{"id":13934,"date":"2026-02-04T14:38:13","date_gmt":"2026-02-04T13:38:13","guid":{"rendered":"https:\/\/netsystem.fr\/tprm-quote-third-party-risk-management-audit-and-oversight\/"},"modified":"2026-02-10T18:50:58","modified_gmt":"2026-02-10T17:50:58","slug":"tprm-quote-third-party-risk-management-audit-and-oversight","status":"publish","type":"page","link":"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/","title":{"rendered":"TPRM quote: third-party risk management audit and oversight"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"13934\" class=\"elementor elementor-13934 elementor-13640\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-dce-background-color=\"#000000\" data-dce-background-overlay-color=\"#16293699\" data-dce-background-overlay-image-url=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/12\/default-header-bg.jpg\" class=\"elementor-element elementor-element-83410cb e-flex e-con-boxed e-con e-parent\" data-id=\"83410cb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0517fab elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"0517fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">TPRM: Third-party cyber risk audit and management<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-882daaf elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"882daaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Control your third parties' cyber risks before they become your own.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05ac8f1 e-con-full e-flex e-con e-child\" data-id=\"05ac8f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div data-dce-background-color=\"#115EB100\" class=\"elementor-element elementor-element-0040d71 elementor-widget elementor-widget-button\" data-id=\"0040d71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#offre\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-business-time\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 224c-79.59 0-144 64.41-144 144s64.41 144 144 144 144-64.41 144-144-64.41-144-144-144zm64 150.29c0 5.34-4.37 9.71-9.71 9.71h-60.57c-5.34 0-9.71-4.37-9.71-9.71v-76.57c0-5.34 4.37-9.71 9.71-9.71h12.57c5.34 0 9.71 4.37 9.71 9.71V352h38.29c5.34 0 9.71 4.37 9.71 9.71v12.58zM496 192c5.4 0 10.72.33 16 .81V144c0-25.6-22.4-48-48-48h-80V48c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h395.12c28.6-20.09 63.35-32 100.88-32zM320 96H192V64h128v32zm6.82 224H208c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h291.43C327.1 423.96 320 396.82 320 368c0-16.66 2.48-32.72 6.82-48z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Our offer<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20c1c97 e-flex e-con-boxed e-con e-parent\" data-id=\"20c1c97\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f04e50f elementor-widget elementor-widget-breadcrumbs\" data-id=\"f04e50f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/netsystem.fr\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-379218e e-con-full e-flex e-con e-child\" data-id=\"379218e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e05217b e-flex e-con-boxed e-con e-child\" data-id=\"e05217b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b05fb3e e-flex e-con-boxed e-con e-child\" data-id=\"b05fb3e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c13c935 elementor-widget elementor-widget-heading\" data-id=\"c13c935\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The challenges for your organization<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4da8b28 elementor-widget elementor-widget-text-editor\" data-id=\"4da8b28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li><strong>Protect the business<\/strong> and operational continuity of customers, partners and authorities<\/li>\n<li><strong>Reduce cyber risk<\/strong> where it is most exposed<\/li>\n<li><strong>Meet regulatory requirements<\/strong> (<a href=\"https:\/\/netsystem.fr\/en\/nis2-certification-and-compliance\/\">NIS2<\/a>, <a href=\"https:\/\/netsystem.fr\/en\/dora-certification-compliance\/\">DORA<\/a>, <a href=\"https:\/\/netsystem.fr\/en\/iso27001-certification-audit-and-consulting-firm\/\">ISO27001<\/a>\u2026)<\/li>\n<li><strong>Protect the liability of managers<\/strong><\/li>\n<li><strong>Secure supplier and contractual relationships<\/strong><\/li>\n<li><strong>Strengthen the confidence<\/strong> of stakeholders (customers, partners, investors, insurers, etc.)<\/li>\n<li>Move from reactive management to <strong>strategic steering<\/strong><\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16673bb elementor-widget-laptop__width-initial elementor-widget__width-auto elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"16673bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-16673bb\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"16673bb\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"why-cyber-risk-no-longer-stops-at-your-it-system\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-2341\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">Why cyber risk no longer stops at your IT system<\/span><svg aria-hidden=\"true\" class=\"fa-toggle e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/div><div id=\"elementor-tab-content-2341\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"why-cyber-risk-no-longer-stops-at-your-it-system\"><ul>\n<li>Increase in the number of IT and cloud service providers<\/li>\n<li>Critical dependencies on third parties that are poorly assessed or not assessed at all<\/li>\n<li>Limited visibility into their security practices<\/li>\n<li>Legal, financial and operational risks in the event of an incident<\/li>\n<\/ul>\n<p>Today, your level of security also (and above all) depends on that of your suppliers.<\/p>\n<\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e1995c elementor-widget elementor-widget-eael-testimonial\" data-id=\"2e1995c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-testimonial.