{"id":40538,"date":"2023-01-19T04:16:33","date_gmt":"2023-01-19T09:16:33","guid":{"rendered":"https:\/\/wp266329.wpdns.ca\/une-approche-de-controle-des-cyberrisques-calquee-sur-un-modele-de-controle-financier\/"},"modified":"2025-04-07T15:09:00","modified_gmt":"2025-04-07T19:09:00","slug":"a-cyberrisk-control-approach-based-on-a-financial-control-model","status":"publish","type":"post","link":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/","title":{"rendered":"A Cyber Risk control approach based on a financial control model"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"40538\" class=\"elementor elementor-40538 elementor-39580\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124212e4 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124212e4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ce81759\" data-id=\"5ce81759\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ba8be8f elementor-widget elementor-widget-heading\" data-id=\"ba8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">A Cyber Risk control approach based on a financial control model<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5edb16c7 elementor-widget elementor-widget-image\" data-id=\"5edb16c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1732\" height=\"684\" src=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/1.jpg\" class=\"attachment-full size-full wp-image-40555\" alt=\"A Cyber Risk control approach based on a financial control model\" srcset=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/1.jpg 1732w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/1-300x118.jpg 300w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/1-1024x404.jpg 1024w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/1-768x303.jpg 768w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/1-1536x607.jpg 1536w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/1-700x276.jpg 700w\" sizes=\"(max-width: 1732px) 100vw, 1732px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-72a4571 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"72a4571\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3a4bc32\" data-id=\"3a4bc32\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ca6e24 elementor-widget elementor-widget-text-editor\" data-id=\"6ca6e24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 17px;\">As part of the launch of the new version of our <a href=\"https:\/\/eficio.ca\/produits-numeriques\/ciso360-controle-cyberrisques\/\"><strong>CyberRisk CISO-360<\/strong><\/a> Control tool and methodology, Eficio is launching a Cyber Security folder for Managers. Through these six articles, we are addressing managers who are concerned about cyber risks and their associated impacts. Like an independent financial audit report, an organization should also obtain an independent view from an external expert on the organization&#8217;s posture in the face of cyber risks. Our series of articles explains the functions of cybersecurity while drawing an innovative parallel with an organization&#8217;s financial controls.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd73e5d elementor-widget elementor-widget-testimonial\" data-id=\"bd73e5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta elementor-has-image elementor-testimonial-image-position-aside\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png\" class=\"attachment-full size-full wp-image-39547\" alt=\"\" srcset=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png 500w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-300x300.png 300w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-150x150.png 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Pierre Farley<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Eficio Partner and CIO<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7525e7 elementor-widget elementor-widget-text-editor\" data-id=\"f7525e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 17px;\">Accurate and reliable financial information is essential to the good management of an organization. External financial controllers have tools to validate the accuracy and compliance of financial statements so that they represent a true financial image of the organization. Depending on the type of audit report, the external auditors will make a neutral assessment of the state of affairs.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">There is a parallel to be drawn between an accounting certification and the management of CyberRisk. In both cases, the use of an accounting standard or the use of a cybersecurity standard allows standardization in the interpretation of results, without leaving this to the discretion of an internal controller. These standards protect shareholders and creditors. Like accounting standards, CyberRisk management has its own standards (NIST, CIS, SOC, ISO27001). In addition, the application of such a Cybersecurity standard provides a framework allowing organizations to standardize good practices without being limited to informal knowledge within the organization.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">Just like an audit mission or accounting review mission, an external or certified CyberRisk audit ensures that the posture and knowledge of the risk are known to executives. This offers a real balance sheet of the organization. Shareholders, creditors, insurers, and especially customers are pushing for the implementation of cyber hygiene. Among other things, the customers of an organization adopting security governance themselves impose the equivalent on their suppliers. At Eficio, this is a phenomenon we see frequently.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">For all these reasons, managers inevitably focus on CyberRisk management and seek a solution allowing them to know and, above all, understand the risks to which they are exposed. They want to participate in the assessment of acceptable risk and in decision-making to allocate budgets with full knowledge.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">Cybersecurity is complex, technical, and evolving. Executives know how to read a financial report but not necessarily a cybersecurity report. Eficio understands these issues and we have put in place a complete methodology to respond to and popularize this complexity and help decision-making.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">Since 2014, Eficio has delivered numerous IT diagnostics (CIO 360). Based on this great experience, we have adopted a specific approach to CyberRisk, the <a href=\"https:\/\/eficio.ca\/en\/digital-products\/ciso360-cyberrisk-control\/\"><strong>CISO-360 CyberRisk Control<\/strong><\/a>. This CyberRisk control diagnosis promotes a neutral, agnostic approach that makes it possible to assess the cybersecurity posture and provide an update on the evolution of risks. The results target two audiences: the cybersecurity team and executives.