{"id":3874,"date":"2013-06-28T12:53:47","date_gmt":"2013-06-28T11:53:47","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=3874"},"modified":"2019-12-31T11:36:44","modified_gmt":"2019-12-31T10:36:44","slug":"souscrire-une-cyber-assurance-mode-demploi","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/","title":{"rendered":"Souscrire une cyber-assurance : mode d\u2019emploi"},"content":{"rendered":"<p><em>Apr\u00e8s avoir dans une <a href=\"http:\/\/www.solucominsight.fr\/2013\/03\/cyber-assurance-souscrire-ou-ne-pas-souscrire-telle-est-la-question\/\" target=\"_blank\" rel=\"noopener noreferrer\">pr\u00e9c\u00e9dente tribune<\/a> \u00e9valu\u00e9 l\u2019int\u00e9r\u00eat de souscrire ou non \u00e0 une cyber-assurance (produit d\u00e9di\u00e9 \u00e0 la couverture des risques li\u00e9s \u00e0 la cybercriminalit\u00e9), il convient de s\u2019int\u00e9resser d\u00e9sormais aux <strong>modalit\u00e9s de souscription<\/strong> d\u2019une telle offre.<\/em><\/p>\n<p><em>En effet, le processus de souscription constitue le<strong> pilier fondateur<\/strong> d\u2019un transfert de risques r\u00e9ussi. Il est donc primordial pour toute entreprise d\u00e9sirant franchir le pas de la cyber-assurance de conna\u00eetre toutes les caract\u00e9ristiques d\u2019une telle op\u00e9ration.<\/em><\/p>\n<h2>Quels sont les acteurs majeurs de ce processus\u00a0?<\/h2>\n<p>Les acteurs du processus de souscription sont peu nombreux et bien d\u00e9finis. Participent aux n\u00e9gociations\u00a0:<\/p>\n<ul>\n<li>Le <strong>client\u00a0<\/strong>: il s\u2019agit d\u2019une organisation ou d\u2019une entreprise souhaitant disposer d\u2019une prestation (g\u00e9n\u00e9ralement financi\u00e8re) en cas de survenance d\u2019un incident. C\u2019est lui qui exprime le besoin, que ce soit par ses Risk Manager, ses RSSI, sa Direction G\u00e9n\u00e9rale ou encore ses acteurs m\u00e9tiers.<\/li>\n<li>Le <strong>courtier\u00a0<\/strong>: il est l\u2019interm\u00e9diaire entre le souscripteur et l\u2019assureur, et joue de ce fait un r\u00f4le central tout au long du processus. Il base son travail sur une excellente connaissance du march\u00e9 et du besoin remont\u00e9 par son client.<\/li>\n<li>L\u2019<strong>assureur\u00a0<\/strong>: il cr\u00e9e les polices d\u2019assurances, en d\u00e9finissant leurs p\u00e9rim\u00e8tres de couverture, leurs plafonds de garanties ainsi que leurs primes ou franchises. Ces param\u00e8tres sont toutefois largement n\u00e9goci\u00e9s et fortement corr\u00e9l\u00e9s avec la maturit\u00e9 du client.<\/li>\n<\/ul>\n<h2>Comment se d\u00e9roule le processus de souscription \u00e0 une cyber-assurance?<\/h2>\n<p>En premier lieu, le client doit faire le point sur son besoin et confronter les risques r\u00e9siduels identifi\u00e9s comme n\u00e9cessaires \u00e0 couvrir avec ceux d\u00e9j\u00e0 couverts par une assurance. Pour ce faire, une <strong>analyse de risques r\u00e9currente<\/strong> et un <strong>bilan assurantiel<\/strong> (\u00e9valuation de la couverture actuelle et des manques) impliquant toutes les parties de l\u2019entreprise sont n\u00e9cessaires.<\/p>\n<p>Dans un second temps, il convient de <strong>choisir le courtier<\/strong> le mieux \u00e0 m\u00eame de r\u00e9pondre aux attentes du client. Dans le contexte de grandes entreprises, il sera jug\u00e9 sur son expertise sur le sujet cyber, sa capacit\u00e9 \u00e0 offrir une couverture multi-assureurs et des modalit\u00e9s de son accompagnement au cours des diff\u00e9rentes \u00e9tapes, du choix \u00e0 la vie du contrat.