{"id":4773,"date":"2017-09-19T06:03:37","date_gmt":"2017-09-19T05:03:37","guid":{"rendered":"http:\/\/www.ab-consulting.fr\/blog?p=4773"},"modified":"2017-10-07T14:10:58","modified_gmt":"2017-10-07T13:10:58","slug":"mois-de-la-cybersecurite-2017-abidjan","status":"publish","type":"post","link":"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan","title":{"rendered":"Mois de la cybers\u00e9curit\u00e9 2017 \u00e0 Abidjan"},"content":{"rendered":"<h1>Mois de la cybers\u00e9curit\u00e9 2017<\/h1>\n<p style=\"text-align: justify;\"><em>Le Mois de la cybers\u00e9curit\u00e9 (CSM) s&rsquo;appuie sur le fait qu&rsquo;Internet est une ressource partag\u00e9e et que la s\u00e9curit\u00e9 des communications sur internet est une responsabilit\u00e9 partag\u00e9e.<\/em><\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-4782 size-full\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?resize=471%2C255\" alt=\"Mois de la cybers\u00e9curit\u00e9 2017\" width=\"471\" height=\"255\" srcset=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?w=471 471w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?resize=300%2C162 300w\" sizes=\"(max-width: 471px) 100vw, 471px\" data-recalc-dims=\"1\" \/><\/p>\n<p style=\"text-align: justify;\">Le Mois de la cybers\u00e9curit\u00e9 est une campagne internationale de sensibilisation. Elle a lieu chaque ann\u00e9e en Europe, Asie, Am\u00e9rique du Nord et Australie au mois d&rsquo;octobre. L&rsquo;objectif de cette campagne est de sensibiliser le public sur l&rsquo;importance de la s\u00e9curit\u00e9 de l&rsquo;information. Elle vise \u00e0 informer les citoyens sur la s\u00e9curit\u00e9 lors de l&rsquo;utilisation d&rsquo;Internet et sur quelques bonne pratiques simples \u00e0 suivre pour se prot\u00e9ger en ligne, ainsi que pour prot\u00e9ger leur famille, leur milieu de travail et leurs appareils.<\/p>\n<h2>Les th\u00e8mes du mois de la cybers\u00e9curit\u00e9 2017<\/h2>\n<p style=\"text-align: justify;\">Le mois est divis\u00e9 en th\u00e8mes (un th\u00e8me par semaine) qui soulignent les diff\u00e9rents aspects de la cybers\u00e9curit\u00e9. Cette ann\u00e9e, la campagne d\u00e9butera le 2 octobre pour s&rsquo;achever le 31 Octobre et sera organis\u00e9e de la fa\u00e7on suivante :<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>1\u00e8re Th\u00e8me : du 2 au 6 octobre :\u00a0<\/strong>Pensez cybers\u00e9curit\u00e9 &#8211; Prenez des mesures simples pour assurer votre s\u00e9curit\u00e9 en ligne<\/li>\n<li><strong>2\u00e8me Th\u00e8me : du 9 au 13 octobre : <\/strong>Soyez vigilants &#8211;\u00a0Protection des renseignements personnels et des donn\u00e9es priv\u00e9es<\/li>\n<li><strong>3\u00e8me Th\u00e8me : du 16 au 20 octobre :<\/strong> Nous sommes tous concern\u00e9s &#8211;\u00a0La cybers\u00e9curit\u00e9 au travail est l&rsquo;affaire de tous<\/li>\n<li><strong>4\u00e8me Th\u00e8me : du 23 au 27 octobre :\u00a0<\/strong>Le citoyen num\u00e9rique dans un monde de plus en plus num\u00e9rique<\/li>\n<\/ul>\n<h2>Les \u00e9v\u00e8nements planifi\u00e9s \u00e0 Abidjan<\/h2>\n<p style=\"text-align: justify;\">Afin de soutenir cette campagne internationale de sensibilisation, <a href=\"http:\/\/www.abconsulting-ci.com\">AB Consulting CI<\/a> s&rsquo;associe cette ann\u00e9e encore \u00e0 l&rsquo;initiative collective. Chaque semaine, des \u00e9v\u00e8nements gratuits seront propos\u00e9s. Mais, cette ann\u00e9e, outre les \u00e9v\u00e8nements (w\u00e9binaires, rencontres), des ressources documentaires seront mises \u00e0 disposition de tous. Il s&rsquo;agira de livres blancs, de posters \u00e0 partager, d&rsquo;infographies, d&rsquo;articles sur notre blog et m\u00eame d&rsquo;outils de sensibilisation.<\/p>\n<p style=\"text-align: justify;\">Le programme des \u00e9v\u00e8nements est d&rsquo;ores et d\u00e9j\u00e0 fix\u00e9 et nous vous invitons \u00e0 vous inscrire nombreux et nombreuses pour y assister. C&rsquo;est \u00e9v\u00e8nements sont enti\u00e8rement gratuits mais le nombre de places est limit\u00e9. Alors n&rsquo;attendez pas pour vous inscrire en suivant les liens ci-dessous :<\/p>\n<h3>Pensez cybers\u00e9curit\u00e9 &#8211; Prenez des mesures simples pour assurer votre s\u00e9curit\u00e9 en ligne<\/h3>\n<p style=\"text-align: justify;\">Nous vous proposons de nous suivre le <strong>25 Octobre 2017 \u00e0 11h GMT<\/strong> pour un w\u00e9binaire d&rsquo;une heure, pr\u00e9sent\u00e9 par Alain Bonneaud sur le th\u00e8me \u00ab\u00a0<em><strong>10 moyens simples de vous prot\u00e9ger en ligne<\/strong><\/em>\u00ab\u00a0. Les participants se verront remettre gratuitement un livre blanc reprenant les 10 conseils pour assurer leur s\u00e9curit\u00e9 en ligne. <a href=\"https:\/\/attendee.gotowebinar.com\/register\/1700734866899106563\" target=\"_blank\" rel=\"noopener\"><strong>Inscrivez-vous ici<\/strong><\/a>.