{"id":5379,"date":"2014-05-07T19:00:02","date_gmt":"2014-05-07T18:00:02","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=5379"},"modified":"2019-12-31T11:15:19","modified_gmt":"2019-12-31T10:15:19","slug":"target-6-mois-tard-quel-retour-cyber-assurance","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/","title":{"rendered":"Target 6 mois plus tard, quel retour sur la cyber-assurance ?"},"content":{"rendered":"<p><i>Target a \u00e9t\u00e9 victime en novembre 2013 de l\u2019une des plus importantes cyberattaques de ces derni\u00e8res ann\u00e9es\u00a0: 40 millions de donn\u00e9es bancaires et 70 millions de donn\u00e9es personnelles vol\u00e9es. Avec un tiers de la population am\u00e9ricaine touch\u00e9e pendant les f\u00eates de fin d\u2019ann\u00e9e, des obligations de notification massive, une attaque pr\u00e9m\u00e9dit\u00e9e et sophistiqu\u00e9e, Target est devenu un cas d\u2019\u00e9cole d\u00e9cortiqu\u00e9 par les experts de tous bords (experts techniques, juristes, politiques, communicants\u2026), aux 4 coins du globe. Mieux encore, Target est \u00e9galement \u00a0devenu l\u2019illustration parfaite du r\u00f4le que peut jouer la cyber-assurance dans une attaque de cette ampleur. Que retenir de ce cyber-casse du si\u00e8cle\u00a0?<\/i><\/p>\n<h2>Retour sur l\u2019attaque Target : 40 millions de donn\u00e9es bancaires subtilis\u00e9es<\/h2>\n<p>Entre le 27 Novembre 2013 et le 15 D\u00e9cembre 2013, Target s\u2019est fait subtiliser plus de 40 millions de donn\u00e9es bancaires, auxquelles s\u2019ajoutent 70 millions de donn\u00e9es personnelles. La m\u00e9thode d\u2019attaque est classique, mais bien ex\u00e9cut\u00e9e\u00a0: les attaquants ont en premier lieu <a href=\"http:\/\/krebsonsecurity.com\/2014\/02\/email-attack-on-vendor-set-up-breach-at-target\/\">pirat\u00e9 un sous-traitant du distributeur<\/a> charg\u00e9 de la surveillance \u00e0 distance des syst\u00e8mes de chauffage et de climatisation. Le syst\u00e8me de facturation externe de Target auquel le sous-traitant (et donc les attaquants) avait acc\u00e8s <a href=\"http:\/\/www.commerce.senate.gov\/public\/?a=Files.Serve&amp;File_id=24d3c229-4f2f-405d-b8db-a3a67f183883\" target=\"_blank\" rel=\"noopener noreferrer\">n\u2019\u00e9tant pas compl\u00e9tement isol\u00e9<\/a> du r\u00e9seau interne, les cyber-criminels ont r\u00e9ussi \u00e0 s\u2019y infiltrer, \u00e0 voler 70 millions de donn\u00e9es personnelles, et \u00e0 installer un logiciel malveillant sur quelques \u00a0terminaux de paiements. Apr\u00e8s des tests concluants sur les magasins concern\u00e9s, ils ont d\u00e9cid\u00e9, peu avant No\u00ebl o\u00f9 l\u2019affluence est la plus forte, de d\u00e9ployer leur <i>malware<\/i> sur la plupart des terminaux de paiements des magasins du territoire am\u00e9ricain.<\/p>\n<p>Les motivations des attaquants sont purement financi\u00e8res. En effet, une donn\u00e9e personnelle se vend sur le march\u00e9 noir entre \u00a00,25$ et 2$ environ, tandis qu\u2019une donn\u00e9e bancaire peut rapporter plusieurs dizaines de dollars. Les gains sont donc potentiellement colossaux pour les attaquants\u00a0!<\/p>\n<h2>Quel co\u00fbt pour Target\u00a0?<\/h2>\n<p><i>Ponemon Institute<\/i> annonce dans son <a href=\"http:\/\/www.ponemon.org\/library\/2013-cost-of-data-breach-global-analysis\">rapport de 2013<\/a> un co\u00fbt moyen de 130$ par donn\u00e9e subtilis\u00e9e, ce qui nous am\u00e8nerait dans le cas de Target \u00e0 un montant de plus de 14 milliards de dollars\u00a0! Il est cependant tr\u00e8s peu probable dans ce cas que de tels montants soient atteints&#8230; quoique.