{"id":714301,"date":"2023-03-23T16:44:26","date_gmt":"2023-03-23T15:44:26","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=714301"},"modified":"2025-03-04T07:10:25","modified_gmt":"2025-03-04T06:10:25","slug":"cybersecurite-vehicules-connectes","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/","title":{"rendered":"Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0?"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0? <\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Thomas-Chasles.jpg?w=960?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Thomas Chasles<\/h5><h5 class=\"blog-date\">23 mars 2023<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Dans tous les domaines, l\u2019essor des objets connect\u00e9s ouvre d\u2019immenses possibilit\u00e9s\u00a0: contr\u00f4le et pilotage \u00e0 distance, adaptation automatique \u00e0 l\u2019environnement, coordination avec des objets avoisinants, mises \u00e0 jour de fonctionnalit\u00e9s, relev\u00e9s d\u2019utilisation pour la maintenance ou la tarification \u00e0 l\u2019usage, services multim\u00e9dias int\u00e9gr\u00e9s\u2026<\/h2><p class=\"intro-para-content\">Mais toutes ces connexions sont autant de portes ouvertes sur l\u2019ext\u00e9rieur, que des individus malveillants pourraient chercher \u00e0 emprunter pour perturber le comportement du syst\u00e8me ou d\u00e9rober les informations qu\u2019il contient. Apr\u00e8s l\u2019IT et l\u2019OT, c\u2019est donc un troisi\u00e8me p\u00e9rim\u00e8tre de cybers\u00e9curit\u00e9 que doivent prendre en compte les entreprises, qui ont d\u00e9sormais l\u2019obligation de se pr\u00e9occuper de la s\u00e9curit\u00e9 des produits connect\u00e9s qu\u2019elles vendent \u00e0 leurs clients. Bien qu\u2019elles n\u2019en soient plus propri\u00e9taires et qu\u2019elles n\u2019en supportent pas directement les risques, c\u2019est une responsabilit\u00e9 qui leur incombe.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-l-automobile-un-secteur-precurseur-et-tres-reglemente\"><strong>L\u2019automobile, un secteur pr\u00e9curseur et tr\u00e8s r\u00e9glement\u00e9<\/strong><\/h2>\n\n\n\n<p>\u00c0 la fois pr\u00e9curseur en mati\u00e8re de connectivit\u00e9 et soumis \u00e0 des imp\u00e9ratifs r\u00e9glementaires de s\u00e9curit\u00e9 stricts, le secteur automobile se trouve naturellement \u00e0 l\u2019avant-garde sur ces questions et son exp\u00e9rience est observ\u00e9e de pr\u00e8s par d\u2019autres, comme le ferroviaire, ou le mat\u00e9riel m\u00e9dical, qui pourraient rapidement avoir \u00e0 faire face aux m\u00eames exigences. Depuis juillet 2022, en vertu de la r\u00e9glementation UN R155, les constructeurs et les \u00e9quipementiers automobiles europ\u00e9ens, japonais et cor\u00e9ens ont l\u2019obligation de mettre en place un syst\u00e8me de gestion de la cybers\u00e9curit\u00e9 (Cyber Security Management System, CSMS) certifi\u00e9 pour tous leurs nouveaux mod\u00e8les. Pour sa mise en \u0153uvre, ils doivent se conformer \u00e0 la norme ISO\/SAE 21434, sp\u00e9cifiquement d\u00e9di\u00e9e \u00e0 la cybers\u00e9curit\u00e9 automobile. Ce cadre r\u00e9glementaire, qui va sans aucun doute acc\u00e9l\u00e9rer la mont\u00e9e en maturit\u00e9 sur le sujet des acteurs de l\u2019\u00e9cosyst\u00e8me automobile, constituera certainement un exemple riche d\u2019enseignements pour d\u2019autres secteurs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Les sp\u00e9cificit\u00e9s du \u00ab&nbsp;SOC automobile&nbsp;\u00bb<\/strong><\/h2>\n\n\n\n<p>Un CSMS g\u00e8re la cybers\u00e9curit\u00e9 du syst\u00e8me sur l\u2019ensemble de son cycle de vie. Il couvre donc le processus de d\u00e9veloppement des logiciels embarqu\u00e9s, l\u2019\u00e9tape cl\u00e9 de leur chargement dans le v\u00e9hicule, puis leur surveillance durant leur utilisation, et enfin la destruction des donn\u00e9es en fin de vie. La phase d\u2019utilisation est \u00e0 la fois la plus nouvelle, la plus sensible et la plus ouverte \u00e0 l\u2019innovation. \u00c0 premi\u00e8re vue, on pourrait l\u2019assimiler \u00e0 la mise en \u0153uvre d\u2019un SOC pour un syst\u00e8me d\u2019information, mais un \u00ab&nbsp;SOC automobile&nbsp;\u00bb diff\u00e8re en r\u00e9alit\u00e9 consid\u00e9rablement d\u2019un SOC IT, tant sur les aspects de d\u00e9tection que de rem\u00e9diation.