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t<div id=\"eael-testimonial-2e1995c\" class=\"eael-testimonial-item clearfix testimonial-avatar-rounded icon-img-left-content\">\n\t\t\t\t\n\t\t\n\t\t\n\t\t\t\t\t\t\t\t<div class=\"eael-testimonial-image\">\n\t\t\t\t\t\t\t\t\t<figure><img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/06\/OCA-square-768x768.png\" class=\"attachment-medium_large size-medium_large wp-image-10839\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/06\/OCA-square-768x768.png 768w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/06\/OCA-square-300x300.png 300w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/06\/OCA-square-150x150.png 150w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/06\/OCA-square.png 819w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-testimonial-content\">\n\t\t\t\t<div class=\"eael-testimonial-text\"><p>With the Netsystem TPRM offering, transform supplier risk management into a real lever for cyber control, regulatory compliance and operational resilience.<\/p>\n<\/div>\t\t\t\t<div class=\"bio-text clearfix\">\n\t\t\t\t\t<p class=\"eael-testimonial-user\" style=\"display: block; float: none;\">Olivier CAZZULO<\/p><p class=\"eael-testimonial-user-company\">Netsystem CEO<\/p>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t<span class=\"eael-testimonial-quote\"><\/span>\n\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9c817d7 e-flex e-con-boxed e-con e-child\" data-id=\"9c817d7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56d13da elementor-widget elementor-widget-heading\" data-id=\"56d13da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Information\/quote for a third-party cyber risk audit<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e5c827 elementor-widget elementor-widget-text-editor\" data-id=\"8e5c827\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<form id=\"foss-66cf82d7d59cbc5c777a8eb6\"><\/form>\n<p><script async src='https:\/\/api.plezi.co\/api\/v1\/web_forms\/scripts?tenant_id=63b2e27754067a2e9841f03e&#038;form_id=66cf7d44d59cbc5c6b7a83dd&#038;form_version=3&#038;content_web_form_id=66cf82d7d59cbc5c777a8eb6&#038;plz_lang=fr'><\/script><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e70c4ae e-flex e-con-boxed e-con e-parent\" data-id=\"e70c4ae\" data-element_type=\"container\" data-e-type=\"container\" id=\"offre\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcc708d elementor-widget elementor-widget-heading\" data-id=\"bcc708d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Manage and reduce your third-party cyber risks with a structured, compliant and tool-based TPRM approach.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e05d132 elementor-widget elementor-widget-heading\" data-id=\"e05d132\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Our TPRM approach: pragmatic, progressive and results-oriented.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f883fd elementor-widget elementor-widget-text-editor\" data-id=\"5f883fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our cybersecurity experts assist you in identifying and managing third-party cyber risks. We offer tailored support covering:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4820fb9 elementor-widget elementor-widget-eael-content-timeline\" data-id=\"4820fb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-content-timeline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div id=\"eael-content-timeline-4820fb9\" class=\"content-timeline-layout-right date-position-outside horizontal-timeline-wrapper\" data-slide_to_scroll=\"{&quot;desktop&quot;:1,&quot;mobile&quot;:1,&quot;tablet&quot;:1,&quot;laptop&quot;:1,&quot;widescreen&quot;:1}\">\n\t\t\t<div class=\"eael-content-timeline-container\">\n\t\t\t\t<div class=\"eael-content-timeline-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-content-timeline-block\">\n    <div class=\"eael-content-timeline-line\">\n        <div class=\"eael-content-timeline-inner\"><\/div>\n    <\/div>\n    <div class=\"eael-content-timeline-img eael-picture \"><svg class=\"e-font-icon-svg e-fas-power-off\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M400 54.1c63 45 104 118.6 104 201.9 0 136.8-110.8 247.7-247.5 248C120 504.3 8.2 393 8 256.4 7.9 173.1 48.9 99.3 111.8 54.2c11.7-8.3 28-4.8 35 7.7L162.6 90c5.9 10.5 3.1 23.8-6.6 31-41.5 30.8-68 79.6-68 134.9-.1 92.3 74.5 168.1 168 168.1 91.6 0 168.6-74.2 168-169.1-.3-51.8-24.7-101.8-68.1-134-9.7-7.2-12.4-20.5-6.5-30.9l15.8-28.1c7-12.4 23.2-16.1 34.8-7.8zM296 264V24c0-13.3-10.7-24-24-24h-32c-13.3 0-24 10.7-24 24v240c0 13.3 10.7 24 24 24h32c13.3 0 24-10.7 24-24z\"><\/path><\/svg><\/div><div class=\"eael-content-timeline-content\"><span class=\"eael-date\">01<\/span><h4 class=\"eael-timeline-title\">Map and prioritise your third parties<\/h4><div class=\"eael-timeline-excerpt\"><p>We identify your suppliers and partners according to:<\/p>\n<ul style=\"color: #ffffff\">\n<li>Their business criticality (A: strategic, B: critical, C: recurring),<\/li>\n<li>Their level of access to IT systems and data,<\/li>\n<li>Their potential impact in the event of an incident.<\/li>\n<\/ul>\n<p><span style=\"color: #ffcc99\"><strong>Result<\/strong>: a clear and prioritised view of your exposure to third-party risks.<\/span><\/p>\n<\/div><\/div><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-content-timeline-block\">\n    <div class=\"eael-content-timeline-line\">\n        <div class=\"eael-content-timeline-inner\"><\/div>\n    <\/div>\n    <div class=\"eael-content-timeline-img eael-picture \"><svg class=\"e-font-icon-svg e-far-list-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 32H48C21.49 32 0 53.49 0 80v352c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V80c0-26.51-21.49-48-48-48zm-6 400H54a6 6 0 0 1-6-6V86a6 6 0 0 1 6-6h404a6 6 0 0 1 6 6v340a6 6 0 0 1-6 6zm-42-92v24c0 6.627-5.373 12-12 12H204c-6.627 0-12-5.373-12-12v-24c0-6.627 5.373-12 12-12h200c6.627 0 12 5.373 12 12zm0-96v24c0 6.627-5.373 12-12 12H204c-6.627 0-12-5.373-12-12v-24c0-6.627 5.373-12 12-12h200c6.627 0 12 5.373 12 12zm0-96v24c0 6.627-5.373 12-12 12H204c-6.627 0-12-5.373-12-12v-24c0-6.627 5.373-12 12-12h200c6.627 0 12 5.373 12 12zm-252 12c0 19.882-16.118 36-36 36s-36-16.118-36-36 16.118-36 36-36 36 16.118 36 36zm0 96c0 19.882-16.118 36-36 36s-36-16.118-36-36 16.118-36 36-36 36 16.118 36 36zm0 96c0 19.882-16.118 36-36 36s-36-16.118-36-36 16.118-36 36-36 36 16.118 36 36z\"><\/path><\/svg><\/div><div class=\"eael-content-timeline-content\"><span class=\"eael-date\">02<\/span><h4 class=\"eael-timeline-title\">Assess cyber and compliance risks<\/h4><div class=\"eael-timeline-excerpt\"><p>We tailor the level of assessment to each type of third party:<\/p>\n<ul style=\"color: #ffffff\">\n<li>Targeted cybersecurity questionnaires,<\/li>\n<li>Analysis of practices and standards,<\/li>\n<li>Supplier risk scoring,<\/li>\n<li>Regulatory alignment (NIS2, DORA, GDPR, ISO).