{"id":15889,"date":"2021-05-28T08:29:33","date_gmt":"2021-05-28T07:29:33","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=15889"},"modified":"2021-09-14T11:51:50","modified_gmt":"2021-09-14T10:51:50","slug":"episode-2-create-a-relationship-of-trust-with-the-executive-committee","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/","title":{"rendered":"Episode 2 Create a relationship of trust with the executive committee"},"content":{"rendered":"<h1 style=\"text-align: left;\"><b><span data-contrast=\"auto\">Create a relationship of trust <\/span><\/b><b><span data-contrast=\"auto\">with<\/span><\/b><b><span data-contrast=\"auto\">&nbsp;the&nbsp;<\/span><\/b><b><span data-contrast=\"auto\">executive committee: step 2,&nbsp;<\/span><\/b><b><span data-contrast=\"auto\">solidify<\/span><\/b><b><span data-contrast=\"auto\">&nbsp;the&nbsp;<\/span><\/b><b><span data-contrast=\"auto\">organisation&#8217;s<\/span><\/b><b><span data-contrast=\"auto\">&nbsp;posture and explain the lines of action<\/span><\/b><\/h1>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Creating a relationship of trust with&nbsp;<\/span><span data-contrast=\"auto\">the<\/span><span data-contrast=\"auto\">&nbsp;executive committee is a long-term action. After a<\/span><span data-contrast=\"auto\">&nbsp;first<\/span><span data-contrast=\"auto\">&nbsp;step that often involves raising awareness and putting the cyber risk into perspective for the organization (see<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/07\/creating-a-relationship-of-trust-with-the-excom-first-step-raising-awareness\/\">BILLET 1<\/a>),<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">it is now a&nbsp;<\/span><span data-contrast=\"auto\">case<\/span><span data-contrast=\"auto\">&nbsp;of getting to the heart of the matter and starting the path of transformation!<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">TO TRANSFORM, YOU HAVE TO KNOW&nbsp;<\/span><\/b><b><span data-contrast=\"auto\">FROM WHERE YOU ARE STARTING<\/span><\/b><b><span data-contrast=\"auto\">&#8230;.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Before any transformation<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">&nbsp;it is important to define the starting point and share the findings with the executive committee. The use of&nbsp;<\/span><span data-contrast=\"auto\">international standards&nbsp;<\/span><span data-contrast=\"auto\">obviously forms the basis for evaluation<\/span><span data-contrast=\"auto\">, ISO 27001\/2 and NIST CSF are the two international references: one rather European, the other more&nbsp;<\/span><span data-contrast=\"auto\">anglo-american<\/span><span data-contrast=\"auto\">.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">But what will matter most to executives is a benchmark based on the posture of their competitors and the market in which they are located. As such, we have developed a specific tool<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">&nbsp;at Wavestone and built a comparison base that currently includes more than 50 large organizations, mostly international and based in Europe. The quality of this base is essential to convince the leaders, who during the debriefings will ask, precisely and&nbsp;<\/span><span data-contrast=\"auto\">often&nbsp;<\/span><span data-contrast=\"auto\">with&nbsp;<\/span><span data-contrast=\"auto\">a<\/span><span data-contrast=\"auto\">&nbsp;lot of hindsight, what is done elsewhere.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The first key element of an evaluation&nbsp;<\/span><b><span data-contrast=\"auto\">is to ask the right&nbsp;<\/span><\/b><b><span data-contrast=\"auto\">questions and get useful answers!<\/span><\/b><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">&nbsp;In a large organization, it is complex to<\/span><span data-contrast=\"auto\">&nbsp;carry out<\/span><span data-contrast=\"auto\">&nbsp;a detailed assessment of the level of compliance with&nbsp;<\/span><span data-contrast=\"auto\">security&nbsp;<\/span><span data-contrast=\"auto\">rules<\/span><span data-contrast=\"auto\">. The use of a simple notation, on a classic scale of maturity&nbsp;<\/span><span data-contrast=\"none\">&#8211;<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">from 1 to 4 for example<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"none\">&#8211;&nbsp;<\/span><span data-contrast=\"auto\">quickly reaches its limit. What we have chosen to do, and which has proven its worth on the ground<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">&nbsp;is to answer questions by expressing a percentage of the perimeter covered. For example, it is possible to have 80% of workstations with a simple anti-virus and 20% with a modern tooling type EDR. The same approach is replicable on more organizational issues, 50% of users<\/span><span data-contrast=\"auto\">&nbsp;aware<\/span><span data-contrast=\"auto\">&nbsp;by sending emails, 30% by tracking a webinar and 20% by face-to-face sessions.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In the collective unconscious, this phase of questioning often seems long and very energy intensive.