1
0
forked from Git/tommytran.io
olivier.falcoz.net/content/services.md

2.1 KiB

title date tags author canonicalURL hidemeta ShowReadingTime ShowPostNavLinks showtoc
Services 2022-12-09T03:22:29+01:00
services
olivier falcoz
risk intelligence
risk management
cybersecurity
infosec
Olivier Falcoz https://olivier.falcoz.net/services true false true false

Strategic Risk Intelligence

$ whatis:

  • Identify and mitigate the risk of loss caused by flawed or failed processes, policies, systems or events that may disrupt business operations.
  • Identify and mitigate economic, security and criminal risks associated with business operations
  • Align asset governance structure with business objectives
  • Provide accurate and actionable intelligence, develop and enforce effective intelligence collection policies
  • Identify competititors' strategies, regulatory or government interference, corruption, criminality, fraud and intellectual property abuse
  • Increase operational resilience and minimise operational disruption to the organisation

$ howto:

  • Background check, due diligence / enhanced due diligence
  • Business counter-intelligence
  • Asset tracking & recovery
  • IP rights investigation & enforcement
  • Fraud & counterfeiting search
  • Project risk analysis & remediation

Protect Cybersecurity Assets

$ whatis:

  • Secure mission-critical and business-critical assets e.g. information systems, intellectual property, physical assets
  • Enforce the confidentiality, integrity, and availability of information systems and assets
  • Reduce the impact of security breaches on information assets
  • Strategically align cybersecurity efforts with business strategies to support organizational objectives
  • Effectively manage cybersecurity knowledge among staff

$ howto:

  • Business Impact Analysis : identify critical systems, networks and data
  • Threat modeling, identify methods of attack
  • Identify systems vulnerabilities; patch systems
  • Enhance security posture, test & harden the perimeter
  • Adopt defensive strategies
  • Design systems & procedures with data security & privacy in mind
  • Follow to industry standards, train users
  • Raise cybersecurity awareness and staff training