{"id":790707,"date":"2025-10-08T10:48:55","date_gmt":"2025-10-08T08:48:55","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?page_id=790707"},"modified":"2026-04-08T13:39:16","modified_gmt":"2026-04-08T11:39:16","slug":"surveillance-continue","status":"publish","type":"page","link":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/","title":{"rendered":"Surveillance continue"},"content":{"rendered":"\n<div class=\"wp-block-cg-blocks-hero-picture-card undefined  heroPictureCard\"><div class=\"heroPictureCardBgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\" class=\"desktopImage\" alt=\"\" style=\"object-fit:cover;object-position:51% 37%\" loading=\"eager\"\/><\/picture><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\" class=\"mobileImage\" alt=\"\" style=\"object-fit:cover;object-position:51% 37%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-8 col-lg-6\"><div class=\"heroPictureCardBox\"><div class=\"heroPictureCardBoxTitle\"><h1 data-maxlength=\"144\">Surveillance continue<\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"small-device\"><div class=\"brandLogoWrapper\"> <\/div><\/div><\/div>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"grid-container\"><div class=\"col-12 col-md-2\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/services\/cybersecurity\/defend\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/services\/cybersecurity\/defend\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-detection-proactive-des-menaces-reponse-rapide-et-reduction-continue-des-risques-portees-par-une-expertise-mondiale-et-une-automatisation-avancee-nbsp\"><strong>D\u00e9tection proactive des menaces, r\u00e9ponse rapide et r\u00e9duction continue des risques \u2014 port\u00e9es par une expertise mondiale et une automatisation avanc\u00e9e.<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Les cybermenaces ne s\u2019arr\u00eatent jamais. Vos d\u00e9fenses non plus. \u00c0 mesure que les surfaces d\u2019attaque s\u2019\u00e9largissent et que les adversaires gagnent en sophistication, les entreprises ont besoin d\u2019op\u00e9rations de s\u00e9curit\u00e9 aussi agiles et implacables que les menaces qu\u2019elles affrontent. Avec les services de surveillance continue de Capgemini, vous b\u00e9n\u00e9ficiez d\u2019une protection 24h\/24 et 7j\/7 : de la chasse aux menaces avanc\u00e9es \u00e0 la d\u00e9tection et r\u00e9ponse manag\u00e9es, nous donnons \u00e0 vos \u00e9quipes les moyens de d\u00e9tecter plus vite, r\u00e9agir plus intelligemment et se relever plus efficacement \u2014 tout en minimisant l\u2019impact et en renfor\u00e7ant durablement votre approche en mati\u00e8re de s\u00e9curit\u00e9.&nbsp;<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-how-we-do-it section section--howwedoit block-howwedoit\"><div class=\"container\"><div><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 data-maxlength=\"72\" class=\"expandable-heading-tag\">Nos offres<\/h2><\/div><\/div><div class=\"row\"><div class=\"col-12 col-md-8\"><p><\/p><\/div><\/div><\/div><div class=\"row\"><div class=\"col-12 col-md-8\"><div class=\"section-content\">\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">D\u00e9tection et r\u00e9ponse g\u00e9r\u00e9es (MDR)<\/h3><\/div><div class=\"expander-content\"><p>Nos services MDR assurent une surveillance 24h\/24 et 7j\/7, avec une r\u00e9ponse rapide gr\u00e2ce \u00e0 des analyses pilot\u00e9es par l\u2019IA et une automatisation avanc\u00e9e. Nous d\u00e9tectons et neutralisons les menaces en temps r\u00e9el, vous permettant de r\u00e9duire le temps de pr\u00e9sence des attaques, d\u2019acc\u00e9l\u00e9rer la r\u00e9solution des incidents et de pr\u00e9server la continuit\u00e9 de vos activit\u00e9s.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">SOC manag\u00e9 et transformation du SOC<\/h3><\/div><div class=\"expander-content\"><p>Gr\u00e2ce \u00e0 nos centres de cyber d\u00e9fense mondiaux, nos services de SOC manag\u00e9 offrent une surveillance, une analyse et une r\u00e9ponse aux menaces 24h\/24 et 7j\/7. Nous vous accompagnons \u00e9galement dans la modernisation et la transformation de votre SOC interne, en int\u00e9grant des outils avanc\u00e9s, des processus optimis\u00e9s et des ressources expertes pour r\u00e9pondre aux exigences actuelles en mati\u00e8re de cybers\u00e9curit\u00e9.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Cyber Defense Center link\" href=\"https:\/\/www.capgemini.com\/solutions\/cyber-defense-center\/\" target=\"\" title=\"\" rel=\"noopener noreferrer\">Cyber Defense Center<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Criminalistique num\u00e9rique et la r\u00e9ponse aux incidents\u00a0 (DFIR)\u00a0<\/h3><\/div><div class=\"expander-content\"><p>Lorsqu\u2019une violation survient, la rapidit\u00e9 et la pr\u00e9cision sont essentielles. Nos \u00e9quipes DFIR interviennent imm\u00e9diatement pour mener des investigations forensiques, analyser les causes profondes et limiter l\u2019impact, tout en r\u00e9duisant les d\u00e9lais de r\u00e9cup\u00e9ration et en pr\u00e9servant la r\u00e9putation de votre organisation.