Page tree


Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Content Layer
background-color#f59e3a#FFA500
padding7px 20px 20px 7px
margin0px
id1051820542
Content Column
id1051820555

Image Removed                                                                                              Image Added

Content Layer
id1925176407
Content Column
background-color$secondaryColor
width70%
id1925176409
Content Block
background-color$secondaryColor
id1941067024

Purpose

Cyber threat intelligence (CTI) is the proactive process of collecting, analyzing, and disseminating information about potential and current cyber threats to help in incident detection and/or prevention. In addition, we  support Syensqo stakeholders to make informed decisions and mitigate cyber threats to our people, systems, networks, and data assets. 

Main Responsibilities

  • Data Collection: Gathering data from various sources such as open-source intelligence (OSINT) and internal security logs.

  • Analysis: Analyzing collected data to identify emerging threats, trends, attack techniques, and indicators of compromise (IoCs) relevant to Syensqo.

  • Contextualization: Providing context to threat data by understanding the threat actor motivations, tactics, techniques, and procedures (TTPs), and their potential impact on Syensqo’s operations.

  • Dissemination: Sharing actionable intelligence with relevant stakeholders within Syensqo to facilitate timely response and decision-making. Integrating cyber threat intelligence into Syensqo’s processes can enhance threat detection and response capabilities. 

Goals

  • Early Threat Detection: Assist with the identification and detection of threats at the earliest possible stage, enabling proactive mitigation measures to be implemented before significant harm occurs.

  • Risk Mitigation: CTI works directly with the Syensqo GRC team in order to help reduce the organization's exposure to cyber threats by providing actionable intelligence that supports informed risk management decisions.

  • Incident Response Enhancement: Enhance incident response capabilities by providing relevant context and guidance to responders, enabling them to effectively contain, eradicate, and recover from security incidents.

  • Security Awareness: Increase overall security awareness among employees and stakeholders by sharing insights into emerging threats and best practices for protecting against them.


CTI Reports Library

In this section, you will find both current and archived Cyber Threat Intelligence (CTI) reports. These reports provide valuable insights into Syensqo’s cyber threat landscape, offering intelligence at tactical, operational, and strategic levels. By reviewing these reports, you can stay informed about current and emerging threats, and long-term trends relevant to our organization’s cybersecurity.

Please note that these reports are confidential. Sharing or reproducing them is strictly prohibited without prior authorization from the Cyber Threat Intelligence (CTI) team.

  • Annual Reports : A strategic report based on a forecasting exercise that assesses the cyber threat landscape and the main threat trends that will be the most relevant for Syensqo in the upcoming year.
  • Quarterly Reports : An operational-level report that tracks the evolution of key threat trends identified in the Annual Report. It monitors shifts in threat trajectories, assesses geopolitical developments, changes in attacker capabilities, and notable attacks. 
  • Biweekly Reports : A tactical/operational report that leverages internal and external data to inform about significant attacks and the attackers’ tactics, techniques, and procedures (TTPs), along with recommended proactive defense measures.
  • Monthly Summaries : Summarised versions of the above reports presented at the monthly IT Newsletter. 

Cyber Security Operations have following sub organizations, named as:

SOC Team - security Operations:

  • Team of dedicated cyber security professionals

  • Focused on monitoring, detecting, and analyzing potential cyber intrusions in real time

  • Committed to response services for confirmed incidents with participation in the IS Incident Response Process as a subject matter expert

  • Passionate about reducing cyber risk by ensuring appropriate security controls are properly applied.

This team can be contacted at Security.Operations@solvay.com

Helix Support Group for SOC team is IS Support GLOBAL > Security > Security Operations Center

Visit SOC Team wiki page to know more about it.

team management icon with gears 3184177 Vector Art at VecteezyImage Removed

Vulnerability assessment:

A vulnerability is a cybersecurity weakness that a bad actor could exploit to gain unauthorized access to enterprise network and compromise resources.

If an attacker successfully exploits a vulnerability, they can damage your organization in many ways. This team helps Solvay to identify, quantify and prioritize

remediation of vulnerabilities, as well as track remediation progress.

This team can be contacted at oti-security-vulnerabilities@solvay.com
Content Column
background-color#26294D
columnalternate
width30%
id1925176410
Content Block
background-colortransparent
id122533412

Image Removed   USEFUL LINKS

Content Block
background-color#26294D
id1925176413

____________________________________

Back to Home Page

____________________________________

  • SOC Team
  • Vulnerability assessment
  • Cyber Threat Hunting
  • Service Desk Cyber Incident Response Guide