{"id":12120,"date":"2019-09-23T06:51:08","date_gmt":"2019-09-23T05:51:08","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=12120"},"modified":"2020-01-02T11:21:33","modified_gmt":"2020-01-02T10:21:33","slug":"cyberating-more-than-just-a-rating-a-vital-aspect-of-governance","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/","title":{"rendered":"Cyberating: more than just a rating, a vital aspect of governance"},"content":{"rendered":"<h1>From finance to cybersecurity<\/h1>\n<p>The major rating agencies, such as Moody&#8217;s and Standard &amp; Poor&#8217;s, are well known to the general public\u2014especially after the 2008 financial crisis. They now shape financial markets, <em>de facto<\/em>, through their generation of comparison grids, which are used, at global scale, to rate the solvency risks associated with companies.<\/p>\n<p>And today, it\u2019s clear that this approach of third-party organizations producing corporate ratings isn\u2019t just limited to the financial sector: it\u2019s gradually being extended into the sphere of cybersecurity.<\/p>\n<p><strong>Cyber rating agencies are now assigning &#8220;cyber scores&#8221;<\/strong> to companies which quantify the levels of cyber risk that companies are exposed to. The players doing this are mainly American (BitSight, Security ScoreCard, Panorays, and UpGuard, for example), but European start-up, Cyrating, also generates ratings by collecting and analyzing publicly available information, including:<\/p>\n<ul>\n<li>The vulnerabilities present on the company&#8217;s websites and the robustness of the TLS encryption in use;<\/li>\n<li>The reputation of the company&#8217;s public IP addresses, computed from a range of data, such as the number of complaints about spam, their appearance on blacklists used by internet and email service providers, bounce rates, etc.<\/li>\n<li>Whether corporate email address protection measures (such as DMARC, DKIM, and SPF) are in place;<\/li>\n<li>DNS analysis (whois, root and NS servers, verification of Start of Authority, MX records, etc.);<\/li>\n<li>Whether company data is present on the Dark Web.<\/li>\n<\/ul>\n<p>Apart from this public-domain data, cyber rating platforms capture and analyze a large amount of exchanged data to determine, for example, , or the versions of browsers being used.<\/p>\n<p>The algorithms used to do such analysis are particular to each cyber rating platform; and the platforms then monetizes the results by offering access to results as a subscription-based service.<\/p>\n<p><strong>Companies, then, get to know their rating by subscribing to a cyber rating platform service!<\/strong><\/p>\n<p>These scores are widely accessible, given that the rating can also be viewed by other players who subscribe to the platform. Firms can therefore compare themselves with competitors . Cyber insurers are also starting to take such ratings into account when calculating . But, more worryingly, it&#8217;s also easy to imagine that ratings might facilitate reconnaissance for cyber attackers, by helping them to target lower-rated companies\u2014whose defensive measures are likely to be weaker.<\/p>\n<p>Given all this, it seems <strong>essential that firms integrate the question of cyber ratings into their cybersecurity governance.<\/strong><\/p>\n<h1>Some obvious limitations to the current cyber rating model<\/h1>\n<p>To put it bluntly, a large part of the cyber community has serious reservations about cyber ratings; this mistrust can be summarized in the following view:<\/p>\n<p><em>&#8220;How much confidence can be placed in a security level assessment carried out by a third-party algorithm, using only a selection of the relevant parameters, and with no control mechanism for the quality of information collected?\u00a0\u201c<\/em><\/p>\n<p><em>\u00a0<\/em><em>There is still considerable work to do to perfect the model, which has a number of inherent flaws<\/em>; these, if not addressed, risk rendering the rating irrelevant:<\/p>\n<ul>\n<li>doesn\u2019t reflect a firm\u2019s overall level of security. Many factors are ignored: internal network segmentation, system and data protection measures, detection capability, etc.;<\/li>\n<li>The rating can be &#8220;polluted&#8221; by false positives: IP addresses or domain names that do not belong to the company (registration errors), traffic originating from sandboxes considered to be malicious, etc. This therefore requires the to carry out a degree of detailed work (the sorting of IP addresses, excluding certain data) in order to obtain as accurate a result as possible;<\/li>\n<li>A lack of transparency about rating algorithms makes it difficult to evaluate the elements that have led to a given score, and to identify parameters where corrections are needed.<\/li>\n<\/ul>\n<p>It\u2019s misleading to reduce a company\u2019s entire level of security to a single score. Moreover, in the future, it wouldn\u2019t be surprising to see players like Qualys propose the taking into account of the results of internal tests conducted on a company&#8217;s IS, in order to refine its rating system.<\/p>\n<h1>A wide range of use cases<\/h1>\n<p>However, these limitations shouldn\u2019t obscure <strong>the opportunities offered by subscribing to a cyber rating service<\/strong>.<\/p>\n<p>The main argument advanced by cyber rating players is that a score represents a <strong>powerful and easy-to-understand indicator for senior management<\/strong>\u2014a concept already well-established in finance but still lacking in cybersecurity. An improvement in the rating could also be used to justify and <strong>quantify the effectiveness of any corrective action plan<\/strong> applied to the company\u2019s IS services.<\/p>\n<p>In addition, cyber rating platforms make it possible to see how all the companies that have been assessed score, which enables a company to:<\/p>\n<ul>\n<li>Calibrate its performance against competitors on a common basis; and, potentially, to make an asset of cybersecurity for marketing purposes;<\/li>\n<li>Assess its suppliers\u2019 levels of cybersecurity maturity on a more objective basis than that of questionnaires completed for a Security Assurance Plan.<\/li>\n<\/ul>\n<h1>Cyber rating: an essential issue for companies<\/h1>\n<p>Given the challenges firms face, and the opportunities on offer, <em>it seems inevitable that cyber ratings will take off<\/em>, something noted by ANSSI (the French National Cybersecurity Agency) in its strategic review of cyber defense: &#8221; <em>The major players in the field will therefore become benchmarks whose market position will be difficult to challenge.\u201d<\/em><\/p>\n<p>Despite the current limitations, it\u2019s vital that companies\u2014some of whom are already talking about giving countries financial-sector-type cyber ratings\u2014identify how such ratings could be used as an asset increase awareness about cybersecurity among senior management, without, of course, stigmatizing .