{"id":616,"date":"2025-02-05T09:25:42","date_gmt":"2025-02-05T09:25:42","guid":{"rendered":"https:\/\/phishia.fr\/?page_id=616"},"modified":"2025-11-26T10:11:20","modified_gmt":"2025-11-26T10:11:20","slug":"rssi-outsourcing","status":"publish","type":"page","link":"https:\/\/phishia.fr\/en\/management-and-compliance\/rssi-outsourcing\/","title":{"rendered":"Outsourced CISO"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"616\" class=\"elementor elementor-616\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-954e60d e-flex e-con-boxed e-con e-parent\" data-id=\"954e60d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0e1867a e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"0e1867a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d86047a elementor-align-left elementor-invisible elementor-widget elementor-widget-breadcrumbs\" data-id=\"d86047a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/phishia.fr\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cde1e95 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"cde1e95\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ffc446b e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ffc446b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88e84d7 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"88e84d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Outsourced CISO<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a1485d elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"9a1485d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5912e29 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"5912e29\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDiscover Phishia's outsourced DSI\/RSSI service: cybersecurity expertise to protect your company against threats, ensure compliance and optimize your digital strategy.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa9afa7 e-con-full e-flex e-con e-child\" data-id=\"fa9afa7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2f9ce0 elementor-align-right elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"a2f9ce0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">I have a project<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9e0cf2 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"a9e0cf2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a799019 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a799019\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e67cd2 elementor-widget elementor-widget-heading\" data-id=\"9e67cd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RSSI = Information Systems Security Manager<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc6cff0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bc6cff0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f654175 e-con-full e-flex e-con e-child\" data-id=\"f654175\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-69bd5e3 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"69bd5e3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ca79cb elementor-widget elementor-widget-image\" data-id=\"2ca79cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7484492 elementor-widget elementor-widget-text-editor\" data-id=\"7484492\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Main role<\/strong><\/p><p>Guarantees the protection of information systems against threats and cyber-attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7fa2550 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"7fa2550\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d87fd8 elementor-widget elementor-widget-image\" data-id=\"4d87fd8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84ce594 elementor-widget elementor-widget-text-editor\" data-id=\"84ce594\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Missions<\/strong><\/p><p>Define and enforce security policies, monitor vulnerabilities, manage incidents and devise strategies to strengthen IT resilience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-636a5b7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"636a5b7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-944572c elementor-widget elementor-widget-image\" data-id=\"944572c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cdc4ca elementor-widget elementor-widget-text-editor\" data-id=\"0cdc4ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Objectives<\/strong><\/p><p>Ensure data confidentiality, integrity, availability and traceability.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7829d49 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"7829d49\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f40762 elementor-widget elementor-widget-image\" data-id=\"8f40762\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d45ec1e elementor-widget elementor-widget-text-editor\" data-id=\"d45ec1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Interactions<\/strong><\/p><p>Collaborate with IT teams, business managers, executives and external partners.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1182177 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"1182177\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa0fe26 elementor-widget elementor-widget-image\" data-id=\"fa0fe26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6844f26 elementor-widget elementor-widget-text-editor\" data-id=\"6844f26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Relevance<\/strong><\/p><p>Indispensable for organizations with complex systems, sensitive data or strict regulations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f11956 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"7f11956\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b8cbb90 e-con-full e-flex e-con e-child\" data-id=\"b8cbb90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-706daf6 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"706daf6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a57664d elementor-widget elementor-widget-heading\" data-id=\"a57664d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What does an outsourced CISO do?