{"id":622,"date":"2025-02-05T09:27:40","date_gmt":"2025-02-05T09:27:40","guid":{"rendered":"https:\/\/phishia.fr\/?page_id=622"},"modified":"2025-11-26T06:29:06","modified_gmt":"2025-11-26T06:29:06","slug":"ebios-rm-risk-analysis","status":"publish","type":"page","link":"https:\/\/phishia.fr\/en\/management-and-compliance\/ebios-rm-risk-analysis\/","title":{"rendered":"RM EBIOS Risk Analysis"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"622\" class=\"elementor elementor-622\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c421ca e-flex e-con-boxed e-con e-parent\" data-id=\"5c421ca\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a0e7dc2 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a0e7dc2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f67225 elementor-align-left elementor-invisible elementor-widget elementor-widget-breadcrumbs\" data-id=\"0f67225\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/phishia.fr\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b7d0878 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"b7d0878\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2d24169 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"2d24169\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a2b452 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"0a2b452\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Risk Analysis EBIOS RM<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a403110 elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"a403110\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cd22fe elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"5cd22fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tPhishia supports you in risk analysis and management using the EBIOS RM method, recognized by ANSSI for its structured and effective approach. Our expertise enables you to identify targeted threats and implement appropriate measures to secure your operations and data.\n\n\n\n\n\n\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26a01db e-con-full e-flex e-con e-child\" data-id=\"26a01db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cdaea56 elementor-align-right elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"cdaea56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">I have a project<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ed3722 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"1ed3722\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-076e2e3 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"076e2e3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75e86ad elementor-widget elementor-widget-heading\" data-id=\"75e86ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OUR OFFER<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cbe75f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cbe75f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c237f47 elementor-widget elementor-widget-text-editor\" data-id=\"c237f47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishia is a company specialized in risk analysis based on the EBIOS RM method (Expression of Needs and Identification of Security Objectives \u2013 Risk Management, published by the National Agency for the Security of Information Systems (ANSSI)).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-60b8b85 e-con-full e-flex e-con e-child\" data-id=\"60b8b85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f63b9e9 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"f63b9e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyber.gouv.fr\/la-methode-ebios-risk-manager\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"582\" height=\"806\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Untitled-1.png\" class=\"attachment-medium_large size-medium_large wp-image-1789\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Untitled-1.png 582w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Untitled-1-217x300.png 217w\" sizes=\"(max-width: 582px) 100vw, 582px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2740b8 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"c2740b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>According to ANSSI, \" <em>The EBIOS RM method adopts a risk management approach that starts from the highest level (major objectives of the studied entity) and gradually focuses on business and technical elements, studying possible attack paths. It aims to provide a synthesis between \"compliance\" and \"scenarios\" by repositioning these two complementary approaches where they bring the most added value. Therefore, the risk assessment by scenarios focuses on intentional and targeted threats.<\/em>.\"<\/p><p>Our goal is to help your business to <strong>strengthen its security<\/strong> by identifying, assessing, and managing potential risks that could affect your operations, sensitive data, and assets. Below is the detailed explanation of the EBIOS RM method.<\/p><p>In collaboration with your company, we help you develop a <strong>tailored action plan.<\/strong> once the analysis is completed. It includes specific recommendations to mitigate the identified risks.<\/p><p>These security measures may include the <strong>implementation of firewalls, software updates, security awareness training for staff, and the establishment of access controls.