{"id":2668,"date":"2023-09-26T11:47:00","date_gmt":"2023-09-26T09:47:00","guid":{"rendered":"https:\/\/wavebyagc.com\/?p=2668"},"modified":"2024-02-11T11:14:06","modified_gmt":"2024-02-11T10:14:06","slug":"the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy","status":"publish","type":"post","link":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/","title":{"rendered":"The Physical and Virtual Cybersecurity Conundrum \u2013 a Q&#038;A on accountability and responsibility with cybersecurity expert Denis Boudy"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#666d74\"><strong>Cybersecurity expert <a href=\"https:\/\/www.linkedin.com\/in\/dboudy\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Denis Boudy<\/a> joins <a href=\"https:\/\/www.linkedin.com\/in\/carolinezigrand\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Caroline Zigrand<\/a>, New Business Developer at <a href=\"https:\/\/www.linkedin.com\/company\/wave-by-agc\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Wave by AGC<\/a>, and the WAVETRAP team to discuss why businesses across the EU need to consider how vulnerable their workspaces are to hackers in regard to the NIS2 regulation. And more importantly, why they should contemplate all the different ways to protect them.<\/strong><\/p>\n\n\n\n<div style=\"height:66px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Caroline – What was the tipping point that lifted cybersecurity awareness out of the shadows and made it a mainstream concern?<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>Denis – It wasn\u2019t one single event that turned the tide on this topic, but rather several key factors that brought the topic of cybersecurity into the spotlight. Over the last years, there\u2019s no denying the steep increase of cyber-attacks in various markets worldwide, the relentless small-scale phishing scams in our personal lives and the large-scale ransomware threats in our professional lives. The desire and need for a solution that provides a secure collaboration, where data could be handled, stored, or even manipulated in a safe environment, has never been greater.<\/p>\n\n\n\n<p>The ratification of the <a href=\"https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_BRI(2021)689333\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">NIS2 Directive<\/a> in November 2022 \u2013 something France pushed hard for to address growing concerns over the evolution of cyber threats \u2013 has also proved to be a catalyst in this process, with a planned implementation for 2024 across the European Union.<\/p>\n\n\n\n<p>Collectively, this represents the \u2018tipping point\u2019 where member states and the organisations within them began to see both the moral obligation (accountability) to address these concerns and the legal obligation to prepare and apply the appropriate security measures throughout the supply chain.<\/p>\n\n\n\n<p>Everyone is a potential target. It concerns us all.<\/p>\n\n\n\n<div style=\"height:66px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Caroline – Does protecting digital assets include also protecting everything which generates data, such as the devices and the buildings they are located in?<\/h2>\n\n\n\n<p>Denis – Indeed, it really does concern every kind of device or piece of connected hardware within a building that generates or processes digital assets. It covers everything relating to an information system, ranging from buildings and production lines to stationary and mobile devices.<\/p>\n\n\n\n<p>The building itself and its infrastructure already offer a serious security perimeter \u2013 from CCTV systems to IoT (Internet of Things) devices connected to the network, there are so many different points across the network that process or store sensitive data.<\/p>\n\n\n\n<p>For me, there are three key levels of information:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li>The main IT system \u2013 This extends to my desktop working space (laptop, mobile device, etc) that I used to work on a day-to-day basis, accessing company data.<\/li>\n\n\n\n<li>Building operating system \u2013 Smart buildings offer an amazing way to empower staff and create more energy-efficient works spaces, with IoT devices across its infrastructure feeding into a centralised management and operation system.<\/li>\n\n\n\n<li>Production operating system \u2013 This extends to everything linked to a production line, including power supplies and production information linked to a network.<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<p>All three levels of information here must communicate with one another so organisations can gain a realistic insight on the real-world global stakes facing the cybersecurity community. If this type of communication and transparency isn\u2019t forthcoming, then the threat of cyber-attacks will only grow.