{"id":12844,"date":"2025-08-07T13:28:03","date_gmt":"2025-08-07T11:28:03","guid":{"rendered":"https:\/\/netsystem.fr\/digital-trust\/"},"modified":"2026-02-11T10:32:03","modified_gmt":"2026-02-11T09:32:03","slug":"digital-trust","status":"publish","type":"page","link":"https:\/\/netsystem.fr\/en\/digital-trust\/","title":{"rendered":"Digital trust"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12844\" class=\"elementor elementor-12844 elementor-11540\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-dce-background-color=\"#000000\" data-dce-background-overlay-color=\"#000000\" data-dce-background-image-url=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/08\/OCA-VFE.jpg\" class=\"elementor-element elementor-element-ed7c6d1 e-flex e-con-boxed e-con e-parent\" data-id=\"ed7c6d1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-239e8bc e-con-full e-flex e-con e-child\" data-id=\"239e8bc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8c7a596 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"8c7a596\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">DIGITAL TRUST<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad848a5 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"ad848a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Building a reliable, robust, and resilient IT system.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc941f2 elementor-widget elementor-widget-text-editor\" data-id=\"fc941f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Digital trust is central to business resilience and performance, ensuring security, compliance, and peace of mind in the face of cyber threats, regulatory requirements, and political instability.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f2fd82 e-con-full e-flex e-con e-child\" data-id=\"3f2fd82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4daac6d elementor-widget elementor-widget-button\" data-id=\"4daac6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contact\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-mail-bulk\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M160 448c-25.6 0-51.2-22.4-64-32-64-44.8-83.2-60.8-96-70.4V480c0 17.67 14.33 32 32 32h256c17.67 0 32-14.33 32-32V345.6c-12.8 9.6-32 25.6-96 70.4-12.8 9.6-38.4 32-64 32zm128-192H32c-17.67 0-32 14.33-32 32v16c25.6 19.2 22.4 19.2 115.2 86.4 9.6 6.4 28.8 25.6 44.8 25.6s35.2-19.2 44.8-22.4c92.8-67.2 89.6-67.2 115.2-86.4V288c0-17.67-14.33-32-32-32zm256-96H224c-17.67 0-32 14.33-32 32v32h96c33.21 0 60.59 25.42 63.71 57.82l.29-.22V416h192c17.67 0 32-14.33 32-32V192c0-17.67-14.33-32-32-32zm-32 128h-64v-64h64v64zm-352-96c0-35.29 28.71-64 64-64h224V32c0-17.67-14.33-32-32-32H96C78.33 0 64 14.33 64 32v192h96v-32z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to an expert<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85ae6fe elementor-widget elementor-widget-button\" data-id=\"85ae6fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#missionsCyber\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-business-time\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 224c-79.59 0-144 64.41-144 144s64.41 144 144 144 144-64.41 144-144-64.41-144-144-144zm64 150.29c0 5.34-4.37 9.71-9.71 9.71h-60.57c-5.34 0-9.71-4.37-9.71-9.71v-76.57c0-5.34 4.37-9.71 9.71-9.71h12.57c5.34 0 9.71 4.37 9.71 9.71V352h38.29c5.34 0 9.71 4.37 9.71 9.71v12.58zM496 192c5.4 0 10.72.33 16 .81V144c0-25.6-22.4-48-48-48h-80V48c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h395.12c28.6-20.09 63.35-32 100.88-32zM320 96H192V64h128v32zm6.82 224H208c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h291.43C327.1 423.96 320 396.82 320 368c0-16.66 2.48-32.72 6.82-48z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Missions carried out<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ff51c1 e-flex e-con-boxed e-con e-parent\" data-id=\"8ff51c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25f2ccd elementor-widget elementor-widget-heading\" data-id=\"25f2ccd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In a constantly evolving digital environment, cyber threats and regulatory requirements are multiplying.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8498d4f e-con-full e-flex e-con e-child\" data-id=\"8498d4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8d74b69 e-con-full e-flex e-con e-child\" data-id=\"8d74b69\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7f2b2f elementor-widget elementor-widget-text-editor\" data-id=\"e7f2b2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">+38%<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a342562 elementor-widget elementor-widget-text-editor\" data-id=\"a342562\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">cyber attacks recorded in Europe in 2024<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5725361 e-con-full e-flex e-con e-child\" data-id=\"5725361\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc5fa55 elementor-widget elementor-widget-text-editor\" data-id=\"fc5fa55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">4%<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfe79ee