{"id":734836,"date":"2023-11-30T15:15:45","date_gmt":"2023-11-30T14:15:45","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=734836"},"modified":"2025-03-04T06:53:24","modified_gmt":"2025-03-04T05:53:24","slug":"securiser-la-5g-pour-cybersecuriser-lindustrie","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/","title":{"rendered":"S\u00e9curiser la 5G pour cybers\u00e9curiser l&#8217;industrie"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>S\u00e9curiser la 5G pour cybers\u00e9curiser l&#8217;industrie<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"\/wp-content\/themes\/capgemini2020\/assets\/images\/cg-logo.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">C\u00e9dric Bourrely, Jeanne Heur\u00e9, Christophe Menant, Patrice Crutel &amp; Antoine Mercier<\/h5><h5 class=\"blog-date\">30 novembre 2023<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">D\u00e9ploy\u00e9e \u00e0 l\u2019\u00e9chelle depuis plus de 2 ans en Europe, la 5G a attir\u00e9 l\u2019attention du grand public autour d\u2019usages principalement tourn\u00e9s vers la consommation de contenu multim\u00e9dia. Elle est pourtant pens\u00e9e initialement pour le monde industriel, et, apr\u00e8s des d\u00e9buts timides, on note d\u00e9sormais une augmentation significative des d\u00e9ploiements pour des usages industriels tant sur les r\u00e9seaux publics des op\u00e9rateurs mobiles commerciaux que sur des r\u00e9seaux priv\u00e9s. Comme toute nouvelle technologie de communication, la 5G n\u2019\u00e9chappe pas aux questions relatives \u00e0 la cybers\u00e9curit\u00e9, notamment dans le contexte g\u00e9opolitique actuel.<br>\u00a0<\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h3 class=\"wp-block-heading\" id=\"h-la-5g-un-monde-d-opportunites-nouvelles\">La 5G, un monde d\u2019opportunit\u00e9s nouvelles<\/h3>\n\n\n\n<p>La 5G offre des niveaux de performance sans pr\u00e9c\u00e9dent (d\u00e9bit, latence, volume de connexions\u2026), des innovations fonctionnelles et op\u00e8re une convergence entre le num\u00e9rique (IT), l\u2019informatique industrielle (OT) et les technologies r\u00e9seaux (NT). D\u00e9sormais mature, abordable financi\u00e8rement et encadr\u00e9e juridiquement, elle permet aux entreprises de d\u00e9velopper leurs cas d\u2019usage mobiles et de les int\u00e9grer dans leurs d\u00e9veloppements. Elle ouvre ainsi \u00e0 de nouvelles opportunit\u00e9s&nbsp;: gains de productivit\u00e9 dans des activit\u00e9s de production, de logistique, de t\u00e9l\u00e9-op\u00e9rations ou encore de maintenance.<\/p>\n\n\n\n<p>Mais alors que certaines industries s\u2019appuient sur les r\u00e9seaux 5G des op\u00e9rateurs mobiles commerciaux, d\u2019autres, de plus en plus nombreuses, pr\u00e9f\u00e8rent mettre en place leur propre infrastructure de t\u00e9l\u00e9communication priv\u00e9e.<\/p>\n\n\n\n<p>Si ce choix permet de d\u00e9multiplier les b\u00e9n\u00e9fices de la 5G, en apportant davantage de ma\u00eetrise des cas d\u2019usage, il est n\u00e9cessaire que les entreprises adoptent les bons r\u00e9flexes de s\u00e9curisation de leurs infrastructures, comme l\u2019aurait fait un op\u00e9rateur.<\/p>\n\n\n\n<p>C\u2019est particuli\u00e8rement le cas pour les industries qui manipulent des donn\u00e9es sensibles et attendent un tr\u00e8s haut niveau de disponibilit\u00e9 de leurs r\u00e9seaux pour assurer la continuit\u00e9 de leurs op\u00e9rations&nbsp;: grands industriels, h\u00f4pitaux, op\u00e9rateurs d\u2019\u00e9nergie et de transport\u2026<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Des enjeux de cybers\u00e9curit\u00e9 bien identifi\u00e9s<\/h3>\n\n\n\n<p>Promesse de d\u00e9bit et de latence ultra-faibles, la 5G facilite des usages jusqu\u2019alors complexes gr\u00e2ce au d\u00e9ploiement de composants du c\u0153ur de r\u00e9seau en p\u00e9riph\u00e9rie ou \u00e0 l\u2019edge (au plus pr\u00e8s des utilisateurs et des antennes), que ce soit pour des composants applicatifs ou r\u00e9seau.<\/p>\n\n\n\n<p>La s\u00e9curisation de ces points de vuln\u00e9rabilit\u00e9, diss\u00e9min\u00e9s, parfois lointains, voire mobiles, exige des approches de s\u00e9curisation en profondeur, finement adapt\u00e9es aux ressources mat\u00e9rielles limit\u00e9es \u00e0 l\u2019edge.