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Threat Hunting (Chasse aux menaces)\u00a0<\/h3><\/div><div class=\"expander-content\"><p>Nos experts en chasse aux menaces vont au-del\u00e0 des alertes pour identifier les menaces cach\u00e9es et les menaces persistantes avanc\u00e9es (APT) qui se dissimulent dans votre environnement. Gr\u00e2ce \u00e0 l\u2019analyse comportementale, \u00e0 l\u2019intelligence des menaces et \u00e0 des investigations bas\u00e9es sur des hypoth\u00e8ses, nous vous aidons \u00e0 garder une longueur d\u2019avance sur les attaquants.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Threat hunting services link\" href=\"https:\/\/www.capgemini.com\/solutions\/capgeminis-threat-hunting-services\/\" target=\"\" title=\"\" rel=\"noopener noreferrer\">Threat hunting services<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Gestion des vuln\u00e9rabilit\u00e9s<\/h3><\/div><div class=\"expander-content\"><p>Nous vous aidons \u00e0 identifier, \u00e9valuer et corriger les vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans l\u2019ensemble de votre patrimoine num\u00e9rique. En alignant les efforts de rem\u00e9diation sur l\u2019impact business et le contexte des menaces, nous veillons \u00e0 ce que vos ressources soient mobilis\u00e9es l\u00e0 o\u00f9 elles sont le plus utiles.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Tests d\u2019intrusion (Penetration Testing)\u00a0<\/h3><\/div><div class=\"expander-content\"><p>Nous simulons de v\u00e9ritables cyberattaques pour identifier les vuln\u00e9rabilit\u00e9s exploitables dans vos syst\u00e8mes, applications et r\u00e9seaux. Nos hackers \u00e9thiques vous aident \u00e0 d\u00e9tecter les failles avant qu\u2019elles ne soient exploit\u00e9es \u2014 renfor\u00e7ant ainsi vos d\u00e9fenses gr\u00e2ce \u00e0 des recommandations concr\u00e8tes et actionnables.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Red\/Purple Team\u00a0<\/h3><\/div><div class=\"expander-content\"><p>\u00a0<br>Nos experts en s\u00e9curit\u00e9 offensive simulent des attaques r\u00e9elles pour tester vos d\u00e9fenses et identifier les failles potentielles. Gr\u00e2ce aux exercices de Red et Purple Teaming, nous vous fournissons des recommandations concr\u00e8tes pour renforcer vos capacit\u00e9s de d\u00e9tection, de r\u00e9ponse et votre r\u00e9silience globale face aux cybermenaces.\u00a0<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-left\"><div class=\"container\"><div class=\"row video-align-right\"><div class=\"col-md-12\"><div class=\"video-align-right row box box--4 box--mini\"><div class=\"col-md-1\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/MmKOmZ6hVjI?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Global threat intelligence<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">Nous pouvons vous aider \u00e0 \u00e9liminer les menaces rapidement.<\/p><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"latest-insights layout-odd \"><div class=\"container\"><div class=\"insight-title\"><h2 class=\"latest-insight-title\">Publications<\/h2><\/div><div class=\"layout-single-card\">\n                      <div class=\"row align-items-center w-lg-100\">\n                        <div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/trajectoires\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=500&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1000&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg\" alt=\"\" style=\"object-position: 49% 47%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div>\n                            <div class=\"col-12 col-md-5 col-lg-7\"><\/div>\n                        <div class=\"col-12 col-md-7 col-lg-5\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/trajectoires\/\" aria-label=\"Trajectoires\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Transformation &amp; Innovation<\/div>\n                                <h3 class=\"card-title\">Trajectoires<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                     <\/div>\n                    <\/div><div class=\"layout-two-card cards-reversed\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/cryptographie-post-quantique-cyber\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg\" alt=\"Post quantum crypto - hero banner\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-md-6 col-lg-4 flex-sm-order-reverse\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/ia-confiance-defense-ouvrage-collectif-avenir\/\" aria-label=\"IA de confiance dans la D\u00e9fense : un ouvrage collectif pour b\u00e2tir l\u2019avenir\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Cybersecurit\u00e9<\/div>\n                                <h3 class=\"card-title\">IA de confiance dans la D\u00e9fense : un ouvrage collectif pour b\u00e2tir l\u2019avenir<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-white.svg\" alt=\"capgemini\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-white.svg\" alt=\"capgemini\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/cryptographie-post-quantique-cyber\/\" aria-label=\"Cryptographie