{"id":744171,"date":"2024-03-07T17:17:00","date_gmt":"2024-03-07T16:17:00","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=744171"},"modified":"2025-03-04T06:47:36","modified_gmt":"2025-03-04T05:47:36","slug":"cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","title":{"rendered":"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Abdembi-Miraoui-PC.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Abdembi Miraoui<\/h5><h5 class=\"blog-date\">7 mars 2024<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Depuis toujours, le cloud et la cybers\u00e9curit\u00e9 \u00e9voluent de fa\u00e7on parall\u00e8le et indissociable. Au fil de ses innovations, le cloud cr\u00e9e un nouveau paysage informatique sur lequel planent de nouvelles menaces, auxquelles r\u00e9pondent de nouvelles solutions de cybers\u00e9curit\u00e9, qui tirent elles-m\u00eames partie du cloud !<\/h2><p class=\"intro-para-content\">Cet \u00e9ternel pas de deux m\u00e8ne aujourd\u2019hui \u00e0 une forme de maturit\u00e9 avec, d\u2019une part, des fournisseurs de cloud qui ont pris \u00e0 bras-le-corps la question de la s\u00e9curit\u00e9 et, d\u2019autre part, une offre de cybers\u00e9curit\u00e9 qui a su faire \u00e9voluer ses concepts et ses technologies par et pour le cloud.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>La s\u00e9curisation du cloud commence par une distinction entre la s\u00e9curit\u00e9 du cloud, c\u2019est-\u00e0-dire des infrastructures elles-m\u00eames, et la s\u00e9curit\u00e9 dans le cloud, c\u2019est-\u00e0-dire des donn\u00e9es et des applications qui s\u2019y trouvent. La premi\u00e8re incombe au fournisseur de cloud, la seconde \u00e0 son client. Le fournisseur s\u2019engage \u00e0 prot\u00e9ger sa plateforme de toute vuln\u00e9rabilit\u00e9 qui puisse causer une d\u00e9t\u00e9rioration de la qualit\u00e9 de service, entra\u00eener une perte accidentelle de donn\u00e9es, ou servir, m\u00eame indirectement, de porte d\u2019entr\u00e9e vers les donn\u00e9es de ses clients. Le client, pour sa part, doit mettre en \u0153uvre tous les dispositifs de protection n\u00e9cessaires pour limiter l\u2019acc\u00e8s \u00e0 ses actifs h\u00e9berg\u00e9s dans le cloud aux seules personnes autoris\u00e9es. Il est fondamental que ces r\u00f4les soient bien clarifi\u00e9s d\u2019embl\u00e9e, contractuellement et op\u00e9rationnellement, pour ne pas laisser subsister des zones grises, mal couvertes, dans lesquelles ne manqueraient pas de se glisser des acteurs malveillants.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-securite-superieure-a-n-importe-quel-data-center-prive\">Une s\u00e9curit\u00e9 sup\u00e9rieure \u00e0 n\u2019importe quel data center priv\u00e9<\/h2>\n\n\n\n<p>Instaur\u00e9 depuis l\u2019origine du cloud, ce mod\u00e8le de responsabilit\u00e9s partag\u00e9es est aujourd\u2019hui bien connu des acteurs, m\u00eame s\u2019il arrive, sur certains services, que les fronti\u00e8res demeurent floues. Les hyperscalers, en particulier, ont pris conscience que leurs plateformes sont des cibles privil\u00e9gi\u00e9es, que tout incident de s\u00e9curit\u00e9 leur est extr\u00eamement pr\u00e9judiciable, et ils mettent donc tout en \u0153uvre pour s\u2019en pr\u00e9munir. Depuis de nombreuses ann\u00e9es, ils investissent massivement dans la s\u00e9curisation de leurs plateformes et dans les solutions de s\u00e9curit\u00e9 qu\u2019ils proposent \u00e0 leurs clients. \u00c9tant donn\u00e9 les moyens consid\u00e9rables dont ils disposent, les plateformes cloud sont d\u00e9sormais beaucoup plus s\u00fbres que n\u2019importe quel data center d\u2019entreprise et les incidents, bien que tr\u00e8s m\u00e9diatis\u00e9s, demeurent rares.