<\/p>\n\n\n\n<p>En ce qui concerne la d\u00e9tection, le spectre de la surveillance ne peut se limiter aux seuls assets IT. Il est en effet indispensable de disposer \u00e9galement d\u2019indicateurs de fonctionnement op\u00e9rationnels pour savoir ce qu\u2019il se passe vraiment.&nbsp;Une fonctionnalit\u00e9 pourrait ne manifester aucune anomalie d\u2019un point de vue informatique mais avoir un comportement aberrant, r\u00e9v\u00e9lateur d\u2019un piratage et dangereux pour le conducteur et ses passagers. Tout en fonctionnant normalement, elle pourrait aussi avoir \u00e9t\u00e9 activ\u00e9e frauduleusement, un cas de figure susceptible de se multiplier avec l\u2019essor de services et de fonctions optionnels sur abonnement. La d\u00e9tection des incidents de cybers\u00e9curit\u00e9 affectant les appareils connect\u00e9s ne peut donc proc\u00e9der que d\u2019une analyse crois\u00e9e des donn\u00e9es IT et des donn\u00e9es de fonctionnement, qu\u2019il faut par cons\u00e9quent pouvoir suivre en parall\u00e8le et rapprocher.<\/p>\n\n\n\n<p>Il en va de m\u00eame pour la rem\u00e9diation. Dans le domaine IT, lorsqu\u2019on suspecte un incident, si on d\u00e9cide par pr\u00e9caution de bloquer une transaction ou d\u2019isoler une machine, les cons\u00e9quences restent plus limit\u00e9es. Dans un v\u00e9hicule lanc\u00e9 \u00e0 pleine vitesse, les choses sont \u00e9videmment tr\u00e8s diff\u00e9rentes. On ne peut prendre aucune d\u00e9cision sans avoir une connaissance exacte de la situation, ce qui n\u00e9cessite, l\u00e0 encore, de disposer de donn\u00e9es de fonctionnement pour agir au mieux en fonction du contexte. <\/p>\n\n\n\n<p>Dans tous les cas, la s\u00fbret\u00e9 de fonctionnement prime par-dessus tout, ce qui ne va pas d\u2019ailleurs sans poser de questions en ce qui concerne les mises \u00e0 jour de s\u00e9curit\u00e9. Dans de nombreux secteurs, les homologations sont tr\u00e8s exigeantes et difficiles \u00e0 obtenir, et l\u2019on y regardera donc \u00e0 deux fois avant de modifier les logiciels, m\u00eame pour renforcer leur s\u00e9curit\u00e9. Dans l\u2019automobile, la mise \u00e0 jour des logiciels embarqu\u00e9s est \u00e9galement encadr\u00e9e par un r\u00e8glement sp\u00e9cifique (UN R 156), qui impose la mise en place d\u2019un syst\u00e8me de gestion (Software Update Management System, SUMS). Par ailleurs, une norme (ISO 24089) vient d\u2019\u00eatre publi\u00e9e pour encadrer les mises \u00e0 jour \u00e0 distance, \u00e0 l\u2019image de ce que pratique d\u00e9j\u00e0 Tesla.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>La cybers\u00e9curit\u00e9 des produits connect\u00e9s, une discipline sp\u00e9cifique<\/strong><\/h2>\n\n\n\n<p>Contraintes pr\u00e9pond\u00e9rantes de s\u00fbret\u00e9, besoin de collecter et de croiser donn\u00e9es IT et de fonctionnement, limitations inh\u00e9rentes aux syst\u00e8mes embarqu\u00e9s (capacit\u00e9s de calcul et de stockage, consommation \u00e9nerg\u00e9tique, encombrement\u2026), incertitudes sur la qualit\u00e9 des connexions&nbsp;: pour toutes ces raisons, la cybers\u00e9curit\u00e9 des v\u00e9hicules \u2013 et, plus largement, des produits \u2013 connect\u00e9s est une discipline tr\u00e8s sp\u00e9cifique. La conception et la mise en \u0153uvre des architectures logicielles et mat\u00e9rielles embarqu\u00e9es, des proc\u00e9dures et des syst\u00e8mes de contr\u00f4le du CSMS n\u00e9cessitent d\u2019ajouter aux comp\u00e9tences en cybers\u00e9curit\u00e9 traditionnelle une forte expertise sectorielle pour trouver des solutions conciliant s\u00fbret\u00e9, s\u00e9curit\u00e9, conformit\u00e9, fiabilit\u00e9, co\u00fbt et qualit\u00e9 de l\u2019exp\u00e9rience client.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;La cybers\u00e9curit\u00e9 ne sera plus un sujet \u00e0 part, mais une pratique qui devra s\u2019int\u00e9grer au c\u0153ur de m\u00e9tier.&#8221;<\/p>\n<\/blockquote>\n\n\n\n<p>Cette proximit\u00e9 de la cybers\u00e9curit\u00e9 avec les autres enjeux m\u00e9tier souligne \u00e0 quel point elle doit \u00eatre trait\u00e9e en \u00e9troite collaboration avec l\u2019ensemble des acteurs, notamment le bureau d\u2019\u00e9tude, l\u2019IT et le service apr\u00e8s-vente. Elle peut m\u00eame \u00eatre source d\u2019innovation car elle disposera sur le v\u00e9hicule et son fonctionnement d\u2019informations qui pourraient \u00eatre valoris\u00e9es dans d\u2019autres applications. Bref, la cybers\u00e9curit\u00e9 ne sera plus un sujet \u00e0 part, mais une pratique qui devra s\u2019int\u00e9grer au c\u0153ur de m\u00e9tier. Pour tous les fabricants de produits connect\u00e9s, ce ne sera pas la moindre des r\u00e9volutions.