{"id":420,"date":"2015-09-15T19:49:06","date_gmt":"2015-09-15T18:49:06","guid":{"rendered":"http:\/\/www.ab-consulting.fr\/blog\/?p=420"},"modified":"2015-10-06T19:07:58","modified_gmt":"2015-10-06T18:07:58","slug":"cyber-securite-vs-cyber-resilience","status":"publish","type":"post","link":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience","title":{"rendered":"Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong><em>On entend de plus en plus parler de cyber-s\u00e9curit\u00e9 et de cyber-r\u00e9silience. Mais au final, qu\u2019est-ce qui se cache derri\u00e8re ces termes compliqu\u00e9s pour le commun des mortels\u00a0? C\u2019est ce que nous allons essayer d\u2019expliquer au travers de cet article.<\/em><\/strong><\/p>\n<hr \/>\n<p><a href=\"http:\/\/plus.google.com\/118075462993454544693\/about\" target=\"_blank\" rel=\"Author\"><img loading=\"lazy\" class=\"aligncenter wp-image-426\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker.jpeg?resize=640%2C426\" alt=\"cyber-curit\u00e9 vs cyber-r\u00e9silience\" width=\"640\" height=\"426\" srcset=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker.jpeg?resize=300%2C200 300w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker.jpeg?resize=75%2C50 75w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker.jpeg?w=424 424w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><\/a><\/p>\n<h2>S\u00e9curit\u00e9 ou R\u00e9silience\u00a0? De quoi parlons-nous\u00a0?<\/h2>\n<p style=\"text-align: justify;\">Sous l\u2019administration Obama, les d\u00e9cisions prises par la Maison Blanche en mati\u00e8re de s\u00e9curit\u00e9 nationale portent le nom de Directives Politiques Pr\u00e9sidentielles (Presidential Policy Directives \u2013 PPD). La PPD 21 publi\u00e9e en 2013 porte sur la s\u00e9curit\u00e9 et la r\u00e9silience des infrastructures critiques et d\u00e9finit les contraintes \u00e0 respecter dans ce domaine par l\u2019ensemble des acteurs impactant la soci\u00e9t\u00e9 am\u00e9ricaine.<\/p>\n<p>Cette directive, qui peut \u00eatre vue comme une r\u00e9f\u00e9rence en la mati\u00e8re d\u00e9finit les termes suivants :<\/p>\n<p style=\"text-align: justify;\"><strong>La s\u00e9curit\u00e9<\/strong> consiste \u00e0 r\u00e9duire le risque pour les infrastructures par des moyens physiques ou mesures de cyber-d\u00e9fense \u00e0 des intrusions, les attaques ou les effets des catastrophes naturelles ou caus\u00e9es par l&rsquo;homme.<\/p>\n<blockquote>\n<p style=\"text-align: justify;\"><strong><em>Exemples de mesures de s\u00e9curit\u00e9:<\/em><\/strong><\/p>\n<ul>\n<li><em>Badge aux portes d\u2019entr\u00e9e<\/em><\/li>\n<li><em>Utiliser un logiciel antivirus<\/em><\/li>\n<li><em>Cl\u00f4ture autour des b\u00e2timents<\/em><\/li>\n<li><em>Verrouillage des \u00e9crans d&rsquo;ordinateur<\/em><\/li>\n<\/ul>\n<\/blockquote>\n<p style=\"text-align: justify;\"><strong>La r\u00e9silience<\/strong> est la capacit\u00e9 \u00e0 pr\u00e9parer et \u00e0 s&rsquo;adapter \u00e0 des conditions changeantes, de r\u00e9sister et de r\u00e9cup\u00e9rer rapidement suite \u00e0 des perturbations subies. La r\u00e9silience comprend la capacit\u00e9 de r\u00e9sister et de se remettre d\u2019attaques d\u00e9lib\u00e9r\u00e9es, d&rsquo;accidents, ou de catastrophes\u00a0naturelles ou encore d\u2019incidents.<\/p>\n<blockquote>\n<p style=\"text-align: justify;\"><em><strong>Exemples de mesures de r\u00e9silience:<\/strong><\/em><\/p>\n<ul>\n<li><em>\u00c9laboration d&rsquo;un plan de continuit\u00e9 d&rsquo;activit\u00e9<\/em><\/li>\n<li><em>Pr\u00e9voir un g\u00e9n\u00e9rateur \u00e9lectrique de secours<\/em><\/li>\n<li><em>Utilisation de mat\u00e9riaux de construction durables<\/em><\/li>\n<\/ul>\n<\/blockquote>\n<p style=\"text-align: justify;\">Le pr\u00e9fixe <strong>Cyber<\/strong>, pour sa part fait r\u00e9f\u00e9rence \u00e0 toutes les techniques li\u00e9es \u00e0 la soci\u00e9t\u00e9 du num\u00e9rique et notamment \u00e0 l\u2019informatique et \u00e0 l\u2019internet.<\/p>\n<p>On pourrait donc r\u00e9sumer de la fa\u00e7on suivante\u00a0:<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333399;\"><em>la <strong>cyber-s\u00e9curit\u00e9<\/strong> consiste \u00e0 r\u00e9duire les risques d\u2019intrusion, d\u2019attaques ou les effets de catastrophes naturelles ou caus\u00e9es par l\u2019homme dans le cadre de l\u2019utilisation des moyens informatiques et de communication, <\/em><\/span><\/p>\n<p>alors que<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333399;\"><em>la <strong>cyber-r\u00e9silience<\/strong> est la capacit\u00e9 \u00e0 se pr\u00e9parer et s\u2019adapter \u00e0 des conditions en perp\u00e9tuelle \u00e9volution ainsi qu\u2019\u00e0 r\u00e9cup\u00e9rer rapidement ses capacit\u00e9s suite \u00e0 des attaques d\u00e9lib\u00e9r\u00e9es, des accidents, des catastrophes naturelles ou encore des incidents dans le cadre de l\u2019utilisation de moyens informatiques et de communication.