{"id":222893,"date":"2022-03-22T15:51:21","date_gmt":"2022-03-22T14:51:21","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=222893"},"modified":"2022-03-22T15:51:21","modified_gmt":"2022-03-22T14:51:21","slug":"due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/","title":{"rendered":"Cybersecurity Due Diligence: Cyber Threats and External Growth Operations"},"content":{"rendered":"<p>According to <a href=\"https:\/\/www.agcs.allianz.com\/news-and-insights\/news\/allianz-risk-barometer-2022-press.html\" target=\"_blank\" rel=\"noreferrer noopener\">a study by Allianz Global Corporate &amp; Specialty<\/a> completed in 2022, <strong>57% of the professionals surveyed<\/strong> (including CEOs and risk managers) believe that<strong> cybersecurity risks <\/strong>(threat of attacks from <em>ransomware<\/em>, data breaches, exploitation of vulnerabilities,\u2026)<strong> now constitute the main source of concern<\/strong> companies in terms of risk management. This consideration is part of a reality where companies are increasingly interconnected and interdependent while facing a growing number of cyberattacks, targeted or not.<\/p>\n\n\n\n<p>At the same time, the risks associated with an external growth operation <a href=\"\/en\/#croissance-externe\">[1]<\/a> are significantly linked to this reality. Indeed, mergers and acquisitions, strategic alliances, or even commercial relationships such as suppliers or subcontractors can increase the attack surface of structures, thus highlighting a type of risk that has only recently been taken into account, namely that related to cybersecurity.&nbsp;<\/p>\n\n\n\n<p>This risk now affects a wide audience, as it concerns not only the <strong>IT security actors<\/strong>, but also <strong>to the leaders<\/strong> And <strong>administrators<\/strong> committed to a logic of responsibility towards <strong>shareholders<\/strong>, <strong>suppliers<\/strong>, <strong>customers<\/strong> or even <strong>trusted third party<\/strong>.<\/p>\n\n\n\n<p>By their very nature, external growth operations share common characteristics: they involve\u2019<strong>operations whose success or failure is likely to have a lasting impact on the sustainability of companies<\/strong>. Since this type of project is not without risk, companies must take appropriate measures before concluding with the contracting party.<\/p>\n\n\n\n<p>The processes related to this type of operation are tried and tested in accounting and contractual matters: the validation of these operations is often supported by traditional control tools such as audits. <strong><em>due diligence<\/em><\/strong> (or third-party verification) in order to <strong>to ensure the proper conduct of business and to minimize exposure to risks, whether legal, financial, ethical or operational.<\/strong><\/p>\n\n\n\n<p>By definition, the procedures of <em>due diligence<\/em> result in the implementation of assessments consisting of <strong>assess the specific risk induced by the relationship<\/strong>, or that it is planned to maintain, with a third party. Among other things, Article 17 of the Sapin II law had notably established the <em>due diligence<\/em> as a legal obligation designed to protect against the risks of corruption and money laundering. Now, the 4<sup>th<\/sup> The industrial revolution highlights the need for policymakers to expand assessments of <em>due diligence<\/em> prevention<strong> against cyber risks arising during a business partnership.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-red-color has-text-color\" id=\"h-fusion-et-acquisition-et-menaces-cyber\"><strong>Mergers and Acquisitions and Cyber Threats<\/strong><\/h2>\n\n\n\n<p>In reality, it can already seem complicated for a company to master the IT security of its own information system, such as protecting itself from <a href=\"https:\/\/www.intrinsec.com\/en\/dataleak-detection\/\" target=\"_blank\" rel=\"noreferrer noopener\">data leaks<\/a>, <a href=\"https:\/\/www.intrinsec.com\/en\/gestion-des-vulnerabilites\/\" target=\"_blank\" rel=\"noreferrer noopener\">manage vulnerabilities<\/a> identified on its computer network or to protect itself from malicious individuals attempting to infiltrate internal networks.&nbsp;<\/p>\n\n\n\n<p>However, when a merger occurs between two companies, the scale of this problem and the resulting workload for IT and security departments are significantly increased. This merger highlights the potential existence of differences in the level and maturity of information system security between the two entities, as well as operational differences that need to be standardized, while interconnections still need to be established. The resulting vulnerability takes the form of a higher risk of exposure; the company can become an easier target for cyberattacks.