<\/li>\n<\/ul>\n<p><span style=\"color: #ffcc99\"><strong>Result<\/strong>: a realistic and actionable assessment.<\/span><\/p>\n<\/div><\/div><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-content-timeline-block\">\n    <div class=\"eael-content-timeline-line\">\n        <div class=\"eael-content-timeline-inner\"><\/div>\n    <\/div>\n    <div class=\"eael-content-timeline-img eael-picture \"><svg class=\"e-font-icon-svg e-fas-user-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 373.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 400.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM224 256c70.7 0 128-57.3 128-128S294.7 0 224 0 96 57.3 96 128s57.3 128 128 128zm201.2 226.5c-2.3-1.2-4.6-2.6-6.8-3.9l-7.9 4.6c-6 3.4-12.8 5.3-19.6 5.3-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-5.5-17.7 1.9-36.4 17.9-45.7l7.9-4.6c-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-16-9.2-23.4-28-17.9-45.7.9-2.9 2.2-5.8 3.2-8.7-3.8-.3-7.5-1.2-11.4-1.2h-16.7c-22.2 10.2-46.9 16-72.9 16s-50.6-5.8-72.9-16h-16.7C60.2 288 0 348.2 0 422.4V464c0 26.5 21.5 48 48 48h352c10.1 0 19.5-3.2 27.2-8.5-1.2-3.8-2-7.7-2-11.8v-9.2z\"><\/path><\/svg><\/div><div class=\"eael-content-timeline-content\"><span class=\"eael-date\">03<\/span><h4 class=\"eael-timeline-title\">Managing risks and supplier commitments<\/h4><div class=\"eael-timeline-excerpt\"><p>We support you in:<\/p>\n<ul style=\"color: #ffffff\">\n<li>Defining clear cyber requirements,<\/li>\n<li>Formalising remediation plans,<\/li>\n<li>Monitoring commitments over time,<\/li>\n<li>Implementing performance indicators.<\/li>\n<\/ul>\n<p><span style=\"color: #ffcc99\"><strong>Result<\/strong>: a dynamic TPRM integrated into your business processes.<\/span><\/p>\n<\/div><\/div><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"eael-content-timeline-block\">\n    <div class=\"eael-content-timeline-line\">\n        <div class=\"eael-content-timeline-inner\"><\/div>\n    <\/div>\n    <div class=\"eael-content-timeline-img eael-picture \"><svg class=\"e-font-icon-svg e-fas-anchor\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M12.971 352h32.394C67.172 454.735 181.944 512 288 512c106.229 0 220.853-57.38 242.635-160h32.394c10.691 0 16.045-12.926 8.485-20.485l-67.029-67.029c-4.686-4.686-12.284-4.686-16.971 0l-67.029 67.029c-7.56 7.56-2.206 20.485 8.485 20.485h35.146c-20.29 54.317-84.963 86.588-144.117 94.015V256h52c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12h-52v-5.47c37.281-13.178 63.995-48.725 64-90.518C384.005 43.772 341.605.738 289.37.01 235.723-.739 192 42.525 192 96c0 41.798 26.716 77.35 64 90.53V192h-52c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h52v190.015c-58.936-7.399-123.82-39.679-144.117-94.015h35.146c10.691 0 16.045-12.926 8.485-20.485l-67.029-67.029c-4.686-4.686-12.284-4.686-16.971 0L4.485 331.515C-3.074 339.074 2.28 352 12.971 352zM288 64c17.645 0 32 14.355 32 32s-14.355 32-32 32-32-14.355-32-32 14.355-32 32-32z\"><\/path><\/svg><\/div><div class=\"eael-content-timeline-content\"><span class=\"eael-date\">04<\/span><h4 class=\"eael-timeline-title\">Embedding TPRM in your cyber governance<\/h4><div class=\"eael-timeline-excerpt\"><p>Third-party risk management is integrated into:<\/p>\n<ul style=\"color: #ffffff\">\n<li>Your cybersecurity strategy,<\/li>\n<li>Your RSSI governance,<\/li>\n<li>Your BCP\/DRP and crisis management systems,<\/li>\n<li>Your audits and certification processes.<\/li>\n<\/ul>\n<p><span style=\"color: #ffcc99\"><strong>Result<\/strong>: a sustainable, consistent and auditable approach.<\/span><\/p>\n<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90a684c elementor-share-buttons--view-icon elementor-share-buttons--skin-framed elementor-share-buttons--shape-circle elementor-share-buttons--color-custom elementor-grid-0 elementor-widget elementor-widget-share-buttons\" data-id=\"90a684c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_email\" role=\"button\" tabindex=\"0\" aria-label=\"Share on email\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Share on whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-whatsapp\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M380.9 97.1C339 55.1 283.2 32 223.9 32c-122.4 0-222 99.6-222 222 0 39.1 10.2 77.3 29.6 111L0 480l117.7-30.9c32.4 17.7 68.9 27 106.1 27h.1c122.3 0 224.1-99.6 224.1-222 0-59.3-25.2-115-67.1-157zm-157 341.6c-33.2 0-65.7-8.9-94-25.7l-6.7-4-69.8 18.3L72 359.2l-4.4-7c-18.5-29.4-28.2-63.3-28.2-98.2 0-101.7 82.8-184.5 184.6-184.5 49.3 0 95.6 19.2 130.4 54.1 34.8 34.9 56.2 81.2 56.1 130.5 0 101.8-84.9 184.6-186.6 184.6zm101.2-138.2c-5.5-2.8-32.8-16.2-37.9-18-5.1-1.9-8.8-2.8-12.5 2.8-3.7 5.6-14.3 18-17.6 21.8-3.2 3.7-6.5 4.2-12 1.4-32.6-16.3-54-29.1-75.5-66-5.7-9.8 5.7-9.1 16.3-30.3 1.8-3.7.9-6.9-.5-9.7-1.4-2.8-12.5-30.1-17.1-41.2-4.5-10.8-9.1-9.3-12.5-9.5-3.2-.2-6.9-.2-10.6-.2-3.7 0-9.7 1.4-14.8 6.9-5.1 5.6-19.4 19-19.4 46.3 0 27.3 19.9 53.7 22.6 57.4 2.8 3.7 39.1 59.7 94.8 83.8 35.2 15.2 49 16.5 66.6 13.9 10.7-1.6 32.8-13.4 37.4-26.4 4.6-13 4.6-24.1 3.2-26.4-1.3-2.5-5-3.9-10.5-6.6z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b2c3ddf e-flex e-con-boxed e-con e-parent\" data-id=\"b2c3ddf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a0e5fc elementor-widget elementor-widget-heading\" data-id=\"9a0e5fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pragmatic support with the right tools<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f64f87 e-con-full e-flex e-con e-child\" data-id=\"6f64f87\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7f4d42e e-con-full e-flex e-con e-child\" data-id=\"7f4d42e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47f4c18 elementor-widget elementor-widget-text-editor\" data-id=\"47f4c18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>To industrialise and sustain third-party risk management<\/strong>, Netsystem relies on the solution provided by its partner <span style=\"color: #00ccff;\"><a style=\"color: #00ccff;\" href=\"https:\/\/conitiv.ai\/\" target=\"_blank\" rel=\"noopener\">CONITIV<\/a><\/span>.