<\/p>\n<p>Courtier et client \u00e9changent alors sur la nature m\u00eame des risques \u00e0 traiter, ainsi que sur la maturit\u00e9 de ce dernier. Le courtier <strong>identifie<\/strong> ensuite, gr\u00e2ce \u00e0 sa connaissance pouss\u00e9e du march\u00e9, les <strong>assureurs<\/strong> les plus \u00e0 m\u00eame de r\u00e9pondre au besoin.<\/p>\n<p>Le client et le courtier pr\u00e9sentent ensuite \u00e0 l\u2019assureur leurs exigences en termes de\u00a0<strong>p\u00e9rim\u00e8tre de couverture<\/strong> et de <strong>plafond de garantie.<\/strong> Dans le cas de montants tr\u00e8s \u00e9lev\u00e9s, le courtier peut mettre en place des <strong>montages d\u2019assurances<\/strong> qui permettent d\u2019atteindre des plafonds plus \u00e9lev\u00e9s que ceux propos\u00e9s dans les offres standards. En r\u00e9ponse, l\u2019assureur \u00e9value la maturit\u00e9 du client, par l\u2019interm\u00e9diaire de <strong>questionnaires<\/strong> ou par une <strong>analyse de risques<\/strong>. L\u2019assureur propose alors un <strong>montant de prime d\u2019assurance<\/strong> en fonction de la maturit\u00e9 observ\u00e9e chez le client. Ce montant, qui varie g\u00e9n\u00e9ralement entre 1 et 5% du plafond de la garantie, est ensuite n\u00e9goci\u00e9 entre les diff\u00e9rents partis.<\/p>\n<p>Le p\u00e9rim\u00e8tre de couverture, le plafond de garantie et le montant de la prime constituent la <strong>police d\u2019assurance.<\/strong><\/p>\n<h2>Comment faire vivre le contrat\u00a0?<\/h2>\n<p>Le contrat reposant essentiellement sur le code des assurances fran\u00e7ais, le client est tenu \u00e0 certaines obligations vis-\u00e0-vis de l\u2019assureur, notamment sur le devoir d\u2019information en cas de modification significative des risques sur son syst\u00e8me d\u2019information. Cette obligation se concr\u00e9tise g\u00e9n\u00e9ralement par des r\u00e9unions annuelles entre l\u2019assureur, l\u2019assur\u00e9 et le courtier dans le but d\u2019\u00e9tablir un bilan de l\u2019\u00e9volution de la maturit\u00e9 du client et d\u2019adapter le contrat en cons\u00e9quence.<\/p>\n<p>La souplesse dans l\u2019\u00e9volution du contrat a deux principaux int\u00e9r\u00eats. Pour le client, il est de <strong>faire baisser le montant des primes<\/strong> en <strong>am\u00e9liorant sa s\u00e9curit\u00e9<\/strong>. Pour l\u2019assureur, il est d\u2019<strong>adapter le montant des primes<\/strong> en fonction de l\u2019<strong>\u00e9volution du risque<\/strong>. Cette d\u00e9marche encourage et valorise donc les travaux effectu\u00e9s en faveur de la s\u00e9curit\u00e9 du SI.<\/p>\n<h2>Comment d\u00e9clencher les garanties\u00a0?<\/h2>\n<p>Les <strong>d\u00e9lais de notification<\/strong> en cas d\u2019attaque constituent l\u2019\u00e9l\u00e9ment central du d\u00e9clenchement. Le code des assurances rappelle\u00a0: \u00ab<em>L\u2019assur\u00e9 est oblig\u00e9 de donner avis \u00e0 l&#8217;assureur, d\u00e8s qu&#8217;il en a eu connaissance et au plus tard dans le d\u00e9lai fix\u00e9 par le contrat, de tout sinistre de nature \u00e0 entra\u00eener la garantie de l&#8217;assureur. Ce d\u00e9lai ne peut \u00eatre inf\u00e9rieur \u00e0 cinq jours ouvr\u00e9s\u00a0\u00bb <\/em>(<a href=\"http:\/\/www.legifrance.gouv.fr\/affichCodeArticle.do?cidTexte=LEGITEXT000006073984&amp;idArticle=LEGIARTI000006791999\">Article L113-2<\/a>)<em>. <\/em>En cas de faute vis-\u00e0-vis de cette r\u00e8gle, le client peut se voir refuser ses garanties. L\u2019enjeu est donc d\u2019<strong>alerter au plus t\u00f4t l\u2019assureur<\/strong>, m\u00eame s\u2019il n\u2019y a que suspicion d\u2019intrusion, mais aussi de <strong>cadrer les preuves<\/strong> \u00e0 recueillir pour l\u2019indemnisation \u2013 et ce d\u00e8s l\u2019\u00e9tablissement du contrat. Le d\u00e9clenchement des garanties et le d\u00e9blocage des fonds ne peuvent se faire que si \u00a0l\u2019assureur a \u00e9t\u00e9 notifi\u00e9 dans les d\u00e9lais, et l\u2019\u00e9valuation du sinistre r\u00e9alis\u00e9e.