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-067d1fa elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"067d1fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8adf932 elementor-widget elementor-widget-text-editor\" data-id=\"8adf932\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our sustainable cybersecurity offering includes a comprehensive range of services designed to protect your business while minimizing its impact on the environment. Here's what we offer:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7924f5f elementor-widget__width-inherit elementor-widget elementor-widget-ucaddon_unlimited_timeline\" data-id=\"7924f5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_unlimited_timeline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Unlimited Timeline -->\n\t\t<link id='font-awesome-css' href='https:\/\/phishia.fr\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/phishia.fr\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Unlimited Timeline *\/\n\n\n\n#uc_unlimited_timeline_elementor_7924f5f{\n  direction:ltr;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f *{\n  box-sizing:border-box;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item{\n  display:flex;\n  flex-direction:row-reverse;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon{\n  display:flex;\n  flex-direction:column;\n  align-items:center;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon_line{\n  flex-grow:1;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon_line_offset{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon_holder{\n  display:flex;\n  justify-content:center;\n  align-items:center;\n  line-height:1em;\n  flex-direction:column;\n  transition: all 0.4s ease-in-out;\n  text-align: center;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon_holder svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content{\n  flex:1;\n  flex-shrink:0;\n  flex-direction:row-reverse;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_spacer{\n  flex:1;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content_main{\n  flex-grow:1;\n  word-break: break-word;\n  transition: all .3s;\n  position: relative;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content_main_link{\n  position: absolute;\n  width: 100%;\n  height: 100%;\n  left: 0;\n  top: 0;\n  display: block;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content{\n  display:flex;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_pointer_spacer{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_pointer{  \n  flex-grow:0;\n  flex-shrink:0;\n  margin-top:0px;\n  position:relative;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item .ue_timeline_item_content .ue_timeline_item_pointer .ue_timeline_item_pointer_inside{\n  position:relative;\n  clip-path: polygon(0 50%, 100% 0, 100% 100%);\n  transition: all .3s;\n}\n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:last-child .ue_timeline_item_icon_line{\n    display:none;\n  }\n\t\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:last-child .ue_timeline_item_content{\n  margin-bottom:0px;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_spacer  {\n  display:none;\n}\n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:nth-child(odd)    {\n   flex-direction:row;\n  }\n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:nth-child(odd) .ue_timeline_item_content{\n   flex-direction:row;\n  } \n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_spacer  {\n    display:block;\n  }\n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:nth-child(odd) .ue_timeline_item_content .ue_timeline_item_pointer .ue_timeline_item_pointer_inside{ \n   clip-path: polygon(100% 50%, 0 0, 0 100%);\n  }\n\t\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_button{\n\tdisplay: flex;\n  \talign-items: center;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_link{\n\tcursor: pointer;\n  \ttransition: all .3s;\n}\n\n\n.ue_timeline_item_title{\n  font-size:21px;\n}\n\n.ue_text_one, .ue_text_two, .ue_text_three{\n  font-size:14px;\n  line-height:1.1em;\n}\n\n.ue_timeline_item_icon_line_mask, .ue_timeline_item_icon_line_offset_mask {\n  width: 100%;\n  height: 0%;\n  max-height: 100%;\n  will-change: height;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_line_icon_holder{\n  position: relative;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_line_floating_icon,\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_line_floating_icon-offset{\n  position: absolute;\n  bottom: 0;\n  left: 50%;\n  transform: translate(-50%, 0%);\n  opacity: 0;\n  display: none;\n    display: none !important;\n  }\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_floating_icon{\n  display:flex;\n  opacity: 1;\n  justify-content:center;\n  align-items:center;\n  line-height:1em;\n  flex-direction:column;\n  transition: all 0.4s ease-in-out;\n  text-align: center;\n}\n  \n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_image{\nobject-fit: cover;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content_inside{\n  position:relative;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content_main{\n  position:relative;\n  overflow:hidden;\n}\n\n\n@media only screen and (max-width: 768px) {\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item{\n    flex-direction:row-reverse !important;\n  }\n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item .ue_timeline_item_content{\n   flex-direction:row-reverse !important;\n  }\n  \n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_spacer  {\n    display:none;\n  }\n  \n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item .ue_timeline_item_content .ue_timeline_item_pointer .ue_timeline_item_pointer_inside  { \n   clip-path: polygon(0 50%, 100% 0, 100% 100%) !important;\n  }  \n}\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_img_wrapper{\n  display: flex;\n}\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:nth-child(even) .ue_timeline_item_img_wrapper{\n  justify-content: flex-end;\n}\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:nth-child(odd) .ue_timeline_item_img_wrapper{\n  justify-content: flex-start;\n}\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\n\n<\/style>\n\n<div id=\"uc_unlimited_timeline_elementor_7924f5f\" class=\"uc-items-wrapper\"  >\n  \n<div class=\"ue_timeline_item elementor-repeater-item-e94b2af\" id=\"uc_unlimited_timeline_elementor_7924f5f_item1\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Analysis of the environment and definition of the ISMS perimeter<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>At this stage, you need to understand the company's environment, identify key information assets and define the scope of the ISMS.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/en\/blog\/cybersecurity\/implementation-of-smsi\/\" >ISMS implementation<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-7402c76\" id=\"uc_unlimited_timeline_elementor_7924f5f_item2\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Risk assessment<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>Identify and assess the risks associated with each information asset.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/en\/services\/cybersecurity\/prevention\/risk-analysis\/\" >Risk analysis<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-ff164ec\" id=\"uc_unlimited_timeline_elementor_7924f5f_item3\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Safety policy development<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>Draw up a security policy that defines how the company manages information security.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/en\/services\/cybersecurity\/prevention\/safety-policies-internal-charters\/\" >Drafting security policies<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-9c12d02\" id=\"uc_unlimited_timeline_elementor_7924f5f_item4\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Implementing controls<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>Implement proactive security by using network detection and vulnerability analysis tools to quickly identify and correct security flaws, thus strengthening the resilience of your information system.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/en\/blog\/cybersecurity\/setting-up-detection-tools\/\" >Detection tools<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-cf0a2c7\" id=\"uc_unlimited_timeline_elementor_7924f5f_item5\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Training and awareness-raising<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>Ensure your company's security by training staff in security policy, conducting cyber crisis management exercises and running phishing campaigns to reinforce preparedness and responsiveness to cyber threats.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/en\/services\/cybersecurity\/prevention\/awareness-training\/\" >Our training services<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-b3bc6b9\" id=\"uc_unlimited_timeline_elementor_7924f5f_item6\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Audit &amp; Review<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p class=\"zfr3Q CDt4Ke\" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc\">Carry out regular audits to verify compliance with security policy.<\/span><\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/en\/audits\/\" >Our audit services<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-4286267\" id=\"uc_unlimited_timeline_elementor_7924f5f_item7\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Continuous improvement<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>Regularly review and improve the ISMS in line with audit results and changes in the company's environment.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/en\/contact\/\" >Contact us<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n \n<\/div>\n<!-- end Unlimited Timeline -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-90f6351 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"90f6351\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-afa79c3 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"afa79c3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d54339d elementor-widget elementor-widget-heading\" data-id=\"d54339d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Strategy for optimizing use and costs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08470ae elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"08470ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1cae8d8 e-con-full e-flex e-con e-child\" data-id=\"1cae8d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c0481ba e-con-full e-flex e-con e-child\" data-id=\"c0481ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a8367c elementor-widget elementor-widget-text-editor\" data-id=\"3a8367c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our strategy for optimizing usage and costs is based on a <strong>proactive, personalized approach<\/strong>aimed at <strong>maximizing the value of IT investments<\/strong> of our customers. As a trusted partner, we work closely with our customers to understand their specific needs, assess their existing infrastructure and develop new solutions. <strong>identify optimization opportunities<\/strong>.