<\/p>\n<p>The concrete benefits of the <span style=\"color: #00ccff;\"><a style=\"color: #21affc;\" href=\"https:\/\/conitiv.ai\/\" target=\"_blank\" rel=\"noopener\">CONITIV third-party management solution<\/a><\/span> enable you to increase efficiency without overburdening your teams:<\/p>\n<ul>\n<li>Centralisation of all third parties,<\/li>\n<li>Customisable cybersecurity questionnaires,<\/li>\n<li>Automatic supplier risk scoring,<\/li>\n<li>Action plan monitoring,<\/li>\n<li>Clear dashboards for management,<\/li>\n<li>Full traceability for audits and regulators.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bc479b elementor-blockquote--skin-border elementor-widget elementor-widget-blockquote\" data-id=\"6bc479b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\t\"As part of a structured, well-equipped and sustainable TPRM approach, we felt it was essential to rely on a solution capable of industrialising supplier risk management.\r\n\r\nThe partnership with CONITIV is fully in line with this vision: combining Netsystem's consulting expertise with a powerful, rapidly deployable, collaborative and traceable platform.\r\nTogether, we enable our clients to regain control over their third-party risks and transform TPRM into a real lever for governance and resilience.\" \t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">Olivier CAZZULO, CEO de Netsystem<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc20224 e-con-full e-flex e-con e-child\" data-id=\"cc20224\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f71578b elementor-widget elementor-widget-image\" data-id=\"f71578b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1539\" height=\"852\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/02\/TPRM_logiciel_gestion_tiers_conitiv.gif\" class=\"attachment-full size-full wp-image-13928\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a98f3c6 elementor-widget elementor-widget-image\" data-id=\"a98f3c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"819\" height=\"252\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/02\/Conitiv-footer-logotype.webp\" class=\"attachment-full size-full wp-image-13929\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/02\/Conitiv-footer-logotype.webp 819w, https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/02\/Conitiv-footer-logotype-300x92.webp 300w, https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/02\/Conitiv-footer-logotype-768x236.webp 768w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8918db2 elementor-widget elementor-widget-heading\" data-id=\"8918db2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Beyond cyber and compliance aspects, the CONITIV platform can also audit your third parties on CSR and solvency aspects.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8bdbd56 e-con-full e-flex e-con e-child\" data-id=\"8bdbd56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ee07b29 e-con-full e-flex e-con e-child\" data-id=\"ee07b29\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fda76da elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"fda76da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-globe-americas\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M248 8C111.03 8 0 119.03 0 256s111.03 248 248 248 248-111.03 248-248S384.97 8 248 8zm82.29 357.6c-3.9 3.88-7.99 7.95-11.31 11.28-2.99 3-5.1 6.7-6.17 10.71-1.51 5.66-2.73 11.38-4.77 16.87l-17.39 46.85c-13.76 3-28 4.69-42.65 4.69v-27.38c1.69-12.62-7.64-36.26-22.63-51.25-6-6-9.37-14.14-9.37-22.63v-32.01c0-11.64-6.27-22.34-16.46-27.97-14.37-7.95-34.81-19.06-48.81-26.11-11.48-5.78-22.1-13.14-31.65-21.75l-.8-.72a114.792 114.792 0 0 1-18.06-20.74c-9.38-13.77-24.66-36.42-34.59-51.14 20.47-45.5 57.36-82.04 103.2-101.89l24.01 12.01C203.48 89.74 216 82.01 216 70.11v-11.3c7.99-1.29 16.12-2.11 24.39-2.42l28.3 28.3c6.25 6.25 6.25 16.38 0 22.63L264 112l-10.34 10.34c-3.12 3.12-3.12 8.19 0 11.31l4.69 4.69c3.12 3.12 3.12 8.19 0 11.31l-8 8a8.008 8.008 0 0 1-5.66 2.34h-8.99c-2.08 0-4.08.81-5.58 2.27l-9.92 9.65a8.008 8.008 0 0 0-1.58 9.31l15.59 31.19c2.66 5.32-1.21 11.58-7.15 11.58h-5.64c-1.93 0-3.79-.7-5.24-1.96l-9.28-8.06a16.017 16.017 0 0 0-15.55-3.1l-31.17 10.39a11.95 11.95 0 0 0-8.17 11.34c0 4.53 2.56 8.66 6.61 10.69l11.08 5.54c9.41 4.71 19.79 7.16 30.31 7.16s22.59 27.29 32 32h66.75c8.49 0 16.62 3.37 22.63 9.37l13.69 13.69a30.503 30.503 0 0 1 8.93 21.57 46.536 46.536 0 0 1-13.72 32.98zM417 274.25c-5.79-1.45-10.84-5-14.15-9.97l-17.98-26.97a23.97 23.97 0 0 1 0-26.62l19.59-29.38c2.32-3.47 5.5-6.29 9.24-8.15l12.98-6.49C440.2 193.59 448 223.87 448 256c0 8.67-.74 17.16-1.82 25.54L417 274.25z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCSR\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tReduce the risk of controversy and accelerate your transition to sustainability.