{"id":742555,"date":"2024-02-12T09:00:00","date_gmt":"2024-02-12T08:00:00","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=742555"},"modified":"2025-03-04T06:50:00","modified_gmt":"2025-03-04T05:50:00","slug":"cybersecurite-dora-approche-fondee-risque","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/","title":{"rendered":"DORA ou l&#8217;approche fond\u00e9e sur les risques"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>DORA ou l&#8217;approche fond\u00e9e sur les risques<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"\/wp-content\/themes\/capgemini2020\/assets\/images\/cg-logo.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Lucie Shen et Samuel Zanin <\/h5><h5 class=\"blog-date\">12 f\u00e9vrier 2024<\/h5><\/div><\/div><div class=\"brand-image\"><img decoding=\"async\" loading=\"lazy\" src=\"\/wp-content\/themes\/capgemini2020\/assets\/images\/capgemini-invent-white.svg\" alt=\"capgemini-invent\"\/><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9<sup data-fn=\"96a595fe-2528-4bef-ac42-9ba79183404c\" class=\"fn\"><a href=\"#96a595fe-2528-4bef-ac42-9ba79183404c\" id=\"96a595fe-2528-4bef-ac42-9ba79183404c-link\">1<\/a><\/sup>. La forte num\u00e9risation des activit\u00e9s financi\u00e8res, le recours au t\u00e9l\u00e9travail lors de la pand\u00e9mie de Covid-19<sup data-fn=\"34edda33-4372-47d9-bd8f-815b05a6ccd7\" class=\"fn\"><a href=\"#34edda33-4372-47d9-bd8f-815b05a6ccd7\" id=\"34edda33-4372-47d9-bd8f-815b05a6ccd7-link\">2<\/a><\/sup> et la mont\u00e9e des tensions g\u00e9opolitiques, ont intensifi\u00e9 les risques cyber, qualifi\u00e9s de \u00ab\u00a0tr\u00e8s \u00e9lev\u00e9s\u00a0\u00bb par la Banque de France depuis 2023<sup data-fn=\"ee08620a-1001-4500-a731-b058b84188e6\" class=\"fn\"><a href=\"#ee08620a-1001-4500-a731-b058b84188e6\" id=\"ee08620a-1001-4500-a731-b058b84188e6-link\">3<\/a><\/sup>.<\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p><strong>Le secteur financier se distingue par une forte interconnexion, faisant du risque cyber un risque syst\u00e9mique<\/strong>. Le secteur regroupe en effet des acteurs qui concentrent une part importante des actifs et des flux et qui sont fortement li\u00e9s entre eux. <\/p>\n\n\n\n<p>Par cons\u00e9quent, un \u00e9v\u00e8nement isol\u00e9 peut se propager plus largement, comme l\u2019a d\u00e9montr\u00e9 la cyberattaque du 9 novembre 2023 contre une division am\u00e9ricaine de la Banque Industrielle et Commerciale de Chine (ICBC)<sup data-fn=\"74239451-ad01-4e24-bd7a-83e180236bd1\" class=\"fn\"><a href=\"#74239451-ad01-4e24-bd7a-83e180236bd1\" id=\"74239451-ad01-4e24-bd7a-83e180236bd1-link\">4<\/a><\/sup>.<\/p>\n\n\n\n<p><strong>Face \u00e0 l\u2019omnipr\u00e9sence de cette menace, la strat\u00e9gie de cybers\u00e9curit\u00e9 d&#8217;une entit\u00e9 financi\u00e8re ne peut se limiter \u00e0 une approche exclusivement pr\u00e9ventive des risques<\/strong>. Puisque le \u00ab&nbsp;risque z\u00e9ro&nbsp;\u00bb n\u2019existe pas, elle doit assurer des capacit\u00e9s de gestion de crise et de reconstruction.<\/p>\n\n\n\n<p><strong>Le l\u00e9gislateur s\u2019est empar\u00e9 de cette probl\u00e9matique et a pris des mesures significatives<\/strong>. Ainsi, parall\u00e8lement \u00e0 la directive NIS 2 (<em>Network and Information Systems<\/em>), la r\u00e9glementation DORA (<em>Digital Operational Resilience Act<\/em>), sp\u00e9cifique au secteur financier, entrera en vigueur en janvier 2025. Elle \u00e9tablit des exigences claires en mati\u00e8re de cyber r\u00e9silience et impose d\u2019adopter une approche fond\u00e9e sur les risques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-adopter-une-approche-de-resilience-operationnelle-fondee-sur-les-risques\"><strong>Adopter une approche de r\u00e9silience op\u00e9rationnelle fond\u00e9e sur les risques<\/strong><\/h3>\n\n\n\n<p><strong>L\u2019approche par les risques repose fondamentalement sur la priorisation. <\/strong>Les menaces et sources de risques doivent \u00eatre