81 résultats
pour « Résilience numérique »
“In its Opinion EIOPA is calling on the European Commission to take the necessary actions to avoid disproportionate compliance efforts from small insurance undertakings in the transition period prior to the application of the revised Solvency II Directive.”
"The first report on the state of cybersecurity in the Union provides EU policy makers with an evidence-based overview of the state of play of the cybersecurity landscape and capabilities in the EU. The report also provides policy recommendations to address identified shortcomings and increase the level of cybersecurity across the European Union. "
The UK introduced a new regulatory framework to manage risks from critical third-party providers (CTPs). CTPs must adhere to strict operational resilience requirements, including governance, risk management, and incident response. This framework aims to ensure the stability of the UK financial system by mitigating potential disruptions caused by CTP failures.
The ECB's 2024-2026 priorities for banks include enhancing resilience against economic and geopolitical shocks, improving governance, and advancing digital transformation. Key focuses are on credit risk management, internal governance, and cybersecurity to ensure stability amid rising uncertainties.
FinCEN (US Treasury Financial Crimes Enforcement Network) warns financial institutions about deepfakes, emphasizing the shift of compliance risks into operational threats affecting finances, operations, and reputation. Firms must adopt tools like metadata analysis and AI to detect fraud. Reframing compliance as operational risk management enhances resilience, aligning compliance with broader strategic and risk mitigation goals.
Cyber risk classifications often fail in out-of-sample forecasting despite their in-sample fit. Dynamic, impact-based classifiers outperform rigid, business-driven ones in predicting losses. Cyber risk types are better suited for modeling event frequency than severity, offering crucial insights for cyber insurance and risk management strategies.
The main vulnerability in data protection is ineffective risk management, often subjective and superficial. GDPR outlines what to achieve but not how, leading to inconsistent compliance. This paper advocates a quantitative approach for data protection, emphasizing analytics, quantitative risk analysis, and expert opinion calibration to enhance impact assessments.
This paper introduces a dynamic, proactive cyber risk assessment methodology that combines internal and external data, converting qualitative inputs into quantitative measures within a Bayesian network. Using the Exploit Prediction Scoring System, it dynamically estimates attack success probabilities and asset impact, validated through a Supervisory Control and Data Acquisition (SCADA) environment case study.
Cybersecurity investment models often mislead practitioners due to unreliable data, unverified assumptions, and false premises. These models work under idealized conditions rarely seen in real-world settings, so practitioners should carefully adapt them, recognizing their limitations and avoiding strict reliance on their recommendations.
Open innovation in software can improve security by allowing vulnerabilities to be found before release. However, for open source software, post-release vulnerabilities are more likely to be exploited due to source code visibility. This research shows that open source software faces greater attack risks after vulnerabilities are discovered compared to closed source software.