<\/p>\n<h3>Soyez vigilants &#8211;\u00a0Protection des renseignements personnels et des donn\u00e9es priv\u00e9es<\/h3>\n<p style=\"text-align: justify;\">Le <strong>11 Octobre 2017 \u00e0 11h GMT<\/strong>, David Henrard, pr\u00e9sident du Chapitre ISACA de Qu\u00e9bec et expert de la protection des renseignements personnels, pr\u00e9sentera un w\u00e9binaire d&rsquo;une heure sur le th\u00e8me \u00ab\u00a0<em><strong>Cybers\u00e9curit\u00e9 : La protection des renseignements personnels<\/strong><\/em>\u00ab\u00a0. A l&rsquo;heure o\u00f9 le GDPR entrera bient\u00f4t dans sa phase obligatoire, cette pr\u00e9sentation fera le point sur les aspects r\u00e9glementaires pour les entreprises mais aussi sur les pr\u00e9cautions \u00e0 prendre par tout utilisateur d&rsquo;internet en mati\u00e8re de protection de ses informations personnelles. <a href=\"https:\/\/attendee.gotowebinar.com\/register\/2570027451516525059\" target=\"_blank\" rel=\"noopener\"><strong>Inscrivez-vous ici<\/strong><\/a>.<\/p>\n<h3>Nous sommes tous concern\u00e9s &#8211;\u00a0La cybers\u00e9curit\u00e9 au travail est l&rsquo;affaire de tous<\/h3>\n<p style=\"text-align: justify;\">Le <strong>18 Octobre 2017 \u00e0 11h GMT<\/strong>, Alain Bonneaud, expert en cybers\u00e9curit\u00e9 et en gouvernance des Entreprises pr\u00e9sentera un w\u00e9binaire d&rsquo;une heure sur la n\u00e9cessit\u00e9, au sein des Entreprises, de sensibiliser l&rsquo;ensemble du personnel \u00e0 une obligation de respecter des r\u00e8gles de bases en mati\u00e8re de s\u00e9curit\u00e9. Contrairement \u00e0 une id\u00e9e re\u00e7ue, la s\u00e9curit\u00e9 n&rsquo;est pas l&rsquo;apanage des informaticiens. Savez-vous que 95% des attaques informatiques r\u00e9ussies passent par des personnels non informaticiens? Que vous soyez chef d&rsquo;Entreprise ou salari\u00e9 ou m\u00eame consultant, cette pr\u00e9sentation intitul\u00e9e \u00ab\u00a0La cybers\u00e9curit\u00e9 au travail est l&rsquo;affaire de tous. Pas seulement des informaticiens!\u00a0\u00bb vous concerne.<a href=\"https:\/\/attendee.gotowebinar.com\/register\/5245110654593253891\" target=\"_blank\" rel=\"noopener\"> <strong>Insrcivez-vous ici<\/strong><\/a>.<\/p>\n<h3>Le citoyen num\u00e9rique dans un monde de plus en plus num\u00e9rique<\/h3>\n<p style=\"text-align: justify;\">Le<strong> 27 Octobre 2017<\/strong>, \u00e0 Abidjan, AB Consulting CI organisera une petit d\u00e9jeuner pour les directions des Entreprises afin d&rsquo;\u00e9changer avec les Directeurs et Managers sur leurs <em><strong>responsabilit\u00e9s en mati\u00e8re de gestion des risques de cybers\u00e9curit\u00e9 et les mani\u00e8res de se prot\u00e9ger dans un monde toujours plus num\u00e9rique<\/strong><\/em>. Cette rencontre sera l&rsquo;occasion d&rsquo;\u00e9changer avec nos experts sur l&rsquo;ensemble des aspects relatifs \u00e0 ces probl\u00e9matiques de plus en plus sensibles. Cette matin\u00e9e est accessible uniquement sur invitation, le nombre de places \u00e9tant tr\u00e8s limit\u00e9. N&rsquo;h\u00e9sitez pas \u00e0 nous laisser vos coordonn\u00e9es si vous souhaitez y participer.<\/p>\n<p style=\"text-align: justify;\">Et bien s\u00fbr, n&rsquo;h\u00e9sitez pas \u00e0 nous adresser vos commentaires et \u00e0 partager d&rsquo;autres initiatives utiles \u00e0 tous dans le cadre de cette campagne internationale.