<\/p>\n\n\n\n<p>Le deuxi\u00e8me enjeu majeur de la 5G r\u00e9side dans la standardisation des API (Application Programming Interface) du c\u0153ur de r\u00e9seau, qui, en ouvrant la possibilit\u00e9 de l&#8217;interconnecter avec des applicatifs tiers pour plus de souplesse, cr\u00e9ent potentiellement de nouveaux vecteurs d\u2019attaque. La gestion des API a \u00e9t\u00e9 s\u00e9curis\u00e9e par de nombreuses sp\u00e9cifications, \u00e9mises pour introduire de nouveaux composants dans le c\u0153ur de r\u00e9seau (NRF, SEPP, SCP), am\u00e9liorant ainsi la confidentialit\u00e9 et l&#8217;authenticit\u00e9 des \u00e9changes entre les applicatifs tiers et le c\u0153ur de r\u00e9seau. Cette d\u00e9marche norm\u00e9e s\u2019inscrit dans la continuit\u00e9 de la volont\u00e9 historique des acteurs du monde du t\u00e9l\u00e9com et des industriels \u00e0 traiter le volet cybers\u00e9curit\u00e9 avec une tr\u00e8s grande attention.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Des vuln\u00e9rabilit\u00e9s exog\u00e8nes \u00e0 prendre en compte<\/h3>\n\n\n\n<p>Par ailleurs, les technologies sur lesquelles repose la 5G peuvent elles-m\u00eames \u00eatre potentiellement sources de vuln\u00e9rabilit\u00e9.<\/p>\n\n\n\n<p>En effet, par souci de modularit\u00e9, d&#8217;ouverture et de r\u00e9utilisation de librairies logicielles partag\u00e9es, et comme d\u2019autres syst\u00e8mes et logiciels par ailleurs, la 5G utilise largement des composants logiciels cloud native et open source, dont la provenance ou le niveau de s\u00e9curisation sont parfois difficiles \u00e0 tracer et garantir. Quant au mat\u00e9riel, l\u2019\u00e9cosyst\u00e8me des fabricants tr\u00e8s concentr\u00e9 sur certains composants cl\u00e9s (ex&nbsp;: puces) cr\u00e9e des risques de d\u00e9pendance.<\/p>\n\n\n\n<p>Il est donc fondamental de renforcer et maitriser la tra\u00e7abilit\u00e9 des cha\u00eenes d\u2019approvisionnement logicielles et mat\u00e9rielles, afin de se pr\u00e9munir de l\u2019introduction d\u2019\u00e9l\u00e9ments malveillants ou d\u00e9faillants au sein d\u2019infrastructures telecom, qu\u2019elles soient publiques ou priv\u00e9es.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-la-5g-une-opportunite-pour-les-experts-en-cybersecurite\">La 5G, une opportunit\u00e9 pour les experts en cybers\u00e9curit\u00e9&#8230;<\/h3>\n\n\n\n<p>La convergence technologique qui sous-tend la 5G repr\u00e9sente un atout pour la cybers\u00e9curit\u00e9, car il en r\u00e9sulte que la grande majorit\u00e9 des vuln\u00e9rabilit\u00e9s potentielles et des moyens de les juguler sont du domaine connu.<\/p>\n\n\n\n<p>Pour l\u2019essentiel, il s\u2019agit donc d\u2019\u00e9tendre de fa\u00e7on rigoureuse \u00e0 l\u2019ensemble du r\u00e9seau 5G et de son infrastructure les outils et les m\u00e9thodes en vigueur dans le domaine IT. Cela signifie, par exemple&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>d\u2019\u00e9largir les dispositifs de supervision et de d\u00e9tection \u00e0 tout le p\u00e9rim\u00e8tre,<\/li>\n\n\n\n<li>de s\u00e9curiser les API du c\u0153ur de r\u00e9seau en respectant les standards d\u2019int\u00e9gration et<\/li>\n\n\n\n<li>de d\u00e9ployer des solutions d\u00e9di\u00e9es \u00e0 la gestion des flux externes (NEF, firewalls),<\/li>\n\n\n\n<li>de mettre en \u0153uvre sur le c\u0153ur de r\u00e9seau les bonnes pratiques de s\u00e9curit\u00e9 (validation et authentification mutuelle de chaque composant, chiffrement des \u00e9changes, surveillance automatis\u00e9e des d\u00e9viations\u2026),<\/li>\n\n\n\n<li>ou encore de d\u00e9ployer une s\u00e9curit\u00e9 p\u00e9rim\u00e9trique autour des fonctions ouvertes sur l\u2019ext\u00e9rieur ou n\u2019ayant pas fait l\u2019objet de contr\u00f4les exhaustifs.<\/li>\n<\/ul>\n\n\n\n<p>Par ailleurs, gr\u00e2ce \u00e0 l\u2019une des fonctionnalit\u00e9s cl\u00e9s de la 5G (le Network slicing, qui permet de segmenter le r\u00e9seau en sous-r\u00e9seaux ind\u00e9pendants) il est possible d\u2019isoler certains services et d\u2019appliquer des politiques de s\u00e9curit\u00e9 diff\u00e9renci\u00e9es selon leur criticit\u00e9 et les exigences de l\u2019industriel concern\u00e9. <\/p>\n\n\n\n<p>Sur ce sujet comme sur bien d\u2019autres, \u00e0 la fronti\u00e8re entre cybers\u00e9curit\u00e9, t\u00e9l\u00e9coms et IT, une collaboration renforc\u00e9e entre ces diff\u00e9rentes sp\u00e9cialit\u00e9s sera indispensable au sein des entreprises.