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.csoonline.com\/article\/3441220\/marriott-data-breach-faq-how-did-it-happen-and-what-was-the-impact.html\" target=\"_blank\" rel=\"noreferrer noopener\">The massive Marriott Hotels data leak<\/a><\/strong> In 2018, this highlighted the need for companies to pay particular attention to cybersecurity during their external growth processes. Indeed, this major player in the hotel sector had stated at the time that its reservation system had been compromised., <strong>exposing the personal data of 339 million customers<\/strong>, including for some of them their payment card numbers.<\/p>\n\n\n\n<p>This attack triggered an internal investigation which determined, through a forensic analysis process, that the network of its subsidiary Starwood had been compromised in 2014, when Starwood was a separate company. Marriott acquired Starwood in September 2016 for $12.2 billion, but nearly two years later, the management of the former Starwood hotels had not been transferred to Marriott&#039;s reservation system and still relied on Starwood&#039;s legacy IT infrastructure.<\/p>\n\n\n\n<p>As part of its investigation, Marriott discovered data that the attackers had encrypted and were attempting to delete from Starwood&#039;s systems. In November 2018, they successfully decrypted the data and acknowledged that it contained information on nearly 339 million customer records.<\/p>\n\n\n\n<p>Although zero risk does not exist, the fact that the attack went unnoticed for almost two years after the acquisition of the subsidiary highlights, among other things, the need for companies to undertake strict control measures during a merger and acquisition process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-vivid-purple-color has-text-color\"><strong>Third-party management and cyber threats<\/strong><\/h3>\n\n\n\n<p>Similarly, cybersecurity risk factors remain insufficiently explored as a preventative measure before establishing a business relationship between two parties. Many companies today outsource certain activities to subcontractors or suppliers in order to gain a competitive edge. However, <a href=\"\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/07\/14\/the-rise-of-third-party-digital-risk\/\" target=\"_blank\" rel=\"noreferrer noopener\">a study by Ponemon Institute and SecureLink<\/a> indicates that 51% of the professionals surveyed believe that<strong> Their organization does not evaluate security and confidentiality practices.<\/strong> of all third parties before granting them the appropriate access. The study&#039;s results also revealed that organizations are not taking adequate measures to mitigate stakeholder risk, thus exposing their networks to security and compliance risks. Consequently, <strong>44% organizations would have suffered a breach in the last 12 months<\/strong>, of which <strong>74 % stated that this resulted from overly privileged access to third parties<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-vivid-purple-color has-text-color\"><strong>Supply chain risks<\/strong><\/h3>\n\n\n\n<p>Beyond mergers and acquisitions, cyber risks to the supply chain and suppliers have proliferated, becoming the target of increasingly sophisticated cyberattacks.<\/p>\n\n\n\n<p>Indeed, by granting, for example, service providers or suppliers access to confidential data and information, as well as the potential interconnection of information systems, companies assume a <strong>new level of responsibility and risk<\/strong>. Attacks targeting the least secure elements of the supply network are equally effective for cyber attackers, as they provide discreet access points to networks and bypass the security measures implemented by the end target. The impacts of these rebound attacks can be considerable and potentially disastrous for both customers and businesses.<\/p>\n\n\n\n<p>While large attacks of this type attract attention (such as SolarWinds, or more recently Colonial Pipeline), other <strong>vectors of compromise<\/strong> Data breaches related to the supply chain pose a major risk to businesses of all sizes. Indeed, the unintentional exposure of data, whether business or technical, by a partner can be enough for a malicious actor to identify an attack vector on their target. For example, <strong>development environments<\/strong> which can be observed in particular on the <strong>Github collaborative platform<\/strong> These projects are attracting particular attention from attackers. This platform exposes a wide range of projects developed by IT service providers who inadvertently disclose sensitive data publicly. And generally, these publicly visible projects catch the eye of malicious actors, offering them the opportunity to directly launch attacks against their target.<\/p>\n\n\n\n<p>This demonstrates that however secure a company&#039;s information systems may be, it is not immune to a cyberattack through an external vulnerability.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-red-color has-text-color\"><strong>Direct and indirect consequences\u2026.