top of page

THE ESSENTIALS
News, analysis and advice to support your digital transformation


Supporting managers where the IT provider stops.
Too often, information systems are perceived as a cost center or a source of complexity. At Andiris , a member of the DSIACTIVE network , we are changing this view: your IT should be an engine of growth, not a hindrance. What is the difference? Unlike a service provider, an outsourced IT department integrates with your teams and acts exclusively in the interest of your strategy. We bring the rigor, absolute confidentiality and expertise necessary to secure your data and o
Jan 91 min read


🔎 Data Act: What CIOs really need to know
The Data Act (EU 2023/2854) fundamentally redefines data governance in Europe, particularly data from connected objects, industrial systems and associated services. 👉 For a CIO, the impacts are very concrete: • Data access by design IoT solutions must allow direct, secure and free access to the generated data, in usable formats. No more "default" technical barriers. • Extended portability and sharing Companies will be able to request the transfer of their data (personal and
Dec 27, 20251 min read


Cisco is at the forefront of security against quantum cyber threats, but not immune to vulnerabilities.
Recent events perfectly illustrate this paradox. On the one hand, the deployment in Switzerland of a "quantum-safe" network with ID Quantique demonstrates that Cisco remains a cutting-edge technology leader. On the other hand, serious warnings about sophisticated cyberattacks serve as a reminder that even the best equipment has its vulnerabilities. 🔍 My feedback: Throughout my career as an IT Director, I have often chosen to limit the number of Cisco devices within our infra
Dec 22, 20251 min read


AWS & F5 - When giants falter
This week, two events that should give us pause for thought: ⚙️ Amazon Web Services (AWS) is experiencing a major outage in its US-East-1 region. As a result, services like Snapchat, Canva, or Capital.fr become partially or totally inaccessible. 🛡️ F5 Networks, a global cybersecurity company, has announced that it has been the victim of a sophisticated cyberattack. The intrusion is believed to be linked to a state-sponsored group. Internal data and source code have rep
Oct 22, 20252 min read


IT contract management: a strategic pillar of the CIO's role
For over 15 years, I have worked in tandem with a legal specialist to manage IT contracts. I also completed specialized training at Francis Lefebvre, which allowed me to deepen my understanding of the specific legal aspects of IT contracts. A good contract rests on several pillars. Fair? Yes, but that's only the foundation. IT contracts have specific characteristics that are often overlooked by lawyers: 🧠 Intellectual property: who owns what, and under what conditions. 🚫 Ev
Oct 8, 20251 min read


“Who has access to what in your company?”
This is a question I encounter very often in my work as an outsourced CIO. Behind it all, the same issues always lie: data security, regulatory compliance, and operational efficiency. I had the opportunity to share my experience in a white paper dedicated to access and password management. I offer a practical perspective: Why a centralized manager has become indispensable, and above all, what criteria should be considered to choose the right one in a business context. If this
Sep 29, 20251 min read


🚪 Offboarding: leaving everything in order
One week after discussing onboarding, it's time to address the other side of the coin: an employee's departure. Like their arrival, this moment is critical and requires method and rigor. 💻 Disable access: From the outset, the employee should no longer have access to information systems, cloud applications, email, or VPN. Every oversight can create significant security risks. 🖥️ Equipment recovery and processing: computers, phones, badges… each piece of equipment must follow
Sep 26, 20251 min read


🔐 Google recommends changing your password immediately… and I did!
I don't have a Gmail account, but for my personal Google account, I took this precaution and changed my password as soon as the alert was issued. Thanks to unique passwords for each of my sites, managed via a password manager, and two-factor authentication, the incident was quickly closed. Even for an expert, cybersecurity starts with simple but essential actions. #Cybersecurity #PasswordManagement #CIO #DigitalTransformation #ComputerSecurity https://lnkd.in/eVPn
Sep 10, 20251 min read


An outsourced CIO who acts like a member of the team… and a trusted partner 🤝
When I get involved in a company, I don't stay on the sidelines. I sit down at the table, immerse myself in the culture, and act as if I were a full-fledged member of the team 🤝 Trust is at the heart of this approach. Because on a daily basis, I have access to what the company holds most sensitive: its data, its strategic projects, its vision. Without confidentiality and loyalty, it's impossible to build a strong and lasting collaboration 🔒✨ And this logic also extends to m
Aug 31, 20251 min read


