{"id":639,"date":"2015-10-03T17:15:44","date_gmt":"2015-10-03T16:15:44","guid":{"rendered":"http:\/\/www.ab-consulting.fr\/blog\/?p=639"},"modified":"2015-10-06T18:55:49","modified_gmt":"2015-10-06T17:55:49","slug":"cyber-resilience-tournant-strategique","status":"publish","type":"post","link":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique","title":{"rendered":"Cyber-r\u00e9silience: un tournant strat\u00e9gique"},"content":{"rendered":"<p style=\"text-align: justify;\"><em>Les approches traditionnelles de gestion de la s\u00e9curit\u00e9 de l&rsquo;information se concentrent g\u00e9n\u00e9ralement sur l\u2019aptitude d&rsquo;une organisation \u00e0 pr\u00e9venir et d\u00e9tecter les cyber-attaques sur son information et ses actifs. Mais le mythe largement r\u00e9pandu de la cybers\u00e9curit\u00e9 comme parade infaillible contre les cyber-risques gr\u00e2ce \u00e0 une s\u00e9rie de contr\u00f4les techniques est maintenant tr\u00e8s largement battu en br\u00e8che. <a href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite\" target=\"_blank\">La nature et la fr\u00e9quence des cyber-attaques<\/a> ont \u00e9norm\u00e9ment \u00e9volu\u00e9 ces derni\u00e8res ann\u00e9es au point qu\u2019une cyber-attaque r\u00e9ussie sur votre syst\u00e8me d\u2019information est d\u00e9sormais consid\u00e9r\u00e9e comme in\u00e9vitable.<\/em><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/plus.google.com\/118075462993454544693\/about\" target=\"_blank\" rel=\"Author\"><img loading=\"lazy\" class=\"aligncenter wp-image-641\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience.jpeg?resize=576%2C382\" alt=\"cyber-r\u00e9silience\" width=\"576\" height=\"382\" srcset=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience.jpeg?resize=300%2C199&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience.jpeg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience.jpeg?w=426&amp;ssl=1 426w\" sizes=\"(max-width: 576px) 100vw, 576px\" data-recalc-dims=\"1\" \/><\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classe\/cyber-securite-vs-cyber-resilience\" target=\"_blank\">L\u2019accent nouvellement mis sur la cyber-r\u00e9silience<\/a> refl\u00e8te cette \u00e9volution en d\u00e9pla\u00e7ant les efforts sur comment les organisations peuvent r\u00e9sister, r\u00e9agir et surtout r\u00e9cup\u00e9rer d&rsquo;une cyber-attaque r\u00e9ussie. Mais une-certification du personnel sur la cyber-r\u00e9silience peut-elle vraiment avoir un impact significatif sur une organisation?<\/p>\n<h2 style=\"text-align: justify;\"><strong>Pourquoi une certification en cyber-r\u00e9silience?<\/strong><\/h2>\n<p style=\"text-align: justify;\">Un niveau de cyber-r\u00e9silience trop faible est maintenant un risque consid\u00e9r\u00e9 comme critique au niveau du Conseil d&rsquo;Administration et de la direction des Entreprises, ainsi que par la s\u00e9curit\u00e9, mais aussi par les \u00e9quipes informatiques et de la gestion des risques. Le top management est conscient de la p\u00e9nurie de sp\u00e9cialistes dans le domaine de la s\u00e9curit\u00e9 et recherche des praticiens experts comp\u00e9tents comprenant les vuln\u00e9rabilit\u00e9s, les menaces et les risques, en mesure d\u2019expliquer les impacts potentiels sur l\u2019entreprise.<\/p>\n<p style=\"text-align: justify;\">Les qualifications traditionnelles en cybers\u00e9curit\u00e9 se focalisent principalement sur l&rsquo;identification et la pr\u00e9vention des attaques. En revanche, RESILIA, le r\u00e9f\u00e9rentiel de bonnes pratiques de cyber-r\u00e9silience publi\u00e9 r\u00e9cemment par AXELOS, se pr\u00e9sente sous la forme d\u2019un portefeuille complet de publications, d&rsquo;un cursus de formations et d\u2019outils de sensibilisation visant \u00e0 renforcer la cyber-r\u00e9silience des Organisations en commen\u00e7ant par le Conseil d\u2019Administration et en descendant sur tous les niveaux de management et op\u00e9rationnels de l\u2019Entreprise. Le guide des meilleurs pratiques de Cyber r\u00e9silience (<a href=\"https:\/\/www.axelos.com\/store\/book\/resilia-cyber-resilience-best-practices\" target=\"_blank\">Cyber Resilience Best Practices \u2013 TSO Ed.<\/a>) compl\u00e8te et supporte les certifications Foundation et Practitioner, la sensibilisation \u00e0 l&rsquo;\u00e9chelle de l&rsquo;organisation toute enti\u00e8re, et un outil aidant \u00e0 d\u00e9finir une feuille de route en cyber-r\u00e9silience permettant d\u2019adresser et de proposer des plans d&rsquo;action et\/ou d&rsquo;am\u00e9lioration appropri\u00e9s.