{"id":6503,"date":"2024-07-16T09:00:00","date_gmt":"2023-09-20T11:18:57","guid":{"rendered":"https:\/\/www.capgemini.com\/ca-fr\/?post_type=research-and-insight&#038;p=670836"},"modified":"2026-03-13T03:01:04","modified_gmt":"2026-03-13T03:01:04","slug":"objectif-cyber","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/","title":{"rendered":"Objectif cyber"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:45% 42%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Cybers\u00e9curit\u00e9<\/span><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">Objectif cyber<\/h1><\/div><div class=\"inner-row-insight download-btn\"><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-2\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber-2\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber-2\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-8\"><h2 class=\"intro-para-title\">L&#8217;\u00e9mission du podcast Objectif Tech qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9.<\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"grid-container\"><div><div class=\"article-text article-quote-text\">\n<h4 class=\"wp-block-heading\" id=\"h-nous-dependons-tous-d-infrastructures-essentielles-telles-que-les-centrales-electriques-les-hopitaux-les-banques-etc\">Nous d\u00e9pendons tous d\u2019infrastructures essentielles telles que les centrales \u00e9lectriques, les h\u00f4pitaux, les banques, etc.<\/h4>\n\n\n\n<p>Il est essentiel de s\u00e9curiser ces organisations pour assurer le bon fonctionnement de notre soci\u00e9t\u00e9. La cybers\u00e9curit\u00e9 a bien des visages \u2026 c\u2019est \u00e0 toutes ces facettes que nous allons nous int\u00e9resser dans notre nouveau podcast Objectif CYBER.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-how-we-do-it section section--howwedoit block-howwedoit\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-8\"><div class=\"section-content\">\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active opened\"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"true\"><h3 class=\"expander-heading-title\">Protection des donn\u00e9es et chiffrement : un enjeu critique pour les entreprises. \u00c9change avec Thales<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Pourquoi la s\u00e9curisation des donn\u00e9es est-elle un enjeu crucial aujourd&#8217;hui ? Pourquoi les chiffrer est-il devenu essentiel ? O\u00f9 en sont les entreprises sur ce sujet ? <a href=\"https:\/\/www.linkedin.com\/in\/philippe-carrere-b3b1453\/\" target=\"_blank\" rel=\"noreferrer noopener\">Philippe Carrere<\/a>, Directeur commercial pour les solutions de protection des donn\u00e9es chez Thales, nous partage des \u00e9l\u00e9ments de r\u00e9ponse dans le nouvel \u00e9pisode d&#8217;Objectif CYBER.<\/p><\/div><div class=\"expander-content\"><p><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/78OxfLHs7xYI9CEtiBaLdj?utm_source=generator\" width=\"100%\" height=\"152\" frameBorder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Cybers\u00e9curit\u00e9 et intelligence artificielle : un nouveau paradigme pour les entreprises. \u00c9change avec Microsoft<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\"><a href=\"https:\/\/www.linkedin.com\/in\/pauldominjon\/\" target=\"_blank\" rel=\"noreferrer noopener\">Paul Dominjon<\/a>, Directeur Cybers\u00e9curit\u00e9 de Microsoft, nous parle de la n\u00e9cessaire adaptation des organisations face \u00e0 l\u2019essor de l\u2019intelligence artificielle.\u00a0<\/p><\/div><div class=\"expander-content\"><p><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/1Axh5NZye6GBjIrKq6GS45?utm_source=generator\" width=\"100%\" height=\"152\" frameBorder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Les startups au c\u0153ur de l&#8217;\u00e9cosyst\u00e8me cyber. \u00c9change avec Cyber Booster<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Nous accueillons Aur\u00e9lie Clerc, Directrice g\u00e9n\u00e9rale de Cyber Booster, le premier dispositif d&#8217;accompagnement de startups d\u00e9di\u00e9es \u00e0 la cybers\u00e9curit\u00e9 en France. Nous explorons ensemble un sujet cl\u00e9 : comment faire \u00e9merger les leaders europ\u00e9ens de la cybers\u00e9curit\u00e9.<\/p><\/div><div class=\"expander-content\"><p><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/1WT2Ipgo26SnhWVfWQKSHw?utm_source=generator\" width=\"100%\" height=\"152\" frameBorder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">L&#8217;intelligence artificielle pour renforcer la cybers\u00e9curit\u00e9. \u00c9change avec Aleia<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Nous \u00e9changeons avec Antoine Couret, fondateur de la startup Aleia, premi\u00e8re plateforme europ\u00e9enne d\u2019intelligence artificielle ouverte, s\u00e9curis\u00e9e, mutualis\u00e9e et souveraine. Nous explorons avec lui les possibilit\u00e9s \u00a0offertes par l&#8217;innovation, comme l&#8217;IA g\u00e9n\u00e9rative, pour renforcer la cybers\u00e9curit\u00e9, et la n\u00e9cessit\u00e9 de renforcer la collaboration startups &#8211; grands groupes.