{"id":899,"date":"2015-10-14T22:33:10","date_gmt":"2015-10-14T21:33:10","guid":{"rendered":"http:\/\/www.ab-consulting.fr\/blog\/?p=899"},"modified":"2015-10-14T22:41:32","modified_gmt":"2015-10-14T21:41:32","slug":"resilia-cyber-resilience","status":"publish","type":"post","link":"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience","title":{"rendered":"RESILIA, objectif cyber-r\u00e9silience"},"content":{"rendered":"<p style=\"text-align: justify;\"><em>RESILIA, le cadre de r\u00e9f\u00e9rence de cyber-r\u00e9silience, publi\u00e9 r\u00e9cemment par AXELOS, fait une entr\u00e9e remarqu\u00e9e dans le paysage des r\u00e9f\u00e9rentiels de bonnes pratiques au moment-m\u00eame o\u00f9 se d\u00e9roule le <a href=\"https:\/\/cybersecuritymonth.eu\/\" target=\"_blank\">mois de la cyber-s\u00e9curit\u00e9<\/a>, auquel AB Consulting s&rsquo;associe au travers de la publication d&rsquo;articles et de sa participation \u00e0 une s\u00e9rie d&rsquo;\u00e9v\u00e8nements destin\u00e9s \u00e0 sensibiliser les Entreprises sur les risques en mati\u00e8re de cyber-s\u00e9curit\u00e9.<\/em><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/plus.google.com\/118075462993454544693\/about\" target=\"_blank\" rel=\"Author\"><img loading=\"lazy\" class=\"aligncenter wp-image-910\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience.jpeg?resize=524%2C349\" alt=\"RESILIA - cyber-resilience\" width=\"524\" height=\"349\" srcset=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience.jpeg?resize=300%2C200 300w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience.jpeg?resize=75%2C50 75w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience.jpeg?w=424 424w\" sizes=\"(max-width: 524px) 100vw, 524px\" data-recalc-dims=\"1\" \/><\/a><\/p>\n<h2 style=\"text-align: justify;\"><strong>Quel est le probl\u00e8me?<\/strong><\/h2>\n<p style=\"text-align: justify;\">Le probl\u00e8me avec la s\u00e9curit\u00e9 informatique, c&rsquo;est que, traditionnellement, elle est largement\u00a0ax\u00e9e sur la technologie, se pr\u00e9occupant surtout de contr\u00f4les et de m\u00e9canismes en\u00a0en oubliant\u00a0souvent la raison : il s&rsquo;agit de <em><strong>prot\u00e9ger les actifs de l&rsquo;organisation<\/strong><\/em>. Cela r\u00e9sulte le plus souvent en\u00a0des mesures de protection totalement inadapt\u00e9es\u00a0: soit on\u00a0sauvegarde tous les actifs et cela conduira \u00e0\u00a0un co\u00fbt disproportionn\u00e9, ou, \u00e0 l&rsquo;inverse on met en place une protection insuffisante pour pr\u00e9server\u00a0des actifs pr\u00e9cieux dont on ne r\u00e9alise la\u00a0valeur qu&rsquo;une fois qu&rsquo;un incident de s\u00e9curit\u00e9 est survenu.<\/p>\n<p style=\"text-align: justify;\">Le r\u00e9sultat\u00a0de cet \u00e9tat de fait, c&rsquo;est qu&rsquo;on\u00a0bl\u00e2mera des\u00a0d\u00e9partements qui, \u00e0 leur niveau, faisaient de leur mieux pour fournir une solution qui se r\u00e9v\u00e8le inad\u00e9quate pour\u00a0un probl\u00e8me qui se situe \u00e0 l&rsquo;\u00e9chelle de l&rsquo;organisation, et pas seulement \u00e0 celle du d\u00e9partement..<\/p>\n<p style=\"text-align: justify;\">Un changement de paradigme s&rsquo;est produit il y a quelques ann\u00e9es avec l&rsquo;\u00e9mergence de la\u00a0\u00abs\u00e9curit\u00e9 de l&rsquo;information\u00bb, induisant\u00a0un changement de culture au travers de\u00a0la focalisation\u00a0sur\u00a0<strong>ce qui devait \u00a0\u00eatre prot\u00e9g\u00e9<\/strong>\u00a0<strong>au d\u00e9triment de qui devait s&rsquo;en charger,\u00a0<\/strong>s&rsquo;appuyant sur\u00a0l&rsquo;introduction du concept que la s\u00e9curit\u00e9 est une\u00a0responsabilit\u00e9 collective\u00a0et pas seulement celle du\u00a0domaine informatique.