Skip to content
  • Your needs
    • Optimize your business security
    • Secure your sensitive data
    • Strengthening the resilience of your IS
    • Train your employees
    • Subscribe to legal support
  • Our expertise
    • Strategy & Risks
    • SECOPS
    • Cyberdefense
    • Cyber Insurance & Legal Advisory
    • Academy
  • Identity
    • Our key figures
    • About us
    • The management team
    • Our DNA
  • References
    • Client Energy case
    • Case Client Bank Finances
    • Client Insurance Case
    • Case Client Telecommunications
  • Resources
    • Blog articles
    • FAQ
  • Your needs
    • Optimize your business security
    • Secure your sensitive data
    • Strengthening the resilience of your IS
    • Train your employees
    • Subscribe to legal support
  • Our expertise
    • Strategy & Risks
    • SECOPS
    • Cyberdefense
    • Cyber Insurance & Legal Advisory
    • Academy
  • Identity
    • Our key figures
    • About us
    • The management team
    • Our DNA
  • References
    • Client Energy case
    • Case Client Bank Finances
    • Client Insurance Case
    • Case Client Telecommunications
  • Resources
    • Blog articles
    • FAQ
To be recalled

Expert Blog: Cybersecurity

Discover our blog articles

Cyber security

Training: Managing cybersecurity risks related to third-party providers

Cyber Security Training 1. Selection of the provider: risks and safety measures Third-party risk management is a process and a series

Read more »
Alida Djidjo-Blassou 8 January 2024 17:30

OUR EXPERTS ARE CERTIFIED

OUR EXPERTIES

  • Strategy & Risks
  • SECOPS
  • Cyberdefense
  • Cyber Insurance & Legal Advisory
  • Academy

OUR REFERENCES

  • Client Energy case
  • Case Client Bank Finance
  • Client Insurance Case
  • Case Client Telecommunications

USEFUL LINKS

  • Legal information
  • General conditions
  • Privacy Policy
  • Cookie Policy
Facebook Linkedin Youtube

Copyright © 2023 - All rights reserved - Website created by WebMarketConsulting

EnglishenEnglishEnglish
FrenchfrFrenchFrançaisEnglishenEnglishEnglish
Managing consent to cookies
To provide the best experience, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as navigation behavior or unique IDs on this site. Failure to consent or withdraw consent may have a negative effect on certain characteristics and functions.
Functional Always enabled
Storage or technical access is strictly necessary for the purpose of legitimate interest to allow the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of transmitting a communication over an electronic communications network.
Preferences
Storage or technical access is necessary for the purpose of legitimate interest in storing preferences that are not requested by the subscriber or the person using the service.
Statistics
Storage or technical access which is used exclusively for statistical purposes. Storage or technical access which is used exclusively for anonymous statistical purposes. In the absence of a subpoena, voluntary compliance by your Internet access provider or additional third party registrations, the information stored or extracted for this purpose alone cannot generally be used to identify you.
Marketing
Technical storage or access is necessary to create user profiles to send ads, or to track the user on a website or on several websites with similar marketing purposes.
  • Manage options
  • Managing services
  • Manage {vendor_count} suppliers
  • Learn more about these purposes
See preferences
  • {title}
  • {title}
  • {title}