financial sector is a prime target for hackers seeking to exploit any weaknesses they can identify in order to misappropriate large sums. As FinTech businesses tend to grow very quickly, the race for growth sometimes receives more attention than product security.</p>
<h3>3) Infrastructures</h3>
<p>But the Cloud is not infallible. For example, on February 28, 2016, thousands of websites and web applications belonging to various large companies, including Apple and all over the world, became inaccessible following a failure of the <a href="https://www.lesechos.fr/tech-medias/hightech/0211840294834-une-panne-du-cloud-damazon-a-impacte-une-centaine-de-milliers-de-sites-web-2068800.php"><em>Amazon</em></a> cloud.</p>
<p><em>The choice of IaaS and PaaS Cloud services providers is therefore important for businesses like the FinTech companies that supply sensitive services. </em>The latter are subject to a large number of banking regulations, such as the PCI DSS for the protection of account information, or European regulations such as the General Regulation on Data Protection (GRDP) which will come into effect in May 2018, and expose businesses to some very dissuasive financial sanctions (up to 4% of global revenue).</p>
<p>Companies must therefore be certain that the level of security and the related processes put in place by their suppliers comply with the regulations that cover them. At end-2016, in an attempt to help companies outsource their infrastructures, the French data protection agency ANSSI published a standard to be used to certify trustworthy providers of Cloud services with the Franco-German label: European Secure Cloud.</p>
<p>In the more specific context of FinTech companies, ANSSI has also invited itself to the table to contribute its recommendations. ANSSI has become a partner of the FinTech Forum created by the French financial markets regulator (AMF) and prudential and resolution control authority (ACPR). The purpose of this forum is to encourage the emergence of these new financial sector players by assessing the risks and opportunities associated with their development.</p>
<p><strong>National agencies, fully aware of the challenges posed by the transformation of the financial sector, are working towards creating greater transparency in companies regarding their overall ecosystem, and also on cyber security.</strong></p>
<p>&nbsp;</p>
<h2>Risks that are indeed difficult to cover for FinTech companies</h2>
<p>So, the cyber risks that are omnipresent for any business are all the more critical for FinTech companies. Viral infections and cryptolockers, attacks on web applications, and Distributed Denial of Service (DDoS) attacks, to mention but the most commonplace, can just as well affect devices, as applications and infrastructures, as discussed above.</p>
<p>The fight against these risks, inevitable for a business whose applications are exposed on the Internet, requires specific security skills and the putting in place of incident response plans in order to ensure the integrity and quality of their services. To respond to these challenges, banks have considerable resources, such as teams that are responsible for the continuous supervision of digital infrastructures, and they invest several tens of millions of euros every year simply to be able to guarantee their cyber security. As things stand, FinTech companies are not always able to put in place comparable financial and human resources. However, their advantage lies in their agility and the modernity and lack of obsolescence of their infrastructures, making it possible to implement effective security measures more quickly and at a lower cost. Furthermore, the <strong>increasingly close cooperation between the big traditional players and the FinTech companies means that they can benefit from the formers&#8217; maturity in terms of security</strong>, with the crux being to strike a balance between security and flexibility, one of the success factors of the FinTech companies.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/06/fintech-risk-undestanding/">FinTech: at the time of the digital revolution how well are the risks understood?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What security for cyberspace in 2020?</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/05/security-cyberspace-2020/</link>
		
		<dc:creator><![CDATA[Benjamin Pivot]]></dc:creator>
		<pubDate>Thu, 18 May 2017 16:08:04 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[2020]]></category>
		<category><![CDATA[cyberspace]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[new technologies]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9857/</guid>

