{"id":730671,"date":"2023-10-03T17:22:59","date_gmt":"2023-10-03T15:22:59","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=730671"},"modified":"2025-03-04T06:56:50","modified_gmt":"2025-03-04T05:56:50","slug":"quels-cyber-risques-dans-le-metaverse","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/","title":{"rendered":"Quels cyber risques dans le Metaverse\u00a0?"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Quels cyber risques dans le Metaverse\u00a0?<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"\/wp-content\/themes\/capgemini2020\/assets\/images\/cg-logo.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Luca Bordonaro &amp; In\u00e8s Tiyal<\/h5><h5 class=\"blog-date\">6 octobre 2023<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Soutenu par une combinaison de technologies telles que la r\u00e9alit\u00e9 virtuelle (VR), la r\u00e9alit\u00e9 augment\u00e9e (AR) et\/ou le Web 3.0, le Metaverse est un environnement immersif dans lequel le r\u00e9el rencontre le virtuel.<\/h2><p class=\"intro-para-content\">Le Metaverse constitue ainsi une belle opportunit\u00e9 pour les entreprises de r\u00e9volutionner leurs exp\u00e9riences client, leurs exp\u00e9riences employ\u00e9s ou encore leurs productions industrielles.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-extension-de-la-surface-d-attaque-potentielle\">Extension de la surface d\u2019attaque potentielle<\/h2>\n\n\n\n<p>L\u2019utilisation grandissante de ces plateformes, comme toute transition technologique, demande la r\u00e9plication des r\u00e9flexes de cybers\u00e9curit\u00e9 des entreprises sur cette nouvelle surface d\u2019attaque potentielle. Les risques cyber pr\u00e9existants au Metaverse tels que les fuites de donn\u00e9es ou d\u00e9nis de service, demeurent en effet avec celui-ci.<\/p>\n\n\n\n<p>Avec chaque \u00e9volution technologique apparaissent des enjeux propres et certains risques cyber sp\u00e9cifiquement pr\u00e9gnants dans le Metaverse, du fait de la particularit\u00e9 des cas d\u2019usage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Risques d\u2019acc\u00e8s ill\u00e9gitime aux actifs de l\u2019entreprise<\/h2>\n\n\n\n<p>Le Metaverse \u00e9tant une technologie connect\u00e9e, il constitue une porte d\u2019entr\u00e9e vers le SI des entreprises et leurs donn\u00e9es.<\/p>\n\n\n\n<p>Les plateformes d\u2019entreprise visant \u00e0 am\u00e9liorer l\u2019exp\u00e9rience employ\u00e9 en sont un bon exemple. Pour les entreprises, le Metaverse peut renforcer l&#8217;engagement des collaborateurs : les ateliers anim\u00e9s dans ces espaces immersifs leur permettent d\u2019interagir via des avatars, procurant un sentiment d\u2019immersion. De la m\u00eame fa\u00e7on, les collaborateurs peuvent y monter rapidement en comp\u00e9tences, gr\u00e2ce \u00e0 des simulations r\u00e9alistes et des exercices interactifs.<\/p>\n\n\n\n<p>L\u2019acc\u00e8s \u00e0 ces plateformes par des employ\u00e9s n\u00e9cessite l\u2019utilisation de leurs identit\u00e9s, associ\u00e9es \u00e0 d\u2019autres niveaux de privil\u00e8ges sur le reste du SI de l\u2019entreprise. Le risque d\u2019usurpation de leurs identit\u00e9s fait alors du Metaverse un point faible d\u2019introduction au syst\u00e8me, puis de gain en privil\u00e8ge jusqu\u2019\u00e0 potentiellement l\u2019acc\u00e8s \u00e0 des donn\u00e9es sensibles.<\/p>\n\n\n\n<p>En particulier, les plateformes industrielles concentrent directement certaines de ces donn\u00e9es sensibles. Dans le domaine de la fabrication, le Metaverse r\u00e9volutionne les processus en permettant la conception virtuelle de produits dont les jumeaux num\u00e9riques, r\u00e9duisant ainsi les co\u00fbts de prototypage et permettant de simuler le comportement du produit. Dans le domaine de la production, des lignes de production enti\u00e8res peuvent \u00eatre con\u00e7ues digitalement et param\u00e9tr\u00e9es \u00e0 distance pour faciliter la surveillance des op\u00e9rations. Par cons\u00e9quent, la s\u00e9curit\u00e9 de ces actifs est cruciale pour \u00e9viter le vol ou la contrefa\u00e7on. Par exemple, un brevet pourrait \u00eatre copi\u00e9 et vendu ill\u00e9galement dans d&#8217;autres