Cyber guides, practical information sheets, and infographics
Excel vs. Tenacity: the definitive comparison guide to download
Do you manage your cybersecurity compliance in Excel?
You're not alone... but you're losing efficiency, reliability, and visibility.
Download our Battle Card "Excel vs. Tenacy" to understand the limitations of Excel and discover how Tenacy can help you regain control of your compliance.
.jpg)
.jpg)
Do you manage your cybersecurity compliance in Excel?
You're not alone... but you're losing efficiency, reliability, and visibility.
Download our Battle Card "Excel vs. Tenacy" to understand the limitations of Excel and discover how Tenacy can help you regain control of your compliance.
.jpg)
NIS Directive 2: comprehensive infographic, timeline, and obligations
.jpg)
Cyber specifications: free template for CISOs
.jpg)
The cost of cybersecurity: infographics to convince the executive committee
.jpg)
Understanding ISO 27001: educational infographic
.jpg)
Regulatory and standards monitoring is somewhat the poor relation of the CISO's duties. It's tedious, time-consuming, and it's hard to know where to start...
.jpg)
Practical guide: how to successfully complete your DICP analysis
.jpg)
What is the role of the cyber compliance pre-audit: objectives, challenges, and legal-technical aspects explained in a practical guide.

Is the role of CISO the same everywhere? Is there a common "CISO experience" that unites all CISOs, regardless of their sector, country, or company size?

January 17, 2025 marks the entry into force of the DORA (Digital Operational Resilience Act) regulation. With discussions surrounding NIS 2 and the AI Act taking place in parallel, cyber teams have faced a challenging start to the year in terms of regulatory issues.