CYBERDEFENSE

Laurent BESSET

Laurent BESSET

Head of Cyberdefense

Cyberdefense was founded in 2016 in order to bring together several expertises developed over the years.
Today, it represents nearly 90 men and women in transversal teams that accompagny our clients in their daily lives, as well as during attacks on their information systems thanks to teams :

  • Audit and Offensive Security
  • CyberSOC
  • I-CERT
  • Vulnerability Management Center

These teams are completed by :

  • Security Tooling
  • Data Factory : gathers specialized profiles in data collection and treatment
  • Tactical Ops : offensive security, digital investigation and detection to create honeypots and advanced controls to detect more efficiently current cyber attacks.
Laurent BESSET

Laurent BESSET

Head of Cyberdefense

Cyberdefense was founded in 2016 in order to bring together several expertises developed over the years.
Today, it represents nearly 90 men and women in transversal teams that accompagny our clients in their daily lives, as well as during attacks on their information systems thanks to teams :

  • Audit and Offensive Security
  • CyberSOC
  • I-CERT
  • Vulnerability Management Center

These teams are completed by :

  • Security Tooling
  • Data Factory : gathers specialized profiles in data collection and treatment
  • Tactical Ops : offensive security, digital investigation and detection to create honeypots and advanced controls to detect more efficiently current cyber attacks.

Audit & Offensive Security

  • Audit (internal/external), black/grey/white penetration test depending on the information provided)

  • Audit architecture with The National Cybersecurity Agency of France (ANSSI) standarts

  • Configuration audit

  • Code review

  • Audit of the logical and physical security organisation

  • Audit of the information systems ( application, platforms, Cloud infrastructure, network engineering, etc)

Audit & Offensive Security

  • Audit (internal/external), black/grey/white penetration test depending on the information provided)

  • Audit architecture with The National Cybersecurity Agency of France (ANSSI) standarts

  • Configuration audit

  • Code review

  • Audit of the logical and physical security organisation

  • Audit of the information systems ( application, platforms, Cloud infrastructure, network engineering, etc)

CyberSOC

  • Advanced Incident and Intrusion Detection

  • Collection, archiving and valorisation of SIEM (Security Information and Event Management ) logs 

  • Data Leak Detection and Surveillance, Data Leaks on the Dark and Deep Web

CyberSOC

  • Advanced Incident and Intrusion Detection

  • Collection, archiving and valorisation of SIEM (Security Information and Event Management ) logs 

  • Data Leak Detection and Surveillance, Data Leaks on the Dark and Deep Web

Vulnerability Management Center

  • Vulnerability Scanning and Compliance Service

  • Vulnerability analysis service and determination of remediation plans

  • Remediation support service

  • Tooling & continuous improvement

Vulnerability Management Center

  • Vulnerability Scanning and Compliance Service

  • Vulnerability analysis service and determination of remediation plans

  • Remediation support service

  • Tooling & continuous improvement

I-CERT

  • Incident Response : Analysis and resolution of cybersecurity incidents

  • Cyber Crisis Management: initiate and pilot ISS operational crisis management in the event of a major incident

  • Critical Vulnerability Management: conduct ISS monitoring, organize and manage alert analysis, define preventive measures, coordinate the deployment of patches and signature bases throughout the IS

  • Forensic analysis : collection, preservation and presentation of IT evidence. Comprehension of past actions on the IS for legal and technical evidence

I-CERT

  • Incident Response : Analysis and resolution of cybersecurity incidents

  • Cyber Crisis Management: initiate and pilot ISS operational crisis management in the event of a major incident

  • Critical Vulnerability Management: conduct ISS monitoring, organize and manage alert analysis, define preventive measures, coordinate the deployment of patches and signature bases throughout the IS

  • Forensic analysis : collection, preservation and presentation of IT evidence. Comprehension of past actions on the IS for legal and technical evidence

 

Pin It on Pinterest

Shares
M