<\/p>\n\n\n\n<p>This is why we must all consider a building\u2019s digital permeability. If we do not, we open ourselves up to attack.<\/p>\n\n\n\n<div style=\"height:66px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/Ajouter-un-sous-titre-2-1024x577.png\" alt=\"Ajouter Un Sous Titre 2\" class=\"wp-image-2744\" style=\"width:840px;height:473px\" srcset=\"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/Ajouter-un-sous-titre-2-1024x577.png 1024w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/Ajouter-un-sous-titre-2-300x169.png 300w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/Ajouter-un-sous-titre-2-768x433.png 768w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/Ajouter-un-sous-titre-2-1536x865.png 1536w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/Ajouter-un-sous-titre-2-650x366.png 650w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/Ajouter-un-sous-titre-2.png 1640w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Shielding Set-up <a href=\"http:\/\/www.wavebyagc\/wavetrap\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">WAVE<strong>TRAP <\/strong>by AGC<\/a><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Caroline – What would be your top recommendations on how organisations can increase their cybersecurity protection?<\/h2>\n\n\n\n<p>Denis – Beyond the NIS2 regulation, there is a plethora of precautions and proactive actions you can take to address these issues from both a digital perspective and a physical one.<\/p>\n\n\n\n<p>Whether you\u2019re looking at this from a virtual or physical perspective, there are some key recommendations you should always consider:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Stakeholder responsibility \u2013 Ensure that everybody knows that every member of the team has a role to play and a responsibility when it comes to upholding cybersecurity best practices.<\/li>\n\n\n\n<li>Establish the right systems \u2013 To ensure these policies are followed, you must establish a workflow of recurrent risk analysis and resilience systems.<\/li>\n\n\n\n<li>Sensibilise all stakeholders \u2013 Ensure that all teams, at all levels throughout the organisation are educated to better understand the importance of responsible cybersecurity online.<\/li>\n\n\n\n<li>Familiarise the technology \u2013 Your digital policies and procedures are powered by the right technology, so ensure all members of the organisation are on side.<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<p>For example, on a dedicated project, we found a BIM (Building Information Modelling) convention that contained a directory of sensitive stakeholder information including:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Name<\/li>\n\n\n\n<li>Address<\/li>\n\n\n\n<li>Phone number<\/li>\n\n\n\n<li>Company<\/li>\n\n\n\n<li>Location of the building<\/li>\n\n\n\n<li>Planning information<\/li>\n\n\n\n<li>CCTV information<\/li>\n\n\n\n<li>Power and energy details<\/li>\n\n\n\n<li>Cloud information<\/li>\n\n\n\n<li>The digital platform in use<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<p>All this information was and remains highly attractive to hackers. This binding document could be the perfect treasure trove of information as it already details who works on which project when and where. This is the type of information you do not want to fall into the hands of hackers. Limited protection might lead to maximum exposure with extreme reputational, financial, and judicial repercussions.<\/p>\n\n\n\n<p>Even from a physical perspective, we can take the same example. For instance, we might decide to print the above BIM convention then take a copy with us to an in-person meeting to share it with project stakeholders. However, if I forget to take it with me or let it linger somewhere on the table, then there\u2019s a huge physical data breach. It may have been left behind by accident, but you can no longer afford to take that risk.<\/p>\n\n\n\n<p>Sometimes you see people typing away on the train without shielding the contents of their laptop screen. They might be working on their grocery list, or on their defence in a high-end lawsuit. Just imagine you maliciously take pictures of the latter and sell this valuable information to the other lawyer. You\u2019ve lost an entire case because of your own carelessness.<\/p>\n\n\n\n<p>That\u2019s what I meant earlier with everyone being a target. Data is the new currency, and information can secure hard cash. The hacking equipment is getting smarter and cheaper by the day. And so is the business approach of some hackers, I have even seen cases where they offer a gold\/premium\/freemium business model \u2013 where you are taxed on response time.<\/p>\n\n\n\n<p>We must be always aware and accountable.