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-qui-necessite-une-approche-de-bout-en-bout-nbsp-nbsp\">&#8230; qui n\u00e9cessite une approche de bout en bout&nbsp;&nbsp;<\/h2>\n\n\n\n<p>Au-del\u00e0 du c\u0153ur de r\u00e9seau lui-m\u00eame, la s\u00e9curisation des d\u00e9ploiements 5G requiert une approche de bout en bout, adapt\u00e9e aux enjeux et contraintes industrielles, et prenant aussi en compte les terminaux (IoT, \u00e9quipements des utilisateurs\u2026), les communications et les applications.<\/p>\n\n\n\n<p>Pour cela, la mise en place d\u2019une gouvernance transverse, n\u00e9cessaire \u00e0 la coordination des diff\u00e9rentes sp\u00e9cialit\u00e9s vers un m\u00eame objectif de s\u00e9curit\u00e9, est indispensable. Cette gouvernance visera \u00e0 g\u00e9n\u00e9raliser \u00e9galement un certain nombre de principes, qui, l\u00e0 encore, ne sont pas propres \u00e0 la 5G&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>processus et infrastructures d\u2019IAM (Identity and Access Management) pour f\u00e9d\u00e9rer les identit\u00e9s et droits d&#8217;acc\u00e8s et<\/li>\n\n\n\n<li>processus et solutions d\u2019UDM (Unified Data Management) pour centraliser les donn\u00e9es des utilisateurs,<\/li>\n\n\n\n<li>chiffrement des flux,<\/li>\n\n\n\n<li>authentification des terminaux bas\u00e9e sur des certificats,<\/li>\n\n\n\n<li>mise en place de sondes sur les terminaux et d\u2019un suivi des logs applicatif pour d\u00e9tecter les comportements anormaux,<\/li>\n\n\n\n<li>durcissement du socle de virtualisation au niveau OS et applicatif\u2026<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Auteurs <\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Cedric-Bourrely-PC.jpg\" alt=\"C\u00e9dric Bourrely\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/fr.linkedin.com\/in\/cedricbourrely\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">C\u00e9dric Bourrely<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur de programme 5G Labs, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/fr.linkedin.com\/in\/cedricbourrely\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">C\u00e9dric Bourrely est en charge des activit\u00e9s de Conseil autour des technologies Emergentes chez Capgemini Invent.  Il intervient principalement sur les th\u00e9matiques des apports des nouvelles technologies, notamment Connectivit\u00e9 (5G, IoT\u2026), \u00a0Intelligence Artificielle et technologies d\u00e9centralis\u00e9es (Blockchain), dans les secteurs de l\u2019Industrie, des Infrastructures Critiques, de la S\u00e9curit\u00e9 Publique et de la D\u00e9fense.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Heure-Jeanne_New.jpg\" alt=\"Jeanne Heur\u00e9\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/bit.ly\/3QNheOE\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Jeanne Heur\u00e9<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directrice Confiance et S\u00e9curit\u00e9 Num\u00e9rique, Capgemini Invent France<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/bit.ly\/3QNheOE\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Jeanne Heur\u00e9 porte le d\u00e9partement de Confiance et s\u00e9curit\u00e9 num\u00e9rique de Capgemini Invent pour accompagner les dirigeants dans leur strat\u00e9gie et transformations cyber. Issue des sciences politiques et Affaires europ\u00e9ennes, elle a d\u2019abord abord\u00e9 ces sujets sous l\u2019angle des enjeux nationaux\/internationaux de s\u00e9curit\u00e9 num\u00e9rique \u2013 c\u2019est ce qui a toujours donn\u00e9 du sens a son activit\u00e9. Membre du Board Cyber Capgemini France et coordinatrice du d\u00e9veloppement des \u00e9quipes cyber Capgemini Invent \u00e0 l\u2019international, elle intervient dans tous les secteurs march\u00e9 sur ses sujets de pr\u00e9dilection : pilotage &#038; performance de la s\u00e9curit\u00e9 num\u00e9rique \u2013 Offres de services cyber &#038; relations IT\/m\u00e9tiers \u2013 Programmes de transformation cyber complexes \u2013 Cyber-r\u00e9silience \u2013 Cyber4good<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/P1090723.jpg\" alt=\"Christophe Menant new\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/christophe-menant-8b55b9\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Christophe Menant<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur de l&#039;offre Cybers\u00e9curit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/christophe-menant-8b55b9\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Directeur, responsable du portefeuille d\u2019offre et de l\u2019innovation cybers\u00e9curit\u00e9 