<\/strong><\/h2>\n\n\n\n<p>After an attack comes the time for assessment, and this type of attack notably leads to... <strong>costs<\/strong> <strong>direct<\/strong> such as fines, legal fees, and even reconstruction costs, and <strong>costs<\/strong> <strong>indirect<\/strong> which include damage to reputation with customers and partners.<\/p>\n\n\n\n<p>To take the example of the Marriott Hotel, the incident consequently cost it dearly, both in terms of <strong>financial<\/strong> than on that of the <strong>reputation<\/strong>. The company&#039;s shares had fallen by nearly 51% before the day the data was released, and numerous lawsuits were filed. Attorneys general from all 50 states and Washington, the Securities and Exchange Commission (SEC), and committees in the U.S. Senate and Congress, among others, launched investigations. And in October 2020, the company was fined \u00a318.4 million (\u20ac21.5 million) by the UK&#039;s Information Commissioner&#039;s Office (OIC). This amount was related to the OIC&#039;s findings that Marriott had failed to implement appropriate technical or organizational safeguards to protect personal data processed on its systems, as required by law. <a href=\"http:\/\/ico\/news-and-events\/news-and-blogs\/2020\/10\/ico-fines-marriott-international-inc-184million-for-failing-to-keep-customers-personal-data-secure\/\" target=\"_blank\" rel=\"noreferrer noopener\">the GDPR<\/a>.<\/p>\n\n\n\n<p>Consequently, the elements developed above highlight the importance for a company to analyze, understand and take into account the cyber risks associated with an external growth operation.<\/p>\n\n\n\n<p>It is true that the costs associated with anticipating and managing risks can represent a significant investment for businesses, particularly smaller ones. However, the Marriott case confirms that company executives have a duty to assess cybersecurity risks, especially during an acquisition process, and that such a failure could lead to them being held liable in the event of a cyberattack.&nbsp;<\/p>\n\n\n\n<p>The threats to mergers and acquisitions, as well as to the supply chain, mean that organizations must emphasize their ability to adopt a proactive and preventative approach to cyberattacks. They now have a responsibility to assess the situation and implement preventative measures against compromise through a partner.&nbsp;<\/p>\n\n\n\n<p>The goal is to ensure that the proposed merger with a potential target represents more of an opportunity than a risk. Indeed, a preliminary analysis of a target company allows for a more stable business partnership. It also serves as a form of anticipation, identifying future challenges, including the implementation of a remediation plan if necessary.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-red-color has-text-color\"><strong>Due Diligence &amp; Cyber Threat Intelligence<\/strong><\/h2>\n\n\n\n<p>THE <strong><em>Cyber Due Diligence<\/em><\/strong> seem to be gradually emerging as a <strong>a key tool for assessing and detecting risks within these external growth processes<\/strong>.<\/p>\n\n\n\n<p>Implementing a robust cybersecurity strategy involving continuous monitoring of a company&#039;s environment is the use of <strong>cyber intelligence<\/strong> (said the <em><a href=\"https:\/\/www.intrinsec.com\/en\/cyber-threat-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Threat Intelligence<\/a><\/em>), or the capture, through OSINT or HUMINT means, of any cybersecurity technical elements that could impact an organization. This information is used to identify, prevent, and respond to cyber threats (malware, <em>phishing<\/em>, attacks by <em>ransomware<\/em>, hacktivism, and other emerging threats). For example, if a large proportion of professional accounts on databases are available on the Dark Web, the company will be able to reassess its password policy or its strategy to combat the use of professional accounts in the private sphere.<\/p>\n\n\n\n<p>Thus, Due Diligence and Cyber Threat Intelligence (CTI) provide the necessary resources to monitor specific threats to a company&#039;s key assets and sectors. They enable the analysis of attack execution methods based on cybersecurity trends related to a target entity&#039;s profile.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-vivid-purple-color has-text-color\"><strong>Turning risk into a source of opportunity<\/strong><\/h3>\n\n\n\n<p>To mitigate the uncertainty associated with an external growth operation, organizations have the option of using cyber intelligence knowledge and tools to ensure that the merger between a company and a target company does not pose a risk but rather a positive one. <strong>a source of opportunity<\/strong>.<\/p>\n\n\n\n<p>The interest of <em>Cyber Due Diligence<\/em> For a company pursuing an external growth project, the key lies in...