<\/p>\n\n\n\n<div style=\"height:66px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Caroline – What about NIS2?<\/h2>\n\n\n\n<p>Denis – NIS2 is a much broader directive than its predecessor, extending its legislation to a larger number of companies (such as SMES with 250 employees and sales starting at 10 million euros) and there are now steeper penalties for non-compliance (including fines of up to 10 million euros or the equivalent of 2% of its turnover).<\/p>\n\n\n\n<p>There are 23 business sectors now affected, covering both essential and other important businesses. Behind them, the supply chain itself is likely to host subcontractors with their own responsibilities (such as in France, where changes to military programming law in 2024 will have a considerable ripple effect).<\/p>\n\n\n\n<p>IT managers are going to have to re-evaluate how they process, store, and manage sensitive data both physically and digitally and how these policies are developed and followed. There are still plenty of grey areas not covered by this new directive, so there is plenty of work still to be done.<\/p>\n\n\n\n<div style=\"height:66px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Caroline – Can smart buildings meet the challenges of NIS2?<\/h2>\n\n\n\n<p>Denis – Yes, but indirectly. We need to make as many people as possible aware of the challenges of cybersecurity. Not only the terms of the NIS2 regulation.<\/p>\n\n\n\n<p>If we build an intelligent building, information will circulate so we need to set up automated tools to help with navigation and IoT connectivity, but if cybersecurity isn\u2019t a core consideration for the network, these devices could present a devastating means of access for hackers to exploit.<\/p>\n\n\n\n<p>In 2022, the Smart Building Alliance in France <a href=\"https:\/\/marketing.smartbuildingsalliance.org\/cybersecurisation-batiments-tertiaires\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">published a white paper<\/a> that discussed cyber risk at the building level and the challenge NIS2 presents for companies when it comes to making their smart buildings fully compliant.<\/p>\n\n\n\n<div style=\"height:66px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Caroline – How can glass impact the protection effort against cyber-attacks?<\/h2>\n\n\n\n<p><br>Denis – There are many ways glass as a material can be used to protect smart buildings from external cyberattacks. A good example is La Poste in France, which developed a data backup storage unit for SMEs that utilised a glass wall for adding an additional layer of protection against electromagnetic waves.<\/p>\n\n\n\n<p>Cybersecurity is a lot like an onion \u2013 the harsher the winter, the more layers are required! The same concept applies to cybersecurity. The more layers of protection we apply to a building or a server room, the more resilient it is to attacks.<\/p>\n\n\n\n<p>Specialised glass solutions are just one of the ways we can proactively protect our businesses (and our homes) against hackers.<\/p>\n\n\n\n<div style=\"height:66px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Caroline – How can we best support our customers with this global cybersecurity issue?<\/h2>\n\n\n\n<p><br>Denis – There are three core tenets you need to take into consideration:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We need to raise awareness among our teams.<\/li>\n\n\n\n<li>We need to develop strategies.<\/li>\n\n\n\n<li>We need to involve central management and everyone responsible for information.<\/li>\n<\/ul>\n\n\n\n<p>We should look at the process as a series of levels of responsibility, accountability, and proactive action regarding cybersecurity in a smart building:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>First level \u2013 To maintain a regular watch on risk as individuals, remaining vigilant for us and our customers.<\/strong><\/li>\n\n\n\n<li><strong>Second level \u2013 Applying cybersecurity policies to the design of projects, whether industrial, infrastructure, etc.<\/strong><\/li>\n\n\n\n<li><strong>Third level \u2013 Providing and developing turnkey solutions that automate, facilitate, and simplify day-to-day cybersecurity.<\/strong><\/li>\n<\/ol>\n\n\n\n<div style=\"height:66px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Caroline – What advice would you give in terms of cybersecurity for non-experts and experts, especially in regard to the NIS2 regulation?<\/h2>\n\n\n\n<p>Denis – It\u2019s up to all of us to play our part in cybersecurity. We need to involve everyone, not just IT, but all stakeholders from every department. It\u2019s a team effort and it requires everyone to commit the process and share their insights. It is a long-term investment, supported by the NIS2 regulation.