{"id":830780,"date":"2021-05-21T04:30:00","date_gmt":"2021-05-21T04:30:00","guid":{"rendered":"https:\/\/www.capgemini.com\/no-no\/?p=830780"},"modified":"2026-03-02T10:51:58","modified_gmt":"2026-03-02T10:51:58","slug":"with-cis-cybersecurity-moves-into-active-defense","status":"archive","type":"post","link":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/","title":{"rendered":"With CIS, cybersecurity moves into active defense"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>With CIS, cybersecurity moves into active defense<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2021\/08\/cg-logo.png?w=330?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Capgemini<\/h5><h5 class=\"blog-date\">21 May 2021<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?=http:\/\/capgeminiucwe.develop\/?post_type=press-release&amp;p=179\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h3 class=\"wp-block-heading\" id=\"h-inundated-with-information-the-soc-struggles-to-cope-with-the-multiplication-and-growing-danger-of-cyberthreats-nbsp-this-is-why-the-sic-proposes-to-change-the-paradigm-and-adopt-a-resolutely-proactive-posture-based-on-intelligence-and-the-preparation-of-remediation-and-reconstruction-plans-in-order-to-limit-the-consequences-of-attacks-that-are-now-inevitable-nbsp-the-digital-world-towards-which-the-health-crisis-has-pushed-companies-to-accelerate-their-transition-is-a-world-of-opportunities-but-also-of-threats\">Inundated with information, the SOC struggles to cope with the multiplication and growing danger of cyberthreats.&nbsp;This is why the SIC proposes to change the paradigm and adopt a resolutely proactive posture, based on intelligence and the preparation of remediation and reconstruction plans, in order to limit the consequences of attacks that are now inevitable.&nbsp;The digital world, towards which the health crisis has pushed companies to accelerate their transition, is a world of opportunities, but also of threats.<\/h3>\n\n\n\n<p>In 2020, the number of victims of cyberattacks who requested ANSSI\u2019s help has quadrupled, and many companies are now realizing that the question is no longer whether they will be attacked. , or even if criminals will manage to penetrate their systems, but how to minimize the consequences.<\/p>\n\n\n\n<p>It\u2019s all a matter of time.&nbsp;It\u2019s unthinkable that ransomware could cripple business for days, and when the offensive strikes, every second counts.&nbsp;The defense must therefore erect protections, but also establish remediation and rapid reconstruction plans.<\/p>\n\n\n\n<p>Shared with all the actors concerned, who will have to act in a coordinated manner in an emergency, these plans must be tested, rehearsed and constantly updated.&nbsp;To do this, it is essential to anticipate threats in order to be able to prepare for them.&nbsp;In other words, move from a logic of reaction to a logic of anticipation.&nbsp;This paradigm shift is the one that leads from SOC (Security Operation Center) to SIC (Security Information Center).<\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-left is-style-cg-core-indent is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWhen the offensive comes, every second counts.&nbsp;The defense must therefore erect protections, but also establish remediation and rapid reconstruction plans.&nbsp;\u201c<\/p>\n<\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>SOC, overtaken by complexity<\/strong><\/h4>\n\n\n\n<p>As typically designed and implemented, SOCs are increasingly less able to cope with the rapidly changing threat landscape. On the one hand, the information system is increasingly complex, heterogeneous and open, with the rise in particular of teleworking, the Internet of Things and hybrid and multi-cloud environments. On the other hand, the attacks are more and more numerous and, for some, particularly professional and sophisticated. All in all, the SOC is inundated with information. Add to this the cybersecurity skills shortage, it becomes nearly impossible to separate noise from real threats and then respond to each adequately. An end-to-end integrated device, from intelligence to remediation, the CIS proposes to exceed these limits by adopting a proactive posture that allows to stay ahead of threats rather than suffer the floods of surveillance data. For this, the CIS is based on four complementary pillars: Threat Intelligence, automation and orchestration, artificial intelligence, and organization.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Threat intelligence<\/strong><\/h4>\n\n\n\n<p>To protect yourself and prepare, you must first identify the threats and understand them.&nbsp;This is why Threat Intelligence is at the heart of CIS.&nbsp;Threat Intelligence is organized into four levels: strategic (high-level analysis of assets, perimeters and risks), tactical (study of attackers\u2019 modes of action), operational (development of mitigation plans) and technical (definition compromise indicators and system settings).&nbsp;The collection of information on which everything is based must be as broad and decompartmentalized as possible: internal to the company, on the web, deepweb and darkweb, from partners, peers and authorities as part of cooperation programs and \u2018exchange (ISAC\u2026), or even provoked by means of deceptive security.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Automation\/Orchestration<\/strong><\/h4>\n\n\n\n<p>To give teams the time to collect, analyze and use this information despite limited resources, automation is essential.&nbsp;In particular, it makes it possible to process noise and considerably reduce the number of false positives, which are very time-consuming.&nbsp;In addition, it makes it possible to reduce costs, and therefore to free up the means for processing.