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e9a6883 e-con-full e-flex e-con e-child\" data-id=\"e9a6883\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f86476 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"5f86476\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-euro-sign\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M310.706 413.765c-1.314-6.63-7.835-10.872-14.424-9.369-10.692 2.439-27.422 5.413-45.426 5.413-56.763 0-101.929-34.79-121.461-85.449h113.689a12 12 0 0 0 11.708-9.369l6.373-28.36c1.686-7.502-4.019-14.631-11.708-14.631H115.22c-1.21-14.328-1.414-28.287.137-42.245H261.95a12 12 0 0 0 11.723-9.434l6.512-29.755c1.638-7.484-4.061-14.566-11.723-14.566H130.184c20.633-44.991 62.69-75.03 117.619-75.03 14.486 0 28.564 2.25 37.851 4.145 6.216 1.268 12.347-2.498 14.002-8.623l11.991-44.368c1.822-6.741-2.465-13.616-9.326-14.917C290.217 34.912 270.71 32 249.635 32 152.451 32 74.03 92.252 45.075 176H12c-6.627 0-12 5.373-12 12v29.755c0 6.627 5.373 12 12 12h21.569c-1.009 13.607-1.181 29.287-.181 42.245H12c-6.627 0-12 5.373-12 12v28.36c0 6.627 5.373 12 12 12h30.114C67.139 414.692 145.264 480 249.635 480c26.301 0 48.562-4.544 61.101-7.788 6.167-1.595 10.027-7.708 8.788-13.957l-8.818-44.49z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSOLVENCY\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAnticipate third-party defaults with the Conitiv Solvency Score.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53f2364 e-flex e-con-boxed e-con e-parent\" data-id=\"53f2364\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1302436 e-con-full e-flex e-con e-child\" data-id=\"1302436\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e3b9ced e-con-full e-flex e-con e-child\" data-id=\"e3b9ced\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1f2e89 elementor-widget elementor-widget-heading\" data-id=\"a1f2e89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A turnkey TPRM solution to meet NIS2, DORA and ISO 27001 requirements<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2eef3f elementor-widget elementor-widget-text-editor\" data-id=\"d2eef3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tRegulations significantly strengthen companies&#8217; obligations in terms of:<br><ul>\r\n \t<li>Critical supplier management,<\/li>\r\n \t<li>Control of the subcontracting chain,<\/li>\r\n \t<li>Traceability and cyber risk management.<\/li>\r\n<\/ul><br>Our TPRM offering enables you to:<br><ul>\r\n \t<li>Meet NIS2 and DORA requirements,<\/li>\r\n \t<li>Strengthen your ISO 27001 compliance,<\/li>\r\n \t<li>Reassure regulators, insurers and partners,<\/li>\r\n \t<li>Demonstrate mature and auditable cyber governance.<\/li>\r\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ad02e6 elementor-widget elementor-widget-text-editor\" data-id=\"2ad02e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>TPRM becomes a key pillar of your cybersecurity governance.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-067d5f7 e-con-full e-flex e-con e-child\" data-id=\"067d5f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5a6260 elementor-widget elementor-widget-image\" data-id=\"d5a6260\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/content.netsystem.fr\/integrer-tprm-exigences-nis2\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1165\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/02\/TPRM_NIS2.png\" class=\"attachment-full size-full wp-image-13930\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/02\/TPRM_NIS2.png 1000w, https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/02\/TPRM_NIS2-258x300.png 258w, https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/02\/TPRM_NIS2-879x1024.png 879w, https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/02\/TPRM_NIS2-768x895.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-background-color=\"#115EB100\" class=\"elementor-element elementor-element-344d99b elementor-align-center elementor-widget elementor-widget-button\" data-id=\"344d99b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/content.netsystem.fr\/integrer-tprm-exigences-nis2\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the TPRM &amp; NIS2 white paper<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3513fb3 e-flex e-con-boxed e-con e-parent\" data-id=\"3513fb3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f5461b elementor-widget elementor-widget-heading\" data-id=\"8f5461b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Netsystem is PASSI qualified<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd51871 e-con-full e-flex e-con e-child\" data-id=\"cd51871\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8b0f48a e-con-full e-flex e-con e-child\" data-id=\"8b0f48a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85968f6 elementor-widget elementor-widget-text-editor\" data-id=\"85968f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The PASSI qualification is issued by the French National Cybersecurity Agency (<a href=\"https:\/\/cyber.gouv.fr\/\" target=\"_blank\" rel=\"noopener\">ANSSI<\/a>).<\/p>\n<p>It is intended for <strong>trusted service providers who carry out organisational and physical security audits, as well as technical audits<\/strong>, on their own behalf or on behalf of their clients.<\/p>\n<p>It is a real guarantee of quality and expertise for organisations looking for a cybersecurity consulting firm to audit their structure.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-dce-background-color=\"#115EB100\" class=\"elementor-element elementor-element-6e3694e elementor-widget elementor-widget-button\" data-id=\"6e3694e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/netsystem.fr\/netsystem-obtient-la-qualification-passi\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-bullhorn\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M576 240c0-23.63-12.95-44.04-32-55.12V32.01C544 23.26 537.02 0 512 0c-7.12 0-14.19 2.38-19.98 7.02l-85.03 68.03C364.28 109.19 310.66 128 256 128H64c-35.35 0-64 28.65-64 64v96c0 35.35 28.65 64 64 64h33.7c-1.39 10.48-2.18 21.14-2.18 32 0 39.77 9.26 77.35 25.56 110.94 5.19 10.69 16.52 17.06 28.4 17.06h74.28c26.05 0 41.69-29.84 25.9-50.56-16.4-21.52-26.15-48.36-26.15-77.44 0-11.11 1.62-21.79 4.41-32H256c54.66 0 108.28 18.81 150.98 52.95l85.03 68.03a32.023 32.023 0 0 0 19.98 7.02c24.92 0 32-22.78 32-32V295.13C563.05 284.04 576 263.63 576 240zm-96 141.42l-33.05-26.44C392.95 311.78 325.12 288 256 288v-96c69.12 0 136.95-23.78 190.95-66.98L480 98.58v282.84z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Find out more about certification<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f79f682 e-con-full e-flex e-con e-child\" data-id=\"f79f682\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec3f0f3 elementor-widget elementor-widget-image\" data-id=\"ec3f0f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"648\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/09\/PASSI.png\" class=\"attachment-large size-large wp-image-7215\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/09\/PASSI.png 800w, https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/09\/PASSI-300x243.png 300w, https:\/\/netsystem.fr\/wp-content\/uploads\/2024\/09\/PASSI-768x622.