elementor-widget elementor-widget-text-editor\" data-id=\"cfe79ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>GDPR penalties of up to 4% of global turnover<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-107c034 e-con-full e-flex e-con e-child\" data-id=\"107c034\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b167f6 elementor-widget elementor-widget-text-editor\" data-id=\"9b167f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">2025<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64944dc elementor-widget elementor-widget-text-editor\" data-id=\"64944dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>New NIS2 and DORA obligations from 2025<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cbf25c elementor-widget elementor-widget-heading\" data-id=\"6cbf25c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A security breach or non-compliance can be costly: financial losses, business interruption, damage to reputation.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-906221a e-flex e-con-boxed e-con e-parent\" data-id=\"906221a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3cfb7e8 e-con-full e-flex e-con e-child\" data-id=\"3cfb7e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-783bc7a elementor-widget elementor-widget-heading\" data-id=\"783bc7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Your challenges<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dc626d elementor-widget elementor-widget-text-editor\" data-id=\"2dc626d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ensure the reliability of your IT systems and secure your business with the right support.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-82719fa e-con-full e-flex e-con e-child\" data-id=\"82719fa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c247ef3 e-con-full e-flex e-con e-child\" data-id=\"c247ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5174a2c e-con-full e-flex e-con e-child\" data-id=\"5174a2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-098e234 elementor-widget elementor-widget-text-editor\" data-id=\"098e234\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #21affc;\"><strong>ASSESS &amp; AUDIT<\/strong><\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6de94a elementor-widget elementor-widget-text-editor\" data-id=\"b6de94a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Securing knowledge of cyber risk.<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9a8e56 elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"e9a8e56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-e9a8e56\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"e9a8e56\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"identify-vulnerabilities-and-threats\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-2451\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Identify vulnerabilities and threats<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2451\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"identify-vulnerabilities-and-threats\"><p>Technical audits, intrusion tests, and vulnerability scans to understand the weaknesses of your systems.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"measure-your-level-of-cyber-maturity\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-2452\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Measure your level of cyber maturity<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2452\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"measure-your-level-of-cyber-maturity\"><p>Scoring and benchmarks to prioritize actions and optimize investments.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"ensuring-regulatory-compliance\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-2453\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Ensuring regulatory compliance<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2453\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"ensuring-regulatory-compliance\"><p>Regulatory audit to anticipate requirements and avoid penalties.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2d4cf5 elementor-widget elementor-widget-text-editor\" data-id=\"e2d4cf5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Challenge<\/strong>: having a clear and reliable overview of risks, reducing exposure to cyberattacks, and securing credibility with regulators and partners.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c94db6d e-con-full e-flex e-con e-child\" data-id=\"c94db6d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3df7629 elementor-widget elementor-widget-text-editor\" data-id=\"3df7629\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #21affc;\"><strong>BRING INTO COMPLIANCE<\/strong><\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3455d1d elementor-widget elementor-widget-text-editor\" data-id=\"3455d1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Mastering legal and regulatory requirements.