<\/strong>, and many other actions necessary to strengthen the security of your assets and data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0a8d0f8 e-con-full e-flex e-con e-child\" data-id=\"0a8d0f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2879873 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"2879873\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyber.gouv.fr\/la-methode-ebios-risk-manager\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"525\" height=\"429\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/619b60c8562c8765d5d936ae_Dl4GfqtTONM3C2Av3WUYWCydsTIFM5O-6sJEGUUdioRUWidx3fr84dpjDtKd8L44ohKqqnJ_j3uC_vGEBkuFXZioQwj7hdprwUk7F0UOUY8cQWurfp7GWgJFD4pxELd-BxCpYnv_-1.png\" class=\"attachment-large size-large wp-image-1794\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/619b60c8562c8765d5d936ae_Dl4GfqtTONM3C2Av3WUYWCydsTIFM5O-6sJEGUUdioRUWidx3fr84dpjDtKd8L44ohKqqnJ_j3uC_vGEBkuFXZioQwj7hdprwUk7F0UOUY8cQWurfp7GWgJFD4pxELd-BxCpYnv_-1.png 525w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/619b60c8562c8765d5d936ae_Dl4GfqtTONM3C2Av3WUYWCydsTIFM5O-6sJEGUUdioRUWidx3fr84dpjDtKd8L44ohKqqnJ_j3uC_vGEBkuFXZioQwj7hdprwUk7F0UOUY8cQWurfp7GWgJFD4pxELd-BxCpYnv_-1-300x245.png 300w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3710dc2 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"3710dc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Once the security measures are in place, our work doesn\u2019t stop there. We offer a <strong>continuous monitoring.<\/strong> to ensure the effectiveness of these measures. Security is an evolving process, and it is essential to stay up-to-date to address new threats and vulnerabilities that emerge regularly.<\/p><p>Ultimately, our approach based on the EBIOS RM method aims to ensure the protection of your sensitive data, operations, and business continuity. We work closely with your company to tailor our recommendations and security measures, ensuring they are suited to your specific needs. Security is a crucial investment to protect your business from constantly evolving threats, and Phishia is here to support you throughout this process.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fec2384 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"fec2384\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5f3c63a e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"5f3c63a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcc6f83 elementor-widget elementor-widget-heading\" data-id=\"bcc6f83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Explanation of the EBIOS RM method<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e430d60 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e430d60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f586c8a e-con-full e-flex e-con e-child\" data-id=\"f586c8a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cdfd9af e-con-full e-flex e-con e-child\" data-id=\"cdfd9af\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-177aae5 e-con-full e-flex e-con e-child\" data-id=\"177aae5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30791d9 e-con-full e-flex e-con e-child\" data-id=\"30791d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fc57f37 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"fc57f37\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f492be7 elementor-widget elementor-widget-text-editor\" data-id=\"f492be7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>EBIOS RM is a risk analysis method for information security. It is divided into five distinct workshops.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9dd9c5 elementor-align-right elementor-tablet-align-justify elementor-widget elementor-widget-button\" data-id=\"e9dd9c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request a quote<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-945a949 e-con-full e-flex e-con e-child\" data-id=\"945a949\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1a97d93 e-con-full e-flex e-con e-child\" data-id=\"1a97d93\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e1bad6 elementor-widget elementor-widget-heading\" data-id=\"3e1bad6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">1.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6482508 elementor-widget elementor-widget-heading\" data-id=\"6482508\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Context Workshop<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d80268 elementor-widget elementor-widget-text-editor\" data-id=\"1d80268\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A thorough analysis of the processes and operational functions most critical to the business, in order to prioritize recovery efforts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-294a7d4 e-con-full e-flex e-con e-child\" data-id=\"294a7d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-081d6ce e-con-full e-flex e-con e-child\" data-id=\"081d6ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b6b1d54 e-con-full e-flex e-con e-child\" data-id=\"b6b1d54\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b449581 elementor-widget elementor-widget-heading\" data-id=\"b449581\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">2.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c474c9 elementor-widget elementor-widget-heading\" data-id=\"4c474c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Needs Expression Workshop<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c758587 elementor-widget elementor-widget-text-editor\" data-id=\"c758587\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Clear objectives defining acceptable recovery time objectives (RTO) and recovery point objectives (RPO) for each critical process.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-74cc4f3 e-con-full e-flex e-con e-child\" data-id=\"74cc4f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-96cfcf9 e-con-full e-flex e-con e-child\" data-id=\"96cfcf9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ef1a79 elementor-widget elementor-widget-heading\" data-id=\"2ef1a79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">3.