The government sets its priorities: cybersecurity, regulation, resilience

Back to page
Newsletter
Mélanie Lebrun
31/1/2026

Hello ️✨,

I'll see you again for the January edition of Récap'IT.

To kick off the year, I'm offering you lots of recaps and major trends.

Cybersecurity and IT are entering a decisive phase. Between the government's 2026–2030 cybersecurity strategy, feedback from Clusif, signals from CIOs and CISOs, and reminders from the CNIL, a clear trend is emerging: less talk, more focus on execution. Business continuity, resilience, governance, automation, and IT value are now inseparable.

This edition looks back at the key events and fundamental principles that should not be overlooked.

Enjoy your reading!

📅 Today's agenda:

the government's 2026-30 cyber plan

  • 6 IT challenges for 2026
  • Cesin: update on cyberattacks
  • When the hacker forum gets hacked
  • CNIL sanctions Free
  • The Panocrim 2025
  • News at Youzer

👉 Go !!

Before we start, I invite you to follow us 👉

💡 Cybersecurity: what the government is preparing for the years 2026–2030

Cybersecurity is no longer a theoretical risk or a subject reserved for specialists. Massive attacks, paralysis of essential services, poorly controlled digital dependencies: cyber has become part of everyday economic and political life. It is in this context that the government is setting its course for the period 2026–2030, with a clear ambition: to strengthen the country's ability to withstand major cyber shocks and continue to function. Six key guidelines emerge from this strategy.

  • Increasing regulatory requirements, following on from NIS2, with a strong focus on actual maturity and not just documentary compliance.
  • Cyber crisis management is becoming essential: the ability to operate in degraded mode, regular exercises, and the involvement of business units and management, at the same level as the BCP/DRP.
  • Increased pressure on critical infrastructure and the cloud, with architecture and vendor choices becoming strategic decisions, not just technical ones.
  • The software chain under scrutiny, between the requirements of the Cyber Resilience Act, vulnerability management, critical open source, and the rise of SecDevOps practices.
  • Cybersecurity that is more "consumable" by businesses, designed to build trust with customers, partners, and investors, rather than simply being a cost center.
  • Two fundamental issues to anticipate now:identity as a lever against mass cybercrime, and the gradual transition to post-quantum cryptography.

Essentially, the government is no longer seeking to patch up isolated flaws, but to build long-term resilience in a cyberspace that is now inherently conflictual. The approach is coherent: talent, regulation, industry, crisis management, and cooperation are considered as a whole, a sign that cyber security is now treated as a strategic issue in its own right. The strongest signal remains the shift towards business continuity and crisis management: the possibility of major attacks is no longer theoretical, but has become a baseline scenario. A delicate balance remains: raising the bar without disrupting an economic fabric that is highly uneven in terms of cyber maturity. The focus on the cloud, the software chain, and post-quantum cryptography is a step in the right direction, but it requires profound transformations. Clearly, the intention is there; it is the execution, in the field, that will determine whether this strategy delivers on its promises.

Source: SGDSN Government

What the government is planning in cybersecurity for 2026-2030

Receive the best IT news of the month.
Market trends, IT trends, cyberattacks in France... a summary of the news

Receive IT news

🛡️IT departments in 2026: six key priorities

In 2026, CIOs are operating under pressure: cyber threats are on the rise, budgets are tight, and business expectations are higher than ever.

Abraxio's Panorama 2026, an annual barometer based on feedback from several hundred CIOs and IT managers, highlights six priorities that reflect the changing role of IT departments: ensuring a reliable IT system while contributing to value creation.

  • Cybersecurity, risk management, and resilience remain the number one priority. Faced with increasing attacks and regulatory requirements, security is part of the daily operation of the IS and business continuity measures.
  • AI, automation, and the digital workplace are entering a more operational phase. The challenge now is to integrate AI into business processes, make better use of data, and increase day-to-day efficiency.
  • Hybrid cloud and IT modernization remain key areas of focus. CIOs are seeking the right balance between agility, security, sovereignty, and cost control, with architectures capable of supporting data and AI uses.
  • IT value management. Measuring the impact of projects and objectifying decisions is becoming essential to strengthening IT's credibility with business units and management.
  • IT procurement and suppliers. Contract optimization, cost control, and enhanced security requirements are becoming direct drivers of performance.
  • IT governance is evolving toward greater clarity and alignment. Monitoring projects, indicators, and trade-offs helps CIOs navigate a tight budgetary environment without losing sight of the company's priorities.

Source: ITpro

6 IT priorities for 2026

💸 Cybersecurity: fewer attacks, but more costly

The CESIN 2025 barometer, based on feedback from CISOs and cyber directors and focused on incidents with real impact, paints a clear picture: significant attacks are declining, but their consequences remain major. Forty percent of companies have been affected, and in nearly eight out of ten cases, the impact is direct on the business, image, or data. Cybersecurity is no longer about the volume of alerts blocked, but about the ability to contain the incident, react quickly, and regain control of operations.