<\/em><\/span><\/p>\n<h2 style=\"text-align: justify;\">\u00a0Des diff\u00e9rences essentielles<\/h2>\n<p style=\"text-align: justify;\">Il r\u00e9sulte de ces deux d\u00e9finitions que le p\u00e9rim\u00e8tre de cyber-s\u00e9curit\u00e9 couvre essentiellement la r\u00e9duction des risques et la r\u00e9solution des incidents de s\u00e9curit\u00e9 de l\u2019information alors que la cyber-r\u00e9silience est beaucoup plus large et couvre \u00e0 la fois la pr\u00e9paration \u00e0 subir des attaques (pr\u00e9vention) et par dessus tout \u00e0 pouvoir continuer et reprendre une activit\u00e9 business normale (correction) tr\u00e8s rapidement suite \u00e0 une attaque, une catastrophe naturelle ou des incidents li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l\u2019information.<\/p>\n<h2 style=\"text-align: justify;\">La s\u00e9curit\u00e9 n\u2019est-elle donc pas suffisante en soi?<\/h2>\n<p style=\"text-align: justify;\">La r\u00e9ponse est clairement n\u00e9gative. La s\u00e9curit\u00e9 vise \u00e0 pr\u00e9venir les incidents de s\u00e9curit\u00e9 et \u00e0 g\u00e9rer ces incidents mais ne pr\u00e9pare pas l\u2019Organisation \u00e0 faire face aux cons\u00e9quences d\u2019une cyber-attaque et \u00e0 r\u00e9cup\u00e9rer ses aptitudes \u00e0 cr\u00e9er de la valeur apr\u00e8s en avoir \u00e9t\u00e9 la victime.<\/p>\n<h2 style=\"text-align: justify;\">Pouvons-nous utiliser les m\u00eames r\u00e9f\u00e9rentiels et normes\u00a0?<\/h2>\n<p style=\"text-align: justify;\">L\u00e0 encore la r\u00e9ponse est n\u00e9gative, du moins en partie. La cyber-s\u00e9curit\u00e9 pouvant \u00eatre vue comme un sous ensemble de la cyber-r\u00e9silience, il est clair que les r\u00e9f\u00e9rentiels et normes en mati\u00e8re de s\u00e9curit\u00e9 constitueront une premi\u00e8re \u00e9tape mais il convient d\u2019\u00e9largir tr\u00e8s sensiblement le p\u00e9rim\u00e8tre pour couvrir les aspects de cyber-r\u00e9silience.<\/p>\n<p style=\"text-align: justify;\">Quelques exemples des normes et de r\u00e9f\u00e9rentiels\u00a0:<\/p>\n<p style=\"text-align: justify;\"><strong><br \/>\nS\u00e9curit\u00e9\u00a0:<br \/>\n<\/strong><\/p>\n<ul>\n<li>ISO 27001 \u2013 Syst\u00e8mes de Management de la s\u00e9curit\u00e9 de l\u2019information &#8211; Exigences<\/li>\n<li>ISO 27002 \u2013 Code de bonne pratique pour le management de la s\u00e9curit\u00e9 de l\u2019information<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong>Cyber-r\u00e9silience :<\/strong><\/p>\n<ul>\n<li>RESILIA \u2013 Bonnes pratiques de Cyber-R\u00e9silience<\/li>\n<li>ISO 22301 \u2013 Syst\u00e8mes de management de la continuit\u00e9 d\u2019activit\u00e9 &#8211; Exigences<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\">Cyber-r\u00e9silience: un enjeu majeur pour les organisations<\/h2>\n<p style=\"text-align: justify;\">La\u00a0<strong>cyber-r\u00e9silience<\/strong>\u00a0vise \u00e0 g\u00e9rer la s\u00e9curit\u00e9 en adoptant une approche globale impliquant \u00e0 la fois les individus, les processus et la technologie. Elle impose une m\u00e9thodologie \u00e0 la fois solide et \u00e9volutive de gestion, d\u2019analyse et d\u2019optimisation des risques. Elle se pose comme le meilleur garant du capital informationnel des entreprises, organisations, \u00e9tats et individus. La cyber-r\u00e9silience s\u2019appuie sur cinq piliers que sont la pr\u00e9paration\/ l\u2019identification, la protection, la d\u00e9tection, la r\u00e9solution des probl\u00e8mes et la r\u00e9cup\u00e9ration. Dans cette approche, il est donc essentiel de se poser les bonnes questions, d\u2019adopter les bonnes mesures et de les r\u00e9\u00e9valuer \u00e0 un rythme r\u00e9gulier et de fa\u00e7on pragmatique, afin de g\u00e9rer au mieux les cyber-risques.<\/p>\n<p style=\"text-align: justify;\">D\u00e8s lors\u00a0que les entreprises ont compris que les cyber-attaques les affecteront t\u00f4t ou tard, ind\u00e9pendamment des efforts de pr\u00e9vention qu\u2019elles auront mis en oeuvre et seront couronn\u00e9es de succ\u00e8s, elles peuvent passer \u00e0 l&rsquo;\u00e9tape suivante: la conception et l\u2019impl\u00e9mentation d&rsquo;un Programme de Cyber-R\u00e9silience (PCR). Un PCR englobe bien s\u00fbr les concepts de d\u00e9fense et de pr\u00e9vention, mais va au-del\u00e0 de ces mesures pour mettre l&rsquo;accent sur la r\u00e9ponse et la r\u00e9silience de l\u2019organisation dans les moments de crise.