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25f9433 elementor-widget elementor-widget-heading\" data-id=\"25f9433\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Threat Identification Workshop<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcfd23a elementor-widget elementor-widget-text-editor\" data-id=\"dcfd23a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Detailed plans to restore systems, applications, and data necessary for resuming normal operations, with a focus on speed and efficiency.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a7f454 e-con-full e-flex e-con e-child\" data-id=\"8a7f454\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-29be85a e-con-full e-flex e-con e-child\" data-id=\"29be85a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-de64be5 e-con-full e-flex e-con e-child\" data-id=\"de64be5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d9e67f elementor-widget elementor-widget-heading\" data-id=\"0d9e67f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">4.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88c4aeb elementor-widget elementor-widget-heading\" data-id=\"88c4aeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Risk Estimation Workshop<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a12d144 elementor-widget elementor-widget-text-editor\" data-id=\"a12d144\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Clear attribution of responsibilities and the resources needed for the implementation of the DRP, including emergency response teams and external service providers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2d6f9d e-con-full e-flex e-con e-child\" data-id=\"c2d6f9d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bf30ade e-con-full e-flex e-con e-child\" data-id=\"bf30ade\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef318f2 elementor-widget elementor-widget-heading\" data-id=\"ef318f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">5.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d2797b elementor-widget elementor-widget-heading\" data-id=\"8d2797b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Security Assurance Plan Workshop<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72eece2 elementor-widget elementor-widget-text-editor\" data-id=\"72eece2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Regular testing and exercise procedures to assess the effectiveness of the DRP and ensure that teams are ready to respond effectively when needed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5651691 elementor-widget elementor-widget-image\" data-id=\"5651691\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1280\" height=\"774\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Untitled-2-1.png\" class=\"attachment-full size-full wp-image-1795\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Untitled-2-1.png 1280w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Untitled-2-1-300x181.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Untitled-2-1-1024x619.png 1024w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Untitled-2-1-768x464.png 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9005a56 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"9005a56\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-80d162d e-con-full e-flex e-con e-child\" data-id=\"80d162d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bc88615 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"bc88615\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d7b91bd elementor-widget elementor-widget-heading\" data-id=\"d7b91bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Our blog<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78e04c2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"78e04c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd4adc2 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"bd4adc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Discover the latest news and trends in management and compliance.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff46887 elementor-grid-tablet-1 elementor-widget-tablet__width-initial elementor-grid-3 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"ff46887\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:208,&quot;masonry&quot;:&quot;yes&quot;,&quot;columns_tablet&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-4300 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-4300 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2026\/02\/SECTEUR-PUBLIC-COLLECTIVITES.png\");}<\/style><style id=\"loop-208\">.elementor-208 .elementor-element.elementor-element-5df6e6f{--display:flex;--min-height:0px;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;}.elementor-widget-post-info .elementor-icon-list-item:not(:last-child):after{border-color:var( --e-global-color-text );}.elementor-widget-post-info .elementor-icon-list-icon i{color:var( --e-global-color-primary );}.elementor-widget-post-info .elementor-icon-list-icon svg{fill:var( --e-global-color-primary );}.elementor-widget-post-info .elementor-icon-list-text, .elementor-widget-post-info .elementor-icon-list-text a{color:var( --e-global-color-secondary );}.elementor-widget-post-info .elementor-icon-list-item{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon{width:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon i{font-size:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon svg{--e-icon-list-icon-size:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-text, .elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-text a{color:var( --e-global-color-ae5c0d5 );}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-item{font-family:\"Space