{"id":196,"date":"2025-01-27T18:44:24","date_gmt":"2025-01-27T18:44:24","guid":{"rendered":"https:\/\/phishia.fr\/?p=196"},"modified":"2025-11-21T15:12:54","modified_gmt":"2025-11-21T15:12:54","slug":"my-rssi-is-missing-what-to-do","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/my-rssi-is-missing-what-to-do\/","title":{"rendered":"My CISO is absent. What can I do?"},"content":{"rendered":"<p>Information security is a crucial issue for any company, and the departure on vacation of your Information Systems Security Manager (ISSM) must not compromise this security. It is essential to put in place preventive measures to ensure continuity of operations and protection of sensitive data during his absence. Here's a detailed guide to preparing effectively for this period, with a key solution offered by Phishia: the outsourced CISO service.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.46y62tu51wbr_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.46y62tu51wbr\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.46y62tu51wbr\"><\/a>What is a CISO?<\/h2>\n\n\n\n<p>RSSI, an acronym for \"Responsable de la S\u00e9curit\u00e9 des Syst\u00e8mes d'Information\", is a key professional in the field of cybersecurity. His or her main mission is to guarantee the protection of an organization's information systems against computer threats and cyber-attacks. The CISO is responsible for implementing and managing security policies, monitoring vulnerabilities, managing security incidents, and developing strategies to strengthen the resilience of the IT infrastructure. As a strategic figure, the CISO plays an essential role in preserving the confidentiality, integrity, availability and traceability of data within the company.<\/p>\n\n\n\n<p>The CISO interacts with IT teams, business managers and executives to align security strategies. He or she ensures transparent communication and collaborates with external partners to reinforce the organization's overall security posture.<\/p>\n\n\n\n<p>\u00a0<br>The need for an Information Systems Security Manager (ISSM) is more a function of the complexity of IT systems and security issues than of company size. Medium-sized to large organizations, handling sensitive data or operating in sectors subject to strict regulations, are generally better positioned to benefit from a dedicated CISO.<a href=\"\/en\/contact\/\"><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.ljiphorgor4t_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.ljiphorgor4t\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.ljiphorgor4t\"><\/a>Setting up an interim CISO<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.qg1feinsoonu_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.qg1feinsoonu\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.qg1feinsoonu\"><\/a>Selecting a replacement<\/h3>\n\n\n\n<p>It is crucial to appoint an interim CISO with in-depth knowledge of the company's security infrastructure. This person can be a senior member of the IT team or an external consultant. The choice should be made for someone with significant experience in security incident management and security policy governance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.1vhfjewvobes_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.1vhfjewvobes\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.1vhfjewvobes\"><\/a>Training and handover<\/h3>\n\n\n\n<p>Before the CISO leaves, it is necessary to train the replacement on the specific aspects of the CISO's responsibilities. This training should include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A detailed briefing on current safety policies.<\/li>\n\n\n\n<li>Presentation of the security tools and technologies used.<\/li>\n\n\n\n<li>Description of escalation and incident management processes.<\/li>\n\n\n\n<li>A review of current risks and mitigation measures in place.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.64ks2qcbp9s0_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.64ks2qcbp9s0\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.64ks2qcbp9s0\"><\/a>Documentation and access<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.jufhi0t1d4by_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.jufhi0t1d4by\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.jufhi0t1d4by\"><\/a>Full documentation<\/h3>\n\n\n\n<p>Documentation must be comprehensive and include :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Safety policies and procedures.<\/li>\n\n\n\n<li>Safety system configurations.<\/li>\n\n\n\n<li>Incident response plans.<\/li>\n\n\n\n<li>Emergency contacts, both internal and external (suppliers, competent authorities, etc.).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.vczyvirpz1mf_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.vczyvirpz1mf\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.vczyvirpz1mf\"><\/a>Secure access :<\/h3>\n\n\n\n<p>The temporary worker must have the necessary access to security systems. This access must be granted securely and temporarily. Using Privileged Access Management (PAM) solutions can help control and monitor the temp's actions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.da7zn7eyrq4_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.da7zn7eyrq4\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.da7zn7eyrq4\"><\/a>Here's a concrete example: what do you do when your CISO resigns and you suffer a cyber attack?