<\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Mois%20de%20la%20cybers%C3%A9curit%C3%A9%202017%20%C3%A0%20Abidjan&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fmois-de-la-cybersecurite-2017-abidjan&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"f240340f8d\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-4773\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-4773\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-4773\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-4773\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Mois de la cybers\u00e9curit\u00e9 2017 Le Mois de la cybers\u00e9curit\u00e9 (CSM) s&rsquo;appuie sur le fait qu&rsquo;Internet est une ressource partag\u00e9e et que la s\u00e9curit\u00e9 des communications sur internet est une responsabilit\u00e9 partag\u00e9e. Le Mois de la cybers\u00e9curit\u00e9 est une campagne internationale de sensibilisation. Elle a lieu chaque ann\u00e9e en Europe, Asie, Am\u00e9rique du Nord&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Mois%20de%20la%20cybers%C3%A9curit%C3%A9%202017%20%C3%A0%20Abidjan&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fmois-de-la-cybersecurite-2017-abidjan&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"f240340f8d\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-4773\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-4773\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-4773\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-4773\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":4782,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[524,74,73,25,99,62],"tags":[413,164,733,734,20,80,69,107,732,175,126,24,18,64,68,671,134,159,67,154,268,283,109,269],"jetpack_publicize_connections":[],"author_meta":{"display_name":"Alain Bonneaud","author_link":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"},"featured_img":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?fit=300%2C162","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.9 (Yoast SEO v17.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mois de la cybers\u00e9curit\u00e9 2017 \u00e0 Abidjan - Blog de la Transformation Digitale<\/title>\n<meta name=\"description\" content=\"Le Mois de la cybers\u00e9curit\u00e9 2017 se d\u00e9roulera du 2 au 31 Octobre : \u00e9v\u00e8nements organis\u00e9s \u00e0 Abidjan pour sensibiliser le public sur la s\u00e9curisation d&#039;internet\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mois de la cybers\u00e9curit\u00e9 2017 \u00e0 Abidjan\" \/>\n<meta property=\"og:description\" content=\"Le Mois de la cybers\u00e9curit\u00e9 2017 se d\u00e9roulera du 2 au 31 Octobre : \u00e9v\u00e8nements organis\u00e9s \u00e0 Abidjan pour sensibiliser le public sur la s\u00e9curisation d&#039;internet\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan\" \/>\n<meta property=\"og:site_name\" content=\"Blog de la Transformation Digitale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/abconsultingci\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-19T05:03:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-07T13:10:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?fit=471%2C255&#038;ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"471\" \/>\n\t<meta property=\"og:image:height\" content=\"255\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:site\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Bonneaud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\",\"name\":\"2AB & Associates\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/abconsultingci\/\",\"https:\/\/www.linkedin.com\/in\/alainbonneaud\/\",\"https:\/\/twitter.com\/abonneaud\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"width\":540,\"height\":107,\"caption\":\"2AB & Associates\"},\"image\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#website\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/\",\"name\":\"Blog de la Transformation Digitale\",\"description\":\"COBIT\\u00ae, VeriSM, ITIL\\u00ae, RESILIA, ISO 27001, ISO 20000\",\"publisher\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?fit=471%2C255\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?fit=471%2C255\",\"width\":471,\"height\":255,\"caption\":\"Mois de la cybers\\u00e9curit\\u00e9 2017\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#webpage\",\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan\",\"name\":\"Mois de la cybers\\u00e9curit\\u00e9 2017 \\u00e0 Abidjan - Blog de la Transformation Digitale\",\"isPartOf\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#primaryimage\"},\"datePublished\":\"2017-09-19T05:03:37+00:00\",\"dateModified\":\"2017-10-07T13:10:58+00:00\",\"description\":\"Le Mois de la cybers\\u00e9curit\\u00e9 