August 2016 v5
By: E. Attia
Corporate Presentation
www.AlpesStrategie.com
©2016 Alpes Stratégie - Business Intelligence and Security Services - All rights reserved
Innovative Business Intelligence and Security
“We must implement. To satisfy it is not enough" - Leonardo da Vinci
ABOUT US
- Swiss Management
A Swiss company which provides quality Business Intelligence and
Security Expertise which leads to creative and compliant solutions
- Former Agent of the Israeli Security Agency
Expertise in Intelligence and Security Personnel
- Intelligence, Experience & Knowledge
Using innovative tools to handle Massive Data and
Risks Analysis to advise on important strategic decisions
COMPANY
- Threats
We defuse Security and Intelligence unsuspicious threats
- Strategy
We help formulate long-term Strategic Planning, identifying Business
Opportunities, by introducing new Products and defining Solutions
- Customer Compliance
We provide profound Competitor Study and Risks Assessments with
new important Business Partners or Investments
WHY ALPES STRATEGIE ?
“Worldwide Business Intelligence and Analytics Market to Reach $16.9 Billion in 2016” - Gartner
- Operations
We are present in CH and in the EU, providing services to Banks,
Governments, Family Office and Corporations
- Technology
We provide innovative solutions to the most complex and diverse
problems our clients face in Security & Business threats
- Methodology
We apply our unique methodology to address a multi layered threat
landscape and offer our strengths to deal with Cyber & physical
threats
- Multinational vast Experience
STRENGTHS
“Information is the oil of the 21st century, and analytics is the combustion engine.” - Peter Sondergaard
Quality Intelligence reached by years of experience in
Elite Intelligence Units and creative thinking
- Tailor made Solution
- Innovative
- Loyalty
- Confidentiality
- Creativity in various domains
EXPERTISE
“Without big data, you are blind and deaf in the middle of a freeway” - Geoffrey Moore
We accumulated years of specific Expertise
- Data Mining using innovative tools - Physical Risk Assessments
- Reliability tests - Data Protection
THREAT
Insider
Cyber
Physical
Threat
ThreatThreat
“Either I will find a way, or I will make one.” - Philip Sidney
Reliability SecurityData Mining
Data Mining
Assessment
Employee current
delinquency
Employee risk assessment
Profiling
Security
Assessment
Recommendations Recommendations Recommendations
Reliability
Assessment
As part of our risk assessment, our services are divided into 3 main categories:
Contractors
delinquency
SERVICES
Profiling Competitors/
Customer / Employees
Markets Research
Compliance / Due Diligence
Physical Risks
Terror Prevention
Infrastructure
Security
Data Leak Prevention
Reliability SecurityData Mining
Consultancy - Workshop - Advisory - Training
Online Tests
Polygraph
(law permitting)
Risk Assessment
Technology Procedures
Professional courses
Team management, Training,
Control Supervision & more...
Implementation
Interviews
Online Research
Profiling
Unique Methods
DHR Training
Our experience in the Business world and Intelligence led us to develop unique Tools
which brought new and creative solutions:
TOOLS
Assess Organization Security
Red Team
Our expertise in understanding our client’s industry issues and by using internal Data,
helps solve problems which internal human resources aren’t equipped to face on their own:
CASE
STUDY
Case Study 1
Testing of Security Systems in Financial Institution
Method - After learning about the company and its facilities it
was decided to put in place testing.
Through prevention approach - Examining Security System
(Red team)
Findings - the team was able to enter sensitive areas of the
company, performed "Risk Survey" and formulate a solution.
Solution
The combination of measures in the field of technological
security, quality recruitment of manpower, Including
implementation of polygraph tests in sensitive positions.
Integration among employees - a combination of training and
lectures for employees including the construction of an online
learning program. Distributed among all company principals.
Case Study 2
International Online Payment System Company
Providing services to consumers, and corporations in many
countries and several continents. The company deployed a
processing network which is capable of handling thousands of
transactions a second. This complex network features fraud
protection for consumers and guarantee secured payment for
businesses.
Challenge
An internal software upgrade required to take place on a short
notice, was found to be less reliable and with less protection
than the existing system, therefore prone to fraud or security
breach.
Solution
The company’s software upgrade was due and a failure to
upgrade to the new, compatible version of its system was not an
option.
Our systems architecture experts with detailed examination of
the company’s authentication procedures, reversed-engineer a
solution that would enable the authentication system to run
successfully with the new software upgrade.
Case Study 3
“Les murs ont des oreilles.”
A cyber development company participated in a major
exhibition in a European country.
At the end of the exhibition day the company representatives
went to a pub, and spoke loudly about their products
comparing competitors' products, prices, technology, and
related data plans for future development.
- A worker or group of workers which does not maintains
proper conduct, constitutes a high level importance security
hazard.
Solution
Exhibition is also the most important source of information
there adapt to it.