<\/p>\n<p style=\"text-align: justify;\">RESILIA n\u2019est pas une norme et ne permet donc pas de certifier les Organisations. A l\u2019image des autres r\u00e9f\u00e9rentiels de bonnes pratiques, RESILIA permet de qualifier et de certifier uniquement les personnes gr\u00e2ce \u00e0 des examens qui testent leurs connaissances et leur permettent de d\u00e9velopper des comp\u00e9tences pratiques en cyber-r\u00e9silience bas\u00e9es sur un langage commun, avec le potentiel de faciliter le changement comportemental au sein des organisations. RESILIA a \u00e9t\u00e9 d\u00e9velopp\u00e9 par AXELOS\u00ae pour \u00eatre un compl\u00e9ment \u00e0 ITIL et en adopte la structure. Organis\u00e9 sur la base des 5 phases du cycle de vie (Strat\u00e9gie, conception, transition, exploitation et am\u00e9lioration continue) ainsi que des 25 processus et des 4 fonctions d\u2019ITIL 2011, RESILIA permet aux personnes d\u00e9j\u00e0 certifi\u00e9es sur ITIL d\u2019int\u00e9grer les aspects de la cyber-r\u00e9silience \u00e0 leurs comp\u00e9tences d\u00e9j\u00e0 acquises.<\/p>\n<p style=\"text-align: justify;\">Le cursus officiel de certification comporte deux niveaux: <a href=\"http:\/\/www.ab-consulting.fr\/formation\/resilia-foundation.php\" target=\"_blank\">Foundation<\/a> et <a href=\"http:\/\/www.ab-consulting.fr\/formation\/resilia-practitioner.php\" target=\"_blank\">Practitioner<\/a>. Ces formations ainsi que les examens de certifications sont propos\u00e9s en exclusivit\u00e9 par des <a href=\"https:\/\/www.axelos.com\/qualifications\/resilia-qualifications\" target=\"_blank\">organismes de de formation accr\u00e9dit\u00e9s par AXELOS\u00ae<\/a>. Foundation est un niveau id\u00e9al pour des acteurs au sein de d\u00e9partements tels que les ressources humaines, le d\u00e9partement commercial, la finance, les achats et la formation, ainsi que la s\u00e9curit\u00e9, la technologie et la gestion de services informatiques, qui ont tous un r\u00f4le \u00e0 jouer pour assurer la r\u00e9silience. Le niveau praticien (Practitioner) compl\u00e8te le niveau Foundation, qui en constitue le pr\u00e9requis, et cible principalement les sp\u00e9cialistes de la s\u00e9curit\u00e9.<\/p>\n<p style=\"text-align: justify;\">La formation \u00e0 la certification RESILIA se concentre sur la recherche d&rsquo;un \u00e9quilibre efficace entre les personnes, les processus et la technologie et contribue \u00e0 construire une collaboration performante entre la s\u00e9curit\u00e9, la technologie et la gestion de services IT. Les cursus ont \u00e9t\u00e9 con\u00e7us pour compl\u00e9ter les cycles\u00a0de formation existant en mati\u00e8re de s\u00e9curit\u00e9 technique.<\/p>\n<p style=\"text-align: justify;\">Les formations et certifications RESILIA sont profitables\u00a0\u00e0 la fois pour les personnes et les organisations. Les individus seront\u00a0en mesure de d\u00e9montrer leur expertise en la mati\u00e8re gr\u00e2ce \u00e0 la certification, \u00e0 se diff\u00e9rencier dans la zone \u00e0 croissance rapide de la s\u00e9curit\u00e9 de l&rsquo;information et de la r\u00e9silience, o\u00f9 <a href=\"http:\/\/www.ab-consulting.fr\/blog\/it-sm\/iso-20000\/cyber-securite-recherche-professionnels\" target=\"_blank\">les comp\u00e9tences sont rares, les salaires \u00e9lev\u00e9s<\/a> et o\u00f9 la certification constitue \u00e0 une prime \u00e0 l\u2019emploi. En s\u2019appuyant sur RESILIA, les parties prenantes de l\u2019Organisation b\u00e9n\u00e9ficieront d\u2019une collaboration accrue avec leurs coll\u00e8gues dans les diff\u00e9rents silos fonctionnels alors m\u00eame que les syst\u00e8mes de gestion de cyber-r\u00e9silience s\u2019int\u00e8greront efficacement dans toute l&rsquo;organisation toute enti\u00e8re.<\/p>\n<p>Les organisations peuvent en tirer avantage pour inclure:<\/p>\n<ul>\n<li style=\"text-align: justify;\">une meilleure comp\u00e9tence organisationnelle dans le traitement de la cyber-r\u00e9silience gr\u00e2ce \u00e0 des sp\u00e9cialistes bien form\u00e9s<\/li>\n<li style=\"text-align: justify;\">une protection contre les menaces en assurant des contr\u00f4les bien compris et support\u00e9s<\/li>\n<li style=\"text-align: justify;\">l\u2019int\u00e9gration et l\u2019efficacit\u00e9 de leurs processus critiques int\u00e9gr\u00e9s, tels que la gestion des incidents, couvrant les cyber-risques.