					<description><![CDATA[<p>By 2020, the Internet will depend upon an ever-growing universe of connected objects and personal data, and will play an omnipresent role in our daily lives. These new technologies and possibilities are naturally attracting the attention of both regulatory bodies...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/05/security-cyberspace-2020/">What security for cyberspace in 2020?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>By 2020, the Internet will depend upon an ever-growing universe of connected objects and personal data, and will play an omnipresent role in our daily lives. These new technologies and possibilities are naturally attracting the attention of both regulatory bodies and cyber criminals alike. Security is a major challenge in view of the new threats expected to accompany the Web 3.0 as it evolves.</em></p>
<h2></h2>
<h2><strong>Changing Internet thechnologies and uses</strong></h2>
<p><strong>At the user end</strong>, <a href="http://www.ariase.com/fr/news/usages-internet-monde-reseaux-sociaux-mails-mobiles-objets-connectes-article-4060.html">the uses that have emerged over the last decade will simply become more prevalent</a> and will further expand by 2020. The growth and diversification of social media will make it possible to further accelerate the sharing of personal data with increases in technical efficiencies and the numbers of users. This phenomenon, profoundly generational in nature, might well continue to develop and therefore raise numerous <strong>questions relative to trusting in information and the limits of freedom of expression.</strong></p>
<figure id="post-9851 media-9851" class="align-none">
<figure id="post-9853 media-9853" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9853 size-medium" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image1-3-325x191.png" alt="" width="325" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image1-3-325x191.png 325w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image1-3-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image1-3-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image1-3.png 707w" sizes="auto, (max-width: 325px) 100vw, 325px" /></figure>
</figure>
<p><strong>At the company end</strong>, as part of the ongoing virtualization of the workstation, teleworking is becoming an issue in the strategic roadmaps of many groups who see it as an opportunity to reduce property overheads that generally constitute their second highest budget item. <strong>Cloud Computing is growing </strong>and is leading to the integration of an ever greater share of the information capital of businesses by specialized service providers, especially in the security of infrastructures.</p>
<p>Finally, the IoT and Machine Learning will cause major upheavals to the business models and the positioning of historical players in all fields. <strong>3 new societal needs</strong> will have to be taken into account in order to remain competitive: <strong>mobility, knowledge and trust.</strong></p>
<p>&nbsp;</p>
<h2><strong>A regulatory framework yet to be defined</strong></h2>
<p>The recent demonstrations of the power of the GAFA, capable of combining gigantic databases of users with leading edge artificial intelligence methods, are ushering in a new era devoted to the ultra-personalization of services, but also to mass monitoring. In fact, the immense opportunities opened up in the area of marketing through the ultra-personalization of services and mass monitoring hide a more alarming reality: <strong>a regulatory framework that provides less than adequate protection for Internet users confronted with the abusive and discriminatory practices of public and private players alike</strong>.</p>
<p>Given the situation, &#8220;<strong>intelligence acts</strong>&#8221; are emerging in many western countries in an attempt to impose standards on the already widespread practices of these services. Begging the question of the individual freedoms being under threat because of the pretext of the fight against terrorism, these laws are regularly adopted despite the protests voiced by civil society.</p>
<p>After a number of revelations about the activities of the NSA in Europe, the European Union decided, in October 2015, to overturn the Safe Harbor agreement that had until then allowed the United States and Europe to freely exchange data, considering that its partner across the Atlantic was no longer able to guarantee a sufficient or adequate level of data protection. To fill the legal void surrounding the use of personal data, the GDPR is the <strong>new benchmark law for personal data protection in Europe, applicable by the 28 member states as of spring 2018.</strong> The law will actually protect users to the detriment of companies who will at best see their potential usage reduced to a need to seek &#8220;explicit and positive&#8221; consent. Similarly, the European NIS Directive for the security of digital services, will gradually be transposed into national legislation, including in France in connection with the military programming law.</p>
