Română

NIS2 and Cyber Resilience: Lessons from the French “Cyber ​​Valley”


NIS2 and Cyber Resilience: Lessons from the French “Cyber ​​Valley”
17.12.2025

The Brittany region is often described as France’s "Cyber Valley", a unique ecosystem where 160+ companies, the Ministry of Defense, and research centers collaborate within a tight perimeter, with shared events. Among the companies are both global leaders in cybersecurity (e.g., Sekoia.io) and giants with influence in the field (e.g., Airbus, Thales). From these experiences lessons emerge, both historical and extremely pressing, regarding cyber resilience and the implementation of the NIS2 directive.

Between September 15 and 17, 2025, I participated alongside a delegation of representatives from the private, academic, and public sectors at the launch of the Interreg Europe CAMPUS project in Rennes, on behalf of Digital Innovation Zone, where OPTI is a member.

Image: PhD. Marian Călborean, Managing Partner of OPTI (third from the left), alongside the DIZ delegation at the Parliament of Brittany.
Image: Dr. Marian Călborean, Managing Partner OPTI (third from the left), alongside the DIZ delegation at the Parliament of Brittany.

Below, I analyze the influence of technology giants and research institutes in Brittany. Their approach to new security architectures (e.g., Open XDR), data sovereignty, and resilience. We discuss the lessons, each with an actionable conclusion for the reader of this article, and what a proactive approach means in implementing NIS2.


1. Orange Cyberdefense: OT - IT Convergence at a Global Scale


Orange Cyberdefense is one of the largest global cybersecurity players, with over 18 SOCs and 3,100 experts, with solutions adapted to the global market.

The main challenge raised by industrial or corporate clients is the need for a unified OT (operational technology - industrial equipment) & IT (information technology - office) SOC. What Orange Cyberdefense does is a strict staging of protection toward the goal of total visibility:

  • They can cover both OT and IT, but they start from OT toward IT to place operations at the center.
  • The implementation phases for industrial security are: Initialization (audit and monitoring), Core (OT security management), Visibility (OT context and reporting), Premium (OT threats), OT-IT Convergence & XDR (SIEM for IT & OT, Incident response) - for details see the photo below. They may sound like commercial names, but they show the fundamental direction of protection.
  • A major differentiator is cost-reduction consulting through technology consolidation and calculating TCO (total cost of ownership), together with compliance assistance.

The vast majority of incidents that a large company will encounter will not come from "zero-day" attacks, but from poor cyber hygiene in complex infrastructures and technological misalignment.

The lesson in the context of NIS2 is that large companies and those in key domains must first have granular visibility over their assets. You cannot protect a network you do not map in real time. Second, protection can be staged, starting from audit and monitoring, through OT (the technology that ensures core business) toward IT and XDR.

Figure 1: The general service architecture proposed by Orange Cybersecurity for industrial security, from OT initialization to OT-IT SOC
Figure 1: The general service architecture proposed by Orange Cybersecurity for industrial security, from OT initialization to OT-IT SOC

What does NIS2 require you to be able to demonstrate (audit)?

NIS2 shifts the emphasis from “checkboxes” to risk management and reporting measures:

  • Inventory and dependencies: what assets exist, what systems are critical, what depends on what (including suppliers/supply chain).
  • Vulnerability management and patching: how you identify, prioritize, and remediate (or control) exposure.
  • Incident handling & reporting: the capability to detect, manage, and report incidents according to requirements.
  • Governance and accountability: roles, decisions, evidence, accountability at the management level.

For more, see the cybersecurity page and our guide for AI security.



2. Sekoia.io and the Shift to Open XDR: Information Dictates Defense


Sekoia.io is a European company that in 2025 is competing with traditional giants such as Splunk or QRadar in many SOCs, some in the U.S., according to the presentation in Rennes. The company is betting on a fundamental paradigm shift, relevant for any CISO or CTO: the move from monolithic SIEM systems to Open XDR (Extended Detection and Response).

Figure 2: Sekoia.io’s road toward a top cyber platform and the 2025 moment: hypergrowth
Figure 2: Sekoia.io’s road toward a top cyber platform and the 2025 moment: hypergrowth

Sekoia.io’s original approach:

  • You cannot monitor everything mixed together without priorities. Sekoia built the platform starting from CTI (Cyber Threat Intelligence).
  • Instead of collecting only logs and hoping it finds anomalies, the system is continuously fed with information about what attackers look like.
  • The principles are: Anticipation and automation (including with AI), Open architecture and interoperability (over 250 third-party tools), Democratization (the open SOC platform, >1000 easy-to-use rules),

The lesson in the context of NIS2 is that many companies rush to buy logging solutions. Sekoia.io’s success shows that logging without contextual intelligence (Intelligence-Driven) is only background noise. The future belongs to reducing detection time and to the open sharing of threats.