<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5865c7e elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"5865c7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-5865c7e\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"5865c7e\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"align-your-practices-with-standards-and-regulations\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-9261\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Align your practices with standards and regulations<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-9261\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"align-your-practices-with-standards-and-regulations\"><p>NIS2, DORA, GDPR, AI Act, ISO 27001\u2026<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"formalize-your-internal-processes\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-9262\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Formalize your internal processes<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-9262\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"formalize-your-internal-processes\"><p>Review of policies and procedures to secure data and operations.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"preparing-for-certification\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-9263\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Preparing for certification<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-9263\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"preparing-for-certification\"><p>Operational support to demonstrate compliance and promote safety to stakeholders.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43cf5dc elementor-widget elementor-widget-text-editor\" data-id=\"43cf5dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Challenge<\/strong>: Reduce legal and financial risk, strengthen customer and investor confidence, and transform compliance into a strategic lever.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac4f3ed e-con-full e-flex e-con e-child\" data-id=\"ac4f3ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7bfe7f7 e-con-full e-flex e-con e-child\" data-id=\"7bfe7f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea84bd1 elementor-widget elementor-widget-text-editor\" data-id=\"ea84bd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #21affc;\"><strong>STRENGTHEN &amp; MONITOR<\/strong><\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b5c97f elementor-widget elementor-widget-text-editor\" data-id=\"1b5c97f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Protect your critical assets.<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4f08d3 elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"d4f08d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-d4f08d3\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"d4f08d3\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"deploy-advanced-cybersecurity-solutions\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-2231\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Deploy advanced cybersecurity solutions<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2231\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"deploy-advanced-cybersecurity-solutions\"><p>SOC, DLP, IAM to protect data and systems.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"monitor-and-respond-to-incidents\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-2232\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Monitor and respond to incidents<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2232\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"monitor-and-respond-to-incidents\"><p>Detection, analysis, and rapid response to limit the impact of attacks.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"securing-strategic-information\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-2233\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Securing strategic information<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2233\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"securing-strategic-information\"><p>Protection of sensitive data and critical systems against compromise.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f2fc85 elementor-widget elementor-widget-text-editor\" data-id=\"6f2fc85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Challenge<\/strong>: ensuring business continuity, protecting critical assets, and maintaining customer and partner trust.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d5318b2 e-con-full e-flex e-con e-child\" data-id=\"d5318b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-651c2b9 elementor-widget elementor-widget-text-editor\" data-id=\"651c2b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #21affc;\"><strong>GETTING SUPPORT OVER THE LONG TERM<\/strong><\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a775d28 elementor-widget elementor-widget-text-editor\" data-id=\"a775d28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Transforming cybersecurity into an operational lever.