environnements virtuels, entra\u00eenant une perte de valeur pour l&#8217;entreprise cr\u00e9atrice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Risques d\u2019atteinte \u00e0 la r\u00e9putation de l\u2019entreprise expos\u00e9e<\/h2>\n\n\n\n<p>Gr\u00e2ce au Metaverse, les entreprises peuvent d\u00e9sormais cr\u00e9er des environnements virtuels captivants qui transforment l&#8217;exp\u00e9rience client. Des showrooms virtuels s\u2019appuyant sur la r\u00e9alit\u00e9 virtuelle permettent aux clients d\u2019explorer et d\u2019interagir avec les produits de mani\u00e8re r\u00e9aliste, tandis que des essais virtuels s\u2019appuyant sur la r\u00e9alit\u00e9 augment\u00e9e leur permettent de visualiser les produits dans leur propre environnement. Les \u00e9v\u00e9nements virtuels offrent \u00e9galement une opportunit\u00e9 de se connecter avec un public international, \u00e9liminant les contraintes g\u00e9ographiques.<\/p>\n\n\n\n<p>N\u00e9anmoins, plus l\u2019exposition est forte, plus des individus ou organisations malveillants pourraient \u00eatre tent\u00e9s de prendre l\u2019\u00e9v\u00e9nement comme cible. Une attaque par d\u00e9figuration, c\u2019est-\u00e0-dire la modification non autoris\u00e9e de l&#8217;apparence visuelle ou de l&#8217;interface d&#8217;une zone dans le Metaverse, peut \u00eatre utilis\u00e9e pour sabotage ou diffusion de messages. Par exemple, si une maison de luxe organise un d\u00e9fil\u00e9 priv\u00e9 dans le Metaverse, des hacktivistes pourraient r\u00e9aliser une action de d\u00e9facement pour d\u00e9noncer certaines de ses pratiques (inaction \u00e9cologique, proc\u00e9d\u00e9s de fabrication\u2026), entra\u00eenant un impact r\u00e9putationnel consid\u00e9rable se traduisant par des pertes financi\u00e8res pour la marque.<\/p>\n\n\n\n<p>Les cyberattaques via ces plateformes particuli\u00e8rement expos\u00e9es peuvent fortement impacter la confiance des clients et partenaires commerciaux.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Gestion des identit\u00e9s et des acc\u00e8s<\/h2>\n\n\n\n<p>Quels que soient les cas d\u2019usage du Metaverse pour une entreprise, les pr\u00e9requis en mati\u00e8re de cybers\u00e9curit\u00e9 restent les m\u00eames. Une posture cyber renforc\u00e9e, c\u2019est-\u00e0-dire l\u2019atteinte d\u2019un bon niveau de maturit\u00e9 et des capacit\u00e9s en mati\u00e8re d\u2019identification, protection, d\u00e9tection, r\u00e9ponse et r\u00e9tablissement, assure un cadre solide pour l\u2019utilisation Metaverse.<\/p>\n\n\n\n<p>En particulier, la gestion des identit\u00e9s et des acc\u00e8s est \u00e0 consid\u00e9rer avec attention. Les propri\u00e9t\u00e9s immersives du Metaverse requi\u00e8rent un renforcement de la gestion des identit\u00e9s par les entreprises afin d\u2019assurer la continuit\u00e9 de leur politique dans le Metaverse. Afin de garantir la protection des actifs expos\u00e9s dans le Metaverse, les entreprises doivent appliquer le principe de moindre privil\u00e8ge, voire les principes de<a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-cybersecurite\/\"> Zero Trust<\/a>, si ce virage strat\u00e9gique a \u00e9t\u00e9 adopt\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">R\u00e9silience et transparence<\/h2>\n\n\n\n<p>Les entreprises doivent porter une attention particuli\u00e8re \u00e0 leur r\u00e9putation num\u00e9rique et plus largement \u00e0 la confiance qu\u2019elles inspirent \u00e0 leurs clients. Cela passe notamment par des infrastructures r\u00e9silientes test\u00e9es r\u00e9guli\u00e8rement et \u00e0 une totale transparence vis-\u00e0-vis de la gestion et s\u00e9curit\u00e9 des donn\u00e9es et actifs.<\/p>\n\n\n\n<p>Enfin, l\u2019entreprise doit appliquer son cadre de gestion du risque li\u00e9 aux prestataires tiers lors de la s\u00e9lection et tout au long de l\u2019utilisation d\u2019une plateforme Metaverse.