identifi\u00e9s afin de d\u00e9finir un nombre restreint de macro-sc\u00e9narios potentiels, dont la criticit\u00e9 doit \u00eatre caract\u00e9ris\u00e9e en \u00e9valuant leur probabilit\u00e9 et leur impact sur les activit\u00e9s de l\u2019entit\u00e9. Les activit\u00e9s de l\u2019entit\u00e9 doivent \u00e9galement \u00eatre prioris\u00e9es selon leur criticit\u00e9 afin d\u2019identifier celles qui n\u00e9cessitent une protection et des contr\u00f4les renforc\u00e9s. Ainsi, en concentrant les efforts sur les sc\u00e9narios touchant les activit\u00e9s les plus critiques, cette approche permet d\u2019orienter efficacement les ressources vers les aspects les plus essentiels de l\u2019organisation.<\/p>\n\n\n\n<p><strong>DORA pr\u00e9conise un retour \u00e0 l&#8217;essentiel pour assurer la continuit\u00e9 des activit\u00e9s de l&#8217;entit\u00e9<\/strong>. D\u00e9finir sa strat\u00e9gie de cyber r\u00e9silience n\u00e9cessite de s\u2019interroger sur ce qui est vital pour les activit\u00e9s de l\u2019entit\u00e9 et imp\u00e9rativement n\u00e9cessaire pour leur continuit\u00e9 op\u00e9rationnelle (i.e., infrastructures, applications, assets), en se concentrant sur les sc\u00e9narios les plus critiques. Adopter cette approche pragmatique permet de concentrer les efforts de r\u00e9silience sur ce qui contribue au c\u0153ur de l\u2019activit\u00e9 de l&#8217;entit\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-quelques-bonnes-pratiques-pour-adopter-l-approche-par-les-risques\">Quelques bonnes pratiques pour adopter l&#8217;approche par les risques<\/h3>\n\n\n\n<p><strong>Le point de d\u00e9part incontournable est l\u2019identification des activit\u00e9s critiques pour d\u00e9finir le p\u00e9rim\u00e8tre de la r\u00e9silience<\/strong>. Cela n\u00e9cessite de pouvoir s\u2019appuyer sur un r\u00e9f\u00e9rentiel groupe et stabilis\u00e9 des activit\u00e9s et des processus de l\u2019entreprise. En fonction de l\u2019entreprise, le niveau de granularit\u00e9 de l\u2019analyse peut varier&nbsp;: service m\u00e9tier, macro-activit\u00e9, activit\u00e9 ou processus. Le choix doit se faire de sorte que l\u2019organe de direction puisse prendre des d\u00e9cisions. L\u2019entreprise peut s\u2019appuyer sur un certain nombre de standards et de m\u00e9thodologies existants de gestion des risques et de la continuit\u00e9 d\u2019activit\u00e9 (ex. ISO 27005, ISO 22301, EBIOS RM).<\/p>\n\n\n\n<p><strong>\u00c0 partir des activit\u00e9s critiques, via une approche <em>top-down, <\/em>l\u2019entreprise d\u00e9duit le p\u00e9rim\u00e8tre des applications et infrastructures \u00e0 rendre r\u00e9silientes.<\/strong> L\u2019approche par les risques permet de d\u00e9terminer quels sont v\u00e9ritablement les maillons de la cha\u00eene absolument n\u00e9cessaires au maintien ou \u00e0 la reprise d\u2019activit\u00e9. Cela n\u00e9cessite de challenger et affiner les r\u00e9sultats des Bilans d\u2019Impact sur l\u2019Activit\u00e9 (BIA) produits par les m\u00e9tiers. La traduction des actifs m\u00e9tiers en actifs IT n\u00e9cessite une CMDB \u00e0 jour et suffisamment pr\u00e9cise \u00e0 commencer par les assets IT critiques. Cette cartographie est par ailleurs cl\u00e9 pour r\u00e9pondre au reste des exigences de DORA, pour la classification des incidents comme pour les plans de tests par exemple.<\/p>\n\n\n\n<p><strong>Les d\u00e9pendances d\u2019activit\u00e9s critiques vis-\u00e0-vis de prestataires ou de partenaires externes doivent aussi \u00eatre prises en compte.<\/strong> L\u2019approche par les risques permet de classer les tiers par niveau de criticit\u00e9. L\u2019analyse de risque prend ainsi en compte la substituabilit\u00e9 d\u2019un tiers ou encore le risque de surconcentration d\u2019actifs.<\/p>\n\n\n\n<p><strong>Les actifs identifi\u00e9s \u00e0 rendre r\u00e9silients doivent enfin \u00eatre prioris\u00e9s de sorte \u00e0 dessiner le processus de reconstruction.