{"id":790703,"date":"2025-10-08T10:38:21","date_gmt":"2025-10-08T08:38:21","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?page_id=790703"},"modified":"2026-04-08T13:35:52","modified_gmt":"2026-04-08T11:35:52","slug":"strategie-grc","status":"publish","type":"page","link":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/","title":{"rendered":"Strat\u00e9gie continue GRC"},"content":{"rendered":"\n<div class=\"wp-block-cg-blocks-hero-picture-card undefined  heroPictureCard heroPictureCardLogTitle \"><div class=\"heroPictureCardBgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\" class=\"desktopImage\" alt=\"\" style=\"object-fit:cover;object-position:50% 37%\" loading=\"eager\"\/><\/picture><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\" class=\"mobileImage\" alt=\"\" style=\"object-fit:cover;object-position:50% 37%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-10 col-lg-10 LongTitle\"><div class=\"heroPictureCardBox\"><div class=\"heroPictureCardBoxTitle\"><h1 data-maxlength=\"144\">Une approche continue de la strat\u00e9gie, de la gouvernance, des risques et de la conformit\u00e9<\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"small-device\"><div class=\"logoWrapperLongTitle\"> <\/div><\/div><\/div>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-2\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-8\"><h2 class=\"intro-para-title\">La strat\u00e9gie comme bouclier. La r\u00e9silience comme fondation.\u00a0<br><\/h2><p class=\"intro-para-content\">La cybers\u00e9curit\u00e9 ne prot\u00e8ge pas seulement : elle propulse votre croissance. Les services int\u00e9gr\u00e9s de strat\u00e9gie, gouvernance, risques et conformit\u00e9 de Capgemini vous aident \u00e0 int\u00e9grer la s\u00e9curit\u00e9 dans l\u2019ADN de votre organisation \u2013 pour vous permettre de cro\u00eetre en toute confiance, de g\u00e9rer les risques intelligemment et de rester en avance sur les \u00e9volutions r\u00e9glementaires et technologiques.\u00a0<br><br>Que vous cherchiez \u00e0 renforcer la r\u00e9silience de vos syst\u00e8mes critiques, \u00e0 adopter l\u2019IA G\u00e9n\u00e9rative de fa\u00e7on responsable ou \u00e0 anticiper les enjeux du monde post-quantique, nous vous accompagnons dans l\u2019\u00e9laboration d\u2019une feuille de route cybers\u00e9curit\u00e9 claire, align\u00e9e sur vos objectifs business et adapt\u00e9e \u00e0 l\u2019\u00e9volution de votre environnement. Notre approche est continue, fond\u00e9e sur les donn\u00e9es et proactive \u2013 transformant la conformit\u00e9 en avantage concurrentiel.\u00a0<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">S\u00e9curisez votre environnement SAP<\/h3><div class=\"video-info\"><p data-maxlength=\"68\"><\/p><\/div><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/8hWDfbZHfLw?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-how-we-do-it section section--howwedoit block-howwedoit\"><div class=\"container\"><div><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 data-maxlength=\"72\" class=\"expandable-heading-tag\">Nos offres <\/h2><\/div><\/div><div class=\"row\"><div class=\"col-12 col-md-8\"><p><\/p><\/div><\/div><\/div><div class=\"row\"><div class=\"col-12 col-md-8\"><div class=\"section-content\">\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Strat\u00e9gie, conseil et transformation<\/h3><\/div><div class=\"expander-content\"><p>La cybers\u00e9curit\u00e9 n\u2019est pas seulement une r\u00e9ponse obligatoire au risque \u2013 elle peut aussi \u00eatre un atout pour l\u2019entreprise.<br>Nous pouvons vous aider \u00e0 d\u00e9finir la bonne strat\u00e9gie et le bon programme de transformation ; \u00e0 d\u00e9celer une violation avant qu\u2019elle ne se produise ; et \u00e0 prot\u00e9ger vos donn\u00e9es et actifs sensibles.<br><br>Cliquez sur les liens ci-dessous pour en savoir plus sur la fa\u00e7on dont les dirigeants abordent la cybers\u00e9curit\u00e9 et la confidentialit\u00e9 des donn\u00e9es afin de renforcer la confiance et la r\u00e9silience num\u00e9rique. Vous en saurez plus sur la fa\u00e7on dont notre centre d\u2019exp\u00e9rience en cybers\u00e9curit\u00e9, l\u2019\u00e9picentre des simulations de cybers\u00e9curit\u00e9, peut vous aider \u00e0 d\u00e9celer une violation avant qu\u2019elle ne se produise, et sur notre offre de conformit\u00e9 en tant que service.