With the growing digital transformation of the worldwide economy, cyber risk has become a major issue. As 1 % of the world’s GDP (around $1,000 billion) is allegedly lost to cybercrime every year, IT systems continue to get increasingly interconnected, making them vulnerable to accumulation phenomena that undermine the pooling mechanism of insurance. As highlighted in the literature, Hawkes processes appear to be suitable models to capture contagion phenomena and clustering features of cyber events. This paper extends the standard Hawkes modeling of cyber risk frequency by adding external shocks, modelled by the publication of cyber vulnerabilities that are deemed to increase the likelihood of attacks in the short term. The aim of the prop...
Malicious softwares or malwares for short have become a major security threat. While origi-nating in...
International audienceFor many years, the introduction of connected systems and digital technology i...
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most...
With the growing digital transformation of the worldwide economy, cyber risk has become a major issu...
International audienceIn this paper, we provide a model that aims to describe the impact of a massiv...
International audienceIn this paper, we propose a general framework to design accumulation scenarios...
With a continuously changing threat landscape, companies must be prepared for the most unforeseen cy...
As more and more datasets with self-exciting properties become available, the demand for robust mode...
Proper evaluation of the risk associated to a cyber attack is a crucial aspect for many companies. T...
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore...
The significant recent growth in digitization has been accompanied by a rapid increase in cyber atta...
Over the last decade, cybersecurity threats have drastically increased in scale, impact and frequenc...
Part 4: SecurityInternational audienceHosts (or nodes) in the Internet often face epidemic risks suc...
Cyberattacks are a constant threat to organisations worldwide. The uncertainty and difficulty of pro...
Based on classical contagion models we introduce an artificial cyber lab: the digital twin of a comp...
Malicious softwares or malwares for short have become a major security threat. While origi-nating in...
International audienceFor many years, the introduction of connected systems and digital technology i...
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most...
With the growing digital transformation of the worldwide economy, cyber risk has become a major issu...
International audienceIn this paper, we provide a model that aims to describe the impact of a massiv...
International audienceIn this paper, we propose a general framework to design accumulation scenarios...
With a continuously changing threat landscape, companies must be prepared for the most unforeseen cy...
As more and more datasets with self-exciting properties become available, the demand for robust mode...
Proper evaluation of the risk associated to a cyber attack is a crucial aspect for many companies. T...
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore...
The significant recent growth in digitization has been accompanied by a rapid increase in cyber atta...
Over the last decade, cybersecurity threats have drastically increased in scale, impact and frequenc...
Part 4: SecurityInternational audienceHosts (or nodes) in the Internet often face epidemic risks suc...
Cyberattacks are a constant threat to organisations worldwide. The uncertainty and difficulty of pro...
Based on classical contagion models we introduce an artificial cyber lab: the digital twin of a comp...
Malicious softwares or malwares for short have become a major security threat. While origi-nating in...
International audienceFor many years, the introduction of connected systems and digital technology i...
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most...