<\/p>\n<p style=\"text-align: justify;\">Un PCR robuste implique:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><strong><em>La d\u00e9finition des risques d&rsquo;entreprise.<\/em><\/strong> Oubliez la \u00ab\u00a0liste de contr\u00f4le de conformit\u00e9\u00a0\u00bb. Oubliez les r\u00e8glementations qui r\u00e9gissent votre secteur d\u2019activit\u00e9 pendant un moment. Il suffit de regarder votre entreprise. Au lieu de vous concentrer sur les entr\u00e9es, focalisez votre attention sur les r\u00e9sultats. Dans le cas d&rsquo;une cyber-attaque, quelles cons\u00e9quences seront supportables par l\u2019Organisation? Qu&rsquo;est-ce qui vous tuera? Cela vous indiquera ce que vos \u00abjoyaux de la couronne\u00a0\u00bb sont &#8230; et o\u00f9 vous avez besoin d&rsquo;investir du temps et des ressources.<\/li>\n<li style=\"text-align: justify;\"><strong><em>Le d\u00e9veloppement d\u2019une politique de s\u00e9curit\u00e9.<\/em><\/strong> Comme nous le disions, la cyber\u2013r\u00e9silience inclut la cyber-s\u00e9curit\u00e9. Mais la s\u00e9curit\u00e9 se concentre d\u00e9sormais tr\u00e8s directement sur les menaces pesant sur vos actifs cl\u00e9s (y compris les personnes, les processus et la technologie qui sont connect\u00e9s \u00e0, ou ont acc\u00e8s \u00e0 ces actifs), et sur les contr\u00f4les qui peuvent att\u00e9nuer ces menaces.<\/li>\n<li style=\"text-align: justify;\"><strong><em>D\u00e9limiter un plan de cyber-relance.<\/em><\/strong> Que ferez-vous pour assurer la priorisation, l&rsquo;agilit\u00e9 et l&rsquo;adaptabilit\u00e9 face \u00e0 une cyber-attaque r\u00e9ussie? Votre plan doit \u00eatre pr\u00e9cis, complet et rigoureux. Lorsque l\u2019attaque aura eu lieu, il sera beaucoup trop tard pour y penser.<\/li>\n<li style=\"text-align: justify;\"><strong><em>La d\u00e9termination d&rsquo;un programme r\u00e9gulier de test.<\/em><\/strong> C\u2019est la pratique qui rend parfait &#8230; donc mettez r\u00e9guli\u00e8rement votre plan de cyber-reprise \u00e0 l&rsquo;\u00e9preuve pour vous assurer que vous avez bien mis en place et pouvez compter sur la cyber-r\u00e9silience dont vous avez besoin. Et testez bien vos comportements de s\u00e9curit\u00e9 au fur et \u00e0 mesure que l\u2019environnement \u00e9volue. Ils doivent suivre cette \u00e9volution.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Les entreprises doivent absolument\u00a0accepter ce changement de paradigme qui consiste \u00e0 passer de la cyber-s\u00e9curit\u00e9 \u00e0\u00a0la cyber-r\u00e9silience et d\u2019en tirer des avantages strat\u00e9giques. Cela signifie focaliser l&rsquo;\u00e9nergie et des ressources sur les cyber-risques qui vraiment pourraient g\u00e9n\u00e9rer un impact sur l\u2019entreprise, et sur les mesures qui fourniront des id\u00e9es et des avertissements au sujet de ces risques.<\/p>\n<h2 style=\"text-align: justify;\">L\u2019impact business de la cyber-r\u00e9silience<\/h2>\n<p style=\"text-align: justify;\">Passer d&rsquo;une vision purement bas\u00e9e sur la cyber-s\u00e9curit\u00e9 \u00e0 une vision de cyber-r\u00e9silience exige trois changements cl\u00e9s dans l&rsquo;entreprise:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><em><strong>Perspective.<\/strong><\/em> Passer du \u00ab\u00a0Comment\u00a0?\u00a0\u00bb au \u00ab\u00a0Quoi\u00a0?\u00a0\u00bb. Au lieu de se demander: \u00abAvons-nous telle ou telle mesure de s\u00e9curit\u00e9 en place?\u00a0\u00bb, Les chefs d&rsquo;entreprise ont besoin d&rsquo;en savoir davantage sur leurs actifs et la fa\u00e7on dont ils sont prot\u00e9g\u00e9s.<\/li>\n<li style=\"text-align: justify;\"><strong><em>Budget<\/em><\/strong>. Trouver le bon \u00e9quilibre entre le co\u00fbt et les risques. Traiter tous les actifs et tous les risques \u00e0 \u00e9galit\u00e9 n\u2019est jamais rentable. Les chefs d&rsquo;entreprise ont besoin de pond\u00e9rer des budgets informatiques limit\u00e9s pour prot\u00e9ger leurs actifs les plus importants avec la plus grande rigueur.<\/li>\n<li style=\"text-align: justify;\"><em><strong>Attentes.<\/strong><\/em> Les temps o\u00f9 on demandait des niveaux de 100% en mati\u00e8re de cyber-s\u00e9curit\u00e9 sont r\u00e9volus. Les chefs d&rsquo;entreprise ont besoin d\u2019\u00eatre pr\u00e9par\u00e9s, d&rsquo;anticiper les failles et les attaques, et d\u2019avoir un plan pour limiter les impacts sur la la r\u00e9putation, les finances et les op\u00e9rations de l\u2019Organisation.