Figure 3: The Open XDR architecture proposed by Sekoia.io: Intelligence at the center, integrated with a library of hundreds of other applications or client systems
Figure 3: The Open XDR architecture proposed by Sekoia.io: Intelligence at the center, integrated with a library of hundreds of other applications or client systems

The role of artificial intelligence in cybersecurity:

In cybersecurity, AI brings value when it works over structured data: clean inventory, correlated vulnerabilities, patching history, access. AI can help with prioritization (What matters now?), explanation (Why is a risk critical?), actionable recommendations (What are the next steps?). AI cannot replace inventory, patching discipline, etc., the risk being the so-called “security hallucination.”

Another organization in Rennes is SequoIA (distinct from Sekoia.io), an AI cluster formed by the university and companies, dedicated to the intersection between AI and the defense industry, with a focus on trustworthy and verifiable AI and part of a French AI Factory.

For a hybrid approach to AI, see our Report for AI in B2B 2026 and this guide to RAG.



3. Inria and "High Security Lab": Security is Built, not Imported

Inria (the National Institute for Research in Digital Science and Technology) is a research organization with multiple sites in France, where over 2,800 employees (85% scientists) work in formal research for computer science (mathematics, computer science, artificial intelligence), at least 240 of them in cybersecurity. Notably, from Inria came over 200 startups, 75% of them successful (either acquired, or still existing independently), according to the institute’s presentation.

In Rennes, Inria’s research teams are formally studying at this moment both classic domains (Intrusion Detection, Vulnerability Detection and Analysis - collaborating with NIST in the U.S., Malware Detection and Analysis etc) and also some domains that may be food for thought for a company manager or CISO:

  • Post-quantum cryptography and cryptanalysis
  • The hardware-software interface
  • Formal methods for system certification

Thus, Inria’s research covers even the physical hardware level (e.g., side-channel attacks or supply-chain attacks) as well as verifiability, all aspects covered by NIS2. Vulnerabilities can come pre-installed, so you must rigorously audit the security of your equipment suppliers, not only your own network.

The lesson in the context of NIS2 is that in practice, continuous monitoring tends to produce more resilience than the annual audit, if the audit is only formal. Passive security (the system architecture and the cataloging of components and procedures) is a fundamental part of NIS2 requirements on business continuity, supply-chain security, and vulnerability management.

Figure 4: Cybersecurity research domains covered by Inria in Rennes
Figure 4: Cybersecurity research domains covered by Inria in Rennes


4. CyberSchool and Pôle d’Excellence Cyber: Security as Infrastructure


What strikes you in Rennes is the lack of barriers between academia and the private sector. CyberSchool is a consortium that brings together universities, research laboratories, and "Pure Player" companies (such as Airbus, Thales, Orange Cyberdefense). It does not produce only theoreticians.

The 750+ students, some in naval security (given the nearby military ports in Brittany) and 120+ PhD candidates are directly connected to industry needs. And Pôle d’Excellence Cyber was created to strengthen the cybersecurity sector in Rennes through training, academic research, and collaborative innovation.

The lesson in the context of NIS2 is that cybersecurity is an ecosystem. For the state, the Breton model can be a blueprint for how the public-private partnership in education should work. For companies, Breton success suggests that opening the company to collaborations not only with suppliers but also with other companies in the sector or with universities can lead to excellence in cybersecurity.


Figure 5: The CyberSchool ecosystem: How universities interact with industrial giants such as Thales and Airbus.
Figure 5: The CyberSchool ecosystem: How universities interact with industrial giants such as Thales and Airbus.


Visibility before Compliance

As we saw with Orange and Inria, the main effort is in understanding and getting visibility of the infrastructure ("passive security"), compliance being only the documented result of this reality. Therefore, passive security means:

  • Maintaining a continuously updated inventory of assets, locations, and networks.
  • Understanding vulnerabilities and attacks at the device, location, user, and platform level.
  • Monitoring risk over time, not only reacting to incidents.

Then XDR (Extended Detection and Response) is added in an open format. Since the era of monolithic solutions is ending, modern architectures allow rapid integration of various security tools, as we saw as part of Sekoia.io’s success.

