Your security is our security.
Security issues have never been more important for organizations, particularly for information systems departments.
90% of French companies experienced a cybercrime incident in 2019, with an average cost of €8.6 million(1). This rate increased fourfold in 2020.
At Consort Group, your security is one of top priorities.
ISO 27001 certified, with a Cybervadis score of 955/1000, we ensure the highest level of security through the connections of your organizations with our service centres and secure sites.
(1) Report “Le droit pénal à l’épreuve des cyberattaques” (Criminal law in the facer of cyberattacks) produced by The Club des juristes, a french legal think tank chaired by Bernard Cazeneuve, 2021
7
Service centres
(ISO 27001 certified sites)
70
experts consultants
in cybersecurity
Our offer
INFOSEC Consulting and Support
Our functional experts in cybersecurity support you throughout the implementation and definition of your cybersecurity strategy and projects.
- Implementation of general or specific security policies and verifying their “adherence” to the Cloud and their deployment within your business entities or our services for your security. ;
- Evaluation, implementation and monitoring of your INFOSEC (Information Systems Security) roadmap ;
- Crisis management support.
Employee awareness
Cyber security breaches and incidents often result from a lack of awareness among your employees. We offer training and events to raise your employees’ awareness of cybersecurity issues and thus give them the means to detect and protect your organization from cyberattacks.
Our training courses, created with our partner Daesign, are personalized, interactive (in the form of a serious game) and can be delivered digitally or in person.
Code Audit
We perform a complete “Audit as a Service” audit from our Service Centre in La Défense (with Kiuwan) or within your teams (with the tools in place), as a stand-alone project or providing Technical Assistance to highlight and resolve coding issues.
The integration of security in the different phases of your projects (Security & Privacy by Design) and the respect of the RGPD can thus be evaluated and proven.
Operational Security Centre dedicated to ETI - SIEM/SCAN/EDR
Championing “Bespoke Industrialized Services”, we have chosen to propose a service offer based on the best solutions on the market:
- ELK for SIEM,
- Cyberwatch, a computer vulnerability scan, which enables the detection and correction of these vulnerabilities, while respecting the compliance of the environment’s systems.
- SentinelOne for Endpoint Detection and Response (EDR), an intelligent antivirus that studies system behaviour to prevent, detect and neutralize cyberattack threats.
Combined with our Big Data analytics expertise, the SOC analyzes and correlates large volumes of data to predict potential system vulnerabilities and respond quickly and continuously.
Operational Security
We ensure your security infrastructure remains in operationnal condition within your environments or from one of our “Secure Site” service centres.
To do this, we provide you with a team and processes to ensure the management of flows, identities and accesses within your company.
Our expertise
Convinced of the power of human capital and collective intelligence, our cybersecurity consultants are the cornerstone of our NIST Cybersecurity Framework. Our community of experts is composed of qualified and passionate individuals covering all areas of Cybersecurity (Governance, Architecture, Operational, Offensive and Defensive Security)
Security management and security project management
Design and maintenance of a secure IS
Management of security incidents and crises
- Piloting the cybersecurity approach, implementation of the IS policy and support for the business lines.
- Supporting operational teams in carrying out security actions and monitoring action plans.
- Definition, implementation and management of projects for the deployment of security solutions and tools, in line with the security objectives set by the organization.
- Expression of needs and monitoring of IS security in the context of IT or business projects.
- Design, architecture and security model recommendations.
- Targeted expertise (system, IoT, Active Directory, Cloud, IAM, AI, etc.) and operational security (development, encryption, administration, etc.)
- Audits, process controls and technical security assessments (Pentester).
- Supervision of the information system.
- Analysis of security incidents and crises (Security Incident Response Analyst, Cybersecurity Crisis Manager)
Security management and security project management
- Piloting the cybersecurity approach, implementation of the IS policy and support for the business lines.
- Supporting operational teams in carrying out security actions and monitoring action plans.
- Definition, implementation and management of projects for the deployment of security solutions and tools, in line with the security objectives set by the organization.
Design and maintenance of a secure IS
- Expression of needs and monitoring of IS security in the context of IT or business projects.
- Design, architecture and security model recommendations.
- Targeted expertise (system, IoT, Active Directory, Cloud, IAM, AI, etc.) and operational security (development, encryption, administration, etc.)
- Audits, process controls and technical security assessments (Pentester).
Management of security incidents and crises
- Supervision of the information system.
- Analysis of security incidents and crises (Security Incident Response Analyst, Cybersecurity Crisis Manager)
Ready to start your project with us?
Our experts are at your disposal to design with you
a customized offer adapted to your needs.