{"id":40568,"date":"2023-01-19T04:21:27","date_gmt":"2023-01-19T09:21:27","guid":{"rendered":"https:\/\/wp266329.wpdns.ca\/la-fonction-%e2%80%afidentifier%e2%80%af-de-la-cybersecurite\/"},"modified":"2025-09-23T05:09:42","modified_gmt":"2025-09-23T09:09:42","slug":"the-identify-function-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/","title":{"rendered":"The \u201cIdentify\u201d function of cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"40568\" class=\"elementor elementor-40568 elementor-39596\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-765d4fe elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"765d4fe\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b7fd354\" data-id=\"b7fd354\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3eb7040 elementor-widget elementor-widget-heading\" data-id=\"3eb7040\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">The \u201cIdentify\u201d function of cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a960ecc\" data-id=\"a960ecc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7f2deb09 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f2deb09\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-19a8f301\" data-id=\"19a8f301\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b79612e elementor-widget elementor-widget-image\" data-id=\"b79612e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1732\" height=\"684\" src=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/2-1.jpg\" class=\"attachment-full size-full wp-image-40572\" alt=\"The \u201cIdentify\u201d function of cybersecurity\" srcset=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/2-1.jpg 1732w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/2-1-300x118.jpg 300w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/2-1-1024x404.jpg 1024w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/2-1-768x303.jpg 768w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/2-1-1536x607.jpg 1536w, https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/2-1-700x276.jpg 700w\" sizes=\"(max-width: 1732px) 100vw, 1732px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-20e4d23 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"20e4d23\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e7909f4\" data-id=\"e7909f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21676d9 elementor-widget elementor-widget-text-editor\" data-id=\"21676d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 17px;\">Our CISO 360 <strong><a href=\"https:\/\/eficio.ca\/en\/digital-products\/ciso360-cyberrisk-control\/\">Cyber Risk Control<\/a><\/strong> intervention and diagnosis plan covers a series of controls allowing organizations of all sizes, regardless of their IT budget, to have a clear and neutral image of their security posture. This will allow them to prioritize their interventions and budgets according to the acceptable risks for the organization. <\/span><br \/><span style=\"color: #000000; font-size: 17px;\">Did you know that it is possible to group cybersecurity controls under different themes or families of controls? NIST&#8217;s five functions (identify, protect, detect, respond, recover) are a great way to categorize topics in a logical and understandable way. As part of our cybersecurity guide for managers, for this second article we discuss the &#8220;<strong>Identify<\/strong>&#8221; function. <\/span><\/p><p style=\"text-align: left;\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-440e4c4 elementor-widget elementor-widget-testimonial\" data-id=\"440e4c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta elementor-has-image elementor-testimonial-image-position-aside\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png\" class=\"attachment-full size-full wp-image-39547\" alt=\"\" srcset=\"https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio.png 500w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-300x300.png 300w, https:\/\/eficio.ca\/wp-content\/uploads\/2022\/11\/Pierre-F-Eficio-150x150.png 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Pierre Farley<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Eficio Partner and CIO<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-027998b elementor-widget elementor-widget-text-editor\" data-id=\"027998b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 17px;\">To set up an effective cybersecurity program, we must first know what we have to protect! This is the very essence of the \u201cIdentify\u201d function. Understanding your organization&#8217;s information assets is the cornerstone of your cybersecurity program. Beyond knowing the assets to be protected, it is essential to know their impact on your organization: where is your sensitive data and personal information and what is its value for your organization? This will make it possible to prioritize efforts, both financial and human, on the strategy to be put in place. By prioritizing efforts, we will make sure to put the energy where it counts. We can also develop a response and succession plan that will be oriented on the level of acceptable risks for the organization. <\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">As part of the first article <a style=\"color: #000000;\" href=\"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/\">&#8220;A CyberRisk control approach based on a financial control model&#8221;<\/a>, I referred to the similarities between a financial control and a CyberRisk control. For example, an account charter is used to understand financial data and facilitates analysis according to a grouping of assets\/liabilities that must be measurable. These elements of your charter will be management indicators throughout your operations. In a cybersecurity context, the \u201cIdentify\u201d function is the equivalent that will allow you to know what to monitor and what is important for your organization.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">What are the key elements of this function?<\/span><\/p><p style=\"padding-left: 40px; text-align: left;\"><span style=\"color: #000000; font-size: 17px;\"><b>\u2022 Asset Management <\/b>\u2013 Know all assets, such as data center, cloud environment, servers, network equipment, computers, data that is essential for your operations;<b><br \/>\u2022 Business environment \u2013<\/b> What are the operational use cases to execute your mission, and who are the stakeholders?