<\/p><p>Thanks to our in-depth knowledge of the market and our partnerships with leading technology solution providers, we are able to offer strategic recommendations and tailor-made solutions to reduce costs and improve operational efficiency. We work closely with our customers to identify the IT services and resources that best match their real needs, while eliminating unnecessary expenditure and optimizing existing investments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58dda74 e-con-full e-flex e-con e-child\" data-id=\"58dda74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c6bd0d elementor-widget elementor-widget-text-editor\" data-id=\"0c6bd0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our <strong>proactive approach enables us to anticipate market trends<\/strong> and recommend strategic adjustments to ensure optimum use of IT resources. We are committed to delivering innovative, cost-effective solutions, while ensuring effective long-term cost management.<\/p><p>By choosing our usage and cost optimization strategy, our customers benefit from our expertise, privileged partnerships and commitment to delivering customized, cost-effective solutions. We are committed to helping our customers achieve their business objectives while maximizing the value of their IT investments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-97a4c04 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"97a4c04\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a898d7b e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a898d7b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-984fa94 elementor-widget elementor-widget-heading\" data-id=\"984fa94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Without safety measures,<br>here's an example of a supply chain attack scenario<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-720a068 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"720a068\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c45f665 e-con-full e-flex e-con e-child\" data-id=\"c45f665\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3d537b1 e-con-full e-flex e-con e-child\" data-id=\"3d537b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fcfd820 elementor-widget elementor-widget-image\" data-id=\"fcfd820\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/cybercrime.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1379\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-261ef7c elementor-widget elementor-widget-text-editor\" data-id=\"261ef7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Your payroll provider falls victim to a cyber attack without realizing it<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-906f649 e-transform elementor-widget elementor-widget-image\" data-id=\"906f649\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:45,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:135,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-052e676 e-con-full e-flex e-con e-child\" data-id=\"052e676\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-87c8422 elementor-widget elementor-widget-image\" data-id=\"87c8422\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/animal.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1378\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae1acc5 elementor-widget elementor-widget-text-editor\" data-id=\"ae1acc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tInfiltration of a Trojan Horse in the software delivered for your supplier\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8af4f8 e-transform elementor-widget elementor-widget-image\" data-id=\"e8af4f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:45,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:135,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-266f9ac e-con-full e-flex e-con e-child\" data-id=\"266f9ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8573e49 elementor-widget elementor-widget-image\" data-id=\"8573e49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/big-data.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1377\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-464e41c elementor-widget elementor-widget-text-editor\" data-id=\"464e41c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Deploying the Trojan Horse inside your IS<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7d400c e-transform elementor-widget elementor-widget-image\" data-id=\"a7d400c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:45,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:135,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f9b0223 e-con-full e-flex e-con e-child\" data-id=\"f9b0223\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dc6b230 elementor-widget elementor-widget-image\" data-id=\"dc6b230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/malware.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1376\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aac0311 elementor-widget elementor-widget-text-editor\" data-id=\"aac0311\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Your entire IS is infected<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74d4fa0 e-transform elementor-widget elementor-widget-image\" data-id=\"74d4fa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:45,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:135,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05d949b e-con-full e-flex e-con e-child\" data-id=\"05d949b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-870a51e elementor-widget elementor-widget-image\" data-id=\"870a51e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/dollar.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1375\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbd660b elementor-widget elementor-widget-text-editor\" data-id=\"dbd660b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You are a victim of ransomware<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-481e649 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"481e649\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0c9be1f e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"0c9be1f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16ac04a elementor-widget elementor-widget-heading\" data-id=\"16ac04a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why choose our Outsourcing service?