<\/p>\n<p>Les cons\u00e9quences financi\u00e8res de l\u2019attaque pour Target sont multiples. Hormis la perte de client\u00e8le suite \u00e0 la m\u00e9diatisation de l\u2019incident, Target a d\u00fb faire face \u00e0 de nombreux co\u00fbts\u00a0: frais d\u2019expertise technique pour colmater la br\u00e8che, frais de notification, frais de <i>credit monitoring<\/i>\u2026 et devra faire face \u00e0 de nombreux autres : amendes r\u00e8glementaires, proc\u00e8s\u2026<\/p>\n<p>Target a r\u00e9cemment d\u00e9clar\u00e9 avoir d\u00e9pens\u00e9 <a href=\"http:\/\/www.washingtonpost.com\/business\/economy\/data-breach-hits-targets-profits-but-thats-only-the-tip-of-the-iceberg\/2014\/02\/26\/159f6846-9d60-11e3-9ba6-800d1192d08b_story.html\">61 millions de dollars<\/a> pour le moment suite \u00e0 l\u2019attaque. Ce montant, a priori assez faible au regard de l\u2019importance de la crise (rien que les co\u00fbts de <i>credit monitoring<\/i> devraient d\u00e9passer ce chiffre, sans compter les frais de notification), est dans tous les cas assez loin du co\u00fbt final. En effet, s\u2019il est prouv\u00e9 que Target n\u2019\u00e9tait pas en conformit\u00e9 avec le standard PCI-DSS au moment de l\u2019attaque, le distributeur peut encourir une amende de <a href=\"http:\/\/techcrunch.com\/2013\/12\/23\/target-may-be-liable-for-up-to-3-6-billion-from-credit-card-data-breach\/\">90$ par donn\u00e9e bancaire, soit 3,6 Md$<\/a>. De plus, les banques tenteront dans ce cas de se faire rembourser la r\u00e9\u00e9mission des dizaines de millions de cartes reconstruites ainsi que les fraudes associ\u00e9es, tandis que les individus touch\u00e9s intenteront probablement une <i>class-action <\/i>(proc\u00e8s collectif) \u00e0 l\u2019encontre de Target\u2026<\/p>\n<h2>Et la cyber-assurance dans tout \u00e7a\u00a0?<\/h2>\n<p>C\u2019est l\u00e0 que la cyber-assurance prend tout son sens, en indemnisant une partie non n\u00e9gligeable de ces co\u00fbts. La cyber-assurance prend en effet en charge les <a href=\"http:\/\/www.solucom.fr\/wp-content\/uploads\/2013\/10\/focus_cyberassurance_solucom.pdf\">frais suivants<\/a>\u00a0:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5380\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2014\/05\/sch\u00e9ma-assurance.png\" alt=\"sch\u00e9ma assurance\" width=\"413\" height=\"192\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/sch\u00e9ma-assurance.png 413w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/sch\u00e9ma-assurance-411x191.png 411w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/05\/sch\u00e9ma-assurance-71x33.png 71w\" sizes=\"auto, (max-width: 413px) 100vw, 413px\" \/><\/p>\n<p style=\"text-align: left;\">Target a d\u00e9clar\u00e9 que sur les 61 millions de dollars d\u00e9pens\u00e9s, <a href=\"http:\/\/www.washingtonpost.com\/business\/economy\/data-breach-hits-targets-profits-but-thats-only-the-tip-of-the-iceberg\/2014\/02\/26\/159f6846-9d60-11e3-9ba6-800d1192d08b_story.html\" target=\"_blank\" rel=\"noopener noreferrer\">44<\/a> ont \u00e9t\u00e9 pris en charge par la cyber-assurance, l\u2019ensemble des garanties souscrites par Target s\u2019\u00e9levant \u00e0 <a href=\"http:\/\/www.businessinsurance.com\/article\/20140114\/NEWS07\/140119934\" target=\"_blank\" rel=\"noopener noreferrer\">165 M$<\/a> environ.<\/p>\n<p style=\"text-align: left;\">Cependant et il est important de le noter, la cyber-assurance ne couvrira pas la perte de client\u00e8le et la chute du cours de l\u2019action en bourse, qui restent des impacts importants mais difficilement chiffrables.<\/p>\n<p style=\"text-align: left;\">Il convient \u00e9galement de remarquer que l\u2019attaque en question touche les terminaux de paiements, soit le SI \u00ab\u00a0m\u00e9tier\u00a0\u00bb qui peut parfois faire l\u2019objet d\u2019exclusions dans les contrats de cyber-assurance. Il est donc primordial de tester sa couverture via des sc\u00e9narios d\u2019attaques concrets.