<\/li>\n<\/ul>\n<h2><strong>Vers une\u00a0compr\u00e9hension commune de la gestion des risques<\/strong><\/h2>\n<p style=\"text-align: justify;\">La formation de quelques personnes sur la cyber-r\u00e9silience n\u2019aura que peu d\u2019effets pour prot\u00e9ger les organisations de cyber-menaces. De plus en plus, les menaces ciblent la plus grande vuln\u00e9rabilit\u00e9 de toute organisation &#8211; son personnel. Une \u00e9tude r\u00e9cente d&rsquo;IBM a mis en \u00e9vidence que <em><strong>95% des cyber-attaques r\u00e9ussissent \u00e0 cause des actions involontaires d&rsquo;un membre du personnel<\/strong><\/em>. Nous avons d\u00e9j\u00e0 abord\u00e9 ce th\u00e8me dans nos r\u00e9cents articles <a href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/pare-feu-humain\" target=\"_blank\">Pare-feu humain\u00a0: votre meilleure protection<\/a> et <a href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classe\/cyber-securite-ingenierie-sociale\" target=\"_blank\">Cyber-s\u00e9curit\u00e9 \u2013 Ing\u00e9nierie sociale\u00a0: un risque majeur<\/a>.<\/p>\n<p style=\"text-align: justify;\">Les personnes doivent toujours se situer\u00a0au c\u0153ur de toute strat\u00e9gie efficace de cyber-r\u00e9silience. La sensibilisation de <strong>\u00abtout le personnel\u00bb<\/strong> doit jouer un r\u00f4le fondamental dans la r\u00e9duction des risques, favorisant son\u00a0engagement fort, son\u00a0adaptabilit\u00e9 aux \u00e9v\u00e8nements de s\u00e9curit\u00e9 ainsi qu\u2019en permettant de mesurer son efficacit\u00e9. Le contexte des cyber-risques est en mutation permanente. Il est donc essentiel de planifier la formation continue et la participation de l\u2019ensemble du personnel de l&rsquo;organisation \u00e0 la cyber-r\u00e9silience \u00e0 ces programmes et de ne pas se limiter \u00e0 une seule session de sensibilisation lors de l\u2019embauche des personnels\u2026<\/p>\n<p style=\"text-align: justify;\">Une strat\u00e9gie de cyber-r\u00e9silience performante devrait donc incorporer les contr\u00f4les au niveau de la technique, des processus et du personnel. S\u2019assurer que les employ\u00e9s sont bien form\u00e9s pour reconna\u00eetre un cyber-risque, et capables de r\u00e9agir en cons\u00e9quence en temps opportun est essentiel. Une focalisation globale doit se faire sur l&rsquo;alignement des priorit\u00e9s strat\u00e9giques de l\u2019Entreprise, des outils de gestion, des services, des syst\u00e8mes d&rsquo;exploitation des architectures avec des programmes de formation continue et l\u2019implication des personnels \u00e0 travers toute l&rsquo;organisation.<\/p>\n<p style=\"text-align: justify;\">Il est essentiel d&rsquo;amener les gens, les processus et la technologie \u00e0 travailler de concert pour prot\u00e9ger, d\u00e9tecter et r\u00e9pondre aux cyber-menaces et aux attaques. Le cadre RESILIA des meilleures pratiques pour la cyber-r\u00e9silience, en conjonction avec les syst\u00e8mes de gestion des services existants tels que ITIL et les cadres de gestion de projets et de programmes qui incluent PRINCE2, permet aux organisations de cr\u00e9er une approche proactive, \u00e9quilibr\u00e9e et collaborative visant \u00e0 l&rsquo;identification et la gestion des cyber-risques tout en leur donnant la capacit\u00e9 de d\u00e9tecter et r\u00e9cup\u00e9rer des cyber-attaques plus rapidement, en minimisant les dommages financiers ou de r\u00e9putation qui pourraient en d\u00e9couler.<\/p>\n<p style=\"text-align: justify;\"><em><strong>P<\/strong><strong>our plus d&rsquo;information ou pour vous abonner \u00e0 notre newsletter, merci de remplir le formulaire de contact:<\/strong><\/em><\/p>\n<p style=\"text-align: justify;\"><div id='contact-form-639'>\n<form action='https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#contact-form-639' method='post' class='contact-form commentsblock'>\n<script>\n\t\t\t( function () {\n\t\t\t\tconst contact_forms = document.getElementsByClassName('contact-form');\n\n\t\t\t\tfor ( const form of contact_forms ) {\n\t\t\t\t\tform.onsubmit = function() {\n\t\t\t\t\t\tconst buttons = form.getElementsByTagName('button');\n\n\t\t\t\t\t\tfor( const button of buttons ) {\n\t\t\t\t\t\t\tbutton.setAttribute('disabled', true);\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} )();\n\t\t<\/script>\n<div class='grunion-field-wrap grunion-field-name-wrap'  >\n<label\n\t\t\t\tfor='g639-nom'\n\t\t\t\tclass='grunion-field-label