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-657a36f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"657a36f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4631da6 e-con-full e-flex e-con e-child\" data-id=\"4631da6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8dbcc15 e-con-full e-flex e-con e-child\" data-id=\"8dbcc15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16517fb elementor-widget elementor-widget-heading\" data-id=\"16517fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">1.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7fee4b elementor-widget elementor-widget-text-editor\" data-id=\"c7fee4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Specialized expertise<\/strong><\/p><p>By outsourcing your CIO and CISO, you benefit from the expertise and experience of qualified professionals in the field of information systems management and IT security. You gain access to cutting-edge skills and in-depth knowledge to ensure the protection and smooth running of your IT infrastructures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b94740d e-con-full e-flex e-con e-child\" data-id=\"b94740d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dfd9d14 elementor-widget elementor-widget-heading\" data-id=\"dfd9d14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">2.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c746db4 elementor-widget elementor-widget-text-editor\" data-id=\"c746db4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cost reduction<\/strong><\/p><p>Outsourcing your CIO and CISO can deliver significant savings compared with hiring and managing an in-house team. You can optimize your costs by paying only for the services you need, without having to bear the fixed costs associated with full-time staff.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8fbe712 e-con-full e-flex e-con e-child\" data-id=\"8fbe712\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74d1c27 elementor-widget elementor-widget-heading\" data-id=\"74d1c27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">3.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b750729 elementor-widget elementor-widget-text-editor\" data-id=\"b750729\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Flexibility and scalability<\/strong><\/p><p>Our outsourcing service offers great flexibility, enabling you to quickly adapt your resources to your company's changing needs. Whether you need one-off expertise for a specific project, or ongoing management of your information systems, we're here to support you and provide the resources you need.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-479cb1a e-con-full e-flex e-con e-child\" data-id=\"479cb1a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d9fbec3 e-con-full e-flex e-con e-child\" data-id=\"d9fbec3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00fb26d elementor-widget elementor-widget-heading\" data-id=\"00fb26d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">4.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92f76a9 elementor-widget elementor-widget-text-editor\" data-id=\"92f76a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Focus on core business<\/strong><\/p><p>By entrusting the management of your IT department and CISO to external experts, you can concentrate fully on your core business and the development of your activity. You gain peace of mind in knowing that your IT systems are in safe hands, while freeing yourself from the administrative and technical tasks involved in managing them.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0300f9a e-con-full e-flex e-con e-child\" data-id=\"0300f9a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1f79bc elementor-widget elementor-widget-heading\" data-id=\"a1f79bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">5.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3f0748 elementor-widget elementor-widget-text-editor\" data-id=\"e3f0748\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Access to state-of-the-art technology<\/strong><\/p><p>By working with an external service provider, you have access to the latest technologies and security tools, enabling you to stay at the forefront of cybersecurity and effectively protect your digital assets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1aacbae e-con-full e-flex e-con e-child\" data-id=\"1aacbae\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-91c1d8c e-con-full e-flex e-con e-child\" data-id=\"91c1d8c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3928724 elementor-widget elementor-widget-heading\" data-id=\"3928724\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Phishia currently offers free organizational cybersecurity audits.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0ac918 elementor-align-right elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"e0ac918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68b7689 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"68b7689\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a5f79c7 e-con-full e-flex e-con e-child\" data-id=\"a5f79c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ab4d80c e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ab4d80c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89b3903 elementor-widget elementor-widget-heading\" data-id=\"89b3903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Our blog<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-667cfed elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"667cfed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5febd83 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"5febd83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Discover the latest news and trends in management and compliance.