post-quantique\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Cybersecurit\u00e9<\/div>\n                                <h3 class=\"card-title\">Cryptographie post-quantique<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute.svg\" alt=\"capgemini-research-institute\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><\/div>\n                    <\/div><div class=\"layout-two-card cards-normal\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/\" aria-label=\"NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Cybersecurit\u00e9<\/div>\n                                <h3 class=\"card-title\">NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/objectif-cyber\/\" aria-label=\"Objectif Cyber\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Cybersecurit\u00e9<\/div>\n                                <h3 class=\"card-title\">Objectif Cyber<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                    <\/div><div class=\"latest-insights-load-more\"><a class=\"more2\" target=\"\" aria-label=\"Nos contenus associ\u00e9s about Latest Insights Invent\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/#theme=cybersecurite\">Nos contenus associ\u00e9s<\/a><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Fireside chat<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">L\u2019intelligence artificielle (IA) dans les op\u00e9rations de s\u00e9curit\u00e9.<br<\/p><\/div><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/4TVplJFSXzs?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Articles de blog<\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/\" aria-label=\"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/\" aria-label=\"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation\"><h3 class=\"expert-subtitle\">Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">f\u00e9vr. 26, 2026<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" aria-label=\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" aria-label=\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises\"><h3 class=\"expert-subtitle\">IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/Sebastien-Baule.jpg?w=705\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">S\u00e9bastien Baule<\/div><div class=\"date-text\">janv. 12, 2026<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" aria-label=\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" aria-label=\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux\"><h3 class=\"expert-subtitle\">Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">oct. 20, 2025<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"cta-wrapper\"><a class=\"cta-link\" target=\"\" aria-label=\"Plus d&#039;articles de blog about Articles de blog\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/#theme=cybersecurite\" rel=\"noopener noreferrer\">Plus d&#039;articles de blog<\/a><\/div><\/div><\/section>\n\n\n<section class=\" section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider undefined\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Nos experts<\/h2><\/div><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Vincent-Laurens.png\" alt=\"Vincent Laurens\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Vincent Laurens<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur du d\u00e9veloppement Cyber pour la r\u00e9gion Europe du Sud, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Vincent a d\u00e9but\u00e9 sa carri\u00e8re en s\u00e9curit\u00e9 informatique dans les ann\u00e9es 90, travaillant avec diverses organisations, y compris des services de renseignement et des industries sp\u00e9cialis\u00e9es. En 2013, Vincent a rejoint Sogeti au Luxembourg, puis est devenu vice-pr\u00e9sident mondial de la cybers\u00e9curit\u00e9 en 2018. Depuis 2022, Vincent est vice-pr\u00e9sident et strat\u00e8ge mondial de la s\u00e9curit\u00e9 chez Devo, et en 2024, il a rejoint Capgemini pour diriger la cybers\u00e9curit\u00e9 dans la r\u00e9gion SCE. Depuis 2019, il est \u00e9galement administrateur non ex\u00e9cutif pour plusieurs start-ups technologiques et conseille des dirigeants et des conseils d&#8217;administration en cybers\u00e9curit\u00e9.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Benjamin-Cauwel.webp\" alt=\"Benjamin Cauwel\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/bencau\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Benjamin Cauwel<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Vice-Pr\u00e9sident en charge des activit\u00e9s Cybersecurity, Advisory et Service Now, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/bencau\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Fort de plus de 20 ans d\u2019exp\u00e9rience dans les domaines des infrastructures et de la cybers\u00e9curit\u00e9, Benjamin a occup\u00e9 des postes strat\u00e9giques en delivery et en conseil au sein de grandes entreprises du num\u00e9rique. Anim\u00e9 depuis toujours par une passion pour la technologie, il s\u2019est impos\u00e9 comme un expert reconnu, notamment dans la gestion d\u2019identit\u00e9s et des acc\u00e8s. Sa ma\u00eetrise pointue du sujet lui vaut d\u2019\u00eatre r\u00e9guli\u00e8rement invit\u00e9 \u00e0 intervenir lors de conf\u00e9rences majeures telles que HIP aux Etats-Unis et Identity Days en France.