Grotesk\", Sans-serif;font-size:14px;font-weight:600;text-transform:uppercase;letter-spacing:2.2px;}.elementor-208 .elementor-element.elementor-element-5a4044e > .elementor-widget-container{margin:0px 0px 0px 0px;padding:7px 10px 4px 10px;background-color:#1446A066;border-style:solid;border-width:1px 1px 1px 1px;border-color:var( --e-global-color-ae5c0d5 );border-radius:8px 8px 8px 8px;}.elementor-208 .elementor-element.elementor-element-5a4044e.elementor-element{--align-self:flex-start;}body:not(.rtl) .elementor-208 .elementor-element.elementor-element-5a4044e{left:10px;}body.rtl .elementor-208 .elementor-element.elementor-element-5a4044e{right:10px;}.elementor-208 .elementor-element.elementor-element-5a4044e{top:10px;}.elementor-208 .elementor-element.elementor-element-cafbeac{--display:flex;--min-height:300px;--border-radius:5px 5px 5px 5px;box-shadow:0px 8px 24px 0px rgba(148.99999999999997, 156.99999999999997, 164.99999999999997, 0.2);}.elementor-208 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .elementor-208 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-secondary );background-repeat:no-repeat;background-size:cover;}.elementor-208 .elementor-element.elementor-element-cafbeac:hover{box-shadow:0px 8px 24px 8px rgba(148.99999999999997, 156.99999999999997, 164.99999999999997, 0.3);}.elementor-208 .elementor-element.elementor-element-466dfd9{--display:flex;--flex-direction:row;--container-widget-width:calc( ( 1 - var( --container-widget-flex-grow ) ) * 100% );--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--justify-content:flex-start;--align-items:flex-start;--gap:25px 25px;--row-gap:25px;--column-gap:25px;}.elementor-widget-image .widget-image-caption{color:var( --e-global-color-text );font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-208 .elementor-element.elementor-element-c50e89f img{width:30px;filter:brightness( 100% ) contrast( 100% ) saturate( 0% ) blur( 0px ) hue-rotate( 0deg );}.elementor-208 .elementor-element.elementor-element-c50e89f > .elementor-widget-container{margin:-5px 15px 0px 0px;padding:0px 0px 0px 0px;}.elementor-widget-heading .elementor-heading-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );color:var( --e-global-color-primary );}.elementor-208 .elementor-element.elementor-element-0dd511b{text-align:start;}.elementor-208 .elementor-element.elementor-element-0dd511b .elementor-heading-title{font-family:\"Montserrat\", Sans-serif;font-size:16px;font-weight:500;color:var( --e-global-color-text );}@media(max-width:767px){.elementor-208 .elementor-element.elementor-element-466dfd9{--flex-direction:row;--container-widget-width:initial;--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--flex-wrap:nowrap;}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-4300 post-4300 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/aipd-why-dimpact-analysis-is-the-legal-shield-for-local-authorities-in-2026\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/aipd-why-dimpact-analysis-is-the-legal-shield-for-local-authorities-in-2026\/\">AIPD: Why impact assessment is the legal shield for local authorities in 2026<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-4123 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-4123 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-4123 post-4123 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite category-surveillance tag-aeronautique\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4044e elementor-absolute elementor-widget elementor-widget-post-info\" data-id=\"5a4044e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-cc6ad9f elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/phishia.fr\/en\/blog\/tag\/aeronautics\/\" class=\"elementor-post-info__terms-list-item\">Aeronautics<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/the-domino-effect-of-cyber-why-leasa-and-part-is-force-you-to-monitor-your-suppliers\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/the-domino-effect-of-cyber-why-leasa-and-part-is-force-you-to-monitor-your-suppliers\/\">The Domino Effect of Cyber. Why EASA and Part IS require you to monitor your suppliers.<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-3854 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-3854 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/Capture-decran-2024-10-03-a-17.32.55.png\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-3854 post-3854 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite tag-sante\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4044e elementor-absolute elementor-widget elementor-widget-post-info\" data-id=\"5a4044e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-cc6ad9f elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/phishia.fr\/en\/blog\/tag\/health\/\" class=\"elementor-post-info__terms-list-item\">Health<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/programme-care-domaine-2-funding-for-your-medical-social-establishment\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/programme-care-domaine-2-funding-for-your-medical-social-establishment\/\">CaRE program - Area 2: funding for your medical-social establishment.