<p>Finally, the recent tussles between the giants of the web and the American administration have proved the government&#8217;s inability of imposing on Apple and Google the enforcement of the Patriot Act. This has enabled these players to claim a certain primacy in the respect for individual freedoms and a certain autonomy from political bodies, which had previously been the sole arbitrators in these types of situation. There is a slow but definite shift in the historical balance of power, with state authorities losing out to the major players in the economy, and it is as yet very difficult to say where this will all lead.</p>
<p>Therefore, two factors will have become decisive by 2020, and even after that, in adapting to the technological age: <strong>innovating and surviving beyond the rapid evolution of the rules of competition</strong>. On the one hand, a comprehensive knowledge of the regulatory limits and constraints, and on the other hand, an ability to make the most of the available data without crossing the legally authorized limits. The whole challenge in the future environment based on the Web 3.0 will therefore be to <strong>build and maintain a relationship of mutual trust with both customers and stakeholders, particularly government.</strong></p>
<h2><strong>New threats in cyberspace</strong></h2>
<p>As part of <a href="http://www.cil.cnrs.fr/CIL/IMG/pdf/cybercriminalite_prospective-2020-v1-0_0.pdf">a forward-looking study</a> aiming to establish how cybercrime might evolve by 2020, a committee of experts has announced the <strong>types of recurrent threats to be expected by private enterprise and individuals</strong>. The primary threat to businesses will be attacks on the availability of their systems, such as denial of service, the theft of strategic data for sale to the highest bidder, and attacks on the corporate image (disinformation and denigration campaigns). For individuals, the most important threats to consider are scams and misappropriation, to which must be added attacks on alarm and home automation systems in support of physical intrusions.</p>
<figure id="post-9847 media-9847" class="align-none">
<figure id="post-9849 media-9849" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9849 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image1-1.png" alt="" width="1230" height="690" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image1-1.png 1230w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image1-1-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image1-1-768x431.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/06/Image1-1-71x39.png 71w" sizes="auto, (max-width: 1230px) 100vw, 1230px" /></figure>
</figure>
<p>Two scenarios will become widespread and will feed into each other to become characteristic of the overall landscape of threats in 2020:</p>
<ul>
<li><strong>The &#8220;attack as a service&#8221; </strong>The rapid and continuous growth of the number of connections to the Web will lead mathematically to the opening up of a very broad area to attack. <strong>Non-targeted attacks, or those based on networks of slave machines </strong>(machines controlled remotely by a hacker and used in large numbers to saturate web services, for example) could be deployed on massand achieve such a level of firepower that we cannot currently even begin to imagine it. A study conducted by university academics in Israel has estimated that <a href="http://www.numerama.com/politique/205311-un-ado-arrete-par-la-police-aux-usa-pour-avoir-perturbe-le-911.html">6,000 smartphones would be enough to destroy an emergency call system such as 911 in the United States</a>; what then, might not be achieved with a network of millions, or even billions, of objects infected by Botnet malware (malware that allows a hacker to remotely control the infected machines)? These attacks are of low complexity, but massive impact.</li>
<li><strong>Economic warfare</strong> A context of extreme competition between the major economic players in industrialized countries will lead to higher levels of &#8220;geostrategic&#8221; threat. The Internet will become a new battlefield on which will be played out the economic and political interests of nations. The threats will be targeted and will range from acts of sabotage, as was the case with the Stuxnet virus, to industrial espionage. These offensives could reach <strong>high levels of complexity and will be implemented by teams of professionals with the benefit of various forms of protection and extensive, or even unlimited, financial and operational resources.</strong></li>
</ul>
<p><strong> </strong></p>