<\/strong> Les d\u00e9lais de reprise d\u2019activit\u00e9 et les seuils de perte de donn\u00e9es sont aussi \u00e0 challenger en prenant en compte les alternatives m\u00e9tiers par exemple. Cette priorisation entre les assets permettra de faire face \u00e0 un cas de black-out mais aussi \u00e0 une perturbation partielle.<\/p>\n\n\n\n<p><strong>En introduisant une approche par les risques, DORA invite \u00e0 se concentrer sur le plus critique et pose un standard de r\u00e9silience op\u00e9rationnelle, r\u00e9utilisable au-del\u00e0 du secteur financier.<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n<ol class=\"wp-block-footnotes\"><li id=\"96a595fe-2528-4bef-ac42-9ba79183404c\">Netwrix, <em>2023 Hybrid Security Trends Report<\/em>, 2023. url: <a href=\"https:\/\/www.netwrix.com\/2023_hybrid_security_trends_report.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.netwrix.com\/2023_hybrid_security_trends_report.html<\/a> <a href=\"#96a595fe-2528-4bef-ac42-9ba79183404c-link\" aria-label=\"Jump to footnote reference 1\">\u21a9\ufe0e<\/a><\/li><li id=\"34edda33-4372-47d9-bd8f-815b05a6ccd7\">\u201cCOVID-19 and cyber risk in the financial sector\u201d, I\u00f1aki Aldasoro, Jon Frost, Leonardo Gambacorta, David Whyte, <em>BIS Bulletin<\/em> No 37, 14 Janvier 2021. url: <a href=\"https:\/\/www.bis.org\/publ\/bisbull37.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bis.org\/publ\/bisbull37.pdf<\/a> <a href=\"#34edda33-4372-47d9-bd8f-815b05a6ccd7-link\" aria-label=\"Jump to footnote reference 2\">\u21a9\ufe0e<\/a><\/li><li id=\"ee08620a-1001-4500-a731-b058b84188e6\">Banque de France, <em>\u00c9valuation des risques du syst\u00e8me financier fran\u00e7ais<\/em>, 20 d\u00e9cembre 2022. url\u00a0: <a href=\"https:\/\/publications.banque-france.fr\/sites\/default\/files\/medias\/documents\/2022_s2_ers_final.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/publications.banque-france.fr\/sites\/default\/files\/medias\/documents\/2022_s2_ers_final.pdf<\/a> <a href=\"#ee08620a-1001-4500-a731-b058b84188e6-link\" aria-label=\"Jump to footnote reference 3\">\u21a9\ufe0e<\/a><\/li><li id=\"74239451-ad01-4e24-bd7a-83e180236bd1\">Costas Mourselas, Kate Duguid, Joshua Franklin, Hannah Murphy, \u201cRansomware attack on ICBC disrupts trades in US Treasury market\u201d, Financial Times, 10 novembre 2023. url\u00a0: <a href=\"https:\/\/www.ft.com\/content\/8dd2446b-c8da-4854-9edc-bf841069ccb8\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ft.com\/content\/8dd2446b-c8da-4854-9edc-bf841069ccb8<\/a> <a href=\"#74239451-ad01-4e24-bd7a-83e180236bd1-link\" aria-label=\"Jump to footnote reference 4\">\u21a9\ufe0e<\/a><\/li><\/ol><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Auteurs <\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Shen-Lucie-photo-pro-visage.png\" alt=\"Lucie Shen\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucie-shen-8a8347138\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Lucie Shen<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Digital Trust &amp; Security Managing Consultant, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucie-shen-8a8347138\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Lucie porte l&#8217;offre de R\u00e9silience num\u00e9rique de Capgemini Invent. Elle accompagne les organisations pour d\u00e9finir et mettre en \u0153uvre leur strat\u00e9gie de cybers\u00e9curit\u00e9 et de r\u00e9silience.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/samuel_zanin_color.jpg\" alt=\"Samuel Zanin\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/samuel-zanin-32827618b\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Samuel Zanin<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Consultant junior Digital Trust &amp; Security, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/samuel-zanin-32827618b\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Samuel est contributeur sur les offres de R\u00e9silience num\u00e9rique et de Gestion des risques li\u00e9s aux tiers. Il accompagne les organisations pour d\u00e9finir et mettre en \u0153uvre leur strat\u00e9gie de cybers\u00e9curit\u00e9.