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Auteurs : <\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/Design-sans-titre.png\" alt=\"Luca Bordonaro\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucabordonaro\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Luca Bordonaro<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Consultant Cybers\u00e9curit\u00e9, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucabordonaro\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Luca est consultant chez Capgemini Invent au sein de l\u2019offre Digital Trust &#038; Security et travaille plus particuli\u00e8rement sur des sujets strat\u00e9giques m\u00ealant cybers\u00e9curit\u00e9 et nouvelles technologies.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/Design-sans-titre-1.png\" alt=\"In\u00e8s Tiyal\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/ines-tiyal-b63a92147\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">In\u00e8s Tiyal<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Consultante Business Technology, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/ines-tiyal-b63a92147\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Consultante chez Capgemini Invent au sein de l&#8217;offre Web3, In\u00e8s s&#8217;int\u00e9resse particuli\u00e8rement \u00e0 la finance d\u00e9centralis\u00e9e (DeFi) et au m\u00e9tavers, et explore les nombreuses applications business de ces technologies disruptives.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Curseur pr\u00e9c\u00e9dent\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Curseur suivant\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Soutenu par une combinaison de technologies telles que la r\u00e9alit\u00e9 virtuelle (VR), la r\u00e9alit\u00e9 augment\u00e9e (AR) et\/ou le Web 3.0, le Metaverse est un environnement immersif dans lequel le r\u00e9el rencontre le virtuel.<\/p>\n","protected":false},"author":201,"featured_media":731071,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"26f3c2a3-8933-4da4-9c18-1a7ccb2cd381\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"e51ad222-3353-44c7-9b31-1b0f4f62c1c8\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[3],"tags":[192],"brand":[],"service":[47],"industry":[],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-730671","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","tag-cybersecurite","service-cybersecurite","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quels cyber risques dans le Metaverse\u00a0? - Capgemini France<\/title>\n<meta name=\"description\" content=\"Soutenu par une combinaison de technologies telles que la r\u00e9alit\u00e9 virtuelle (VR), la r\u00e9alit\u00e9 augment\u00e9e (AR) et\/ou le Web 3.0, le Metaverse est un environnement immersif dans lequel le r\u00e9el rencontre le virtuel.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quels cyber risques dans le Metaverse\u00a0?\" \/>\n<meta property=\"og:description\" content=\"Soutenu par une combinaison de technologies telles que la r\u00e9alit\u00e9 virtuelle (VR), la r\u00e9alit\u00e9 augment\u00e9e (AR) et\/ou le Web 3.0, le Metaverse est un environnement immersif dans lequel le r\u00e9el rencontre le virtuel.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-03T15:22:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T05:56:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/Metaverse-cyber.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Quels cyber risques dans le Metaverse\u00a0?\",\"datePublished\":\"2023-10-03T15:22:59+00:00\",\"dateModified\":\"2025-03-04T05:56:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/\"},\"wordCount\":959,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Innovation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/\",\"name\":\"Quels cyber risques dans le Metaverse\u00a0? - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg\",\"datePublished\":\"2023-10-03T15:22:59+00:00\",\"dateModified\":\"2025-03-04T05:56:50+00:00\",\"description\":\"Soutenu par une combinaison de technologies telles que la r\u00e9alit\u00e9 virtuelle (VR), la r\u00e9alit\u00e9 augment\u00e9e (AR) et\/ou le Web 3.0, le Metaverse est un environnement immersif dans lequel le r\u00e9el rencontre le virtuel.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg\",\"width\":8192,\"height\":5464,\"caption\":\"Young woman wearing virtual reality headset by a male colleague using digital tablet. Startup business colleagues testing out virtual reality glasses in the office.