How We Protect Information
PROTECT
- Establishing global security standards, policies, and requirements
-
Embedding “security by design” into projects and new initiatives
-
Serving as the central contact point for all security-related matters
-
Driving employee security training and awareness programs
-
Maintaining key security certifications such as ISO/IEC 27001
DETECT
-
Continuous monitoring of security events and potential threats
-
Performing vulnerability scans across systems and infrastructure
-
Conducting internal and external security audits
-
Evaluating overall security posture through structured assessments
-
Tracking security performance using defined KPIs
RESPOND
- Managing and coordinating cybersecurity incidents
-
Leading cyber triage, investigation, and forensic activities
-
Supporting business continuity and disaster recovery efforts
