{"id":13585,"date":"2019-04-25T11:16:16","date_gmt":"2019-04-25T11:16:16","guid":{"rendered":"https:\/\/www.dfi.ch\/dfi-obtains-the-use-of-the-cert-label-for-its-cybersecurity-expertise\/"},"modified":"2022-09-01T12:03:31","modified_gmt":"2022-09-01T12:03:31","slug":"dfi-obtains-the-use-of-the-cert-label-for-its-cybersecurity-expertise","status":"publish","type":"post","link":"https:\/\/www.cheops-technology.ch\/en\/dfi-obtains-the-use-of-the-cert-label-for-its-cybersecurity-expertise\/","title":{"rendered":"DFi obtains the use of the CERT label for its cybersecurity expertise"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13585\" class=\"elementor elementor-13585 elementor-7033\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-46edd33 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"46edd33\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-604cd5cd ot-flex-column-vertical\" data-id=\"604cd5cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16510b93 elementor-widget elementor-widget-text-editor\" data-id=\"16510b93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><br><\/p>\n<h4>Obtaining the CERT reference label is a new stage in the development of DFi&#8217;s expertise in cybersecurity.<\/h4>\n<p><br><\/p>\n<p>CERT is a registered trademark belonging to Carnegie Mellon University which refers to players offering value-added services in the field of incident response and cybersecurity, and who support their customers in their process of improving the security of their information systems.<\/p>\n<p><strong>A label that enjoys international recognition and guarantees a level of expertise in cybersecurity-related activities.<\/strong><\/p>\n<p>An international reference in the field, obtaining this label meets strict requirements. It has currently been awarded to just over 300 organisations around the world, which constitute an information exchange network.<\/p>\n<p>The CERT label is thus a guarantee of DFi&#8217;s expertise in the following fields<\/p>\n<ul>\n<li>Incident response<\/li>\n<li>Intrusion detection<\/li>\n<li>Cybersecurity consulting<\/li>\n<li>Awareness and training<\/li>\n<li>Management of vulnerabilities<\/li>\n<li>Development of specific tools<\/li>\n<li>Technology watch<\/li>\n<li>Security audits<\/li>\n<li>Configuration and maintenance of security-related tools, applications and infrastructure<\/li>\n<li>Business continuity plans (BCP) and disaster recovery plans (DRP)<\/li>\n<\/ul>\n<p><strong>Mission of the CERT-DFi cell (also called CSIRT or Computer Security Incident Response Team):<\/strong><strong>&nbsp;:<\/strong><\/p>\n<p>At the operational level, the priority tasks of the CERT-DFi are the following:<\/p>\n<ul>\n<li>Detecting incidents in information systems and centralising incident-related requests for assistance<\/li>\n<li>Ensure the processing of alerts and the response to incidents (identification, containment, eradication, resolution)<\/li>\n<li>Disseminate prevention information to minimise the risk of incidents and their consequences<\/li>\n<li>Participate in coordination with other stakeholders at national and international level, sharing information on the latest threats (Threat Intelligence)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Obtaining the CERT reference label is a new stage in the development of DFi&#8217;s expertise in cybersecurity.<\/p>\n","protected":false},"author":1,"featured_media":7624,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[95,87,90],"tags":[],"class_list":["post-13585","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybers-news","category-news-en","category-security-en"],"_links":{"self":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts\/13585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/comments?post=13585"}],"version-history":[{"count":1,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts\/13585\/revisions"}],"predecessor-version":[{"id":13586,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts\/13585\/revisions\/13586"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/media\/7624"}],"wp:attachment":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/media?parent=13585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/categories?post=13585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/tags?post=13585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}