Building information resilience across three horizons
Prevent: cultivate vigilance before attacks emerge
Information warfare begins long before the attack lands. We train teams to recognise manipulation techniques, identify vulnerable narratives and understand how adversaries exploit organisational weaknesses. Our programmes span board-level awareness to operational scenario training, embedding a culture of information hygiene throughout organisations.
Build: deploy sovereign technology platforms
Information defence requires integrated capabilities that collect, analyse and respond at scale. We architect platforms that aggregate data from social media, news sources, dark web forums and messaging channels, then apply AI-powered analysis to detect coordinated inauthentic behaviour, identify manipulated content and trace narrative propagation patterns.
Our SENSEE platform provides modular capabilities tailored to organisational requirements: threat monitoring dashboards, automated alert systems, attribution analysis tools and response orchestration frameworks.
Our think tank, The Cercle Pégase, coordinates technology qualification: we test emerging tools, validate technical performance, ensure interoperability and maintain a marketplace of verified solutions. Organisations select capabilities matching their specific needs rather than accepting monolithic systems designed for different threat environments.
Master: detect threats and coordinate responses
Real-time monitoring identifies emerging attacks before they gain momentum. We operate information observatories that track narrative evolution, detect anomalous amplification patterns and alert organisations to coordinated campaigns targeting their reputations, operations or stakeholder communities.
When attacks emerge, speed determines impact. We support rapid response: fact verification, counter-narrative development, stakeholder communication and platform engagement. Our teams combine analytical expertise with operational experience, understanding both the technical signatures of information operations and the strategic communications required to neutralise them.