unyer
06/11/2025

IT security is at a crossroads

IT security: a multidimensional challenge

IT security is no longer limited to technical considerations. It now requires a comprehensive approach that integrates technical, organizational, managerial, and legal skills. This cross-functional nature requires close cooperation between different departments within the company to define clear objectives, measure risks, and implement corrective and/or preventive actions.

Despite growing awareness of digital risks, not all organizations are sufficiently committed to a proactive approach. However, cyberattacks can have financial and reputational consequences that are far more onerous than the investments required for prevention. In this context, security is becoming a strategic investment, which is reinforced by changes in the legal framework: we are moving from a right to security to an obligation to secure ourselves.

 

A constantly evolving legal framework

Organizations must navigate a complex legal environment, comprising international conventions, European texts (such as the GDPR or the NIS2 directive), national laws, regulations, and standards issued by authorities such as the CNIL or the ANSSI. It is essential to build a legal compliance framework and keep it up to date through multidisciplinary monitoring, often provided by lawyers.

 

Legal tools for cybersecurity

  1. Preventive measures

1.1 Contractual security clauses

IT contracts must include specific security clauses defining responsibilities, obligations (of means or results), technical standards (ISO 27001, SecNumCloud, OWASP, etc.), incident management procedures, audit rights, and continuity plans (BCP/DRP). These clauses are key to ensuring the resilience of the information system and avoiding disputes.

 

1.2 Cybersecurity contracts

When the contract directly concerns security services (pentests, audits, SOC, etc.), the level of legal requirements must be high. The contract should detail the technical scope, objectives, methods, time commitments, and limits of liability. It is a strategic tool that must be co-developed by the company’s CIO/CISO and its General Counsel.

 

1.3 Internal charters and policies

IT charters and IS security policies (ISSPs) are internal documents that govern behavior, define rules of use, security obligations, penalties, and traceability procedures. They must be approved by management, distributed, updated regularly, and included in contracts with service providers.

Internal procedures (access management, incident management, encryption, etc.) ensure operational security. User training (via e-learning, awareness campaigns, etc.) is also crucial, as humans are often the weak link. Ninety percent of security incidents involve company employees.

 

The concept of state of the art

Contracts often refer to the state of the art, which mean the best practices and knowledge available at a given time. This reference framework consists of standards, scientific publications, and professional guides, and may be further clarified by experts or judges in the event of a dispute. By default, the obligation to comply with the state of the art applies in IT contracts. This reference framework must be specified in detail on a case-by-case basis.

 

  1. Remedial measures: crisis management

The establishment of a cybersecurity crisis unit is essential to respond effectively to incidents. It must be multidisciplinary, including the CISO, CIO, technical teams, management, lawyers, communicators, HR, and the cyber insurer.

Key elements to consider:

  • Crisis room (physical or virtual)
  • Backup communication channels
  • Runbooks (procedures according to incident type)
  • Access to detection tools and backups
  • Crisis management plan (CMP) with scenarios, alert procedures, decision chain, remediation

It is essential to conduct crisis exercises to test coordination and improve procedures. After each incident, a post-mortem analysis makes it possible to capitalize on the experience and adjust the systems.

Lastly, preserving evidence is crucial. It is recommended not to shut down equipment after an attack, but to disconnect it from the Internet to preserve volatile data. IT experts and judicial officers who are ready to intervene quickly must be identified in advance, with pre-established letters of engagement.

 

Conclusion

IT security has become a real investment (and no longer just an operating expense) because it is a strategic, legal, and organizational issue. It is based on an integrated approach, combining prevention, contractualization, internal governance, crisis management, and regulatory compliance. The legal tools, when used properly, serve to structure this approach, protect the company, and strengthen the confidence of its business partners.

 

Arnaud Tessalonikos
Silvia C. Bauer
Mario Valentini
Summary of the privacy policy
Unyer

Cookies - Functions

This cookie is used to store your cookie preferences :
- _moove gdpr pop up .

Web analytics cookies

This website uses Google Analytics for statistical purposes (audience measurement cookies). They make it possible to know how many times a certain page has been consulted. We only use this information to improve the content of our website.

Please find below the cookies used :

– ga : This cookie is used to identify users of the Website via the users’ IP addresses.

– gat : This cookie is used to limit the number of simultaneous requests in order to avoid bugs

– gid : This cookie is used to identify the Website users via their IP address (which are stored 24h)

You can visit Google's privacy page.