Home
>
Guides and infographics
Downloadable content

Ebooks, case studies, and practical guides for CISOs

Headlines
Compliance

Achieving Two ISO 27001 Certifications in 11 Months: Onet’s Success Story

85,000 employees, two business units to be certified simultaneously—one of which required building an ISMS from scratch—and a timeline deemed impossible even by the auditor. Find out how Onet rose to this challenge: the obstacles encountered, the key decisions made, and what truly made the difference on audit day.

Learn more
Achieving Two ISO 27001 Certifications in 11 Months: Onet’s Success Story
All categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Air Caraïbes Case Study: Cyber Security Management
Governance
April 10, 2026
Air Caraïbes x Tenacy Case Study: Streamlining and Automating Cybersecurity Management with Connectors

Faced with a growing number of standards and increasingly stringent regulatory requirements, IT security teams must do more… with less.
Discover how Air Caraïbes successfully automated its data collection, centralized its management, and drastically reduced the time spent on compliance using Tenacy.

Henner Group x Tenacy Case Study: ISO 27001 Compliance
Compliance
April 9, 2026
Henner Group x Tenacy Case Study: Expanding ISO 27001 Certification

In a highly regulated industry like insurance, maintaining ISO 27001 certification while expanding it to new areas is a real challenge for IT security teams.
Find out how the Henner Group streamlined its compliance management, centralized its data, and saved significant time thanks to Tenacy.

Onet x Tenacy Case Study: Turning Cybersecurity into a Business Driver
Governance
April 9, 2026
Onet x Tenacy Case Study: Turning Cybersecurity into a Business Driver for the Company

With customer expectations skyrocketing and regulatory standards multiplying, cybersecurity can no longer be viewed as merely a technical issue.
Discover how Onet, a multi-service group with over 85,000 employees, has structured its ISMS, centralized its cybersecurity governance, and turned compliance into a genuine competitive advantage thanks to Tenacy.

ISO 27001 Case Study: Onet
Compliance
April 10, 2026
Achieving Two ISO 27001 Certifications in 11 Months: Onet’s Success Story

85,000 employees, two business units to be certified simultaneously—one of which required building an ISMS from scratch—and a timeline deemed impossible even by the auditor. Find out how Onet rose to this challenge: the obstacles encountered, the key decisions made, and what truly made the difference on audit day.

Tessi x Tenacy case study: centralizing multi-entity cyber governance
Governance
April 8, 2026
Tessi x Tenacy case study: centralizing multi-entity cyber governance

Discover how Tessi, a European leader in Business Process Services, transformed fragmented and time-consuming cybersecurity management into a centralized, automated, and auditable system—across 15 countries and 13,900 employees.

Tenacy case study: automating cyber GRC compliance
Compliance
April 3, 2026
Asendia x Tenacy case study: automating compliance and risk management

Find out how Asendia, a global leader in e-commerce and international mail with a presence on four continents, has streamlined its cybersecurity governance by replacing fragmented tools with a unified platform—without increasing its headcount.

Cyber GRC Platform: The Complete Guide for CISOs | Tenacy
Governance
April 1, 2026
GRC Cyber: transform your management into a performance lever.

With mounting regulations, siloed data, and time-consuming reporting, cybersecurity teams at multi-entity organizations are wasting valuable time on consolidation rather than protection. This guide provides you with three concrete pillars for streamlining your GRC management and transforming your cybersecurity into a driver of performance.

Excel or Tenacity: the definitive comparison guide to download
Governance
April 3, 2026
Excel vs. Tenacity: the definitive comparison guide to download

Excel is a general-purpose tool—not acybersecurity platform. This side-by-side comparison clearly shows you what you’re missing out on by sticking with manual files, and what you gain by switching to a dedicated cyber GRC solution.

NIS2 computer graphics
Compliance
April 1, 2026
The NIS 2 Directive: Everything You Need to Know in One Infographic

NIS 2 significantly expands the scope of affected organizations—by a factor of 10 compared to NIS 1. This infographic summarizes the key points: objectives, eligibility criteria, regulatory timeline, and a concrete action plan to help you prepare for your compliance obligations.

specifications for rssi grc solution
Governance
April 3, 2026
Requirements: Choosing a Cybersecurity Management Solution

Are you looking to structure your cybersecurity management project and compare the solutions available on the market? This turnkey specification guide walks you through the process step by step to help you define your functional, technical, and organizational requirements before choosing your GRC tool.

Cost of cybersecurity infographic
Governance
April 3, 2026
How much does cybersecurity cost? An infographic with the numbers

Cybersecurity budget, cost of attacks, NIS 2 penalties… All the key data you need to understand and justify your company’s cybersecurity investment, at a glance.

iso27001 infographic
Compliance
April 1, 2026
ISO 27001 at a Glance: Everything You Need to Know About the Standard

ISO 27001 is the leading standard for information security, but its requirements are often unclear. This infographic summarizes the key points: its history, the structure of the 252 controls, what’s new in the 2022 revision, the benefits of certification, and concrete steps to achieve compliance.

Fact Sheet: Regulatory Monitoring
Compliance
April 1, 2026
Cybersecurity Regulatory and Standards Monitoring: A Guide for the CISO

Changing regulations, new standards, industry-specific requirements: for a CISO, regulatory monitoring isn’t an option—it’s an ongoing, strategic activity. This practical guide provides a concrete four-step framework to help you structure your monitoring efforts, define your scope, and turnregulatory information into corrective actions.

pass the DICP exam
Governance
April 1, 2026
The DICP Analysis: A Guide

Learn how to effectively assess the security needs of your information system using the DICP matrix: a simple, structured method tailored to your budget.

We have designed a comprehensive and practical guide, designed to help you master DICP analysis, from understanding it to applying it in your processes.

Pre-compliance audit
Compliance
April 3, 2026
Cybersecurity Compliance Audit: Where Law Meets Cybersecurity

New regulations, mergers and acquisitions, supplier management… Cybersecurity compliance can’t be winged. Discover how a compliance audit that combines legal and technical expertise can help your organization effectively structure and manage its compliance efforts.

RSSI study
Life as a CISO
April 3, 2026
Being a CISO in Europe in 2024: Perspectives on the Role of a Cybersecurity Manager

What is a typical day like for a CISO in France, Spain, Germany, or Ireland? This qualitative study, conducted among 33 European cybersecurity leaders, provides a comprehensive overview of the role: responsibilities, challenges, compliance, stress, and future prospects.

DORA computer graphics
Compliance
April 1, 2026
DORA Regulations: An Overview in an Infographic

Set to take effect in January 2025, the DORA regulation imposes a strict framework for digital operational resilience on financial institutions. This infographic summarizes everything you need to know: objectives, scope, the regulation’s five pillars, timeline, and priority actions to implement.