Identify, detect and simulate risks to protect your information systems against cyber attacks

Oligo Risk Manager is the new generation tool for strengthening the protection of your data and information systems against internal and external vulnerabilities. A collaborative, educational solution that will make your users and partners aware of the adoption of good practices.

Continuously enriched by the standards and methods in force (ISO27001, Mehari, EBIOS in particular) in the field of cybersecurity, oligo.rm fully meets the internal and legal compliance criteria (RGPD, HDS, LPM, RGS, etc.).

Perfectly aligned with the Ebios Risk Manager methodology, Oligo Risk Manager addresses both the strategic and operational dimensions of information systems security and personal data protection requirements.

A contextual approach

A contextual approach focused on your business values, your critical processes and your project needs.

Process and control your risks

Synthesized risk scenarios and the possibility of implementing security measures in accordance with identified needs.

Design and simulate your risk scenarios

Identify your sources of risk, imagine your strategic scenarios at the scale of your ecosystem and design your operational scenarios.

A response plan for total cyber resilience

Simulate identified incidents and/or cyber attacks and put in place an active approach to guarantee business continuity and security against all risks.

5 Ebios Risk Manager workshops grouped into 4 automated modules
  • An efficient, intuitive, iterative approach.
  • Collaboration, the involvement of business users is facilitated.
  • The security of the company's information capital under the responsibility of all the company's operational players, collaboration around risks is ensured at all levels of the company.
Risk analysis an automated, agile workflow adjusted to the complexity of the study
  • Instruct the perimeter and its granularity.
  • Identify threats and their impacts on the entire perimeter.
  • Simulate these threats by taking into account the elements making up the concerned perimeter.
  • Non-conformities are quickly identified from the start of the analysis.
  • An approach that reduces the cost of the information systems security post.
  • A better way to create a culture of risk in the company.
Play Video

The challenge 

The all-digital era is driving companies to transform themselves, changing their business model and their approach to partners, customers and suppliers. New technologies are diversifying the channels of exchange. This proliferation of digital tools is a godsend for improving production and maintaining competitiveness. It's a significant turning point for business growth. Nevertheless, it is the responsibility of companies to preserve this growth and ensure the long-term viability of their activities, while thinking in terms of protection: the era of everything digital is also the era of everything protected. Transforming your information system by integrating security throughout this transformation is the key to the success of any business project.


With our OLIGO RISK MANAGER solution, we offer an analysis method that can be adapted to any management system and any type of information system. We can identify the security challenges and classify information according to its sensitivity and criticality. We will assess the threats to business processes and their impact.

With OLIGO RISK MANAGER, we create a security policy in proportion to your security needs. We also assess the potential threats coming from your ecosystem (suppliers, customers, partners, etc.). Risk scenarios are assessed, simulated and dealt with according to their impact. Your regulatory compliance is measured, and your compliance with internal standards is monitored using selected indicators.

The challenge

The industrial sector, such as the automotive, aerospace, energy, water purification and supply, production systems, etc., is a sector where awareness of threats is increasingly crucial, and the advent of digital connectivity and IOT technologies are confirmed risk factors. This sector of activity is not at all, or not sufficiently, prepared for this transformation, and is not supported in taking account of the new risks associated with this change. It is vital that we adapt and develop our tools and risk analysis methods accordingly, and that our innovations are able to handle these complex systems and architectures typical of the industrial world, which are so different from the 'office management' sector.



With our Oligo Risk Manager solution, we offer an analysis method that can be adjusted to identify the slightest vulnerabilities in a complex system, and that can be adjusted to any activity. The components of an industrial system's architecture that could be the source of a threat or "feared event" are identified. The scales and metrics of the threat/impact ratios are adapted to the situations of these complex systems, as are the likelihood calculations. The results are finely expressed and monitored to ensure that the risk management strategy is commensurate with the issues at stake.

The challenge 

Health data - medical prescriptions, test results, notes explaining symptoms and sometimes very intimate patient information - is transmitted via a variety of digital tools. Exchanging and sharing data via these different digital channels exposes patient data to a number of very serious risks. Confidential data can be altered, its integrity impacted inadvertently or intentionally, stolen to be traded on illicit websites, or completely erased from the medium on which it is stored. These threats would be harmful to the patient if they were to occur. In some cases, these feared events could cause the patient's death.

Repositories and standards [HDH Regulation (Health Data Hosting)], good practices related to access to health data, applied and respected by organizations handling this sensitive information will significantly reduce these risks.


Our OLIGO RISK MANAGER solution, a method for analysing and managing the risks associated with protecting health information and data, classifies this data according to its criticality and sensitivity, and identifies the threats that could impact its confidentiality, integrity and/or availability. It also involves assessing the level of threat that could come from the players handling this data, simulating risk scenarios linked to these threats to better counter them, putting in place a global security policy (access management, encryption, back-up, etc.), and finally, guaranteeing state-of-the-art compliance, meeting 100% of the standards in force.

Calendar is loading...