<p><em>With Cloud Computing and connected objects becoming more widespread, the digital uses currently emerging will be commonplace by 2020. New threats are expected to accompany this evolution, less targeted at businesses and individuals and more at governments . The legislative framework, subject to major change, is currently designed as much to protect Internet users as to support businesses, and where the balance of power will end up is anybody&#8217;s guess.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/05/security-cyberspace-2020/">What security for cyberspace in 2020?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>JO2016 : qui aura la médaille d’or chez les cybercriminels ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/08/jo2016-medaille-dor-cybercriminels/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Thu, 04 Aug 2016 13:55:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[bonnes pratiques]]></category>
		<category><![CDATA[Cybercriminalité]]></category>
		<category><![CDATA[menace]]></category>
		<category><![CDATA[sensibilisation]]></category>
		<category><![CDATA[Threat intelligence]]></category>
		<guid isPermaLink="false">https://www.solucominsight.fr/?p=9143</guid>

					<description><![CDATA[<p>Les JO approchent et les risques cyber associés également, n’hésitez pas à relayer cet article de sensibilisation au ton volontairement ludique. Il n’y a pas que les athlètes qui préparent l’événement sportif international de l’année, les cybercriminels également. Chaque spécialité...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/08/jo2016-medaille-dor-cybercriminels/">JO2016 : qui aura la médaille d’or chez les cybercriminels ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Les JO approchent et les risques cyber associés également, n’hésitez pas à relayer cet article de sensibilisation au ton volontairement ludique.</em></p>
<p>Il n’y a pas que les athlètes qui préparent l’événement sportif international de l’année, les cybercriminels également. Chaque spécialité est bien représentée et va lutter pour obtenir la médaille d’or de la méthode la plus efficace de vol et de fraude. Tour d’horizon des équipes en présence et de leur stratégie.</p>
<h1>L’équipe Phishing et son lancer de faux emails</h1>
<p>Habituée des grands événements, <strong>l’équipe Phishing inonde les boîtes emails de faux messages demandant de communiquer des données sensibles</strong> comme ses identifiants ou ses coordonnées bancaires. Leur meilleure technique pendant les JO : vous proposer des loteries pour gagner des tickets gratuits ou des accès à des retransmissions TV ! Le meilleur moyen de leur résister ? Être attentif aux messages trop alléchants, trop urgents et qui contiennent des fautes de frappe ou de grammaire. Un bon réflexe : ne jamais aller sur un site en cliquant sur un lien depuis un email, mais le retaper directement dans le navigateur.</p>
<h1>Les cybersquatters et leurs tours de passe-passe quasi indétectables</h1>
<p>Les cybersquatters affutent leurs méthodes depuis plusieurs mois, ils ont créé près de <strong>4000 faux sites web</strong> dont l’adresse <a href="http://www.computerworld.com/article/3103289/security/cybercrime-infrastructure-being-ramped-up-in-brazil-ahead-of-olympics.html">ressemble étrangement à celle des sites officiels</a> mais qui vous emmènent dans leurs pièges ! Quoi de plus ressemblant entre www.rio-olympics.com et www.rio-olympisc.com ? Restez donc attentifs aux sites que vous visitez en vous assurant qu’ils ne contiennent pas d’erreur dans leur nom. Vous éviterez ainsi de tomber sur des sites dangereux qui pourraient vous forcer à télécharger des logiciels malveillants ou vous demander des données personnelles.</p>
<h1>L’équipe Ransomware et sa clé de bras numérique</h1>
<p>Cette équipe a un moyen très efficace pour vous soutirer de l’argent, elle bloque votre ordinateur et/ou votre téléphone portable et vous demande une rançon ! Une vraie clé de bras numérique digne d’un lutteur ou d’un judoka. <strong>L’équipe Ransomware joue collectif car elle fait souvent alliance avec les équipes Phishing et Cybersquatteurs</strong> qui leurs ouvrent la route via des faux emails ou des faux sites qui ensuite vous demande d’installer des logiciels complémentaires… Et c’est là où l’équipe Ransomware surgit et qu’<a href="http://www.businessrevieweurope.eu/technology/960/Phishing-ransomware-and-fake-tickets:-how-to-avoid-Rio-2016-cyber-crime">elle déploie ses outils qui bloqueront votre ordinateur</a>. Pour éviter d’être piégé, soyez très attentif et surtout n’installez pas d’applications alléchantes qui vous propose des accès gratuits à des flux TV ou à du contenu exclusif. Utilisez les boutiques d’applications officielles qui disposent d’un choix très fourni et légal.</p>
<h1>Les cybercriminels locaux et leurs faux points d’accès Wi-Fi</h1>