<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b97151 elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"0b97151\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-0b97151\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"0b97151\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"outsourcing-key-functions\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-1211\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Outsourcing key functions<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-1211\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"outsourcing-key-functions\"><p>Outsourced CISO &amp; DPO for ongoing security and compliance management.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"strengthening-the-safety-culture\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-1212\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Strengthening the safety culture<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-1212\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"strengthening-the-safety-culture\"><p>Training and awareness-raising for your teams.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"testing-resilience\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-1213\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Testing resilience<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-1213\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"testing-resilience\"><p>Crisis exercises and continuity plans (BCP\/DRP) to deal with incidents without major disruption.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84971ab elementor-widget elementor-widget-text-editor\" data-id=\"84971ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Challenge<\/strong>: securing operational performance, developing internal autonomy, and ensuring long-term resilience in the face of cyber and regulatory crises.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-dce-background-color=\"#1B1D27\" class=\"elementor-element elementor-element-101aa69 e-flex e-con-boxed e-con e-parent\" data-id=\"101aa69\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d1c02b3 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"d1c02b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our support <br>is based on two pillars<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8af3292 e-con-full e-flex e-con e-child\" data-id=\"8af3292\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ebf816d e-con-full e-flex e-con e-child\" data-id=\"ebf816d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c979e7e elementor-widget elementor-widget-heading\" data-id=\"c979e7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">DIAGNOSIS<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01df6ea elementor-widget elementor-widget-heading\" data-id=\"01df6ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Assess your organization's risks and identify areas for improvement<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41846b1 elementor-widget elementor-widget-text-editor\" data-id=\"41846b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Audit &amp; Gap analysis (<a href=\"https:\/\/netsystem.fr\/en\/nis2-certification-and-compliance\/\">NIS2<\/a>, <a href=\"https:\/\/netsystem.fr\/en\/dora-certification-compliance\/\">DORA<\/a>, <a href=\"https:\/\/netsystem.fr\/en\/mica-regulation-audit-and-compliance\/\">MiCA<\/a>, CRA, <a href=\"https:\/\/netsystem.fr\/en\/iso27001-certification-audit-and-consulting-firm\/\">ISO27001<\/a>, <a href=\"https:\/\/netsystem.fr\/en\/tisax-certification-and-compliance\/\">TISAX<\/a>, <a href=\"https:\/\/netsystem.fr\/en\/gdpr-data-compliance\/\">GDPR<\/a>, ISO27701, SOC2,<a href=\"https:\/\/netsystem.fr\/en\/ia-act-compliance-deploy-your-ais-in-compliance-with-ia-act-constraints\/\"> IA act<\/a>, <a href=\"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/\">TPRM<\/a>, Responsible Digital&#8230;)<\/li>\n<li><a href=\"https:\/\/netsystem.fr\/en\/passi-audit-quote-cybersecurity-expert\/\">PASSI audit<\/a>, SIDR certification (II901, IG1300)<\/li>\n<li>Risk analysis<\/li>\n<li>Roadmap &amp; financing<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4143fce e-con-full e-flex e-con e-child\" data-id=\"4143fce\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52bf551 elementor-widget elementor-widget-heading\" data-id=\"52bf551\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">GOVERNANCE<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90f5670 elementor-widget elementor-widget-heading\" data-id=\"90f5670\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">From strategic action plan to operational implementation<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bca297 elementor-widget elementor-widget-text-editor\" data-id=\"7bca297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li><a href=\"https:\/\/netsystem.fr\/en\/outsourced-ciso\/\">CISO as a service<\/a> &amp; <a href=\"https:\/\/netsystem.fr\/en\/outsourced-dpo\/\">DPO as a service<\/a><\/li>\n<li><a href=\"https:\/\/netsystem.fr\/en\/iso27001-certification-audit-and-consulting-firm\/\">Support for ISO 27001<\/a>, 22301, SOC2, SecNumCloud, and HDS certification<\/li>\n<li>Resilience &amp; compliance<\/li>\n<li>SMSI &amp; PIMS<\/li>\n<li>BCP business Continuity Plan (BCPaaS business