Handling the issue: employees must be briefed and apply
proper etiquette, safe and secure instructions..
Case Study 4
Tenders
A technology product company decided to compete for a
tender in a large European country.
Planning to deal with tender applications made according to
business service intelligence practices.
Data mining process - carried out in preparation for main
profile figures and gathered information for tender, customer,
competitors, and products.
Findings - An information analysis turned out that, one of the
competitors has a relative working in the company from the
tender published, and the two are in very close relationship.
Solution
It was recommended not to grant the tender since chances of
success are very low.
(Actually it turned out that the competitor is the winner of
the tender)
CASE
STUDY
Our expertise in understanding our client’s industry issues and by using internal Data,
helps solve problems which internal human resources aren’t equipped to face on their own:
Our methodology complies with your
Country’s Rule and Regulation Laws
Regulations
Requirements
Standards
LAWS
Transparency
Guidelines
Rules
COMPLIANCE
“We cannot solve our problems with the same thinking we used when we created them.” A. Einstein
CODE of ETHICS
The values​ and standards which Alpes Strategie has set itself, constitute its fundamentals which will always be part of the
company and lead to growth. These values define the behavior of the company and its employees among themselves and
with customers, suppliers and competitors.
• Creativity adds value:
- We have ingenuity
- we have a strong desire to raise the bar and provide
real value in a different way
- We are not afraid to experiment, challenge
assumptions durability and take calculated risks
• Privacy and Protection of Personal Information:
- We are committed to maintaining the customer's
assets, with special emphasis on confidentiality of its
business with all parties with whom we work
- We maintain the confidentiality of the information of
third parties as such as our information
- We comply with privacy laws in all the countries
which we operate
• Professionalism:
- Meeting Deadlines
- Extensive knowledge and high Professional standards
- Thoroughness
- Taking responsibility while addressing future implications
- High level of Service
• Excellence:
- Devotion and Perseverance
- Striving for continuous improvement in all areas
- Maintaining the level and quality of services and products
- Reaching set goals
- Ensuring lessons learned while performing investigations and
implementation
• Honesty and Integrity:
- We are committed to the law and its regulations in all
countries in which we operate
- We shall not collect information on our competitors in ways of
cheating, theft, false image, Illegal or immoral.
- We comply with our obligations and act with honesty with our
customers in embracing the highest standards of moral and
ethical values through our personal and professional behavior.
- To ensure our integrity, we safeguard honesty, and fairness for
our client's reputation and avoid conflicts of interests.
www.AlpesStrategie.com
CONTACT
Q & A
Thank You.

Alpes strategie v5

  • 1.
    August 2016 v5 By:E. Attia Corporate Presentation www.AlpesStrategie.com ©2016 Alpes Stratégie - Business Intelligence and Security Services - All rights reserved Innovative Business Intelligence and Security
  • 2.
    “We must implement.To satisfy it is not enough" - Leonardo da Vinci ABOUT US - Swiss Management A Swiss company which provides quality Business Intelligence and Security Expertise which leads to creative and compliant solutions - Former Agent of the Israeli Security Agency Expertise in Intelligence and Security Personnel - Intelligence, Experience & Knowledge Using innovative tools to handle Massive Data and Risks Analysis to advise on important strategic decisions
  • 3.
    COMPANY - Threats We defuseSecurity and Intelligence unsuspicious threats - Strategy We help formulate long-term Strategic Planning, identifying Business Opportunities, by introducing new Products and defining Solutions - Customer Compliance We provide profound Competitor Study and Risks Assessments with new important Business Partners or Investments
  • 4.
    WHY ALPES STRATEGIE? “Worldwide Business Intelligence and Analytics Market to Reach $16.9 Billion in 2016” - Gartner - Operations We are present in CH and in the EU, providing services to Banks, Governments, Family Office and Corporations - Technology We provide innovative solutions to the most complex and diverse problems our clients face in Security & Business threats - Methodology We apply our unique methodology to address a multi layered threat landscape and offer our strengths to deal with Cyber & physical threats
  • 5.
    - Multinational vastExperience STRENGTHS “Information is the oil of the 21st century, and analytics is the combustion engine.” - Peter Sondergaard Quality Intelligence reached by years of experience in Elite Intelligence Units and creative thinking - Tailor made Solution - Innovative - Loyalty - Confidentiality - Creativity in various domains
  • 6.
    EXPERTISE “Without big data,you are blind and deaf in the middle of a freeway” - Geoffrey Moore We accumulated years of specific Expertise - Data Mining using innovative tools - Physical Risk Assessments - Reliability tests - Data Protection
  • 7.
    THREAT Insider Cyber Physical Threat ThreatThreat “Either I willfind a way, or I will make one.” - Philip Sidney
  • 8.
