Home
Platform
Tenacy For Business
Add-ons
policies
Integration
Customers
Companies
Health establishment
Local authorities
Resources
Articles
Practical guides and fact sheets
Case studies
Webinars
Glossary
Tenacy
About us
News
Career
Events
Request a demo
Login
EN
FR
ES
Home
>
Our resources
>
Risks
Risks
Share
image/svg+xml
All
Articles
Case studies
Compliance glossary
Practical guides and fact sheets
Webinars
Compliance
StreSSI: the mental health of cyber teams
Here's a recipe for you:
Governance
Human Firewall, or how your employees can protect your company
To cope with the increasing number and sophistication of cyberattacks, companies...
Compliance
NIS 2: awareness-raising at the heart of the issues
20,000: the number of companies affected by the NIS 2 directive. October 2024: this is the date...
Compliance
What tools do you need for your IT security plan?
Your management has just approved your information system security policy (ISSP). And now...
Compliance
Drawing up a P.S.S.I in four stages
The information system security policy (I.S.S.P.) is more than just a reference document:...
Governance
5 reasons to implement a corporate security policy
In order to steer cybersecurity actions within a company, the management committee must first and foremost...
Compliance
ISSP the guide
The information system security policy (or ISSP) enables an organization to define its vision of the...
Compliance
The (true) cost of cyber
Cyber is expensive. True or false? You've probably already heard "we've run out of budget", "we can't afford...
Compliance
Cyber management: risk-based or compliance-based?
"Risk-based approach" and "compliance-based approach": they probably ring a bell. These two...
Compliance
Risk or compliance: why choose?
Risk-based approach or compliance-based approach: the eternal debate when it comes to cyber management with a...
Risks
Permanent Controls, the key to peace of mind?
As a CISO, you know that simply reacting to threats is no longer (at all) sufficient to protect...
Risks
Third-party risks: 3 keys to effective management
According to the Verizon Data Breach Report, 62% of security incidents in 2022 involved...
Risks
IT risk assessment: DICP analysis
To face today's threats, you need to measure the security of your information system...
See more
Thursday, February 29 at 11:00 a.m.
X
Thursday, February 29 at 11:00 a.m.
x