Cyber Security Operation (SOC) and Cyber Management Consultancy services are the critical success factor for cybersecurity governance implementation.
The increasing complexity of companies from all the market sectors (Financial Institutions, Industries, Health Care, Hospitality) made it clear that cybersecurity is no longer an Information Technology thing.
The Chief Information Security Officer (CISO) has a transversal responsibility in modern complex organizations, reporting directly to centralized risk management roles rather than the IT Department.
The CISO is now part of the cyber security committee, a transversal team with senior managers from the different business units and functions, IT, Risk and Compliance departments.
The main reason for the cyber security committee is that all the organization's people need to be aware of the cybersecurity processes and procedures, to the extent that cybersecurity awareness training programs are now part of the standard training in many companies.
Furthermore, it is a Board of Directors ' responsibility to adopt a cybersecurity framework with international standards like the National Institute of Standards and Technology (NIST), ensuring the risk management processes and procedures reflect the legal framework principles.
Following a cybersecurity framework like the NIST means analyzing, understanding, and optimizing the company's assets, which, if compromised, could negatively impact the operation in case of an internal or external cyber attack, and implementing the internal risk management policy (e.g. using templates and methodologies like the RACI Matrix).
But to implement all the control techniques due to the complexity of the company's cyber assets, a Security Operation Center has to be implemented and tailored to the corporate organization's reality.
The SOC has the objective to detect, identify, investigate and respond to cyber incidents potentially dangerous for the company's infrastructure, operations and clients.
The SOC must include a Security Information & Event Management (SIEM) system.
A SIEM technology collects log information allowing threat detection, compliance and security incident management, generating the required data for analysis (both near real-time and historical) of security events, as well as a wide variety of other anomalies.
The SOC's staff need to be aware of the client structure and operation peculiarities during the setup phase implemented by the Transitions Projects and during the operation after the live date.
The SOC needs to have cybersecurity analysts capable of analyzing the data generated by the SIEM on a 24x7 basis.
Experts have to interact correctly with the Client staff during emergency escalation processes.
The SOC architecture and operation has to respect data privacy and sensitivity, as data assets should remain within the client infrastructure where they belong.
Axians Switzerland and E-Venture Business Solutions joined approach is the fil rouge that connects all the above-described elements on a clear path with a project management approach.
During the Transition Projects, we integrate the Axians Switzerland SOC services running on a Tier4 Data Center with the Client IT infrastructure, implementing the SIEM hardware infrastructure on the Client's site.
During the SIEM implementation, we analyze the Client's reality to proceed with the parameterization definition of the SIEM, preparing the playbooks with the agreed use case dependent processes.
We support the Client in understanding his organization, building the cybersecurity processes and procedures, introducing NIST legal framework, starting its own cyber assets analysis, implementing and integrating SOC services within its infrastructure and organization.
Our clients are supported on site during all the phases of the Transition Project, and once in production with the SOC services, the Client still has the availability of our business analyst for the solution maintenance locally in Bahrain and the Gulf Cooperation Council, and for any issue can rely on a dedicated Account Manager.
Explore our services for further details and don't hesitate in contacting us for any additional information.