Intelligent CISO Issue 41 | Page 69

We have a team of very experienced security practitioners to help our customers assess security architecture , their vulnerabilities and defence in depth . www . intelligentciso . com
decrypting myths
social channels , identify any brand exploitation , any social media impersonation , any malicious mobile apps , defacement of legitimate websites and open detection and they can then send a notification to the customer , provide him with recommendations and help with takedown options .
How do you support your customers when they are under attack ?
Zero risk doesn ' t exist . We deal with this in a reactive way when the customer is under attack . we ' re a cloud provider , a connectivity provider and a security provider . The combination of the three makes it easier and more effective for our customers .
Those offers are completed by our cyber SOC service which not only covers the SOC triad of log , network and endpoint , but also detection of threats to the business of the open , deep and Dark Web . You can start with whichever is the most relevant for your parent need and then expand based on the business requirements .
How do you help your customers to protect their brand against cybercrime ?
Our CERT team is dedicated to detecting cybercrime against our customers . They have a dedicated cybercrime monitoring team comprised of around 20 intelligence analysts across three different global locations , speaking 10 + languages . They are largely specialised and have worked in fields like the military or intelligence agencies . We ' re talking about 18 + plus years of experience in this field , and they are also a member of industry recognised bodies .
They have partnerships established with different vendors and have access to private lists , as well as specific communication channels with police and intelligence agencies . This team also has access to the specific agreements that Orange , as a telco , has with the Internet and security global organisations like the public Internet registry , VeriSign and so on .
They have all the tools to be able to constantly monitor the web , mobile and
We have a CISO team which is also very experienced and which has the right skills and the methodology to assist our customers in identifying , containing , eradicating and recovering from cyber incidents . They follow the principles of the Association of Chief Police Officers for all aspects of evidence management . We look to ensure that if your defences have been breached , the threat is prevented from escaping and damage is really limited to a minimum . u

We have a team of very experienced security practitioners to help our customers assess security architecture , their vulnerabilities and defence in depth . www . intelligentciso . com

69