<\/p><\/div><div class=\"expander-content\"><p><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/6ohDFkZzdzMg6ppWMrXOLx?utm_source=generator\" width=\"100%\" height=\"152\" frameBorder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">25 ans de cybers\u00e9curit\u00e9. \u00c9change avec Google Cloud<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Nous recevons Patrice Puichaud, Responsable sales et presales cybers\u00e9curit\u00e9 chez Google Cloud, pour discuter, entre autres, des principales menaces auxquelles sont confront\u00e9es les organisations aujourd\u2019hui, du r\u00f4le de l\u2019IA pour y faire face ou encore de la n\u00e9cessaire collaboration entre tous les acteurs du secteur.<\/p><\/div><div class=\"expander-content\"><p><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/3cMnVAWRh3kLklaZLdGaUh?utm_source=generator\" width=\"100%\" height=\"152\" frameBorder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Cybers\u00e9curit\u00e9 et convergence IT\/OT. \u00c9change avec le Groupe RATP<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Nous accueillons Fran\u00e7ois Bidondo, Directeur Cybers\u00e9curit\u00e9 du Groupe RATP, pour \u00e9changer autour des enjeux de cybers\u00e9curit\u00e9 dans les environnements industriels, en particulier dans le secteur des transports.<\/p><\/div><div class=\"expander-content\"><p><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/51Fh8bp0OzJEvHrCJp0TPN?utm_source=generator\" width=\"100%\" height=\"152\" frameBorder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Comp\u00e9tition, veille technologique et expertise \u00e0 la pointe. \u00c9change avec le capitaine de notre \u00e9quipe de Capture The Flag<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Nous recevons Charlie Bromberg, Capitaine de l\u2019\u00e9quipe de Capture the Flag (CTF) de Capgemini\u00a0<a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/les-aces-of-spades-lequipe-de-capture-the-flag-de-capgemini\/\">(Les Capgemini Aces of Spades)<\/a>.<\/p><\/div><div class=\"expander-content\"><p>Qu\u2019est-ce qu\u2019un CTF, en quoi disposer d\u2019une \u00e9quipe semi-pro est un atout de taille pour accompagner les organisations dans la s\u00e9curisation de leur p\u00e9rim\u00e8tre num\u00e9rique, quels sont les profils concern\u00e9s et quels seront les challenges \u00e0 relever dans les ann\u00e9es \u00e0 venir \u2026 il r\u00e9pond \u00e0 toutes vos questions !<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/24tWhMBbTKMtNxgxXV5xiq?utm_source=generator\" width=\"100%\" height=\"152\" frameBorder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Cyber-r\u00e9silience et continuit\u00e9 d&#8217;activit\u00e9. \u00c9change avec CA-GIP<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Nicolas Picard, Responsable de la continuit\u00e9 d\u2019activit\u00e9 chez Cr\u00e9dit Agricole Group Infrastructure Platform (CA-GIP), nous parle de la continuit\u00e9 d\u2019activit\u00e9 des organisations en cas d\u2019incident ou de crise cyber.\u00a0<\/p><\/div><div class=\"expander-content\"><p><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/7su9p1BXV9F8bdUvwthMNx?utm_source=generator\" width=\"100%\" height=\"152\" frameBorder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">La r\u00e9ponse \u00e0 incident : comment r\u00e9agir en cas de crise cyber ? \u00c9change avec notre \u00e9quipe SWAT<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Nous \u00e9changeons Alexandre Lim, qui nous embarque au c\u0153ur de son quotidien d\u2019Analyste Forensic au sein de l\u2019\u00e9quipe Security Worldwide Assistance Team (SWAT) de Capgemini.<\/p><\/div><div class=\"expander-content\"><p>Qu\u2019est-ce que le SWAT, comment se passe la r\u00e9ponse \u00e0 incident, comment cette \u00e9quipe d\u2019intervention rapide aide les entreprises \u00e0 g\u00e9rer les cyberattaques\u2026 il nous dit tout\u00a0!<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/64E4239atNW7AhMgC0fuvp?utm_source=generator\" width=\"100%\" height=\"152\" frameborder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">La cybers\u00e9curit\u00e9, source de valeur ajout\u00e9e pour l\u2019entreprise. \u00c9change avec Alstom<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Un entretien avec Eddy Th\u00e9s\u00e9e, Directeur Cybers\u00e9curit\u00e9 Alstom Produit, pour explorer la valeur ajout\u00e9e que peut avoir la cybers\u00e9curit\u00e9 pour les m\u00e9tiers des grandes entreprises mais aussi pour leurs clients business.