Moreover, the fundamental requirements of CIS Controls followed by hundreds of organizations begin with the same two points: hardware inventory followed by software inventory.

All these points validate externally the architecture of MrBenny.com (public beta) by OPTI, which creates distinct editions 'Passive Security' (for inventory and vulnerabilities) and 'Compliance' (for task management and risk analysis). You cannot do compliance on an asset you do not know you have.



Proactive vs. Reactive Compliance

Regarding compliance, although France is extremely rigorous with regulations and standards NIS2, GDPR, ISO 27001 (ANSSI being the institution in charge), all organizations of excellence build compliance only secondly, after having operational clarity first.. It is a radical contrast with the reactive implementation of NIS2: audits on paper, written procedures, and the purchase of disparate tools, without knowing exactly what you are protecting.

The difference is not budget, but priorities, as this table shows:



Reactive model Mature model

Starting point
❌Compliance pressure ("Are we okay with the paperwork?")

Starting point
✅ Continuous asset inventory ("What do we have?")

What is the risk?
❌Lack of written policies, formal non-compliance

What is the risk?
✅ Visible exposure, unpatched vulnerabilities

Strategy
❌New paperwork, bureaucracy

Strategy
✅ Data hygiene and passive security

Motivation
❌Risk of fines and CEO personal liability (cf. NIS2)

Motivation
✅ Ecosystem of specialists


In the Breton ecosystem, the central idea repeats itself. Resilience does not start with the audit, but with operational clarity. If the steps are taken in the correct order described above, NIS2 compliance becomes easy, not a difficult imposition.

At OPTI Software, we integrate these cyber architecture principles both into our business solutions (see details), and into our risk management product, MrBenny.com (public beta).



Cybersecurity Glossary

OT/IT
OT = operational/industrial systems; IT = classic infrastructure (networks, servers, endpoints).
SOC
monitoring and incident response center (internal or service).
SIEM
log collector and correlator; requires continuous configuration and operation.
SOAR
response automation center (playbooks) based on alerts.
XDR
correlates signals from various sources (endpoint, network, cloud) for detection and response.
Open XDR
an XDR approach oriented toward integrating multiple sources from different ecosystems.
CTI
system for analyzing threat data: actors, motives, IoCs (indicators of compromise), TTPs (tactics, techniques, attack procedures)
TCO
Total cost of ownership - the total sum including licenses and the evaluation of work performed externally or internally for maintaining an IT solution.


Sources and Notes

Note: For public policy implications, please contact Digital Innovation Zone, whom we thank for organizing the visit.



Contact us for a passive security assessment



Quick Questions

What is the key message for NIS2?

Start with visibility: up-to-date inventory, dependencies, vulnerabilities, and monitoring. Compliance becomes an outcome of operational reality, not a documentation exercise.

What does OT–IT convergence in a SOC mean?

A unified approach where industrial OT security and corporate IT security are managed together, staged for visibility and incident response, up to XDR integration.

Why Open XDR instead of a monolithic SIEM?

For interoperability and faster detection: signals are correlated across multiple sources, guided by CTI, without depending on a single closed ecosystem.

Where does AI help in cybersecurity and where doesn’t it?

It helps with prioritization and recommendations when data is clean (inventory, vulnerabilities, access). It does not replace inventory/patching discipline; otherwise you risk “security hallucination”.

What is the TLDR (conclusion)?

Operational visibility (inventory, dependencies, vulnerabilities) comes before compliance. When you start with “what we have and what exposure exists”, NIS2 audit becomes easier. The testimonials of Pole Cyber, Inria, Sekoia.io, and Orange Cyberdefense show this clearly.

What technologies and methodologies are involved?

Technologies: OT/IT, SOC, SIEM, SOAR, XDR, Open XDR, CTI, asset inventory, vulnerability management, patching, incident response, NIS2 reporting, governance and accountability, supply-chain security, formal methods, post-quantum cryptography, hardware-software security, AI for prioritization
Methodologies: Continuous inventory and dependency mapping, Monitoring and auditability, Staging OT→IT→XDR, Tool consolidation and TCO calculation, CTI to reduce detection time, Open/interoperable integration, Role-based governance and audit evidence, Continuity and resilience, Supplier and supply-chain assessment

Marian Călborean

Article written by

Marian Călborean

Manager, Software Architect, PhD. in Logic, Fulbright Visiting Scholar (CUNY GC, 2023)

See on LinkedIn →
Interesat?

Interested?

Schedule a meeting

Get a Free Audit

News and Guides

More News