<\/p>\n\n\n\n<p>A great piece of advice is to ask questions surrounding the lifecycle of any data in your organisation. What information is being processed? Which platforms are being used? Which countries is that data being accessed in? What risks of data leakage are there?<\/p>\n\n\n\n<p>We have an interesting case in France where a region is launching a vast energy renovation program for the secondary schools. There is no data available on the schools, so all this information needs to be collated and gathered. Not a problem with the high-performance tools in the market. Not a problem to collate this vast wealth of school information in a digital model. We issued an invitation to tender to which private companies and surveyors are responding. The thing is, we\u2019re not only looking at their offer and pricing, we are also investigating how and where they are using and disseminating this information. We don\u2019t want to risk malicious minds using these plans to meticulously plan a school attack.<\/p>\n\n\n\n<p>On that note, the risks of physical attacks are just as real as digital ones. It could be as simple as stealing or tapping into a simple piece of equipment left unattended. One moment of carelessness is all it takes.<\/p>\n\n\n\n<p>Ultimately, the most important thing is to question the criticality of the data being processed, beyond tacit and unchecked trust.<\/p>\n\n\n\n<p>Knowing is caring, caring is securing. Know how to always be secure.<\/p>\n\n\n\n<div style=\"height:66px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Caroline \u2013 Where do you find your inspiration? Which sites, books, or podcasts would you recommend?<\/h2>\n\n\n\n<p>Denis \u2013 I try to keep my eyes, ears, and mind open at all times, but I have these sites bookmarked:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.welcometothejungle.com\/fr\/companies\/anssi\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">https:\/\/www.welcometothejungle.com\/fr\/companies\/anssi<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/secnumacademie.gouv.fr\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">https:\/\/secnumacademie.gouv.fr\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.youtube.com\/c\/CyberVox\/videos\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">https:\/\/www.youtube.com\/c\/CyberVox\/videos<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.holiseum.com\/cybervox-by-holiseum\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">https:\/\/www.holiseum.com\/cybervox-by-holiseum<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cert.ssi.gouv.fr\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">https:\/\/www.cert.ssi.gouv.fr\/<\/a><\/p>\n\n\n\n<div style=\"height:66px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>About Denis Boudy&nbsp;:<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-left\"><img decoding=\"async\" width=\"150\" height=\"150\" class=\"wp-image-2740\" style=\"width: 150px;\" src=\"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/Picture_DenisBoudy_50_1615982571123.jpg\" alt=\"Picture Denisboudy 50 1615982571123\" srcset=\"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/Picture_DenisBoudy_50_1615982571123.jpg 231w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/Picture_DenisBoudy_50_1615982571123-150x150.jpg 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n\n\n\n<p class=\"has-text-align-left\">Denis has been with <a href=\"https:\/\/www.ingerop.fr\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Ingerop<\/a> since 2019 and works on the SreedIn project, aimed to integrate an incubation program with a project linked to the cybersecurity of the engineering data. Professionals can get certified in this field by following an ANSSI (Agence Nationale de S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019informations) training.<\/p>\n\n\n\n<p>This project is evolving into a commercial brand known as ScredIn. It encompasses the creation of an application and a service package aimed at providing guidance and training related to the application’s usage. Additionally, it aims to raise awareness about cybersecurity risks and NIS2 compliance within the engineering, construction, and industrial sectors.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-large-font-size is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Contact us for more information <\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-font-size has-medium-font-size\"><a class=\"wp-block-button__link has-white-color has-text-color has-background wp-element-button\" href=\"www.wavebyagc.com\/contact\" style=\"background-color:#003891\" target=\"_blank\" rel=\"noreferrer noopener\">Click here<\/a><\/div>\n<\/div>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity expert Denis Boudy joins Caroline Zigrand, New Business Developer at Wave by AGC, and the WAVETRAP team to discuss why businesses across the EU need to consider how vulnerable their workspaces are to hackers in regard to the NIS2 regulation. And more importantly, why they should contemplate all the different ways to protect them. [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":2674,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[68],"tags":[76],"class_list":["post-2668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wavetrap","tag-highlight"],"acf":[],"yoast_head":"<title>NIS2 Compliance: Q&amp;A with Cybersecurity Expert Denis Boudy<\/title>\n<meta name=\"description\" content=\"Explore the physical and virtual cybersecurity insights with expert Denis Boudy. Gain insights on NIS2 accountability and responsibility.