ru:lang="ru-RU"
1
https://www.panoramaaudiovisual.com/en/2022/03/02/dalet-appointment-jerome-athias-ciso-key-security-initiatives/

Dalet - Seguridad Cloud - Jerome Athias - CISO

The newly appointed CISO of Долина, Jerome Athias, achieves ISO/IEC 27001 certification and establishes the “Zero Trust” framework across the company’s entire ecosystem.

As the customers of Долина continue to move from on-premise to hybrid and cloud-based work scenarios, security remains one of the most critical components of that transition. Leading the security strategy is the newly appointed chief information security officer (CISO) Jerome Athias. An IT and cybersecurity expert with more than 20 years of experience, Jerome is a recognised contributor to data protection standards who has helped numerous companies advance their security posture.

Among his first initiatives as CISO has been to secure the company’s ISO/IEC 27001 certification, “a testament not just to our experience and hard work securing clients in the past, but our commitment to do so in the hyper-connected world of today and tomorrow,” says Athias, who acknowledges that while “we are proud of our ISO/IEC 27001 and DPP Security Marks certifications,” the company chooses not to “resting on our laurels” in order to continue to improve its ecosystem. The ISO/IEC 27001 certification certifies that Dalet employs a best practice approach to information security management that addresses people, processes and technology.

Moreover, Dalet, by establishing the “Zero Trust” framework, recognises that “nothing is considered secure” in the global cloud ecosystem: “Every incoming signal or connection is by default untrustworthy until it’s rigorously tested to ensure legitimacy or authority to connect”, the company stresses. By addressing all communication flows from this perspective, Долина seeks to strengthen each of its customers’ processes with direct actions and recommendations: “Zero Trust will secure our customer’s borders no matter what cloud services, internet of things (IoT) and/or bring your own device (BYOD) policies are used to interact with their organization,” concludes Athias.

Тебе понравилась эта статья?

Подпишитесь на нашу Новостная лента и вы ничего не пропустите.

Другие статьи по
К • 2 Mar, 2022
• Раздел: Медиа-менеджмент, Бизнес

Другие статьи по теме