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Cyber consulting link\" href=\"\/wp-content\/uploads\/2021\/05\/Cybersecurity-Consulting_brochure.pdf \" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Cyber consulting<\/a><a class=\"more2\" aria-label=\"Centre Cyber Experience link\" href=\"\/wp-content\/uploads\/2021\/05\/Brochure-Cyber-Experience-Center.pdf \" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Centre Cyber Experience<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Gouvernance, risques et conformit\u00e9 (GRC)<\/h3><\/div><div class=\"expander-content\"><p>Nos services GRC offrent une approche structur\u00e9e et fond\u00e9e sur les risques pour g\u00e9rer la conformit\u00e9 et la responsabilit\u00e9 au sein de votre entreprise. Nous vous aidons \u00e0 anticiper l\u2019\u00e9volution des r\u00e9glementations tout en int\u00e9grant la gouvernance au c\u0153ur de vos op\u00e9rations.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">R\u00e9silience op\u00e9rationnelle <\/h3><\/div><div class=\"expander-content\"><p>Nous accompagnons les institutions financi\u00e8res dans le respect \u2013 et le d\u00e9passement \u2013 des exigences de DORA, gr\u00e2ce \u00e0 l\u2019automatisation, \u00e0 des tests rigoureux et \u00e0 des architectures r\u00e9silientes d\u00e8s la conception.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"En savoir plus sur DORA link\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/\" target=\"\" title=\"\" rel=\"noopener noreferrer\">En savoir plus sur DORA<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Acc\u00e9l\u00e9rateurs pour renforcer votre maturit\u00e9 en cyber<\/h3><\/div><div class=\"expander-content\"><p>Nous proposons des \u00e9valuations rapides et des plans d\u2019am\u00e9lioration cibl\u00e9s sur des domaines critiques tels que le Zero Trust, le cloud, la 5G, l\u2019IA g\u00e9n\u00e9rative et le quantique.\u00a0<br><br>Nos acc\u00e9l\u00e9rateurs vous aident \u00e0 identifier les lacunes, \u00e0 prioriser les actions et \u00e0 renforcer votre niveau de maturit\u00e9 en cybers\u00e9curit\u00e9.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Solution de cybers\u00e9curit\u00e9 d\u00e9di\u00e9e \u00e0 l\u2019IA g\u00e9n\u00e9rative\u00a0<\/h3><\/div><div class=\"expander-content\"><p>Notre suite de s\u00e9curit\u00e9 d\u00e9di\u00e9e \u00e0 l\u2019IA g\u00e9n\u00e9rative garantit une utilisation s\u00fbre et responsable de l\u2019IA, en int\u00e9grant des contr\u00f4les de s\u00e9curit\u00e9, une gouvernance des donn\u00e9es et une tra\u00e7abilit\u00e9 des usages dans vos workflows d\u2019IA.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Gen AI Security Suite link\" href=\"https:\/\/www.capgemini.com\/solutions\/gen-ai-security-suite\/\" target=\"\" title=\"\" rel=\"noopener noreferrer\">Gen AI Security Suite<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Cryptographie post-quantique<\/h3><\/div><div class=\"expander-content\"><p>Nous vous aidons \u00e0 \u00e9valuer votre niveau de pr\u00e9paration cryptographique et \u00e0 \u00e9laborer des plans de transformation pour garantir agilit\u00e9 et r\u00e9silience dans un monde post-quantique \u2014 en att\u00e9nuant les risques \u00e0 long terme avant qu\u2019ils ne se concr\u00e9tisent.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Sensibilisation \u00e0 la culture cyber\u00a0<\/h3><\/div><div class=\"expander-content\"><p>Nous contribuons \u00e0 instaurer une culture forte de la cybers\u00e9curit\u00e9 gr\u00e2ce \u00e0 des programmes de formation sur mesure, incluant les bonnes pratiques d\u2019hygi\u00e8ne num\u00e9rique et une sensibilisation sp\u00e9cifique \u00e0 l\u2019IA g\u00e9n\u00e9rative. Nous donnons \u00e0 vos \u00e9quipes les moyens de devenir votre premi\u00e8re ligne de d\u00e9fense.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">S\u00e9curit\u00e9 de l\u2019environnement SAP\u00a0<\/h3><\/div><div class=\"expander-content\"><p>S\u00e9curisez l\u2019\u00e9pine dorsale de votre entreprise. Nous vous offrons une visibilit\u00e9 approfondie sur votre environnement SAP, identifions les vuln\u00e9rabilit\u00e9s et vous guidons vers une rem\u00e9diation rapide, tant au niveau des syst\u00e8mes que des applications.