Intelligent CIO Middle East Issue 40 | Page 56

CASE STUDY A Azizi Developments is a design and customer lead development company. This means a permanent dedication to understanding and meeting clients’ aspirations, developing distinctive homes that set the standard in contemporary building design and offering an unparalleled level of customer service. A simple search for social media risk monitoring led him to the discovery of ZeroFOX – a company that also is a leader in Gartner reports. zizi Developments is the real estate investment arm of Azizi Group. Established in 2007 with headquarters in Dubai, the company’s diverse experience in the property market has led the value of its current portfolio in the Emirate to over AED45 billion, with more than 200 projects in the pipeline. a, CE O a nd P TR A resident, SPEC MI way to put an end to the mushrooming of fake online profiles and properties. Challenges There were too many fake social media accounts, resulting in a loss in the conversion of social media leads into business. Another challenge was the management of content flow and there was lockdown on employee- led social outreach. Taking control of the process Head of Cybersecurity at Azizi Developments, Ankit Satsangi, took matters into his own hands and decided to find a 56 INTELLIGENTCIO Outlining the biggest cybersecurity challenges faced by the business, he said: “Because we are in real estate, we see and we expect a lot of phishing attacks targeting CFOs and other c-level executives. “We also expect a lot of fraudulent transactions as well. Apart from that, social media threats have really been trending, such as c-level profile impersonations on social media, brand reputation damage and brand defamation. We also have domain impersonations as well.” SPECTRAMI implemented the system based on the proactive threat intelligence provided by Satsangi, which offered ZeroFOX for comprehensive visibility on what Azizi aims to achieve beyond the typical attack life- cycle, adding context and priority to global threats before, during and after an attack. With this insight, it took less than a day to set permissions, align keywords, tags and other relevant information; Zerofox did a clean sweep of all the different properties that went against the corporate policy that Satsangi and his team had set in place. Taking control and shutting down all the delinquent accounts on Twitter, Facebook and Instagram was the first step. Under Satsangi’s watchful guidance, ZeroFOX efficiently and accurately targeted all the social platforms and reported every errant account that had been created along with contact information of the person responsible for the account. The security team then efficiently dealt with the account by shutting them down with prejudice and contacted the owners www.intelligentcio.com