
Tailor-made
cybersecurity,
designed with you
to last.
Notre expertise

Security & Compliance: Protect Your Assets
What we do: In-depth audits based on best practices (ISO 27001, NIST CSF, Essential 8, NIS 2). We assess the actual state of your security and identify critical vulnerabilities.
For whom? Organizations that need a reliable view of their security posture and need to meet contractual or regulatory requirements.
Why? You gain trust from your customers, avoid administrative penalties and secure your most valuable asset: your data.
Digital Resilience: Ensure Continuity
What we do: Creation of response and business continuity plans (BCP/DR), impact analysis and simulations of major incidents to test your reflexes. We prepare your organization for the inevitable.
For whom? Organizations dependent on their IT systems that cannot afford a data interruption or loss.
Why? You’re ready to go even in the event of an attack. In the event of a crisis, you react quickly and calmly to minimize the impact on your commercial activity.


Strategy & Risk Management: Prioritize the essentials
What we do: prioritization of your investments. From digital supply chain management to negotiating supplier requirements, we build a master plan aligned with your budget and business goals.
For whom? Managers overwhelmed by the technical load who seek to make the right decisions without getting lost.
Why? We simplify your decision-making to optimize your costs and gradually strengthen your internal team, without overloading you.
Your trusted partners
Eponine Pauchard
Cybersecurity with operational agility.

As an engineer and governance expert, Eponine simplifies technology, processes and regulations. She helps organizations protect their data without burdening their performance or getting lost in technology. Convinced that everyone can be empowered, she also supports women who are moving into science and technology.






Dimitri Souleliac
Empathetic and human approach to cybersecurity

As an expert in risk management, Dimitri translates complex threats into concrete actions for your teams. Its approach favours empathy and preparation: making your employees confident and autonomous in the face of incidents, rather than simply installing tools. He also shares his passion for tech with the younger generations through the Code Club.




Our way of working
1. Your context

We understand your company, its priorities, and identify the problem(s) to be addressed.
2. Our Plan

We offer you an action plan to improve your security while preserving your performance.
3. The Solution

All our services include a training component, so that you can maintain the solutions deployed.
4. Your success

With the tools, processes in place and your new skills, you can continue to secure your organization.
Case Studies

Problem: acquisition of a company of similar size, with a lower level of security in several areas.
Solution: three-year master plan, using the strengths of each entity to improve the other.
Automotive industry

Problem: arrival of an CIO in an organization without a team or formal security responsibility.
Solution: maturity audit, action plan and training of a team member for the position of CISO.
Food industry

Problem: implementation of an AI solution for monitoring swimming pools, without consulting the computer.
Solution: Analysis of the solution and implementation of a supplier management process
Local Government
Pandas by or inspired by Catalystuff on Freepik