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 28679265-7619-4c84-b78e-f9faae28f252\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent \">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Faites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tFaites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 75% 47%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CYBER\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CYBER\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Le podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tLe podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Objectif CYBER\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cyber\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 51% 47%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9.<\/p>\n","protected":false},"author":247,"featured_media":742560,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"35cd4bc6-75c4-4ce1-a78f-1fe7bf067b26\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"4122094d-d58d-44df-8f90-7549986e1b30\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"31","_jetpack_memberships_contains_paid_content":false,"footnotes":"[{\"content\":\"Netwrix, <em>2023 Hybrid Security Trends Report<\/em>, 2023. url: <a href=\\\"https:\/\/www.netwrix.com\/2023_hybrid_security_trends_report.html\\\" target=\\\"_blank\\\" rel=\\\"noreferrer noopener\\\">https:\/\/www.netwrix.com\/2023_hybrid_security_trends_report.html<\/a>\",\"id\":\"96a595fe-2528-4bef-ac42-9ba79183404c\"},{\"content\":\"\u201cCOVID-19 and cyber risk in the financial sector\u201d, I\u00f1aki Aldasoro, Jon Frost, Leonardo Gambacorta, David Whyte, <em>BIS Bulletin<\/em> No 37, 14 Janvier 2021. url: <a href=\\\"https:\/\/www.bis.org\/publ\/bisbull37.pdf\\\" target=\\\"_blank\\\" rel=\\\"noreferrer noopener\\\">https:\/\/www.bis.org\/publ\/bisbull37.pdf<\/a>\",\"id\":\"34edda33-4372-47d9-bd8f-815b05a6ccd7\"},{\"content\":\"Banque de France, <em>\u00c9valuation des risques du syst\u00e8me financier fran\u00e7ais<\/em>, 20 d\u00e9cembre 2022. url\u00a0: <a href=\\\"https:\/\/publications.banque-france.fr\/sites\/default\/files\/medias\/documents\/2022_s2_ers_final.pdf\\\" target=\\\"_blank\\\" rel=\\\"noreferrer noopener\\\">https:\/\/publications.banque-france.fr\/sites\/default\/files\/medias\/documents\/2022_s2_ers_final.pdf<\/a>\",\"id\":\"ee08620a-1001-4500-a731-b058b84188e6\"},{\"content\":\"Costas Mourselas, Kate Duguid, Joshua Franklin, Hannah Murphy, \u201cRansomware attack on ICBC disrupts trades in US Treasury market\u201d, Financial Times, 10 novembre 2023. url\u00a0: <a href=\\\"https:\/\/www.ft.com\/content\/8dd2446b-c8da-4854-9edc-bf841069ccb8\\\" target=\\\"_blank\\\" rel=\\\"noreferrer noopener\\\">https:\/\/www.ft.com\/content\/8dd2446b-c8da-4854-9edc-bf841069ccb8<\/a>\",\"id\":\"74239451-ad01-4e24-bd7a-83e180236bd1\"}]","featured_focal_points":""},"categories":[5],"tags":[192],"brand":[31],"service":[47],"industry":[],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-742555","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technologies","tag-cybersecurite","brand-capgemini-invent","service-cybersecurite","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DORA ou l&#039;approche fond\u00e9e sur les risques - Capgemini France<\/title>\n<meta name=\"description\" content=\"En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA ou l&#039;approche fond\u00e9e sur les risques\" \/>\n<meta property=\"og:description\" content=\"En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-12T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T05:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/webpreview_DORA_v3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lucie Shen et Samuel Zanin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"quentinkieken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\"},\"author\":{\"name\":\"quentinkieken\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c\"},\"headline\":\"DORA