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Cette \u00e9volution permettra d\u2019aligner les d\u00e9penses li\u00e9es \u00e0 la cyber-r\u00e9silience avec les priorit\u00e9s des entreprises, de maximiser le retour sur investissement et de r\u00e9duire les risques cibl\u00e9s.<\/p>\n<h2 style=\"text-align: justify;\">Des partenariats sont absolument n\u00e9cessaires<\/h2>\n<p style=\"text-align: justify;\">Les entreprises trouveront difficile de faire la transition vers la cyber-r\u00e9silience par elles-m\u00eames. Un consultant ind\u00e9pendant qui peut tirer parti d\u2019une exp\u00e9rience terrain aupr\u00e8s d\u2019autres Organisations et des meilleures pratiques du march\u00e9 peut \u00eatre un atout pr\u00e9cieux. Un tel partenaire strat\u00e9gique peut alors agir comme une extension de votre \u00e9quipe informatique et de s\u00e9curit\u00e9, en s\u2019appuyant sur des processus et des outils avanc\u00e9s pour assurer \u00e0 la fois la cyber-s\u00e9curit\u00e9 et la r\u00e9silience contre la cybercriminalit\u00e9.<\/p>\n<p style=\"text-align: justify;\">Avec un partenaire de confiance, vous serez dans une position forte pour cr\u00e9er une strat\u00e9gie et un plan ex\u00e9cutable qui vous permettront d&rsquo;am\u00e9liorer votre s\u00e9curit\u00e9. Mais n\u2019acceptez jamais des solutions toutes faites sorties d\u2019un catalogue et soyez exigeant sur les r\u00e9f\u00e9rences et accr\u00e9ditation par des organisations internationales de vos partenaires. Ils doivent\u00a0vous apporter des conseils fiables et objectifs pour \u00e9tablir une relation de confiance et r\u00e9duire votre risque.<\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Cyber-s%C3%A9curit%C3%A9%20vs%20cyber-r%C3%A9silience&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fnon-classifiee%2Fcyber-securite-vs-cyber-resilience&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"d21c894a4a\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-420\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-420\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-420\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-420\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>On entend de plus en plus parler de cyber-s\u00e9curit\u00e9 et de cyber-r\u00e9silience. Mais au final, qu\u2019est-ce qui se cache derri\u00e8re ces termes compliqu\u00e9s pour le commun des mortels\u00a0? C\u2019est ce que nous allons essayer d\u2019expliquer au travers de cet article. S\u00e9curit\u00e9 ou R\u00e9silience\u00a0? De quoi parlons-nous\u00a0? Sous l\u2019administration Obama, les d\u00e9cisions prises par la&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Cyber-s%C3%A9curit%C3%A9%20vs%20cyber-r%C3%A9silience&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fnon-classifiee%2Fcyber-securite-vs-cyber-resilience&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"d21c894a4a\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-420\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-420\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-420\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-420\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[26,77,74,73,89,12,25,99,11,1,75,62],"tags":[80,91,103,101,69,104,102,64,68,78,100,87],"jetpack_publicize_connections":[],"author_meta":{"display_name":"Alain Bonneaud","author_link":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"},"featured_img":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.9 (Yoast SEO v17.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience - Blog de la Transformation Digitale<\/title>\n<meta name=\"description\" content=\"On entent souvent les termes cyber-s\u00e9curit\u00e9 et cyber-r\u00e9silience mais qu&#039;est-ce qui se cache vraiment derri\u00e8re ces pratiques et comment les impl\u00e9menter?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience\" \/>\n<meta property=\"og:description\" content=\"On entent souvent les termes cyber-s\u00e9curit\u00e9 et cyber-r\u00e9silience mais qu&#039;est-ce qui se cache vraiment derri\u00e8re ces pratiques et comment les impl\u00e9menter?\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience\" \/>\n<meta property=\"og:site_name\" content=\"Blog de la Transformation Digitale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/abconsultingci\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-15T18:49:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-10-06T18:07:58+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker-300x200.