Modules & capabilities

Nine modules.
One command center.

Each Eyako module is a building block of the command center. They cooperate, enrich each other and provide a unified view of your cyber posture.

🏛️
Module 1

Governance

Structure your security policy, define the framework and responsibilities. Eyako helps you lay the foundations of managed cybersecurity.

  • Security policy
  • Asset mapping
  • Security organization chart
  • Frameworks and charters
⚠️
Module 2

Risk Management

Identify, assess and treat your cyber risks with a structured methodology and intuitive display.

  • Risk register
  • Assessment and scoring
  • Treatment plans
  • Residual risk tracking
Module 3

Compliance

Manage your regulatory and normative obligations without being overwhelmed. NIS2, DORA, ISO 27001, GDPR and more.

  • Multi-framework
  • Auditable controls
  • Gaps and remediation plans
  • Compliance reporting
🔍
Module 4

Vulnerabilities

Centralize your CVEs and vulnerabilities, contextualize their criticality and prioritize treatment by real risk.

  • CVE import and centralization
  • Business contextualization
  • Business criticality prioritization
  • Remediation tracking
🚨
Module 5

Incidents & Crises

From detection to closure, manage every incident with rigor and traceability. Prepare for crises before they happen.

  • Qualification and escalation
  • Structured crisis management
  • Full traceability
  • Lessons learned
📁
Module 6

Security Projects

Integrate security into every IT project from conception. Track progress and security decisions.

  • Security by design
  • Security deliverable tracking
  • Reviews and validations
  • Link to risks
🤝
Module 7

Suppliers

Systematically assess and monitor third-party risk. Your supply chain under control.

  • Supplier mapping
  • Security questionnaires
  • Third-party risk score
  • Corrective plan tracking
📋
Module 8

Action Plans

Track every remediation measure's progress, measure impact and communicate progress to leadership.

  • Creation and assignment
  • Progress tracking
  • Impact prioritization
  • Dedicated dashboard
🔒
Module 9

Data Protection / DPO

Complete DPO module: processing registers, DPIAs, breach management, data subject rights.

  • Processing register
  • Impact analyses (DPIA)
  • GDPR breach management
  • Data subject rights

All your modules. One single view.

Every Eyako module is connected to the others. Risks feed action plans, vulnerabilities surface in compliance, incidents inform governance. Everything converges.

See the full cockpit
Modules — Eyako CISO Command Platform Capabilities | Eyako