de CAPGEMINI France. Plus de 30 ans d\u2019exp\u00e9rience en informatique et plus de 25 ans dans le domaine de la cybers\u00e9curit\u00e9. Christophe a une vaste exp\u00e9rience dans des environnements internationaux et mondiaux. Christophe a aid\u00e9 ces clients \u00e0 \u00e9laborer et \u00e0 ex\u00e9cuter leurs strat\u00e9gies et leurs programmes de transformation s\u00e9curit\u00e9, a g\u00e9r\u00e9 des crises majeures li\u00e9es \u00e0 des cyber-attaques de types ransomware ou espionnage industriel, a d\u00e9finit des m\u00e9thodes, des architectures et des processus de r\u00e9f\u00e9rences ainsi que des offres de s\u00e9curit\u00e9. Ceci a eu pour but de mieux adresser les demandes du march\u00e9 de la s\u00e9curit\u00e9 ou pour contribuer \u00e0 la s\u00e9curit\u00e9 interne des soci\u00e9t\u00e9s pour lesquelles il a travaill\u00e9. Christophe a travaill\u00e9 15 ans chez IBM puis 8 ans chez HPE\/DXC avant de rejoindre CAPGEMINI.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/05\/Patrice-Crutel.jpg\" alt=\"Patrice Crutel\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/monet\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Patrice Crutel<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Expert en Innovative Services<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/monet\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Je conseille mes clients, MNO et MVNO, sur les \u00e9volutions des r\u00e9seaux de base et de service tels que WebRTC, NFV, 4G\/5G<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/12\/Antoine_mercier_400x400.jpg\" alt=\"Antoine Mercier\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/mercier-antoine\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Antoine Mercier<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur technique pour les offres 5G, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/mercier-antoine\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Antoine a plus de 20 ans d\u2019exp\u00e9rience en conception de solutions de t\u00e9l\u00e9communications op\u00e9r\u00e9es ou priv\u00e9es pour les op\u00e9rateurs et les industriels.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin <\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 3708c5fd-e7df-4ba0-9962-dbea4021fc84\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-blue-capgemini-theme\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"5G LABS, AU SERVICE DES INDUSTRIES\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t5G LABS, AU SERVICE DES INDUSTRIES\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Capgemini a d\u00e9velopp\u00e9 les 5G Labs afin d'aider les entreprises \u00e0 \u00e9laborer des strat\u00e9gies, \u00e0 construire et \u00e0 mon\u00e9tiser ce que la 5G va apporter.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCapgemini a d\u00e9velopp\u00e9 les 5G Labs afin d&#8217;aider les entreprises \u00e0 \u00e9laborer des strat\u00e9gies, \u00e0 construire et \u00e0 mon\u00e9tiser ce que la 5G va apporter.\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus  A propos 5G LABS, AU SERVICE DES INDUSTRIES\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/solutions\/5glabs\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus \t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capture-49-1.webp?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capture-49-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capture-49-1.webp?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capture-49-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capture-49-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capture-49-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capture-49-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capture-49-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capture-49-1.webp\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 55% 55%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-blue-capgemini-theme\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"CYBERS\u00c9CURIT\u00c9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCYBERS\u00c9CURIT\u00c9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Faites de la cybers\u00e9curit\u00e9 le moteur de votre transformation.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tFaites de la cybers\u00e9curit\u00e9 le moteur de votre transformation.