Cyber risques

Data Protection and the Cloud - Meeting Growing Security Needs
The risk of data breaches, either accidental or through malicious hacking, is an unfortunate consequence of electronic…
Résumé
Cyberassurance : Offres et solutions
(Contribution from a SCOR expert to an external publication) Le monde est entré dans l’ère numérique. L’information…
Résumé
Cyber resilience - The cyber risk challenge and the role of insurance
(Contribution of a SCOR expert in an external publication) The digital revolution is affecting nearly all aspects…
Cyber risk has become a topic of great importance in today’s risk management and insurance is seen…
Résumé
Cyber risks are high on the business agenda of every company, but they are difficult to assess…
Résumé
This paper proposes a methodology for a common cyber risk categorisation. The paper’s goal is to promote…
Résumé
Concern over cybersecurity is growing across all sectors of the global economy, as cyber risks have grown…
We analyze the question of risk bearing in the emerging market of the Internet of Things. While…
Résumé
This white paper examines the current state of the cyber threat worldwide and the insurance industry’s efforts…
Résumé
This paper discusses the adequacy of insurance for managing cyber risk. To this end, we extract 994…
Résumé
The cyber threat landscape is evolving with new aspects of the threat emerging all the time. This…
As a result of the rise of cyber incidents and the increased focus on computer security, more…
Résumé
To help show our support of Data Privacy Day 2013 and the importance of “Data Privacy and…
Résumé
The enormous expansion in the availability of information presents opportunities and challenges for business and government. Keeping…
Résumé
this research into the scope and availability of cyber insurance was undertaken by Airmic in order to…
Résumé
Internet users such as individuals and organizations are subject to different types of epidemic risks such as…
Résumé
As cyber liability risk continues to widen, a broader array of businesses are finding they need to…
Résumé
Recent works on Internet risk management have proposed the idea of cyber-insurance to eliminate risks due to…
Résumé
Internet users such as individuals and organizations are subject to different types of epidemic risks such as…
Résumé
Cyber-insurance is often suggested as a tool to manage IT security residual risks but the accuracy of…
Résumé
Business is currently on the front lines of a raging cyber war that is costing trillions of…
Résumé
We propose a comprehensive formal framework to classify all market models of cyber-insurance we are aware of.…
Résumé
First, cyberinsurance results in higher security investment, increasing the level of safety for information technology (IT) infrastructure.…
Résumé
This paper investigates how network security and user welfare will be affected by the presence of competitive…
Résumé
La notion de l'assurabilité est immédiatement évoquée dès qu'il s'agit de risques nouveaux ou atypiques. Les cyber-risques…
Résumé
Cyberinsurance to cover losses and liabilities from network or information security breaches can provide incentives for security…
Résumé
Cyber-insurance is considered as appropriate means to absorb financial losses caused by computer security breaches. Since insurance…
Résumé
The economic consequences of breaches in information security cannot be underestimated. According to the World Bank 2002…
Résumé

Cybersécurité

Understanding Systemic Cyber Risk

P&C > Cyber risques
10/2016
Cyberdependency and the dramatic technological transformations that are happening to enterprises, infrastructures and systems globally are profoundly…
Résumé
This cyber security risk assessment (CSRA) in intended to provide insight into the underlying causes, consequences and…
Résumé
This paper studies investment in cybersecurity, where both the software vendor and the consumers can invest in…
Résumé
The main predictions of the model are that effective botnets are located in countries with many internet…
Résumé
Cyber attacks against the financial system are becoming more frequent, more sophisticated and more widespread. Given the…
Résumé
Conformément à la nouvelle orientation stratégique de la CEA sur les stratégies fondées sur les faits et…
Résumé

Cyber risks: the growing threat

P&C > Cyber risques
06/2014
The cyber risk landscape is evolving rapidly in a multitude of areas. Governments are facing an unprecedented…
Résumé
Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that…
Résumé

Mythes et Légendes des TIC

P&C > Cyber risques
04/2014
Ce livre collectif de forum ATENA propose une approche originale pour expliquer différentes facettes des Technologies de…
The internet and associated information technology (IT), which often go by the name ‘cyberspace,’ give modern societies,…
Résumé
Guide Pensez cybersécurité pour les petites et moyennes entreprises.   Gouvernement du Canada, 2013
Résumé
The last few years have seen the threat of a crippling cyber-attack against the U.S. electric grid…
Résumé
Governments, businesses and private citizens across the globe are only beginning to understand the profound implications of…
Résumé

Guide d’hygiène informatique (ANSSI)

P&C > Cyber risques
10/2012
Protéger les données et le réseau informatique des entreprises est aujourd’hui crucial pour leur survie et leur…
Résumé
La cybersécurité des systèmes industriels. Alors qu’elle faisait, il y a encore peu, figure de science réservée…
Résumé

Cybercrime strategies

P&C > Cyber risques
03/2012
The security of information and communication technology (ICT) as well as the question of cybercrime have been…
Résumé

Cyber Dissuasion

P&C > Cyber risques
02/2012
Dans un monde où près du tiers des habitants ont accès à internet et dans lequel la…
Résumé

SANS Mobility / BYOD Security Survey

P&C > Cyber risques
02/2012
Mobile devices and their apps have become foundational tools for today’s workforce, and they are more complex…
Résumé
This report is an overview of cyber crime in Britain with exposure of this population and new…
Résumé