<p>Une équipe à domicile est toujours plus forte, c’est bien connu ! Et il faut s’attendre à ce que les cybercriminels brésiliens, présent sur place, essaient de <strong>détourner les bornes Wifi mises à disposition des visiteurs dans les lieux publics</strong> pour intercepter leurs échanges et ainsi voler des données. Le meilleur réflexe c’est d’acheter une <a href="http://prepaid-data-sim-card.wikia.com/wiki/Brazil">carte SIM locale</a> pour utiliser votre téléphone et accéder à Internet. Pour les plus férus de technologies, un VPN apportera également un bon niveau de protection, il existe de <a href="http://www.opera.com/blogs/news/2016/05/vpn-app-for-ios-free-surfeasy/">nombreuses applications comme celle d’Opera</a>. Et si vous devez vraiment utiliser du Wi-Fi, restez attentifs au moindre message d’erreur concernant la sécurité. Lorsque vous allez sur des sites Internet et que de tels messages apparaissent, c’est un signe que le point d’accès est peut-être piraté : déconnectez-vous immédiatement.</p>
<h1>L’équipe APT et sa précision redoutable</h1>
<p>Cette équipe ne vise pas le grand public, elle cherche à gagner la course en s’<strong>introduisant frauduleusement dans les systèmes de l’organisation des JO</strong>. Elle pourra ainsi y voler directement les données des athlètes, des spectateurs, mais aussi aller jusqu’à modifier des résultats, interrompre des compétitions ou empêcher leur rediffusion ! Le <strong>CIO est mobilisé sur ces menaces</strong> depuis de nombreuses années et met en œuvre un dispositif spécifique de cybersécurité. Le retour des JO de Londres nous montre clairement la <a href="http://www.computing.co.uk/ctg/news/2252841/how-the-london-olympics-dealt-with-six-major-cyber-attacks">réalité de cette menace avec plus de 165 millions d’événements </a>liés à la cybersécurité qui ont conduit à 6 attaques majeures. Rio devrait subir une pression encore plus forte au regard de l’évolution de la cybercriminalité sur ces 4 dernières années.</p>
<h1>Un bon réflexe : ce qui est trop beau pour être vrai est certainement un piège</h1>
<p>Ne tombez pas dans les pièges des cybercriminels, soyez <strong>attentifs</strong> lorsque vous surfez et lisez vos emails. Et n’oubliez pas de faire une <strong>sauvegarde de vos données</strong>, de <strong>mettre à jour votre ordinateur et votre téléphone</strong> en appliquant les<strong> correctifs de sécurité proposés</strong> et en vous assurant d’avoir un <strong>anti-virus à jour</strong>.</p>
<p>Voici l’entraînement que vous devez suivre pour vivre des Jeux Olympiques en toute cybersécurité !</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/08/jo2016-medaille-dor-cybercriminels/">JO2016 : qui aura la médaille d’or chez les cybercriminels ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersécurité : priorité à la professionnalisation en 2016 ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2015/12/cybersecurite-priorite-a-la-professionnalisation-en-2016/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Tue, 22 Dec 2015 10:40:27 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[menace]]></category>
		<category><![CDATA[priorité]]></category>
		<category><![CDATA[Règlementation]]></category>
		<category><![CDATA[Risk management]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=8636</guid>

					<description><![CDATA[<p>2015 sera certainement perçue dans le futur comme une année charnière. En effet, de grands programmes de cybersécurité ont fait leur apparition cette année. Ces derniers, associés à des budgets conséquents, montrent la prise de conscience au plus haut niveau...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/12/cybersecurite-priorite-a-la-professionnalisation-en-2016/">Cybersécurité : priorité à la professionnalisation en 2016 ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>2015 sera certainement perçue dans le futur comme une année charnière. En effet, de grands programmes de cybersécurité ont fait leur apparition cette année. Ces derniers, associés à des budgets conséquents, montrent la prise de conscience au plus haut niveau dans les entreprises des risques cyber.</p>
<p>Mais au-delà de cette succession de nouveautés, cette situation pose surtout des défis en termes d’organisation et de gestion des compétences qui devront être au cœur des actions en 2016.</p>
<h2>2015 : une année charnière</h2>
<p>L’actualité du triptyque « menaces / réglementations / produits » a été débordante sur 2015.</p>
<p>Des incidents ultra-médiatisés (Sony Pictures, <a href="https://www.solucominsight.fr/2015/05/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique/">TV5 Monde</a>, Ashley Madison, VTech…) ont rappelé régulièrement les vulnérabilités des systèmes et l’attrait des cybercriminels et des états pour les données immatérielles des entreprises. Cette médiatisation, parfois exagérée, a au moins le mérite d’attirer l’attention sur la cybersécurité au plus haut niveau dans les entreprises mais aussi largement sur l’ensemble de la population.</p>
<p>Les réglementations se sont renforcées drastiquement (Loi de Programmation Militaire, <a href="https://www.solucominsight.fr/2016/03/8822/">Règlement européen sur les données à caractère personnel</a>…) et vont nécessiter des investissements de grande ampleur. 2016 sera une année où il faudra intégrer ces nouvelles exigences et cadrer les projets de déclinaison, les échéances commençant à tomber dès 2017.</p>