continuity planning as a service)<\/li>\n<li>Crisis exercises<\/li>\n<li>Projects (<a href=\"https:\/\/netsystem.fr\/en\/security-operation-center-soc-consulting-support\/\">SOC<\/a>, incident management)<\/li>\n<li>Third-party management<\/li>\n<li>Awareness\/training<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d413eaa e-flex e-con-boxed e-con e-parent\" data-id=\"d413eaa\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-103f4a5 elementor-widget elementor-widget-heading\" data-id=\"103f4a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Netsystem is PASSI qualified<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc6958f e-con-full e-flex e-con e-child\" data-id=\"bc6958f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8de1f44 e-con-full e-flex e-con e-child\" data-id=\"8de1f44\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bfa6351 elementor-widget elementor-widget-text-editor\" data-id=\"bfa6351\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The PASSI qualification is issued by the French National Cybersecurity Agency (ANSSI).<\/p>\n<p>It is intended for <strong>trusted service providers who perform organizational and physical security audits, as well as technical audits<\/strong>, on their own behalf or on behalf of their clients.<\/p>\n<p>It is a real guarantee of quality and expertise for organizations looking for a cybersecurity consulting firm to audit their structure.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-faefbb9 elementor-widget elementor-widget-button\" data-id=\"faefbb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/netsystem.fr\/netsystem-obtient-la-qualification-passi\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-bullhorn\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M576 240c0-23.63-12.95-44.04-32-55.12V32.01C544 23.26 537.02 0 512 0c-7.12 0-14.19 2.38-19.98 7.02l-85.03 68.03C364.28 109.19 310.66 128 256 128H64c-35.35 0-64 28.65-64 64v96c0 35.35 28.65 64 64 64h33.7c-1.39 10.48-2.18 21.14-2.18 32 0 39.77 9.26 77.35 25.56 110.94 5.19 10.69 16.52 17.06 28.4 17.06h74.28c26.05 0 41.69-29.84 25.9-50.56-16.4-21.52-26.15-48.36-26.15-77.44 0-11.11 1.62-21.79 4.41-32H256c54.66 0 108.28 18.81 150.98 52.95l85.03 68.03a32.023 32.023 0 0 0 19.98 7.02c24.92 0 32-22.78 32-32V295.13C563.05 284.04 576 263.63 576 240zm-96 141.42l-33.05-26.44C392.95 311.78 325.12 288 256 288v-96c69.12 0 136.95-23.78 190.95-66.98L480 98.58v282.84z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Find out more about certification<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e96bc3 e-con-full e-flex e-con e-child\" data-id=\"5e96bc3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec9f129 elementor-widget elementor-widget-image\" data-id=\"ec9f129\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"391\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/LogoANSSI-1024x501.png\" class=\"attachment-large size-large wp-image-10463\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/LogoANSSI-1024x501.png 1024w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/LogoANSSI-300x147.png 300w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/LogoANSSI-768x376.png 768w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/05\/LogoANSSI.png 1280w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ee0c74 e-flex e-con-boxed e-con e-parent\" data-id=\"3ee0c74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-df963c3 e-con-full e-flex e-con e-child\" data-id=\"df963c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f0a035 elementor-widget elementor-widget-video\" data-id=\"1f0a035\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/juFiK28w4po?si=18G4stdLi1uf6Kn0&quot;,&quot;show_image_overlay&quot;:&quot;yes&quot;,&quot;image_overlay&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/GJA.jpg&quot;,&quot;id&quot;:5885,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;},&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t\t\t<div class=\"elementor-custom-embed-image-overlay\" style=\"background-image: url(https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/12\/GJA.jpg);\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-custom-embed-play\" role=\"button\" aria-label=\"Play Video\" tabindex=\"0\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-play\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M838 162C746 71 633 25 500 25 371 25 258 71 163 162 71 254 25 367 25 500 25 633 71 746 163 837 254 929 367 979 500 979 633 979 746 933 838 837 929 746 975 633 975 500 975 367 929 254 838 162M808 192C892 279 933 379 933 500 933 621 892 725 808 808 725 892 621 938 500 938 379 938 279 896 196 808 113 725 67 621 67 500 67 379 108 279 196 192 279 108 383 62 500 62 621 62 721 108 808 192M438 392V642L642 517 438 392Z\"><\/path><\/svg>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-725947f e-con-full e-flex e-con e-child\" data-id=\"725947f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-268c216 elementor-widget elementor-widget-heading\" data-id=\"268c216\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Netsystem helped IRTS with its PASSI cybersecurity audit<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdb1e22 elementor-widget elementor-widget-text-editor\" data-id=\"bdb1e22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Testimonial from the CEO of IRTS, for whom Netsystem carried out a cyber assessment.