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/10\/Jerome_Desbonnet-square.jpg\" alt=\"J\u00e9r\u00f4me Desbonnet\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/jeromedesbonnet\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">J\u00e9r\u00f4me Desbonnet<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>VP &#8211; Cybersecurity CTIO &#8211; Chief cybersecurity Architect CIS GBL&#039;s, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/jeromedesbonnet\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">En tant que VP, Cybersecurity CTIO, J\u00e9r\u00f4me\u00a0cr\u00e9e des mod\u00e8les d\u2019architecture de s\u00e9curit\u00e9. J\u00e9r\u00f4me planifie et ex\u00e9cute d\u2019importants programmes de s\u00e9curit\u00e9 afin de garantir que les clients de Capgemini sont bien prot\u00e9g\u00e9s.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/P1090723.jpg\" alt=\"Christophe Menant new\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/christophe-menant-8b55b9\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Christophe Menant<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur de l&#039;offre Cybers\u00e9curit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/christophe-menant-8b55b9\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Directeur, responsable du portefeuille d\u2019offre et de l\u2019innovation cybers\u00e9curit\u00e9 de CAPGEMINI France. Plus de 30 ans d\u2019exp\u00e9rience en informatique et plus de 25 ans dans le domaine de la cybers\u00e9curit\u00e9. Christophe a une vaste exp\u00e9rience dans des environnements internationaux et mondiaux. Christophe a aid\u00e9 ces clients \u00e0 \u00e9laborer et \u00e0 ex\u00e9cuter leurs strat\u00e9gies et leurs programmes de transformation s\u00e9curit\u00e9, a g\u00e9r\u00e9 des crises majeures li\u00e9es \u00e0 des cyber-attaques de types ransomware ou espionnage industriel, a d\u00e9finit des m\u00e9thodes, des architectures et des processus de r\u00e9f\u00e9rences ainsi que des offres de s\u00e9curit\u00e9. Ceci a eu pour but de mieux adresser les demandes du march\u00e9 de la s\u00e9curit\u00e9 ou pour contribuer \u00e0 la s\u00e9curit\u00e9 interne des soci\u00e9t\u00e9s pour lesquelles il a travaill\u00e9. Christophe a travaill\u00e9 15 ans chez IBM puis 8 ans chez HPE\/DXC avant de rejoindre CAPGEMINI.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Didier-Appell-Profile-Card.jpg\" alt=\"Didier Appell\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/d-appell-ot-cybersecurity\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Didier Appell<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Head of OT\/IoT Cybersecurity<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/d-appell-ot-cybersecurity\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Apr\u00e8s 10 ans de d\u00e9veloppement logiciel et d&#8217;int\u00e9gration de syst\u00e8mes de trafic a\u00e9rien dans le monde entier pour le groupe Thales, Didier a rejoint Capgemini en 2000 en tant que chef de projet.\n\nDe 2006 \u00e0 2012, il a dirig\u00e9 une Business Unit en d\u00e9veloppement de logiciels embarqu\u00e9s. Il s&#8217;est concentr\u00e9 sur 4 zones (Strasbourg, Lyon, Valence et Grenoble) et des clients industriels dans les transports, l&#8217;\u00e9nergie, les t\u00e9l\u00e9coms et la sant\u00e9.\n\nDepuis 2013, Didier est responsable de la cyber-s\u00e9curit\u00e9 des SI industriels et des objets connect\u00e9s. Il a cr\u00e9\u00e9 l&#8217;offre bas\u00e9e sur la r\u00e9utilisation de ce qui se faisait dans l&#8217;IT et l&#8217;a adapt\u00e9e au contexte Industriel (S\u00e9curit\u00e9, Op\u00e9rations, Performance).\n\nIl dirige d\u00e9sormais la cybers\u00e9curit\u00e9 IoT\/OT pour l&#8217;ensemble du groupe afin d&#8217;\u00e9tendre l&#8217;exp\u00e9rience d\u00e9velopp\u00e9e en France \u00e0 d&#8217;autres pays.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Curseur pr\u00e9c\u00e9dent\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Curseur suivant\"><\/button><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-partners undefined section section--partners-small\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"partner-heading\">Partenaires<\/h2><\/div><\/div><div class=\"row\">\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/notre-groupe\/partenaires-technologiques\/ibm\/\" class=\"partner-box-title\" aria-label=\"IBM met l&#039;intelligence au service du travail. Capgemini vous aide \u00e0 en tirer le meilleur parti.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Partners-ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/notre-groupe\/partenaires-technologiques\/microsoft\/\" class=\"partner-box-title\" aria-label=\"Travailler ensemble pour aider les entreprises \u00e0 accro\u00eetre leur valeur commerciale.