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Auteur<\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Thomas-Chasles.jpg\" alt=\"Thomas Chasles\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/thomas-chasles\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Thomas Chasles<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>IOT\/OT Cybersecurity Consultant Manager \u2013 SME Automotive<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/thomas-chasles\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Apr\u00e8s 15 ans pass\u00e9s dans le domaine de la carte \u00e0 puce et les solutions de s\u00e9curit\u00e9 digitale, Thomas Chasles accompagne depuis plus de 5 ans chez Capgemini les clients industriels (automobile, ferroviaire, a\u00e9ronautique, \u00e9nergie, etc.) pour adapter et int\u00e9grer la cybers\u00e9curit\u00e9 dans leurs produits et infrastructures.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Curseur pr\u00e9c\u00e9dent\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Curseur suivant\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019essor des objets connect\u00e9s ouvre d\u2019immenses possibilit\u00e9s. Mais toutes ces connexions sont autant de portes ouvertes sur l\u2019ext\u00e9rieur qu&#8217;il faut prot\u00e9ger.<\/p>\n","protected":false},"author":251,"featured_media":714310,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"ee15824e-a3cc-4706-b9c3-4124384e5039\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"eace5fcc-cda8-4f35-ab45-33cb3bc9eea6\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[5],"tags":[192],"brand":[],"service":[47],"industry":[25],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-714301","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technologies","tag-cybersecurite","service-cybersecurite","industry-automobile","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0? - Capgemini France<\/title>\n<meta name=\"description\" content=\"L\u2019essor des objets connect\u00e9s ouvre d\u2019immenses possibilit\u00e9s. Mais toutes ces connexions sont autant de portes ouvertes sur l\u2019ext\u00e9rieur qu&#039;il faut prot\u00e9ger.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0?\" \/>\n<meta property=\"og:description\" content=\"L\u2019essor des objets connect\u00e9s ouvre d\u2019immenses possibilit\u00e9s. Mais toutes ces connexions sont autant de portes ouvertes sur l\u2019ext\u00e9rieur qu&#039;il faut prot\u00e9ger.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-23T15:44:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T06:10:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-WP.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1312\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0?\",\"datePublished\":\"2023-03-23T15:44:26+00:00\",\"dateModified\":\"2025-03-04T06:10:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/\"},\"wordCount\":1154,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Technologies\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/\",\"name\":\"Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0? - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg\",\"datePublished\":\"2023-03-23T15:44:26+00:00\",\"dateModified\":\"2025-03-04T06:10:25+00:00\",\"description\":\"L\u2019essor des objets connect\u00e9s ouvre d\u2019immenses possibilit\u00e9s. Mais toutes ces connexions sont autant de portes ouvertes sur l\u2019ext\u00e9rieur qu'il faut prot\u00e9ger.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg\",\"width\":3840,\"height\":2160,\"caption\":\"The car is parked at an electric charging station. Parking for electric vehicles. 3d rendering.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0? - Capgemini France","description":"L\u2019essor des objets connect\u00e9s ouvre d\u2019immenses possibilit\u00e9s. Mais toutes ces connexions sont autant de portes ouvertes sur l\u2019ext\u00e9rieur qu'il faut prot\u00e9ger.