DTC uses the BOT (Build, Operate and Transfer) model to accelerate and maximize impact

  • Define cybersecurity governance model
  • Select / adapt cybersecurity framework. Example: NIST, ISO, etc.
  • Prioritize assets in terms of cybersecurity and protection costs
  • Identification of the appropriate balance between protection and business development
  • Define implementation plan and multiannual budget
  • Define corporate training plan (all employees)
  • Define training model (e-learning, face-to-face, simplified certifications, crisis management, etc.)
  • Define roles and profiles for positions within the Cybersecurity Unit
  • Define cybersecurity technical training plan for specific roles
  • Support the selection and recruitment of talents
  • Cybersecurity Operations Management
  • Risk Management and Threat Intelligence
  • Identity and Access Control
  • Cybersecurity Plan Management
  • Cybersecurity Architecture Review
  • Confidential Data Loss Prevention
  • Incident Response and Forensic Investigation
  • Change Management and Talent Development
  • Define sourcing model for cybersecurity.
    For example: role of the intelligence units, role of technology providers (infrastructure, networks, etc.)
  • Define SLA, monitoring model and reports
  • Define tariff model applicable to each outsourced service
  • Facilitate bids, make technical evaluations
  • Manage daily the selected third parties SLA compliance
  • Define cybersecurity governance model
  • Select / adapt cybersecurity framework. Example: NIST, ISO, etc.
  • Prioritize assets in terms of cybersecurity and protection costs
  • Identification of the appropriate balance between protection and business development
  • Define implementation plan and multiannual budget
  • Cybersecurity Operations Management
  • Risk Management and Threat Intelligence
  • Identity and Access Control
  • Cybersecurity Plan Management
  • Cybersecurity Architecture Review
  • Confidential Data Loss Prevention
  • Incident Response and Forensic Investigation
  • Change Management and Talent Development
  • Define sourcing model for cybersecurity.
    For example: role of the intelligence units, role of technology providers (infrastructure, networks, etc.)
  • Define SLA, monitoring model and reports
  • Define tariff model applicable to each outsourced service
  • Facilitate bids, make technical evaluations
  • Manage daily the selected third parties SLA compliance
  • Define corporate training plan (all employees)
  • Define training model (e-learning, face-to-face, simplified certifications, crisis management, etc.)
  • Define roles and profiles for positions within the Cybersecurity Unit
  • Define cybersecurity technical training plan for specific roles
  • Support the selection and recruitment of talents

The BOT model allows our clients to work immediately on all the cybersecurity operational improvements and at the same time takes charge of the creation of internal skills and third-party management.