<\/p>\n<p style=\"text-align: justify;\">Les m\u00e9tiers de l&rsquo;Entreprise ont finalement\u00a0compris qu&rsquo;ils avaient un r\u00f4le crucial\u00a0\u00e0 jouer dans la cat\u00e9gorisation des actifs en fonction de\u00a0la valeur qu&rsquo;ils repr\u00e9sentent pour\u00a0l&rsquo;Organisation, c&rsquo;est \u00e0 dire de l&rsquo;impact qu&rsquo;aurait la\u00a0perte de ces actifs sur l&rsquo;Entreprise, et pas seulement\u00a0le prix des actifs tangibles. A titre d&rsquo;exemple, un ordinateur portable perdu pourrait co\u00fbter\u00a0\u00a01000 \u20ac\u00a0au titre de son remplacement, mais entra\u00eener la perte d&rsquo;une opportunit\u00e9\u00a0d&rsquo;affaire faisant perdre\u00a010.000 \u20ac \u00e0\u00a0l&rsquo;entreprise. Si l&rsquo;ordinateur portable a \u00e9t\u00e9 vol\u00e9 et que\u00a0des donn\u00e9es confidentielles qu&rsquo;il contenait ont \u00e9t\u00e9 divulgu\u00e9es, alors, \u00e0 ces montants peuvent s&rsquo;ajouter des amendes pouvant atteindre 100 000 \u20ac par exemple. Et n&rsquo;oublions pas que cette fuite d&rsquo;information\u00a0pourrait menacer\u00a0l&rsquo;avenir de l&rsquo;entreprise \u00e0 cause de la perte de r\u00e9putation et d&rsquo;image\u00a0de la marque qui en\u00a0r\u00e9sulteraient ainsi que\u00a0de la r\u00e9duction de la confiance de la client\u00e8le &#8230; A partir de l\u00e0 on entre tr\u00e8s rapidement dans une spirale infernale qui conduit beaucoup d&rsquo;Entreprises ayant subi une cyber-attaque \u00e0 une disparition pure et simple dans les deux ann\u00e9es suivantes&#8230;.<\/p>\n<h2 style=\"text-align: justify;\"><strong>RESILIA, de quoi s&rsquo;agit-il?<\/strong><\/h2>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" class=\"alignleft wp-image-914 size-medium\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/RESILIA-Logo-Large.jpg?resize=300%2C152\" alt=\"Logo RESILIA\" width=\"300\" height=\"152\" srcset=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/RESILIA-Logo-Large.jpg?resize=300%2C152 300w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/RESILIA-Logo-Large.jpg?w=455 455w\" sizes=\"(max-width: 300px) 100vw, 300px\" data-recalc-dims=\"1\" \/>Il est clair que la pr\u00e9vention ne suffit pas. La loi de\u00a0d\u00e9croissance des rendements montre qu&rsquo;\u00e0 partir d&rsquo;un certain\u00a0point, \u00a0un exc\u00e8s de\u00a0pr\u00e9vention devient totalement inefficace en termes de co\u00fbts. Malheureusement, de nombreuses organisations trop\u00a0immatures ont\u00a0fix\u00e9 ce seuil \u00e0 un niveau incroyablement bas. C&rsquo;est l\u00e0 que\u00a0\u00a0RESILIA \u00a0intervient en proposant des bonnes pratiques nous aidant\u00a0\u00e0\u00a0planifier et \u00e0 r\u00e9sister aux effets ind\u00e9sirables d&rsquo;un incident de s\u00e9curit\u00e9.<\/p>\n<h2 style=\"text-align: justify;\"><strong>Alors, comment \u00e7a marche?<\/strong><\/h2>\n<p style=\"text-align: justify;\">Ces effets peuvent-ils \u00eatre contenus?\u00a0La r\u00e9ponse est positive. La s\u00e9curit\u00e9 de l&rsquo;information n&rsquo;est pas un but en soit. \u00a0C&rsquo;est un parcours balis\u00e9 suivant un processus simple:<\/p>\n<ol>\n<li style=\"text-align: justify;\"><strong>Identifier les principaux actifs<\/strong>. Classez-les selon leur valeur pour l&rsquo;organisation, pas seulement leur valeur\u00a0valeur mon\u00e9taire. Il faut comprendre l&rsquo;impact pour l&rsquo;Entreprise s&rsquo;ils\u00a0sont perdus ou vol\u00e9s. La perte de donn\u00e9es est un probl\u00e8me et le vol de donn\u00e9es a un co\u00fbt tr\u00e8s \u00e9lev\u00e9: nous ne parlons pas seulement d&rsquo;amendes inflig\u00e9es par les organismes\u00a0de r\u00e9glementation, mais aussi et surtout de la\u00a0r\u00e9putation de la marque et de l&rsquo;h\u00e9morragie de\u00a0clients qui va r\u00e9sulter de la perte de confiance induite.<\/li>\n<li style=\"text-align: justify;\"><strong>D\u00e9terminer l&rsquo;app\u00e9tit du risque de l&rsquo;organisation.<\/strong> Quelles sont les menaces qui p\u00e8sent sur ces actifs? O\u00f9 sont leurs vuln\u00e9rabilit\u00e9s? Certains risques sont totalement in\u00e9vitables, ou ont un co\u00fbt disproportionn\u00e9 de r\u00e9duction\u00a0qui peut \u00eatre difficilement acceptable. Alors, un plan de r\u00e9ponse devrait \u00eatre disponible au cas o\u00f9\u00a0le risque se transformer se concr\u00e9tise. Il est toujours plus s\u00fbr d&rsquo;avoir un plan en esp\u00e9rant ne jamais avoir \u00e0 l&rsquo;utiliser\u00a0que de ne pas en avoir du tout.<\/li>\n<li style=\"text-align: justify;\"><strong>Communiquer la strat\u00e9gie: planifier et annoncer.