A Cyber Risk control approach based on a financial control model As part of the launch of the new version of our CyberRisk…
The “Identify” function of cybersecurity Our CISO 360 Cyber Risk Control intervention and diagnosis plan covers a series of controls allowing organizations of…
The “Protect” function of cybersecurity Our CISO-360 CyberRisk Control intervention and diagnosis plan enables organizational managers to take control of cybersecurity risk management.…
The “Detect” function of cybersecurity In previous articles in our cybersecurity for managers folder, we have discussed the "identify" and "protect" functions. This…
The "Response" function in cybersecurity Our previous articles discussed the importance of implementing healthy cyber hygiene governance as a crucial aspect of our…
The “Recover” function of cybersecurity This is the last article related to our CyberRisk Control CISO-360 intervention and diagnosis plan. What to do…
Doing business in Quebec? You must comply with Privacy Act 25. If you are present elsewhere in Canada, you will either be subject…
Companies, nonprofits, public and private entities are increasingly exploring the idea of interim CIOs (or VP Technologies) and turning to Eficio for guidance…
This article is a follow up to the previous article “The IT audit, a good investment”, in which we can learn about the…
The IT audit, or IT function diagnostic, is the first phase of the CIO-360 that leads you to an IT master plan. In…
Project management is increasingly vital to the success of a business. Many organizations have implemented a project management office (PMO) to support the…
When an organization decides to embark on its digital transformation, the combination of the Internet of Things and artificial intelligence can create significant…