\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos CYBERS\u00c9CURIT\u00c9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Avec ses niveaux de performances sans pr\u00e9c\u00e9dent (d\u00e9bit, latence, volumes de connexions\u2026), ses innovations fonctionnelles (slicing, edge computing\u2026) et la convergence qu\u2019elle op\u00e8re entre le num\u00e9rique (IT), l\u2019informatique industrielle (OT) et les technologies r\u00e9seaux (NT), la 5G ouvre en effet des possibilit\u00e9s immenses dans des domaines tels que la production, l\u2019automatisation, la logistique, la maintenance, ou encore les transports.<\/p>\n","protected":false},"author":640,"featured_media":736974,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"d6009578-6d91-4088-b1df-284c97a656f9\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"e3b15fa0-94cc-4b19-b260-acffa160a894\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":"{\"x\":0.49,\"y\":1}"},"categories":[3],"tags":[192,17],"brand":[],"service":[47],"industry":[97],"partners":[],"blog-topic":[341,354],"content-group":[],"class_list":["post-734836","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","tag-cybersecurite","tag-innovation","service-cybersecurite","industry-telecoms","blog-topic-5g-et-edge","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u00e9curiser la 5G pour cybers\u00e9curiser l&#039;industrie - Capgemini France<\/title>\n<meta name=\"description\" content=\"Depuis quelques mois, le d\u00e9ploiement de la 5G acc\u00e9l\u00e8re fortement, essentiellement ses usages industriels, qui constituent sa cible privil\u00e9gi\u00e9e.\u00a0\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curiser la 5g pour cybers\u00e9curiser l&#039;industrie\" \/>\n<meta property=\"og:description\" content=\"Avec ses niveaux de performances sans pr\u00e9c\u00e9dent (d\u00e9bit, latence, volumes de connexions\u2026), ses innovations fonctionnelles (slicing, edge computing\u2026) et la convergence qu\u2019elle op\u00e8re entre le num\u00e9rique (IT), l\u2019informatique industrielle (OT) et les technologies r\u00e9seaux (NT), la 5G ouvre en effet des possibilit\u00e9s immenses dans des domaines tels que la production, l\u2019automatisation, la logistique, la maintenance, ou encore les transports.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-30T14:15:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T05:53:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/cyber-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"S\u00e9curiser la 5G pour cybers\u00e9curiser l&#039;industrie\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"S\u00e9curiser la 5G pour cybers\u00e9curiser l&#8217;industrie\",\"datePublished\":\"2023-11-30T14:15:45+00:00\",\"dateModified\":\"2025-03-04T05:53:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/\"},\"wordCount\":1253,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\",\"Innovation\"],\"articleSection\":[\"Innovation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/\",\"name\":\"S\u00e9curiser la 5G pour cybers\u00e9curiser l'industrie - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg\",\"datePublished\":\"2023-11-30T14:15:45+00:00\",\"dateModified\":\"2025-03-04T05:53:24+00:00\",\"description\":\"Depuis quelques mois, le d\u00e9ploiement de la 5G acc\u00e9l\u00e8re fortement, essentiellement ses usages industriels, qui constituent sa cible privil\u00e9gi\u00e9e.\u00a0\u00a0\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg\",\"width\":4949,\"height\":3727},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S\u00e9curiser la 5G pour cybers\u00e9curiser l'industrie - Capgemini France","description":"Depuis quelques mois, le d\u00e9ploiement de la 5G acc\u00e9l\u00e8re fortement, essentiellement ses usages industriels, qui constituent sa cible privil\u00e9gi\u00e9e.\u00a0\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curiser la 5g pour cybers\u00e9curiser l'industrie","og_description":"Avec ses niveaux de performances sans pr\u00e9c\u00e9dent (d\u00e9bit, latence, volumes de connexions\u2026), ses innovations fonctionnelles (slicing, edge computing\u2026) et la convergence qu\u2019elle op\u00e8re entre le num\u00e9rique (IT), l\u2019informatique industrielle (OT) et les technologies r\u00e9seaux (NT), la 5G ouvre en effet des possibilit\u00e9s immenses dans des domaines tels que la production, l\u2019automatisation, la logistique, la maintenance, ou encore les transports.