{"id":733969,"date":"2023-10-26T12:02:32","date_gmt":"2023-10-26T10:02:32","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=733969"},"modified":"2025-03-04T06:55:26","modified_gmt":"2025-03-04T05:55:26","slug":"les-promesses-de-lintelligence-artificielle-generative-pour-la-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/","title":{"rendered":"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"\/wp-content\/themes\/capgemini2020\/assets\/images\/cg-logo.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Luca Bordonaro &amp; Christophe Menant <\/h5><h5 class=\"blog-date\">26 octobre 2023<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/&amp;text=Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/&amp;text=Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">L\u2019intelligence artificielle g\u00e9n\u00e9rative\u00a0(IAG) est une cat\u00e9gorie particuli\u00e8re de mod\u00e8les d\u2019intelligence artificielle (IA) qui r\u00e9pond \u00e0 une interrogation (<em>prompt<\/em>) par un contenu original,\u00a0un texte, une image, un code, etc.<\/h2><p class=\"intro-para-content\">Si l\u2019IA usuelle augmente les capacit\u00e9s humaines et acc\u00e9l\u00e8re l\u2019ex\u00e9cution, l\u2019IAG ajoute donc la cr\u00e9ativit\u00e9 d\u2019une r\u00e9ponse imm\u00e9diatement exploitable.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-l-iag-un-outil-mobilisable-a-chaque-etape-d-un-incident-de-cybersecurite\">L\u2019IAG, un outil mobilisable \u00e0 chaque \u00e9tape d\u2019un incident de cybers\u00e9curit\u00e9<\/h2>\n\n\n\n<p>Pour d\u00e9terminer ce que l\u2019IAG peut potentiellement apporter \u00e0 un domaine d\u2019activit\u00e9, il faut se poser diverses questions&nbsp;: dans quelles circonstances on est amen\u00e9 \u00e0 cr\u00e9er du contenu, si une IAG pourrait s\u2019en charger, ce qu\u2019il faudrait mettre en place pour qu\u2019elle puisse le faire efficacement, et, enfin, si cela en vaudrait la peine.<\/p>\n\n\n\n<p>Dans le domaine de la cybers\u00e9curit\u00e9, en l\u2019occurrence, il existe de nombreuses occasions dans lesquelles on produit, ou pourrait produire, du contenu&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><em>En amont<\/em><\/strong>&nbsp;: entre la d\u00e9finition des politiques de s\u00e9curit\u00e9, les audits les analyses de risques, ou les analyses des menaces, la cybers\u00e9curit\u00e9 engendre des quantit\u00e9s de documents, de rapports, de guides, sur lesquels elle fonde ses pratiques.<\/li>\n\n\n\n<li><strong><em>Au fil de l\u2019eau<\/em><\/strong>&nbsp;: au moment o\u00f9 l\u2019on d\u00e9tecte un incident, il est capital de fournir \u00e0 tous les acteurs concern\u00e9s une information \u00e0 la fois claire, circonstanci\u00e9e et contextualis\u00e9e pour qu\u2019ils puissent prendre au plus vite la meilleure d\u00e9cision et ex\u00e9cuter les actions de rem\u00e9diation adapt\u00e9es pour \u00e9viter ou minimiser l\u2019impact sur l\u2019organisation.<\/li>\n\n\n\n<li><strong><em>En aval<\/em><\/strong>&nbsp;: suite aux incidents, on cherche \u00e0 les analyser, \u00e0 les comprendre, et \u00e0 en tirer des r\u00e8gles, des mesures ou des corrections pour qu\u2019ils ne se reproduisent pas.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">L&#8217;IAG pour la cybers\u00e9curit\u00e9, une d\u00e9marche qui offre de nombreux b\u00e9n\u00e9fices<\/h2>\n\n\n\n<p>Par ses exceptionnelles capacit\u00e9s d\u2019analyse, de synth\u00e8se et de production d\u2019un contenu ad hoc de qualit\u00e9 professionnelle (texte, graphiques, code\u2026), l\u2019IAG pourrait \u00eatre d\u2019une grande aide \u00e0 chacune des \u00e9tapes \u00e9voqu\u00e9es pr\u00e9c\u00e9demment.