Phishing, data leak, laptop or smartphone thefts, fake President… end-users are key actors in securing information systems. However, it is a difficult exercise to raise their awareness to security risk and to teach them good practices. Headache for CISOs, lack…
Category: Cybersecurity & Digital Trust
In the previous article, we presented a step by step approach for Machine Learning applied to cybersecurity in order to use its value and understand how it works (lien vers partie 1 de l’article). In this second part, we will…
Nowadays, we hear about artificial intelligence (AI) everywhere, it affects all sectors... and cybersecurity is not to be left out! According to a global benchmark published by CapGemini in the summer of 2019, 69% of organizations consider that they will…
Security managers often bring us in to evaluate their cybersecurity maturity level. We help firms analyze the return on investment for cybersecurity, properly allocating the budget, comparing level of security to that of others in similar sectors or common standards,…
Find the entire story about the creation of TRUST in my first article. A campaign launch is all well, but how do you keep it going over time? The creation of TRUST was not an end in itself, but…
Retrouver toute l'histoire de la création de TRUST dans mon premier article. Un lancement de campagne c’est bien, mais comment tenir dans la durée ? La création de TRUST n’a pas été une finalité, mais un tremplin pour la…
A year ago, the idea of TRUST was born, the name of the new awareness program at Wavestone. My team and I spent a year thinking about and developing a whole new strategy to raise awareness among Wavestone employees.…
To say the least, cyber-resilience is a fashionable concept. The number of client requests on the topic has exploded this year: framing studies, program structuring, strategy definition, etc. Major accounts are currently multiplying initiatives. Paradoxically, the definition and scope of…
Nous vous en parlions dans un précédent article, la transformation numérique agile est en marche et ce nouveau modèle impose de totalement revoir sa manière d’intégrer la sécurité dans les projets. Nous allons découvrir dans cet article comment conduire un…
Let's not lie to ourselves: it sometimes feels like cybersecurity lives in a bubble. CISOs are fed up with benchmarks (10% of the IT budget, 1 FTE for 400 employees, etc.), leading them to multiply major investment programs, sometimes costing…