<\/strong> Qui sont vos partenaires? Quels seront leurs responsabilit\u00e9s? Comprennent-ils les cons\u00e9quences de responsabilit\u00e9s non assum\u00e9es? Y at-il des conditions pr\u00e9alables &#8211; comme une formation compl\u00e9mentaire ou des mesures l\u00e9gislatives qui n\u00e9cessitent d&rsquo;\u00eatre satisfaites?<\/li>\n<li style=\"text-align: justify;\"><strong>Ex\u00e9cuter le plan: impliquer les personnes et les processus, et pas seulement la technologie.<\/strong>\u00a0Int\u00e9grez les changements au niveau\u00a0culturel en faisant de la s\u00e9curit\u00e9 un \u00e9l\u00e9ment naturel op\u00e9rations quotidiennes\u00a0&#8211; les gens ont besoin de se sentir\u00a0s\u00e9curis\u00e9s de fa\u00e7on habituelle gr\u00e2ce \u00e0\u00a0la sensibilisation sur les\u00a0avantages et des ramifications plut\u00f4t que de de ressentir qu&rsquo;il ne s&rsquo;agit que d&rsquo;un exercice qui se traduira par une\u00a0case suppl\u00e9mentaire \u00e0 cocher.<\/li>\n<li style=\"text-align: justify;\"><strong>Examen et v\u00e9rification:<\/strong> appliquer la gouvernance \u00e0 tous les niveaux, effectuer des audits r\u00e9guliers\u00a0pour \u00e9valuer les niveaux de maturit\u00e9 et examiner les opportunit\u00e9s\u00a0d&rsquo;am\u00e9lioration, mesurer et pr\u00e9senter des rapports qui serviront de preuve de la conformit\u00e9 et identifier les failles. Vous pouvez \u00e9galement simplement laisser aux hackers le soin\u00a0de trouver les failles par eux-m\u00eames\u00a0d&rsquo;abord !&#8230;<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">Mais tout cela ne va pas sans difficult\u00e9. La S\u00e9curit\u00e9 exige un engagement fort au niveau du Conseil d&rsquo;Administration, des\u00a0efforts soutenus et des investissements importants pour \u00eatre couronn\u00e9e de succ\u00e8s: ce sont les personnes responsables de l&rsquo;approbation des contre-mesures d\u00e9fensives qui ont le plus \u00e0 perdre si les mesures ne sont pas prises\u00a0&#8211; celles\u00a0qui verront le\u00a0plus rouge visages quand vous expliquerez\u00a0pourquoi on n&rsquo;a pas fait plus t\u00f4t ce qu&rsquo;il fallait. Donc, c&rsquo;est l\u00e0 que se situe votre\u00a0retour sur investissement: si vous voulez avoir une id\u00e9e de\u00a0votre budget, pensez \u00e0 combien il en co\u00fbtera \u00e0 votre organisation si vous ne faites pas ce qu&rsquo;il faut\u00a0et que vous devez supporter des cons\u00e9quences telles que des\u00a0p\u00e9nalit\u00e9s par exemple..<\/p>\n<p style=\"text-align: justify;\">Si\u00a0la s\u00e9curit\u00e9 n&rsquo;est pas pour vous, alors peut-\u00eatre qu&rsquo;elle\u00a0est pour vos concurrents.<\/p>\n<p style=\"text-align: justify;\"><em><strong>Pour tout compl\u00e9ment d&rsquo;information ou pour vous abonner \u00e0 notre newsletter, merci de compl\u00e9ter le formulaire de contact :<\/strong><\/em><\/p>\n<p style=\"text-align: justify;\"><div id='contact-form-899'>\n<form action='http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#contact-form-899' method='post' class='contact-form commentsblock'>\n<script>\n\t\t\t( function () {\n\t\t\t\tconst contact_forms = document.getElementsByClassName('contact-form');\n\n\t\t\t\tfor ( const form of contact_forms ) {\n\t\t\t\t\tform.onsubmit = function() {\n\t\t\t\t\t\tconst buttons = form.getElementsByTagName('button');\n\n\t\t\t\t\t\tfor( const button of buttons ) {\n\t\t\t\t\t\t\tbutton.setAttribute('disabled', true);\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} )();\n\t\t<\/script>\n<div class='grunion-field-wrap grunion-field-name-wrap'  >\n<label\n\t\t\t\tfor='g899-nom'\n\t\t\t\tclass='grunion-field-label name'\n\t\t\t\t>Nom<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g899-nom'\n\t\t\t\t\tid='g899-nom'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='name' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-email-wrap'  >\n<label\n\t\t\t\tfor='g899-email'\n\t\t\t\tclass='grunion-field-label email'\n\t\t\t\t>E-mail<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='email'\n\t\t\t\t\tname='g899-email'\n\t\t\t\t\tid='g899-email'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='email' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-text-wrap'  >\n<label\n\t\t\t\tfor='g899-entreprise'\n\t\t\t\tclass='grunion-field-label