ou l&#8217;approche fond\u00e9e sur les risques\",\"datePublished\":\"2024-02-12T08:00:00+00:00\",\"dateModified\":\"2025-03-04T05:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\"},\"wordCount\":923,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Technologies\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\",\"name\":\"DORA ou l'approche fond\u00e9e sur les risques - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg\",\"datePublished\":\"2024-02-12T08:00:00+00:00\",\"dateModified\":\"2025-03-04T05:50:00+00:00\",\"description\":\"En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg\",\"width\":5616,\"height\":3744},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c\",\"name\":\"quentinkieken\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/quentinkieken\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DORA ou l'approche fond\u00e9e sur les risques - Capgemini France","description":"En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/","og_locale":"fr_FR","og_type":"article","og_title":"DORA ou l'approche fond\u00e9e sur les risques","og_description":"En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/","og_site_name":"Capgemini France","article_published_time":"2024-02-12T08:00:00+00:00","article_modified_time":"2025-03-04T05:50:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/webpreview_DORA_v3.png","type":"image\/png"}],"author":"Lucie Shen et Samuel Zanin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"quentinkieken","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/"},"author":{"name":"quentinkieken","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c"},"headline":"DORA ou l&#8217;approche fond\u00e9e sur les risques","datePublished":"2024-02-12T08:00:00+00:00","dateModified":"2025-03-04T05:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/"},"wordCount":923,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Technologies"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/","name":"DORA ou l'approche fond\u00e9e sur les risques - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg","datePublished":"2024-02-12T08:00:00+00:00","dateModified":"2025-03-04T05:50:00+00:00","description":"En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg","width":5616,"height":3744},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c","name":"quentinkieken","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/quentinkieken\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":5,"name":"Technologies","slug":"technologies"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"brand":[{"id":31,"name":"Capgemini Invent","slug":"capgemini-invent"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"DORA ou l&#8217;approche fond\u00e9e sur les risques","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg"},"articleSection":"Technologies","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2024-02-12T08:00:00Z","datePublished":"2024-02-12T08:00:00Z","dateModified":"2025-03-04T05:50:00Z"},"rendered":"<meta name=\"parsely-title\" content=\"DORA ou l&#8217;approche fond\u00e9e sur les risques\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-02-12T08:00:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Technologies\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":755230,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/","url_meta":{"origin":742555,"position":0},"title":"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9","author":"quentinkieken","date":"July 2, 2024","format":false,"excerpt":"En mati\u00e8re de politiques de s\u00e9curit\u00e9 informatique, les tests constituent l\u2019un des piliers fondamentaux, autant pour valider l\u2019efficacit\u00e9 des dispositifs mis en place pour prot\u00e9ger les syst\u00e8mes que pour r\u00e9v\u00e9ler des br\u00e8ches restant \u00e0 colmater.