<\/span><span data-contrast=\"auto\">&nbsp;I<\/span><span data-contrast=\"auto\">f you want a high level of detail, evidence gathering or technical checks: this can be useful when the organization already has a high level of maturity. But at the beginning, a simpler and more effective approach, typically over a short period of one month with a load of twenty days, may be enough to&nbsp;<\/span><span data-contrast=\"auto\">provide a&nbsp;<\/span><span data-contrast=\"auto\">&nbsp;concrete picture of the situation and enough concrete arguments to get decisions and initiate change.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">During the preparation phase<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">&nbsp;it will also be important to identify the expectations of the executive committee beforehand. Discussing with the most concerned members about their expectations, getting their opinions on the right way to approach the subject and the priorities of the organization will be essential to ensure the relevance of the questioning and restitution phases.&nbsp;<\/span><span data-contrast=\"auto\">There is n<\/span><span data-contrast=\"auto\">othing<\/span><span data-contrast=\"auto\">&nbsp;worse than making an off topic on the day of restitution!<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<h2 style=\"text-align: justify;\"><b><span data-contrast=\"auto\">&#8230; AND SHARE THE REALITY OF THE SITUATION&nbsp;<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">After the collection phase, the time will come for the analysis of the results.\u202fOur feedback show<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">that combining multiple views makes the most sense and is effective in gaining commitment<\/span><span data-contrast=\"auto\">. The classic rosettes of ISO or NIST compliance are obviously essential but often prove ineffective: too many axes, too many mixed elements that ultimately always give average notes.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">As mentioned in the previous post, two indicators will be successful at the beginning of the exchange: the budget dedicated to cybersecurity and the&nbsp;<\/span><span data-contrast=\"auto\">number<\/span><span data-contrast=\"auto\">&nbsp;of people<\/span><span data-contrast=\"auto\">&nbsp;mobilized on cybersecurity. The budget indicator is always tricky to handle (high annual variation and non-homogeneous accounting method), we often prefer to use that of more stable and reliable staff). Secondly, in our opinion, it is effective to run the analysis on three axes:&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Th<\/span><span data-contrast=\"auto\">e 1<\/span><span data-contrast=\"auto\">st<\/span><span data-contrast=\"auto\">&nbsp;is the&nbsp;<\/span><span data-contrast=\"auto\">resistance of the organization to the last known&nbsp;<\/span><b><span data-contrast=\"auto\">attacks.<\/span><\/b><span data-contrast=\"auto\">&nbsp;Clearly the most effective element in debriefing with the executive committee, it also helps to attract attention at the beginning of the restitution. To achieve this view, we use CERT-W operational feedback to find out&nbsp;<\/span><span data-contrast=\"auto\">about<\/span><span data-contrast=\"auto\">&nbsp;the latest methods of cybercriminal attacks and we conduct an analysis of the&nbsp;<\/span><span data-contrast=\"auto\">associated measures.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Th<\/span><span data-contrast=\"auto\">e 2<\/span><span data-contrast=\"auto\">nd<\/span><span data-contrast=\"auto\">&nbsp;is&nbsp;<\/span><span data-contrast=\"auto\">a<\/span><span data-contrast=\"auto\">&nbsp;<\/span><b><span data-contrast=\"auto\">market posture,<\/span><\/b><b><span data-contrast=\"auto\">&nbsp;<\/span><\/b><span data-contrast=\"auto\">crossing the level of compliance with international<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">benchmarks (type: &#8220;I aim for 75% ISO compliance&#8221;) with the gap to the market average for the organization concerned (&#8220;on the safety of the workstation, I am 3 points below the market. On physical security, I&#8217;m 2 points above&#8221;). Crossing these two axes helps to identify priority areas (those where you are below international standards but also above the market)&nbsp;<\/span><span data-contrast=\"auto\">and<\/span><span data-contrast=\"auto\">&nbsp;those where you should not be aggressive (the whole market is below international benchmarks, but you are above the market average).<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Th<\/span><span data-contrast=\"auto\">e 3<\/span><span data-contrast=\"auto\">rd<\/span><span data-contrast=\"auto\">&nbsp;is a<\/span><span data-contrast=\"auto\">n \u201cactors\u201d oriented view<\/span><b><span data-contrast=\"auto\">&nbsp;of the transformation,&nbsp;<\/span><\/b><span data-contrast=\"auto\">organized by the large entities that will be in charge of the transformation (for example: within the CIO the network, the workstations, the servers, within the risk directorate &#8230;). This view is very useful to conclude the exchange because it&nbsp;<\/span><span data-contrast=\"auto\">creates action&nbsp;<\/span><span data-contrast=\"auto\">and shows who will have to invest the most.