LOG IN
Digital signageVideo (EasyMovie)
AUDIENCES
Shoppers
Employees
Flow
Market
resourcesCASTINGABOUTCONTACT
Centre d'aideSupportLegalCybersecuritySite map
LOG IN
Digital signageVideo (EasyMovie)
CONTACT
Latest articles
Structurer sa communication interne : les 9 étapes essentielles
Découvrez une méthode en 9 étapes pour structurer votre communication interne, renforcer l’engagement et impliquer durablement vos collaborateurs.
Read the article
Communication
Les avantages d’une régie publicitaire DOOH pour maximiser les performances des campagnes
Découvrez comment une régie publicitaire spécialisée DOOH optimise l'affichage dynamique pour maximiser la visibilité et renforcer le rayonnement d’une marque.
Read the article
Digital Signage
Monetize and monetize in-store screens
Digital signage screens are communication spaces with high monetization potential. Find out how to monetize your screens.
Read the article
Digital Signage
Point of sale
L’évolution des moyens de communication à l’ère du digital
L’évolution des moyens de communication s’accélère avec le digital. Découvrez les tendances clés et leurs impacts sur les entreprises.
Read the article
Digital Signage
Comment choisir le moyen de communication adapté à votre entreprise ?
Découvrez comment choisir le bon moyen de communication en entreprise : interne, externe, digital ou traditionnel, et optimisez votre stratégie.
Read the article
Internal communication
Montage vidéo : conseils et outils de création
Découvrez les meilleurs conseils et outils pour le montage vidéo afin de créer des contenus captivants et professionnels facilement.
Read the article
Video
Video tutorials
Comment faire un plan de communication ? 10 étapes
Voici les 10 étapes à suivre pour construire un plan de communication efficace et rapidement actionnable par votre entreprise.
Read the article
Communication
Zero-click content : qu'est ce que c'est, et pourquoi en créer ?
Découvrez comment créer du contenu "zero click" efficace pour attirer et engager votre audience sans qu'ils aient besoin de cliquer pour plus d'informations.
Read the article
Video
6 bonnes pratiques pour un onboarding à distance réussi
Apprenez les meilleures pratiques pour un onboarding à distance réussi. Découvrez des stratégies efficaces pour intégrer vos nouveaux collaborateurs virtuellement.
Read the article
Internal communication
Video on smartphones: a creative guide
5 steps to making videos with your smartphone - Step 1: Prepare the equipment you need for your videos
Read the article
Video
See all articles
CONTACT
MENU
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Cenareo is committed to protecting customer data and maintaining the confidentiality, integrity, and availability of its information systems.

This policy outlines our formal process for detecting, identifying, analyzing, responding to, and recovering from security incidents or crises.

Analysis and Investigation

Detection and Identification

Cenareo utilizes various security tools and monitoring systems to detect potential security incidents or crises. This includes log analysis, intrusion detection systems, and endpoint security solutions. Upon detection of a potential incident or crisis, Cenareo will initiate an investigation to determine its nature, scope, and impact.

Investigation Team

A dedicated incident response team consisting of IT security personnel, relevant business unit representatives, and legal counsel will be assembled to investigate the incident or crisis.

Evidence Collection

The team will collect and preserve all relevant evidence, including system logs, network traffic data, and affected files. This will facilitate forensic analysis and root cause determination.

Communication:

Throughout the investigation, Cenareo will maintain open communication with the customer, keeping them informed of the incident status and potential impact on their data.

Notification Process

Cenareo is committed to notifying customer promptly upon identifying a security incident that may impact their data or systems. The notification timeframe will be determined by the severity of the incident.

The notification will include details such as the nature of the incident, the potential impact on customer data, and the actions being taken to mitigate the incident and recover from it.

Containment

The primary objective is to contain the incident and prevent further damage or data loss. This may involve isolating compromised systems, suspending user accounts, or shutting down affected services.

Eradication

Cenareo will take steps to eradicate the root cause of the incident and prevent its recurrence. This may involve patching vulnerabilities, removing malware, or implementing additional security controls.

Recovery

Cenareo will restore affected systems and data to a functional state using backups and disaster recovery procedures. Data recovery capabilities for customer's data will be prioritized.

Lessons Learned

Following the incident, Cenareo will conduct a thorough review to identify lessons learned and improve our security posture. This includes updating our incident response plan and implementing additional security controls to prevent similar incidents in the future.

Security Capabilities

Digital Forensics

Cenareo can conduct digital forensics investigations to analyze evidence and determine the scope and nature of a security incident.

Log Management

Cenareo captures and stores audit logs from relevant systems for analysis during investigations and post-incident review. customer's data within these logs will be anonymized where possible and protected with appropriate access controls.

Log Security

Cenareo has controls in place to protect logs from unauthorized access or corruption. These controls may include encryption, access restrictions, and tamper detection mechanisms.

Security Operations Center (SOC)

Cenareo maintain a Security Operations Center (SOC) or equivalent function that continuously monitors our information systems for suspicious activity. The SOC team is responsible for detecting, investigating, and responding to security incidents.

Disaster Recovery Scenarios:

Cenareo has documented disaster recovery scenarios for critical systems, including Active Directory and Privileged Access Management (PAM) solutions. These scenarios outline the steps necessary to restore functionality and minimize downtime in case of a failure or compromise.

Cenareo can recover customer's data in case of a failure or data loss through backups and disaster recovery procedures. The recovery time objective (RTO) and recovery point objective (RPO) for customer's data will be clearly defined and documented.

Incident History

Cenareo maintains a record of all security incidents, including successful attacks and those that Cenareore mitigated before causing disruption. This information is used to improve our security posture and ensure Cenareo is prepared to handle future incidents effectively.

Communication with customer

Cenareo will maintain open communication with customers throughout the incident response process. This includes providing timely updates on the investigation, containment efforts, and recovery progress.

Compliance

This incident management policy is aligned with relevant security frameworks and industry best practices. Cenareo will regularly review and update this policy to reflect changes in the threat landscape and regulatory requirements.

Need to reach us?

Contact our teams if you have any questions on this subject.

Contact us
Cenareo

Incident & Crisis Management Policy

Text Link
Engage your audiences,
become media.
Audiences
ShoppersEmployeesFlowMarket
SOLUTIONS
Solution Affichage dynamiqueSolution Vidéo
Company
CastingAboutContact us
Resources
BlogInsightsCase studiesVideos
CENAREO 2024, All rights reserved.
Centre d'aideSupportLégalRGPDCybersécuritéPlan du site
Cenareo - digital signage, solution video