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 Compliance: Q&amp;A with Cybersecurity Expert Denis Boudy\" \/>\n<meta property=\"og:description\" content=\"Explore the physical and virtual cybersecurity insights with expert Denis Boudy. Gain insights on NIS2 accountability and responsibility.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/\" \/>\n<meta property=\"og:site_name\" content=\"WAVE by AGC\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-26T09:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-11T10:14:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/AdobeStock_303617414-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sarah_Wisniewski\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sarah_Wisniewski\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/\"},\"author\":{\"name\":\"Sarah_Wisniewski\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#\\\/schema\\\/person\\\/b17edad8ece383d488350cfc26a0d4d2\"},\"headline\":\"The Physical and Virtual Cybersecurity Conundrum \u2013 a Q&#038;A on accountability and responsibility with cybersecurity expert Denis Boudy\",\"datePublished\":\"2023-09-26T09:47:00+00:00\",\"dateModified\":\"2024-02-11T10:14:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/\"},\"wordCount\":2056,\"publisher\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/AdobeStock_303617414-1.jpeg\",\"keywords\":[\"highlight\"],\"articleSection\":[\"WAVETRAP\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/\",\"url\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/\",\"name\":\"NIS2 Compliance: Q&A with Cybersecurity Expert Denis Boudy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/AdobeStock_303617414-1.jpeg\",\"datePublished\":\"2023-09-26T09:47:00+00:00\",\"dateModified\":\"2024-02-11T10:14:06+00:00\",\"description\":\"Explore the physical and virtual cybersecurity insights with expert Denis Boudy. Gain insights on NIS2 accountability and responsibility.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/AdobeStock_303617414-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/AdobeStock_303617414-1.jpeg\",\"width\":2000,\"height\":1333,\"caption\":\"Double exposure of lock icon hologram on conference room background. Concept of cyber security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\",\"item\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Physical and Virtual Cybersecurity Conundrum \u2013 a Q&#038;A on accountability and responsibility with cybersecurity expert Denis Boudy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/\",\"name\":\"WAVE by AGC\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#organization\",\"name\":\"WAVE by AGC\",\"url\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/agc_logo_color.svg\",\"contentUrl\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/agc_logo_color.svg\",\"caption\":\"WAVE by AGC\"},\"image\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/wave-by-agc\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#\\\/schema\\\/person\\\/b17edad8ece383d488350cfc26a0d4d2\",\"name\":\"Sarah_Wisniewski\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7949482dc31489837e932d4ffd65b4158bc14147a0eccd0ca63a79e806d8388?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7949482dc31489837e932d4ffd65b4158bc14147a0eccd0ca63a79e806d8388?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7949482dc31489837e932d4ffd65b4158bc14147a0eccd0ca63a79e806d8388?s=96&d=mm&r=g\",\"caption\":\"Sarah_Wisniewski\"},\"url\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/author\\\/6ac3e38ebda932c2\\\/\"}]}<\/script>","yoast_head_json":{"title":"NIS2 Compliance: Q&A with Cybersecurity Expert Denis Boudy","description":"Explore the physical and virtual cybersecurity insights with expert Denis Boudy. Gain insights on NIS2 accountability and responsibility.