Microsoft admits: "I cannot guarantee that European 🇪🇺 data will never be transferred to the U.S. government 🇺🇸."
During a Senate hearing, Anton CARNIAUX, Legal Director of Microsoft France, acknowledged a reality often downplayed: the Cloud Act applies even to data hosted in European datacenters . 👉 If the parent company is American, U.S. law prevails . ⚖️ Why this matters:The Cloud Act allows U.S. authorities to request data held by any American provider, even if stored outside the United States . ✅ Practical solutions, even for SMEs: 🔹 Data Privacy Framework (DPF) (since 2023) gove
Jul 24, 20251 min read


WeTransfer accused of using its users' files to train an AI
➡️ Yet another example that illustrates why the governance of file sharing tools must remain in the hands of the IT department. I have always insisted: data sharing outside the company should never be done via unvalidated tools. This case is emblematic. Yes, WeTransfer claims that its AI is used solely for moderation… but the wording of their Terms of Service remains vague. And this is not the first warning: in June 2019, a security incident allowed third parties to access fi
Jul 8, 20251 min read


A modern vision of law, supported by a top-notch information system.
Proud to support the digital transformation of an outsourced CIO Quantor Avocats - Notaires , this new structure born from the alliance between D&V Avocats and notaries committed to innovation. Bringing lawyers and notaries together in a single structure is already a revolution in the legal approach. Their ambition: to offer integrated, seamless, and strategic support to both businesses and individuals. It is a privilege to lead the modernization of their information syst
Jul 1, 20252 min read


Thank you to Parnasse for the invitation to the VivaTech 2025 trade show!
A dazzling edition, in every sense of the word — with spectacular immersive installations, humanoids that interact live, and robots on spherical wheels that captivate the crowds. 🌈🤖⚡️ 🧠 What I saw wasn't just technical demonstrators. It highlighted applied artificial intelligence, evolving robotics, and above all, their practical usefulness in our daily lives. What was a prototype five years ago is now a business solution. 🦊 Special mention to the orange robot with a fox
Jun 12, 20252 min read


🔐 Cybersecurity alert for executives: 184 million passwords exposed!
Article to read: https://lnkd.in/eRuSDSt9 A massive data breach revealed by ZDNet affects Google, Microsoft, Facebook, and many other critical services. The compromised data includes real passwords, in plain text, easily exploitable by attackers. 👉 As a leader, you have two reflexes to adopt immediately: Change your passwords, especially if you reuse them on multiple services. Check if your email address has been compromised: https://haveibeenpwned.com 💡 This type of
May 30, 20251 min read


Why restarting your phone every day is crucial for your safety 🔐📱
Cyberattacks on smartphones are constantly increasing. A recent attack via WhatsApp allowed hackers to infiltrate devices using sophisticated spyware. This type of attack, known as a "clickless" attack, compromises a phone without the user needing to interact with a link or attachment. The threat is therefore invisible and very difficult to detect. 👉 What particularly interests me: 1️⃣ Applications like WhatsApp, often used without the knowledge of company IT departments,
Feb 17, 20251 min read


✳️ As a leader, do you think your information system is ready to pass the cyber insurers' test? ✳️
It's a fact: today, if your IT system doesn't meet strict security criteria, you could simply be deemed "uninsurable for cyber risks." This raises two crucial questions: 1️⃣ What is the maturity level of your IT security? A cyber insurance application can become an unofficial audit of your system. Insurers require robust security measures before agreeing to cover risks. If you are uninsurable, it reveals weaknesses that can expose you to enormous risks. 2️⃣ Is your company re
Feb 6, 20252 min read


🚨 AI is coming to all Office applications, but at what cost?
Microsoft announces the integration of Copilot AI into Word, Excel, PowerPoint, and Outlook, even for Microsoft 365 Personal and Family subscriptions. These tools promise to assist with document creation, data analysis, and email management. However, this new feature comes with a significant price increase. ❌ +43% for Microsoft 365 Personal ❌ +30% for Microsoft 365 Family 💡 My perspective as a CIO: A false good deal for SMEs. Many small and medium-sized enterprises (SM
Feb 1, 20251 min read
bottom of page