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/","og_locale":"fr_FR","og_type":"article","og_title":"Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0?","og_description":"L\u2019essor des objets connect\u00e9s ouvre d\u2019immenses possibilit\u00e9s. Mais toutes ces connexions sont autant de portes ouvertes sur l\u2019ext\u00e9rieur qu'il faut prot\u00e9ger.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/","og_site_name":"Capgemini France","article_published_time":"2023-03-23T15:44:26+00:00","article_modified_time":"2025-03-04T06:10:25+00:00","og_image":[{"width":2500,"height":1312,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-WP.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/"},"author":{"name":"","@id":""},"headline":"Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0?","datePublished":"2023-03-23T15:44:26+00:00","dateModified":"2025-03-04T06:10:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/"},"wordCount":1154,"commentCount":0,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Technologies"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/","name":"Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0? - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg","datePublished":"2023-03-23T15:44:26+00:00","dateModified":"2025-03-04T06:10:25+00:00","description":"L\u2019essor des objets connect\u00e9s ouvre d\u2019immenses possibilit\u00e9s. Mais toutes ces connexions sont autant de portes ouvertes sur l\u2019ext\u00e9rieur qu'il faut prot\u00e9ger.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg","width":3840,"height":2160,"caption":"The car is parked at an electric charging station. Parking for electric vehicles. 3d rendering."},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":5,"name":"Technologies","slug":"technologies"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"industry":[{"id":25,"name":"Automobile","slug":"automobile"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0?","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg"},"articleSection":"Technologies","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2023-03-23T15:44:26Z","datePublished":"2023-03-23T15:44:26Z","dateModified":"2025-03-04T06:10:25Z"},"rendered":"<meta name=\"parsely-title\" content=\"Quelle cybers\u00e9curit\u00e9 pour les v\u00e9hicules connect\u00e9s\u00a0?\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-vehicules-connectes\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2023-03-23T15:44:26Z\" \/>\n<meta name=\"parsely-section\" content=\"Technologies\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":751843,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-supply-chain-composants-connectes\/","url_meta":{"origin":714301,"position":0},"title":"Supply chain\u00a0: quelle cybers\u00e9curit\u00e9 pour les composants connect\u00e9s\u00a0?","author":"quentinkieken","date":"April 29, 2024","format":false,"excerpt":"Entre les soup\u00e7ons pesant sur la s\u00e9curit\u00e9 des \u00e9quipements 5G produits hors de l\u2019Union Europ\u00e9enne et le piratage spectaculaire de v\u00e9hicules autonomes, de nombreuses affaires ont attir\u00e9 ces derni\u00e8res ann\u00e9es l\u2019attention sur la vuln\u00e9rabilit\u00e9 des objets connect\u00e9s.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":718569,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/mobilite-connectee-de-confiance\/","url_meta":{"origin":714301,"position":1},"title":"Pour une mobilit\u00e9 connect\u00e9e de confiance","author":"","date":"June 5, 2023","format":false,"excerpt":"La multiplication des applications mobiles et des syst\u00e8mes embarqu\u00e9s connect\u00e9s, associ\u00e9e au d\u00e9veloppement des communications performantes gr\u00e2ce \u00e0 la 5G, offrent des opportunit\u00e9s sans pr\u00e9c\u00e9dent de nouveaux services num\u00e9riques. Ces opportunit\u00e9s sont rendues possibles par la convergence de moyens techniques multiples.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":711704,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/introduction-a-la-securite-de-l-intelligent-industry\/","url_meta":{"origin":714301,"position":2},"title":"Une introduction \u00e0 la s\u00e9curit\u00e9 de &#8220;l\u2019Intelligent Industry&#8221;","author":"","date":"February 27, 2023","format":false,"excerpt":"Depuis son apparition dans les ann\u00e9es 70, la cybers\u00e9curit\u00e9 s'est d\u00e9velopp\u00e9e en r\u00e9ponse au d\u00e9veloppement technologique, pour devenir une industrie de 345,4 milliards de dollars \u00e0 horizon 2026.