<\/p>\n\n\n\n<p>En amont, parce que les contenus produits sont en grande partie standard (les politiques de s\u00e9curit\u00e9, les rapports d\u2019audits) et qu\u2019ils se fondent sur des informations stables et comparables (l\u2019organisation de l\u2019entreprise, ses r\u00e8gles, ses standards de r\u00e9f\u00e9rence, ses processus, ses syst\u00e8mes\u2026).<\/p>\n\n\n\n<p>En anticipation et en r\u00e9ponse aux incidents, parce que l\u2019IAG peut aller extr\u00eamement vite pour en d\u00e9chiffrer les causes et les cons\u00e9quences possibles, et les pr\u00e9senter de fa\u00e7on digeste, ainsi que de g\u00e9n\u00e9rer les commandes \u00e0 ex\u00e9cuter imm\u00e9diatement pour \u00e9radiquer la menace ou contenir l\u2019attaque.<\/p>\n\n\n\n<p>En aval, parce que l\u2019on manque de ressources expertes pour analyser les incidents et cr\u00e9er ensuite les r\u00e8gles, les configurations et les scripts de s\u00e9curit\u00e9 appropri\u00e9s permettant l\u2019automatisation de prochaines r\u00e9ponses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les freins op\u00e9rationnels \u00e0 prendre en compte<\/h2>\n\n\n\n<p>De fa\u00e7on g\u00e9n\u00e9rale, l\u2019IAG pourrait, on l\u2019a vu, apporter \u00e0 tous les m\u00e9tiers de la cybers\u00e9curit\u00e9 d\u2019importants gains de productivit\u00e9, de r\u00e9activit\u00e9 et de qualit\u00e9. Pour que ces s\u00e9duisantes promesses se concr\u00e9tisent, il faudra cependant \u00eatre attentif \u00e0 trois aspects cl\u00e9s&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><em>Les donn\u00e9es<\/em><\/strong>&nbsp;: les mod\u00e8les d\u2019IAG ont besoin de gigantesques quantit\u00e9s de donn\u00e9es (et de tr\u00e8s grosses capacit\u00e9s de calcul) pour s\u2019entra\u00eener et \u00eatre capables de formuler une r\u00e9ponse pertinente. Pourra-t-on r\u00e9unir de tels volumes, d\u2019une qualit\u00e9 et d\u2019une fra\u00eecheur suffisantes, satisfaisant en outre \u00e0 toutes les r\u00e8gles de confidentialit\u00e9 des donn\u00e9es appartenant \u00e0 diff\u00e9rentes organisations de conformit\u00e9 voire de souverainet\u00e9 ? Ce sera d\u2019autant moins \u00e9vident qu\u2019en mati\u00e8re de cybers\u00e9curit\u00e9, les choses \u00e9voluent tr\u00e8s vite, et qu\u2019il faudra donc pouvoir constamment injecter et prendre en compte des \u00e9l\u00e9ments nouveaux. A ce besoin important d\u2019ingestion de donn\u00e9es, il faut \u00e9galement lui opposer les consid\u00e9rations d\u2019impact sur l\u2019environnement et l\u2019empreinte carbone associ\u00e9e au stockage et traitement des donn\u00e9es.&nbsp; &nbsp;<\/li>\n\n\n\n<li><strong><em>Les prompts<\/em><\/strong>&nbsp;: on le voit dans le cadre des LLM (Large Langage Model) comme GPT sur lequel est bas\u00e9 ChatGPT, la r\u00e9ponse sera d\u2019autant plus pertinente que la question sera bien pos\u00e9e. Pour tirer le maximum des opportunit\u00e9s promises par l\u2019IAG, il va donc falloir former de nouveaux sp\u00e9cialistes au \u00ab&nbsp;prompt engineering&nbsp;\u00bb, capables de d\u00e9finir les flux optimaux pour s\u2019interfacer avec cette nouvelle capacit\u00e9, l\u2019interroger et l\u2019entra\u00eener.<\/li>\n\n\n\n<li><strong><em>La validation<\/em><\/strong>&nbsp;: de fa\u00e7on g\u00e9n\u00e9rale, et plus encore dans un domaine aussi sensible que la cybers\u00e9curit\u00e9, on ne peut laisser l\u2019IA libre de tout contr\u00f4le. Il faudra par cons\u00e9quent maintenir une validation humaine des contenus produits par l\u2019IAG. Pour ne pas perdre le b\u00e9n\u00e9fice de l\u2019IA, on peut toutefois imaginer d\u2019automatiser certaines v\u00e9rifications, ou d\u2019accepter d\u2019embl\u00e9e les r\u00e9sultats sur les cas les plus classiques. \u00c0 mesure que l\u2019IAG aura fait ses preuves et que la confiance augmentera, les proc\u00e9dures s\u2019all\u00e8geront et les experts pourront se concentrer sur les cas les plus d\u00e9licats ou \u00e0 plus forte valeur ajout\u00e9e.