Accueil
Platform
Tenacy for Business
Connectors
Policies
Add-ons
Customers
Companies
Healthcare
Local authorities
Resources
Articles
Customer stories
Glossary
Tenacy
About us
News
Career
Events
Request a demo
Log in
English
Français
Español
Accueil
>
OUR RESOURCES
>
Articles
Articles
Partage
image/svg+xml
CISO daily
"I've already got Excel, thank you"
That's the answer we're often given when we talk about Tenacy. Yet Excel is primarily an accounting tool: it wasn't...
Lire la suite
Tous
CISO daily
Compliance
Governance
Reporting
Risks
CISO daily
"I've already got Excel, thank you"
That's the answer we're often given when we talk about Tenacy. Yet Excel is primarily an accounting tool: it wasn't...
CISO daily
ISSP: the guide
The Information System Security Policy (or ISSP) enables an organisation to define its strategic vision in terms of...
CISO daily
Foresight: What could the use of artificial intelligence in cybersecurity look like in 2050?
With the emergence of generative artificial intelligence, and the dawn of General Artificial Intelligence (GAI), we...
CISO daily
How to Recruit and Onboard a Junior Profile in an Information Security Team
As job offers for Chief Information Security Officers (CISO) and assistant CISO roles multiply, it is evident that...
CISO daily
IT Security Team: Collaboration and Leadership
Historically viewed as a technical expert, the CISO must now evolve into a communicator role. In a...
Compliance
How to Automate Compliance with Tenacy?
Monitoring compliance, raising cyber risk awareness, risk analysis, and daily management... Year after year, CISOs...
Reporting
As a CISO, how do you report to your management?
New legislative requirements in terms of IT security are now an integral part of corporate governance aspects. As a...
Compliance
How to manage compliance exemptions in a company?
GDPR, DORA, NIS... Companies are today subject to more and more regulatory and compliance frameworks. Although these...
Compliance
NIS 2: what changes are expected in your organization?
The NIS Directive is the first European legislative act dedicated to cybersecurity. Faced with a succession of...
Risks
IT risk assessment: AICP analysis
To face current threats, it is necessary to measure the security of your information system in light of the issues...
Governance
Data governance: 5 tips to optimize your strategy
Regulatory obligations, organization designed around data, optimization of storage costs, valuation of data......
CISO daily
How to effectively structure your regulatory monitoring when you are a CISO?
Guaranteeing the security of your organization requires perfect knowledge of current regulatory compliance. This is...
Reporting
5 examples of indicators to integrate into your SSI dashboard
The SSI dashboard is the essential CISO management tool. Whether used for operational, coordination or strategic...
CISO daily
Cybersecurity: what perimeters should be protected?
Faced with the expansion and fragmentation of the information system, the CISO would dream of having the gift of...
CISO daily
The art of talking cybersecurity with top management
According to the 2020 edition of CLUSIF's ‘IT Threats and Security Practices in France’ survey of 350 companies...
CISO daily
Cyber awareness: how do you rise to the challenge?
While the ANSSI's hygiene guide recommends that users should be made aware of basic good IT security practices, the...
Voir plus