<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From finance to cybersecurity The major rating agencies, such as Moody&#8217;s and Standard &amp; Poor&#8217;s, are well known to the general public\u2014especially after the 2008 financial crisis. They now shape financial markets, de facto, through their generation of comparison grids,&#8230;<\/p>\n","protected":false},"author":1346,"featured_media":11882,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3270,2777],"tags":[3185,3183,3186,3102,3184],"coauthors":[3135,3136],"class_list":["post-12120","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy-en","category-cybersecurity-digital-trust","tag-cyber-en","tag-cyberating","tag-evaluation-en","tag-governance","tag-risk-estimation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberating: a vital aspect of governance - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberating: a vital aspect of governance - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"From finance to cybersecurity The major rating agencies, such as Moody&#8217;s and Standard &amp; Poor&#8217;s, are well known to the general public\u2014especially after the 2008 financial crisis. They now shape financial markets, de facto, through their generation of comparison grids,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-23T05:51:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T10:21:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/05\/Fotolia_115634650_Subscription_Monthly_XXL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3873\" \/>\n\t<meta property=\"og:image:height\" content=\"3873\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthieu P\u00e9quin, Eric Jolly\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthieu P\u00e9quin, Eric Jolly\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/\"},\"author\":{\"name\":\"Matthieu P\u00e9quin\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/43dad99b0f5b1646da68d05387799175\"},\"headline\":\"Cyberating: more than just a rating, a vital aspect of governance\",\"datePublished\":\"2019-09-23T05:51:08+00:00\",\"dateModified\":\"2020-01-02T10:21:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/\"},\"wordCount\":924,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/05\/Fotolia_115634650_Subscription_Monthly_XXL.jpg\",\"keywords\":[\"cyber\",\"cyberating\",\"\u00e9valuation\",\"governance\",\"risk estimation\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/\",\"name\":\"Cyberating: a vital aspect of governance - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/05\/Fotolia_115634650_Subscription_Monthly_XXL.jpg\",\"datePublished\":\"2019-09-23T05:51:08+00:00\",\"dateModified\":\"2020-01-02T10:21:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/05\/Fotolia_115634650_Subscription_Monthly_XXL.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/05\/Fotolia_115634650_Subscription_Monthly_XXL.jpg\",\"width\":3873,\"height\":3873,\"caption\":\"Olympic Meda icon isolated on background. Modern flat pictogram, business, marketing, internet concept. Trendy Simple vector symbol for web site design or button to mobile app. Logo illustration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberating: more than just a rating, a vital aspect of governance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/43dad99b0f5b1646da68d05387799175\",\"name\":\"Matthieu P\u00e9quin\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/matthieu-pequin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberating: a vital aspect of governance - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/","og_locale":"en_US","og_type":"article","og_title":"Cyberating: a vital aspect of governance - RiskInsight","og_description":"From finance to cybersecurity The major rating agencies, such as Moody&#8217;s and Standard &amp; Poor&#8217;s, are well known to the general public\u2014especially after the 2008 financial crisis. They now shape financial markets, de facto, through their generation of comparison grids,...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/","og_site_name":"RiskInsight","article_published_time":"2019-09-23T05:51:08+00:00","article_modified_time":"2020-01-02T10:21:33+00:00","og_image":[{"width":3873,"height":3873,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/05\/Fotolia_115634650_Subscription_Monthly_XXL.jpg","type":"image\/jpeg"}],"author":"Matthieu P\u00e9quin, Eric Jolly","twitter_misc":{"Written by":"Matthieu P\u00e9quin, Eric Jolly","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/"},"author":{"name":"Matthieu P\u00e9quin","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/43dad99b0f5b1646da68d05387799175"},"headline":"Cyberating: more than just a rating, a vital aspect of governance","datePublished":"2019-09-23T05:51:08+00:00","dateModified":"2020-01-02T10:21:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/"},"wordCount":924,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/05\/Fotolia_115634650_Subscription_Monthly_XXL.jpg","keywords":["cyber","cyberating","\u00e9valuation","governance","risk estimation"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/","name":"Cyberating: a vital aspect of governance - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/05\/Fotolia_115634650_Subscription_Monthly_XXL.jpg","datePublished":"2019-09-23T05:51:08+00:00","dateModified":"2020-01-02T10:21:33+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/05\/Fotolia_115634650_Subscription_Monthly_XXL.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/05\/Fotolia_115634650_Subscription_Monthly_XXL.jpg","width":3873,"height":3873,"caption":"Olympic Meda icon isolated on background. Modern flat pictogram, business, marketing, internet concept. Trendy Simple vector symbol for web site design or button to mobile app. Logo illustration"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/09\/cyberating-more-than-just-a-rating-a-vital-aspect-of-governance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyberating: more than just a rating, a vital aspect of governance"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/43dad99b0f5b1646da68d05387799175","name":"Matthieu P\u00e9quin","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/matthieu-pequin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1346"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=12120"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12120\/revisions"}],"predecessor-version":[{"id":12126,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12120\/revisions\/12126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/11882"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=12120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=12120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=12120"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=12120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}