Home
Platform
Tenacy For Business
Add-ons
policies
Integration
Customers
Companies
Health establishment
Local authorities
Resources
Articles
Practical guides and fact sheets
Case studies
Webinars
Glossary
Tenacy
About us
News
Career
Events
Request a demo
Login
EN
FR
ES
Home
>
Our resources
>
Articles
Articles
Share
image/svg+xml
Compliance
What tools do you need for your IT security plan?
Your management has just approved your information system security policy (ISSP). And now...
Read more
All
Compliance
Governance
Reporting
Risks
Life as a CISO
Governance
Human Firewall, or how your employees can protect your company
To cope with the increasing number and sophistication of cyberattacks, companies...
Governance
[Infographic] How much does cybersecurity cost?
"Before, it's too expensive; after, it's too late." It's no secret that CISOs are struggling...
Compliance
[Practical info] A guide to cybersecurity regulatory monitoring
Regulatory and standards monitoring is the poor relation of CISO missions. It's tedious, it...
Compliance
What tools do you need for your IT security plan?
Your management has just approved your information system security policy (ISSP). And now...
Compliance
Drawing up a P.S.S.I in four stages
The information system security policy (I.S.S.P.) is more than just a reference document:...
Governance
5 reasons to implement a corporate security policy
In order to steer cybersecurity actions within a company, the management committee must first and foremost...
Compliance
ISSP the guide
The information system security policy (or ISSP) enables an organization to define its vision of the...
Life as a CISO
RSSI, get help: 5 levers for better cyber resilience
If there's one thing information systems security managers (ISSMs) agree on, it's that...
Compliance
[Infographic] The NIS 2 directive at a glance
NIS 2 here, NIS 2 there... there's been (a lot of) talk about this directive since it was published in December...
Compliance
Cyber management: risk-based or compliance-based?
"Risk-based approach" and "compliance-based approach": they probably ring a bell. These two...
Life as a CISO
Uniting teams around cybersecurity: the benefits of collaboration
A company's information system is a constantly evolving environment. Between the diversity of...
Life as a CISO
Foresight: What could the use of artificial intelligence in cybersecurity look like?
With the emergence of generative artificial intelligence, and the dawn of...
Life as a CISO
How do you recruit and onboard a junior member of your SSI team?
While job vacancies for Information Systems Security Managers (ISSMs) and ISSM Assistants are becoming...
Life as a CISO
CISO: 12 ChatGPT prompts for everyday use
With obvious productivity gains at stake, more and more businesses and professionals are adopting...
Life as a CISO
RSSI specifications
Would you like to strengthen your cybersecurity and compliance management processes by using a...
White paper: 5 keys to managing your cybersecurity
Cybersecurity is all very well. But it's not enough. Now you have to know how to manage it. Just think...
Life as a CISO
SSI team: collaboration and leadership
Historically perceived as a technical expert, the CISO must now evolve towards a role of...
Compliance
How can you automate compliance with Tenacy ?
Compliance monitoring, cyber risk awareness, risk analysis and risk management...
Reporting
As a CISO, how do you report to management?
New legislative requirements in the field of IT security have become an integral part of...
Life as a CISO
What are the costs of poor cyber management?
Faced with an ever-increasing number of sophisticated cyber threats, CISOs need to multiply the layers of...
Compliance
How to manage gaps compliance?
In an ever-changing regulatory landscape, companies have to comply with a range of standards...
Compliance
How to manage exemptions compliance in your company?
RGPD, LPM, NIS... Today's businesses are subject to an ever-increasing number of regulatory frameworks and...
Life as a CISO
The CISO's first 100 days
You won't deny it: in any organization, the CISO's role is central, particularly in the application of...
Governance
Data centralization: a key element in facilitating corporate governance
Corporate governance, risk management and compliance activities are becoming increasingly...
Reporting
How do you assess and interpret your cybersecurity performance?
As a CISO, your priority is to maintain the security of your company's information systems,...
Compliance
Information System Security Policy: is it still useful in 2024?
Generally speaking, the Information System Security Policy (ISSP) is presented as the document...
Compliance
Mutuals, banking and insurance: how IT compliance has become a systemic issue
Mutuelle du Mans Assurance (MMA) in July 2020, Mutuelle Nationale des Hôpitaux in February 2021, Axa in...
Compliance
NIS 2: what changes can you expect in your organization?
The NIS Directive is the first piece of European legislation dedicated to cybersecurity. Faced with a succession of...
Reporting
CISO checklist
Yes, you need a dashboard, but how do you know which KPIs to include? Dashboards are...
Life as a CISO
CISOs and DPOs: what are their roles in IT compliance?
Guaranteeing the security of information systems requires strict compliance with standards and constraints...
Risks
IT risk assessment: DICP analysis
To face today's threats, you need to measure the security of your information system...
Governance
Data governance: 5 tips to optimize your strategy
Regulatory requirements, data-driven organization, optimized storage costs...
Life as a CISO
How do you structure your regulatory watch when you're a CISO?
To guarantee the security of your organization, you need to be fully aware of regulatory compliance in...
Life as a CISO
ISO 27001, NIS, LPM, NIST CSF, PCI-DSS, NC, compliance in 6 acronyms
The cybersecurity industry, and in particular the field of incident response, is a place where...
Reporting
5 examples of indicators to include in your SSI dashboard
The SSI dashboard is the CISO's essential management tool. Whether used for...
Life as a CISO
Cybersecurity: which perimeters to protect?
Faced with the expansion and fragmentation of information systems, CISOs dream of having the gift...
Life as a CISO
How can CISOs be everywhere?
Because protecting your company means knowing every nook and cranny, and every link with the outside world, a...
Life as a CISO
Cybersecurity and decision-making: what best practices should you adopt?
Whether it's a matter of deciding on issues that fall within his turf or obtaining the agreement of his top...
Life as a CISO
Being a CISO means supporting the business!
In many organizations, the CISO is still perceived as a technician, or as "the expert who says...
Life as a CISO
The art of talking cybersecurity with top management
According to the 2020 edition of CLUSIF's "Computer threats and security practices in France" study,...
Life as a CISO
The CISO and data: which organization to choose?
In cybersecurity, data is essential. Without it, it's impossible for the CISO to factualize his position as...
Life as a CISO
The CISO, a superhero with thwarted powers.
CISO superheroes? CISOs are stressed. That's the conclusion of a study carried out by Vanson...
Life as a CISO
SSI dashboards: should they be abandoned?
From design to formatting, and including the thorny issue of data collection, tables...
Life as a CISO
Cyber awareness: how to rise to the challenge?
While the ANSSI hygiene guide recommends that users be made aware of basic good practices...
Life as a CISO
CISOs and the race against time: how to get out of it?
Is CISO and the race against time an anecdotal subject? According to a Nominet survey of 800...
See more
Thursday, February 29 at 11:00 a.m.
X
Thursday, February 29 at 11:00 a.m.
x