<\/h2>\n\n\n\n<p>It's 7 p.m. on a Friday evening. Most employees have left the company premises, and a critical situation has arisen: you're the target of a cyber attack, or more precisely, ransomware. Your CISO has just resigned, and the transition period could not be carried out properly. No one has taken over his or her responsibilities. What can you do? Who should you contact? What procedure should be followed? Here are the steps you need to take to manage this crisis effectively.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.g7i2kwcl2zpe_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.g7i2kwcl2zpe\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.g7i2kwcl2zpe\"><\/a>Identification and Containment<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.kh8ch0wrvkm2_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.kh8ch0wrvkm2\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.kh8ch0wrvkm2\"><\/a>Initial detection :&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If you are alerted to an attack by a monitoring tool or a user, immediately note the symptoms: ransomware messages, encrypted files, etc.\u00a0<\/li>\n\n\n\n<li>Confirm that it's ransomware.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.upx9jgl5g3ol_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.upx9jgl5g3ol\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.upx9jgl5g3ol\"><\/a>Insulation :&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Immediately disconnect infected machines from the network to prevent propagation.\u00a0<\/li>\n\n\n\n<li>Disable Wi-Fi, Bluetooth and any other means of communication on compromised devices.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.yq4cc19y3xrf_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.yq4cc19y3xrf\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.yq4cc19y3xrf\"><\/a>Notification and activation of the crisis team<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.ayq7uudwaho_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.ayq7uudwaho\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.ayq7uudwaho\"><\/a>Internal notification :&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Inform the management team and IT managers immediately.<\/li>\n\n\n\n<li>If you have an incident response team, activate it.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.gyp4cxkujn7t_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.gyp4cxkujn7t\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.gyp4cxkujn7t\"><\/a>Call for external help :&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishia - Outsourced CISO: Contact your outsourced security service provider for immediate assistance. At Phishia, our experts are available 24\/7 to manage this type of crisis.<\/li>\n\n\n\n<li>Security consultants: If you don't have an outsourced security department, contact cybersecurity experts for rapid intervention.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.q3zdxiwifv21_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.q3zdxiwifv21\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.q3zdxiwifv21\"><\/a>Situation assessment<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.rys7huqyx59f_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.rys7huqyx59f\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.rys7huqyx59f\"><\/a>Initial analysis :<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Determine the extent of the infection: which systems and files are affected?<\/li>\n\n\n\n<li>Identify the type of ransomware involved.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.xd3cs86u2w6z_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.xd3cs86u2w6z\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.xd3cs86u2w6z\"><\/a>Documentation :<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Document all actions taken and observations made since the attack was detected.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.n6wyvotwi2qh_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.n6wyvotwi2qh\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.n6wyvotwi2qh\"><\/a>Response to the attack<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.jddo21goq5cc_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.jddo21goq5cc\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.jddo21goq5cc\"><\/a>In-depth analysis :<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybersecurity experts will analyze the ransomware and identify the entry vectors and scope of the attack.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.bh1do67dwi79_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.bh1do67dwi79\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.bh1do67dwi79\"><\/a>Communication :<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Inform relevant internal and external stakeholders (suppliers, partners, etc.).<\/li>\n\n\n\n<li>Prepare an internal communication to inform employees without causing panic.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.d8fy5yk7mgzt_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.d8fy5yk7mgzt\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.d8fy5yk7mgzt\"><\/a>Restoration and recovery<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.icyy8thn1j53_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.icyy8thn1j53\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.icyy8thn1j53\"><\/a>Backups :<\/h3>\n\n\n\n<p>If you have recent, intact backups, start the restoration process once you're sure the infection is contained.