2017 se d\\u00e9roulera du 2 au 31 Octobre : \\u00e9v\\u00e8nements organis\\u00e9s \\u00e0 Abidjan pour sensibiliser le public sur la s\\u00e9curisation d'internet\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\\u00e9curit\\u00e9\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mois de la cybers\\u00e9curit\\u00e9 2017 \\u00e0 Abidjan\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#webpage\"},\"author\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\"},\"headline\":\"Mois de la cybers\\u00e9curit\\u00e9 2017 \\u00e0 Abidjan\",\"datePublished\":\"2017-09-19T05:03:37+00:00\",\"dateModified\":\"2017-10-07T13:10:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#webpage\"},\"wordCount\":817,\"commentCount\":1,\"publisher\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?fit=471%2C255\",\"keywords\":[\"2AB &amp; Associates\",\"AB Consulting\",\"Abidjan\",\"Afrique\",\"bonnes pratiques\",\"COBIT\",\"cyber-s\\u00e9curit\\u00e9\",\"cybers\\u00e9curit\\u00e9\",\"cybersecurity month\",\"gestion de la s\\u00e9curit\\u00e9\",\"hacker\",\"informatique\",\"ISACA\",\"ISO 27001\",\"ISO 27002\",\"management de la s\\u00e9curit\\u00e9\",\"menace de s\\u00e9curit\\u00e9\",\"mois europ\\u00e9en de la cybers\\u00e9curit\\u00e9\",\"phishing\",\"pirate\",\"protection des donn\\u00e9es\",\"Protection des renseignements personnels\",\"s\\u00e9curit\\u00e9 de l'information\",\"s\\u00e9curit\\u00e9 du SI\"],\"articleSection\":[\"CISM\",\"Cyber-r\\u00e9silience\",\"cybers\\u00e9curit\\u00e9\",\"ISO\/IEC 27001\",\"ISO\/IEC 27002\",\"S\\u00e9curit\\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\",\"name\":\"Alain Bonneaud\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#personlogo\",\"inLanguage\":\"fr-FR\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"caption\":\"Alain Bonneaud\"},\"sameAs\":[\"http:\/\/www.ab-consulting.fr\",\"https:\/\/twitter.com\/abonneaud\"],\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mois de la cybers\u00e9curit\u00e9 2017 \u00e0 Abidjan - Blog de la Transformation Digitale","description":"Le Mois de la cybers\u00e9curit\u00e9 2017 se d\u00e9roulera du 2 au 31 Octobre : \u00e9v\u00e8nements organis\u00e9s \u00e0 Abidjan pour sensibiliser le public sur la s\u00e9curisation d'internet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan","og_locale":"fr_FR","og_type":"article","og_title":"Mois de la cybers\u00e9curit\u00e9 2017 \u00e0 Abidjan","og_description":"Le Mois de la cybers\u00e9curit\u00e9 2017 se d\u00e9roulera du 2 au 31 Octobre : \u00e9v\u00e8nements organis\u00e9s \u00e0 Abidjan pour sensibiliser le public sur la s\u00e9curisation d'internet","og_url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan","og_site_name":"Blog de la Transformation Digitale","article_publisher":"https:\/\/www.facebook.com\/abconsultingci\/","article_published_time":"2017-09-19T05:03:37+00:00","article_modified_time":"2017-10-07T13:10:58+00:00","og_image":[{"width":471,"height":255,"url":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?fit=471%2C255&ssl=1","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@abonneaud","twitter_site":"@abonneaud","twitter_misc":{"\u00c9crit par":"Alain Bonneaud","Dur\u00e9e de lecture est.":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization","name":"2AB & Associates","url":"http:\/\/www.ab-consulting.fr\/blog\/","sameAs":["https:\/\/www.facebook.com\/abconsultingci\/","https:\/\/www.linkedin.com\/in\/alainbonneaud\/","https:\/\/twitter.com\/abonneaud"],"logo":{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/#logo","inLanguage":"fr-FR","url":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","contentUrl":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","width":540,"height":107,"caption":"2AB & Associates"},"image":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#logo"}},{"@type":"WebSite","@id":"http:\/\/www.ab-consulting.fr\/blog\/#website","url":"http:\/\/www.ab-consulting.fr\/blog\/","name":"Blog de la Transformation Digitale","description":"COBIT\u00ae, VeriSM, ITIL\u00ae, RESILIA, ISO 27001, ISO 20000","publisher":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#primaryimage","inLanguage":"fr-FR","url":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?fit=471%2C255","contentUrl":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?fit=471%2C255","width":471,"height":255,"caption":"Mois