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Of course, these different views can be segmented by country or large organizational units to reflect possible disparities or expectations of management.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In this phase of restitution, our feedback show<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">&nbsp;that executive committees are increasingly sensitive to cybersecurity issues and will ask very specific and concrete questions. Therefore, evidence and factual evidence about the organization must be&nbsp;<\/span><span data-contrast=\"auto\">well-informed.<\/span><span data-contrast=\"auto\">&nbsp;Having the results of recent audits, concrete figures on the length of time it takes to successfully break in, and even videos of an attack demonstration can&nbsp;<\/span><span data-contrast=\"auto\">facilitate&nbsp;<\/span><span data-contrast=\"auto\">an executive committee&nbsp;<\/span><span data-contrast=\"auto\">to become&nbsp;<\/span><span data-contrast=\"auto\">aware of the risk.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<h2 style=\"text-align: justify;\"><b><span data-contrast=\"auto\">STARTING NOW STEP 3: TRANSFORMING THE ORGANIZATION&nbsp;<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Describ<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">&nbsp;the situation, the difficulties and the axes of progress should not be an&nbsp;<\/span><span data-contrast=\"auto\">end<\/span><span data-contrast=\"auto\">. The first arguments must be prepared on the conduct of change. Who should carry the transformation? What financial volumes should be expected? What schedule to consider? What reporting should be done? And above all what sponsor in the executive committee&nbsp;<\/span><span data-contrast=\"auto\">should&nbsp;<\/span><span data-contrast=\"auto\">follow this topic! Without being a formal part of the&nbsp;<\/span><span data-contrast=\"auto\">meeting<\/span><span data-contrast=\"auto\">,&nbsp;<\/span><span data-contrast=\"auto\">incorporating these elements into<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">the end of the exchange allows us to prepare the next step and<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">collect the first opinions<\/span><span data-contrast=\"auto\">.&nbsp;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">These issues are obviously very dependent on the organization, but we are seeing trends emerging. Today, it is mainly the&nbsp;<\/span><span data-contrast=\"auto\">CISO w<\/span><span data-contrast=\"auto\">ithin the CIO that carries the transformation often supported by an experienced&nbsp;<\/span><span data-contrast=\"auto\">program<\/span><span data-contrast=\"auto\">me<\/span><span data-contrast=\"auto\">&nbsp;director familiar with the structure. Regarding budgets, for major remediation&nbsp;<\/span><span data-contrast=\"auto\">programmes<\/span><span data-contrast=\"auto\">, the sums in the financial sector range between 200 and 800 million euros, in the&nbsp;<\/span><span data-contrast=\"auto\">industr<\/span><span data-contrast=\"auto\">ial sector&nbsp;<\/span><span data-contrast=\"auto\">b<\/span><span data-contrast=\"auto\">etween 50 and 100 million. These sums are usually committed on 2- or 3-year programs and are followed by the quarterly executive committee at the launch and then a semi-annual pace can be&nbsp;<\/span><span data-contrast=\"auto\">sustained<\/span><span data-contrast=\"auto\">&nbsp;from then onwards<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">To conclude the session, the most important thing is to&nbsp;<\/span><b><span data-contrast=\"auto\">define the next step<\/span><\/b><b><span data-contrast=\"auto\">s<\/span><\/b><b><span data-contrast=\"auto\">!<\/span><\/b><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">&nbsp;Even if all these&nbsp;<\/span><span data-contrast=\"auto\">savings&nbsp;<\/span><span data-contrast=\"auto\">do not&nbsp;<\/span><span data-contrast=\"auto\">immediately&nbsp;<\/span><span data-contrast=\"auto\">lead to the launch of an investment&nbsp;<\/span><span data-contrast=\"auto\">programme<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">&nbsp;<\/span><span data-contrast=\"auto\">the risk review should take&nbsp;<\/span><span data-contrast=\"auto\">these results into account or propose the realization of a benchmark again the following year.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Create a relationship of trust with&nbsp;the&nbsp;executive committee: step 2,&nbsp;solidify&nbsp;the&nbsp;organisation&#8217;s&nbsp;posture and explain the lines of action Creating a relationship of trust with&nbsp;the&nbsp;executive committee is a long-term action. After a&nbsp;first&nbsp;step that often involves raising awareness and putting the cyber risk into perspective&#8230;<\/p>\n","protected":false},"author":15,"featured_media":16696,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3270,3977],"tags":[3450,2877,3370],"coauthors":[837],"class_list":["post-15889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy-en","category-focus","tag-audit-en","tag-strategy","tag-transformation-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Episode 2 Create a relationship of trust with the executive committee - RiskInsight<\/title>\n<meta name=\"description\" content=\"Create a relationship of trust with\u00a0the\u00a0executive committee:\u00a0solidify\u00a0the\u00a0organisation&#039;s\u00a0posture and explain the lines of action. Feedback from G\u00e9r\u00f4me Billois.