<br \/>Specializing in the defense sector, IRTS develops robust electronic and display solutions (e.g., rugged computers and screens).<\/p>\n<p>PASSI-certified by ANSSI, Netsystem is a consulting firm specializing in digital trust (cybersecurity and compliance), digital transformation (IT infrastructure [Cloud, Telecom, IoT], IT professions [Data, ERP, BPM] and IT departments [Audit, SDSI]), with expertise in IT M&amp;A (due diligence, carve-outs, etc.).<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d92acce e-flex e-con-boxed e-con e-parent\" data-id=\"d92acce\" data-element_type=\"container\" data-e-type=\"container\" id=\"missionsCyber\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ebe1b0 elementor-widget elementor-widget-heading\" data-id=\"6ebe1b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Some clients<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-939fa64 elementor-pagination-type-bullets elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-loop-carousel\" data-id=\"939fa64\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:4681,&quot;slides_to_show&quot;:&quot;6&quot;,&quot;_skin&quot;:&quot;post&quot;,&quot;slides_to_show_widescreen&quot;:&quot;3&quot;,&quot;slides_to_show_laptop&quot;:&quot;3&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;.elementor-loop-container&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-carousel.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c3e7167 e-con-full e-flex e-con e-child\" data-id=\"c3e7167\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3524b4 elementor-widget elementor-widget-heading\" data-id=\"f3524b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Examples of projects carried out<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e58c5da elementor-widget elementor-widget-eael-post-carousel\" data-id=\"e58c5da\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;items&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:3,&quot;sizes&quot;:[]},&quot;items_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;items_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;items_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:2,&quot;sizes&quot;:[]},&quot;items_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]}}\" data-widget_type=\"eael-post-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"swiper-container-wrap eael-post-grid-container eael-post-carousel-wrap eael-post-carousel-style-one swiper-container-wrap-dots-outside\" id=\"eael-post-grid-e58c5da\">\n\t\t\t            <div class=\"swiper swiper-8 eael-post-carousel eael-post-grid swiper-container-e58c5da eael-post-appender-e58c5da\" data-pagination=\".swiper-pagination-e58c5da\" data-arrow-next=\".swiper-button-next-e58c5da\" data-arrow-prev=\".swiper-button-prev-e58c5da\" data-items-mobile=\"1\" data-items-tablet=\"2\" data-items=\"3\" data-margin=\"10\" data-effect=\"slide\" data-speed=\"400\" data-autoplay=\"3000\" data-pause-on-hover=\"true\" data-loop=\"1\" data-dots=\"1\">\n                <div class=\"swiper-wrapper\">\n\t\t\t\t\t<div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/solimut-ebcp-update-and-crisis-exercise\/\" title=\"Solimut: EBCP update and crisis exercise\"><h4 class=\"eael-entry-title\">Solimut: EBCP update and crisis exercise<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/delfingen-tisax-certification-rssi-as-a-service\/\" title=\"Delfingen: TISAX certification &#038; RSSI as a service\"><h4 class=\"eael-entry-title\">Delfingen: TISAX certification &#038; RSSI as a service<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/sepur-gap-analysis-and-nis2-compliance\/\" title=\"SEPUR: Gap analysis and NIS2 compliance\"><h4 class=\"eael-entry-title\">SEPUR: Gap analysis and NIS2 compliance<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/irts-passi-audit-cybersecurity-diagnosis\/\" title=\"IRTS: PASSI Audit &#8211; Cybersecurity Diagnosis\"><h4 class=\"eael-entry-title\">IRTS: PASSI Audit &#8211; Cybersecurity Diagnosis<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/emera-group-nis2-compliance-ciso-as-a-service\/\" title=\"EMERA Group: NIS2 compliance &#038; CISO as a Service\"><h4 class=\"eael-entry-title\">EMERA Group: NIS2 compliance &#038; CISO as a Service<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/carambar-ciso-as-a-service-and-global-cybersecurity-programme\/\" title=\"Carambar: CISO as a Service and global cybersecurity programme\"><h4 class=\"eael-entry-title\">Carambar: CISO as a Service and global cybersecurity programme<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/kerialis-rssi-as-a-service-dora-gap-analysis\/\" title=\"Kerialis: RSSI as a service &#038; DORA Gap analysis\"><h4 class=\"eael-entry-title\">Kerialis: RSSI as a service &#038; DORA Gap analysis<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/neovacom\/\" title=\"Docoon.immo (formerly Neovacom) : ISO 27001 certification\"><h4 class=\"eael-entry-title\">Docoon.immo (formerly Neovacom) : ISO 27001 certification<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/valorem\/\" title=\"Valorem : IT risk management\"><h4 class=\"eael-entry-title\">Valorem : IT risk management<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/grand-narbonne\/\" title=\"Grand Narbonne: Data Security Enhancement\"><h4 class=\"eael-entry-title\">Grand Narbonne: Data Security Enhancement<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div>                <\/div>\n            <\/div>\n            <div class=\"clearfix\"><\/div>\n\t\t\t            <!