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Utiliser l\u2019IAG \u00e0 tout prix ?<\/h2>\n\n\n\n<p>Pour autant que l\u2019on soit en mesure de surmonter les divers freins op\u00e9rationnels \u00e9voqu\u00e9s plus haut, il n\u2019est pas encore certain que tout ce qui est possible en th\u00e9orie soit souhaitable en pratique.<\/p>\n\n\n\n<p>D\u00e9velopper une solution d\u2019IAG, l\u2019impl\u00e9menter, la r\u00e9gler, r\u00e9aliser les changements humains et organisationnels autour de ce nouvel outil\u2026 tout cela aura un co\u00fbt. En vaudra-t-il la peine&nbsp;?<\/p>\n\n\n\n<p>Il appartiendra aux entreprises d\u2019arbitrer entre les ind\u00e9niables b\u00e9n\u00e9fices d\u2019une telle solution en termes de s\u00e9curit\u00e9 et de productivit\u00e9, et ses co\u00fbts de mise en \u0153uvre. Il est possible que tous les cas d\u2019usage potentiels de l\u2019IAG dans le domaine de la cybers\u00e9curit\u00e9 ne soient pas viables et que l\u2019on r\u00e9serve ses formidables capacit\u00e9s \u00e0 quelques besoins pr\u00e9cis o\u00f9 son apport sera v\u00e9ritablement d\u00e9cisif.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">L\u2019IAG, un outil pour les hackers, aussi !<\/h2>\n\n\n\n<p>Si elle repr\u00e9sente un atout ind\u00e9niable pour la cybers\u00e9curit\u00e9, l\u2019IAG peut \u00e9galement \u00eatre utilis\u00e9e par un public moins bien intentionn\u00e9. Command\u00e9 par Darktrace, un <a href=\"https:\/\/gwern.net\/doc\/cs\/security\/2023-darktrace.pdf\">sondage<\/a> men\u00e9 par Censuswide aupr\u00e8s de 6 711 employ\u00e9s des \u00c9tats-Unis, d&#8217;Europe et d&#8217;Australie en mars 2023 a r\u00e9v\u00e9l\u00e9 qu&#8217;environ 70 % des personnes interrog\u00e9es ont d\u00e9clar\u00e9 avoir remarqu\u00e9 une augmentation de la fr\u00e9quence des courriels et des textos frauduleux au cours des six derniers mois et dont certains pr\u00e9sentaient les signes (grammaire, syntaxe, etc.) d\u2019une \u00e9ventuelle intervention de l\u2019IA dans la r\u00e9alisation de ces attaques.<\/p>\n\n\n\n<p>En effet, l\u2019IAG offre aux cybercriminels de nouvelles possibilit\u00e9s \u00e0 travers 2 axes principaux&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><em>L\u2019industrialisation d\u2019attaques<\/em><\/strong>&nbsp;: l\u2019IAG permet d&#8217;industrialiser des attaques de plus en plus sophistiqu\u00e9es gr\u00e2ce \u00e0 sa capacit\u00e9 de cr\u00e9ation de contenu (d\u00e9tection de vuln\u00e9rabilit\u00e9s, cr\u00e9ation de liste de mots de passe pour attaques par brute force, r\u00e9daction d\u2019e-mails de phishing etc\u2026)<\/li>\n\n\n\n<li><strong><em>L\u2019acc\u00e8s simplifi\u00e9 \u00e0 la cr\u00e9ation de cyberattaques<\/em><\/strong>&nbsp;: gr\u00e2ce \u00e0 son interface textuelle permettant de r\u00e9aliser des prompts en langage naturel \u00e0 travers un LLM, il devient plus simple de cr\u00e9er des attaques de types vari\u00e9s (malware, phishing etc\u2026).<\/li>\n<\/ul>\n\n\n\n<p>Au fur et \u00e0 mesure que la technologie s&#8217;am\u00e9liore, ces menaces deviennent de plus en plus sophistiqu\u00e9es, complexes et difficiles \u00e0 d\u00e9tecter et \u00e0 contrer seulement par une intervention humaine associ\u00e9e \u00e0 des outils traditionnels, c\u2019est donc logiquement que l\u2019utilisation de l\u2019IAG doit s\u2019inscrire comme un outil permettant de renforcer les capacit\u00e9s de cyber d\u00e9fense des entreprises.