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.6bv7p3o005l_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.6bv7p3o005l\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.6bv7p3o005l\"><\/a>Cleaning and checking :<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The experts will ensure that all traces of the ransomware are removed from the systems.<\/li>\n\n\n\n<li>Thorough checks must be carried out to ensure that the threat is completely eradicated.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.v4acrhcvywn3_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.v4acrhcvywn3\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.v4acrhcvywn3\"><\/a>Post-incident prevention and improvement<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.r3s9c4p0deub_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.r3s9c4p0deub\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.r3s9c4p0deub\"><\/a>Post-incident analysis :<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Once the crisis has been resolved, carry out a post-incident analysis to understand how the attack came about.<\/li>\n\n\n\n<li>Identify vulnerabilities in your security systems and processes.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h.44kw482j8sur_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.44kw482j8sur\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.44kw482j8sur\"><\/a>Increased security measures :<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implement improvements based on lessons learned from the incident.<\/li>\n\n\n\n<li>Review and update your security policies, incident response plans and backup processes.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.2xq5s7wez9a6_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.2xq5s7wez9a6\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.2xq5s7wez9a6\"><\/a>What does an outsourced CISO do?&nbsp;<\/h2>\n\n\n\n<p>Visit&nbsp;<strong>implementation of an Information Security Management System (ISMS)<\/strong>&nbsp;within an Information Systems Department (ISD) can be a complex process. Here's a step-by-step approach, with the right tools for each stage:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/opt-for-an-outsourced-rssi\/\"><strong>Analysis of the environment and definition of the ISMS perimeter<\/strong><\/a>\u00a0At this stage, you need to understand the company's environment, identify key information assets and define the scope of the ISMS.\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/phishia.fr\/en\/services\/cybersecurity\/prevention\/risk-analysis\/\"><strong>Risk assessment<\/strong><\/a>\u00a0Identify and assess the risks associated with each information asset.\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/phishia.fr\/en\/services\/cybersecurity\/prevention\/safety-policies-internal-charters\/\"><strong>Safety policy development<\/strong><\/a>\u00a0Write a security policy that defines how the company manages information security.\u00a0<\/li>\n\n\n\n<li><strong>Implementing controls<\/strong>\u00a0Implement proactive security by using network detection and vulnerability analysis tools to quickly identify and correct security flaws, thus strengthening the resilience of your information system.<\/li>\n\n\n\n<li><a href=\"https:\/\/phishia.fr\/en\/services\/cybersecurity\/prevention\/awareness-training\/\"><strong>Training and awareness-raising<\/strong><\/a><strong>\u00a0<\/strong>: Ensure your company's security by training staff in security policy, conducting cyber crisis management exercises and carrying out phishing campaigns to reinforce preparedness and responsiveness to IT threats.<\/li>\n\n\n\n<li><strong>Audit and review<\/strong>\u00a0Security: Carry out regular audits to verify compliance with security policy.<\/li>\n\n\n\n<li><strong>Continuous improvement<\/strong>\u00a0Regularly review and improve the ISMS in line with audit results and changes in the company's environment.\u00a0<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.h5bkzhkhrlio_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.h5bkzhkhrlio\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybers%c3%a9curit%c3%a9\/actualit%c3%a9s\/my-rssi-is-missing-what-to-do\/#h.h5bkzhkhrlio\"><\/a>Why choose our Outsourcing service?<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Specialized expertise :\u00a0<\/strong>By outsourcing your CIO and CISO, you benefit from the expertise and experience of qualified professionals in the field of information systems management and IT security. You gain access to cutting-edge skills and in-depth knowledge to ensure the protection and smooth running of your IT infrastructures.<\/li>\n\n\n\n<li><strong>Cost reduction :\u00a0<\/strong>Outsourcing your CIO and CISO can deliver significant savings compared with hiring and managing an in-house team. You can optimize your costs by paying only for the services you need, without having to bear the fixed costs associated with full-time staff.<\/li>\n\n\n\n<li><strong>Flexibility and scalability :\u00a0<\/strong>Our outsourcing service offers great flexibility, enabling you to quickly adapt your resources to your company's changing needs. Whether you need one-off expertise for a specific project, or ongoing management of your information systems, we're here to support you and provide the resources you need.