name'\n\t\t\t\t>Nom<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g639-nom'\n\t\t\t\t\tid='g639-nom'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='name' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-email-wrap'  >\n<label\n\t\t\t\tfor='g639-email'\n\t\t\t\tclass='grunion-field-label email'\n\t\t\t\t>E-mail<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='email'\n\t\t\t\t\tname='g639-email'\n\t\t\t\t\tid='g639-email'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='email' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-text-wrap'  >\n<label\n\t\t\t\tfor='g639-entreprise'\n\t\t\t\tclass='grunion-field-label text'\n\t\t\t\t>Entreprise<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g639-entreprise'\n\t\t\t\t\tid='g639-entreprise'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='text' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-text-wrap'  >\n<label\n\t\t\t\tfor='g639-pays'\n\t\t\t\tclass='grunion-field-label text'\n\t\t\t\t>Pays<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g639-pays'\n\t\t\t\t\tid='g639-pays'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='text' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-url-wrap'  >\n<label\n\t\t\t\tfor='g639-siteweb'\n\t\t\t\tclass='grunion-field-label url'\n\t\t\t\t>Site Web<\/label>\n<input\n\t\t\t\t\ttype='url'\n\t\t\t\t\tname='g639-siteweb'\n\t\t\t\t\tid='g639-siteweb'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='url' \n\t\t\t\t\t\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-textarea-wrap'  >\n<label\n\t\t\t\tfor='contact-form-comment-g639-commentaire'\n\t\t\t\tclass='grunion-field-label textarea'\n\t\t\t\t>Commentaire<span>(obligatoire)<\/span><\/label>\n<textarea\n\t\t                name='g639-commentaire'\n\t\t                id='contact-form-comment-g639-commentaire'\n\t\t                rows='20' class='textarea'  required aria-required='true'><\/textarea>\n\t<\/div>\n\t<p class='contact-submit'>\n\t\t<button type='submit' class='pushbutton-wide'>Envoyer<\/button>\t\t<input type='hidden' name='contact-form-id' value='639' \/>\n\t\t<input type='hidden' name='action' value='grunion-contact-form' \/>\n\t\t<input type='hidden' name='contact-form-hash' value='6db31058a10d04cba21507e3421cf9df964beed5' \/>\n\t<\/p>\n<p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"ak_\"><label>&#916;<textarea name=\"ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"ak_js\" value=\"179\"\/><script type=\"text\/javascript\">\ndocument.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );\n<\/script>\n<\/p><\/form>\n<\/div><\/p>\n<p style=\"text-align: justify;\">\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Cyber-r%C3%A9silience%3A%20un%20tournant%20strat%C3%A9gique&body=https%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fcyber-resilience-tournant-strategique&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"64ad324bf0\" data-email-share-track-url=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-639\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-639\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-639\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-639\" class=\"share-pinterest sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Les approches traditionnelles de gestion de la s\u00e9curit\u00e9 de l&rsquo;information se concentrent g\u00e9n\u00e9ralement sur l\u2019aptitude d&rsquo;une organisation \u00e0 pr\u00e9venir et d\u00e9tecter les cyber-attaques sur son information et ses actifs. Mais le mythe largement r\u00e9pandu de la cybers\u00e9curit\u00e9 comme parade infaillible contre les cyber-risques gr\u00e2ce \u00e0 une s\u00e9rie de contr\u00f4les techniques est maintenant tr\u00e8s largement&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Cyber-r%C3%A9silience%3A%20un%20tournant%20strat%C3%A9gique&body=https%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fcyber-resilience-tournant-strategique&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"64ad324bf0\" data-email-share-track-url=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-639\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-639\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-639\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-639\" class=\"share-pinterest sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[74,62],"tags":[38,130,80,111,131,129,101,127,69,107,18,19,128,64,68,78,100,87,109],"jetpack_publicize_connections":[],"author_meta":{"display_name":"Alain Bonneaud","author_link":"https:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"},"featured_img":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.9 (Yoast SEO v17.