156 résultats pour « Résilience numérique »
For years, "continuous monitoring" in cybersecurity lacked a clear definition, forcing improvised security practices. This paper introduces QUARC, a formal model that quantifies cybersecurity risk and links it to precise detection and response times. QUARC provides a robust, weight-free probabilistic risk function, translating this risk into concrete operational cadences using hazard and queue theories. This model offers a universal standard, allowing regulators to enforce testable compliance, security teams to monitor real-time conformance, and insurers to price risk accurately. QUARC transforms a vague policy into a measurable, enforceable reality, closing a critical loophole exploited by attackers.
This study analyzed six years of 10-K filings from 45 firms affected by ransomware, labeling 6,282 cybersecurity-related statements. Findings show disclosures increasingly focus on prospective risks and mitigation strategies, but fewer than half mention incident responses, revealing a lack of transparency. Firms often fail to connect potential risks to actual damages, highlighting limited awareness of ransomware threats.
This article presents modeling approaches—both structural and reduced-form—to improve the understanding and prediction of environmental risks. It enhances existing models for better risk assessment and pricing, particularly in infrastructure and land use contexts. Potential extensions include advanced temperature and rainfall modeling, such as stochastic mean-reversion and regime-switching Lévy processes. The paper also suggests future research comparing insurance pricing methods and exploring parametric insurance mechanisms, where payouts are triggered by measurable parameters rather than actual losses. These developments aim to refine environmental risk management and insurance strategies.
Insurance Europe responded to EIOPA's draft Opinion on AI governance in insurance, supporting clarity on existing rules but raising concerns over potential new obligations. It cautioned that the draft's language might lead to supervisory expectations being misinterpreted as binding requirements, conflicting with the EU's simplification goals for smaller firms. Insurance Europe also highlighted risks of dual supervision in some regions and emphasized the need for clear distinctions between different AI types and user roles. It urged EIOPA to focus on aligning the Opinion with established frameworks like Solvency II and GDPR for effective oversight.
Researchers proposed a new risk metric for evaluating security threats in Large Language Model (LLM) chatbots, considering system, user, and third-party risks. An empirical study using three chatbot models found that while prompt protection helps, it's not enough to prevent high-impact threats like misinformation and scams. Risk levels varied across industries and user age groups, highlighting the need for context-aware evaluation. The study contributes a structured risk assessment methodology to the field of AI security, offering a practical tool for improving LLM-powered chatbot safety and informing future research and regulatory frameworks.
The European Union’s AI Act significantly reshapes corporate governance, imposing new responsibilities on directors, compliance officers, in-house counsels, and corporate lawyers. It demands transparency, risk management, and regulatory oversight for AI systems, particularly high-risk ones. These professionals must integrate AI oversight into governance, manage liability, conduct impact assessments, and ensure cross-border compliance. With its extraterritorial reach, the Act influences non-EU entities and sets global standards for AI governance. This paper aims to offer strategic guidance on aligning corporate policies with these emerging legal requirements, emphasizing proactive risk management and ethical AI adoption.
As all transactions become digital, any involvement with EU users-even minor-triggers complex compliance risks, shifting the landscape from predictable “risk” to broader “uncertainty.” Compliance now dominates, reducing litigable individual rights and increasing disputes, but with a trend toward alternative and online dispute resolution (ADR/ODR). Traditional contract and litigation strategies are less effective, as mandatory compliance overrides forum or law choices. Future disputes will increasingly involve digital elements, requiring new approaches and cooperation between parties, especially regarding AI, data, and cybersecurity. Litigation will not decrease, but its nature will fundamentally change, demanding innovative risk management in international commercial litigation.
The Cyber Due Diligence Object Model (CDDOM) is a structured, extensible framework designed for SMEs to manage cybersecurity due diligence in digital supply chains. Aligned with regulations like NIS2, DORA, CRA, and GDPR, CDDOM enables continuous, automated, and traceable due diligence. It integrates descriptive schemas, role-specific messaging, and decision support to facilitate supplier onboarding, risk reassessment, and regulatory compliance. Validated in real-world scenarios, CDDOM supports automation, transparency, and interoperability, translating compliance and trust signals into machine-readable formats. It fosters resilient, decision-oriented cyber governance, addressing modern cybersecurity challenges outlined in recent research.
This study extends the Gordon–Loeb model for cybersecurity investment by incorporating a Hawkes process to model temporally clustered cyberattacks, reflecting real-world attack bursts. Formulated as a stochastic optimal control problem, it maximizes net benefits through adaptive investment policies that respond to attack arrivals. Numerical results show these dynamic strategies outperform static and Poisson-based models, which overlook clustering, especially in high-risk scenarios. The framework aids risk managers in tailoring responsive cybersecurity strategies. Future work includes empirical calibration, risk-averse loss modeling, cyber-insurance integration, and multivariate Hawkes processes for diverse attack types.