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"SAP landscape security  link\" href=\"https:\/\/www.capgemini.com\/solutions\/security-for-your-sap-landscape\/\" target=\"\" title=\"\" rel=\"noopener noreferrer\">SAP landscape security <\/a><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"latest-insights layout-odd \"><div class=\"container\"><div class=\"insight-title\"><h2 class=\"latest-insight-title\">Publications<\/h2><\/div><div class=\"layout-single-card\">\n                      <div class=\"row align-items-center w-lg-100\">\n                        <div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/trajectoires\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=500&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1000&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg\" alt=\"\" style=\"object-position: 49% 47%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div>\n                            <div class=\"col-12 col-md-5 col-lg-7\"><\/div>\n                        <div class=\"col-12 col-md-7 col-lg-5\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/trajectoires\/\" aria-label=\"Trajectoires\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Transformation &amp; Innovation<\/div>\n                                <h3 class=\"card-title\">Trajectoires<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                     <\/div>\n                    <\/div><div class=\"layout-two-card cards-reversed\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/cryptographie-post-quantique-cyber\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg\" alt=\"Post quantum crypto - hero banner\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-md-6 col-lg-4 flex-sm-order-reverse\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/ia-confiance-defense-ouvrage-collectif-avenir\/\" aria-label=\"IA de confiance dans la D\u00e9fense : un ouvrage collectif pour b\u00e2tir l\u2019avenir\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Cybersecurit\u00e9<\/div>\n                                <h3 class=\"card-title\">IA de confiance dans la D\u00e9fense : un ouvrage collectif pour b\u00e2tir l\u2019avenir<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-white.svg\" alt=\"capgemini\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-white.svg\" alt=\"capgemini\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/cryptographie-post-quantique-cyber\/\" aria-label=\"Cryptographie post-quantique\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Cybersecurit\u00e9<\/div>\n                                <h3 class=\"card-title\">Cryptographie post-quantique<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute.svg\" alt=\"capgemini-research-institute\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><\/div>\n                    <\/div><div class=\"layout-two-card cards-normal\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/\" aria-label=\"NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Cybersecurit\u00e9<\/div>\n                                <h3 class=\"card-title\">NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/objectif-cyber\/\" aria-label=\"Objectif Cyber\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Cybersecurit\u00e9<\/div>\n                                <h3 class=\"card-title\">Objectif Cyber<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                    <\/div><div class=\"latest-insights-load-more\"><a class=\"more2\" target=\"\" aria-label=\"Nos contenus associ\u00e9s about Latest Insights Invent\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/#theme=cybersecurite\">Nos contenus associ\u00e9s<\/a><\/div><\/div><\/section>\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Articles de blog<\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/\" aria-label=\"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/\" aria-label=\"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation\"><h3 class=\"expert-subtitle\">Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">f\u00e9vr. 26, 2026<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" aria-label=\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" aria-label=\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises\"><h3 class=\"expert-subtitle\">IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/Sebastien-Baule.jpg?w=705\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">S\u00e9bastien Baule<\/div><div class=\"date-text\">janv. 12, 2026<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" aria-label=\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" aria-label=\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux\"><h3 class=\"expert-subtitle\">Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">oct. 