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber-r\u00e9silience: un tournant strat\u00e9gique - Blog de la Transformation Digitale<\/title>\n<meta name=\"description\" content=\"La cyber-r\u00e9silience est une question de survie pour les Entreprises. C&#039;est aussi une opportunit\u00e9 unique de donner un tournant strat\u00e9gique \u00e0 votre carri\u00e8re.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-r\u00e9silience: un tournant strat\u00e9gique\" \/>\n<meta property=\"og:description\" content=\"La cyber-r\u00e9silience est une question de survie pour les Entreprises. C&#039;est aussi une opportunit\u00e9 unique de donner un tournant strat\u00e9gique \u00e0 votre carri\u00e8re.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique\" \/>\n<meta property=\"og:site_name\" content=\"Blog de la Transformation Digitale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/abconsultingci\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-03T16:15:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-10-06T17:55:49+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience-300x199.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:site\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Bonneaud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\",\"name\":\"2AB & Associates\",\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/abconsultingci\/\",\"https:\/\/www.linkedin.com\/in\/alainbonneaud\/\",\"https:\/\/twitter.com\/abonneaud\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"width\":540,\"height\":107,\"caption\":\"2AB & Associates\"},\"image\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#website\",\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/\",\"name\":\"Blog de la Transformation Digitale\",\"description\":\"COBIT\\u00ae, VeriSM, ITIL\\u00ae, RESILIA, ISO 27001, ISO 20000\",\"publisher\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience-300x199.jpeg\",\"contentUrl\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience-300x199.jpeg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#webpage\",\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique\",\"name\":\"Cyber-r\\u00e9silience: un tournant strat\\u00e9gique - Blog de la Transformation Digitale\",\"isPartOf\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#primaryimage\"},\"datePublished\":\"2015-10-03T16:15:44+00:00\",\"dateModified\":\"2015-10-06T17:55:49+00:00\",\"description\":\"La cyber-r\\u00e9silience est une question de survie pour les Entreprises. C'est aussi une opportunit\\u00e9 unique de donner un tournant strat\\u00e9gique \\u00e0 votre carri\\u00e8re.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.ab-consulting.fr\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-r\\u00e9silience\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber-r\\u00e9silience: un tournant strat\\u00e9gique\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#webpage\"},\"author\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\"},\"headline\":\"Cyber-r\\u00e9silience: un tournant strat\\u00e9gique\",\"datePublished\":\"2015-10-03T16:15:44+00:00\",\"dateModified\":\"2015-10-06T17:55:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#webpage\"},\"wordCount\":1391,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience-300x199.jpeg\",\"keywords\":[\"AXELOS\",\"CISM\",\"COBIT\",\"consultant s\\u00e9curit\\u00e9\",\"CRISC\",\"CSX\",\"cyber-r\\u00e9silience\",\"cyber-risque\",\"cyber-s\\u00e9curit\\u00e9\",\"cybers\\u00e9curit\\u00e9\",\"ISACA\",\"ISO 20000\",\"ISO 2700\",\"ISO 27001\",\"ISO 27002\",\"ITIL\",\"resilia\",\"s\\u00e9curit\\u00e9\",\"s\\u00e9curit\\u00e9 de l'information\"],\"articleSection\":[\"Cyber-r\\u00e9silience\",\"S\\u00e9curit\\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\",\"name\":\"Alain Bonneaud\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#personlogo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"caption\":\"Alain Bonneaud\"},\"sameAs\":[\"http:\/\/www.ab-consulting.fr\",\"https:\/\/twitter.com\/abonneaud\"],\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber-r\u00e9silience: un tournant strat\u00e9gique - Blog de la Transformation Digitale","description":"La cyber-r\u00e9silience est une question de survie pour les Entreprises. C'est aussi une opportunit\u00e9 unique de donner un tournant strat\u00e9gique \u00e0 votre carri\u00e8re.