Insights & Expertise

Blog AMTIA

In-depth analyses, best practices, and strategic intelligence on cybersecurity, GRC, compliance, and artificial intelligence.

🇲🇦
Compliance Feb 20, 2026

DNSSI v2: Complete Compliance Guide for Morocco

The National Information Systems Security Directive version 2 strengthens requirements for Moroccan public organizations and critical infrastructure operators. Here is how to structure your approach.

🎯
Risk Feb 18, 2026

EBIOS RM: The 5 Workshops Explained Step by Step

ANSSI's reference methodology, EBIOS Risk Manager structures risk analysis into 5 complementary workshops. Discover how to implement them effectively.

🔐
Technical Feb 15, 2026

Securing Active Directory: The 10 Priority Actions

Active Directory remains the primary target for attackers. Here are the 10 essential hardening measures to protect your enterprise directory against modern attacks.

🌐
Compliance Feb 12, 2026

ISO 27001:2022 -- What's New and Transition Plan

The 2022 version of ISO 27001 introduces major changes to Annex A. Discover the 11 new controls and how to plan your transition before the deadline.

📊
Governance Feb 8, 2026

The 15 Essential KPIs to Drive Your Cybersecurity

How do you measure the effectiveness of your security strategy? Here are the key performance indicators to track for meaningful reporting to your executive team.

🤖
AI & Innovation Feb 5, 2026

AI in the SOC: Automating Detection and Response

Artificial intelligence is transforming Security Operations Centers. From anomaly detection to automatic alert triage, discover the real-world use cases.

🚨
Technical Feb 1, 2026

Incident Response: Building an Effective Playbook

A well-structured incident response plan makes the difference between a controlled crisis and a disaster. Learn how to build tailored playbooks following NIST SP 800-61.

🇺🇸
Compliance Jan 28, 2026

SOC 2 Type II: Lessons Learned from a Certification Journey

From preparation to the final audit, a complete account of a SOC 2 Type II certification journey. Pitfalls to avoid, best practices, and a realistic timeline.

🔗
Risk Jan 22, 2026

Supply Chain Security: Assessing Vendor Risks

Supply chain attacks are surging. How to assess, qualify, and monitor the security posture of your critical vendors and subcontractors.

🛡
Technical Jan 18, 2026

Zero Trust Architecture: Implementation Guide

Never trust, always verify. A comprehensive guide to designing and deploying a Zero Trust security model across your enterprise infrastructure.

🇪🇺
Compliance Jan 14, 2026

GDPR 2026: Latest Updates and Best Practices

Eight years after its enforcement, GDPR continues to evolve with new guidelines and record fines. Stay current with the latest regulatory developments and compliance strategies.

🔍
AI & Innovation Jan 10, 2026

Cyber Threat Intelligence: Building Your CTI Program

Transform raw threat data into actionable intelligence. Learn how to build, operationalize, and mature a Cyber Threat Intelligence program that drives proactive defense.