Torus IT Security
Menu

Guides

Cyber guides to understand, frame and decide.

In-depth content to turn cyber requirements into topics that can be understood, prioritised and defended.

Published guides

Eight practical entry points for the issues that come up most often.

01

Guide

Turning NIS2 obligations into auditable evidence

A practical method for turning NIS2 obligations into tracked actions, clear ownership and auditable evidence over time.

  • CISO / security leadership
  • Cybersecurity consultants
  • Compliance leaders
Read the guide
02

Guide

Regaining control of cyber compliance in Europe

Why cyber requirements keep accumulating in Europe, and how to turn them into a structured, traceable and defensible work programme.

  • CISO / security leadership
  • Compliance leaders
  • SMB and mid-market leadership
Read the guide
03

Guide

Structuring ISO 27005 risk analysis without creating an unusable process

A practical approach to ISO 27005-style risk analysis that stays readable, workbook-friendly, human-reviewed and MONARC-compatible.

  • CISO / security leadership
  • Cybersecurity consultants
  • Risk leaders
Read the guide
04

Guide

Query sensitive documents with Cyber Assistant without losing control

The safeguards to expect when querying sensitive client documents through a Cyber Assistant: separated client spaces, visible sources, Zero Data Retention and human validation.

  • CISO / security leadership
  • Cybersecurity consultants
  • Compliance leaders
Read the guide
05

Guide

Why annual cyber awareness training is no longer enough

Why cyber awareness needs to be run as an ongoing programme with campaigns, reminders, completion tracking and exportable evidence.

  • CISO / security leadership
  • HR or compliance leaders
  • SMB and mid-market leadership
Read the guide
06

Guide

Common mistakes that weaken cyber audit evidence

The most common mistakes in cyber audit evidence, and a practical way to make a compliance file more readable, consistent and defensible.

  • CISO / security leadership
  • Compliance leaders
  • Cybersecurity consultants
Read the guide
07

Guide

Using AI on client documentation without sacrificing confidentiality

How cybersecurity consultants can use AI on client documentation to accelerate delivery while preserving confidentiality, sources and human validation.

  • Cybersecurity consultants
  • Consulting firms
  • Virtual or fractional CISO teams
Read the guide
08

Guide

Where SMBs and mid-market teams should start to improve cyber maturity

A realistic path for SMBs and mid-market organisations that want to improve cyber maturity without launching too many disconnected workstreams.

  • SMB and mid-market leadership
  • CISO / security leadership
  • Compliance leaders
Read the guide