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique","og_locale":"fr_FR","og_type":"article","og_title":"Cyber-r\u00e9silience: un tournant strat\u00e9gique","og_description":"La cyber-r\u00e9silience est une question de survie pour les Entreprises. C'est aussi une opportunit\u00e9 unique de donner un tournant strat\u00e9gique \u00e0 votre carri\u00e8re.","og_url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique","og_site_name":"Blog de la Transformation Digitale","article_publisher":"https:\/\/www.facebook.com\/abconsultingci\/","article_published_time":"2015-10-03T16:15:44+00:00","article_modified_time":"2015-10-06T17:55:49+00:00","og_image":[{"url":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience-300x199.jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@abonneaud","twitter_site":"@abonneaud","twitter_misc":{"\u00c9crit par":"Alain Bonneaud","Dur\u00e9e de lecture est.":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization","name":"2AB & Associates","url":"https:\/\/www.ab-consulting.fr\/blog\/","sameAs":["https:\/\/www.facebook.com\/abconsultingci\/","https:\/\/www.linkedin.com\/in\/alainbonneaud\/","https:\/\/twitter.com\/abonneaud"],"logo":{"@type":"ImageObject","@id":"https:\/\/www.ab-consulting.fr\/blog\/#logo","inLanguage":"fr-FR","url":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","contentUrl":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","width":540,"height":107,"caption":"2AB & Associates"},"image":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.ab-consulting.fr\/blog\/#website","url":"https:\/\/www.ab-consulting.fr\/blog\/","name":"Blog de la Transformation Digitale","description":"COBIT\u00ae, VeriSM, ITIL\u00ae, RESILIA, ISO 27001, ISO 20000","publisher":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#primaryimage","inLanguage":"fr-FR","url":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience-300x199.jpeg","contentUrl":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience-300x199.jpeg"},{"@type":"WebPage","@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#webpage","url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique","name":"Cyber-r\u00e9silience: un tournant strat\u00e9gique - Blog de la Transformation Digitale","isPartOf":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#primaryimage"},"datePublished":"2015-10-03T16:15:44+00:00","dateModified":"2015-10-06T17:55:49+00:00","description":"La cyber-r\u00e9silience est une question de survie pour les Entreprises. C'est aussi une opportunit\u00e9 unique de donner un tournant strat\u00e9gique \u00e0 votre carri\u00e8re.","breadcrumb":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.ab-consulting.fr\/blog"},{"@type":"ListItem","position":2,"name":"Cyber-r\u00e9silience","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience"},{"@type":"ListItem","position":3,"name":"Cyber-r\u00e9silience: un tournant strat\u00e9gique"}]},{"@type":"Article","@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#article","isPartOf":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#webpage"},"author":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c"},"headline":"Cyber-r\u00e9silience: un tournant strat\u00e9gique","datePublished":"2015-10-03T16:15:44+00:00","dateModified":"2015-10-06T17:55:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#webpage"},"wordCount":1391,"commentCount":1,"publisher":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization"},"image":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#primaryimage"},"thumbnailUrl":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-resilience-300x199.jpeg","keywords":["AXELOS","CISM","COBIT","consultant s\u00e9curit\u00e9","CRISC","CSX","cyber-r\u00e9silience","cyber-risque","cyber-s\u00e9curit\u00e9","cybers\u00e9curit\u00e9","ISACA","ISO 20000","ISO 2700","ISO 27001","ISO 27002","ITIL","resilia","s\u00e9curit\u00e9","s\u00e9curit\u00e9 de l'information"],"articleSection":["Cyber-r\u00e9silience","S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-resilience-tournant-strategique#respond"]}]},{"@type":"Person","@id":"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c","name":"Alain