<b><br \/>\u2022 Governance<\/b> \u2013 Identify all policies and procedures to manage your risks according to regulatory, environmental, operational, and legal aspects;<b><br \/>\u2022 Risk Assessment<\/b> \u2013 Assess operational risks and impacts to your organization in the event of systems unavailability. Categorize assets according to criticality;<b><br \/>\u2022 Risk Management Strategy \u2013<\/b> Policies and procedures for identifying risks, assessing them, and determining your tolerance.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">A cybersecurity program must be dynamic. The &#8220;Identify&#8221; function must be scalable and adapt to changes in your organization. You must constantly remain vigilant and update this primary function of your cybersecurity program. For example, in terms of personal information and in compliance with the new Law 25 on the protection of personal information, it is important to know where the data comes from, its life cycles, and where this data is stored. The introduction of new business cases can change the life cycle of data, and then the data mapping must be updated to remain compliant with the law.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">We frequently observe in our interventions with customers that organizations will favor penetration tests before setting up a coherent cybersecurity program. Indeed, the analysis of the inventory, the identification of the risks, and a prioritization according to the organizational criticality will make it possible to better define the efforts. <\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">We recommend the definition of a program adapted to your organization in each of the five functions of cybersecurity. Essentially, the biggest risk facing organizations is not knowing what needs to be protected!<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">Our IT executive resourcesand cyber risk management have all the expertise to help you better understand your current cyber security posture. In addition, they will guide you on recommendations adapted to your organization.<\/span><\/p><p><span style=\"color: #000000; font-size: 17px;\">If you want to react to this article or obtain more information, do not hesitate to <a href=\"\/en\/contact\">contact<\/a> Eficio. <\/span><br \/><span style=\"color: #000000; font-size: 17px;\">All the articles in our folder can be read via the following links:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71bf4f2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71bf4f2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8a2f3a8\" data-id=\"8a2f3a8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a48d6e8 elementor-widget elementor-widget-text-editor\" data-id=\"a48d6e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"padding-left: 40px;\"><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/a-cyberrisk-control-approach-based-on-a-financial-control-model\/\">\u2022 A Cyber Risk control approach based on a financial control model<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/\">\u2022 The \u201cIdentify\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-protect-function-of-cybersecurity\/\">\u2022 The \u201cProtect\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-detect-function-of-cybersecurity\/\">\u2022 The \u201cDetect\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-response-function-in-cybersecurity\/\">\u2022 The \u201cResponse\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><br \/><span style=\"color: #ff6600;\"><strong><span style=\"font-size: 17px;\"><a style=\"color: #ff6600;\" href=\"https:\/\/eficio.ca\/en\/blog\/the-recover-function-of-cybersecurity\/\">\u2022 The \u201cRecover\u201d function of cybersecurity<\/a><\/span><\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2a785fa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a785fa\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-626f2ee\" data-id=\"626f2ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3aae26a elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3aae26a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-11fb690\" data-id=\"11fb690\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cf337d7 elementor-widget elementor-widget-text-editor\" data-id=\"cf337d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">Subscribe to the Eficio newsletter and be the first to receive our updates!<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9de49ae\" data-id=\"9de49ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d872dc2 elementor-align-right elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"d872dc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/nut.sh\/ell\/forms\/201665\/wdp0yC\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Subscribe<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The \u201cIdentify\u201d function of cybersecurity Our CISO 360 Cyber Risk Control intervention and diagnosis plan covers a series of controls allowing organizations of all sizes, regardless of their IT budget, to have a clear and neutral image of their security posture. This will allow them&#8230;<\/p>\n","protected":false},"author":4,"featured_media":40569,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":false,"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[215,727],"tags":[278,293,828,307,210,273],"class_list":["post-40568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-cybersecurite","tag-cybersecurite","tag-cybersecurite-en","tag-gouvernance-ti-en","tag-securite-en","tag-securite","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The \u201cIdentify\u201d function of cybersecurity - Eficio<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The \u201cIdentify\u201d function of cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The \u201cIdentify\u201d function of cybersecurity Our CISO 360 Cyber Risk Control intervention and diagnosis plan covers a series of controls allowing organizations of all sizes, regardless of their IT budget, to have a clear and neutral image of their security posture. This will allow them...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Eficio\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Eficio.ca\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-19T09:21:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-23T09:09:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Marchildon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Marchildon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-identify-function-of-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-identify-function-of-cybersecurity\\\/\"},\"author\":{\"name\":\"Alain Marchildon\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\"},\"headline\":\"The \u201cIdentify\u201d function of cybersecurity\",\"datePublished\":\"2023-01-19T09:21:27+00:00\",\"dateModified\":\"2025-09-23T09:09:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-identify-function-of-cybersecurity\\\/\"},\"wordCount\":741,\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-identify-function-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/2.