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/","og_site_name":"Capgemini France","article_published_time":"2023-11-30T14:15:45+00:00","article_modified_time":"2025-03-04T05:53:24+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/cyber-2-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"S\u00e9curiser la 5G pour cybers\u00e9curiser l'industrie","twitter_misc":{"Written by":"","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/"},"author":{"name":"","@id":""},"headline":"S\u00e9curiser la 5G pour cybers\u00e9curiser l&#8217;industrie","datePublished":"2023-11-30T14:15:45+00:00","dateModified":"2025-03-04T05:53:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/"},"wordCount":1253,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg","keywords":["Cybers\u00e9curit\u00e9","Innovation"],"articleSection":["Innovation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/","name":"S\u00e9curiser la 5G pour cybers\u00e9curiser l'industrie - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg","datePublished":"2023-11-30T14:15:45+00:00","dateModified":"2025-03-04T05:53:24+00:00","description":"Depuis quelques mois, le d\u00e9ploiement de la 5G acc\u00e9l\u00e8re fortement, essentiellement ses usages industriels, qui constituent sa cible privil\u00e9gi\u00e9e.\u00a0\u00a0","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg","width":4949,"height":3727},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/"}]}},"blog_topic_info":[{"id":341,"name":"5G et Edge"},{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":3,"name":"Innovation","slug":"innovation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"},{"id":17,"name":"Innovation","slug":"innovation"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"industry":[{"id":97,"name":"Telecoms","slug":"telecoms"}],"blog-topic":[{"id":341,"name":"5G et Edge","slug":"5g-et-edge"},{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"ef_editorial_meta":[{"id":108,"name":"First Draft Date","slug":"first-draft-date"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"S\u00e9curiser la 5G pour cybers\u00e9curiser l&#8217;industrie","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg"},"articleSection":"Innovation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9","innovation"],"dateCreated":"2023-11-30T14:15:45Z","datePublished":"2023-11-30T14:15:45Z","dateModified":"2025-03-04T05:53:24Z"},"rendered":"<meta name=\"parsely-title\" content=\"S\u00e9curiser la 5G pour cybers\u00e9curiser l&#8217;industrie\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2023-11-30T14:15:45Z\" \/>\n<meta name=\"parsely-section\" content=\"Innovation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9,innovation\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":734187,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/5g-hybride-pour-une-couverture-sans-couture\/","url_meta":{"origin":734836,"position":0},"title":"5G hybride : Les promesses d&#8217;une couverture sans couture","author":"anne.gautier@capgemini.com","date":"November 10, 2023","format":false,"excerpt":"En associant la puissance des r\u00e9seaux terrestres \u00e0 la flexibilit\u00e9 des constellations basse orbite, la 5G hybride est porteuse de nouvelles opportunit\u00e9s pour les entreprises","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/5G-Satellite-Banner-Blog.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/5G-Satellite-Banner-Blog.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/5G-Satellite-Banner-Blog.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/5G-Satellite-Banner-Blog.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":711704,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/introduction-a-la-securite-de-l-intelligent-industry\/","url_meta":{"origin":734836,"position":1},"title":"Une introduction \u00e0 la s\u00e9curit\u00e9 de &#8220;l\u2019Intelligent Industry&#8221;","author":"","date":"February 27, 2023","format":false,"excerpt":"Depuis son apparition dans les ann\u00e9es 70, la cybers\u00e9curit\u00e9 s'est d\u00e9velopp\u00e9e en r\u00e9ponse au d\u00e9veloppement technologique, pour devenir une industrie de 345,4 milliards de dollars \u00e0 horizon 2026.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/GettyImages-169270562.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/GettyImages-169270562.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/GettyImages-169270562.