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/microsoft.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Partners-microsoft.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/notre-groupe\/partenaires-technologiques\/oracle\/\" class=\"partner-box-title\" aria-label=\"Nous fa\u00e7onnons la puissante technologie Oracle pour cr\u00e9er des solutions gagnantes.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Partners-oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/notre-groupe\/partenaires-technologiques\/sap\/\" class=\"partner-box-title\" aria-label=\"Lib\u00e9rez la cr\u00e9ation de valeur avec un partenaire ayant plus de 40 ans d&#039;expertise SAP.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/sap.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Partners-sap.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n<\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Vous prot\u00e9ger 24\/7 avec une d\u00e9tection proactive, une r\u00e9ponse rapide et une r\u00e9duction continue des risques gr\u00e2ce \u00e0 l\u2019automatisation.<\/p>\n","protected":false},"author":12386,"featured_media":1000001212194,"parent":790701,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"cg_dt_proposed_to":[21,46,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"","footnotes":"","featured_focal_points":"","partner_card_description":"","gsap_animation":0},"brand":[],"partner_type":[],"service":[47],"industry":[],"partners":[],"page-type":[134],"content-group":[],"class_list":["post-790707","page","type-page","status-publish","has-post-thumbnail","hentry","service-cybersecurite","page-type-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Surveillance continue | Capgemini<\/title>\n<meta name=\"description\" content=\"Capgemini vous prot\u00e8ge 24\/7 avec une d\u00e9tection proactive, une r\u00e9ponse rapide et une r\u00e9duction continue des risques gr\u00e2ce \u00e0 l\u2019automatisation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Surveillance continue\" \/>\n<meta property=\"og:description\" content=\"Capgemini vous prot\u00e8ge 24\/7 avec une d\u00e9tection proactive, une r\u00e9ponse rapide et une r\u00e9duction continue des risques gr\u00e2ce \u00e0 l\u2019automatisation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T11:39:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/WEBPREVIEW-FIC.png\" \/>\n\t<meta property=\"og:image:width\" content=\"854\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/\",\"name\":\"Surveillance continue | Capgemini\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\",\"datePublished\":\"2025-10-08T08:48:55+00:00\",\"dateModified\":\"2026-04-08T11:39:16+00:00\",\"description\":\"Capgemini vous prot\u00e8ge 24\/7 avec une d\u00e9tection proactive, une r\u00e9ponse rapide et une r\u00e9duction continue des risques gr\u00e2ce \u00e0 l\u2019automatisation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Services\",\"item\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9\",\"item\":\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Surveillance continue\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Surveillance continue | Capgemini","description":"Capgemini vous prot\u00e8ge 24\/7 avec une d\u00e9tection proactive, une r\u00e9ponse rapide et une r\u00e9duction continue des risques gr\u00e2ce \u00e0 l\u2019automatisation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/","og_locale":"fr_FR","og_type":"article","og_title":"Surveillance continue","og_description":"Capgemini vous prot\u00e8ge 24\/7 avec une d\u00e9tection proactive, une r\u00e9ponse rapide et une r\u00e9duction continue des risques gr\u00e2ce \u00e0 l\u2019automatisation.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/","og_site_name":"Capgemini France","article_modified_time":"2026-04-08T11:39:16+00:00","og_image":[{"width":854,"height":480,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/WEBPREVIEW-FIC.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/","url":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/","name":"Surveillance continue | Capgemini","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg","datePublished":"2025-10-08T08:48:55+00:00","dateModified":"2026-04-08T11:39:16+00:00","description":"Capgemini vous prot\u00e8ge 24\/7 avec une d\u00e9tection proactive, une r\u00e9ponse rapide et une r\u00e9duction continue des risques gr\u00e2ce \u00e0 l\u2019automatisation.