<p>Les éditeurs n’ont pas été sans imagination pour inventer des nouvelles catégories de produits ou de nouveaux concepts. Après « l’anti APT », les mots-clés « <em>machine learning</em> », « <em>Self Defined Security</em> », « <em>Cloud Access Security Broker</em> &#8211; CASB » et bien d’autres nous promettent d’arriver à sécuriser les données dans un contexte de changement permanent où les frontières du SI n’existent plus et où le <em>Cloud</em> est devenu une réalité. De nombreuses startups émergent dans ces domaines et des incubateurs/accélérateurs se spécialisent (Euratechnologies, Cylon…). Nous ne serons donc pas à court de solutions innovantes.</p>
<p>Les cercles et associations s’intéressant à la cybersécurité connaissent également une progression rapide et des commissions « cybersécurité » se relancent ou font leur apparition dans des cercles d’influence qui en étaient alors dépourvus (Syntec, Cigref, Medef…).</p>
<h2>Compétences et pilotage : les clés pour réussir les grands programmes cybersécurité</h2>
<p>Mais au-delà de cette succession d’évènements à prendre en compte, la situation actuelle pose des défis nouveaux en matière de professionnalisation et de gestion des compétences qui devront être au cœur des actions en 2016.</p>
<p>En particulier, le retour d’expérience du déroulement des grands programmes met en lumière deux limites.</p>
<p>La première, c’est la difficulté à disposer des compétences nécessaires pour mener à bien ces programmes. Que cela soit dans les entreprises ou au niveau des fournisseurs conseil ou intégration, les profils ne sont pas aujourd’hui assez nombreux. D’importants efforts de reconversion ou de recrutement sont en cours (par exemple chez Solucom nous avons recruté plus de 90 personnes cette année dans le domaine de la cybersécurité). Mais ceux-ci ne donneront tous leurs fruits que dans quelques années.</p>
<p>La deuxième c’est la difficulté à faire aboutir ces programmes d’ampleur. D’un côté les acteurs historiques de la cybersécurité sont peu habitués à gérer autant de projets (parfois quasiment une centaine) et de budget (plusieurs dizaines de millions d’euros), dans des délais aussi courts. De l’autre côté, ces chantiers impactent de manière transversale l’entreprise, et en particulier les équipes en charge du SI. Ces dernières, qui sont plutôt en phase de réduction des coûts, comprennent peu l’engagement de moyens sur la cybersécurité, voire n’ont pas la capacité à réaliser les actions demandées. D’autant plus qu’il s’agit souvent d’actions « de fond » telles que la cartographie du SI ou encore une gestion rapide et efficace des changements et des incidents, sujets déjà complexes et en souffrance depuis des années. Sans oublier que le système d’information est de plus en plus diffus, en particulier via le <em>Cloud</em>, et il est toujours aussi difficile de savoir où sont et où vont les données alors qu’elles constituent pourtant &#8211; encore plus aujourd’hui qu’hier &#8211; une grande partie du patrimoine de l’entreprise.</p>
<p>Ce constat nécessite de renforcer la filière cybersécurité, en particulier de lui adjoindre des ressources, pas forcément expertes en sécurité, mais en mesure de porter des grands programmes.</p>
<h2>Une priorité : réinventer la filière « cybersécurité »</h2>
<p>2016 sera très certainement une année rythmée par des incidents, des cadrages réglementaires, des grands programmes de sécurité et des tests de produits innovants. Mais 2016 devrait aussi être l’année où la filière « cybersécurite » tirera les fruits de la prise de conscience et se réinventera en s’emparant de ces enjeux.</p>
<p>Comme souvent dans notre secteur, les banques montrent le chemin. Elles ont lancé cette année plusieurs projets de réorganisation de leur filière pour l’adapter aux nouveaux enjeux. Ce mouvement doit se décliner dans les autres secteurs d’activité et entraîner la mise en place d’une organisation équilibrée, répartie dans et hors de la DSI. Cette nouvelle organisation devra être à même de porter des grands programmes et de s’emparer des enjeux métiers, tout en développant son expertise et en assurant au quotidien le maintien en condition de sécurité du système d’information.</p>
<p>Ce qui pouvait paraître impossible précédemment l’est de moins en moins avec le support évident aujourd’hui des directions générales. Mais ces dernières attendent des résultats visibles et rapides.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/12/cybersecurite-priorite-a-la-professionnalisation-en-2016/">Cybersécurité : priorité à la professionnalisation en 2016 ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Une nouvelle année pour une nouvelle stratégie sécurité : priorité à la détection et la réaction</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/01/une-nouvelle-annee-pour-une-nouvelle-strategie-securite-priorite-a-la-detection-et-la-reaction/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Wed, 23 Jan 2013 19:52:47 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Cyberattaque]]></category>
