Identify, detect and simulate risks to protect your information systems against cyber attacks

Oligo Risk Manager is the new generation tool for strengthening the protection of your data and information systems against internal and external vulnerabilities. A collaborative, educational solution that will make your users and partners aware of the adoption of good practices.

Continuously enriched by the standards and methods in force (ISO27001, Mehari, EBIOS in particular) in the field of cybersecurity, oligo.rm fully meets the internal and legal compliance criteria (RGPD, HDS, LPM, RGS, etc.).

Perfectly aligned with the EBIOS Risk Manager methodology, oligo.rm addresses both the strategic and operational dimensions of information system security needs and the protection of personal data.

The benefits

A contextual approach

A contextual approach focused on your business values, your critical processes and your project needs.

Process and control your risks

Synthesized risk scenarios and the possibility of implementing security measures in accordance with identified needs.

Design and simulate your risk scenarios

Identify your sources of risk, imagine your strategic scenarios at the scale of your ecosystem and design your operational scenarios.

A response plan for total cyber resilience

Simulate identified incidents and/or cyber attacks and put in place an active approach to guarantee business continuity and security against all risks.

5 Ebios Risk Manager workshops grouped into 4 automated modules
  • An efficient, intuitive, iterative approach.
  • Collaboration, the involvement of business users is facilitated.
  • The security of the company's information capital under the responsibility of all the company's operational players, collaboration around risks is ensured at all levels of the company.
Risk analysis an automated, agile workflow adjusted to the complexity of the study
  • Instruct the perimeter and its granularity.
  • Identify threats and their impacts on the entire perimeter.
  • Simulate these threats by taking into account the elements making up the concerned perimeter.
  • Non-conformities are quickly identified from the start of the analysis.
  • An approach that reduces the cost of the information systems security post.
  • A better way to create a culture of risk in the company.
Play Video

Use cases

The challenge 

The all-digital era is leading companies to transform, to change their business model, their approach to their partners, customers and suppliers. Exchange channels are diversifying thanks to new technologies. This multiplication of digital tools is a boon for better production and maintaining their competitiveness. A significant turning point for the growth of companies. Nevertheless, it is the responsibility of companies to preserve this growth, to perpetuate activities while thinking of protection: the era of all digital is also the era of all protected. Transforming your information system by integrating security throughout this transformation is the key to the success of any business project.

Our solution OLIGO.RM

With our OLIGO.RM solution, we offer an analysis method that adjusts to any management system, any type of information system. With OLIGO.RM, we will be able to express security issues, classify information according to their sensitivity and criticality. We assess the threats to business processes and their impacts.

With OLIGO.RM, we establish a security policy in proportion to your security needs. It is also a question of evaluating the potential threats coming from your ecosystem (supplier, customers, partners etc ...). The risk scenarios are assessed, simulated and processed according to their impacts. Your regulatory compliance is measured, your compliance with internal standards is monitored using selected indicators.

The challenge

The industrial sector, such as Automobiles, Aeronautics, Energy, Water Treatment and Delivery, production systems etc ... a sector where awareness of threats is increasingly crucial, advent of digital connectivity, IOT technologies, are confirmed risk factors. This business sector is not at all or sufficiently prepared for this transformation, not supported to take into account the new risks associated with this transformation. It is more than essential to adapt and develop accordingly our tools, our risk analysis methods, that our innovations be able to apprehend these complex systems, these typical architectures of the industrial world so different from the "management" domain. office automation ”.

 

Our solution oligo.rm

With our OLIGO.RM solution, we offer an analysis method that adjusts to identify the smallest vulnerabilities in a complex system, which adjusts to any activity. The component elements of an industrial system architecture, which could be the source of a threat "of a feared event" are identified. The scales and metrics of the threat / impact ratios are adapted to the situations of these complex systems, the same applies to the likelihood calculations. The results are finely expressed and monitored for a risk treatment strategy commensurate with the challenges.

The challenge 

Health data (medical prescriptions, test results, notes explaining symptoms and sometimes very intimate information about the patient) are transmitted via a variety of digital tools. This exchange and sharing through these different digital channels exposes patient data to multiple risks, the severity of which is very high. Data of a confidential nature may be altered, their integrity inadvertently or intentionally impacted, may be stolen to be traded on illicit websites, may be completely erased from a medium that hosts them. These threats would be harmful to the patient if they were to occur. In some cases these feared events can cause the death of the patient.

Repositories and standards [HDH Regulation (Health Data Hosting)], good practices related to access to health data, applied and respected by organizations handling this sensitive information will significantly reduce these risks.

Our solution OLIGO.RM

Our solution OLIGO.RM, a method for analyzing and managing risks related to the protection of health information and data, allows this data to be classified according to their criticality and sensitivity, and to identify threats that may have an impact. their confidentiality, integrity and / or availability. It is also a question of evaluating the level of threat that may come from actors handling this data, of simulating risk scenarios related to these threats in order to better counter them. To put in place a global security policy (access management, encryption, backup, etc.). And finally to guarantee state-of-the-art compliance, meeting 100% current standards.

Schedule a demo

Calendar is loading...
captcha