Risk_Insight Profile Banner
Risk_Insight Profile
Risk_Insight

@Risk_Insight

Followers
4K
Following
2K
Media
967
Statuses
5K

#Wavestone consultants' #Cybersecurity & #Digital #Trust blog. Sharing thoughts on #risk #governance #digital #identity #digital #awareness news

Paris
Joined April 2009
Don't wanna be here? Send us removal request.
@Risk_Insight
Risk_Insight
1 year
While the EU has chosen the legislative path with the AI Act to reconcile #innovation and fight against the #misuse of #AI, the UK and the US have each chosen a different approach to do that. Discover them with our experts in our latest article.
Tweet card summary image
riskinsight-wavestone.com
Today, as governments actively craft AI guidance and legislation, policymakers face the challenge of delicately balancing the need to foster innovation and ensuring accountability. A regulatory...
0
0
0
@Risk_Insight
Risk_Insight
1 year
How to secure #smart #grids?. That's why the #IEC #62351 norm was created, to help secure the IT network of smart grids. Discover with us this standard and its added value, to assess whether it is appropriate to seek compliance with it.
Tweet card summary image
riskinsight-wavestone.com
IEC 62351 is an international cybersecurity standard for Smart Grid communication and control systems. Its aim is to help grid operators protect themselves against threats endangering this sector,...
0
1
1
@Risk_Insight
Risk_Insight
1 year
Can #AI revolutionize #IAM? 💡. Our experts examine this question by exploring several use cases around AI and IAM, to identify the #added #value of current and forthcoming solutions, and the remaining #challenges for AI integration in IAM systems. 🔍.
Tweet card summary image
riskinsight-wavestone.com
But can the AI advances be applied to IAM? Can we delegate the management of our identities and accesses in whole or in part, when the protection of user data has become a major concern?
0
0
0
@Risk_Insight
Risk_Insight
1 year
How to deal with #AI-related cyber threats?. As #AI is being increasingly used within companies, come discover the insights of our experts on what new #threats this technology brings, and what measures you can take to use it in a safe and #trustworthy way.
Tweet card summary image
riskinsight-wavestone.com
The use of artificial intelligence systems and Large Language Models (LLMs) has exploded since 2023. Businesses, cybercriminals and individuals alike are beginning to use them regularly. However,...
0
0
0
@Risk_Insight
Risk_Insight
1 year
The #SBOM, a vital ally for the #security of your products?. Our experts show you how #SBOM can be used to improve your software security, what challenges still need to be overcome to exploit it fully, and what the outlooks are for SBOM in the future.
Tweet card summary image
riskinsight-wavestone.com
Since its initial appearance in 2014 and following its formalization in 2021 under the auspices of the Biden administration, the concept of SBOM (Software Bill of Materials) continues to captivate...
0
0
0
@Risk_Insight
Risk_Insight
2 years
Are #industrial #PLC networks incompatible with future cybersecurity challenges?. With #industrie4.0, industrial systems are increasingly interconnected. Our experts analyze the impacts of these transformations on the historical #PLC network model.
Tweet card summary image
riskinsight-wavestone.com
Introduction Industrial systems are a category of information systems of their own, with codes and properties that differ from “classic” IT systems. It is well known that the level of maturity of the...
0
0
0
@Risk_Insight
Risk_Insight
2 years
#Deceptive #Security, or how to trick attackers #2 🎩.After a first article on #decoy strategy conception, our experts present a use case of deceptive security on AWS #cloud. Come discover the added value of such a strategy for cloud security.
Tweet card summary image
riskinsight-wavestone.com
Today, cyber-attacks are part of our daily lives, and are becoming increasingly common and sophisticated.   Simultaneously, we are moving towards Information Systems that are built on an ever-incre...
0
0
1
@Risk_Insight
Risk_Insight
2 years
Cloud Access Security Brokers (#CASB) are emerging as a key solution to secure #cloud usage. Our experts have analyzed Microsoft CASB, Microsoft Defender for Cloud Apps, to present you the benefits and challenges of CASB implementation. #cyber #SaaS.
Tweet card summary image
riskinsight-wavestone.com
La migration des données et des espaces collaboratifs sur le cloud a donné naissance à de nouveaux canaux de fuite de données et a notablement étendu la surface d’attaque pour les entreprises. Par...
0
0
1
@Risk_Insight
Risk_Insight
2 years
In factories, most programmable logic controllers are managed by a #SCADA. Its nature makes it critical. It's therefore necessary to secure their #software. But "conventional" solutions don't meet #industrial environment constrains. #cyber #OTsecurity.
Tweet card summary image
riskinsight-wavestone.com
The industrial control system (ICS) is the set of resources and machines used to supervise and control an industrial process. This article looks at the security issues surrounding Windows devices of...
0
0
0
@Risk_Insight
Risk_Insight
2 years