\u00a0\u00a0","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":747040,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-dora-gouvernance\/","url_meta":{"origin":742555,"position":1},"title":"NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences","author":"quentinkieken","date":"March 13, 2024","format":false,"excerpt":"Afin de s\u00e9curiser davantage le tissu \u00e9conomique face \u00e0 des risques num\u00e9riques grandissants, l\u2019Union europ\u00e9enne a adopt\u00e9 en 2022 deux textes majeurs qui entreront prochainement en vigueur\u00a0: NIS2 et DORA.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":783323,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/","url_meta":{"origin":742555,"position":2},"title":"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?","author":"Tarek Edde Gomez","date":"March 20, 2025","format":false,"excerpt":"Bien que les r\u00e8glementations europ\u00e9ennes DORA et NIS 2 n\u2019aient ni le m\u00eame p\u00e9rim\u00e8tre ni tout \u00e0 fait le m\u00eame objectif, ces deux textes partagent de nombreux points communs, parmi lesquels l\u2019attention toute particuli\u00e8re port\u00e9e \u00e0 la gestion des incidents. Celle-ci doit d\u00e9sormais faire l\u2019objet d\u2019une d\u00e9marche structur\u00e9e, pr\u00e9voyant la\u2026","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"NSI 2_DORA_refletlunettes_Gettyimages","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":778710,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/","url_meta":{"origin":742555,"position":3},"title":"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0","author":"Tarek Edde Gomez","date":"March 13, 2025","format":false,"excerpt":"Conscientes qu\u2019en mati\u00e8re d\u2019IT le risque z\u00e9ro n\u2019existe pas, de plus en plus d\u2019organisations ont mis en place des dispositifs et des proc\u00e9dures afin de r\u00e9agir efficacement en cas d\u2019incident de s\u00e9curit\u00e9.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":787594,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","url_meta":{"origin":742555,"position":4},"title":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9","author":"anne.gautier@capgemini.com","date":"July 3, 2025","format":false,"excerpt":"Malgr\u00e9 les incertitudes r\u00e9glementaires, les organisations doivent investir d\u00e8s maintenant dans l\u2019IA pour la cybers\u00e9curit\u00e9, tout en avan\u00e7ant avec prudence, en encadrant son usage par une gouvernance rigoureuse et une veille continue.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":744171,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","url_meta":{"origin":742555,"position":5},"title":"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9","author":"anne.gautier@capgemini.com","date":"March 7, 2024","format":false,"excerpt":"Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d'adaptation face \u00e0 l'\u00e9volution rapide des menaces et des technologies.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/742555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/247"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=742555"}],"version-history":[{"count":17,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/742555\/revisions"}],"predecessor-version":[{"id":778750,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/742555\/revisions\/778750"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/742560"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=742555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=742555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=742555"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=742555"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=742555"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=742555"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=742555"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=742555"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=742555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}