81 résultats pour « Résilience numérique »

DETAILED ACCOUNT AND EIOPA OPINION ON THE IMPACT OF INCREASED SIZE THRESHOLDS AS PART OF THE SOLVENCY II REVIEW ON INSURANCE UNDERTAKINGS IN SCOPE OF DORA

“In its Opinion EIOPA is calling on the European Commission to take the necessary actions to avoid disproportionate compliance efforts from small insurance undertakings in the transition period prior to the application of the revised Solvency II Directive.”

EU’s first ever report on the state of cybersecurity in the Union

Date : Tags : , ,
"The first report on the state of cybersecurity in the Union provides EU policy makers with an evidence-based overview of the state of play of the cybersecurity landscape and capabilities in the EU. The report also provides policy recommendations to address identified shortcomings and increase the level of cybersecurity across the European Union. "

BOE PRA Operational resilience: Critical third parties to the UK financial sector

The UK introduced a new regulatory framework to manage risks from critical third-party providers (CTPs). CTPs must adhere to strict operational resilience requirements, including governance, risk management, and incident response. This framework aims to ensure the stability of the UK financial system by mitigating potential disruptions caused by CTP failures.

FinCEN Alert on Fraud Schemes Involving Deepfake Media Targeting Financial Institutions

FinCEN (US Treasury Financial Crimes Enforcement Network) warns financial institutions about deepfakes, emphasizing the shift of compliance risks into operational threats affecting finances, operations, and reputation. Firms must adopt tools like metadata analysis and AI to detect fraud. Reframing compliance as operational risk management enhances resilience, aligning compliance with broader strategic and risk mitigation goals.

Cyber Risk Taxonomies: Statistical Analysis of Cybersecurity Risk Classifications

Cyber risk classifications often fail in out-of-sample forecasting despite their in-sample fit. Dynamic, impact-based classifiers outperform rigid, business-driven ones in predicting losses. Cyber risk types are better suited for modeling event frequency than severity, offering crucial insights for cyber insurance and risk management strategies.

A Personal data Value at Risk Approach

The main vulnerability in data protection is ineffective risk management, often subjective and superficial. GDPR outlines what to achieve but not how, leading to inconsistent compliance. This paper advocates a quantitative approach for data protection, emphasizing analytics, quantitative risk analysis, and expert opinion calibration to enhance impact assessments.

A Novel Proactive and Dynamic Cyber Risk Assessment Methodology

This paper introduces a dynamic, proactive cyber risk assessment methodology that combines internal and external data, converting qualitative inputs into quantitative measures within a Bayesian network. Using the Exploit Prediction Scoring System, it dynamically estimates attack success probabilities and asset impact, validated through a Supervisory Control and Data Acquisition (SCADA) environment case study.

Why Cybersecurity Investments Models May Offer Misleading Guidance to Practice?

Cybersecurity investment models often mislead practitioners due to unreliable data, unverified assumptions, and false premises. These models work under idealized conditions rarely seen in real-world settings, so practitioners should carefully adapt them, recognizing their limitations and avoiding strict reliance on their recommendations.

How Does Open Innovation Affect Risk? The Case of Open Source Software Vulnerability Exploitation

Open innovation in software can improve security by allowing vulnerabilities to be found before release. However, for open source software, post-release vulnerabilities are more likely to be exploited due to source code visibility. This research shows that open source software faces greater attack risks after vulnerabilities are discovered compared to closed source software.