Home
Platform
Tenacy For Business
Add-ons
policies
Integration
Customers
Companies
Health establishment
Local authorities
Resources
Articles
Practical guides and fact sheets
Case studies
Webinars
Glossary
Tenacy
About us
News
Career
Events
Request a demo
Login
EN
FR
ES
Home
>
Our resources
>
Compliance
Compliance
Share
image/svg+xml
All
Articles
Case studies
Compliance glossary
Practical guides and fact sheets
Webinars
Compliance
StreSSI: the mental health of cyber teams
Here's a recipe for you:
Compliance
NIS
The NIS 2 directive is the star of cyber discussions at the moment. But are you familiar with its predecessor? Because...
Compliance
CNIL
The CNIL (or Commission Nationale de l'Informatique et des Libertés) is a 100% administrative authority...
Compliance
HDS
In the cyber world, almost everyone has heard of the HDS standard, or Hosted Data Standard...
Compliance
TISAX®
The TISAX® standard, or Trusted Information Security Assessment Exchange, is not a security standard for...
Compliance
NIS 2: awareness-raising at the heart of the issues
20,000: the number of companies affected by the NIS 2 directive. October 2024: this is the date...
Compliance
LPM
The French Military Planning Law (or LPM) is becoming increasingly well known in the world of cybersecurity - but...
Compliance
ISO 27035
ISO 27035 is also known as ISO/IEC 27035. Why do you ask? Quite simply because it...
Compliance
ISO 27002
Cybersecurity experts are familiar with the ISO 27002 standard. Some use it as a basis for guaranteeing proper...
Compliance
ISO 27001
Published in 2005, the international standard ISO 27001 sets out the reference framework for establishing the...
Compliance
DORA
In France, as elsewhere, the accelerated digitalization of financial services has amplified the risks...
Compliance
[Practical info] A guide to cybersecurity regulatory monitoring
Regulatory and standards monitoring is the poor relation of CISO missions. It's tedious, it...
Compliance
What tools do you need for your IT security plan?
Your management has just approved your information system security policy (ISSP). And now...
Compliance
Drawing up a P.S.S.I in four stages
The information system security policy (I.S.S.P.) is more than just a reference document:...
Compliance
ISSP the guide
The information system security policy (or ISSP) enables an organization to define its vision of the...
Compliance
The (true) cost of cyber
Cyber is expensive. True or false? You've probably already heard "we've run out of budget", "we can't afford...
Compliance
[Infographic] The NIS 2 directive at a glance
NIS 2 here, NIS 2 there... there's been (a lot of) talk about this directive since it was published in December...
Compliance
Cyber management: risk-based or compliance-based?
"Risk-based approach" and "compliance-based approach": they probably ring a bell. These two...
Compliance
Customer Case Tersedia
After obtaining ISO 27001 and HDS certifications in 2018, Tersedia has entered the Run phase. THE ESN...
Compliance
Risk or compliance: why choose?
Risk-based approach or compliance-based approach: the eternal debate when it comes to cyber management with a...
Compliance
Customer Case Teamwork
Digital Service Company Teamwork obtained its ISO 27001 certification in 2018 and then chose Tenacy to...
Compliance
Customer Case CD 31
The RSSI of the Conseil Départemental de Haute Garonne has chosen Tenacy to optimize its cybersecurity management,...
Compliance
How can you automate compliance with Tenacy ?
Compliance monitoring, cyber risk awareness, risk analysis and risk management...
Compliance
2024: a year punctuated by the nis 2 directive?
Does October 18, 2024 ring a bell? It's a date to pin above your desk or...
Compliance
How to manage gaps compliance?
In an ever-changing regulatory landscape, companies have to comply with a range of standards...
Compliance
How to manage exemptions compliance in your company?
RGPD, LPM, NIS... Today's businesses are subject to an ever-increasing number of regulatory frameworks and...
Compliance
DORA: how do you manage your compliance?
If you work in the financial sector, you know that DORA isn't just a cartoon heroine,...
Compliance
How can you anticipate and manage 3CF compliance?
The cyber requirements in air transport resulting from the LPM and NIS, considered complex and redundant, are...
Compliance
Customer Case Air Caraïbes
You won't be able to argue the contrary: in all areas of activity, regulations concerning...
Compliance
Information System Security Policy: is it still useful in 2024?
Generally speaking, the Information System Security Policy (ISSP) is presented as the document...
Compliance
Mutuals, banking and insurance: how IT compliance has become a systemic issue
Mutuelle du Mans Assurance (MMA) in July 2020, Mutuelle Nationale des Hôpitaux in February 2021, Axa in...
Compliance
NIS 2: what changes can you expect in your organization?
The NIS Directive is the first piece of European legislation dedicated to cybersecurity. Faced with a succession of...
Compliance
Customer Case Henner
ISO 27001 certification (yes, there it is again) is a key concern for many companies. The...
See more
Thursday, February 29 at 11:00 a.m.
X
Thursday, February 29 at 11:00 a.m.
x