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quels cyber risques dans le Metaverse\u00a0? - Capgemini France","description":"Soutenu par une combinaison de technologies telles que la r\u00e9alit\u00e9 virtuelle (VR), la r\u00e9alit\u00e9 augment\u00e9e (AR) et\/ou le Web 3.0, le Metaverse est un environnement immersif dans lequel le r\u00e9el rencontre le virtuel.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/","og_locale":"fr_FR","og_type":"article","og_title":"Quels cyber risques dans le Metaverse\u00a0?","og_description":"Soutenu par une combinaison de technologies telles que la r\u00e9alit\u00e9 virtuelle (VR), la r\u00e9alit\u00e9 augment\u00e9e (AR) et\/ou le Web 3.0, le Metaverse est un environnement immersif dans lequel le r\u00e9el rencontre le virtuel.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/","og_site_name":"Capgemini France","article_published_time":"2023-10-03T15:22:59+00:00","article_modified_time":"2025-03-04T05:56:50+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/Metaverse-cyber.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/"},"author":{"name":"","@id":""},"headline":"Quels cyber risques dans le Metaverse\u00a0?","datePublished":"2023-10-03T15:22:59+00:00","dateModified":"2025-03-04T05:56:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/"},"wordCount":959,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Innovation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/","name":"Quels cyber risques dans le Metaverse\u00a0? - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg","datePublished":"2023-10-03T15:22:59+00:00","dateModified":"2025-03-04T05:56:50+00:00","description":"Soutenu par une combinaison de technologies telles que la r\u00e9alit\u00e9 virtuelle (VR), la r\u00e9alit\u00e9 augment\u00e9e (AR) et\/ou le Web 3.0, le Metaverse est un environnement immersif dans lequel le r\u00e9el rencontre le virtuel.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg","width":8192,"height":5464,"caption":"Young woman wearing virtual reality headset by a male colleague using digital tablet. Startup business colleagues testing out virtual reality glasses in the office."},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":3,"name":"Innovation","slug":"innovation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Quels cyber risques dans le Metaverse\u00a0?","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg"},"articleSection":"Innovation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2023-10-03T15:22:59Z","datePublished":"2023-10-03T15:22:59Z","dateModified":"2025-03-04T05:56:50Z"},"rendered":"<meta name=\"parsely-title\" content=\"Quels cyber risques dans le Metaverse\u00a0?\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2023-10-03T15:22:59Z\" \/>\n<meta name=\"parsely-section\" content=\"Innovation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":721590,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cyberresilience-securiser-secteur-aeronautique\/","url_meta":{"origin":730671,"position":0},"title":"Comment la cyber-r\u00e9silience peut-elle s\u00e9curiser le secteur a\u00e9ronautique\u00a0?","author":"","date":"June 13, 2023","format":false,"excerpt":"Ecosyst\u00e8me complexe et compos\u00e9 de multiples acteurs, lesquels ont tous pour objectif l\u2019acheminement de passagers ou de marchandises par la voie a\u00e9rienne, le transport a\u00e9rien s\u2019est construit au fil des d\u00e9cennies sur une solide culture de s\u00e9curit\u00e9.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1340061921.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1340061921.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1340061921.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1340061921.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":791247,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/","url_meta":{"origin":730671,"position":1},"title":"Renforcer la r\u00e9silience des entreprises : strat\u00e9gies cl\u00e9s pour les environnements industriels","author":"Tarek Edde Gomez","date":"September 24, 2025","format":false,"excerpt":"Dans un monde industriel hyperconnect\u00e9, les entreprises sont de plus en plus vuln\u00e9rables aux perturbations g\u00e9opolitiques et \u00e9conomiques, rendant la r\u00e9silience de leur \u00e9cosyst\u00e8me strat\u00e9gique.