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ecab3b e-flex e-con-boxed e-con e-parent\" data-id=\"0ecab3b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-267a9d4 e-con-full e-flex e-con e-child\" data-id=\"267a9d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-08420be e-con-full e-flex e-con e-child\" data-id=\"08420be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-548f84d elementor-widget elementor-widget-heading\" data-id=\"548f84d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why choose Netsystem?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-759df66 elementor-widget elementor-widget-text-editor\" data-id=\"759df66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Independent consulting firm<\/li>\n<li>Strong expertise in cybersecurity, governance and compliance<\/li>\n<li>Value creation as the guiding principle behind our commitments<\/li>\n<li>Senior consultants, expert and operational approach<\/li>\n<li>Ability to provide support or outsource RSSI services<\/li>\n<li>Pragmatic, value- and results-oriented approach<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef5883d elementor-blockquote--skin-border elementor-widget elementor-widget-blockquote\" data-id=\"ef5883d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tThird-party risk management is not just a matter of compliance; it is a key issue in cybersecurity and resilience.\r\n\r\nAt Netsystem, we support our clients in implementing pragmatic TPRM approaches that are tailored to their maturity level and can be effectively managed over time.\r\n\r\nThe objective is clear: to regain control over supplier risks, strengthen cyber governance and make organisations more autonomous and resilient.\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">Vincent FERRARA, Head of Digital Trust practice<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-31d22fa e-con-full e-flex e-con e-child\" data-id=\"31d22fa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2a781e elementor-widget elementor-widget-image\" data-id=\"f2a781e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"855\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-768x855.png\" class=\"attachment-medium_large size-medium_large wp-image-9495\" alt=\"\" srcset=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-768x855.png 768w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-270x300.png 270w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25-920x1024.png 920w, https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/03\/VFE25.png 1000w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fe3050d e-flex e-con-boxed e-con e-parent\" data-id=\"fe3050d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1cbad7 elementor-widget elementor-widget-heading\" data-id=\"c1cbad7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Some clients<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78fd3b9 elementor-pagination-type-bullets elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-loop-carousel\" data-id=\"78fd3b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:4681,&quot;slides_to_show&quot;:&quot;6&quot;,&quot;_skin&quot;:&quot;post&quot;,&quot;slides_to_show_widescreen&quot;:&quot;3&quot;,&quot;slides_to_show_laptop&quot;:&quot;3&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;.elementor-loop-container&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-carousel.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26592ce e-con-full e-flex e-con e-child\" data-id=\"26592ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d2bc32 elementor-widget elementor-widget-heading\" data-id=\"5d2bc32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Examples of projects carried out<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e189162 elementor-widget elementor-widget-eael-post-carousel\" data-id=\"e189162\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;items&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:3,&quot;sizes&quot;:[]},&quot;items_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;items_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;items_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:2,&quot;sizes&quot;:[]},&quot;items_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]}}\" data-widget_type=\"eael-post-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"swiper-container-wrap eael-post-grid-container eael-post-carousel-wrap eael-post-carousel-style-one swiper-container-wrap-dots-outside\" id=\"eael-post-grid-e189162\">\n\t\t\t            <div class=\"swiper swiper-8 eael-post-carousel eael-post-grid swiper-container-e189162 eael-post-appender-e189162\" data-pagination=\".swiper-pagination-e189162\" data-arrow-next=\".swiper-button-next-e189162\" data-arrow-prev=\".swiper-button-prev-e189162\" data-items-mobile=\"1\" data-items-tablet=\"2\" data-items=\"3\" data-margin=\"10\" data-effect=\"slide\" data-speed=\"400\" data-autoplay=\"3000\" data-pause-on-hover=\"true\" data-loop=\"1\" data-dots=\"1\">\n                <div class=\"swiper-wrapper\">\n\t\t\t\t\t<div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media eael-entry-medianone\"><div class=\"eael-entry-overlay fade-in\"><a