Ebooks, case studies, and practical guides for CISOs
Tessi x Tenacy case study: centralizing multi-entity cyber governance
In this customer case study, discover how Tessi industrialized its cyber governance and transformed its management thanks to Tenacy.
%20(7).jpg)
%20(7).jpg)
In this customer case study, discover how Tessi industrialized its cyber governance and transformed its management thanks to Tenacy.
%20(6).jpg)
How does Asendia manage cybersecurity for 15 international subsidiaries without increasing resources?

The complete guide to structuring your large-scale cyber GRC platform.
.jpg)
Do you manage your cybersecurity compliance in Excel?
You're not alone... but you're losing efficiency, reliability, and visibility.
Download our Battle Card "Excel vs. Tenacy" to understand the limitations of Excel and discover how Tenacy can help you regain control of your compliance.
.jpg)
NIS Directive 2: comprehensive infographic, timeline, and obligations
.jpg)
Cyber specifications: free template for CISOs
.jpg)
The cost of cybersecurity: infographics to convince the executive committee
.jpg)
Understanding ISO 27001: educational infographic
.jpg)
Regulatory and standards monitoring is somewhat the poor relation of the CISO's duties. It's tedious, time-consuming, and it's hard to know where to start...
.jpg)
Practical guide: how to successfully complete your DICP analysis
.jpg)
What is the role of the cyber compliance pre-audit: objectives, challenges, and legal-technical aspects explained in a practical guide.

Is the role of CISO the same everywhere? Is there a common "CISO experience" that unites all CISOs, regardless of their sector, country, or company size?

January 17, 2025 marks the entry into force of the DORA (Digital Operational Resilience Act) regulation. With discussions surrounding NIS 2 and the AI Act taking place in parallel, cyber teams have faced a challenging start to the year in terms of regulatory issues.