<\/p>\n<p style=\"text-align: left;\">La difficult\u00e9 d\u2019estimer le co\u00fbt d\u2019un sc\u00e9nario catastrophe et des garanties n\u00e9cessaires<\/p>\n<p style=\"text-align: left;\">Pour traiter ce type de risque, la cyber-assurance peut donc avoir un r\u00f4le \u00e0 jouer. Cependant, le montant de garantie \u00e0 souscrire n\u2019est pas simple \u00e0 d\u00e9terminer. Il influe directement sur le montant de la prime annuelle \u00e0 payer par l\u2019assur\u00e9, il faut donc trouver le juste milieu entre garantie et co\u00fbt. Pour ce faire, une analyse d\u00e9taill\u00e9e des co\u00fbts par sc\u00e9nario peut \u00eatre men\u00e9e. Celle-ci permettra d\u2019estimer le montant de garantie compl\u00e9mentaire n\u00e9cessaire, une fois d\u00e9duites les garanties des \u00e9ventuelles autres assurances couvrant une partie du risque\u00a0: Responsabilit\u00e9 Civile, Tous Risques Informatiques\u2026<\/p>\n<p style=\"text-align: left;\">Mais ces estimations peuvent amener \u00e0 des chiffres astronomiques, d\u00e9passant all\u00e8grement les 500 \u00e0 600 millions d\u2019euros pour des acteurs B2C d\u2019ampleur. Le co\u00fbt de l\u2019assurance en regard est alors \u00e9lev\u00e9, mais judicieux au vu de la multiplication des incidents actuellement. Des grandes entreprises n\u2019h\u00e9sitent plus \u00e0 investir 1 million d\u2019euros par an pour ce type de contrat. Les capacit\u00e9s du march\u00e9 fran\u00e7ais sont d\u2019ailleurs en constante augmentation, atteignant aujourd\u2019hui jusqu\u2019\u00e0 500 millions d\u2019euros de garanties par police d\u2019assurance.<\/p>\n<p style=\"text-align: left;\">Mais attention \u00e0 ne pas faire ces d\u00e9penses au d\u00e9triment de l\u2019augmentation du niveau de s\u00e9curit\u00e9 de l\u2019entreprise. Car l\u2019assurance n\u2019emp\u00eache pas l\u2019incident\u00a0! Le cas Target montre bien que des signaux d\u2019alertes ont \u00e9t\u00e9 ignor\u00e9s.<\/p>\n<p style=\"text-align: left;\"><i>Target apparait donc comme une illustration parfaite du r\u00f4le de la cyber-assurance dans le cas d\u2019une cyber-attaque majeure. Cependant, un travail non n\u00e9gligeable d\u2019estimation des co\u00fbts est n\u00e9cessaire pour d\u00e9terminer le montant de garantie \u00e0 souscrire, afin d\u2019optimiser le montant de la prime annuelle. Et ceci sans oublier de prot\u00e9ger son syst\u00e8me d\u2019information des menaces cybercriminelles de plus en plus pointues\u00a0!<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Target a \u00e9t\u00e9 victime en novembre 2013 de l\u2019une des plus importantes cyberattaques de ces derni\u00e8res ann\u00e9es\u00a0: 40 millions de donn\u00e9es bancaires et 70 millions de donn\u00e9es personnelles vol\u00e9es. Avec un tiers de la population am\u00e9ricaine touch\u00e9e pendant les f\u00eates&#8230;<\/p>\n","protected":false},"author":15,"featured_media":5026,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3222,36,38],"tags":[1349,1241,70,3304],"coauthors":[837],"class_list":["post-5379","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy","category-cybersecurity-digital-trust","category-assurance","tag-cyberassurance","tag-cyberattaque","tag-gestion-des-risques","tag-risk-management-strategy-governance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Target 6 mois plus tard, quel retour sur la cyber-assurance ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"Target a \u00e9t\u00e9 victime de l\u2019une des plus importantes cyber-attaques de ces derni\u00e8res ann\u00e9es : 40 millions de donn\u00e9es bancaires et 70 millions de donn\u00e9es personnelles vol\u00e9es. Elle est devenue malgr\u00e9 elle une illustration parfaite du r\u00f4le de la cyber-assurance\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Target 6 mois plus tard, quel retour sur la cyber-assurance ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Target a \u00e9t\u00e9 victime de l\u2019une des plus importantes cyber-attaques de ces derni\u00e8res ann\u00e9es : 40 millions de donn\u00e9es bancaires et 70 millions de donn\u00e9es personnelles vol\u00e9es. Elle est devenue malgr\u00e9 elle une illustration parfaite du r\u00f4le de la cyber-assurance\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-07T18:00:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:15:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Target 6 mois plus tard, quel retour sur la cyber-assurance ?