20, 2025<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"cta-wrapper\"><a class=\"cta-link\" target=\"\" aria-label=\"Plus d&#039;articles de blog about Articles de blog\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/#theme=cybersecurite\" rel=\"noopener noreferrer\">Plus d&#039;articles de blog<\/a><\/div><\/div><\/section>\n\n\n<section class=\" section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Nos experts<\/h2><\/div><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Heure-Jeanne_New.jpg\" alt=\"Jeanne Heur\u00e9\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/bit.ly\/3QNheOE\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Jeanne Heur\u00e9<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directrice Confiance et S\u00e9curit\u00e9 Num\u00e9rique, Capgemini Invent France<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/bit.ly\/3QNheOE\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Jeanne Heur\u00e9 porte le d\u00e9partement de Confiance et s\u00e9curit\u00e9 num\u00e9rique de Capgemini Invent pour accompagner les dirigeants dans leur strat\u00e9gie et transformations cyber. Issue des sciences politiques et Affaires europ\u00e9ennes, elle a d\u2019abord abord\u00e9 ces sujets sous l\u2019angle des enjeux nationaux\/internationaux de s\u00e9curit\u00e9 num\u00e9rique \u2013 c\u2019est ce qui a toujours donn\u00e9 du sens a son activit\u00e9. Membre du Board Cyber Capgemini France et coordinatrice du d\u00e9veloppement des \u00e9quipes cyber Capgemini Invent \u00e0 l\u2019international, elle intervient dans tous les secteurs march\u00e9 sur ses sujets de pr\u00e9dilection : pilotage &#038; performance de la s\u00e9curit\u00e9 num\u00e9rique \u2013 Offres de services cyber &#038; relations IT\/m\u00e9tiers \u2013 Programmes de transformation cyber complexes \u2013 Cyber-r\u00e9silience \u2013 Cyber4good<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Shen-Lucie-photo-pro-visage.png\" alt=\"Lucie Shen\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucie-shen-8a8347138\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Lucie Shen<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Digital Trust &amp; Security Managing Consultant, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucie-shen-8a8347138\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Lucie porte l&#8217;offre de R\u00e9silience num\u00e9rique de Capgemini Invent. Elle accompagne les organisations pour d\u00e9finir et mettre en \u0153uvre leur strat\u00e9gie de cybers\u00e9curit\u00e9 et de r\u00e9silience.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Vincent-Laurens.png\" alt=\"Vincent Laurens\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Vincent Laurens<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur du d\u00e9veloppement Cyber pour la r\u00e9gion Europe du Sud, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Vincent a d\u00e9but\u00e9 sa carri\u00e8re en s\u00e9curit\u00e9 informatique dans les ann\u00e9es 90, travaillant avec diverses organisations, y compris des services de renseignement et des industries sp\u00e9cialis\u00e9es. En 2013, Vincent a rejoint Sogeti au Luxembourg, puis est devenu vice-pr\u00e9sident mondial de la cybers\u00e9curit\u00e9 en 2018. Depuis 2022, Vincent est vice-pr\u00e9sident et strat\u00e8ge mondial de la s\u00e9curit\u00e9 chez Devo, et en 2024, il a rejoint Capgemini pour diriger la cybers\u00e9curit\u00e9 dans la r\u00e9gion SCE. Depuis 2019, il est \u00e9galement administrateur non ex\u00e9cutif pour plusieurs start-ups technologiques et conseille des dirigeants et des conseils d&#8217;administration en cybers\u00e9curit\u00e9.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/P1090723.jpg\" alt=\"Christophe Menant new\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/christophe-menant-8b55b9\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Christophe Menant<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur de l&#039;offre Cybers\u00e9curit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/christophe-menant-8b55b9\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Directeur, responsable du portefeuille d\u2019offre et de l\u2019innovation cybers\u00e9curit\u00e9 de CAPGEMINI France. Plus de 30 ans d\u2019exp\u00e9rience en informatique et plus de 25 ans dans le domaine de la cybers\u00e9curit\u00e9. Christophe a une vaste exp\u00e9rience dans des