The threat is changing as a result of the geopolitical context. More than half of companies are seeing an increase in state-sponsored attacks, and 40% consider cyber espionage to be a high risk. Digital sovereignty is emerging as a risk management issue, particularly in relation to the cloud, contractual dependencies, and third-party risk, which is now identified as a major vector for incidents.

Finally, organizations are maturing. Security fundamentals are widely deployed, visibility into assets is improving, and cybersecurity is fully integrated into governance: 92% of companies rank it among their top five risks. Budgets are stabilizing, marking a phase of consolidation rather than withdrawal.

This barometer sends a clear signal: faced with more targeted and interconnected threats, the challenge is no longer to multiply solutions, but to sustainably strengthen companies' ability to anticipate, contain, and manage cyber risk.

Source: CESIN

Cyberattacks are declining, but becoming more costly

🌐 Hackers get hacked: BreachForums exposed by an internal leak

The data leak affecting BreachForums in early 2026 serves as a reminder of a fundamental reality: no platform is immune to compromise. Even a forum designed for anonymous exchanges between cybercriminals remains exposed when it hosts sensitive data and identities.

BreachForums has established itself as a central hub for the underground, used to share stolen data and illicit tools. Its appeal lies in the anonymity and discretion of its exchanges. The exposure of its user base shows that this appeal depends as much on internal practices as on technical choices.

The incident highlights a key point: securing an anonymous exchange platform is inherently complex. The slightest weakness in infrastructure or data management turns the service into a leak point, even for users who are aware of digital risks.

Beyond the symbolism, BreachForums reminds us that anonymity

is never guaranteed. Any platform that concentrates sensitive data becomes a potential target, regardless of its level of expertise or positioning.

Source: Digital Solutions

BreachForums exposed by a leak, hackers get hacked

Would you like to receive our white paper on identity and access management?

We have been unable to confirm your request.
Your request for a white paper has been taken into account.

⚠️ Cyberattacks: for the CNIL, the risk can no longer be ruled out

The €42 million fine imposed on Free and Free Mobile sends a strong message. For the CNIL, the October 2024 attack was not an isolated incident but a poorly anticipated risk. Security measures deemed insufficient led to the compromise of data from 24 million contracts, with direct impacts for subscribers.

This decision confirms a clear shift in regulatory interpretation. Cyberattacks are now considered an ongoing risk that organizations must incorporate into their normal operations. Failure to do so exposes them to heavy penalties, regardless of the status or size of the entity concerned.

Source: Silicon

Free sanctioned by the CNIL for failing to anticipate risk

🎤 A look back at Clusif's Panocrim 2025

Listening to the Clusif annual conference dedicated to feedback from 2025, one thing quickly becomes clear: cyber has changed in nature. Attacks are no longer limited to data theft or temporary IT system interruptions; they now have a concrete impact on everyday life—transportation at a standstill, production lines halted, supply chain disruptions, essential services disrupted. Speakers demonstrated this through numerous examples: critical infrastructure, logistics, industry, distribution, and public services have become obvious targets, sometimes for clearly geopolitical reasons.

Another key lesson learned over the past year is that the methods used remain surprisingly simple: phishing, social engineering, compromising subcontractors, and weak credentials continue to open the door to the most costly attacks.

The CNIL has made it clear: despite the apparent sophistication of campaigns, the breaches observed are often basic and therefore difficult to excuse. Implicitly, 2025 confirms that cybersecurity is no longer an isolated technical issue, but a direct factor in economic continuity, trust, and collective stability.

Source: Clusif

Return to Panocrim 2025 by CLUSIF

Zoom in on Youzer

A clear view of the entire chain of command

It is sometimes difficult for organizations to have a workable view of the entire hierarchical chain.

HR sources often contain several levels of management, but this information remains complex to exploit directly in operational tools. The approach presented by Youzer consists of using correspondence tables to obtain all hierarchical levels within user records in order to finally make this data actionable. This makes it possible to:

  • automatically assign each user to the correct manager,
  • rebuild consistent teams without manual processing,
  • filter and segment populations according to management levels,
  • facilitate account and authorization reviews,
  • automate processes such as account creation or rights requests.

This feedback clearly illustrates the added value of automation and visualization: without this type of approach, the information exists but remains difficult to use; with it, it becomes an operational lever that can be immediately used by IT and business teams.

I want a demo

Zoom in on Youzer, a clear view of the chain of command

Thank you for reading me this far!

Any feedback, want to discuss a project?

I'm here for that 👋.

👉Contact us on Youzer

We've sent you the newsletter and you think it's great? Sign up here 👇

Sign me up for Récap'IT

Sharing this newsletter is what keeps it alive!

Linkedin Melanie Lebrun

Every month I send you my discoveries, my analysis on IT news.
I do a lot of monitoring and I share it all!

I'm Mélanie and I'm Youzer's marketing manager.

About me? I have an unquenchable thirst for learning! I'd rather read a book 100 times than watch a movie. I'm a fan of HP 🧙🏼.
I do running and collective sport roller (don't look for it, it's dangerous).