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Auteurs :<\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/Design-sans-titre.png\" alt=\"Luca Bordonaro\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucabordonaro\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Luca Bordonaro<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Consultant Cybers\u00e9curit\u00e9, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucabordonaro\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Luca est consultant chez Capgemini Invent au sein de l\u2019offre Digital Trust &#038; Security et travaille plus particuli\u00e8rement sur des sujets strat\u00e9giques m\u00ealant cybers\u00e9curit\u00e9 et nouvelles technologies.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/P1090723.jpg\" alt=\"Christophe Menant new\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/christophe-menant-8b55b9\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Christophe Menant<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur de l&#039;offre Cybers\u00e9curit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/christophe-menant-8b55b9\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Directeur, responsable du portefeuille d\u2019offre et de l\u2019innovation cybers\u00e9curit\u00e9 de CAPGEMINI France. Plus de 30 ans d\u2019exp\u00e9rience en informatique et plus de 25 ans dans le domaine de la cybers\u00e9curit\u00e9. Christophe a une vaste exp\u00e9rience dans des environnements internationaux et mondiaux. Christophe a aid\u00e9 ces clients \u00e0 \u00e9laborer et \u00e0 ex\u00e9cuter leurs strat\u00e9gies et leurs programmes de transformation s\u00e9curit\u00e9, a g\u00e9r\u00e9 des crises majeures li\u00e9es \u00e0 des cyber-attaques de types ransomware ou espionnage industriel, a d\u00e9finit des m\u00e9thodes, des architectures et des processus de r\u00e9f\u00e9rences ainsi que des offres de s\u00e9curit\u00e9. Ceci a eu pour but de mieux adresser les demandes du march\u00e9 de la s\u00e9curit\u00e9 ou pour contribuer \u00e0 la s\u00e9curit\u00e9 interne des soci\u00e9t\u00e9s pour lesquelles il a travaill\u00e9. Christophe a travaill\u00e9 15 ans chez IBM puis 8 ans chez HPE\/DXC avant de rejoindre CAPGEMINI.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019intelligence artificielle g\u00e9n\u00e9rative (IAG) est une cat\u00e9gorie particuli\u00e8re de mod\u00e8les d\u2019intelligence artificielle (IA) qui r\u00e9pond \u00e0 une interrogation (prompt) par un contenu original, un texte, une image, un code, etc. Si l\u2019IA usuelle augmente les capacit\u00e9s humaines et acc\u00e9l\u00e8re l\u2019ex\u00e9cution, l\u2019IAG ajoute donc la cr\u00e9ativit\u00e9 d\u2019une r\u00e9ponse imm\u00e9diatement exploitable.<\/p>\n","protected":false},"author":201,"featured_media":733974,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"6c2e1bbc-277b-4841-8f34-9db560a53e48\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"1a80ecb8-9516-4046-97ac-9212236831bd\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[3,5,138],"tags":[192,174],"brand":[],"service":[47,49],"industry":[],"partners":[],"blog-topic":[354,359],"content-group":[],"class_list":["post-733969","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","category-technologies","category-transformation","tag-cybersecurite","tag-ia-et-data","service-cybersecurite","service-ia-data","blog-topic-cybersecurite","blog-topic-ia-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9 - Capgemini France<\/title>\n<meta name=\"description\" content=\"L\u2019intelligence artificielle g\u00e9n\u00e9rative (IAG) est une cat\u00e9gorie particuli\u00e8re de mod\u00e8les d\u2019intelligence artificielle (IA) qui r\u00e9pond \u00e0 une interrogation (prompt) par un contenu original, un texte, une image, un code, etc. Si l\u2019IA usuelle augmente les capacit\u00e9s humaines et acc\u00e9l\u00e8re l\u2019ex\u00e9cution, l\u2019IAG ajoute donc la cr\u00e9ativit\u00e9 d\u2019une r\u00e9ponse imm\u00e9diatement exploitable.