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">At Eficio, our <a href=\"https:\/\/eficio.ca\/en\/digital-products\/ciso360-cyberrisk-control\/\"><strong>CISO-360 Cyber Risk Control<\/strong><\/a> projects are always carried out by expert information security executives. One of our chief information security officers (CISO-Chief Information Security Officer) will be able to present the results to you in a clear and transparent manner. Our approach goes far beyond a simple tactical validation of your cybersecurity program. We approach cybersecurity as risk management by assessing the potential impact for your organization. We will propose both tactical and strategic solutions, giving you ways to remedy the situation according to the context of your organization.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de6b19d elementor-widget elementor-widget-text-editor\" data-id=\"de6b19d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 17px;\">We will, therefore, present this file to you with a series of articles covering the five main functions of cybersecurity. For each of them, we will discuss the cybersecurity aspect, including Law 25 on the protection of personal information. Topics will cover:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41e4d40 elementor-widget elementor-widget-text-editor\" data-id=\"41e4d40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\">\u2022 Identify<\/span><\/p><p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\">\u2022 Protect<\/span><\/p><p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\">\u2022 Detect<\/span><\/p><p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\">\u2022 Respond<\/span><\/p><p style=\"padding-left: 40px;\"><span style=\"color: #000000; font-size: 17px;\">\u2022 Recover<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d50a99c elementor-widget elementor-widget-text-editor\" data-id=\"d50a99c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #000000; font-size: 17px;\">If you want to react to this article or obtain more information, do not hesitate to <a href=\"https:\/\/eficio.ca\/en\/contact\/\">contact<\/a> Eficio.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b323ca6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b323ca6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-89ef2ba\" data-id=\"89ef2ba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2310f83 elementor-widget elementor-widget-text-editor\" data-id=\"2310f83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"padding-left: 40px;\"><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/\">\u2022 A Cyber Risk control approach based on a financial control model<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/\">\u2022 The \u201cIdentify\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/\">\u2022 The \u201cProtect\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/\">\u2022 The \u201cDetect\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-response-function-in-cybersecurity\/\">\u2022 The \u201cResponse\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/\">\u2022 The \u201cRecover\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5288df8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5288df8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-acffbe1\" data-id=\"acffbe1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1d19b17 elementor-widget elementor-widget-shortcode\" data-id=\"1d19b17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><!-- Nutshell Form -->\n<div id=\"nutshell-form-05MhqL\"><\/div>\n<script>\n(function(n,u,t){n[u]=n[u]||function(){(n[u].q=n[u].q||[]).push(arguments)}}(window,'Nutsheller'));\n\nNutsheller('initForm', {form: '05MhqL', instance: '201665', target: 'nutshell-form-05MhqL'});\n<\/script>\n<script async src=\"https:\/\/loader.nutshell.com\/nutsheller.js\"><\/script>\n<!-- End Nutshell Form --><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ee02c07 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ee02c07\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7ecf076\" data-id=\"7ecf076\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8495b38 elementor-widget elementor-widget-text-editor\" data-id=\"8495b38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">Subscribe to the Eficio newsletter and be the first to receive our updates!<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b238fe7\" data-id=\"b238fe7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a70733 elementor-align-right elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"1a70733\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/nut.sh\/ell\/forms\/201665\/wdp0yC\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Subscribe<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A Cyber Risk control approach based on a financial control model As part of the launch of the new version of our CyberRisk CISO-360 Control tool and methodology, Eficio is launching a Cyber Security folder for Managers. Through these six articles, we are addressing managers&#8230;<\/p>\n","protected":false},"author":4,"featured_media":40561,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":false,"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[215,727],"tags":[283,292,278,293,294,280,307,210,273],"class_list":["post-40538","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-cybersecurite","tag-cyberrisque","tag-cyberrisque-en","tag-cybersecurite","tag-cybersecurite-en","tag-donnees-personnelles-en","tag-donnees-personnelles","tag-securite-en","tag-securite","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Cyber Risk control approach based on a financial control model - Eficio<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Cyber Risk control approach based on a financial control model\" \/>\n<meta property=\"og:description\" content=\"A Cyber Risk control approach based on a financial control model As part of the launch of the new version of our CyberRisk CISO-360 Control tool and methodology, Eficio is launching a Cyber Security folder for Managers. Through these six articles, we are addressing managers...