[{"command":"insert","method":"html","selector":"#head_info","data":"\u003Ch2 class=\u0022offer-title\u0022\u003ECyber Operations\u003C\/h2\u003E\n \u003Cdiv class=\u0022intro\u0022\u003ECyber Operations support organisations in securing their operations in order to obtain an optimal level of confidence in the protection of a firm\u2019s business strategy, profession, data, users, customers and their assets. \r\n\u003C\/div\u003E","settings":null},{"command":"insert","method":"html","selector":"#offer_list","data":"\u003Ch3 class=\u0022title\u0022\u003EOur offers\u003C\/h3\u003E\n \u003Cdiv class=\u0022sectors_depth\u0022\u003E\n \u003Cdiv class=\u0022ct_expertises\u0022\u003E\n \u003Cdiv class=\u0022large\u0022\u003E\n \u003Cul class=\u0022list_expertises\u0022\u003E\n \u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Identity \u0026amp; Access Management\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tIAM strives to ensure that an organisation controls who accesses, how, when and to which resource in the company\u0026#039;s information system through the notion of digital identity, whether it be internal users, mobile, partners or customers accessing the IS, mobile applications, etc. \u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Infrastructure \u0026amp; Endpoint protection\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tSia Partners supports organisations in their information system infrastructure and terminal protection projects (computers, tablets, mobile phones, etc.), network and communications urbanisation, system infrastructure and protection applications within the existing system.\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n IoT\/OT Security\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tBuilding on our competitive advantage in Consulting 4.0 and having a strong tech-savvy team of consultants, we use our expertise for projects related to IoT, Operational Technology, Industrial control systems, Programmable Logic Controllers, Discrete Process Control systems and SCADA.\u00a0\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Cloud Security\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tCloud Security brings our expertise to organisations facing Cloud issues. We provide support throughout the following project process: opportunity study, urbanization of the target architecture, functional and technical specifications, solution benchmarking; aCloud architecture audit.\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Cyber Bot\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tOur Cyber Bot supports CISOs and security operational employees in the identification and continuous, dynamic and industrialised treatment of Cyber vulnerabilities thanks to mechanisms similar to the Threat Intelligence and an ergonomic interface. \u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Threat Intelligence\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tWe leverage all of ICT\u0026#039;s techniques and tools to provide organisations with structured, relevant and contextualised data at all hierarchical levels to be exploited by strategic (C-Level), tactical (Head of) and operational teams.\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Vulnerability Management\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tVulnerability Management allows organisations to establish vulnerability management processes, governance, capabilities, tools and associated expertise. Our goal is to enable organisations to identify, manage and resolve problems with the various stakeholders involved in a timely manner. \u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Penetration Testing, Red Teaming\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tSia Partner offers technical security audits such as penetration tests as well as Red Teaming campaigns to assess the security level of an application or a company\u0026#039;s Information System through attack scenarios, providing a pragmatic view of the security level.\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_link\u0022\u003E\n \u003Ca class=\u0022button\u0022 href=\u0022\/en\/our-capabilities\/penetration-testing-red-teaming\u0022 title=\u0022Read more\u0022\u003E\n Read more\u003Cspan class=\u0022link-arrow-slash\u0022\u003E\u003C\/span\u003E\n \u003C\/a\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n DevSecOps\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tThis included breaking down the silos between developers, the security team and the operational team, improving processes through collaborative and agile work, enabling faster and safer software delivery using technology, and achieving consistent governance and control. \u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Information Security in Project Management (ISP)\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tWe reviewed the project lifecycle in order to integrate different milestones for optimal security in all phases of the project. \u003Cbr \/\u003E\r\nWe intervene independently of the development cycle by adapting it in order to integrate security bricks and implement a SecSDLC (Security System Development Life Cycle).\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\n \u003C\/ul\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E","settings":null}]