&nbsp;Finally, automation (of tasks) must be associated with orchestration (of action plans) .As a rule, analysts welcome these developments because automation relieves them of unrewarding tasks, and allows them to concentrate on the most interesting cases and to improve their skills.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Artificial intelligence\/Machine Learning<\/strong><\/h4>\n\n\n\n<p>Artificial intelligence appears to be an essential link in the functioning of the CIS, both for the early detection of attacks (behavioral analysis of the UEBA type) as well as for enrichment, contextualization, help with prioritization or even support ( coupled to SOAR) of a first level of response.&nbsp;Without it, and machine learning in particular, it seems difficult indeed, to identify the weak signals characteristic of threats in the middle of the noise and to immediately launch the appropriate actions taking into account the context.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Organization<\/strong><\/h4>\n\n\n\n<p>While the SOC is most often organized in a pyramid fashion, to escalate the most serious threats to increasing levels of expertise, the SIC is built on a concentric model, where CERT (Computer Emergency Response Team) specialists, in the center, disseminate the knowledge of Threat Intelligence to the analysts around them.&nbsp;One possibility is to combine this organization with a specialization by technological perimeters (IoT, cloud, etc.) in order to further strengthen skills, and therefore anticipation.<\/p>\n\n\n\n<p>Today, most large companies have a SOC, but very few have yet switched to a CIS, as this requires a certain level of maturity beforehand.&nbsp;To achieve this, and to be able to initiate the transition process, you must start by increasing your knowledge of the threats (who, why, how), of the potential targets (systems, critical assets) and of their security (Continuous Security Assessment). .&nbsp;Finally, the performance of the SOC must be measured through its detection capacity and its defensive coverage (by relying, for example, on the open benchmark Miter Att &amp; ck).<\/p>\n\n\n\n<p>While there is still a long way to go until CIS, more and more companies are realistically recognizing the relevance of this model of active defense, based on intelligence, anticipation and preparation.&nbsp;Quite simply because the facts \u2013 and the threats \u2013 give them no choice.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3 key points to remember:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Realism requires admitting that the company will not be able to ward off all cyber attacks, and that it must adopt a defense that allows it to minimize the damage.<\/li>\n\n\n\n<li>Based on Threat Intelligence, the CIS makes it possible to anticipate threats, and therefore to better guard against them and prepare for their consequences.<\/li>\n\n\n\n<li>Automation, artificial intelligence and a redesigned organization to promote the exchange of information are the keys to the system.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/AvisEx_F.deMaury-et-R.Nadolsky_V2-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download the expert opinion<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">About the Authors<\/h4>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/5-1.png\" alt=\"\" class=\"wp-image-830783\"\/><\/figure>\n\n\n\n<p><strong><a href=\"https:\/\/www.linkedin.com\/in\/nadolski\/\" target=\"_blank\" rel=\"noreferrer noopener\">Richard nadolski&nbsp;<\/a><\/strong><\/p>\n\n\n\n<p><strong>Business Development Director,&nbsp;<\/strong><br><strong>Sogeti<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/6.png\" alt=\"\" class=\"wp-image-830784\"\/><\/figure>\n\n\n\n<p><strong><a href=\"https:\/\/www.linkedin.com\/in\/frederic-de-maury-3ab1569\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fr\u00e9d\u00e9ric de Maury&nbsp;<\/a><\/strong><\/p>\n\n\n\n<p><strong>Pre-Sales Commercial, Global Cybersecurity Practice&nbsp;Capgemini<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":325,"featured_media":830785,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"f61bf939-b72c-42fa-a12f-21c9e1af7c39\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":false,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[74],"industry":[62],"partners":[],"blog-topic":[123],"content-group":[],"class_list":["post-830780","post","type-post","status-archive","format-standard","has-post-thumbnail","hentry","category-uncategorized","service-cybersecurity","industry-aerospace-defense","blog-topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>With CIS, cybersecurity moves into active defense - Capgemini Norway<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"With CIS, cybersecurity moves into active defense\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Norway\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-21T04:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-02T10:51:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/Cybersecurity-Blog-Banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Capgemini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jaydeepsinghrawat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/\",\"url\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/\",\"name\":\"With CIS, cybersecurity moves into active defense - Capgemini Norway\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/no-no\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/Cybersecurity-Blog-Banner.jpg\",\"datePublished\":\"2021-05-21T04:30:00+00:00\",\"dateModified\":\"2026-03-02T10:51:58+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/no-no\/#\/schema\/person\/dc3d1ac7ebaf8619f84a8d9686ea0ea7\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/Cybersecurity-Blog-Banner.