text'\n\t\t\t\t>Entreprise<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g899-entreprise'\n\t\t\t\t\tid='g899-entreprise'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='text' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-text-wrap'  >\n<label\n\t\t\t\tfor='g899-pays'\n\t\t\t\tclass='grunion-field-label text'\n\t\t\t\t>Pays<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g899-pays'\n\t\t\t\t\tid='g899-pays'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='text' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-url-wrap'  >\n<label\n\t\t\t\tfor='g899-siteweb'\n\t\t\t\tclass='grunion-field-label url'\n\t\t\t\t>Site Web<\/label>\n<input\n\t\t\t\t\ttype='url'\n\t\t\t\t\tname='g899-siteweb'\n\t\t\t\t\tid='g899-siteweb'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='url' \n\t\t\t\t\t\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-textarea-wrap'  >\n<label\n\t\t\t\tfor='contact-form-comment-g899-commentaire'\n\t\t\t\tclass='grunion-field-label textarea'\n\t\t\t\t>Commentaire<span>(obligatoire)<\/span><\/label>\n<textarea\n\t\t                name='g899-commentaire'\n\t\t                id='contact-form-comment-g899-commentaire'\n\t\t                rows='20' class='textarea'  required aria-required='true'><\/textarea>\n\t<\/div>\n\t<p class='contact-submit'>\n\t\t<button type='submit' class='pushbutton-wide'>Envoyer<\/button>\t\t<input type='hidden' name='contact-form-id' value='899' \/>\n\t\t<input type='hidden' name='action' value='grunion-contact-form' \/>\n\t\t<input type='hidden' name='contact-form-hash' value='6db31058a10d04cba21507e3421cf9df964beed5' \/>\n\t<\/p>\n<p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"ak_\"><label>&#916;<textarea name=\"ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"ak_js\" value=\"58\"\/><script>document.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );<\/script><\/p><\/form>\n<\/div><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20RESILIA%2C%20objectif%20cyber-r%C3%A9silience&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fcyber-resilience%2Fresilia%2Fresilia-cyber-resilience&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"9f267a7019\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-899\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-899\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-899\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-899\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>RESILIA, le cadre de r\u00e9f\u00e9rence de cyber-r\u00e9silience, publi\u00e9 r\u00e9cemment par AXELOS, fait une entr\u00e9e remarqu\u00e9e dans le paysage des r\u00e9f\u00e9rentiels de bonnes pratiques au moment-m\u00eame o\u00f9 se d\u00e9roule le mois de la cyber-s\u00e9curit\u00e9, auquel AB Consulting s&rsquo;associe au travers de la publication d&rsquo;articles et de sa participation \u00e0 une s\u00e9rie d&rsquo;\u00e9v\u00e8nements destin\u00e9s \u00e0 sensibiliser&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20RESILIA%2C%20objectif%20cyber-r%C3%A9silience&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fcyber-resilience%2Fresilia%2Fresilia-cyber-resilience&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"9f267a7019\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-899\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-899\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-899\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-899\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[75],"tags":[38,80,101,69,107,64,68,78,134,159,100,160,87,109],"jetpack_publicize_connections":[],"author_meta":{"display_name":"Alain Bonneaud","author_link":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"},"featured_img":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.9 (Yoast SEO v17.