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":751843,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-supply-chain-composants-connectes\/","url_meta":{"origin":730671,"position":2},"title":"Supply chain\u00a0: quelle cybers\u00e9curit\u00e9 pour les composants connect\u00e9s\u00a0?","author":"quentinkieken","date":"April 29, 2024","format":false,"excerpt":"Entre les soup\u00e7ons pesant sur la s\u00e9curit\u00e9 des \u00e9quipements 5G produits hors de l\u2019Union Europ\u00e9enne et le piratage spectaculaire de v\u00e9hicules autonomes, de nombreuses affaires ont attir\u00e9 ces derni\u00e8res ann\u00e9es l\u2019attention sur la vuln\u00e9rabilit\u00e9 des objets connect\u00e9s.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":731732,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/intelligence-artificielle-alliee-puissante-pour-cyber-defense-center\/","url_meta":{"origin":730671,"position":3},"title":"L\u2019intelligence artificielle, une alli\u00e9e puissante pour le Cyber Defense Center","author":"","date":"October 18, 2023","format":false,"excerpt":"L\u2019enjeu d\u2019un Cyber Defense Center (CDC) est d\u2019anticiper et d\u2019identifier au plus t\u00f4t ce qui est important \u2013 attaques, pr\u00e9mices d\u2019attaques ou menaces potentielles \u2013 parmi le bruit \u00e9mis par toutes les alertes, av\u00e9r\u00e9es ou non, et parmi toutes les informations disponibles. Or, aujourd\u2019hui, s\u2019il y a davantage d\u2019attaques, il\u2026","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":742555,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/","url_meta":{"origin":730671,"position":4},"title":"DORA ou l&#8217;approche fond\u00e9e sur les risques","author":"quentinkieken","date":"February 12, 2024","format":false,"excerpt":"En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":715927,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/renforcer-cybersecurite-industrielle\/","url_meta":{"origin":730671,"position":5},"title":"Renforcer la cybers\u00e9curit\u00e9 industrielle","author":"cyrille.joseph-lockel@capgemini.com","date":"May 15, 2025","format":false,"excerpt":"Depuis plusieurs ann\u00e9es, les syst\u00e8mes industriels sont vis\u00e9s par des attaques qui rentrent dans deux cadres principaux","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/2023-FR-Hero-banner-Blog-Renforcer-Securite-Industrielle.jpg.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/2023-FR-Hero-banner-Blog-Renforcer-Securite-Industrielle.jpg.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/2023-FR-Hero-banner-Blog-Renforcer-Securite-Industrielle.jpg.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/2023-FR-Hero-banner-Blog-Renforcer-Securite-Industrielle.jpg.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg","author_title":"Capgemini","author_thumbnail_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/cg-logo-blue.svg?w=960","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/730671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/201"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=730671"}],"version-history":[{"count":5,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/730671\/revisions"}],"predecessor-version":[{"id":776604,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/730671\/revisions\/776604"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/731071"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=730671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=730671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=730671"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=730671"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=730671"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=730671"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=730671"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=730671"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=730671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}