<\/p>\n\n\n\n<p>Ceci ne veut pas dire que le client puisse pour autant s\u2019en remettre aveugl\u00e9ment \u00e0 son fournisseur de cloud. Il doit obtenir de sa part des pr\u00e9cisions sur la fa\u00e7on dont seront trait\u00e9es ses donn\u00e9es depuis leur cr\u00e9ation jusqu\u2019\u00e0 leur suppression. Il faut s\u2019int\u00e9resser, en particulier, \u00e0 leur localisation, \u00e0 leurs transferts \u00e9ventuels, \u00e0 leur \u00e9tanch\u00e9it\u00e9 vis-\u00e0-vis des autres clients, \u00e0 la fa\u00e7on dont elles seront prot\u00e9g\u00e9es et restaur\u00e9es en cas d\u2019incident logique ou physique, ou encore \u00e0 leur restitution et leur destruction lors de la r\u00e9siliation du contrat. Le cloud provider doit pouvoir d\u00e9tailler les divers m\u00e9canismes et contr\u00f4les pr\u00e9vus, et prouver qu\u2019ils ont \u00e9t\u00e9 ex\u00e9cut\u00e9s correctement. Les acteurs du cloud ont pris note de ces exigences et s\u2019attachent d\u00e9sormais \u00e0 les satisfaire. Avec le d\u00e9veloppement actuel d\u2019offres de cloud souverain, ils r\u00e9pondent par exemple \u00e0 la pr\u00e9occupation l\u00e9gitime de certains secteurs sensibles de pouvoir se pr\u00e9munir de possibles interf\u00e9rences \u00e9trang\u00e8res.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-iam-chiffrement-visibilite-les-trois-priorites-des-clients\">IAM, chiffrement, visibilit\u00e9 : les trois priorit\u00e9s des clients<\/h2>\n\n\n\n<p>Pour ce qui concerne le client, responsable de la s\u00e9curit\u00e9 dans le cloud, trois aspects n\u00e9cessitent tout particuli\u00e8rement son attention. Premi\u00e8rement, la gestion des identit\u00e9s et des acc\u00e8s, de loin l\u2019\u00e9l\u00e9ment le plus important de toute politique de s\u00e9curit\u00e9. Deuxi\u00e8mement, le chiffrement, indispensable et pour lequel il peut s\u2019appuyer sur les solutions fournies par son provider. Troisi\u00e8mement, enfin, la visibilit\u00e9, car pour garantir la s\u00e9curit\u00e9 de ses syst\u00e8mes dans le cloud \u2013 ou, bien souvent, les clouds \u2013, il est essentiel de savoir ce qu\u2019il s\u2019y passe \u00e0 chaque instant et de pouvoir s\u2019assurer que les r\u00e8gles sont bien respect\u00e9es.<\/p>\n\n\n\n<p>Ce besoin de supervision d\u2019environnements toujours plus vastes, h\u00e9t\u00e9rog\u00e8nes et dynamiques est l\u2019un des moteurs de l\u2019\u00e9volution constante des solutions de cybers\u00e9curit\u00e9 pour s\u2019adapter au contexte du cloud. C\u2019est ainsi que l\u2019on voit \u00e9merger toute une famille de solutions innovantes, sp\u00e9cifiquement con\u00e7ues pour r\u00e9pondre aux d\u00e9fis pos\u00e9s par le cloud, telles les CNAPP (Cloud-Native Applications Protection Platform), les CASB (Cloud Access Security Broker) et et les SSPM (SaaS Security Posture Management). D\u2019un autre c\u00f4t\u00e9, les solutions qui adressent des enjeux plus traditionnels \u00e9voluent pour quitter le data center et migrer \u00e0 leur tour dans le cloud, en mode SaaS. C\u2019est par exemple le cas de la gestion des acc\u00e8s distants o\u00f9 l\u2019on passe du VPN, dont l\u2019explosion du t\u00e9l\u00e9travail durant la crise sanitaire a montr\u00e9 les limites, aux <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust Network Access<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-toujours-avoir-une-approche-fondee-sur-le-risque\">Toujours avoir une approche fond\u00e9e sur le risque<\/h2>\n\n\n\n<p>Si ces solutions cloudifi\u00e9es apportent des avantages ind\u00e9niables, c\u2019est aussi un peu le serpent qui se mord la queue car, \u00e9tant elles-m\u00eames dans le cloud, elles peuvent aussi, dans certains cas, s\u2019accompagner de nouvelles menaces. La r\u00e8gle d\u2019or est donc d\u2019avoir toujours une approche fond\u00e9e sur le risque et une attitude vigilante mais d\u00e9nu\u00e9e de pr\u00e9jug\u00e9s (sur le cloud en g\u00e9n\u00e9ral, sur la nationalit\u00e9 des acteurs\u2026). De cette fa\u00e7on, on optera toujours pour la meilleure approche en fonction de la sensibilit\u00e9 des actifs \u00e0 prot\u00e9ger et de la maturit\u00e9 des solutions disponibles, ce qui \u00e9vitera aussi bien les surprotections co\u00fbteuses que les sous-protections dangereuses. La gestion des cl\u00e9s de chiffrement en constitue un bon exemple puisqu\u2019on pourra, selon les cas, la confier au cloud provider, \u00e0 un tiers de confiance ou en conserver le contr\u00f4le.