#Deceptive #security or how to trick attackers 🎩.The goal is to fool attackers into believing that #security defenses are different from what they are. Our experts answer all your questions, from the most conceptual to the most technical.
Tweet card summary image
riskinsight-wavestone.com
Today, cyber-attacks are part of our daily lives, and are becoming increasingly numerous and sophisticated.  Simultaneously, we are moving towards Information Systems built on an ever-increasing...
0
0
0
@Risk_Insight
Risk_Insight
2 years
In industrial environments, #OT teams often find themselves on their own when it comes to meet cybersecurity requirements. Therefore "home-grown" solutions are often developed, unsupervised. Discover our #methodology to build a #cyber solutions catalog!.
Tweet card summary image
riskinsight-wavestone.com
During the Wavestone OT Cyber Day, Loïc Lebain and Benoit Bouffard conducted a workshop in which they noted that IT departments were still struggling to develop a catalogue of cybersecurity solutions...
0
0
0
@Risk_Insight
Risk_Insight
2 years
As the world gears up for the next #OlympicGames, it's crucial to fortify your digital defenses. Explore the new #cyber trends with our 2024 CISO #Radar:.☁ #Cloud migration.🔒 #ZeroTrust Model.🤖 #AI Powered Security.🌿 Sustainable Practices. And more!.
1
0
0
@Risk_Insight
Risk_Insight
2 years
Did your #RedTeam consider a #cloud attack vector?. Public cloud misconfigurations can allow an attacker to bypass strong tiering isolation, up-to-date OSs and full EDR coverage. Discover some of the attack paths exploited by our pentesters:
Tweet card summary image
github.com
Contribute to wavestone-cdt/jumping-from-cloud-to-on-premises-and-the-other-way-around development by creating an account on GitHub.
0
2
4
@Risk_Insight
Risk_Insight
2 years
For organizations based in #China, #compliance with the #PIPL law on personal data transfer has led them to define the autonomy level of their Chinese entity. Depending on their #risk appetite, several #scenarios may be considered…. #cyber #decoupling.
Tweet card summary image
riskinsight-wavestone.com
The PIPL (Personal Information Protection Law) has emerged as an unprecedented first example of highly protective regulation of personal data, establishing an uncertain framework that reinforces...
0
0
0
@Risk_Insight
Risk_Insight
2 years
#Cyber sector struggles to #recruit and #retain talents. In this war for talents, how can you become more #attractive to both, candidates and those already in place?. Our experts share #lessons learned from #CISOs and Talent Managers. #HR #strategy.
Tweet card summary image
riskinsight-wavestone.com
“Talent shortage”, “skills gap”, “employee burnout in cybersecurity”, “high turnover rate” – as a cybersecurity professional, you must be familiar with these expressions, for better or for worse.
0
0
0
@Risk_Insight
Risk_Insight
2 years
5 minutes to understand PIPL, China's data protection law.Passed in 2021, China's #PIPL privacy law will soon see be updated for more #flexibility on data transfer. Our experts report on:.📅 The #context.🎯 The #compliance #strategies.🔦 #Tips to prepare.
Tweet card summary image
riskinsight-wavestone.com
China may soon ease PIPL cross-border data transfer requirements, but your privacy compliance strategy should focus on the long term. Your company operates in China. You compile personal data...
0
0
0
@Risk_Insight
Risk_Insight
2 years
Transitional time during M&A ops is often an opportunity for #cyberattacks. #Cyber #DueDiligence adds significant #value to teams and guides decision-making on various levels. Our experts tell you the secrets to make it successful!. #mergeandaquisition.
Tweet card summary image
riskinsight-wavestone.com
Confidential and strategic, the due diligence phase that precedes an acquisition regularly takes place behind closed doors. This phase aims to analyse the target company for an acquisition, in order...
0
0
0
@Risk_Insight
Risk_Insight
2 years
Artificial Intelligence: are you visionary, pragmatic, or skeptical?.Between #enthusiasm and #caution, generative #AIs evoke mixed feelings. Our experts have compiled the most frequently asked questions from our clients and provided answers. #AIgen #cyber.
0
0
0
@Risk_Insight
Risk_Insight
2 years
The #CICD approach is an indispensable method for developing #app. Several #solutions in the #cloud exist to satisfy security and efficiency needs, notably on #AWS. Source code or flows management, IAM, AWS integrated solutions are reviewed by our experts.
Tweet card summary image
riskinsight-wavestone.com
Integrating security directly into the configuration of CI/CD pipelines, especially through the practice of DevSecOps, enables the development of secure applications while increasing delivery...
0
0
1
@Risk_Insight
Risk_Insight
2 years
Construction companies use #collaborative methods, in particular the #BIM method. #Altering datas required to create these models can have serious consequences, including threatening people's #life. Discover our risks scenarios and advices to secure BIM.
Tweet card summary image
riskinsight-wavestone.com
On a daily basis, stakeholders within construction handle a variety of data that may be of interest to malicious parties. They are subjected to the same types of malware attacks as players in other...
0
1
0