WE UPGRADE THE SECURITY OF YOUR BUSINESS
CONSULTING
THEY TRUST US
























KEY FIGURES
CRISIS MANAGEMENT
Immersion
Observation
Adaptation
A 3-STAGE APPROACH:
01
02
03
Feedback and implementation of reflex cards for operational staff
EXPERTISE
CYBER STRATEGY
We work with organizations to help them define a cybersecurity and cyber resilience strategy, strengthening their ability to support their digital transformation and manage a cyber crisis while minimizing the business impact.
• SSI master plan and roadmap
• Raising management awareness
• Operational target model
• Roadmap deployment
• Cyber crisis management
• CISO support
CONTINUITY & CRISIS MANAGEMENT
Our business continuity services:
• Loss mapping, Business Impact Analysis (BIA) and Risk Analysis
• Business continuity and recovery strategy (BCP/ERP – PCI/PRI)
• Development of business continuity tools and procedures
• Assistance in implementing technical backup solutions
• Maintenance in operational conditions (tests, audits, etc.)
• Preparation and running of crisis management exercises
• Definition of crisis management organization
• Design of crisis management toolkits
• Assistance in selecting crisis management tools
• Change management, including training and awareness-raising
RISK & COMPLIANCE
TAs part of its “Risk Management” offering, we works with the Risk and Information Security departments
with a triple objective:
• Ensure that the control system in place is in line with the threats to business activities;
• Implement relevant risk management indicators;
• Design and justify the strategy for developing the control system, by linking the risks covered to the euros spent.
Services:
• (LPM, NIS, PCI-DSS, ISO27k, RGDS, etc.)
• (PASSI)
• Definition of contractual security frameworks for service provision
• ERPs
IDENTITY & ACCESS MANAGEMENT
360° support:
• Framework, audit and change management
• Cloud and On Prem integration
• IAG Web-SSO & E-SSO)
PRIVILEGED & ACCOUNT MANAGEMENT
• Implement CI\CD industrialization processes
• IAM, SIEM, access control, vulnerability scanning
• Monitoring
DATA PROTECTION
We work with large corporations to help them protect their information assets by implementing strategies for securing architectures, applications and sensitive data (structured and unstructured) in an extended enterprise context (Cloud, B2B, Open API):
• Data protection (classification, DLP, DRM, PKI, etc.)
• Application security
• CISO support (policies, dashboard, ISO27k…)
• Project risk assessment and management
• Awareness & training
• Personal data management (GDPR)