de la cybers\u00e9curit\u00e9 2017"},{"@type":"WebPage","@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#webpage","url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan","name":"Mois de la cybers\u00e9curit\u00e9 2017 \u00e0 Abidjan - Blog de la Transformation Digitale","isPartOf":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#primaryimage"},"datePublished":"2017-09-19T05:03:37+00:00","dateModified":"2017-10-07T13:10:58+00:00","description":"Le Mois de la cybers\u00e9curit\u00e9 2017 se d\u00e9roulera du 2 au 31 Octobre : \u00e9v\u00e8nements organis\u00e9s \u00e0 Abidjan pour sensibiliser le public sur la s\u00e9curisation d'internet","breadcrumb":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/www.ab-consulting.fr\/blog"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/securite"},{"@type":"ListItem","position":3,"name":"Mois de la cybers\u00e9curit\u00e9 2017 \u00e0 Abidjan"}]},{"@type":"Article","@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#article","isPartOf":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#webpage"},"author":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c"},"headline":"Mois de la cybers\u00e9curit\u00e9 2017 \u00e0 Abidjan","datePublished":"2017-09-19T05:03:37+00:00","dateModified":"2017-10-07T13:10:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#webpage"},"wordCount":817,"commentCount":1,"publisher":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization"},"image":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?fit=471%2C255","keywords":["2AB &amp; Associates","AB Consulting","Abidjan","Afrique","bonnes pratiques","COBIT","cyber-s\u00e9curit\u00e9","cybers\u00e9curit\u00e9","cybersecurity month","gestion de la s\u00e9curit\u00e9","hacker","informatique","ISACA","ISO 27001","ISO 27002","management de la s\u00e9curit\u00e9","menace de s\u00e9curit\u00e9","mois europ\u00e9en de la cybers\u00e9curit\u00e9","phishing","pirate","protection des donn\u00e9es","Protection des renseignements personnels","s\u00e9curit\u00e9 de l'information","s\u00e9curit\u00e9 du SI"],"articleSection":["CISM","Cyber-r\u00e9silience","cybers\u00e9curit\u00e9","ISO\/IEC 27001","ISO\/IEC 27002","S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ab-consulting.fr\/blog\/securite\/mois-de-la-cybersecurite-2017-abidjan#respond"]}]},{"@type":"Person","@id":"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c","name":"Alain Bonneaud","image":{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/#personlogo","inLanguage":"fr-FR","url":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","contentUrl":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","caption":"Alain Bonneaud"},"sameAs":["http:\/\/www.ab-consulting.fr","https:\/\/twitter.com\/abonneaud"],"url":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"}]}},"coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cism\" class=\"advgb-post-tax-term\">CISM<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\" class=\"advgb-post-tax-term\">Cyber-r\u00e9silience<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite\" class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/isoiec-27001\" class=\"advgb-post-tax-term\">ISO\/IEC 27001<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/isoiec-27002\" class=\"advgb-post-tax-term\">ISO\/IEC 27002<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">CISM<\/span>","<span class=\"advgb-post-tax-term\">Cyber-r\u00e9silience<\/span>","<span class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">ISO\/IEC 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO\/IEC 27002<\/span>","<span class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/span>"]},"tags":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">2AB &amp; Associates<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">AB Consulting<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">Abidjan<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">Afrique<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">bonnes pratiques<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">COBIT<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cybersecurity month<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">gestion de la