    Reliability SecurityData Mining DataMining Assessment Employee current delinquency Employee risk assessment Profiling Security Assessment Recommendations Recommendations Recommendations Reliability Assessment As part of our risk assessment, our services are divided into 3 main categories: Contractors delinquency SERVICES Profiling Competitors/ Customer / Employees Markets Research Compliance / Due Diligence Physical Risks Terror Prevention Infrastructure Security Data Leak Prevention
  • 9.
    Reliability SecurityData Mining Consultancy- Workshop - Advisory - Training Online Tests Polygraph (law permitting) Risk Assessment Technology Procedures Professional courses Team management, Training, Control Supervision & more... Implementation Interviews Online Research Profiling Unique Methods DHR Training Our experience in the Business world and Intelligence led us to develop unique Tools which brought new and creative solutions: TOOLS Assess Organization Security Red Team
  • 10.
    Our expertise inunderstanding our client’s industry issues and by using internal Data, helps solve problems which internal human resources aren’t equipped to face on their own: CASE STUDY Case Study 1 Testing of Security Systems in Financial Institution Method - After learning about the company and its facilities it was decided to put in place testing. Through prevention approach - Examining Security System (Red team) Findings - the team was able to enter sensitive areas of the company, performed "Risk Survey" and formulate a solution. Solution The combination of measures in the field of technological security, quality recruitment of manpower, Including implementation of polygraph tests in sensitive positions. Integration among employees - a combination of training and lectures for employees including the construction of an online learning program. Distributed among all company principals. Case Study 2 International Online Payment System Company Providing services to consumers, and corporations in many countries and several continents. The company deployed a processing network which is capable of handling thousands of transactions a second. This complex network features fraud protection for consumers and guarantee secured payment for businesses. Challenge An internal software upgrade required to take place on a short notice, was found to be less reliable and with less protection than the existing system, therefore prone to fraud or security breach. Solution The company’s software upgrade was due and a failure to upgrade to the new, compatible version of its system was not an option. Our systems architecture experts with detailed examination of the company’s authentication procedures, reversed-engineer a solution that would enable the authentication system to run successfully with the new software upgrade.
  • 11.
    Case Study 3 “Lesmurs ont des oreilles.” A cyber development company participated in a major exhibition in a European country. At the end of the exhibition day the company representatives went to a pub, and spoke loudly about their products comparing competitors' products, prices, technology, and related data plans for future development. - A worker or group of workers which does not maintains proper conduct, constitutes a high level importance security hazard. Solution Exhibition is also the most important source of information there adapt to it. Handling the issue: employees must be briefed and apply proper etiquette, safe and secure instructions.. Case Study 4 Tenders A technology product company decided to compete for a tender in a large European country. Planning to deal with tender applications made according to business service intelligence practices. Data mining process - carried out in preparation for main profile figures and gathered information for tender, customer, competitors, and products. Findings - An information analysis turned out that, one of the competitors has a relative working in the company from the tender published, and the two are in very close relationship. Solution It was recommended not to grant the tender since chances of success are very low. (Actually it turned out that the competitor is the winner of the tender) CASE STUDY Our expertise in understanding our client’s industry issues and by using internal Data, helps solve problems which internal human resources aren’t equipped to face on their own:
  • 12.
    Our methodology complieswith your Country’s Rule and Regulation Laws Regulations Requirements Standards LAWS Transparency Guidelines Rules COMPLIANCE “We cannot solve our problems with the same thinking we used when we created them.” A. Einstein
  • 13.
    CODE of ETHICS Thevalues​ and standards which Alpes Strategie has set itself, constitute its fundamentals which will always be part of the company and lead to growth. These values define the behavior of the company and its employees among themselves and with customers, suppliers and competitors. • Creativity adds value: - We have ingenuity - we have a strong desire to raise the bar and provide real value in a different way - We are not afraid to experiment, challenge assumptions durability and take calculated risks • Privacy and Protection of Personal Information: - We are committed to maintaining the customer's assets, with special emphasis on confidentiality of its business with all parties with whom we work - We maintain the confidentiality of the information of third parties as such as our information - We comply with privacy laws in all the countries which we operate • Professionalism: - Meeting Deadlines - Extensive knowledge and high Professional standards - Thoroughness - Taking responsibility while addressing future implications - High level of Service • Excellence: - Devotion and Perseverance - Striving for continuous improvement in all areas - Maintaining the level and quality of services and products - Reaching set goals - Ensuring lessons learned while performing investigations and implementation • Honesty and Integrity: - We are committed to the law and its regulations in all countries in which we operate - We shall not collect information on our competitors in ways of cheating, theft, false image, Illegal or immoral. - We comply with our obligations and act with honesty with our customers in embracing the highest standards of moral and ethical values through our personal and professional behavior. - To ensure our integrity, we safeguard honesty, and fairness for our client's reputation and avoid conflicts of interests.
  • 14.