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:site\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Bonneaud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\",\"name\":\"2AB & Associates\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/abconsultingci\/\",\"https:\/\/www.linkedin.com\/in\/alainbonneaud\/\",\"https:\/\/twitter.com\/abonneaud\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"width\":540,\"height\":107,\"caption\":\"2AB & Associates\"},\"image\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#website\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/\",\"name\":\"Blog de la Transformation Digitale\",\"description\":\"COBIT\\u00ae, VeriSM, ITIL\\u00ae, RESILIA, ISO 27001, ISO 20000\",\"publisher\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker.jpeg?fit=424%2C283\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker.jpeg?fit=424%2C283\",\"width\":424,\"height\":283,\"caption\":\"Computer hacker silhouette of hooded man with internet login screen concept for security, phishing and hacking network account username and password\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#webpage\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience\",\"name\":\"Cyber-s\\u00e9curit\\u00e9 vs cyber-r\\u00e9silience - Blog de la Transformation Digitale\",\"isPartOf\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#primaryimage\"},\"datePublished\":\"2015-09-15T18:49:06+00:00\",\"dateModified\":\"2015-10-06T18:07:58+00:00\",\"description\":\"On entent souvent les termes cyber-s\\u00e9curit\\u00e9 et cyber-r\\u00e9silience mais qu'est-ce qui se cache vraiment derri\\u00e8re ces pratiques et comment les impl\\u00e9menter?\",\"breadcrumb\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\\u00e9curit\\u00e9\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"cybers\\u00e9curit\\u00e9\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"CSX\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite\/csx\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Cyber-s\\u00e9curit\\u00e9 vs cyber-r\\u00e9silience\"}]},{\"@type\":\"Article\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#article\",\"isPartOf\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#webpage\"},\"author\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\"},\"headline\":\"Cyber-s\\u00e9curit\\u00e9 vs cyber-r\\u00e9silience\",\"datePublished\":\"2015-09-15T18:49:06+00:00\",\"dateModified\":\"2015-10-06T18:07:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#webpage\"},\"wordCount\":1680,\"commentCount\":5,\"publisher\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"image\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker-300x200.jpeg\",\"keywords\":[\"COBIT\",\"conformit\\u00e9\",\"continuit\\u00e9\",\"cyber-r\\u00e9silience\",\"cyber-s\\u00e9curit\\u00e9\",\"infosec\",\"iso 22301\",\"ISO 27001\",\"ISO 27002\",\"ITIL\",\"resilia\",\"s\\u00e9curit\\u00e9\"],\"articleSection\":[\"COBIT\",\"CSX\",\"Cyber-r\\u00e9silience\",\"cybers\\u00e9curit\\u00e9\",\"Gouvernance\",\"Gouvernance du SI\",\"ISO\/IEC 27001\",\"ISO\/IEC 27002\",\"ITIL\",\"Non classifi\\u00e9(e)\",\"RESILIA\",\"S\\u00e9curit\\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\",\"name\":\"Alain Bonneaud\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#personlogo\",\"inLanguage\":\"fr-FR\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"caption\":\"Alain Bonneaud\"},\"sameAs\":[\"http:\/\/www.ab-consulting.fr\",\"https:\/\/twitter.com\/abonneaud\"],\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience - Blog de la Transformation Digitale","description":"On entent souvent les termes cyber-s\u00e9curit\u00e9 et cyber-r\u00e9silience mais qu'est-ce qui se cache vraiment derri\u00e8re ces pratiques et comment les impl\u00e9menter?