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"L\u2019intelligence artificielle g\u00e9n\u00e9rative (IAG) est une cat\u00e9gorie particuli\u00e8re de mod\u00e8les d\u2019intelligence artificielle (IA) qui r\u00e9pond \u00e0 une interrogation (prompt) par un contenu original, un texte, une image, un code, etc. Si l\u2019IA usuelle augmente les capacit\u00e9s humaines et acc\u00e9l\u00e8re l\u2019ex\u00e9cution, l\u2019IAG ajoute donc la cr\u00e9ativit\u00e9 d\u2019une r\u00e9ponse imm\u00e9diatement exploitable.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-26T10:02:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T05:55:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/IA-G.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9\",\"datePublished\":\"2023-10-26T10:02:32+00:00\",\"dateModified\":\"2025-03-04T05:55:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/\"},\"wordCount\":1392,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\",\"IA &amp; Data\"],\"articleSection\":[\"Innovation\",\"Technologies\",\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/\",\"name\":\"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9 - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg\",\"datePublished\":\"2023-10-26T10:02:32+00:00\",\"dateModified\":\"2025-03-04T05:55:26+00:00\",\"description\":\"L\u2019intelligence artificielle g\u00e9n\u00e9rative (IAG) est une cat\u00e9gorie particuli\u00e8re de mod\u00e8les d\u2019intelligence artificielle (IA) qui r\u00e9pond \u00e0 une interrogation (prompt) par un contenu original, un texte, une image, un code, etc. Si l\u2019IA usuelle augmente les capacit\u00e9s humaines et acc\u00e9l\u00e8re l\u2019ex\u00e9cution, l\u2019IAG ajoute donc la cr\u00e9ativit\u00e9 d\u2019une r\u00e9ponse imm\u00e9diatement exploitable.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg\",\"width\":6000,\"height\":4000,\"caption\":\"Young women using computer in dark room, IT support woman\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9 - Capgemini France","description":"L\u2019intelligence artificielle g\u00e9n\u00e9rative (IAG) est une cat\u00e9gorie particuli\u00e8re de mod\u00e8les d\u2019intelligence artificielle (IA) qui r\u00e9pond \u00e0 une interrogation (prompt) par un contenu original, un texte, une image, un code, etc. Si l\u2019IA usuelle augmente les capacit\u00e9s humaines et acc\u00e9l\u00e8re l\u2019ex\u00e9cution, l\u2019IAG ajoute donc la cr\u00e9ativit\u00e9 d\u2019une r\u00e9ponse imm\u00e9diatement exploitable.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9","og_description":"L\u2019intelligence artificielle g\u00e9n\u00e9rative (IAG) est une cat\u00e9gorie particuli\u00e8re de mod\u00e8les d\u2019intelligence artificielle (IA) qui r\u00e9pond \u00e0 une interrogation (prompt) par un contenu original, un texte, une image, un code, etc. Si l\u2019IA usuelle augmente les capacit\u00e9s humaines et acc\u00e9l\u00e8re l\u2019ex\u00e9cution, l\u2019IAG ajoute donc la cr\u00e9ativit\u00e9 d\u2019une r\u00e9ponse imm\u00e9diatement exploitable.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/","og_site_name":"Capgemini France","article_published_time":"2023-10-26T10:02:32+00:00","article_modified_time":"2025-03-04T05:55:26+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/IA-G.