-- Add Pagination -->\n            <div class=\"swiper-pagination swiper-pagination-e58c5da\"><\/div>\n\t\t        <\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9384325 e-flex e-con-boxed e-con e-parent\" data-id=\"9384325\" data-element_type=\"container\" data-e-type=\"container\" id=\"contact\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dd7f7ba e-con-full e-flex e-con e-child\" data-id=\"dd7f7ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99f44fa elementor-widget elementor-widget-heading\" data-id=\"99f44fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Talk to a cyber security expert<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce32591 elementor-widget elementor-widget-text-editor\" data-id=\"ce32591\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you have any questions or projects (audits, security measures, NIS2, DORA, etc.), please do not hesitate to contact our cybersecurity experts.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a8c82d elementor-widget elementor-widget-text-editor\" data-id=\"3a8c82d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<form id=\"foss-66cf82d7d59cbc5c777a8eb6\"><\/form>\n<p><script async src='https:\/\/api.plezi.co\/api\/v1\/web_forms\/scripts?tenant_id=63b2e27754067a2e9841f03e&#038;form_id=66cf7d44d59cbc5c6b7a83dd&#038;form_version=3&#038;content_web_form_id=66cf82d7d59cbc5c777a8eb6&#038;plz_lang=fr'><\/script><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b38f668 e-con-full e-flex e-con e-child\" data-id=\"b38f668\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5238af elementor-widget elementor-widget-heading\" data-id=\"f5238af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Emergencies<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ec1141 elementor-widget elementor-widget-text-editor\" data-id=\"4ec1141\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the event of a cyber emergency (attack, loss or theft of data, etc.), contact us directly at <strong><span style=\"color: #ff6600;\">+33 (0)4 42 65 85 40.<\/span><\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d13cb55 e-flex e-con-boxed e-con e-parent\" data-id=\"d13cb55\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23288cd elementor-widget elementor-widget-heading\" data-id=\"23288cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">To learn more about digital trust<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-128b39c elementor-widget elementor-widget-eael-post-timeline\" data-id=\"128b39c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-post-timeline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"eael-post-timeline-128b39c\" class=\"eael-post-timeline timeline-layout-default eael-post-timeline-arrow-\">\n            <div class=\"eael-post-timeline eael-post-appender eael-post-appender-128b39c\"><p class=\"no-posts-found\">No posts found!<\/p><\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>DIGITAL TRUST Building a reliable, robust, and resilient IT system. Digital trust is central to business resilience and performance, ensuring security, compliance, and peace of mind in the face of cyber threats, regulatory requirements, and political instability. Talk to an expert Missions carried out In a constantly evolving digital environment, cyber threats and regulatory requirements [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":50,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-12844","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital trust expert firm: cybersecurity &amp; compliance<\/title>\n<meta name=\"description\" content=\"Netsystem is a consulting firm specializing in digital trust that leverages its expertise in cybersecurity and data compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netsystem.fr\/en\/digital-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital trust expert firm: cybersecurity &amp; compliance\" \/>\n<meta property=\"og:description\" content=\"Netsystem is a consulting firm specializing in digital trust that leverages its expertise in cybersecurity and data compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netsystem.fr\/en\/digital-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Netsystem\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-11T09:32:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/12\/home.