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience","og_locale":"fr_FR","og_type":"article","og_title":"Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience","og_description":"On entent souvent les termes cyber-s\u00e9curit\u00e9 et cyber-r\u00e9silience mais qu'est-ce qui se cache vraiment derri\u00e8re ces pratiques et comment les impl\u00e9menter?","og_url":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience","og_site_name":"Blog de la Transformation Digitale","article_publisher":"https:\/\/www.facebook.com\/abconsultingci\/","article_published_time":"2015-09-15T18:49:06+00:00","article_modified_time":"2015-10-06T18:07:58+00:00","og_image":[{"url":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker-300x200.jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@abonneaud","twitter_site":"@abonneaud","twitter_misc":{"\u00c9crit par":"Alain Bonneaud","Dur\u00e9e de lecture est.":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization","name":"2AB & Associates","url":"http:\/\/www.ab-consulting.fr\/blog\/","sameAs":["https:\/\/www.facebook.com\/abconsultingci\/","https:\/\/www.linkedin.com\/in\/alainbonneaud\/","https:\/\/twitter.com\/abonneaud"],"logo":{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/#logo","inLanguage":"fr-FR","url":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","contentUrl":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","width":540,"height":107,"caption":"2AB & Associates"},"image":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#logo"}},{"@type":"WebSite","@id":"http:\/\/www.ab-consulting.fr\/blog\/#website","url":"http:\/\/www.ab-consulting.fr\/blog\/","name":"Blog de la Transformation Digitale","description":"COBIT\u00ae, VeriSM, ITIL\u00ae, RESILIA, ISO 27001, ISO 20000","publisher":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#primaryimage","inLanguage":"fr-FR","url":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker.jpeg?fit=424%2C283","contentUrl":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker.jpeg?fit=424%2C283","width":424,"height":283,"caption":"Computer hacker silhouette of hooded man with internet login screen concept for security, phishing and hacking network account username and password"},{"@type":"WebPage","@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#webpage","url":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience","name":"Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience - Blog de la Transformation Digitale","isPartOf":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#primaryimage"},"datePublished":"2015-09-15T18:49:06+00:00","dateModified":"2015-10-06T18:07:58+00:00","description":"On entent souvent les termes cyber-s\u00e9curit\u00e9 et cyber-r\u00e9silience mais qu'est-ce qui se cache vraiment derri\u00e8re ces pratiques et comment les impl\u00e9menter?","breadcrumb":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/www.ab-consulting.fr\/blog"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/securite"},{"@type":"ListItem","position":3,"name":"cybers\u00e9curit\u00e9","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite"},{"@type":"ListItem","position":4,"name":"CSX","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite\/csx"},{"@type":"ListItem","position":5,"name":"Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience"}]},{"@type":"Article","@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#article","isPartOf":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#webpage"},"author":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c"},"headline":"Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience","datePublished":"2015-09-15T18:49:06+00:00","dateModified":"2015-10-06T18:07:58+00:00","mainEntityOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#webpage"},"wordCount":1680,"commentCount":5,"publisher":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization"},"image":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#primaryimage"},"thumbnailUrl":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker-300x200.jpeg","keywords":["COBIT","conformit\u00e9","continuit\u00e9","cyber-r\u00e9silience","cyber-s\u00e9curit\u00e9","infosec","iso 22301","ISO 27001","ISO 27002","ITIL","resilia","s\u00e9curit\u00e9"],"articleSection":["COBIT","CSX","Cyber-r\u00e9silience","cybers\u00e9curit\u00e9","Gouvernance","Gouvernance du SI","ISO\/IEC 27001","ISO\/IEC 27002","ITIL","Non classifi\u00e9(e)","RESILIA","S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience#respond"]}]},{"@type":"Person","@id":"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c","name":"Alain Bonneaud","image":{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/#personlogo","inLanguage":"fr-FR","url":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","contentUrl":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","caption":"Alain