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/GettyImages-169270562.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":751843,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-supply-chain-composants-connectes\/","url_meta":{"origin":734836,"position":2},"title":"Supply chain\u00a0: quelle cybers\u00e9curit\u00e9 pour les composants connect\u00e9s\u00a0?","author":"quentinkieken","date":"April 29, 2024","format":false,"excerpt":"Entre les soup\u00e7ons pesant sur la s\u00e9curit\u00e9 des \u00e9quipements 5G produits hors de l\u2019Union Europ\u00e9enne et le piratage spectaculaire de v\u00e9hicules autonomes, de nombreuses affaires ont attir\u00e9 ces derni\u00e8res ann\u00e9es l\u2019attention sur la vuln\u00e9rabilit\u00e9 des objets connect\u00e9s.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/blog_cyber_intelligentindustry_banner.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":718569,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/mobilite-connectee-de-confiance\/","url_meta":{"origin":734836,"position":3},"title":"Pour une mobilit\u00e9 connect\u00e9e de confiance","author":"","date":"June 5, 2023","format":false,"excerpt":"La multiplication des applications mobiles et des syst\u00e8mes embarqu\u00e9s connect\u00e9s, associ\u00e9e au d\u00e9veloppement des communications performantes gr\u00e2ce \u00e0 la 5G, offrent des opportunit\u00e9s sans pr\u00e9c\u00e9dent de nouveaux services num\u00e9riques. Ces opportunit\u00e9s sont rendues possibles par la convergence de moyens techniques multiples.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":707990,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/ia-au-service-de-efficacite-energetique-reseaux-telecoms\/","url_meta":{"origin":734836,"position":4},"title":"L&#8217;IA, au service de l&#8217;efficacit\u00e9 \u00e9nerg\u00e9tique des r\u00e9seaux t\u00e9l\u00e9coms","author":"anne.gautier@capgemini.com","date":"February 14, 2023","format":false,"excerpt":"Des exp\u00e9rimentations d'optimisation dynamique des r\u00e9seaux mobiles gr\u00e2ce \u00e0 l'IA ont d\u00e9montr\u00e9 sa faisabilit\u00e9 et, surtout, fourni des r\u00e9sultats prometteurs","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/ArticleBlogIAConsoEnergetique.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/ArticleBlogIAConsoEnergetique.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/ArticleBlogIAConsoEnergetique.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/ArticleBlogIAConsoEnergetique.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":757102,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/defense-challenge-connectivite-logistique-operationnelle\/","url_meta":{"origin":734836,"position":5},"title":"D\u00e9fense\u00a0: Le challenge de la connectivit\u00e9 pour soutenir la logistique op\u00e9rationnelle","author":"","date":"July 8, 2024","format":false,"excerpt":"Une transformation majeure sous la pression des technologies et des conflits de haute intensit\u00e9","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Capgemini_Satory-2024-BanniereWeb.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Capgemini_Satory-2024-BanniereWeb.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Capgemini_Satory-2024-BanniereWeb.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Capgemini_Satory-2024-BanniereWeb.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/734836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/640"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=734836"}],"version-history":[{"count":20,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/734836\/revisions"}],"predecessor-version":[{"id":776592,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/734836\/revisions\/776592"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/736974"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=734836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=734836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=734836"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=734836"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=734836"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=734836"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=734836"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=734836"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=734836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}