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/#primaryimage","url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg","contentUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Services","item":"https:\/\/www.capgemini.com\/fr-fr\/services\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9","item":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/"},{"@type":"ListItem","position":3,"name":"Surveillance continue"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}}]}},"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"WebPage","headline":"Surveillance continue","url":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":[],"dateCreated":"2025-10-08T08:48:55Z","datePublished":"2025-10-08T08:48:55Z","dateModified":"2026-04-08T11:39:16Z"},"rendered":"<meta name=\"parsely-title\" content=\"Surveillance continue\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/surveillance-continue\/\" \/>\n<meta name=\"parsely-type\" content=\"index\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-10-08T08:48:55Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":790701,"url":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/","url_meta":{"origin":790707,"position":0},"title":"Cybers\u00e9curit\u00e9","author":"Tarek Edde Gomez","date":"October 8, 2025","format":false,"excerpt":"Renforcer votre r\u00e9silience face aux cybermenaces gr\u00e2ce \u00e0 une cybers\u00e9curit\u00e9 agile, strat\u00e9gique et align\u00e9e sur vos objectifs business.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":790705,"url":"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/protection-continue\/","url_meta":{"origin":790707,"position":1},"title":"Protection continue","author":"Tarek Edde Gomez","date":"October 8, 2025","format":false,"excerpt":"S\u00e9curiser vos environnements IT, OT et cloud avec une protection continue, \u00e9volutive et align\u00e9e sur vos transformations digitales.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":705571,"url":"https:\/\/www.capgemini.com\/fr-fr\/solutions\/lean-agile-safe-formation\/formation-safe-devops-sdp\/","url_meta":{"origin":790707,"position":2},"title":"Formation SAFe\u00ae DevOps (SDP) \u2013 version 6.0","author":"anne.gautier@capgemini.com","date":"December 27, 2025","format":false,"excerpt":"Ce cours interactif aide les personnes occupant des postes techniques, non techniques et de direction \u00e0 travailler ensemble pour optimiser leur flux de valeur de d\u00e9veloppement de bout en bout.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"\/wp-content\/themes\/capgemini2020\/assets\/images\/mockup.png","width":350,"height":200},"classes":[]},{"id":738230,"url":"https:\/\/www.capgemini.com\/fr-fr\/carrieres\/parcours-professionnels\/nos-metiers\/ingenierie-test-qualites\/","url_meta":{"origin":790707,"position":3},"title":"Ing\u00e9nierie tests et qualit\u00e9","author":"gabriellamouanga","date":"October 7, 2024","format":false,"excerpt":"Construisez votre carri\u00e8re dans les m\u00e9tiers de l'ing\u00e9nierie et du tests de qualit\u00e9 avec nous.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/19a-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/19a-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/19a-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/19a-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":726765,"url":"https:\/\/www.capgemini.com\/fr-fr\/services\/data-intelligence-artificielle\/ia-generative\/","url_meta":{"origin":790707,"position":4},"title":"IA g\u00e9n\u00e9rative","author":"","date":"July 21, 2023","format":false,"excerpt":"Alors que l'IA g\u00e9n\u00e9rative continue de progresser, les premi\u00e8res organisations \u00e0 l\u2019adopter sauront avant les autres r\u00e9inventer leur mod\u00e8le d\u2019affaire et leur processus.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":738282,"url":"https:\/\/www.capgemini.com\/fr-fr\/carrieres\/parcours-professionnels\/nos-metiers\/ingenierie-operations-industrielles\/","url_meta":{"origin":790707,"position":5},"title":"Ing\u00e9nierie et op\u00e9rations industrielles","author":"gabriellamouanga","date":"October 7, 2024","format":false,"excerpt":"Construisez votre carri\u00e8re dans les m\u00e9tiers de l'ing\u00e9nierie de la fabrication et des op\u00e9rations industrielles.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/MicrosoftTeams-image-23-3.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/MicrosoftTeams-image-23-3.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/MicrosoftTeams-image-23-3.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/MicrosoftTeams-image-23-3.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/pages\/790707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/12386"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=790707"}],"version-history":[{"count":20,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/pages\/790707\/revisions"}],"predecessor-version":[{"id":805772,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/pages\/790707\/revisions\/805772"}],"up":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/pages\/790701"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=790707"}],"wp:term":[{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=790707"},{"taxonomy":"partner_type","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partner_type?post=790707"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=790707"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=790707"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=790707"},{"taxonomy":"page-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/page-type?post=790707"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=790707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}