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>RESILIA, objectif cyber-r\u00e9silience - Blog de la Transformation Digitale<\/title>\n<meta name=\"description\" content=\"RESILIA, le cadre de cyber-r\u00e9silience publi\u00e9 par AXELOS nous donne des orientations sous forme de bonnes pratiques applicables \u00e0 tous types d&#039;organisations\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RESILIA, objectif cyber-r\u00e9silience\" \/>\n<meta property=\"og:description\" content=\"RESILIA, le cadre de cyber-r\u00e9silience publi\u00e9 par AXELOS nous donne des orientations sous forme de bonnes pratiques applicables \u00e0 tous types d&#039;organisations\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience\" \/>\n<meta property=\"og:site_name\" content=\"Blog de la Transformation Digitale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/abconsultingci\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-14T21:33:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-10-14T21:41:32+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience-300x200.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:site\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Bonneaud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\",\"name\":\"2AB & Associates\",\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/abconsultingci\/\",\"https:\/\/www.linkedin.com\/in\/alainbonneaud\/\",\"https:\/\/twitter.com\/abonneaud\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"width\":540,\"height\":107,\"caption\":\"2AB & Associates\"},\"image\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#website\",\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/\",\"name\":\"Blog de la Transformation Digitale\",\"description\":\"COBIT\\u00ae, VeriSM, ITIL\\u00ae, RESILIA, ISO 27001, ISO 20000\",\"publisher\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience.jpeg?fit=424%2C283\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience.jpeg?fit=424%2C283\",\"width\":424,\"height\":283,\"caption\":\"RESILIA - cyber-resilience\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#webpage\",\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience\",\"name\":\"RESILIA, objectif cyber-r\\u00e9silience - Blog de la Transformation Digitale\",\"isPartOf\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#primaryimage\"},\"datePublished\":\"2015-10-14T21:33:10+00:00\",\"dateModified\":\"2015-10-14T21:41:32+00:00\",\"description\":\"RESILIA, le cadre de cyber-r\\u00e9silience publi\\u00e9 par AXELOS nous donne des orientations sous forme de bonnes pratiques applicables \\u00e0 tous types d'organisations\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.ab-consulting.fr\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-r\\u00e9silience\",\"item\":\"https:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"RESILIA\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"RESILIA, objectif cyber-r\\u00e9silience\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#webpage\"},\"author\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\"},\"headline\":\"RESILIA, objectif cyber-r\\u00e9silience\",\"datePublished\":\"2015-10-14T21:33:10+00:00\",\"dateModified\":\"2015-10-14T21:41:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#webpage\"},\"wordCount\":1185,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience-300x200.jpeg\",\"keywords\":[\"AXELOS\",\"COBIT\",\"cyber-r\\u00e9silience\",\"cyber-s\\u00e9curit\\u00e9\",\"cybers\\u00e9curit\\u00e9\",\"ISO 27001\",\"ISO 27002\",\"ITIL\",\"menace de s\\u00e9curit\\u00e9\",\"mois europ\\u00e9en de la cybers\\u00e9curit\\u00e9\",\"resilia\",\"R\\u00e9silience\",\"s\\u00e9curit\\u00e9\",\"s\\u00e9curit\\u00e9 de l'information\"],\"articleSection\":[\"RESILIA\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\",\"name\":\"Alain Bonneaud\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#personlogo\",\"inLanguage\":\"fr-FR\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"caption\":\"Alain Bonneaud\"},\"sameAs\":[\"http:\/\/www.ab-consulting.fr\",\"https:\/\/twitter.com\/abonneaud\"],\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"RESILIA, objectif cyber-r\u00e9silience - Blog de la Transformation Digitale","description":"RESILIA, le cadre de cyber-r\u00e9silience publi\u00e9 par AXELOS nous donne des orientations sous forme de bonnes pratiques applicables \u00e0 tous types d'organisations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience","og_locale":"fr_FR","og_type":"article","og_title":"RESILIA, objectif