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/GettyImages-169270562.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/GettyImages-169270562.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/GettyImages-169270562.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/GettyImages-169270562.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":721330,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/tests-dintrusion-au-coeur-de-demarche-damelioration-continue-pour-la-cybersecurite\/","url_meta":{"origin":714301,"position":3},"title":"Les tests d\u2019intrusion au c\u0153ur de la d\u00e9marche d\u2019am\u00e9lioration continue pour la cybers\u00e9curit\u00e9","author":"","date":"June 12, 2023","format":false,"excerpt":"Dans un monde connect\u00e9 et num\u00e9rique en pleine expansion, les cyberattaques repr\u00e9sentent une menace r\u00e9elle et prot\u00e9iforme pour les entreprises. Les pirates informatiques sont constamment \u00e0 l'aff\u00fbt des vuln\u00e9rabilit\u00e9s pour acc\u00e9der aux donn\u00e9es sensibles et causer des dommages parfois irr\u00e9versibles.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":765266,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/software-automobile\/","url_meta":{"origin":714301,"position":4},"title":"Automobile\u00a0: les logiciels au c\u0153ur de la cr\u00e9ation de valeur","author":"quentinkieken","date":"October 9, 2024","format":false,"excerpt":"Le logiciel occupe d\u00e9sormais une place centrale dans l'automobile, de la conception \u00e0 l'utilisation du v\u00e9hicule. Pour un secteur historiquement bas\u00e9 sur l'ing\u00e9nierie m\u00e9canique, cette r\u00e9volution impacte l'organisation des constructeurs et tout leur \u00e9cosyst\u00e8me : \u00e9quipementiers, partenaires et clients.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/08\/Software-offer-launch-DotCom_Banner_2880X1800.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/08\/Software-offer-launch-DotCom_Banner_2880X1800.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/08\/Software-offer-launch-DotCom_Banner_2880X1800.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/08\/Software-offer-launch-DotCom_Banner_2880X1800.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":696052,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cyber4good-philosophie-cybersecurite\/","url_meta":{"origin":714301,"position":5},"title":"Cyber4Good, une nouvelle philosophie pour la cybers\u00e9curit\u00e9","author":"","date":"October 2, 2022","format":false,"excerpt":"Les enjeux autour de la s\u00e9curit\u00e9 du cyberespace ne sont plus \u00e0 d\u00e9montrer, la France est ainsi le 4\u00e8me pays au monde le plus touch\u00e9 par des attaques par ransomware. La cybers\u00e9curit\u00e9 est vitale.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-496737104.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-496737104.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-496737104.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-496737104.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/2023-FR-Blog-Cybersecurite-et-connected-car-Image.jpg","author_title":"Thomas Chasles","author_thumbnail_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Thomas-Chasles.jpg?w=960","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/714301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/251"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=714301"}],"version-history":[{"count":12,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/714301\/revisions"}],"predecessor-version":[{"id":776650,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/714301\/revisions\/776650"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/714310"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=714301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=714301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=714301"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=714301"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=714301"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=714301"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=714301"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=714301"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=714301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}