environnements internationaux et mondiaux. Christophe a aid\u00e9 ces clients \u00e0 \u00e9laborer et \u00e0 ex\u00e9cuter leurs strat\u00e9gies et leurs programmes de transformation s\u00e9curit\u00e9, a g\u00e9r\u00e9 des crises majeures li\u00e9es \u00e0 des cyber-attaques de types ransomware ou espionnage industriel, a d\u00e9finit des m\u00e9thodes, des architectures et des processus de r\u00e9f\u00e9rences ainsi que des offres de s\u00e9curit\u00e9. Ceci a eu pour but de mieux adresser les demandes du march\u00e9 de la s\u00e9curit\u00e9 ou pour contribuer \u00e0 la s\u00e9curit\u00e9 interne des soci\u00e9t\u00e9s pour lesquelles il a travaill\u00e9. Christophe a travaill\u00e9 15 ans chez IBM puis 8 ans chez HPE\/DXC avant de rejoindre CAPGEMINI.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Curseur pr\u00e9c\u00e9dent\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Curseur suivant\"><\/button><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-partners undefined section section--partners-small\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"partner-heading\">Partenaires<\/h2><\/div><\/div><div class=\"row\">\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/notre-groupe\/partenaires-technologiques\/ibm\/\" class=\"partner-box-title\" aria-label=\"IBM met l&#039;intelligence au service du travail. Capgemini vous aide \u00e0 en tirer le meilleur parti.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Partners-ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/notre-groupe\/partenaires-technologiques\/microsoft\/\" class=\"partner-box-title\" aria-label=\"Travailler ensemble pour aider les entreprises \u00e0 accro\u00eetre leur valeur commerciale.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/microsoft.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Partners-microsoft.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/notre-groupe\/partenaires-technologiques\/oracle\/\" class=\"partner-box-title\" aria-label=\"Nous fa\u00e7onnons la puissante technologie Oracle pour cr\u00e9er des solutions gagnantes.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Partners-oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/notre-groupe\/partenaires-technologiques\/sap\/\" class=\"partner-box-title\" aria-label=\"Lib\u00e9rez la cr\u00e9ation de valeur avec un partenaire ayant plus de 40 ans d&#039;expertise SAP.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/sap.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Partners-sap.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n<\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Int\u00e9grer la cybers\u00e9curit\u00e9 \u00e0 votre strat\u00e9gie pour transformer la conformit\u00e9 en levier de croissance et de r\u00e9silience durable.<\/p>\n","protected":false},"author":12386,"featured_media":1000001212194,"parent":790701,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"cg_dt_proposed_to":[21,46,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"","footnotes":"","featured_focal_points":"","partner_card_description":"","gsap_animation":0},"brand":[],"partner_type":[],"service":[47],"industry":[],"partners":[],"page-type":[134],"content-group":[],"class_list":["post-790703","page","type-page","status-publish","has-post-thumbnail","hentry","service-cybersecurite","page-type-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Strat\u00e9gie cybers\u00e9curit\u00e9 | Capgemini<\/title>\n<meta name=\"description\" content=\"Capgemini int\u00e8gre la cybers\u00e9curit\u00e9 \u00e0 votre strat\u00e9gie pour transformer la conformit\u00e9 en levier de croissance et de r\u00e9silience durable.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strat\u00e9gie continue GRC\" \/>\n<meta property=\"og:description\" content=\"Capgemini int\u00e8gre la cybers\u00e9curit\u00e9 \u00e0 votre strat\u00e9gie pour transformer la conformit\u00e9 en levier de croissance et de r\u00e9silience durable.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T11:35:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/WEBPREVIEW-FIC.png\" \/>\n\t<meta property=\"og:image:width\" content=\"854\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/\",\"name\":\"Strat\u00e9gie cybers\u00e9curit\u00e9 | Capgemini\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\",\"datePublished\":\"2025-10-08T08:38:21+00:00\",\"dateModified\":\"2026-04-08T11:35:52+00:00\",\"description\":\"Capgemini int\u00e8gre la cybers\u00e9curit\u00e9 \u00e0 votre strat\u00e9gie pour transformer la conformit\u00e9 en levier de croissance et de r\u00e9silience durable.