href=\"https:\/\/netsystem.fr\/en\/cas-client\/pam-building-outsourced-chief-information-security-officer-as-a-service\/\"><\/a><\/div><div class=\"eael-entry-thumbnail eael-image-ratio\">\n                    <img decoding=\"async\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/04\/RSSI_Pam_Building.jpg\" alt=\"\">\n                <\/div><\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/pam-building-outsourced-chief-information-security-officer-as-a-service\/\" title=\"Pam Building: Outsourced Chief Information Security Officer (&#8220;as a service&#8221;)\"><h4 class=\"eael-entry-title\">Pam Building: Outsourced Chief Information Security Officer (&#8220;as a service&#8221;)<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-media eael-entry-medianone\"><div class=\"eael-entry-overlay fade-in\"><a href=\"https:\/\/netsystem.fr\/en\/cas-client\/quick-outsourced-ciso-as-a-service\/\"><\/a><\/div><div class=\"eael-entry-thumbnail eael-image-ratio\">\n                    <img decoding=\"async\" src=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2026\/04\/RSSI_Quick.jpg\" alt=\"\">\n                <\/div><\/div><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/quick-outsourced-ciso-as-a-service\/\" title=\"Quick: Outsourced CISO (&#8220;as a service&#8221;)\"><h4 class=\"eael-entry-title\">Quick: Outsourced CISO (&#8220;as a service&#8221;)<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/solimut-ebcp-update-and-crisis-exercise\/\" title=\"Solimut: EBCP update and crisis exercise\"><h4 class=\"eael-entry-title\">Solimut: EBCP update and crisis exercise<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/delfingen-tisax-certification-rssi-as-a-service\/\" title=\"Delfingen: TISAX certification &#038; RSSI as a service\"><h4 class=\"eael-entry-title\">Delfingen: TISAX certification &#038; RSSI as a service<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/sepur-gap-analysis-and-nis2-compliance\/\" title=\"SEPUR: Gap analysis and NIS2 compliance\"><h4 class=\"eael-entry-title\">SEPUR: Gap analysis and NIS2 compliance<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/irts-passi-audit-cybersecurity-diagnosis\/\" title=\"IRTS: PASSI Audit &#8211; Cybersecurity Diagnosis\"><h4 class=\"eael-entry-title\">IRTS: PASSI Audit &#8211; Cybersecurity Diagnosis<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/emera-group-nis2-compliance-ciso-as-a-service\/\" title=\"EMERA Group: NIS2 compliance &#038; CISO as a Service\"><h4 class=\"eael-entry-title\">EMERA Group: NIS2 compliance &#038; CISO as a Service<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/carambar-ciso-as-a-service-and-global-cybersecurity-programme\/\" title=\"Carambar: CISO as a Service and global cybersecurity programme\"><h4 class=\"eael-entry-title\">Carambar: CISO as a Service and global cybersecurity programme<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/kerialis-rssi-as-a-service-dora-gap-analysis\/\" title=\"Kerialis: RSSI as a service &#038; DORA Gap analysis\"><h4 class=\"eael-entry-title\">Kerialis: RSSI as a service &#038; DORA Gap analysis<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div><div class=\"swiper-slide\"><article class=\"eael-grid-post eael-post-grid-column\">\n    <div class=\"eael-grid-post-holder\">\n        <div class=\"eael-grid-post-holder-inner\"><div class=\"eael-entry-wrapper\"><header class=\"eael-entry-header\"><a class=\"eael-grid-post-link\" href=\"https:\/\/netsystem.fr\/en\/cas-client\/neovacom\/\" title=\"Docoon.immo (formerly Neovacom) : ISO 27001 certification\"><h4 class=\"eael-entry-title\">Docoon.immo (formerly Neovacom) : ISO 27001 certification<\/a><\/h4><\/header><\/div><div class=\"eael-entry-content\">\n\t\t\t\t<div class=\"eael-grid-post-excerpt\"><p><\/p><\/div>\n\t\t\t<\/div><div class=\"eael-entry-footer\"><div class=\"eael-entry-meta\"><\/div><\/div><\/div><\/div><\/article><\/div>                <\/div>\n            <\/div>\n            <div class=\"clearfix\"><\/div>\n\t\t\t            <!-- Add Pagination -->\n            <div class=\"swiper-pagination swiper-pagination-e189162\"><\/div>\n\t\t        <\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bec0735 e-flex e-con-boxed e-con e-parent\" data-id=\"bec0735\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34a86a3 elementor-widget elementor-widget-heading\" data-id=\"34a86a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">To find out more about cyber security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-938ddb4 elementor-widget elementor-widget-eael-post-timeline\" data-id=\"938ddb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-post-timeline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"eael-post-timeline-938ddb4\" class=\"eael-post-timeline timeline-layout-default eael-post-timeline-arrow-\">\n            <div class=\"eael-post-timeline eael-post-appender eael-post-appender-938ddb4\"><p class=\"no-posts-found\">No posts found!<\/p><\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>TPRM: Third-party cyber risk audit and management Control your third parties&#8217; cyber risks before they become your own. Our offer The challenges for your organization Protect the business and operational continuity of customers, partners and authorities Reduce cyber risk where it is most exposed Meet regulatory requirements (NIS2, DORA, ISO27001\u2026) Protect the liability of managers [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-13934","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TPRM Expert Firm: quote for third-party cyber risk audit<\/title>\n<meta name=\"description\" content=\"Manage and reduce your third-party cyber risks with a structured, compliant and tool-based TPRM approach. Quick quote from our cybersecurity experts\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TPRM Expert Firm: quote for third-party cyber risk audit\" \/>\n<meta property=\"og:description\" content=\"Manage and reduce your third-party cyber risks with a structured, compliant and tool-based TPRM approach. Quick quote from our cybersecurity