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/Cybersecurity-Blog-Banner.jpg\",\"width\":1200,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/no-no\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"With CIS, cybersecurity moves into active defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/no-no\/#website\",\"url\":\"https:\/\/www.capgemini.com\/no-no\/\",\"name\":\"Capgemini Norway\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/no-no\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/no-no\/#\/schema\/person\/dc3d1ac7ebaf8619f84a8d9686ea0ea7\",\"name\":\"jaydeepsinghrawat\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/no-no\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d0d98140486adb91c92a68348ef2aedc3a74abee7aa51db555e8155fd4b4a8c6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d0d98140486adb91c92a68348ef2aedc3a74abee7aa51db555e8155fd4b4a8c6?s=96&d=mm&r=g\",\"caption\":\"jaydeepsinghrawat\"},\"url\":\"https:\/\/www.capgemini.com\/no-no\/author\/jaydeepsinghrawat\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"With CIS, cybersecurity moves into active defense - Capgemini Norway","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/","og_locale":"en_US","og_type":"article","og_title":"With CIS, cybersecurity moves into active defense","og_url":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/","og_site_name":"Capgemini Norway","article_published_time":"2021-05-21T04:30:00+00:00","article_modified_time":"2026-03-02T10:51:58+00:00","og_image":[{"width":1200,"height":350,"url":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/Cybersecurity-Blog-Banner.jpg","type":"image\/jpeg"}],"author":"Capgemini","twitter_card":"summary_large_image","twitter_misc":{"Written by":"jaydeepsinghrawat","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/","url":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/","name":"With CIS, cybersecurity moves into active defense - Capgemini Norway","isPartOf":{"@id":"https:\/\/www.capgemini.com\/no-no\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/Cybersecurity-Blog-Banner.jpg","datePublished":"2021-05-21T04:30:00+00:00","dateModified":"2026-03-02T10:51:58+00:00","author":{"@id":"https:\/\/www.capgemini.com\/no-no\/#\/schema\/person\/dc3d1ac7ebaf8619f84a8d9686ea0ea7"},"breadcrumb":{"@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/#primaryimage","url":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/Cybersecurity-Blog-Banner.jpg","contentUrl":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/Cybersecurity-Blog-Banner.jpg","width":1200,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/no-no\/"},{"@type":"ListItem","position":2,"name":"With CIS, cybersecurity moves into active defense"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/no-no\/#website","url":"https:\/\/www.capgemini.com\/no-no\/","name":"Capgemini Norway","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/no-no\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/no-no\/#\/schema\/person\/dc3d1ac7ebaf8619f84a8d9686ea0ea7","name":"jaydeepsinghrawat","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/no-no\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d0d98140486adb91c92a68348ef2aedc3a74abee7aa51db555e8155fd4b4a8c6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0d98140486adb91c92a68348ef2aedc3a74abee7aa51db555e8155fd4b4a8c6?s=96&d=mm&r=g","caption":"jaydeepsinghrawat"},"url":"https:\/\/www.capgemini.com\/no-no\/author\/jaydeepsinghrawat\/"}]}},"blog_topic_info":[{"id":123,"name":"Cybersecurity"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"service":[{"id":74,"name":"Cybersecurity","slug":"cybersecurity"}],"industry":[{"id":62,"name":"Aerospace &amp; defense","slug":"aerospace-defense"}],"blog-topic":[{"id":123,"name":"Cybersecurity","slug":"cybersecurity"}],"following_users":[{"id":422,"name":"automator","slug":"automator"},{"id":573,"name":"jaydeepsinghrawat","slug":"jaydeepsinghrawat"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/no-no\/insights\/expert-perspectives\/with-cis-cybersecurity-moves-into-active-defense\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":[],"rendered":"","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/Cybersecurity-Blog-Banner.jpg","archive_status":true,"featured_image_src":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/Cybersecurity-Blog-Banner.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Norway","distributor_original_site_url":"https:\/\/www.capgemini.com\/no-no","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/posts\/830780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/users\/325"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/comments?post=830780"}],"version-history":[{"count":3,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/posts\/830780\/revisions"}],"predecessor-version":[{"id":855500,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/posts\/830780\/revisions\/855500"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/media\/830785"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/media?parent=830780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/categories?post=830780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/tags?post=830780"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/brand?post=830780"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/service?post=830780"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/industry?post=830780"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/partners?post=830780"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/blog-topic?post=830780"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/no-no\/wp-json\/wp\/v2\/content-group?post=830780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]},"featured_image_url":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2022\/12\/Cybersecurity-Blog-Banner.jpg","author_title":"Capgemini","author_thumbnail_url":"https:\/\/www.capgemini.com\/no-no\/wp-content\/uploads\/sites\/23\/2021\/08\/cg-logo.png?w=330","author_thumbnail_alt":""}