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\",\"Cybers\u00e9curit\u00e9\",\"gouvernance TI\",\"S\u00e9curit\u00e9\",\"S\u00e9curit\u00e9\",\"Security\"],\"articleSection\":[\"Articles\",\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-identify-function-of-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-identify-function-of-cybersecurity\\\/\",\"name\":\"The \u201cIdentify\u201d function of cybersecurity - Eficio\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-identify-function-of-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-identify-function-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/2.jpg\",\"datePublished\":\"2023-01-19T09:21:27+00:00\",\"dateModified\":\"2025-09-23T09:09:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-identify-function-of-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-identify-function-of-cybersecurity\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/the-identify-function-of-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The \u201cIdentify\u201d function of cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"name\":\"Eficio\",\"description\":\"CIO disponibles selon vos besoins\",\"publisher\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eficio.ca\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#organization\",\"name\":\"Eficio\",\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Eficio_logo_blanc_fond_orange@300ppi.jpg\",\"width\":880,\"height\":361,\"caption\":\"Eficio\"},\"image\":{\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Eficio.ca\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/integra-co\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/en\\\/#\\\/schema\\\/person\\\/87b4a66e70dfd073460fc0962d1d7093\",\"name\":\"Alain Marchildon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"url\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"contentUrl\":\"https:\\\/\\\/eficio.ca\\\/wp-content\\\/litespeed\\\/avatar\\\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568\",\"caption\":\"Alain Marchildon\"},\"url\":\"https:\\\/\\\/eficio.ca\\\/en\\\/blog\\\/author\\\/amarchildon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The \u201cIdentify\u201d function of cybersecurity - Eficio","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The \u201cIdentify\u201d function of cybersecurity","og_description":"The \u201cIdentify\u201d function of cybersecurity Our CISO 360 Cyber Risk Control intervention and diagnosis plan covers a series of controls allowing organizations of all sizes, regardless of their IT budget, to have a clear and neutral image of their security posture. This will allow them...","og_url":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/","og_site_name":"Eficio","article_publisher":"https:\/\/www.facebook.com\/Eficio.ca\/","article_published_time":"2023-01-19T09:21:27+00:00","article_modified_time":"2025-09-23T09:09:42+00:00","og_image":[{"width":1000,"height":684,"url":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/2.jpg","type":"image\/jpeg"}],"author":"Alain Marchildon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Marchildon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/"},"author":{"name":"Alain Marchildon","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093"},"headline":"The \u201cIdentify\u201d function of cybersecurity","datePublished":"2023-01-19T09:21:27+00:00","dateModified":"2025-09-23T09:09:42+00:00","mainEntityOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/"},"wordCount":741,"publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/2.jpg","keywords":["Cybers\u00e9curit\u00e9","Cybers\u00e9curit\u00e9","gouvernance TI","S\u00e9curit\u00e9","S\u00e9curit\u00e9","Security"],"articleSection":["Articles","Cybers\u00e9curit\u00e9"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/","url":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/","name":"The \u201cIdentify\u201d function of cybersecurity - Eficio","isPartOf":{"@id":"https:\/\/eficio.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2023\/01\/2.jpg","datePublished":"2023-01-19T09:21:27+00:00","dateModified":"2025-09-23T09:09:42+00:00","breadcrumb":{"@id":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eficio.ca\/en\/blog\/the-identify-function-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eficio.ca\/en\/"},{"@type":"ListItem","position":2,"name":"The \u201cIdentify\u201d function of cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/eficio.ca\/en\/#website","url":"https:\/\/eficio.ca\/en\/","name":"Eficio","description":"CIO disponibles selon vos besoins","publisher":{"@id":"https:\/\/eficio.ca\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eficio.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eficio.ca\/en\/#organization","name":"Eficio","url":"https:\/\/eficio.ca\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/","url":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","contentUrl":"https:\/\/eficio.ca\/wp-content\/uploads\/2024\/12\/Eficio_logo_blanc_fond_orange@300ppi.jpg","width":880,"height":361,"caption":"Eficio"},"image":{"@id":"https:\/\/eficio.ca\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Eficio.ca\/","https:\/\/www.linkedin.com\/company\/integra-co\/"]},{"@type":"Person","@id":"https:\/\/eficio.ca\/en\/#\/schema\/person\/87b4a66e70dfd073460fc0962d1d7093","name":"Alain Marchildon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","url":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","contentUrl":"https:\/\/eficio.ca\/wp-content\/litespeed\/avatar\/0361efece92f87240fce35cf86e0092e.jpg?ver=1777403568","caption":"Alain Marchildon"},"url":"https:\/\/eficio.ca\/en\/blog\/author\/amarchildon\/"}]}},"_links":{"self":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/comments?post=40568"}],"version-history":[{"count":16,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40568\/revisions"}],"predecessor-version":[{"id":52436,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/posts\/40568\/revisions\/52436"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media\/40569"}],"wp:attachment":[{"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/media?parent=40568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/categories?post=40568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eficio.ca\/en\/wp-json\/wp\/v2\/tags?post=40568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}