<\/li>\n\n\n\n<li><strong>Focus on core business:\u00a0<\/strong>By entrusting the management of your IT department and CISO to external experts, you can concentrate fully on your core business and the development of your activity. You gain peace of mind in knowing that your IT systems are in safe hands, while freeing yourself from the administrative and technical tasks involved in managing them.<\/li>\n\n\n\n<li><strong>Access to cutting-edge technology :<\/strong>\u00a0By working with an external service provider, you have access to the latest technologies and security tools, enabling you to stay at the forefront of cybersecurity and effectively protect your digital assets.<a href=\"\/en\/contact\/\"><\/a><\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>Whether you're off sick, on vacation, overworked or simply no longer a CISO, how do you manage these transition periods in today's digital environment?<\/p>","protected":false},"author":1,"featured_media":223,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mon\u00a0RSSI est absent, que faire ? - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/my-rssi-is-missing-what-to-do\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mon\u00a0RSSI est absent, que faire ? - Phishia\" \/>\n<meta property=\"og:description\" content=\"Arr\u00eat maladie, en vacances, d\u00e9bord\u00e9, ou tout simplement plus de RSSI, comment g\u00e9rer ces p\u00e9riodes de transition dans l&#039;environnement num\u00e9rique actuel ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/my-rssi-is-missing-what-to-do\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-27T18:44:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T15:12:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"881\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hugo Lanier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hugo Lanier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/\"},\"author\":{\"name\":\"Hugo Lanier\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\"},\"headline\":\"Mon\u00a0RSSI est absent, que faire ?\",\"datePublished\":\"2025-01-27T18:44:24+00:00\",\"dateModified\":\"2025-11-21T15:12:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/\"},\"wordCount\":1765,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-6.jpg\",\"articleSection\":[\"Pilotage et conformit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/\",\"name\":\"Mon\u00a0RSSI est absent, que faire ? - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-6.jpg\",\"datePublished\":\"2025-01-27T18:44:24+00:00\",\"dateModified\":\"2025-11-21T15:12:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-6.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-6.jpg\",\"width\":881,\"height\":680},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/mon-rssi-est-absent-que-faire\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/pilotage-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mon\u00a0RSSI est absent, que faire ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\",\"name\":\"Hugo Lanier\",\"sameAs\":[\"https:\\\/\\\/phishia.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"My CISO is away, what can I do? - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/my-rssi-is-missing-what-to-do\/","og_locale":"en_US","og_type":"article","og_title":"Mon\u00a0RSSI est absent, que faire ? - Phishia","og_description":"Arr\u00eat maladie, en vacances, d\u00e9bord\u00e9, ou tout simplement plus de RSSI, comment g\u00e9rer ces p\u00e9riodes de transition dans l'environnement num\u00e9rique actuel ?","og_url":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/my-rssi-is-missing-what-to-do\/","og_site_name":"Phishia","article_published_time":"2025-01-27T18:44:24+00:00","article_modified_time":"2025-11-21T15:12:54+00:00","og_image":[{"width":881,"height":680,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-6.jpg","type":"image\/jpeg"}],"author":"Hugo Lanier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hugo Lanier","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/"},"author":{"name":"Hugo Lanier","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f"},"headline":"Mon\u00a0RSSI est absent, que faire ?","datePublished":"2025-01-27T18:44:24+00:00","dateModified":"2025-11-21T15:12:54+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/"},"wordCount":1765,"commentCount":0,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-6.jpg","articleSection":["Pilotage et conformit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/","name":"My CISO is away, what can I do? - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-6.jpg","datePublished":"2025-01-27T18:44:24+00:00","dateModified":"2025-11-21T15:12:54+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-6.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-6.jpg","width":881,"height":680},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/mon-rssi-est-absent-que-faire\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"Mon\u00a0RSSI est absent, que faire ?"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f","name":"Hugo Lanier","sameAs":["https:\/\/phishia.fr"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=196"}],"version-history":[{"count":9,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/196\/revisions"}],"predecessor-version":[{"id":3614,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/196\/revisions\/3614"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/223"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}