		<category><![CDATA[Cybercriminalité]]></category>
		<category><![CDATA[failles]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[menace]]></category>
		<category><![CDATA[stratégie]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=2980</guid>

					<description><![CDATA[<p>2012 a été marquée par de très nombreux cas d’attaques sur les systèmes d’information. Les exemples abondent : Saudi Amramco, Gauss ou encore Red October, pour ne citer que les plus relayés. Ces attaques ont mis en lumière les limites de...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/01/une-nouvelle-annee-pour-une-nouvelle-strategie-securite-priorite-a-la-detection-et-la-reaction/">Une nouvelle année pour une nouvelle stratégie sécurité : priorité à la détection et la réaction</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>2012 a été marquée par de très nombreux cas d’attaques sur les systèmes d’information. Les exemples abondent : Saudi Amramco, Gauss ou encore Red October, pour ne citer que les plus relayés. Ces attaques ont mis en lumière les limites de la stratégie sécurité en vigueur dans la plupart des entreprises : un focus quasiment unique sur la protection.</p>
<h2>Un modèle de sécurité qui atteint ses limites</h2>
<p>La protection des informations avec les moyens conventionnels (pare-feu, antivirus, correctif, contrôle d’accès…) comporte de nombreuses limites  ;  les attaquants les connaissent et surtout, savent les contourner efficacement. Les attaques par ingénierie sociale permettent d’accéder aux informations d’utilisateurs légitimes et ce malgré de nombreuses sessions de sensibilisation en entreprise, les failles « zero-day » permettent d’attaquer des systèmes même maintenus à jour, l’encapsulation ou encore le chiffrement de trafic qui permettent de traverser les pare-feux sans être inquiétés.</p>
<p>Doit-on pour autant baisser les bras et reculer face aux menaces? Non, certainement pas ! Il s’agit de réorienter ses efforts différemment, accepter les risques,  et se doter des moyens permettant de limiter l’impact des attaques. La détection des attaques et l’identification de réactions appropriées sont donc à prioriser pour 2013.</p>
<h2> <strong>Détecter et réagir : les priorités de 2013</strong></h2>
<p>Ce changement d’orientation nécessite de nombreuses évolutions, tant en termes technique qu’organisationnel. Il faut réfléchir à la mise en place de nouveaux moyens, internes ou externes, afin de mieux observer le SI et d’en tirer des alertes pertinentes. Nous pensons bien évidemment aux solutions de surveillance de journaux classiques mais pas uniquement ! De nouvelles solutions, spécialisées dans les analyses statistiques permettent d’obtenir des vues pour détecter les fameux signaux fiables relatifs aux attaques. D’autres produits permettent de détecter dans les flux de données des comportements étranges, en simulant l’ouverture des pièces jointes ou des fichiers. Même si cela peut paraître démesuré, certaines organisations ont mis en place ces solutions sur 2012 et en tirent aujourd’hui des bénéfices concrets.</p>
<p>Et comme l’outil ne résout rien seul, certains processus seront aussi à revoir, en particulier sur la surveillance du SI et la gestion de crise. La création, ou le renfort, d’une cellule dédiée en charge de ces problématiques, le fameux CERT ou SOC, pourra être une solution. Cette cellule sera à même de piloter les crises, de prendre les bonnes décisions pour limiter les impacts et d’empêcher les propagations.</p>
<p>Différents scénarios de crise sont à envisager en fonction du métier et de l’exposition : attaque en déni de service, vol d’information, défacement de site, vols de données sensibles, mais aussi et peut être surtout compromission du SI… Ils devront être testés par les équipes opérationnelles mais également les métiers et la direction générale, acteurs essentiels en cas d’attaques cybercriminels.</p>
<p>Bien évidemment, il n’est pas question d’abandonner toutes les mesures de protection. Bien souvent, elles retarderont la réussite de l’attaque, voire même sur certains périmètres très protégés et face à des attaquants de niveau intermédiaire, elles les bloqueront. Mais aujourd’hui, se baser uniquement sur une protection est illusoire, il est indispensable de revoir sa stratégie sécurité et en 2013 d’orienter sa réflexion vers la détection et la réaction !</p>
<div></div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/01/une-nouvelle-annee-pour-une-nouvelle-strategie-securite-priorite-a-la-detection-et-la-reaction/">Une nouvelle année pour une nouvelle stratégie sécurité : priorité à la détection et la réaction</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