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9b7d7e elementor-grid-tablet-1 elementor-widget-tablet__width-initial elementor-grid-3 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"b9b7d7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:208,&quot;masonry&quot;:&quot;yes&quot;,&quot;columns_tablet&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-4300 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-4300 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2026\/02\/SECTEUR-PUBLIC-COLLECTIVITES.png\");}<\/style><style id=\"loop-208\">.elementor-208 .elementor-element.elementor-element-5df6e6f{--display:flex;--min-height:0px;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;}.elementor-widget-post-info .elementor-icon-list-item:not(:last-child):after{border-color:var( --e-global-color-text );}.elementor-widget-post-info .elementor-icon-list-icon i{color:var( --e-global-color-primary );}.elementor-widget-post-info .elementor-icon-list-icon svg{fill:var( --e-global-color-primary );}.elementor-widget-post-info .elementor-icon-list-text, .elementor-widget-post-info .elementor-icon-list-text a{color:var( --e-global-color-secondary );}.elementor-widget-post-info .elementor-icon-list-item{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon{width:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon i{font-size:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon svg{--e-icon-list-icon-size:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-text, .elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-text a{color:var( --e-global-color-ae5c0d5 );}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-item{font-family:\"Space Grotesk\", Sans-serif;font-size:14px;font-weight:600;text-transform:uppercase;letter-spacing:2.2px;}.elementor-208 .elementor-element.elementor-element-5a4044e > .elementor-widget-container{margin:0px 0px 0px 0px;padding:7px 10px 4px 10px;background-color:#1446A066;border-style:solid;border-width:1px 1px 1px 1px;border-color:var( --e-global-color-ae5c0d5 );border-radius:8px 8px 8px 8px;}.elementor-208 .elementor-element.elementor-element-5a4044e.elementor-element{--align-self:flex-start;}body:not(.rtl) .elementor-208 .elementor-element.elementor-element-5a4044e{left:10px;}body.rtl .elementor-208 .elementor-element.elementor-element-5a4044e{right:10px;}.elementor-208 .elementor-element.elementor-element-5a4044e{top:10px;}.elementor-208 .elementor-element.elementor-element-cafbeac{--display:flex;--min-height:300px;--border-radius:5px 5px 5px 5px;box-shadow:0px 8px 24px 0px rgba(148.99999999999997, 156.99999999999997, 164.99999999999997, 0.2);}.elementor-208 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .elementor-208 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-secondary );background-repeat:no-repeat;background-size:cover;}.elementor-208 .elementor-element.elementor-element-cafbeac:hover{box-shadow:0px 8px 24px 8px rgba(148.99999999999997, 156.99999999999997, 164.99999999999997, 0.3);}.elementor-208 .elementor-element.elementor-element-466dfd9{--display:flex;--flex-direction:row;--container-widget-width:calc( ( 1 - var( --container-widget-flex-grow ) ) * 100% );--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--justify-content:flex-start;--align-items:flex-start;--gap:25px 25px;--row-gap:25px;--column-gap:25px;}.elementor-widget-image .widget-image-caption{color:var( --e-global-color-text );font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-208 .elementor-element.elementor-element-c50e89f img{width:30px;filter:brightness( 100% ) contrast( 100% ) saturate( 0% ) blur( 0px ) hue-rotate( 0deg );}.elementor-208 .elementor-element.elementor-element-c50e89f > .elementor-widget-container{margin:-5px 15px 0px 0px;padding:0px 0px 0px 0px;}.elementor-widget-heading .elementor-heading-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );color:var( --e-global-color-primary );}.elementor-208 .elementor-element.elementor-element-0dd511b{text-align:start;}.elementor-208 .elementor-element.elementor-element-0dd511b .elementor-heading-title{font-family:\"Montserrat\", Sans-serif;font-size:16px;font-weight:500;color:var( --e-global-color-text );}@media(max-width:767px){.elementor-208 .elementor-element.elementor-element-466dfd9{--flex-direction:row;--container-widget-width:initial;--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--flex-wrap:nowrap;}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-4300 post-4300 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/aipd-why-dimpact-analysis-is-the-legal-shield-for-local-authorities-in-2026\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/aipd-why-dimpact-analysis-is-the-legal-shield-for-local-authorities-in-2026\/\">AIPD: Why impact assessment is the legal shield for local authorities in 2026<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-4123 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-4123 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-4123 post-4123 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite category-surveillance tag-aeronautique\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4044e elementor-absolute elementor-widget elementor-widget-post-info\" data-id=\"5a4044e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-cc6ad9f elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/phishia.fr\/en\/blog\/tag\/aeronautics\/\" class=\"elementor-post-info__terms-list-item\">Aeronautics<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/the-domino-effect-of-cyber-why-leasa-and-part-is-force-you-to-monitor-your-suppliers\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/the-domino-effect-of-cyber-why-leasa-and-part-is-force-you-to-monitor-your-suppliers\/\">The Domino Effect of Cyber. Why EASA and Part IS require you to monitor your suppliers.