\u2019<strong>obtaining the most accurate image <\/strong>possible counterparty, accompanied by a risk assessment with a view to <strong>make the best possible decision<\/strong>.<\/p>\n\n\n\n<p>Although threat analysis is often seen as a burden, the cost of the direct and indirect consequences of a potential cybersecurity breach at a third-party entity can far exceed the cost of assessing cybersecurity risks related to an acquisition. Furthermore, the significant increase in regulatory pressure over the past decade is forcing companies across all sectors to conduct due diligence in managing their IT infrastructure (including subsidiaries) and in selecting their third-party partners.<\/p>\n\n\n\n<p>Furthermore, customers and consumers are concerned about the proper management of their personal data. Therefore, a B2C company operating, for example, in the distribution sector, would greatly benefit from implementing these procedures within the framework of a partnership with a supplier. Certainly, this company will be keen to provide a reliable service. <strong>flawless image<\/strong> in the area of personal data protection and thus<strong> GDPR compliance<\/strong>. In fact, regularly assessing the digital environment of suppliers and\/or service providers allows companies to maintain a <strong>relationship of trust<\/strong> with their clients.<\/p>\n\n\n\n<p>In short, the <em>Cyber Due Diligence<\/em> now appear as a <strong>substantial means of value creation <\/strong>and <strong>success of an external growth operation<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-red-color has-text-color\"><strong>Intrinsec supports you in your external growth operations<\/strong><\/h2>\n\n\n\n<p>The precautionary principle, which tends to guide societies, therefore imposes on decision-makers a <strong>underlying obligation to control cyber risks<\/strong> during an external growth process.&nbsp;<\/p>\n\n\n\n<p>The solutions of <em><a href=\"https:\/\/www.intrinsec.com\/en\/due-diligence-cybersecurite\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Due Diligence<\/a> <\/em>The services offered by Intrinsec allow us to support you in your operations (both ongoing and retrospective), by providing you with an assessment of the third party&#039;s digital exposure, as well as a proposed strategy to adopt in terms of expected compliance.<\/p>\n\n\n\n<p>With a team of competitive intelligence analysts and technical experts, our approach will involve putting ourselves in the shoes of an attacker or actor seeking to obtain sensitive information for the purpose of economic espionage. To do this, our Cyber Threat Intelligence service will activate all the technical tools at our disposal to detect and analyze weak signals from information available on the various layers of the web (surface, deep, and dark web).<\/p>\n\n\n\n<p>Furthermore, the sensitive elements detected during a <em>Cybersecurity Due Diligence<\/em> CTI analysis conducted by our external analysts offers the advantage of identifying exploitable entry points for malicious actors. In the context of a subsidiary acquisition or evaluation process, Intrinsec leverages its expertise through the operational complementarity of its various departments. This complementarity then allows the client to consolidate and protect the security of their information systems by utilizing... <a href=\"https:\/\/www.intrinsec.com\/en\/test-intrusion-externe\/\">penetration tests<\/a>, internal security audits or even Red Teaming.&nbsp;<\/p>\n\n\n\n<p>So, whether you&#039;re looking to acquire a company to boost your growth, contract with a strategic partner, or understand the market presence of a service provider, supplier, or subsidiary, our tools allow you to... <strong>ensure that the necessary information is obtained so that the current or future relationship constitutes a source of opportunity.<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p id=\"croissance-externe\"><a href=\"\/en\/#croissance-externe\">[1]<\/a> External growth operations are understood here as any operation leading to the merging of two companies: mergers and acquisitions, joint ventures or even commercial relationships (between suppliers, subcontractors and contractors, \u2026).