experts\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/\" \/>\n<meta property=\"og:site_name\" content=\"Netsystem\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-10T17:50:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/06\/OCA-square.png\" \/>\n\t<meta property=\"og:image:width\" content=\"819\" \/>\n\t<meta property=\"og:image:height\" content=\"819\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/tprm-quote-third-party-risk-management-audit-and-oversight\\\/\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/tprm-quote-third-party-risk-management-audit-and-oversight\\\/\",\"name\":\"TPRM Expert Firm: quote for third-party cyber risk audit\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/tprm-quote-third-party-risk-management-audit-and-oversight\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/tprm-quote-third-party-risk-management-audit-and-oversight\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/OCA-square-768x768.png\",\"datePublished\":\"2026-02-04T13:38:13+00:00\",\"dateModified\":\"2026-02-10T17:50:58+00:00\",\"description\":\"Manage and reduce your third-party cyber risks with a structured, compliant and tool-based TPRM approach. Quick quote from our cybersecurity experts\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/tprm-quote-third-party-risk-management-audit-and-oversight\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netsystem.fr\\\/en\\\/tprm-quote-third-party-risk-management-audit-and-oversight\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/tprm-quote-third-party-risk-management-audit-and-oversight\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/OCA-square-768x768.png\",\"contentUrl\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/OCA-square-768x768.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/tprm-quote-third-party-risk-management-audit-and-oversight\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TPRM quote: third-party risk management audit and oversight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/\",\"name\":\"Netsystem\",\"description\":\"Soci\u00e9t\u00e9 de conseil en Syst\u00e8mes d\u2019Informations et en transformation digitale.\",\"publisher\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#organization\",\"name\":\"Netsystem\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/netsystem-logo-v3.png\",\"contentUrl\":\"https:\\\/\\\/netsystem.fr\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/netsystem-logo-v3.png\",\"width\":600,\"height\":186,\"caption\":\"Netsystem\"},\"image\":{\"@id\":\"https:\\\/\\\/netsystem.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TPRM Expert Firm: quote for third-party cyber risk audit","description":"Manage and reduce your third-party cyber risks with a structured, compliant and tool-based TPRM approach. Quick quote from our cybersecurity experts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/","og_locale":"en_US","og_type":"article","og_title":"TPRM Expert Firm: quote for third-party cyber risk audit","og_description":"Manage and reduce your third-party cyber risks with a structured, compliant and tool-based TPRM approach. Quick quote from our cybersecurity experts","og_url":"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/","og_site_name":"Netsystem","article_modified_time":"2026-02-10T17:50:58+00:00","og_image":[{"width":819,"height":819,"url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/06\/OCA-square.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/","url":"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/","name":"TPRM Expert Firm: quote for third-party cyber risk audit","isPartOf":{"@id":"https:\/\/netsystem.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/#primaryimage"},"image":{"@id":"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/#primaryimage"},"thumbnailUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/06\/OCA-square-768x768.png","datePublished":"2026-02-04T13:38:13+00:00","dateModified":"2026-02-10T17:50:58+00:00","description":"Manage and reduce your third-party cyber risks with a structured, compliant and tool-based TPRM approach. Quick quote from our cybersecurity experts","breadcrumb":{"@id":"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/#primaryimage","url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/06\/OCA-square-768x768.png","contentUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2025\/06\/OCA-square-768x768.png"},{"@type":"BreadcrumbList","@id":"https:\/\/netsystem.fr\/en\/tprm-quote-third-party-risk-management-audit-and-oversight\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netsystem.fr\/en\/"},{"@type":"ListItem","position":2,"name":"TPRM quote: third-party risk management audit and oversight"}]},{"@type":"WebSite","@id":"https:\/\/netsystem.fr\/en\/#website","url":"https:\/\/netsystem.fr\/en\/","name":"Netsystem","description":"Soci\u00e9t\u00e9 de conseil en Syst\u00e8mes d\u2019Informations et en transformation digitale.","publisher":{"@id":"https:\/\/netsystem.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netsystem.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netsystem.fr\/en\/#organization","name":"Netsystem","url":"https:\/\/netsystem.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netsystem.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/11\/netsystem-logo-v3.png","contentUrl":"https:\/\/netsystem.fr\/wp-content\/uploads\/2023\/11\/netsystem-logo-v3.png","width":600,"height":186,"caption":"Netsystem"},"image":{"@id":"https:\/\/netsystem.fr\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/13934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/comments?post=13934"}],"version-history":[{"count":3,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/13934\/revisions"}],"predecessor-version":[{"id":13938,"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/pages\/13934\/revisions\/13938"}],"wp:attachment":[{"href":"https:\/\/netsystem.fr\/en\/wp-json\/wp\/v2\/media?parent=13934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}