Second Annual Cost of Cyber Crime Study

P&C > Cyber risques
07/2011
Benchmark Study of U.S. Companies   Sponsored by ArcSight, an HP Company - Independently conducted by Ponemon…
Résumé
Virtualization separates applications, desktops, machines, networks, data and services from their physical constraints. Virtualization is an evolving…
Résumé

Basic Concepts in Cyber Warfare

P&C > Cyber risques
04/2011
Developments in computers have made possible far reaching changes in all areas of life, and the rapid…
Résumé

Reducing Systemic Cybersecurity Risk

P&C > Cyber risques
01/2011
This report is part of a broader OECD study into ―Future Global Shocks‖, examples of which could…
Résumé
Cybercrime and its potential ramifications exemplify ‘one of those things that nobody wants’ (Popper 1963). From today's…
Résumé
Enquête sur les menaces, la gestion des risques et les formes de coopération.   Center for Security…
Résumé
This cyber security risk assessment (CSRA) in intended to provide insight into the underlying causes, consequences and…
Résumé

Infrastructure

This is an analysis by a joint team to provide a lessons learned community resource from the…
Résumé

Contagion Risk and Network Design

P&C > Cyber risques
04/2015
Individuals derive benefits from their connections, but these may, at the same time, transmit external threats. Individuals…
Résumé
In recent decades, critical infrastructure has become dependent on complex software applications to perform vital societal functions…
Résumé
The CSA guidance as it enters its third edition seeks to establish a stable, secure baseline for…
Résumé
A functioning modern society depends on a complex tapestry of infrastructures: energy, communications, transportation, food, and many…
Résumé
A year ago, the McAfee report, “In the Crossfire: Critical Infrastructure in the Age of Cyberwar,” showed…
Résumé

Cloud Computing Security Risk Assessment

P&C > Cyber risques
11/2009
ENISA, supported by a group of subject matter expert comprising representatives from Industries, Academia and Governmental Organizations,…
Résumé
Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data.…
Résumé
International data privacy legislation and increasing consumer demands for the protection of their personal information mean it…
Résumé
2012. Perhaps more so than any other year, the large scale and diverse nature of data breaches…
Résumé
The Data Protection Act 1998 (the DPA) is based around eight principles of ‘good information handling’. These…
Résumé
Guide pratique à l'attention des directions générales et des directions opérationnelles.   Pascal Antonini, Sophie Bouteiller, Matthieu…
Résumé
Our world is changing. It is complex, hyperconnected, and increasingly driven by insights derived from big data.…
Résumé
Global Information Security Survey. Insights on IT risk. Business Briefing.   Ernst & Young, November 2012
Résumé
This Guide explains the purpose and effect of each principle, and gives practical examples to illustrate how…
Résumé
Composé d'une méthode et d'un catalogue de mesures, ce guide a été conçu pour aider les organismes…
Résumé
Composé d'une méthode et d'un catalogue de mesures, ce guide a été conçu pour aider les organismes…
Résumé
Information is the lifeblood of most organisations, and we are all managing more of it than ever…
Résumé
2011 will almost certainly go down as a year of civil and cultural uprising. Citizens revolted, challenged,…
Résumé
The case for growing accountability. Insights on IT risk. Business briefing.   Ernst & Young, January 2012
Résumé
Study: United States, our seventh annual benchmark study concerning the cost of data breach incidents for U.S.-…
Résumé
Much of the world’s intellectual property (IP) is embodied in music, movies, videos, books, articles, illustrations and…
Résumé
Intellectual Property (IP) crime remains a tangible threat within the UK and internationally. The IP Crime Report…
Résumé
La présente étude répond à un triple objectif : définir l’étendue du phénomène de la contrefaçon sur…
Résumé
Ce rapport consultatif décrit une forme d’attaque d’hameçonnage qui vise les bureaux d’enregistrement de noms de domaine.…
Résumé
Actes de la Conférence-débat à l’initiative de l’AFNIC - Association Française pour le Nommage Internet en Coopération…
Résumé
Publications et guides sur la cybersécurité - Gouvernement du Canada
Résumé
Research Overview
Résumé
Over 1,981 original computer security white papers in 77 different categories.
Résumé
Toutes les publications sur les risques numériques réalisées par le CIGREF
Résumé
Ensemble des recommandations et guides de l'ANSSI (Agence Nationale de la Sécurité des Systèmes d'Information) représentant les…
Résumé
Mises à jour régulières sur les cyber risques et la sécurité de l'information par le Clusif (Club…
Résumé
"The OECD Directorate for Science, Technology and Industry (STI) undertakes a wide range of activities to better…
Résumé
The UK’s independent authority set up to uphold information rights in the public interest, promoting openness by…
Résumé
Federal Act on Data Protection (DPA) of 19 June 1992 (Status as of 1 January 2011) The…
Résumé
The Personal Data Protection Commission (PDPC) is a Singapore Government statutory body established on 2 January 2013 to…
Résumé
The European Data Protection Supervisor is an independent supervisory authority devoted to protecting personal data and privacy…
Résumé
All Mandiant® M-Trends reports and resources on Cyber Threats and Security.
Résumé
Bundesministerium für Wirtschaft und Technologie
Résumé
Downloadable Master thesis (full text) / Mémoires téléchargeables en texte intégral.   Centre d'Etudes Internationales de la…
Résumé

Haut de page