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"690\" \/>\n\t<meta property=\"og:image:height\" content=\"653\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/digital-trust\\\/\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/digital-trust\\\/\",\"name\":\"Digital trust expert firm: cybersecurity & compliance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/digital-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/digital-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/home.jpg\",\"datePublished\":\"2025-08-07T11:28:03+00:00\",\"dateModified\":\"2026-02-11T09:32:03+00:00\",\"description\":\"Netsystem is a consulting firm specializing in digital trust that leverages its expertise in cybersecurity and data compliance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/digital-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netsystem.fr\\\/en\\\/digital-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/digital-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/home.jpg\",\"contentUrl\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/home.jpg\",\"width\":690,\"height\":653},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/digital-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/\",\"name\":\"Netsystem\",\"description\":\"Soci\u00e9t\u00e9 de conseil en Syst\u00e8mes d\u2019Informations et en transformation digitale.\",\"publisher\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#organization\",\"name\":\"Netsystem\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/netsystem-logo-v3.png\",\"contentUrl\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/netsystem-logo-v3.png\",\"width\":600,\"height\":186,\"caption\":\"Netsystem\"},\"image\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital trust expert firm: cybersecurity & compliance","description":"Netsystem is a consulting firm specializing in digital trust that leverages its expertise in cybersecurity and data compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netsystem.fr\/en\/digital-trust\/","og_locale":"en_US","og_type":"article","og_title":"Digital trust expert firm: cybersecurity & compliance","og_description":"Netsystem is a consulting firm specializing in digital trust that leverages its expertise in cybersecurity and data compliance.","og_url":"https:\/\/netsystem.fr\/en\/digital-trust\/","og_site_name":"Netsystem","article_modified_time":"2026-02-11T09:32:03+00:00","og_image":[{"width":690,"height":653,"url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/12\/home.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/netsystem.fr\/en\/digital-trust\/","url":"https:\/\/netsystem.fr\/en\/digital-trust\/","name":"Digital trust expert firm: cybersecurity & compliance","isPartOf":{"@id":"https:\/\/netsystem.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netsystem.fr\/en\/digital-trust\/#primaryimage"},"image":{"@id":"https:\/\/netsystem.fr\/en\/digital-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/12\/home.jpg","datePublished":"2025-08-07T11:28:03+00:00","dateModified":"2026-02-11T09:32:03+00:00","description":"Netsystem is a consulting firm specializing in digital trust that leverages its expertise in cybersecurity and data compliance.","breadcrumb":{"@id":"https:\/\/netsystem.fr\/en\/digital-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netsystem.fr\/en\/digital-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netsystem.fr\/en\/digital-trust\/#primaryimage","url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/12\/home.jpg","contentUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/12\/home.jpg","width":690,"height":653},{"@type":"BreadcrumbList","@id":"https:\/\/netsystem.fr\/en\/digital-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netsystem.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Digital trust"}]},{"@type":"WebSite","@id":"https:\/\/netsystem.fr\/en\/#website","url":"https:\/\/netsystem.fr\/en\/","name":"Netsystem","description":"Soci\u00e9t\u00e9 de conseil en Syst\u00e8mes d\u2019Informations et en transformation digitale.","publisher":{"@id":"https:\/\/netsystem.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netsystem.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netsystem.fr\/en\/#organization","name":"Netsystem","url":"https:\/\/netsystem.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netsystem.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/11\/netsystem-logo-v3.png","contentUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/11\/netsystem-logo-v3.png","width":600,"height":186,"caption":"Netsystem"},"image":{"@id":"https:\/\/netsystem.fr\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/12844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/comments?post=12844"}],"version-history":[{"count":10,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/12844\/revisions"}],"predecessor-version":[{"id":13950,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/12844\/revisions\/13950"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/media\/50"}],"wp:attachment":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/media?parent=12844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}