\",\"datePublished\":\"2014-05-07T18:00:02+00:00\",\"dateModified\":\"2019-12-31T10:15:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/\"},\"wordCount\":1081,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"keywords\":[\"cyberassurance\",\"Cyberattaque\",\"Gestion des risques\",\"Risk management\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\",\"M\u00e9tiers - Assurance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/\",\"name\":\"Target 6 mois plus tard, quel retour sur la cyber-assurance ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"datePublished\":\"2014-05-07T18:00:02+00:00\",\"dateModified\":\"2019-12-31T10:15:19+00:00\",\"description\":\"Target a \u00e9t\u00e9 victime de l\u2019une des plus importantes cyber-attaques de ces derni\u00e8res ann\u00e9es : 40 millions de donn\u00e9es bancaires et 70 millions de donn\u00e9es personnelles vol\u00e9es. Elle est devenue malgr\u00e9 elle une illustration parfaite du r\u00f4le de la cyber-assurance\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"width\":1800,\"height\":1350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Target 6 mois plus tard, quel retour sur la cyber-assurance ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Target 6 mois plus tard, quel retour sur la cyber-assurance ? - RiskInsight","description":"Target a \u00e9t\u00e9 victime de l\u2019une des plus importantes cyber-attaques de ces derni\u00e8res ann\u00e9es : 40 millions de donn\u00e9es bancaires et 70 millions de donn\u00e9es personnelles vol\u00e9es. Elle est devenue malgr\u00e9 elle une illustration parfaite du r\u00f4le de la cyber-assurance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/","og_locale":"en_US","og_type":"article","og_title":"Target 6 mois plus tard, quel retour sur la cyber-assurance ? - RiskInsight","og_description":"Target a \u00e9t\u00e9 victime de l\u2019une des plus importantes cyber-attaques de ces derni\u00e8res ann\u00e9es : 40 millions de donn\u00e9es bancaires et 70 millions de donn\u00e9es personnelles vol\u00e9es. Elle est devenue malgr\u00e9 elle une illustration parfaite du r\u00f4le de la cyber-assurance","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/","og_site_name":"RiskInsight","article_published_time":"2014-05-07T18:00:02+00:00","article_modified_time":"2019-12-31T10:15:19+00:00","og_image":[{"width":1800,"height":1350,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Target 6 mois plus tard, quel retour sur la cyber-assurance ?","datePublished":"2014-05-07T18:00:02+00:00","dateModified":"2019-12-31T10:15:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/"},"wordCount":1081,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","keywords":["cyberassurance","Cyberattaque","Gestion des risques","Risk management"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust","M\u00e9tiers - Assurance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/","name":"Target 6 mois plus tard, quel retour sur la cyber-assurance ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","datePublished":"2014-05-07T18:00:02+00:00","dateModified":"2019-12-31T10:15:19+00:00","description":"Target a \u00e9t\u00e9 victime de l\u2019une des plus importantes cyber-attaques de ces derni\u00e8res ann\u00e9es : 40 millions de donn\u00e9es bancaires et 70 millions de donn\u00e9es personnelles vol\u00e9es. Elle est devenue malgr\u00e9 elle une illustration parfaite du r\u00f4le de la cyber-assurance","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","width":1800,"height":1350},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/05\/target-6-mois-tard-quel-retour-cyber-assurance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Target 6 mois plus tard, quel retour sur la cyber-assurance ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=5379"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5379\/revisions"}],"predecessor-version":[{"id":12429,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5379\/revisions\/12429"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/5026"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=5379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=5379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=5379"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=5379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}