<\/p><\/div><div class=\"expander-content\"><p><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/5u76IFUohCSHahPRTFmnWt?utm_source=generator\" width=\"100%\" height=\"152\" frameborder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Le monde de la sant\u00e9 face aux enjeux de Cybers\u00e9curit\u00e9. \u00c9change avec l\u2019AP-HP<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Nous recevons <a href=\"https:\/\/www.linkedin.com\/in\/laurent-treluyer-88256421\/\">Laurent Treluyer<\/a>, DSI de l\u2019Assistance Publique des H\u00f4pitaux de Paris, pour \u00e9voquer les enjeux de la cybers\u00e9curit\u00e9 dans le monde de la sant\u00e9.<\/p><\/div><div class=\"expander-content\"><p><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/5SfH7Y0poKDwCFXgPpQvnV?utm_source=generator\" width=\"100%\" height=\"152\" frameborder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Cybers\u00e9curit\u00e9, souverainet\u00e9 num\u00e9rique &amp; perspectives. \u00c9change avec l\u2019ANSSI\u00a0\u00a0<\/h3><\/div><div class=\"expander-subtitle\"><p class=\"small-description\">Nous recevons <a href=\"https:\/\/www.linkedin.com\/in\/emmanuel-na%C3%ABgelen-72916930\/\">Emmanuel\u00a0Na\u00ebgelen<\/a>, Directeur adjoint de l\u2019ANSSI, pour discuter souverainet\u00e9 num\u00e9rique, perspectives d\u2019avenir et r\u00f4le de l\u2019ANSSI.\u00a0\u00a0<\/p><\/div><div class=\"expander-content\"><p><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<iframe style=\"border-radius:12px\" src=\"https:\/\/open.spotify.com\/embed\/episode\/1icWdFRvyEeZLicEeP4J9m?utm_source=generator\" width=\"100%\" height=\"152\" frameborder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\n<div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-card-text-pic wrapperCardTextPic hero-bg-shape\"><div class=\"container\"><div class=\"row\"><div class=\"content-title content-title-with-desc col-12 col-md-8\"><h2 class=\"card-text-pic-heading\">Podcast Objectif Tech<\/h2><\/div><\/div><div class=\"row\"><div class=\"content-description col-12 col-md-8\"><p>Le podcast qui d\u00e9crypte l\u2019innovation technologique pour mieux en comprendre les applications concr\u00e8tes.<\/p><\/div><\/div><div class=\"row\"><div class=\"col-md-12\">\n<div class=\"wp-block-cg-blocks-card-text-pic-right\"><div class=\"row card-text-pic rightCard\"><div class=\"col-md-12\"><div class=\"box--section\"><div class=\"box  row-nobleed\"><div class=\"col-lg-8 col-md-12 box-inner\"><a href=\"\/ca-fr\/perspectives\/publications\/podcast-objectif-tech\/\" aria-label=\"\u00c9coutez nos \u00e9missions th\u00e9matiques\" target=\"\" rel=\"noopener noreferrer\" title=\"\"><h3 class=\"titlewithLink\" data-maxlength=\"144\">\u00c9coutez nos \u00e9missions th\u00e9matiques<\/h3><\/a><p class=\"box-text\" data-maxlength=\"\">D\u00e9couvrez les t\u00e9moignages de nos invit\u00e9s sur l\u2019actualit\u00e9 et les tendances technologiques.<\/p><div class=\"box-bottom\"><a aria-label=\"Lire la suite \u00c9coutez nos \u00e9missions th\u00e9matiques\" class=\"more2\" data-maxlength=\"24\" href=\"\/ca-fr\/perspectives\/publications\/podcast-objectif-tech\/\" target=\"\" rel=\"noopener noreferrer\" title=\"\">En savoir plus<\/a><\/div><\/div><div class=\"col-lg-5 col-md-12 box-img-wrapper\"><a href=\"\/ca-fr\/perspectives\/publications\/podcast-objectif-tech\/\" aria-label=\"En savoir plus A propos \u00c9coutez nos \u00e9missions th\u00e9matiques\" tabindex=\"-1\" target=\"\" rel=\"noopener noreferrer\" title=\"\"><picture><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-TECH.jpg?w=1000&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-TECH.jpg?w=1000&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-TECH.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-TECH.jpg?w=1000&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-TECH.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-TECH.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-TECH.jpg?w=556&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-TECH.jpg?w=556&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-TECH.jpg\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:31% 27%\" loading=\"lazy\"\/><\/picture><\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/section>\n\n\n\t<section class=\"wp-block-cg-blocks-wrapper-learning-slider section learning-slider\">\n\t\t<div class=\"container\">\n\t\t\t<div class=\"learning-header\">\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\t<div class=\"slider slider-fader\">\n\t\t\t\t<div class=\"slider-list\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"slide active card-learning-slide right-card short-copy\" data-align-right=\"false\" data-long-copy=\"false\">\n\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t\t<div class=\"slide-bg-wrapper\">\n\n                                        \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n                                            \n                                            \n                                            \n                                            <img decoding=\"async\" loading=\"lazy\" class=\"slide-bg d-md-block\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/02\/Capgemini_services_Cybersecurity.jpg\" alt=\"\" style=\"object-position: 50% 50%;object-fit: cover\" \/>\n                                        \n\n                  \t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\n\t\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper card-learning-slider\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-10 col-xl-6 col-xxl-6 right-card\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"slide-info short-copy\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"title-link\" href=\"\/ca-fr\/services\/cybersecurite\/\" target=\"\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"title-text\" data-maxlength=\"88\">Cybers\u00e9curit\u00e9<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p data-maxlength=\"330\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tFaites de la cybers\u00e9curit\u00e9 le moteur de votre transformation\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-bottom\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-12 col-md-6\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"slide-info-footer\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"brand-logo-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-12 col-md-6\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\">\t<a class=\"more2\" aria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\" href=\"\/ca-fr\/services\/cybersecurite\/\" target=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t         \t\t\t<\/div>\n\n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"slider-nav-wrapper container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-content col-12 col-lg-10 col-xl-6 col-xxl-6\" data-nav-content>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"slide-nav-container\">\n                                                                                                            <\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t<\/section>\n\n\t","protected":false},"excerpt":{"rendered":"<p>Il est essentiel de s\u00e9curiser ces organisations pour assurer le bon fonctionnement de notre soci\u00e9t\u00e9. La cybers\u00e9curit\u00e9 a bien des visages \u2026 c\u2019est \u00e0 toutes ces facettes que nous allons nous int\u00e9resser dans notre nouveau podcast Objectif CYBER.<\/p>\n","protected":false},"author":103,"featured_media":704751,"template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"35ca1e1e-e252-4025-9e09-ef1b1bcf7413\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":186,"primary_term":"Cybers\u00e9curit\u00e9","featured_focal_points":""},"tags":[185],"research-and-insight-type":[210],"theme":[186],"brand":[58],"service":[187],"industry":[],"partners":[],"content-group":[],"class_list":["post-6503","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry","tag-cybersecurite","research-and-insight-type-podacasts","theme-cybersecurite","brand-capgemini","service-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Objectif cyber - Capgemini Canada French<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez un ensemble d&#039;entretiens avec des acteurs cl\u00e9s du march\u00e9 public ou priv\u00e9 pour vous apporter un \u00e9clairage sur diff\u00e9rents aspects de la cybers\u00e9curit\u00e9.\u00a0\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Objectif cyber\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez un ensemble d&#039;entretiens avec des acteurs cl\u00e9s du march\u00e9 public ou priv\u00e9 pour vous apporter un \u00e9clairage sur diff\u00e9rents aspects de la cybers\u00e9curit\u00e9.\u00a0\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Canada French\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-13T03:01:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/\",\"url\":\"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/\",\"name\":\"Objectif cyber - Capgemini Canada French\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/ca-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg\",\"datePublished\":\"2023-09-20T11:18:57+00:00\",\"dateModified\":\"2026-03-13T03:01:04+00:00\",\"description\":\"D\u00e9couvrez un ensemble d'entretiens avec des acteurs cl\u00e9s du march\u00e9 public ou priv\u00e9 pour vous apporter un \u00e9clairage sur diff\u00e9rents aspects de la cybers\u00e9curit\u00e9.