cyber-r\u00e9silience","og_description":"RESILIA, le cadre de cyber-r\u00e9silience publi\u00e9 par AXELOS nous donne des orientations sous forme de bonnes pratiques applicables \u00e0 tous types d'organisations","og_url":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience","og_site_name":"Blog de la Transformation Digitale","article_publisher":"https:\/\/www.facebook.com\/abconsultingci\/","article_published_time":"2015-10-14T21:33:10+00:00","article_modified_time":"2015-10-14T21:41:32+00:00","og_image":[{"url":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience-300x200.jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@abonneaud","twitter_site":"@abonneaud","twitter_misc":{"\u00c9crit par":"Alain Bonneaud","Dur\u00e9e de lecture est.":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization","name":"2AB & Associates","url":"https:\/\/www.ab-consulting.fr\/blog\/","sameAs":["https:\/\/www.facebook.com\/abconsultingci\/","https:\/\/www.linkedin.com\/in\/alainbonneaud\/","https:\/\/twitter.com\/abonneaud"],"logo":{"@type":"ImageObject","@id":"https:\/\/www.ab-consulting.fr\/blog\/#logo","inLanguage":"fr-FR","url":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","contentUrl":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","width":540,"height":107,"caption":"2AB & Associates"},"image":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.ab-consulting.fr\/blog\/#website","url":"https:\/\/www.ab-consulting.fr\/blog\/","name":"Blog de la Transformation Digitale","description":"COBIT\u00ae, VeriSM, ITIL\u00ae, RESILIA, ISO 27001, ISO 20000","publisher":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","@id":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#primaryimage","inLanguage":"fr-FR","url":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience.jpeg?fit=424%2C283","contentUrl":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience.jpeg?fit=424%2C283","width":424,"height":283,"caption":"RESILIA - cyber-resilience"},{"@type":"WebPage","@id":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#webpage","url":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience","name":"RESILIA, objectif cyber-r\u00e9silience - Blog de la Transformation Digitale","isPartOf":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#primaryimage"},"datePublished":"2015-10-14T21:33:10+00:00","dateModified":"2015-10-14T21:41:32+00:00","description":"RESILIA, le cadre de cyber-r\u00e9silience publi\u00e9 par AXELOS nous donne des orientations sous forme de bonnes pratiques applicables \u00e0 tous types d'organisations","breadcrumb":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.ab-consulting.fr\/blog"},{"@type":"ListItem","position":2,"name":"Cyber-r\u00e9silience","item":"https:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience"},{"@type":"ListItem","position":3,"name":"RESILIA","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia"},{"@type":"ListItem","position":4,"name":"RESILIA, objectif cyber-r\u00e9silience"}]},{"@type":"Article","@id":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#article","isPartOf":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#webpage"},"author":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c"},"headline":"RESILIA, objectif cyber-r\u00e9silience","datePublished":"2015-10-14T21:33:10+00:00","dateModified":"2015-10-14T21:41:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#webpage"},"wordCount":1185,"commentCount":1,"publisher":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization"},"image":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#primaryimage"},"thumbnailUrl":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/resilience-300x200.jpeg","keywords":["AXELOS","COBIT","cyber-r\u00e9silience","cyber-s\u00e9curit\u00e9","cybers\u00e9curit\u00e9","ISO 27001","ISO 27002","ITIL","menace de s\u00e9curit\u00e9","mois europ\u00e9en de la cybers\u00e9curit\u00e9","resilia","R\u00e9silience","s\u00e9curit\u00e9","s\u00e9curit\u00e9 de l'information"],"articleSection":["RESILIA"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ab-consulting.fr\/blog\/cyber-resilience\/resilia\/resilia-cyber-resilience#respond"]}]},{"@type":"Person","@id":"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c","name":"Alain