This involves mapping tools that enable data from our collaborative libraries, and therefore information and data shared by peers, to be easily visualized, quantified, and diagrammed. This information reflects risks tailored to each context and derived from the experience of other users, enabling highly realistic attack scenarios to be delivered very quickly, which managers can then project themselves into. Members of the management committee then have clear, contextualized, understandable, and concrete information that allows them to better understand the real danger they face, the risks their company must deal with, their level of protection, and the actions to be implemented with clearer priorities. All of these points are ultimately intended to enable more informed decision-making.
Strategic information sharing
A risky situation can rarely be understood without outside information and cannot be resolved alone. To protect oneself, it is necessary to share and disseminate this risk assessment so that the entire community can benefit from it through a ripple effect. The parallel with combatants is striking: a soldier never goes to the front alone. He needs others to advance, adapt to the situation, and make decisions. He is therefore both a transmitter of useful information and a receiver of information from the community. In the case of cybersecurity, we are in exactly this situation. Therefore, beyond the security measures that must address the various technological levels, decisions must concern both human and structural procedures.
Putting people and their way of thinking back at the heart of the issues
Let's be fighters! Cyber warriors protecting global national and European heritage. This depends on you, business leaders. Your role is essential. Your action is crucial. You have the power to decide and demonstrate, once again, that people are at the heart of the issues. People as decision-makers. People as actors.