<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-3854 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-3854 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/Capture-decran-2024-10-03-a-17.32.55.png\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-3854 post-3854 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite tag-sante\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4044e elementor-absolute elementor-widget elementor-widget-post-info\" data-id=\"5a4044e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-cc6ad9f elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/phishia.fr\/en\/blog\/tag\/health\/\" class=\"elementor-post-info__terms-list-item\">Health<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/programme-care-domaine-2-funding-for-your-medical-social-establishment\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/programme-care-domaine-2-funding-for-your-medical-social-establishment\/\">CaRE program - Area 2: funding for your medical-social establishment.<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d6c4b7 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2d6c4b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/en\/blog\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover all our articles<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>RSSI Externalis\u00e9 D\u00e9couvrez le service DSI\/RSSI externalis\u00e9 de Phishia : une expertise en cybers\u00e9curit\u00e9 pour prot\u00e9ger votre entreprise contre les menaces, assurer la conformit\u00e9 et optimiser votre strat\u00e9gie num\u00e9rique. J&rsquo;ai un projet RSSI = Responsable de la S\u00e9curit\u00e9 des Syst\u00e8mes d&rsquo;Information R\u00f4le principal Garantit la protection des syst\u00e8mes d&rsquo;information contre les menaces et cyberattaques. Missions [&hellip;]<\/p>","protected":false},"author":2,"featured_media":0,"parent":3799,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-616","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RSSI Externalis\u00e9 - Phishia<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez le service DSI \/ RSSI externalis\u00e9 de Phishia : une expertise en cybers\u00e9curit\u00e9 pour prot\u00e9ger votre entreprise contre les menaces, assurer la conformit\u00e9 et optimiser votre strat\u00e9gie num\u00e9rique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/management-and-compliance\/rssi-outsourcing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RSSI Externalis\u00e9 - Phishia\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez le service DSI \/ RSSI externalis\u00e9 de Phishia : une expertise en cybers\u00e9curit\u00e9 pour prot\u00e9ger votre entreprise contre les menaces, assurer la conformit\u00e9 et optimiser votre strat\u00e9gie num\u00e9rique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/management-and-compliance\/rssi-outsourcing\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T10:11:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"72\" \/>\n\t<meta property=\"og:image:height\" content=\"72\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/\",\"name\":\"RSSI Externalis\u00e9 - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/arrow-right-up-line-2.png\",\"datePublished\":\"2025-02-05T09:25:42+00:00\",\"dateModified\":\"2025-11-26T10:11:20+00:00\",\"description\":\"D\u00e9couvrez le service DSI \\\/ RSSI externalis\u00e9 de Phishia : une expertise en cybers\u00e9curit\u00e9 pour prot\u00e9ger votre entreprise contre les menaces, assurer la conformit\u00e9 et optimiser votre strat\u00e9gie num\u00e9rique.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/arrow-right-up-line-2.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/arrow-right-up-line-2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"RSSI Externalis\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Outsourced CISO - Phishia","description":"Discover Phishia's outsourced CIO \/ CISO service: cybersecurity expertise to protect your company against threats, ensure compliance and optimize your digital strategy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/management-and-compliance\/rssi-outsourcing\/","og_locale":"en_US","og_type":"article","og_title":"RSSI Externalis\u00e9 - Phishia","og_description":"D\u00e9couvrez le service DSI \/ RSSI externalis\u00e9 de Phishia : une expertise en cybers\u00e9curit\u00e9 pour prot\u00e9ger votre entreprise contre les menaces, assurer la conformit\u00e9 et optimiser votre strat\u00e9gie num\u00e9rique.","og_url":"https:\/\/phishia.fr\/en\/management-and-compliance\/rssi-outsourcing\/","og_site_name":"Phishia","article_modified_time":"2025-11-26T10:11:20+00:00","og_image":[{"width":72,"height":72,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/","url":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/","name":"Outsourced CISO - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png","datePublished":"2025-02-05T09:25:42+00:00","dateModified":"2025-11-26T10:11:20+00:00","description":"Discover Phishia's outsourced CIO \/ CISO service: cybersecurity expertise to protect your company against threats, ensure compliance and optimize your digital strategy.","breadcrumb":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/pilotage-et-conformite\/"},{"@type":"ListItem","position":3,"name":"RSSI Externalis\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/pages\/616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=616"}],"version-history":[{"count":42,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/pages\/616\/revisions"}],"predecessor-version":[{"id":4061,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/pages\/616\/revisions\/4061"}],"up":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/pages\/3799"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}