<\/p>\n<p>En fonction des assureurs, la <strong>mise \u00e0 disposition d\u2019experts<\/strong> peut relever d\u2019une option ou ne pas \u00eatre propos\u00e9e. Le souscripteur doit par ailleurs veiller \u00e0 bien pr\u00e9ciser les modalit\u00e9s d\u2019intervention de ces experts (obligation d\u2019utiliser les prestataires de l\u2019assureur, \u2026).<\/p>\n<p>Le processus de souscription est donc bien identifi\u00e9 et cadr\u00e9. La connaissance la plus fine possible du march\u00e9 ainsi que de ses propres risques sont des atouts indispensables pour bien choisir sa cyber-assurance. Cette derni\u00e8re gagne consid\u00e9rablement en souplesse de n\u00e9gociation (p\u00e9rim\u00e8tre, plafond, prime) de par la nouveaut\u00e9 de son march\u00e9, de son \u00e9volution rapide et de la concurrence naissante.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Retrouvez tous nos articles sur le secteur de l\u2019assurance sur\u00a0<a title=\"Insurance speaker - le blog assurance des consultants Solucom\" href=\"http:\/\/www.insurancespeaker-solucom.fr\/\" target=\"_blank\" rel=\"noopener noreferrer\">Insurance speaker<\/a>, le blog assurance des consultants Solucom<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apr\u00e8s avoir dans une pr\u00e9c\u00e9dente tribune \u00e9valu\u00e9 l\u2019int\u00e9r\u00eat de souscrire ou non \u00e0 une cyber-assurance (produit d\u00e9di\u00e9 \u00e0 la couverture des risques li\u00e9s \u00e0 la cybercriminalit\u00e9), il convient de s\u2019int\u00e9resser d\u00e9sormais aux modalit\u00e9s de souscription d\u2019une telle offre. En effet,&#8230;<\/p>\n","protected":false},"author":15,"featured_media":6269,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3222,36],"tags":[1197,1349,183,70,3304,310,181],"coauthors":[837],"class_list":["post-3874","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy","category-cybersecurity-digital-trust","tag-analyse-de-risques","tag-cyberassurance","tag-cybercriminalite","tag-gestion-des-risques","tag-risk-management-strategy-governance","tag-risque","tag-rssi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Souscrire une cyber-assurance : mode d\u2019emploi<\/title>\n<meta name=\"description\" content=\"Apr\u00e8s avoir dans une pr\u00e9c\u00e9dente tribune \u00e9valu\u00e9 l\u2019int\u00e9r\u00eat de souscrire ou non \u00e0 une cyber-assurance (produit d\u00e9di\u00e9 \u00e0 la couverture des risques li\u00e9s \u00e0 la cybercriminalit\u00e9), il convient de s\u2019int\u00e9resser d\u00e9sormais aux modalit\u00e9s de souscription d\u2019une telle offre. En effet, le processus de souscription constitue le pilier fondateur d\u2019un transfert de risques r\u00e9ussi. Il est donc primordial pour toute entreprise d\u00e9sirant franchir le pas de la cyber-assurance de conna\u00eetre toutes les caract\u00e9ristiques d\u2019une telle op\u00e9ration.