s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">hacker<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">informatique<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISACA<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27001<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27002<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">management de la s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">menace de s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">mois europ\u00e9en de la cybers\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">phishing<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">pirate<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">protection des donn\u00e9es<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">Protection des renseignements personnels<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 du SI<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">2AB &amp; Associates<\/span>","<span class=\"advgb-post-tax-term\">AB Consulting<\/span>","<span class=\"advgb-post-tax-term\">Abidjan<\/span>","<span class=\"advgb-post-tax-term\">Afrique<\/span>","<span class=\"advgb-post-tax-term\">bonnes pratiques<\/span>","<span class=\"advgb-post-tax-term\">COBIT<\/span>","<span class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">cybersecurity month<\/span>","<span class=\"advgb-post-tax-term\">gestion de la s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">hacker<\/span>","<span class=\"advgb-post-tax-term\">informatique<\/span>","<span class=\"advgb-post-tax-term\">ISACA<\/span>","<span class=\"advgb-post-tax-term\">ISO 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO 27002<\/span>","<span class=\"advgb-post-tax-term\">management de la s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">menace de s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">mois europ\u00e9en de la cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">phishing<\/span>","<span class=\"advgb-post-tax-term\">pirate<\/span>","<span class=\"advgb-post-tax-term\">protection des donn\u00e9es<\/span>","<span class=\"advgb-post-tax-term\">Protection des renseignements personnels<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 du SI<\/span>"]}},"comment_count":"1","relative_dates":{"created":"Posted 9 ans ago","modified":"Updated 9 ans ago"},"absolute_dates":{"created":"Posted on 19 septembre 2017","modified":"Updated on 7 octobre 2017"},"absolute_dates_time":{"created":"Posted on 19 septembre 2017 6 h 03 min","modified":"Updated on 7 octobre 2017 14 h 10 min"},"featured_img_caption":"","jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/mois-cyber-abidjan-2.png?fit=471%2C255","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OrbX-1eZ","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":4795,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles","url_meta":{"origin":4773,"position":0},"title":"S\u00e9curit\u00e9 sur internet : 10 pratiques essentielles","date":"21 septembre 2017","format":false,"excerpt":"Dans le cadre du mois de la cybers\u00e9curit\u00e9 2017, AB Consulting CI et 2AB & Associates, sponsors officiels depuis plusieurs ann\u00e9es, s'associent de nouveau \u00e0 la campagne de sensibilisation des citoyens sur les bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9 sur internet. 10 pratiques essentielles pour rester en s\u00e9curit\u00e9 sur internet\u2026","rel":"","context":"Dans &quot;Cyber-r\u00e9silience&quot;","img":{"alt_text":"10 pratiques essentielles pour rester en s\u00e9curit\u00e9 sur internet","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=580%2C819&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":4962,"url":"http:\/\/www.ab-consulting.fr\/blog\/gdpr\/protection-des-renseignements-personnels","url_meta":{"origin":4773,"position":1},"title":"Protection des renseignements personnels","date":"15 octobre 2017","format":false,"excerpt":"Dans le cadre du mois de la cybers\u00e9curit\u00e9 2017, nous avons eu le plaisir d'accueillir, le 11 octobre dernier, David Henrard pour un w\u00e9binaire exceptionnel pr\u00e9sentant un \u00e9tat des lieux de la protection des renseignements personnels en 2017 dans le monde. La protection des renseignements personnels Un \u00e9tat des lieux\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"La