[{"command":"insert","method":"html","selector":"#head_info","data":"\u003Ch2 class=\u0022offer-title\u0022\u003ECyber Strategy\u003C\/h2\u003E\n \u003Cdiv class=\u0022intro\u0022\u003ESupports organizations in their strategic choices and the structuring of its Cyber sectors, and the Cyber success of their M\u0026A and transformation operations. Rating of the Cyber performance and maturity of the entities within\/of an organization regarding its competitors within its sector.\u003C\/div\u003E","settings":null},{"command":"insert","method":"html","selector":"#offer_list","data":"\u003Ch3 class=\u0022title\u0022\u003EOur offers\u003C\/h3\u003E\n \u003Cdiv class=\u0022sectors_depth\u0022\u003E\n \u003Cdiv class=\u0022ct_expertises\u0022\u003E\n \u003Cdiv class=\u0022large\u0022\u003E\n \u003Cul class=\u0022list_expertises\u0022\u003E\n \u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n CISOaaS, BCMaaS, CMaaS, DPOaaS\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tSecurity as a service capability is our solution to provide specialized expertise and meet the specific needs of organizations for specific or transitional needs. Our consultants have the technical knowledge and corporate governance experience to help build a Cyber foundation. \u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Cyber Benchmarking \u0026amp; Rating\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tCyber Benchmarking \u0026amp; Rating gives leaders the positioning of Cybersecurity in their organization regarding their peers by a comparison between the organization\u0026#039;s mid term\/long term Cyber strategy and roadmap and its competititors\u2019. \u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Cyber Transformation\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tCyber Transformation allows the achievement of organisations\u2019 business objectives by accompanying them in their digital transition through the definition of their Cyber strategic choices : development strategy, targeted architecture, business cases that need to be launched and implementation roadmap\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Cyber M\u0026amp;A Due Dilligence\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tCyber M\u0026amp;A Due Diligence advocates the fact that information heritage and Cyber resilience are now an integral part of the criterion for a business\u2019s valuation. We support leaders throughout the merger \/ acquisition process whether they are on the buyers\u2019 side or the sellers\u2019. \u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Cyber Target Operating Model\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tCyber TOM allows, depending on the business and ambitions of the organizations, to structure their Cyber sectors by identifying the capabilities they need in order to anchor the Cyber strategy as close as possible to reality. \u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\u003Cli\u003E\u003Cdiv class=\u0022item_expertise\u0022\u003E\n \u003Cdiv class=\u0022ct_title\u0022\u003E\n \u003Cp class=\u0022bloc_title-small\u0022\u003E\n Cyber For Boards \u0026amp; Executives\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022ct_description\u0022\u003E\n \u003Cp class=\u0022desc_expertise\u0022\u003E\n \tWe support Boards \u0026amp; Executives regarding their choice of Cybersecurity strategy, and provide answers related to their business ambitions, while preserving the shareholders and investors interests\u2019 regarding Cyber risk. \u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\n\n \u003C\/p\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\n\u003C\/li\u003E\n \u003C\/ul\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E","settings":null}]