24 hours a day, 7 days a week

Gérard Levicki

My services – Cybersecurity consultant

A comprehensive offering to protect your business

As an independent cybersecurity consultant, I support organizations throughout the entire security cycle: strategy, assessment, compliance, technical protection, and crisis management.
Each service can be provided separately or as part of a comprehensive support package, depending on your priorities and maturity level.

Outsourced CISO / Shared CISO

The outsourced CISO service provides you with operational security management without the constraints of internal recruitment.

I act as your single point of contact to define strategy, oversee action plans, and liaise with your service providers.

You have a clear view of the risks, indicators that management can understand, and continuous monitoring tailored to your budget.

Security strategy aligned with the business

Define a clear roadmap based on your actual risks and business objectives.

Action plan management

Regular monitoring of construction sites, prioritization of measures, and coordination of internal teams and service providers.

Management dashboards

Simple indicators to understand risk trends and justify budget decisions.

Interface with IT service providers

Translation of technical issues to defend your interests when dealing with integrators and publishers.

Cybersecurity audit

Audits enable us to move beyond impressions and rely on measurable facts.

I evaluate your organization, systems, and processes to identify vulnerabilities that can actually be exploited.

The findings result in a prioritized, costed action plan tailored to your business context, whether it is a technical, organizational, or regulatory audit.

Maturity audit

Comprehensive assessment of your organization to identify strengths, weaknesses, and priorities.

Technical audit

Analysis of systems, networks, and applications to detect exploitable vulnerabilities.

Regulatory audit

Concrete verification of NIS2, DORA, GDPR, or ISO 27001 requirements.

Costed action plan

Deliverable operational with priorities, estimated costs, and realistic schedule.

Safety tests

Penetration testing simulates the behavior of an attacker to verify the effectiveness of your defenses.

Whether internal, external, or application-based, these tests reveal concrete attack vectors before an adversary discovers them.

The results are presented in a pragmatic way to enable rapid and lasting correction.

External pentest

Simulate an attack from the Internet to measure your actual exposure.

Internal pentest

Risk assessment in the event of a workstation or account compromise.

Application and API testing

Search for vulnerabilities in your business applications and interfaces.

Usable restitution

A clear report focused on correction, without unnecessary alarmism.

Cybersecurity advice and consulting

Beyond specific assignments, I assist executives and CIOs in their structural decisions: secure architecture, choice of tools, organization of responsibilities, and securing business projects.

The goal is to reconcile safety requirements and operational constraints so that protection truly enhances performance.

Secure architecture

Designing technical solutions compatible with your operational constraints.

Project support

Integrating security from the outset to avoid additional costs later on.

Choice of relevant tools

Support for independent decision-making by publishers and the effects of trends.

Pragmatic governance

Organization of roles and responsibilities tailored to your size.

Risk Management & Compliance

Regulatory requirements are changing rapidly: NIS2, DORA, GDPR, ISO 27001.

I translate these frameworks into concrete actions, proportionate to your size. Risk analysis becomes a management tool, rather than an administrative exercise, enabling you to demonstrate compliance while improving your actual level of security.

EBIOS RM analysis

Structured method for linking threats, vulnerabilities, and business impacts.

NIS2 / DORA trajectory

A step-by-step compliance plan that fits your budget.

ISO 27001 / GDPR compliance

Translation of requirements into concrete and documented measures.

Securing service providers

Access and contract control to limit third-party risk.

Incident response & crisis management

When an attack occurs, the priority is to limit the impact on business.

I step in to organize crisis management, coordinate the investigation, activate the BCP/DRP, and prepare regulatory requirements.

Experience shows that a structured approach makes the difference between a controlled incident and a prolonged shutdown.

Cyber crisis management

Organization of decisions and coordination of actors under pressure.

Investigation & forensics

Technical analysis to understand the attack and prevent recurrence.

PCA / PRA

Measures to restart operations in degraded mode.

Controlled communication

Management of legal obligations and relations with stakeholders.

Awareness raising & training

Technology alone is not enough. I design awareness-raising initiatives tailored to your teams: executives, business lines, IT specialists.

Phishing exercises, practical workshops, and internal conferences help establish lasting reflexes and significantly reduce human risk.

Executive training

Understanding the issues without jargon to make better decisions.

Phishing awareness

Realistic exercises to develop the right reflexes.

Safety culture

Regular actions to embed practices over time.

Internal conferences

Interventions tailored to your business and context.

Higher education

Convinced that cybersecurity is also built through knowledge transfer, I am available to contribute tohigher education through lectures, tutorials, conferences, or student project support.

This involvement helps to train future professionals and promote a safety culture rooted in reality.

Courses and lectures

Sharing experiences with computer science or management students.

Project management

Support for practical work related to real-world business security.

Specialized conferences

Conveying a pragmatic vision of cybersecurity.

Company–school bridge

Matching professional needs with academic training.

Why choose me?

Strategic and operational expertise

I bring a comprehensive and pragmatic approach to cybersecurity, with the ability to identify both major risks and concrete measures to mitigate them.

This dual expertise allows strategy and operations to be coordinated without any loss of efficiency.

Personalized support tailored to your situation

Every organization is unique: sector, size, maturity, constraints.

I develop action plans tailored to your specific situation, whether it involves a targeted audit, ongoing monitoring, or regulatory compliance.

Clear communication for managers and teams

Cybersecurity should not be the language of specialists.

I translate technical issues into information that decision-makers can understand, with structured deliverables and actionable recommendations for the entire organization.

Independence and integrity of advice

I am not affiliated with any publisher or solution provider.

My recommendations are based solely on your needs and the information provided about your situation, ensuring an objective approach that prioritizes your safety.

As an independent cybersecurity consultant with proven experience in the field, I combine a strategic understanding of digital risks with the ability to translate these issues into concrete actions for organizations of all sizes.

My approach is structured, results-oriented, and focused on actually reducing your cyber exposure, while facilitating decision-making for executives.

When you call on me, you are choosing expertise that combines technical rigor, a sense of business priorities, and pragmatic support.