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/","og_locale":"en_US","og_type":"article","og_title":"NIS2 Compliance: Q&A with Cybersecurity Expert Denis Boudy","og_description":"Explore the physical and virtual cybersecurity insights with expert Denis Boudy. Gain insights on NIS2 accountability and responsibility.","og_url":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/","og_site_name":"WAVE by AGC","article_published_time":"2023-09-26T09:47:00+00:00","article_modified_time":"2024-02-11T10:14:06+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/AdobeStock_303617414-1.jpeg","type":"image\/jpeg"}],"author":"Sarah_Wisniewski","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sarah_Wisniewski","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/#article","isPartOf":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/"},"author":{"name":"Sarah_Wisniewski","@id":"https:\/\/wavebyagc.com\/en\/#\/schema\/person\/b17edad8ece383d488350cfc26a0d4d2"},"headline":"The Physical and Virtual Cybersecurity Conundrum \u2013 a Q&#038;A on accountability and responsibility with cybersecurity expert Denis Boudy","datePublished":"2023-09-26T09:47:00+00:00","dateModified":"2024-02-11T10:14:06+00:00","mainEntityOfPage":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/"},"wordCount":2056,"publisher":{"@id":"https:\/\/wavebyagc.com\/en\/#organization"},"image":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/#primaryimage"},"thumbnailUrl":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/AdobeStock_303617414-1.jpeg","keywords":["highlight"],"articleSection":["WAVETRAP"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/","url":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/","name":"NIS2 Compliance: Q&A with Cybersecurity Expert Denis Boudy","isPartOf":{"@id":"https:\/\/wavebyagc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/#primaryimage"},"image":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/#primaryimage"},"thumbnailUrl":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/AdobeStock_303617414-1.jpeg","datePublished":"2023-09-26T09:47:00+00:00","dateModified":"2024-02-11T10:14:06+00:00","description":"Explore the physical and virtual cybersecurity insights with expert Denis Boudy. Gain insights on NIS2 accountability and responsibility.","breadcrumb":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/#primaryimage","url":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/AdobeStock_303617414-1.jpeg","contentUrl":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/09\/AdobeStock_303617414-1.jpeg","width":2000,"height":1333,"caption":"Double exposure of lock icon hologram on conference room background. Concept of cyber security"},{"@type":"BreadcrumbList","@id":"https:\/\/wavebyagc.com\/en\/blog\/the-physical-and-virtual-cybersecurity-conundrum-a-qa-on-accountability-and-responsibility-with-cybersecurity-expert-denis-boudy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"","item":"https:\/\/wavebyagc.com\/en\/"},{"@type":"ListItem","position":2,"name":"The Physical and Virtual Cybersecurity Conundrum \u2013 a Q&#038;A on accountability and responsibility with cybersecurity expert Denis Boudy"}]},{"@type":"WebSite","@id":"https:\/\/wavebyagc.com\/en\/#website","url":"https:\/\/wavebyagc.com\/en\/","name":"WAVE by AGC","description":"","publisher":{"@id":"https:\/\/wavebyagc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wavebyagc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wavebyagc.com\/en\/#organization","name":"WAVE by AGC","url":"https:\/\/wavebyagc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wavebyagc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2021\/05\/agc_logo_color.svg","contentUrl":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2021\/05\/agc_logo_color.svg","caption":"WAVE by AGC"},"image":{"@id":"https:\/\/wavebyagc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/wave-by-agc\/"]},{"@type":"Person","@id":"https:\/\/wavebyagc.com\/en\/#\/schema\/person\/b17edad8ece383d488350cfc26a0d4d2","name":"Sarah_Wisniewski","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c7949482dc31489837e932d4ffd65b4158bc14147a0eccd0ca63a79e806d8388?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c7949482dc31489837e932d4ffd65b4158bc14147a0eccd0ca63a79e806d8388?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7949482dc31489837e932d4ffd65b4158bc14147a0eccd0ca63a79e806d8388?s=96&d=mm&r=g","caption":"Sarah_Wisniewski"},"url":"https:\/\/wavebyagc.com\/en\/blog\/author\/6ac3e38ebda932c2\/"}]}},"_links":{"self":[{"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/posts\/2668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/comments?post=2668"}],"version-history":[{"count":0,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/posts\/2668\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/media\/2674"}],"wp:attachment":[{"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/media?parent=2668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/categories?post=2668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/tags?post=2668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}