Bonneaud","image":{"@type":"ImageObject","@id":"https:\/\/www.ab-consulting.fr\/blog\/#personlogo","inLanguage":"fr-FR","url":"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","caption":"Alain Bonneaud"},"sameAs":["http:\/\/www.ab-consulting.fr","https:\/\/twitter.com\/abonneaud"],"url":"https:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"}]}},"coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/cyber-resilience\" class=\"advgb-post-tax-term\">Cyber-r\u00e9silience<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Cyber-r\u00e9silience<\/span>","<span class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">AXELOS<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">CISM<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">COBIT<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">consultant s\u00e9curit\u00e9<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">CRISC<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">CSX<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-risque<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISACA<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 20000<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 2700<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27001<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27002<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ITIL<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">resilia<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">AXELOS<\/span>","<span class=\"advgb-post-tax-term\">CISM<\/span>","<span class=\"advgb-post-tax-term\">COBIT<\/span>","<span class=\"advgb-post-tax-term\">consultant s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">CRISC<\/span>","<span class=\"advgb-post-tax-term\">CSX<\/span>","<span class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/span>","<span class=\"advgb-post-tax-term\">cyber-risque<\/span>","<span class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">ISACA<\/span>","<span class=\"advgb-post-tax-term\">ISO 20000<\/span>","<span class=\"advgb-post-tax-term\">ISO 2700<\/span>","<span class=\"advgb-post-tax-term\">ISO 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO 27002<\/span>","<span class=\"advgb-post-tax-term\">ITIL<\/span>","<span class=\"advgb-post-tax-term\">resilia<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/span>"]}},"comment_count":"1","relative_dates":{"created":"Posted 11 ans ago","modified":"Updated 11 ans ago"},"absolute_dates":{"created":"Posted on 3 octobre 2015","modified":"Updated on 6 octobre 2015"},"absolute_dates_time":{"created":"Posted on 3 octobre 2015 17 h 15 min","modified":"Updated on 6 octobre 2015 18 h 55 min"},"featured_img_caption":"","jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OrbX-aj","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":420,"url":"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience","url_meta":{"origin":639,"position":0},"title":"Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience","date":"15 septembre 2015","format":false,"excerpt":"On entend de plus en plus parler de cyber-s\u00e9curit\u00e9 et de cyber-r\u00e9silience. Mais au final, qu\u2019est-ce qui se cache derri\u00e8re ces termes compliqu\u00e9s pour le commun des mortels\u00a0? C\u2019est ce que nous allons essayer d\u2019expliquer au travers de cet article. S\u00e9curit\u00e9 ou R\u00e9silience\u00a0? De quoi parlons-nous\u00a0? Sous l\u2019administration Obama, les\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"cyber-curit\u00c3\u00a9 vs cyber-r\u00c3\u00a9silience","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":665,"url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile","url_meta":{"origin":639,"position":1},"title":"Un op\u00e9rateur mobile victime d&rsquo;une cyber-attaque","date":"6 octobre 2015","format":false,"excerpt":"Environ 15 millions de personnes qui se sont abonn\u00e9es dans les trois derni\u00e8res ann\u00e9es aux services sans fil de T-Mobile, quatri\u00e8me op\u00e9rateur de t\u00e9l\u00e9phonie mobile des Etats Unis avec 25 millions d'abonn\u00e9s, ont sans doute\u00a0\u00e9t\u00e9 victimes du vol de leurs informations personnelles suite \u00e0 une cyber-attaque r\u00e9ussie\u00a0contre l\u2019un de ses\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"cyber-attaque contre T-Mobile","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1192,"url":"https:\/\/www.ab-consulting.fr\/blog\/geit\/cyber-risques-conseil-administration","url_meta":{"origin":639,"position":2},"title":"Cyber-risques &#8211; Que fait le Conseil d&rsquo;Administration?","date":"30 octobre 2015","format":false,"excerpt":"Le Conseil d'Administration est en charge de s'assurer de la cr\u00e9ation de valeur pour les parties prenantes de l'Entreprise tout en optimisant les risques et les ressources. Le Conseil d'Administration, organe de Gouvernance de l'entreprise est donc directement concern\u00e9 par les cyber-risques. \"La SEC (organisme f\u00e9d\u00e9ral am\u00e9ricain en charge de\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"Le conseil d'administration","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/conseil-administration-300x193.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":462,"url":"https:\/\/www.ab-consulting.fr\/blog\/it-sm\/iso-20000\/cyber-securite-recherche-professionnels","url_meta":{"origin":639,"position":3},"title":"Cyber-s\u00e9curit\u00e9: une demande forte pour un profil rare","date":"19 septembre 2015","format":false,"excerpt":"\u00a0 L\u2019actuelle p\u00e9nurie de professionnels qualifi\u00e9s en\u00a0cyber-s\u00e9curit\u00e9 continue de constituer un probl\u00e8me majeur pour\u00a0toutes les industries aux Etats-Unis, en Europe, mais aussi dans le reste du monde. James Trainor, directeur adjoint par int\u00e9rim de la Division Cyber du FBI, a r\u00e9cemment d\u00e9clar\u00e9 que l'industrie de la cyber-s\u00e9curit\u00e9 doit absolument \"doubler\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"professionnel en cyber-s\u00c3\u00a9curit\u00c3\u00a9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/professionnel-securite-300x226.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6304,"url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/resilience-chainon-manquant-de-la-cybersecurite","url_meta":{"origin":639,"position":4},"title":"Cybers\u00e9curit\u00e9 : la r\u00e9silience, cha\u00eenon manquant de votre strat\u00e9gie","date":"25 septembre 2018","format":false,"excerpt":"A l'heure de la transformation num\u00e9rique des organisations, la strat\u00e9gie de cybers\u00e9curit\u00e9 est un sujet sur toutes les l\u00e8vres. Dans le m\u00eame temps, on n'entend quasiment jamais prononcer le mot r\u00e9silience. Pourtant, la r\u00e9silience devrait \u00eatre le pilier majeur de toute strat\u00e9gie de r\u00e9duction des risques. Essayons donc de d\u00e9crypter\u2026","rel":"","context":"Dans &quot;Cyber-r\u00e9silience&quot;","img":{"alt_text":"R\u00e9silience, le cha\u00eenon manquant de votre strat\u00e9gie de cybers\u00e9curit\u00e9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2018\/09\/resilience-chainon-manquant-2.jpg?fit=800%2C534&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1057,"url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/10-trucs-sensibilisation-securite","url_meta":{"origin":639,"position":5},"title":"10 cl\u00e9s pour une sensibilisation r\u00e9ussie sur la s\u00e9curit\u00e9","date":"24 octobre 2015","format":false,"excerpt":"Les cyber-menaces pesant sur\u00a0votre entreprise sont g\u00e9n\u00e9ralement imput\u00e9es \u00e0 des personnes \u00e9trang\u00e8res \u00e0 l'Organisation ou \u00e0 des programmeurs v\u00e9reux ins\u00e9rant, dans vos applications, du code malveillant con\u00e7u pour exploiter\u00a0les informations sensibles pour\u00a0votre Entreprise, voler\u00a0les donn\u00e9es\u00a0confidentielles de vos clients et \/ ou vous d\u00e9rober\u00a0de l'argent. Cependant, la menace de s\u00e9curit\u00e9 se\u2026","rel":"","context":"Dans &quot;S\u00e9curit\u00e9&quot;","img":{"alt_text":"S\u00e9curit\u00e9 menac\u00e9e de l'int\u00e9rieur","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/violation-s\u00e9curit\u00e9.jpeg?fit=424%2C283&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/639"}],"collection":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/comments?post=639"}],"version-history":[{"count":11,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/639\/revisions"}],"predecessor-version":[{"id":711,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/639\/revisions\/711"}],"wp:attachment":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/media?parent=639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/categories?post=639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/tags?post=639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}