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/"},"author":{"name":"","@id":""},"headline":"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9","datePublished":"2023-10-26T10:02:32+00:00","dateModified":"2025-03-04T05:55:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/"},"wordCount":1392,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg","keywords":["Cybers\u00e9curit\u00e9","IA &amp; Data"],"articleSection":["Innovation","Technologies","Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/","name":"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9 - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg","datePublished":"2023-10-26T10:02:32+00:00","dateModified":"2025-03-04T05:55:26+00:00","description":"L\u2019intelligence artificielle g\u00e9n\u00e9rative (IAG) est une cat\u00e9gorie particuli\u00e8re de mod\u00e8les d\u2019intelligence artificielle (IA) qui r\u00e9pond \u00e0 une interrogation (prompt) par un contenu original, un texte, une image, un code, etc. Si l\u2019IA usuelle augmente les capacit\u00e9s humaines et acc\u00e9l\u00e8re l\u2019ex\u00e9cution, l\u2019IAG ajoute donc la cr\u00e9ativit\u00e9 d\u2019une r\u00e9ponse imm\u00e9diatement exploitable.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg","width":6000,"height":4000,"caption":"Young women using computer in dark room, IT support woman"},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"},{"id":359,"name":"IA &amp; Data"}],"taxonomy_info":{"category":[{"id":3,"name":"Innovation","slug":"innovation"},{"id":5,"name":"Technologies","slug":"technologies"},{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"},{"id":174,"name":"IA &amp; Data","slug":"ia-et-data"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"},{"id":49,"name":"IA &amp; Data","slug":"ia-data"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"},{"id":359,"name":"IA &amp; Data","slug":"ia-data"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg"},"articleSection":"Innovation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9","ia &amp; data"],"dateCreated":"2023-10-26T10:02:32Z","datePublished":"2023-10-26T10:02:32Z","dateModified":"2025-03-04T05:55:26Z"},"rendered":"<meta name=\"parsely-title\" content=\"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2023-10-26T10:02:32Z\" \/>\n<meta name=\"parsely-section\" content=\"Innovation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9,ia &amp; data\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":731732,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/intelligence-artificielle-alliee-puissante-pour-cyber-defense-center\/","url_meta":{"origin":733969,"position":0},"title":"L\u2019intelligence artificielle, une alli\u00e9e puissante pour le Cyber Defense Center","author":"","date":"October 18, 2023","format":false,"excerpt":"L\u2019enjeu d\u2019un Cyber Defense Center (CDC) est d\u2019anticiper et d\u2019identifier au plus t\u00f4t ce qui est important \u2013 attaques, pr\u00e9mices d\u2019attaques ou menaces potentielles \u2013 parmi le bruit \u00e9mis par toutes les alertes, av\u00e9r\u00e9es ou non, et parmi toutes les informations disponibles. Or, aujourd\u2019hui, s\u2019il y a davantage d\u2019attaques, il\u2026","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":762594,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/resilience-supply-chain-automobile\/","url_meta":{"origin":733969,"position":1},"title":"Renforcer la r\u00e9silience de la supply chain automobile gr\u00e2ce \u00e0 la data et l\u2019intelligence artificielle","author":"quentinkieken","date":"September 26, 2024","format":false,"excerpt":"Tensions g\u00e9opolitiques, fluctuations des prix des mati\u00e8res premi\u00e8res, p\u00e9nuries de composants, al\u00e9as climatiques et risques de cybers\u00e9curit\u00e9\u2026 Les constructeurs automobiles font face \u00e0 une multitude de risques strat\u00e9giques, logistiques et technologiques, complexifiant la gestion de leurs cha\u00eenes d\u2019approvisionnement.