Bonneaud","image":{"@type":"ImageObject","@id":"https:\/\/www.ab-consulting.fr\/blog\/#personlogo","inLanguage":"fr-FR","url":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","contentUrl":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","caption":"Alain Bonneaud"},"sameAs":["http:\/\/www.ab-consulting.fr","https:\/\/twitter.com\/abonneaud"],"url":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"}]}},"coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">RESILIA<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">RESILIA<\/span>"]},"tags":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">AXELOS<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">COBIT<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">ISO 27001<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">ISO 27002<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">ITIL<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">menace de s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">mois europ\u00e9en de la cybers\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">resilia<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">R\u00e9silience<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\/resilia\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">AXELOS<\/span>","<span class=\"advgb-post-tax-term\">COBIT<\/span>","<span class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/span>","<span class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">ISO 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO 27002<\/span>","<span class=\"advgb-post-tax-term\">ITIL<\/span>","<span class=\"advgb-post-tax-term\">menace de s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">mois europ\u00e9en de la cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">resilia<\/span>","<span class=\"advgb-post-tax-term\">R\u00e9silience<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/span>"]}},"comment_count":"1","relative_dates":{"created":"Posted 11 ans ago","modified":"Updated 11 ans ago"},"absolute_dates":{"created":"Posted on 14 octobre 2015","modified":"Updated on 14 octobre 2015"},"absolute_dates_time":{"created":"Posted on 14 octobre 2015 22 h 33 min","modified":"Updated on 14 octobre 2015 22 h 41 min"},"featured_img_caption":"","jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OrbX-ev","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":639,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique","url_meta":{"origin":899,"position":0},"title":"Cyber-r\u00e9silience: un tournant strat\u00e9gique","date":"3 octobre 2015","format":false,"excerpt":"Les approches traditionnelles de gestion de la s\u00e9curit\u00e9 de l'information se concentrent g\u00e9n\u00e9ralement sur l\u2019aptitude d'une organisation \u00e0 pr\u00e9venir et d\u00e9tecter les cyber-attaques sur son information et ses actifs. Mais le mythe largement r\u00e9pandu de la cybers\u00e9curit\u00e9 comme parade infaillible contre les cyber-risques gr\u00e2ce \u00e0 une s\u00e9rie de contr\u00f4les techniques\u2026","rel":"","context":"Dans &quot;Cyber-r\u00e9silience&quot;","img":{"alt_text":"cyber-r\u00c3\u00a9silience","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience-300x199.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":462,"url":"http:\/\/www.ab-consulting.fr\/blog\/it-sm\/iso-20000\/cyber-securite-recherche-professionnels","url_meta":{"origin":899,"position":1},"title":"Cyber-s\u00e9curit\u00e9: une demande forte pour un profil rare","date":"19 septembre 2015","format":false,"excerpt":"\u00a0 L\u2019actuelle p\u00e9nurie de professionnels qualifi\u00e9s en\u00a0cyber-s\u00e9curit\u00e9 continue de constituer un probl\u00e8me majeur pour\u00a0toutes les industries aux Etats-Unis, en Europe, mais aussi dans le reste du monde. James Trainor, directeur adjoint par int\u00e9rim de la Division Cyber du FBI, a r\u00e9cemment d\u00e9clar\u00e9 que l'industrie de la cyber-s\u00e9curit\u00e9 doit absolument \"doubler\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"professionnel en cyber-s\u00c3\u00a9curit\u00c3\u00a9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/professionnel-securite-300x226.