Intelligent CIO Middle East Issue 70 | Page 27

TRENDING implement a Zero Trust strategy with our services and recommendations , but at their own pace .
specific communication channels with police and intelligence agencies .
Our strength comes from the combination of our expertise – we ’ re a cloud provider , a connectivity provider and a security provider . The combination of the three makes it easier and more effective for our customers .
This team also has access to the specific agreements that Orange , as a telco , has with the Internet and security global organisations like the public Internet registry , VeriSign and so on .
Those offers are completed by our cyber SOC service which not only covers the SOC triad of log , network and endpoint but also detection of threats to the business of the open , deep and dark web .
You can start with whichever is the most relevant for your parent need and then expand based on the business requirements .
How do you help your customers to protect their brand against cybercrime ?
Our CERT team is dedicated to detecting cybercrime against our customers . They have a dedicated cybercrime monitoring team comprised of around 20 intelligence analysts across three different global locations , speaking 10 + languages .
They are largely specialised and have worked in fields like the military or intelligence agencies . We ’ re talking about 18 + plus years of experience in this field and they are also a member of industry recognised bodies . They have partnerships established with different vendors and have access to private lists , as well as
They have all the tools to be able to constantly monitor the web , mobile and social channels , identify any brand exploitation , any social media impersonation , any malicious mobile apps , defacement of legitimate websites and open detection and they can then send a notification to the customer , provide him with recommendations and help with takedown options .
How do you support your customers when they are under attack ?
Zero risk doesn ’ t exist . We deal with this in a reactive way when the customer is under attack .
We have a CISO team which is also very experienced , and which has the right skills and the methodology to assist our customers in identifying , containing , eradicating and recovering from cyber incidents . They follow the principles of the Association of Chief Police Officers for all aspects of evidence management .
We look to ensure that if your defences have been breached , the threat is prevented from escaping and damage is really limited to a minimum . p
www . intelligentcio . com INTELLIGENTCIO MIDDLE EAST 27