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":755128,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/","url_meta":{"origin":733969,"position":2},"title":"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9","author":"quentinkieken","date":"June 19, 2024","format":false,"excerpt":"Chaque fois qu\u2019une innovation de rupture s\u2019invite dans les syst\u00e8mes d\u2019information, se pose aussit\u00f4t la question de ses cons\u00e9quences en mati\u00e8re de cybers\u00e9curit\u00e9.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":787594,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","url_meta":{"origin":733969,"position":3},"title":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9","author":"anne.gautier@capgemini.com","date":"July 3, 2025","format":false,"excerpt":"Malgr\u00e9 les incertitudes r\u00e9glementaires, les organisations doivent investir d\u00e8s maintenant dans l\u2019IA pour la cybers\u00e9curit\u00e9, tout en avan\u00e7ant avec prudence, en encadrant son usage par une gouvernance rigoureuse et une veille continue.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":721330,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/tests-dintrusion-au-coeur-de-demarche-damelioration-continue-pour-la-cybersecurite\/","url_meta":{"origin":733969,"position":4},"title":"Les tests d\u2019intrusion au c\u0153ur de la d\u00e9marche d\u2019am\u00e9lioration continue pour la cybers\u00e9curit\u00e9","author":"","date":"June 12, 2023","format":false,"excerpt":"Dans un monde connect\u00e9 et num\u00e9rique en pleine expansion, les cyberattaques repr\u00e9sentent une menace r\u00e9elle et prot\u00e9iforme pour les entreprises. Les pirates informatiques sont constamment \u00e0 l'aff\u00fbt des vuln\u00e9rabilit\u00e9s pour acc\u00e9der aux donn\u00e9es sensibles et causer des dommages parfois irr\u00e9versibles.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":761324,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/processus-metiers-la-genai-au-service-de-la-creation-de-valeur\/","url_meta":{"origin":733969,"position":5},"title":"Processus m\u00e9tiers\u00a0: la Gen AI au service de la cr\u00e9ation de valeur","author":"Tarek Edde Gomez","date":"September 23, 2024","format":false,"excerpt":"Avec la GenAI, tous les processus des entreprises peuvent gagner en performance et en fluidit\u00e9. R\u00e9sultat\u00a0: cette technologie devient un levier incontournable, y compris lorsqu\u2019elle est int\u00e9gr\u00e9e aux ERP.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg","author_title":"Capgemini","author_thumbnail_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/cg-logo-blue.svg?w=960","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/733969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/201"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=733969"}],"version-history":[{"count":6,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/733969\/revisions"}],"predecessor-version":[{"id":787595,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/733969\/revisions\/787595"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/733974"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=733969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=733969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=733969"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=733969"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=733969"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=733969"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=733969"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=733969"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=733969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}