Bonneaud"},"sameAs":["http:\/\/www.ab-consulting.fr","https:\/\/twitter.com\/abonneaud"],"url":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"}]}},"coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/geit\/cobit-5\" class=\"advgb-post-tax-term\">COBIT<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite\/csx\" class=\"advgb-post-tax-term\">CSX<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\" class=\"advgb-post-tax-term\">Cyber-r\u00e9silience<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite\" class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/gouvernance\" class=\"advgb-post-tax-term\">Gouvernance<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/geit\" class=\"advgb-post-tax-term\">Gouvernance du SI<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/isoiec-27001\" class=\"advgb-post-tax-term\">ISO\/IEC 27001<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/isoiec-27002\" class=\"advgb-post-tax-term\">ISO\/IEC 27002<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/it-sm\/itil\" class=\"advgb-post-tax-term\">ITIL<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/non-classifiee\" class=\"advgb-post-tax-term\">Non classifi\u00e9(e)<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">RESILIA<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">COBIT<\/span>","<span class=\"advgb-post-tax-term\">CSX<\/span>","<span class=\"advgb-post-tax-term\">Cyber-r\u00e9silience<\/span>","<span class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">Gouvernance<\/span>","<span class=\"advgb-post-tax-term\">Gouvernance du SI<\/span>","<span class=\"advgb-post-tax-term\">ISO\/IEC 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO\/IEC 27002<\/span>","<span class=\"advgb-post-tax-term\">ITIL<\/span>","<span class=\"advgb-post-tax-term\">Non classifi\u00e9(e)<\/span>","<span class=\"advgb-post-tax-term\">RESILIA<\/span>","<span class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/span>"]},"tags":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">COBIT<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">conformit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">continuit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">infosec<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">iso 22301<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27001<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27002<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ITIL<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">resilia<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">COBIT<\/span>","<span class=\"advgb-post-tax-term\">conformit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">continuit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/span>","<span class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">infosec<\/span>","<span class=\"advgb-post-tax-term\">iso 22301<\/span>","<span class=\"advgb-post-tax-term\">ISO 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO 27002<\/span>","<span class=\"advgb-post-tax-term\">ITIL<\/span>","<span class=\"advgb-post-tax-term\">resilia<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/span>"]}},"comment_count":"5","relative_dates":{"created":"Posted 11 ans ago","modified":"Updated 11 ans ago"},"absolute_dates":{"created":"Posted on 15 septembre 2015","modified":"Updated on 6 octobre 2015"},"absolute_dates_time":{"created":"Posted on 15 septembre 2015 19 h 49 min","modified":"Updated on 6 octobre 2015 19 h 07 min"},"featured_img_caption":"","jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OrbX-6M","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":462,"url":"http:\/\/www.ab-consulting.fr\/blog\/it-sm\/iso-20000\/cyber-securite-recherche-professionnels","url_meta":{"origin":420,"position":0},"title":"Cyber-s\u00e9curit\u00e9: une demande forte pour un profil rare","date":"19 septembre 2015","format":false,"excerpt":"\u00a0 L\u2019actuelle p\u00e9nurie de professionnels qualifi\u00e9s en\u00a0cyber-s\u00e9curit\u00e9 continue de constituer un probl\u00e8me majeur pour\u00a0toutes les industries aux Etats-Unis, en Europe, mais aussi dans le reste du monde. James Trainor, directeur adjoint par int\u00e9rim de la Division Cyber du FBI, a r\u00e9cemment d\u00e9clar\u00e9 que l'industrie de la cyber-s\u00e9curit\u00e9 doit absolument \"doubler\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"professionnel en cyber-s\u00c3\u00a9curit\u00c3\u00a9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/professionnel-securite-300x226.