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Souscrire une cyber-assurance : mode d\u2019emploi\" \/>\n<meta property=\"og:description\" content=\"Apr\u00e8s avoir dans une pr\u00e9c\u00e9dente tribune \u00e9valu\u00e9 l\u2019int\u00e9r\u00eat de souscrire ou non \u00e0 une cyber-assurance (produit d\u00e9di\u00e9 \u00e0 la couverture des risques li\u00e9s \u00e0 la cybercriminalit\u00e9), il convient de s\u2019int\u00e9resser d\u00e9sormais aux modalit\u00e9s de souscription d\u2019une telle offre. En effet, le processus de souscription constitue le pilier fondateur d\u2019un transfert de risques r\u00e9ussi. Il est donc primordial pour toute entreprise d\u00e9sirant franchir le pas de la cyber-assurance de conna\u00eetre toutes les caract\u00e9ristiques d\u2019une telle op\u00e9ration.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-28T11:53:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:36:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/matrice-bleue-security-fotolia42290836m-voyager624-fotolia.com_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Souscrire une cyber-assurance : mode d\u2019emploi\",\"datePublished\":\"2013-06-28T11:53:47+00:00\",\"dateModified\":\"2019-12-31T10:36:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/\"},\"wordCount\":1060,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/matrice-bleue-security-fotolia42290836m-voyager624-fotolia.com_.jpg\",\"keywords\":[\"analyse de risques\",\"cyberassurance\",\"Cybercriminalit\u00e9\",\"Gestion des risques\",\"Risk management\",\"Risque\",\"RSSI\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/\",\"name\":\"Souscrire une cyber-assurance : mode d\u2019emploi\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/matrice-bleue-security-fotolia42290836m-voyager624-fotolia.com_.jpg\",\"datePublished\":\"2013-06-28T11:53:47+00:00\",\"dateModified\":\"2019-12-31T10:36:44+00:00\",\"description\":\"Apr\u00e8s avoir dans une pr\u00e9c\u00e9dente tribune \u00e9valu\u00e9 l\u2019int\u00e9r\u00eat de souscrire ou non \u00e0 une cyber-assurance (produit d\u00e9di\u00e9 \u00e0 la couverture des risques li\u00e9s \u00e0 la cybercriminalit\u00e9), il convient de s\u2019int\u00e9resser d\u00e9sormais aux modalit\u00e9s de souscription d\u2019une telle offre. En effet, le processus de souscription constitue le pilier fondateur d\u2019un transfert de risques r\u00e9ussi. Il est donc primordial pour toute entreprise d\u00e9sirant franchir le pas de la cyber-assurance de conna\u00eetre toutes les caract\u00e9ristiques d\u2019une telle op\u00e9ration.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/matrice-bleue-security-fotolia42290836m-voyager624-fotolia.com_.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/matrice-bleue-security-fotolia42290836m-voyager624-fotolia.com_.jpg\",\"width\":1378,\"height\":1378},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Souscrire une cyber-assurance : mode d\u2019emploi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Souscrire une cyber-assurance : mode d\u2019emploi","description":"Apr\u00e8s avoir dans une pr\u00e9c\u00e9dente tribune \u00e9valu\u00e9 l\u2019int\u00e9r\u00eat de souscrire ou non \u00e0 une cyber-assurance (produit d\u00e9di\u00e9 \u00e0 la couverture des risques li\u00e9s \u00e0 la cybercriminalit\u00e9), il convient de s\u2019int\u00e9resser d\u00e9sormais aux modalit\u00e9s de souscription d\u2019une telle offre. En effet, le processus de souscription constitue le pilier fondateur d\u2019un transfert de risques r\u00e9ussi. Il est donc primordial pour toute entreprise d\u00e9sirant franchir le pas de la cyber-assurance de conna\u00eetre toutes les caract\u00e9ristiques d\u2019une telle op\u00e9ration.