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Episode 2 Create a relationship of trust with the executive committee - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Create a relationship of trust with\u00a0the\u00a0executive committee:\u00a0solidify\u00a0the\u00a0organisation&#039;s\u00a0posture and explain the lines of action. Feedback from G\u00e9r\u00f4me Billois.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-28T07:29:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-14T10:51:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/05\/Image3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Episode 2 Create a relationship of trust with the executive committee\",\"datePublished\":\"2021-05-28T07:29:33+00:00\",\"dateModified\":\"2021-09-14T10:51:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/\"},\"wordCount\":1345,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/05\/Image3.jpg\",\"keywords\":[\"audit\",\"Strategy\",\"Transformation\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Focus\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/\",\"name\":\"Episode 2 Create a relationship of trust with the executive committee - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/05\/Image3.jpg\",\"datePublished\":\"2021-05-28T07:29:33+00:00\",\"dateModified\":\"2021-09-14T10:51:50+00:00\",\"description\":\"Create a relationship of trust with\u00a0the\u00a0executive committee:\u00a0solidify\u00a0the\u00a0organisation's\u00a0posture and explain the lines of action. Feedback from G\u00e9r\u00f4me Billois.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/05\/Image3.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/05\/Image3.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Episode 2 Create a relationship of trust with the executive committee\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Episode 2 Create a relationship of trust with the executive committee - RiskInsight","description":"Create a relationship of trust with\u00a0the\u00a0executive committee:\u00a0solidify\u00a0the\u00a0organisation's\u00a0posture and explain the lines of action. Feedback from G\u00e9r\u00f4me Billois.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/","og_locale":"en_US","og_type":"article","og_title":"Episode 2 Create a relationship of trust with the executive committee - RiskInsight","og_description":"Create a relationship of trust with\u00a0the\u00a0executive committee:\u00a0solidify\u00a0the\u00a0organisation's\u00a0posture and explain the lines of action. Feedback from G\u00e9r\u00f4me Billois.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/","og_site_name":"RiskInsight","article_published_time":"2021-05-28T07:29:33+00:00","article_modified_time":"2021-09-14T10:51:50+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/05\/Image3.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Episode 2 Create a relationship of trust with the executive committee","datePublished":"2021-05-28T07:29:33+00:00","dateModified":"2021-09-14T10:51:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/"},"wordCount":1345,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/05\/Image3.jpg","keywords":["audit","Strategy","Transformation"],"articleSection":["Cyberrisk Management &amp; Strategy","Focus"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/","name":"Episode 2 Create a relationship of trust with the executive committee - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/05\/Image3.jpg","datePublished":"2021-05-28T07:29:33+00:00","dateModified":"2021-09-14T10:51:50+00:00","description":"Create a relationship of trust with\u00a0the\u00a0executive committee:\u00a0solidify\u00a0the\u00a0organisation's\u00a0posture and explain the lines of action. Feedback from G\u00e9r\u00f4me Billois.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/05\/Image3.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/05\/Image3.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/05\/episode-2-create-a-relationship-of-trust-with-the-executive-committee\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Episode 2 Create a relationship of trust with the executive committee"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/15889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=15889"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/15889\/revisions"}],"predecessor-version":[{"id":16788,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/15889\/revisions\/16788"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/16696"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=15889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=15889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=15889"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=15889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}