68 résultats
pour « cybersecurity »
Cet article explore les multiples facteurs influençant la prise de décision en cybersécurité au sein des organisations. Les auteurs identifient des éléments répartis sur quatre niveaux : individuel, collectif, organisationnel et industriel. L'analyse met en lumière des dimensions classiques comme la réglementation et les ressources, tout en révélant l'importance de facteurs humains tels que la motivation intrinsèque et la confiance. Un modèle conceptuel novateur illustre comment ces influences s'entrecroisent de manière dynamique plutôt que de fonctionner en vase clos. En somme, cette recherche propose une vision holistique pour aider les professionnels à naviguer dans l'incertitude des cybermenaces.
Cet article examine l'évolution des méthodes d'évaluation des risques cyber face à l'augmentation massive des données numériques et des menaces criminelles. L'étude souligne que, bien que les approches qualitatives basées sur des matrices de risques soient simples et largement adoptées, elles manquent de rigueur mathématique et de précision. Pour pallier ces faiblesses, les auteurs explorent l'utilité des méthodes quantitatives, telles que les statistiques bayésiennes et les simulations de Monte Carlo, qui offrent une analyse plus fine malgré une complexité technique accrue.
This research paper by Dr. Ana Zavgorodnia argues that cybersecurity spending should be managed through the same capital allocation discipline used in other major business domains. Although tools for quantifying risk exist, many boards currently approve security budgets based on compliance or technical narratives rather than financial materiality. To bridge this gap, the author introduces a framework featuring Exposure-Adjusted Estimation to identify risk concentrations and a Risk Efficiency Ratio to prioritize investments based on their marginal return. The model also categorizes spending into four functional domains to help leadership maintain a balanced security portfolio. By aligning with 2023 SEC disclosure rules, this approach transforms the CISO’s role into one focused on economics and risk-adjusted decision-making. Overall, the text provides a structured mechanism for boards to exercise substantive oversight by treating cyber defense as a strategic financial priority.
This research presents a machine learning framework designed to predict and reduce the risk of identity theft caused by phishing and social engineering. The authors developed a Cyber Risk Score (CRS) that combines observable security habits, like password hygiene, with latent psychological traits such as impulsive link-clicking. By utilizing a hybrid stacking ensemble model, the study achieved a 93% accuracy rate in identifying vulnerable social media users. Beyond mere prediction, the system uses SHAP analysis to provide transparent, personalized recommendations tailored to an individual’s specific behavioral weaknesses. This user-centered approach aims to bridge the gap between cybersecurity knowledge and actual online behavior through evidence-based interventions. Ultimately, the framework offers a scalable, ethical solution for organizations to protect users in increasingly sophisticated digital environments.
The outlook frames the cyber risk landscape as shaped by AI-driven threats, geopolitical instability, and widespread cyber-enabled fraud. It notes an AI arms race amplifying vulnerabilities, a fragmented global order increasing state-sponsored threats, and pervasive phishing affecting personal and professional networks. The report highlights a strategic disconnect between CEOs prioritizing financial impacts and CISOs focused on operational risks. It identifies widening “cyber inequity,” with public sector and NGO organizations less resilient due to skill shortages and funding gaps. Overall, the outlook emphasizes that cyber resilience depends on collective action, collaboration, and intelligence sharing.
The document describes an approach to regulatory adaptation that emphasizes flexible, risk-based supervision in response to digital and technological change. It presents Risk-Based Supervision as a framework intended to identify emerging risks beyond existing legislation through systematic risk identification. The discussion outlines a dual-level process combining industry-wide analysis of technological trends with firm-level assessments of IT systems and operational resilience. It further notes that identified risks are evaluated for potential impact, highlighting cybersecurity as an example that may involve cross-regulatory coordination and could threaten critical operations if severe.
This paper explores the relationship between Artificial Intelligence (AI) and cybersecurity, emphasizing AI's critical role in modern digital defense. The abstract and introduction establish the urgent need for advanced security solutions due to the increasing reliance on digital platforms and the rise of cyber threats. The research specifically examines how AI technologies like machine learning and deep learning enhance threat detection and incident response for organizations. Conversely, the document addresses significant risks associated with AI in security, including algorithmic bias, adversarial attacks, and the threat of deepfake technologies. Finally, the conclusion argues that AI's benefits outweigh its drawbacks when implemented with robust mitigation strategies, such as quantum security and human oversight, ensuring ethical and effective use.
This peer review assesses the Dutch authorities' frameworks for monitoring cyber risks, implementing supervisory practices, and coordinating incident response mechanisms. Key findings highlight the Netherlands' significant progress, including the development of the Threat Intelligence-Based Ethical Red-teaming (TIBER) and Advanced Red Teaming (ART) frameworks, while also identifying areas for improvement, such as streamlining information sharing mechanisms and analyzing third-party risks. Overall, the report underscores the persistent challenges posed by the evolving threat landscape and the strategic steps taken by the Netherlands to maintain financial stability against operational and cyber threats.
Le G7 Cyber Expert Group analyse l’impact croissant de l’intelligence artificielle sur la cybersécurité du secteur financier. L’IA, notamment l’IA générative et les systèmes agentiques, offre des capacités avancées pour renforcer la détection des menaces, automatiser l’analyse d’anomalies, améliorer la réponse aux incidents et surveiller plus efficacement les fournisseurs et chaînes d’approvisionnement. Ces atouts peuvent accroître la résilience opérationnelle des institutions financières.
Parallèlement, l’IA génère de nouveaux risques. Les acteurs malveillants peuvent utiliser ces technologies pour créer des attaques plus sophistiquées, automatiser le développement de maliciels, produire des campagnes d’hameçonnage hautement personnalisées ou contourner des systèmes de défense. Les modèles d’IA eux-mêmes deviennent vulnérables à la manipulation des données, aux fuites d’informations ou aux attaques d’ingénierie sociale visant les systèmes automatisés.
Le rapport souligne que ces évolutions exigent une adaptation de la gouvernance, de la supervision, de la gestion des tiers et des compétences internes. Les institutions doivent intégrer la cybersécurité dans le développement et l’usage de l’IA, assurer une supervision humaine adéquate, protéger les données, renforcer la détection et la réponse aux incidents et investir dans les compétences spécialisées. Les autorités sont encouragées à actualiser leurs cadres de risque, à coopérer avec l’industrie et la recherche, et à promouvoir une IA sûre, fiable et transparente pour préserver la stabilité du système financier.
This paper explores the role of a cybersecurity engineer within existing cybersecurity workforce frameworks. It specifically compares how the NIST NICE Framework, the European Cybersecurity Skills Framework (ECSF), and the UK Cyber Security Council (UKCSC) pathways align with and diverge from the cybersecurity engineer job title. The research employs a machine learning methodology to analyze job advertisements from LinkedIn against these frameworks to identify commonalities in required Tasks, Knowledge, and Skills (TKS). The central finding suggests that while the engineer title is highly in demand, its functions are distributed across multiple work roles in these frameworks, with US-based frameworks focusing more on technical abilities and breach prevention, while UK/EU frameworks emphasize operational roles and risk assessment. Ultimately, the paper seeks to make recommendations for creating a distinct and standardized cybersecurity engineer career field to address workforce planning gaps.