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1192,"url":"http:\/\/www.ab-consulting.fr\/blog\/geit\/cyber-risques-conseil-administration","url_meta":{"origin":899,"position":2},"title":"Cyber-risques &#8211; Que fait le Conseil d&rsquo;Administration?","date":"30 octobre 2015","format":false,"excerpt":"Le Conseil d'Administration est en charge de s'assurer de la cr\u00e9ation de valeur pour les parties prenantes de l'Entreprise tout en optimisant les risques et les ressources. Le Conseil d'Administration, organe de Gouvernance de l'entreprise est donc directement concern\u00e9 par les cyber-risques. \"La SEC (organisme f\u00e9d\u00e9ral am\u00e9ricain en charge de\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"Le conseil d'administration","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/conseil-administration-300x193.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":420,"url":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience","url_meta":{"origin":899,"position":3},"title":"Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience","date":"15 septembre 2015","format":false,"excerpt":"On entend de plus en plus parler de cyber-s\u00e9curit\u00e9 et de cyber-r\u00e9silience. Mais au final, qu\u2019est-ce qui se cache derri\u00e8re ces termes compliqu\u00e9s pour le commun des mortels\u00a0? C\u2019est ce que nous allons essayer d\u2019expliquer au travers de cet article. S\u00e9curit\u00e9 ou R\u00e9silience\u00a0? De quoi parlons-nous\u00a0? Sous l\u2019administration Obama, les\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"cyber-curit\u00c3\u00a9 vs cyber-r\u00c3\u00a9silience","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6304,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/resilience-chainon-manquant-de-la-cybersecurite","url_meta":{"origin":899,"position":4},"title":"Cybers\u00e9curit\u00e9 : la r\u00e9silience, cha\u00eenon manquant de votre strat\u00e9gie","date":"25 septembre 2018","format":false,"excerpt":"A l'heure de la transformation num\u00e9rique des organisations, la strat\u00e9gie de cybers\u00e9curit\u00e9 est un sujet sur toutes les l\u00e8vres. Dans le m\u00eame temps, on n'entend quasiment jamais prononcer le mot r\u00e9silience. Pourtant, la r\u00e9silience devrait \u00eatre le pilier majeur de toute strat\u00e9gie de r\u00e9duction des risques. Essayons donc de d\u00e9crypter\u2026","rel":"","context":"Dans &quot;Cyber-r\u00e9silience&quot;","img":{"alt_text":"R\u00e9silience, le cha\u00eenon manquant de votre strat\u00e9gie de cybers\u00e9curit\u00e9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2018\/09\/resilience-chainon-manquant-2.jpg?fit=800%2C534&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":665,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile","url_meta":{"origin":899,"position":5},"title":"Un op\u00e9rateur mobile victime d&rsquo;une cyber-attaque","date":"6 octobre 2015","format":false,"excerpt":"Environ 15 millions de personnes qui se sont abonn\u00e9es dans les trois derni\u00e8res ann\u00e9es aux services sans fil de T-Mobile, quatri\u00e8me op\u00e9rateur de t\u00e9l\u00e9phonie mobile des Etats Unis avec 25 millions d'abonn\u00e9s, ont sans doute\u00a0\u00e9t\u00e9 victimes du vol de leurs informations personnelles suite \u00e0 une cyber-attaque r\u00e9ussie\u00a0contre l\u2019un de ses\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"cyber-attaque contre T-Mobile","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/899"}],"collection":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/comments?post=899"}],"version-history":[{"count":20,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/899\/revisions"}],"predecessor-version":[{"id":922,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/899\/revisions\/922"}],"wp:attachment":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/media?parent=899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/categories?post=899"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/tags?post=899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}