{"id":769,"date":"2025-10-15T10:25:21","date_gmt":"2025-10-15T08:25:21","guid":{"rendered":"https:\/\/www.athanaseconsulting.com\/?post_type=service&#038;p=769"},"modified":"2025-10-16T13:01:00","modified_gmt":"2025-10-16T11:01:00","slug":"it-cybersecurity","status":"publish","type":"service","link":"https:\/\/www.athanaseconsulting.com\/en\/service\/it-cybersecurity\/","title":{"rendered":"IT &amp; CYBERSECURITY"},"content":{"rendered":"    \n      <div class=\"bloc accordeon\">\n        <div class=\"accordion\" id=\"accordionFaq\">\n                            <div class=\"accordion-item \">\n                    <h3 class=\"accordion-header\">\n                      <button class=\"accordion-button pt-athanase-large pb-athanase-large collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapseFaq1\" aria-expanded=\"true\" aria-controls=\"collapseFaq1\">\n                        <div class=\"titlePart d-flex \">\n                          <div class=\"chiffre-rond \">\n                            01                          <\/div>\n                          <div class=\"d-flex align-items-center \">\n                            Tool Selection &#038; Implementation support                          <\/div>\n                          \n                        <\/div>\n                      <\/button>\n                    <\/h3>\n                    <div id=\"collapseFaq1\" class=\"accordion-collapse collapse\" data-bs-parent=\"#accordionFaq\">\n                      <div class=\"accordion-body pb-athanase-large\">\n                        <p><strong>Athanase Consulting provides end-to-end support for tool selection and implementation:<\/strong><\/p>\n<ul>\n<li>Scoping of business needs<\/li>\n<li>Drafting of functional specifications<\/li>\n<li>Benchmarking of market-leading solutions<\/li>\n<li>Support in preparing RFI\/RFP documents and evaluating responses<\/li>\n<li>Implementation support: project management, business\/IT\/Data workshops, and change management<\/li>\n<\/ul>                      <\/div>\n                    <\/div>\n                  <\/div>\n                                  <div class=\"accordion-item \">\n                    <h3 class=\"accordion-header\">\n                      <button class=\"accordion-button pt-athanase-large pb-athanase-large collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapseFaq2\" aria-expanded=\"true\" aria-controls=\"collapseFaq2\">\n                        <div class=\"titlePart d-flex \">\n                          <div class=\"chiffre-rond \">\n                            02                          <\/div>\n                          <div class=\"d-flex align-items-center \">\n                            Cybersecurity                          <\/div>\n                          \n                        <\/div>\n                      <\/button>\n                    <\/h3>\n                    <div id=\"collapseFaq2\" class=\"accordion-collapse collapse\" data-bs-parent=\"#accordionFaq\">\n                      <div class=\"accordion-body pb-athanase-large\">\n                        <p><strong>Athanase Consulting supports you through:<\/strong><\/p>\n<ul>\n<li>Definition of IT strategies, master plans, and project roadmaps<\/li>\n<li>Cyber risk assessment<\/li>\n<li>Implementation and testing of operational resilience frameworks \/ Business Continuity Plans (BCP) \/ Information Systems Security Plans (ISSP)<\/li>\n<li>IT security audits and control plans<\/li>\n<li>Cybersecurity awareness training<\/li>\n<\/ul>                      <\/div>\n                    <\/div>\n                  <\/div>\n                        <\/div>\n      <\/div>\n\n\n      ","protected":false},"featured_media":0,"template":"","class_list":["post-769","service","type-service","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT &amp; CYBERSECURITY - Athanase Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.athanaseconsulting.com\/en\/service\/it-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT &amp; CYBERSECURITY - Athanase Consulting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.athanaseconsulting.com\/en\/service\/it-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Athanase Consulting\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-16T11:01:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.athanaseconsulting.com\\\/en\\\/service\\\/it-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.athanaseconsulting.com\\\/en\\\/service\\\/it-cybersecurity\\\/\",\"name\":\"IT &amp; CYBERSECURITY - Athanase Consulting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.athanaseconsulting.com\\\/#website\"},\"datePublished\":\"2025-10-15T08:25:21+00:00\",\"dateModified\":\"2025-10-16T11:01:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.athanaseconsulting.com\\\/en\\\/service\\\/it-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.athanaseconsulting.com\\\/en\\\/service\\\/it-cybersecurity\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.athanaseconsulting.com\\\/en\\\/service\\\/it-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.athanaseconsulting.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT &amp; CYBERSECURITY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.athanaseconsulting.com\\\/#website\",\"url\":\"https:\\\/\\\/www.athanaseconsulting.com\\\/\",\"name\":\"Athanase Consulting\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.athanaseconsulting.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT &amp; CYBERSECURITY - Athanase Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.athanaseconsulting.com\/en\/service\/it-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"IT &amp; CYBERSECURITY - Athanase Consulting","og_url":"https:\/\/www.athanaseconsulting.com\/en\/service\/it-cybersecurity\/","og_site_name":"Athanase Consulting","article_modified_time":"2025-10-16T11:01:00+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.athanaseconsulting.com\/en\/service\/it-cybersecurity\/","url":"https:\/\/www.athanaseconsulting.com\/en\/service\/it-cybersecurity\/","name":"IT &amp; CYBERSECURITY - Athanase Consulting","isPartOf":{"@id":"https:\/\/www.athanaseconsulting.com\/#website"},"datePublished":"2025-10-15T08:25:21+00:00","dateModified":"2025-10-16T11:01:00+00:00","breadcrumb":{"@id":"https:\/\/www.athanaseconsulting.com\/en\/service\/it-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.athanaseconsulting.com\/en\/service\/it-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.athanaseconsulting.com\/en\/service\/it-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.athanaseconsulting.com\/en\/"},{"@type":"ListItem","position":2,"name":"IT &amp; CYBERSECURITY"}]},{"@type":"WebSite","@id":"https:\/\/www.athanaseconsulting.com\/#website","url":"https:\/\/www.athanaseconsulting.com\/","name":"Athanase Consulting","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.athanaseconsulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.athanaseconsulting.com\/en\/wp-json\/wp\/v2\/service\/769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.athanaseconsulting.com\/en\/wp-json\/wp\/v2\/service"}],"about":[{"href":"https:\/\/www.athanaseconsulting.com\/en\/wp-json\/wp\/v2\/types\/service"}],"wp:attachment":[{"href":"https:\/\/www.athanaseconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}