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Services\",\"item\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9\",\"item\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Strat\u00e9gie continue GRC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strat\u00e9gie cybers\u00e9curit\u00e9 | Capgemini","description":"Capgemini int\u00e8gre la cybers\u00e9curit\u00e9 \u00e0 votre strat\u00e9gie pour transformer la conformit\u00e9 en levier de croissance et de r\u00e9silience durable.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/","og_locale":"fr_FR","og_type":"article","og_title":"Strat\u00e9gie continue GRC","og_description":"Capgemini int\u00e8gre la cybers\u00e9curit\u00e9 \u00e0 votre strat\u00e9gie pour transformer la conformit\u00e9 en levier de croissance et de r\u00e9silience durable.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/","og_site_name":"Capgemini France","article_modified_time":"2026-04-08T11:35:52+00:00","og_image":[{"width":854,"height":480,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/WEBPREVIEW-FIC.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/","url":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/","name":"Strat\u00e9gie cybers\u00e9curit\u00e9 | Capgemini","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg","datePublished":"2025-10-08T08:38:21+00:00","dateModified":"2026-04-08T11:35:52+00:00","description":"Capgemini int\u00e8gre la cybers\u00e9curit\u00e9 \u00e0 votre strat\u00e9gie pour transformer la conformit\u00e9 en levier de croissance et de r\u00e9silience durable.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/#primaryimage","url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg","contentUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Services","item":"https:\/\/www.capgemini.com\/fr-fr\/services\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9","item":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/"},{"@type":"ListItem","position":3,"name":"Strat\u00e9gie continue GRC"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}}]}},"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"WebPage","headline":"Strat\u00e9gie continue GRC","url":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":[],"dateCreated":"2025-10-08T08:38:21Z","datePublished":"2025-10-08T08:38:21Z","dateModified":"2026-04-08T11:35:52Z"},"rendered":"<meta name=\"parsely-title\" content=\"Strat\u00e9gie continue GRC\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/strategie-grc\/\" \/>\n<meta name=\"parsely-type\" content=\"index\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-10-08T08:38:21Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":644919,"url":"https:\/\/www.capgemini.com\/fr-fr\/services\/customer-first\/reinvention-continue-entreprise\/strategie-de-croissance\/","url_meta":{"origin":790703,"position":0},"title":"Strat\u00e9gie de croissance","author":"abhidhari","date":"January 19, 2022","format":false,"excerpt":"L\u2019\u00e8re de la strat\u00e9gie purement analytique est r\u00e9volue. La strat\u00e9gie moderne exige l\u2019interaction de l\u2019analyse et de la cr\u00e9ativit\u00e9 visionnaire pour fa\u00e7onner, \u00e9valuer et concr\u00e9tiser les futurs possibles.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/2022-FR-Featured-Image-Customer-first-Strategie-de-croissance.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/2022-FR-Featured-Image-Customer-first-Strategie-de-croissance.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/2022-FR-Featured-Image-Customer-first-Strategie-de-croissance.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":629772,"url":"https:\/\/www.capgemini.com\/fr-fr\/secteurs\/produits-de-grande-consommation\/supply-chain-connectee\/","url_meta":{"origin":790703,"position":1},"title":"Supply chain connect\u00e9e","author":"abhidhari","date":"September 30, 2021","format":false,"excerpt":"L\u2019acc\u00e8s aux donn\u00e9es et aux plateformes num\u00e9riques ont transform\u00e9 les strat\u00e9gies traditionnelles de mise sur le march\u00e9 et cr\u00e9\u00e9 de nombreux nouveaux points de contact entre clients et fabricants. En cons\u00e9quence, la supply chain constitue d\u00e9sormais un facteur de diff\u00e9renciation strat\u00e9gique dans le parcours client et ne doit pas \u00eatre\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":738218,"url":"https:\/\/www.capgemini.com\/fr-fr\/carrieres\/parcours-professionnels\/nos-metiers\/strategie-et-transformation\/","url_meta":{"origin":790703,"position":2},"title":"Strat\u00e9gie et transformation digitale","author":"gabriellamouanga","date":"October 7, 2024","format":false,"excerpt":"Dans le domaine de la strat\u00e9gie et de la transformation, vous g\u00e9rerez des projets de transformation complexes et innovants pour des clients internes et externes, en veillant \u00e0 fournir des services de haute qualit\u00e9 dans les d\u00e9lais impartis et dans le respect du budget, et en vous concentrant de mani\u00e8re\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/21b-3.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/21b-3.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/21b-3.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/21b-3.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":691890,"url":"https:\/\/www.capgemini.com\/fr-fr\/services\/gestion-entreprise\/tranformation-dentreprise\/experience-en-entreprise\/","url_meta":{"origin":790703,"position":3},"title":"Corporate Experience","author":"translator0services","date":"January 19, 2022","format":false,"excerpt":"Vous aider \u00e0 d\u00e9finir et \u00e0 concr\u00e9tiser votre transformation pour devenir une entreprise responsable capable de s'adapter et de cr\u00e9er de la valeur pour rester comp\u00e9titive.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/01\/shutterstock_1902529741.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/01\/shutterstock_1902529741.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/01\/shutterstock_1902529741.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/01\/shutterstock_1902529741.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":643331,"url":"https:\/\/www.capgemini.com\/fr-fr\/services\/cloud\/cloud-for-enterprise-management\/","url_meta":{"origin":790703,"position":4},"title":"Cloud for entreprise management","author":"abhidhari","date":"January 14, 2022","format":false,"excerpt":"Nos solutions Cloud for Entreprise Management vous donnent l\u2019agilit\u00e9 et la r\u00e9silience n\u00e9cessaires pour r\u00e9ussir dans un monde en mouvement perp\u00e9tuel. Nous vous aidons \u00e0 passer d\u2019un centre de co\u00fbts ax\u00e9 sur la technologie \u00e0 une source d\u2019innovation et de prestation de services continue, afin que votre entreprise puisse se\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Capgemini_Services_cloud.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Capgemini_Services_cloud.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Capgemini_Services_cloud.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Capgemini_Services_cloud.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":635761,"url":"https:\/\/www.capgemini.com\/fr-fr\/services\/customer-first\/reinvention-continue-entreprise\/","url_meta":{"origin":790703,"position":5},"title":"R\u00e9invention continue de l\u2019entreprise","author":"abhidhari","date":"November 19, 2021","format":false,"excerpt":"Imaginer, \u00e9laborer et d\u00e9velopper des strat\u00e9gies, des mod\u00e8les d'entreprise, des marques et des projets qui favorisent la motivation et la croissance durable..","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/pages\/790703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/12386"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=790703"}],"version-history":[{"count":20,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/pages\/790703\/revisions"}],"predecessor-version":[{"id":805770,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/pages\/790703\/revisions\/805770"}],"up":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/pages\/790701"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=790703"}],"wp:term":[{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=790703"},{"taxonomy":"partner_type","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partner_type?post=790703"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=790703"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=790703"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=790703"},{"taxonomy":"page-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/page-type?post=790703"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=790703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}