protection des renseignements personnels","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/10\/protection-renseignements-personnels-Webinaire.jpg?fit=580%2C357&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1682,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/gdpr-protection-des-donnees","url_meta":{"origin":4773,"position":2},"title":"GDPR et protection des donn\u00e9es en Afrique","date":"30 octobre 2016","format":false,"excerpt":"Les exigences et les cons\u00e9quences du GDPR La r\u00e8glementation g\u00e9n\u00e9rale sur la protection des donn\u00e9es (GDPR: General Data Protection R\u00e9gulation) est applicable \u00e0 partir du 25 mai 2018. Elle deviendra donc, de fait, une loi applicable dans chacun des pays de la Communaut\u00e9 Europ\u00e9enne \u00e0 cette date. Encore une r\u00e9glementation\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"GDPR - Quels risques pour l'Afrique?","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2016\/10\/GDPR-risques.jpg?fit=425%2C282&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":462,"url":"http:\/\/www.ab-consulting.fr\/blog\/it-sm\/iso-20000\/cyber-securite-recherche-professionnels","url_meta":{"origin":4773,"position":3},"title":"Cyber-s\u00e9curit\u00e9: une demande forte pour un profil rare","date":"19 septembre 2015","format":false,"excerpt":"\u00a0 L\u2019actuelle p\u00e9nurie de professionnels qualifi\u00e9s en\u00a0cyber-s\u00e9curit\u00e9 continue de constituer un probl\u00e8me majeur pour\u00a0toutes les industries aux Etats-Unis, en Europe, mais aussi dans le reste du monde. James Trainor, directeur adjoint par int\u00e9rim de la Division Cyber du FBI, a r\u00e9cemment d\u00e9clar\u00e9 que l'industrie de la cyber-s\u00e9curit\u00e9 doit absolument \"doubler\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"professionnel en cyber-s\u00c3\u00a9curit\u00c3\u00a9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/professionnel-securite-300x226.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1192,"url":"http:\/\/www.ab-consulting.fr\/blog\/geit\/cyber-risques-conseil-administration","url_meta":{"origin":4773,"position":4},"title":"Cyber-risques &#8211; Que fait le Conseil d&rsquo;Administration?","date":"30 octobre 2015","format":false,"excerpt":"Le Conseil d'Administration est en charge de s'assurer de la cr\u00e9ation de valeur pour les parties prenantes de l'Entreprise tout en optimisant les risques et les ressources. Le Conseil d'Administration, organe de Gouvernance de l'entreprise est donc directement concern\u00e9 par les cyber-risques. \"La SEC (organisme f\u00e9d\u00e9ral am\u00e9ricain en charge de\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"Le conseil d'administration","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/conseil-administration-300x193.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":665,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile","url_meta":{"origin":4773,"position":5},"title":"Un op\u00e9rateur mobile victime d&rsquo;une cyber-attaque","date":"6 octobre 2015","format":false,"excerpt":"Environ 15 millions de personnes qui se sont abonn\u00e9es dans les trois derni\u00e8res ann\u00e9es aux services sans fil de T-Mobile, quatri\u00e8me op\u00e9rateur de t\u00e9l\u00e9phonie mobile des Etats Unis avec 25 millions d'abonn\u00e9s, ont sans doute\u00a0\u00e9t\u00e9 victimes du vol de leurs informations personnelles suite \u00e0 une cyber-attaque r\u00e9ussie\u00a0contre l\u2019un de ses\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"cyber-attaque contre T-Mobile","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/4773"}],"collection":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/comments?post=4773"}],"version-history":[{"count":20,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/4773\/revisions"}],"predecessor-version":[{"id":4905,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/4773\/revisions\/4905"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/media\/4782"}],"wp:attachment":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/media?parent=4773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/categories?post=4773"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/tags?post=4773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}