\u00a0\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg\",\"width\":6000,\"height\":3750},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/ca-fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/ca-fr\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Objectif cyber\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/ca-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/ca-fr\/\",\"name\":\"Capgemini Canada French\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/ca-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Objectif cyber - Capgemini Canada French","description":"D\u00e9couvrez un ensemble d'entretiens avec des acteurs cl\u00e9s du march\u00e9 public ou priv\u00e9 pour vous apporter un \u00e9clairage sur diff\u00e9rents aspects de la cybers\u00e9curit\u00e9.\u00a0\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/","og_locale":"fr_FR","og_type":"article","og_title":"Objectif cyber","og_description":"D\u00e9couvrez un ensemble d'entretiens avec des acteurs cl\u00e9s du march\u00e9 public ou priv\u00e9 pour vous apporter un \u00e9clairage sur diff\u00e9rents aspects de la cybers\u00e9curit\u00e9.\u00a0\u00a0","og_url":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/","og_site_name":"Capgemini Canada French","article_modified_time":"2026-03-13T03:01:04+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/","url":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/","name":"Objectif cyber - Capgemini Canada French","isPartOf":{"@id":"https:\/\/www.capgemini.com\/ca-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg","datePublished":"2023-09-20T11:18:57+00:00","dateModified":"2026-03-13T03:01:04+00:00","description":"D\u00e9couvrez un ensemble d'entretiens avec des acteurs cl\u00e9s du march\u00e9 public ou priv\u00e9 pour vous apporter un \u00e9clairage sur diff\u00e9rents aspects de la cybers\u00e9curit\u00e9.\u00a0\u00a0","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/#primaryimage","url":"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg","contentUrl":"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg","width":6000,"height":3750},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/ca-fr\/"},{"@type":"ListItem","position":2,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/ca-fr\/research-and-insight\/"},{"@type":"ListItem","position":3,"name":"Objectif cyber"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/ca-fr\/#website","url":"https:\/\/www.capgemini.com\/ca-fr\/","name":"Capgemini Canada French","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/ca-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"}]}},"theme_term_info":[{"id":186,"name":"Cybers\u00e9curit\u00e9"}],"industry_term_info":[],"services_term_info":[{"id":187,"name":"Cybersecurit\u00e9"}],"partners_term_info":[],"brand_term_info":[{"id":58,"name":"Capgemini","slug":"capgemini"}],"brand_term":[{"id":58,"slug":"capgemini"}],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Objectif cyber","url":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Canada French","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2023-09-20T11:18:57Z","datePublished":"2023-09-20T11:18:57Z","dateModified":"2026-03-13T03:01:04Z"},"rendered":"<meta name=\"parsely-title\" content=\"Objectif cyber\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/ca-fr\/perspectives\/publications\/objectif-cyber\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2023-09-20T11:18:57Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Canada French","distributor_original_site_url":"https:\/\/www.capgemini.com\/ca-fr","push-errors":false,"tag_names":["Cybers\u00e9curit\u00e9"],"featured_image_url":"https:\/\/www.capgemini.com\/ca-fr\/wp-content\/uploads\/sites\/21\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/research-and-insight\/6503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/users\/103"}],"version-history":[{"count":19,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/research-and-insight\/6503\/revisions"}],"predecessor-version":[{"id":711146,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/research-and-insight\/6503\/revisions\/711146"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/media\/704751"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/media?parent=6503"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/tags?post=6503"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/research-and-insight-type?post=6503"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/theme?post=6503"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/brand?post=6503"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/service?post=6503"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/industry?post=6503"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/partners?post=6503"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/ca-fr\/wp-json\/wp\/v2\/content-group?post=6503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}