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":639,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique","url_meta":{"origin":420,"position":1},"title":"Cyber-r\u00e9silience: un tournant strat\u00e9gique","date":"3 octobre 2015","format":false,"excerpt":"Les approches traditionnelles de gestion de la s\u00e9curit\u00e9 de l'information se concentrent g\u00e9n\u00e9ralement sur l\u2019aptitude d'une organisation \u00e0 pr\u00e9venir et d\u00e9tecter les cyber-attaques sur son information et ses actifs. Mais le mythe largement r\u00e9pandu de la cybers\u00e9curit\u00e9 comme parade infaillible contre les cyber-risques gr\u00e2ce \u00e0 une s\u00e9rie de contr\u00f4les techniques\u2026","rel":"","context":"Dans &quot;Cyber-r\u00e9silience&quot;","img":{"alt_text":"cyber-r\u00c3\u00a9silience","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience-300x199.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":527,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/pare-feu-humain","url_meta":{"origin":420,"position":2},"title":"Pare-feu humain: votre meilleure protection","date":"28 septembre 2015","format":false,"excerpt":"Suite \u00e0 un r\u00e9cent article publi\u00e9 sur ce\u00a0blog et intitul\u00e9 Cyber-s\u00e9curit\u00e9 \u2013 Ing\u00e9nierie sociale: un risque majeur, je voudrais maintenant prendre un peu de recul et tenter d'explorer ce qui pr\u00e9c\u00e8de g\u00e9n\u00e9ralement une cyber-attaque d'ing\u00e9nierie sociale r\u00e9ussie. Dans le cadre d\u2019une discussion r\u00e9cente, un expert en ing\u00e9nierie sociale m\u2018affirmait avec\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"maillon faible humain","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/maillon-faible-300x226.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":899,"url":"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience","url_meta":{"origin":420,"position":3},"title":"RESILIA, objectif cyber-r\u00e9silience","date":"14 octobre 2015","format":false,"excerpt":"RESILIA, le cadre de r\u00e9f\u00e9rence de cyber-r\u00e9silience, publi\u00e9 r\u00e9cemment par AXELOS, fait une entr\u00e9e remarqu\u00e9e dans le paysage des r\u00e9f\u00e9rentiels de bonnes pratiques au moment-m\u00eame o\u00f9 se d\u00e9roule le mois de la cyber-s\u00e9curit\u00e9, auquel AB Consulting s'associe au travers de la publication d'articles et de sa participation \u00e0 une s\u00e9rie\u2026","rel":"","context":"Dans &quot;RESILIA&quot;","img":{"alt_text":"RESILIA - cyber-resilience","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1192,"url":"http:\/\/www.ab-consulting.fr\/blog\/geit\/cyber-risques-conseil-administration","url_meta":{"origin":420,"position":4},"title":"Cyber-risques &#8211; Que fait le Conseil d&rsquo;Administration?","date":"30 octobre 2015","format":false,"excerpt":"Le Conseil d'Administration est en charge de s'assurer de la cr\u00e9ation de valeur pour les parties prenantes de l'Entreprise tout en optimisant les risques et les ressources. Le Conseil d'Administration, organe de Gouvernance de l'entreprise est donc directement concern\u00e9 par les cyber-risques. \"La SEC (organisme f\u00e9d\u00e9ral am\u00e9ricain en charge de\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"Le conseil d'administration","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/conseil-administration-300x193.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":665,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile","url_meta":{"origin":420,"position":5},"title":"Un op\u00e9rateur mobile victime d&rsquo;une cyber-attaque","date":"6 octobre 2015","format":false,"excerpt":"Environ 15 millions de personnes qui se sont abonn\u00e9es dans les trois derni\u00e8res ann\u00e9es aux services sans fil de T-Mobile, quatri\u00e8me op\u00e9rateur de t\u00e9l\u00e9phonie mobile des Etats Unis avec 25 millions d'abonn\u00e9s, ont sans doute\u00a0\u00e9t\u00e9 victimes du vol de leurs informations personnelles suite \u00e0 une cyber-attaque r\u00e9ussie\u00a0contre l\u2019un de ses\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"cyber-attaque contre T-Mobile","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/420"}],"collection":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/comments?post=420"}],"version-history":[{"count":20,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/420\/revisions"}],"predecessor-version":[{"id":720,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/420\/revisions\/720"}],"wp:attachment":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/media?parent=420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/categories?post=420"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/tags?post=420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}