<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0695188 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"0695188\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/en\/blog\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover all our articles<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Analyse de Risques EBIOS RM Phishia vous accompagne dans l&rsquo;analyse et la gestion des risques gr\u00e2ce \u00e0 la m\u00e9thode EBIOS RM, reconnue par l\u2019ANSSI pour son approche structur\u00e9e et efficace. Notre expertise vous permet d\u2019identifier les menaces cibl\u00e9es et de mettre en place des mesures adapt\u00e9es pour s\u00e9curiser vos activit\u00e9s et vos donn\u00e9es. J&rsquo;ai un [&hellip;]<\/p>","protected":false},"author":2,"featured_media":423,"parent":3799,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-622","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analyse de Risque EBIOS RM - Phishia<\/title>\n<meta name=\"description\" content=\"Notre objectif est d\u2019aider votre entreprise \u00e0 renforcer sa s\u00e9curit\u00e9 en identifiant, \u00e9valuant et g\u00e9rant les risques potentiels qui peuvent affecter vos activit\u00e9s, vos donn\u00e9es sensibles et vos actifs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/management-and-compliance\/ebios-rm-risk-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyse de Risque EBIOS RM - Phishia\" \/>\n<meta property=\"og:description\" content=\"Notre objectif est d\u2019aider votre entreprise \u00e0 renforcer sa s\u00e9curit\u00e9 en identifiant, \u00e9valuant et g\u00e9rant les risques potentiels qui peuvent affecter vos activit\u00e9s, vos donn\u00e9es sensibles et vos actifs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/management-and-compliance\/ebios-rm-risk-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T06:29:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/3a9c99c03e_50178597_ordinateur-email-se-curite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/analyse-de-risque-ebios-rm\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/analyse-de-risque-ebios-rm\\\/\",\"name\":\"Analyse de Risque EBIOS RM - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/analyse-de-risque-ebios-rm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/analyse-de-risque-ebios-rm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/3a9c99c03e_50178597_ordinateur-email-se-curite.jpg\",\"datePublished\":\"2025-02-05T09:27:40+00:00\",\"dateModified\":\"2025-11-26T06:29:06+00:00\",\"description\":\"Notre objectif est d\u2019aider votre entreprise \u00e0 renforcer sa s\u00e9curit\u00e9 en identifiant, \u00e9valuant et g\u00e9rant les risques potentiels qui peuvent affecter vos activit\u00e9s, vos donn\u00e9es sensibles et vos actifs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/analyse-de-risque-ebios-rm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/analyse-de-risque-ebios-rm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/analyse-de-risque-ebios-rm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/3a9c99c03e_50178597_ordinateur-email-se-curite.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/3a9c99c03e_50178597_ordinateur-email-se-curite.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/analyse-de-risque-ebios-rm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analyse de Risque EBIOS RM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RM EBIOS Risk Analysis - Phishia","description":"Our aim is to help your company strengthen its security by identifying, assessing and managing the potential risks that can affect your business, your sensitive data and your assets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/management-and-compliance\/ebios-rm-risk-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Analyse de Risque EBIOS RM - Phishia","og_description":"Notre objectif est d\u2019aider votre entreprise \u00e0 renforcer sa s\u00e9curit\u00e9 en identifiant, \u00e9valuant et g\u00e9rant les risques potentiels qui peuvent affecter vos activit\u00e9s, vos donn\u00e9es sensibles et vos actifs.","og_url":"https:\/\/phishia.fr\/en\/management-and-compliance\/ebios-rm-risk-analysis\/","og_site_name":"Phishia","article_modified_time":"2025-11-26T06:29:06+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/3a9c99c03e_50178597_ordinateur-email-se-curite.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/analyse-de-risque-ebios-rm\/","url":"https:\/\/phishia.fr\/pilotage-et-conformite\/analyse-de-risque-ebios-rm\/","name":"RM EBIOS Risk Analysis - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/analyse-de-risque-ebios-rm\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/analyse-de-risque-ebios-rm\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/3a9c99c03e_50178597_ordinateur-email-se-curite.jpg","datePublished":"2025-02-05T09:27:40+00:00","dateModified":"2025-11-26T06:29:06+00:00","description":"Our aim is to help your company strengthen its security by identifying, assessing and managing the potential risks that can affect your business, your sensitive data and your assets.","breadcrumb":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/analyse-de-risque-ebios-rm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/pilotage-et-conformite\/analyse-de-risque-ebios-rm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/analyse-de-risque-ebios-rm\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/3a9c99c03e_50178597_ordinateur-email-se-curite.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/3a9c99c03e_50178597_ordinateur-email-se-curite.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/analyse-de-risque-ebios-rm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/pilotage-et-conformite\/"},{"@type":"ListItem","position":3,"name":"Analyse de Risque EBIOS RM"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/pages\/622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=622"}],"version-history":[{"count":35,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/pages\/622\/revisions"}],"predecessor-version":[{"id":4005,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/pages\/622\/revisions\/4005"}],"up":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/pages\/3799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/423"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}