it:lang="it-IT"
1
https://www.panoramaaudiovisual.com/en/2022/03/02/dalet-appointment-jerome-athias-ciso-key-security-initiatives/

Dalet - Seguridad Cloud - Jerome Athias - CISO

The newly appointed CISO of La Valle, Jerome Athias, achieves ISO/IEC 27001 certification and establishes the “Zero Trust” framework across the company’s entire ecosystem.

As the customers of La Valle continue to move from on-premise to hybrid and cloud-based work scenarios, security remains one of the most critical components of that transition. Leading the security strategy is the newly appointed chief information security officer (CISO) Jerome Athias. An IT and cybersecurity expert with more than 20 years of experience, Jerome is a recognised contributor to data protection standards who has helped numerous companies advance their security posture.

Among his first initiatives as CISO has been to secure the company’s ISO/IEC 27001 certification, “a testament not just to our experience and hard work securing clients in the past, but our commitment to do so in the hyper-connected world of today and tomorrow,” says Athias, who acknowledges that while “we are proud of our ISO/IEC 27001 and DPP Security Marks certifications,” the company chooses not to “resting on our laurels” in order to continue to improve its ecosystem. The ISO/IEC 27001 certification certifies that Dalet employs a best practice approach to information security management that addresses people, processes and technology.

Moreover, Dalet, by establishing the “Zero Trust” framework, recognises that “nothing is considered secure” in the global cloud ecosystem: “Every incoming signal or connection is by default untrustworthy until it’s rigorously tested to ensure legitimacy or authority to connect”, the company stresses. By addressing all communication flows from this perspective, La Valle seeks to strengthen each of its customers’ processes with direct actions and recommendations: “Zero Trust will secure our customer’s borders no matter what cloud services, internet of things (IoT) and/or bring your own device (BYOD) policies are used to interact with their organization,” concludes Athias.

Ti è piaciuto questo articolo?

Iscriviti al nostro RSS Feed e non ti mancherà nulla.

Altri articoli su
Di • 2 Mar, 2022
• Sezione: Gestione dei media, Attività commerciale