<\/p>","protected":false},"excerpt":{"rendered":"<p>According to a 2022 study by Allianz Global Corporate &amp; Specialty, 57% professionals [\u2026]<\/p>","protected":false},"author":15,"featured_media":222894,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,13],"tags":[],"class_list":["post-222893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threat-intelligence","category-evaluation-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>INTRINSEC- Due Diligence Cybers\u00e9curit\u00e9 face aux menaces cyber<\/title>\n<meta name=\"description\" content=\"Les proc\u00e9dures de due diligence cybers\u00e9curit\u00e9 se traduisent par la mise en \u0153uvre d\u2019\u00e9valuations contre les menaces cyber lors\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Due Diligence Cybers\u00e9curit\u00e9 : menaces cyber et op\u00e9rations de croissance externe\" \/>\n<meta property=\"og:description\" content=\"Les proc\u00e9dures de due diligence cybers\u00e9curit\u00e9 se traduisent par la mise en \u0153uvre d\u2019\u00e9valuations contre les menaces cyber lors\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-22T14:51:21+00:00\" \/>\n<meta name=\"author\" content=\"Emilion Lebrun\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emilion Lebrun\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/\"},\"author\":{\"name\":\"Emilion Lebrun\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/aedbe77d3498bd416825a6e87718b04b\"},\"headline\":\"Due Diligence Cybers\u00e9curit\u00e9 : menaces cyber et op\u00e9rations de croissance externe\",\"datePublished\":\"2022-03-22T14:51:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/\"},\"wordCount\":2998,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Cyber Threat Intelligence\",\"Evaluation S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/\",\"name\":\"INTRINSEC- Due Diligence Cybers\u00e9curit\u00e9 face aux menaces cyber\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2022-03-22T14:51:21+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/aedbe77d3498bd416825a6e87718b04b\"},\"description\":\"Les proc\u00e9dures de due diligence cybers\u00e9curit\u00e9 se traduisent par la mise en \u0153uvre d\u2019\u00e9valuations contre les menaces cyber lors\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Due Diligence Cybers\u00e9curit\u00e9 : menaces cyber et op\u00e9rations de croissance externe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/aedbe77d3498bd416825a6e87718b04b\",\"name\":\"Emilion Lebrun\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"caption\":\"Emilion Lebrun\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/emilion-lebrun\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"INTRINSEC - Cybersecurity Due Diligence in the face of cyber threats","description":"Cybersecurity due diligence procedures involve implementing assessments against cyber threats during","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/","og_locale":"en_US","og_type":"article","og_title":"Due Diligence Cybers\u00e9curit\u00e9 : menaces cyber et op\u00e9rations de croissance externe","og_description":"Les proc\u00e9dures de due diligence cybers\u00e9curit\u00e9 se traduisent par la mise en \u0153uvre d\u2019\u00e9valuations contre les menaces cyber lors","og_url":"https:\/\/www.intrinsec.com\/en\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/","og_site_name":"INTRINSEC","article_published_time":"2022-03-22T14:51:21+00:00","author":"Emilion Lebrun","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emilion Lebrun","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/"},"author":{"name":"Emilion Lebrun","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/aedbe77d3498bd416825a6e87718b04b"},"headline":"Due Diligence Cybers\u00e9curit\u00e9 : menaces cyber et op\u00e9rations de croissance externe","datePublished":"2022-03-22T14:51:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/"},"wordCount":2998,"image":{"@id":"https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/#primaryimage"},"thumbnailUrl":"","articleSection":["Cyber Threat Intelligence","Evaluation S\u00e9curit\u00e9"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/","url":"https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/","name":"INTRINSEC - Cybersecurity Due Diligence in the face of cyber threats","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/#primaryimage"},"thumbnailUrl":"","datePublished":"2022-03-22T14:51:21+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/aedbe77d3498bd416825a6e87718b04b"},"description":"Cybersecurity due diligence procedures involve implementing assessments against cyber threats during","breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/due-diligence-cyber-menaces-cyber-et-operations-de-croissance-externe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Due Diligence Cybers\u00e9curit\u00e9 : menaces cyber et op\u00e9rations de croissance externe"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/aedbe77d3498bd416825a6e87718b04b","name":"Emilion Lebrun","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","caption":"Emilion Lebrun"},"url":"https:\/\/www.intrinsec.com\/en\/author\/emilion-lebrun\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/222893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=222893"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/222893\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=222893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=222893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=222893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}