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/","og_locale":"en_US","og_type":"article","og_title":"Souscrire une cyber-assurance : mode d\u2019emploi","og_description":"Apr\u00e8s avoir dans une pr\u00e9c\u00e9dente tribune \u00e9valu\u00e9 l\u2019int\u00e9r\u00eat de souscrire ou non \u00e0 une cyber-assurance (produit d\u00e9di\u00e9 \u00e0 la couverture des risques li\u00e9s \u00e0 la cybercriminalit\u00e9), il convient de s\u2019int\u00e9resser d\u00e9sormais aux modalit\u00e9s de souscription d\u2019une telle offre. En effet, le processus de souscription constitue le pilier fondateur d\u2019un transfert de risques r\u00e9ussi. Il est donc primordial pour toute entreprise d\u00e9sirant franchir le pas de la cyber-assurance de conna\u00eetre toutes les caract\u00e9ristiques d\u2019une telle op\u00e9ration.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/","og_site_name":"RiskInsight","article_published_time":"2013-06-28T11:53:47+00:00","article_modified_time":"2019-12-31T10:36:44+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/matrice-bleue-security-fotolia42290836m-voyager624-fotolia.com_.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Souscrire une cyber-assurance : mode d\u2019emploi","datePublished":"2013-06-28T11:53:47+00:00","dateModified":"2019-12-31T10:36:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/"},"wordCount":1060,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/matrice-bleue-security-fotolia42290836m-voyager624-fotolia.com_.jpg","keywords":["analyse de risques","cyberassurance","Cybercriminalit\u00e9","Gestion des risques","Risk management","Risque","RSSI"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/","url":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/","name":"Souscrire une cyber-assurance : mode d\u2019emploi","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/matrice-bleue-security-fotolia42290836m-voyager624-fotolia.com_.jpg","datePublished":"2013-06-28T11:53:47+00:00","dateModified":"2019-12-31T10:36:44+00:00","description":"Apr\u00e8s avoir dans une pr\u00e9c\u00e9dente tribune \u00e9valu\u00e9 l\u2019int\u00e9r\u00eat de souscrire ou non \u00e0 une cyber-assurance (produit d\u00e9di\u00e9 \u00e0 la couverture des risques li\u00e9s \u00e0 la cybercriminalit\u00e9), il convient de s\u2019int\u00e9resser d\u00e9sormais aux modalit\u00e9s de souscription d\u2019une telle offre. En effet, le processus de souscription constitue le pilier fondateur d\u2019un transfert de risques r\u00e9ussi. Il est donc primordial pour toute entreprise d\u00e9sirant franchir le pas de la cyber-assurance de conna\u00eetre toutes les caract\u00e9ristiques d\u2019une telle op\u00e9ration.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/matrice-bleue-security-fotolia42290836m-voyager624-fotolia.com_.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/matrice-bleue-security-fotolia42290836m-voyager624-fotolia.com_.jpg","width":1378,"height":1378},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/06\/souscrire-une-cyber-assurance-mode-demploi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Souscrire une cyber-assurance : mode d\u2019emploi"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=3874"}],"version-history":[{"count":11,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3874\/revisions"}],"predecessor-version":[{"id":12450,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3874\/revisions\/12450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6269"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=3874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=3874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=3874"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=3874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}