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/\" \/>\n<meta property=\"og:site_name\" content=\"Eficio\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Eficio.ca\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-19T09:16:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-07T19:09:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Marchildon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Marchildon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/a-cyberrisk-control-approach-based-on-a-financial-control-model\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/a-cyberrisk-control-approach-based-on-a-financial-control-model\\\/\"},\"author\":{\"name\":\"Alain Marchildon\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\"},\"headline\":\"A Cyber Risk control approach based on a financial control model\",\"datePublished\":\"2023-01-19T09:16:33+00:00\",\"dateModified\":\"2025-04-07T19:09:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/a-cyberrisk-control-approach-based-on-a-financial-control-model\\\/\"},\"wordCount\":712,\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/a-cyberrisk-control-approach-based-on-a-financial-control-model\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/1-1.jpg\",\"keywords\":[\"cyberrisque\",\"cyberrisque\",\"Cybers\u00e9curit\u00e9\",\"Cybers\u00e9curit\u00e9\",\"donn\u00e9es personnelles\",\"donn\u00e9es personnelles\",\"S\u00e9curit\u00e9\",\"S\u00e9curit\u00e9\",\"Security\"],\"articleSection\":[\"Articles\",\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/a-cyberrisk-control-approach-based-on-a-financial-control-model\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/a-cyberrisk-control-approach-based-on-a-financial-control-model\\\/\",\"name\":\"A Cyber Risk control approach based on a financial control model - Eficio\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/a-cyberrisk-control-approach-based-on-a-financial-control-model\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/a-cyberrisk-control-approach-based-on-a-financial-control-model\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/1-1.jpg\",\"datePublished\":\"2023-01-19T09:16:33+00:00\",\"dateModified\":\"2025-04-07T19:09:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/a-cyberrisk-control-approach-based-on-a-financial-control-model\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/a-cyberrisk-control-approach-based-on-a-financial-control-model\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/a-cyberrisk-control-approach-based-on-a-financial-control-model\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Cyber Risk control approach based on a financial control model\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"name\":\"Eficio\",\"description\":\"CIO disponibles selon vos besoins\",\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eficio.ca\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\",\"name\":\"Eficio\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"width\":880,\"height\":361,\"caption\":\"Eficio\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Eficio.ca\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/integra-co\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\",\"name\":\"Alain Marchildon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1779218194\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1779218194\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1779218194\",\"caption\":\"Alain Marchildon\"},\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/author\\\/amarchildon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Cyber Risk control approach based on a financial control model - Eficio","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/","og_locale":"en_US","og_type":"article","og_title":"A Cyber Risk control approach based on a financial control model","og_description":"A Cyber Risk control approach based on a financial control model As part of the launch of the new version of our CyberRisk CISO-360 Control tool and methodology, Eficio is launching a Cyber Security folder for Managers. Through these six articles, we are addressing managers...","og_url":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/","og_site_name":"Eficio","article_publisher":"https:\/\/www.facebook.com\/Eficio.ca\/","article_published_time":"2023-01-19T09:16:33+00:00","article_modified_time":"2025-04-07T19:09:00+00:00","og_image":[{"width":1000,"height":684,"url":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/1-1.jpg","type":"image\/jpeg"}],"author":"Alain Marchildon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Marchildon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/#article","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/"},"author":{"name":"Alain Marchildon","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093"},"headline":"A Cyber Risk control approach based on a financial control model","datePublished":"2023-01-19T09:16:33+00:00","dateModified":"2025-04-07T19:09:00+00:00","mainEntityOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/"},"wordCount":712,"publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/1-1.jpg","keywords":["cyberrisque","cyberrisque","Cybers\u00e9curit\u00e9","Cybers\u00e9curit\u00e9","donn\u00e9es personnelles","donn\u00e9es personnelles","S\u00e9curit\u00e9","S\u00e9curit\u00e9","Security"],"articleSection":["Articles","Cybers\u00e9curit\u00e9"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/","url":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/","name":"A Cyber Risk control approach based on a financial control model - Eficio","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/#primaryimage"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/1-1.jpg","datePublished":"2023-01-19T09:16:33+00:00","dateModified":"2025-04-07T19:09:00+00:00","breadcrumb":{"@id":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eficio.ca\/en\/"},{"@type":"ListItem","position":2,"name":"A Cyber Risk control approach based on a financial control model"}]},{"@type":"WebSite","@id":"https:\/\/eficio.ca\/en\/#website","url":"https:\/\/eficio.ca\/en\/","name":"Eficio","description":"CIO disponibles selon vos besoins","publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eficio.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eficio.ca\/en\/#organization","name":"Eficio","url":"https:\/\/eficio.ca\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/","url":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","contentUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","width":880,"height":361,"caption":"Eficio"},"image":{"@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Eficio.ca\/","https:\/\/www.linkedin.com\/company\/integra-co\/"]},{"@type":"Person","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093","name":"Alain Marchildon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1779218194","url":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1779218194","contentUrl":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1779218194","caption":"Alain Marchildon"},"url":"https:\/\/eficio.ca\/en\/blog\/author\/amarchildon\/"}]}},"_links":{"self":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/comments?post=40538"}],"version-history":[{"count":16,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40538\/revisions"}],"predecessor-version":[{"id":49399,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40538\/revisions\/49399"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media\/40561"}],"wp:attachment":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media?parent=40538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/categories?post=40538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/tags?post=40538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}