<\/p>\n\n\n\n<p>Le cloud comme la cybers\u00e9curit\u00e9 continuent d\u2019\u00e9voluer de concert, constamment, et tr\u00e8s vite, tant du point de vue des menaces que des parades disponibles. Ainsi, l\u2019intelligence artificielle (IA), en cr\u00e9ant de nouveaux usages, engendre de nouveaux risques, mais elle est aussi mise \u00e0 profit pour cr\u00e9er de nouvelles capacit\u00e9s de d\u00e9tection et de rem\u00e9diation. Alors que les comp\u00e9tences se font rares, le d\u00e9fi, pour les entreprises, est de rester \u00e0 la pointe de la s\u00e9curit\u00e9 pour pouvoir tirer pleinement parti des innovations cloud.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Auteur<\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Abdembi-Miraoui-PC.jpg\" alt=\"Abdembi Miraoui\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/abdembi-miraoui-57344245\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Abdembi Miraoui<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Co-Head of Service Line \u201cCloud, Endpoint &amp; Infrastructure Security\u201d<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/abdembi-miraoui-57344245\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Abdembi est un expert dans le domaine de la cybers\u00e9curit\u00e9, avec une expertise particuli\u00e8re dans les sujets cl\u00e9s tels que le Cloud, les Endpoints et l&#8217;infrastructure. Il est responsable de la service line cybers\u00e9curit\u00e9 &#8220;Cloud, Endpoint &#038; Infrastructure Security&#8221; au sein de l&#8217;entit\u00e9 cybers\u00e9curit\u00e9 du groupe. Gr\u00e2ce \u00e0 ses connaissances pointues et son exp\u00e9rience approfondie acquise depuis plus de 15 ans. Abdembi est capable de fournir des conseils avis\u00e9s sur les enjeux de cybers\u00e9curit\u00e9 les plus complexes. Il est passionn\u00e9 par sa mission de prot\u00e9ger les entreprises contre les cybermenaces et de renforcer la r\u00e9silience de leurs syst\u00e8mes.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider next\"><\/button><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-learn-more learnMoreBlock updated-new-sample-amal\"><div class=\"container\"><div class=\"content-title\"><h2 class=\"learnmore-heading\">Nos autres articles de blog<\/h2><\/div><div class=\"row\"><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/\" target=\"\" aria-label=\"<a href=&quot;https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/&quot;&gt;Confiance dans le cloud\u00a0: la s\u00e9curit\u00e9 est cl\u00e9<\/a&gt;\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/\">Confiance dans le cloud\u00a0: la s\u00e9curit\u00e9 est cl\u00e9<\/a><\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Le cloud a amplement d\u00e9montr\u00e9 ses b\u00e9n\u00e9fices en termes d\u2019agilit\u00e9, de rapidit\u00e9 et de capacit\u00e9 d\u2019innovation.<\/p><\/div><\/div><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\" target=\"\" aria-label=\"<a href=&quot;https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/&quot;&gt;Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison<\/a&gt;\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\">Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison<\/a><\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\" target=\"_blank\" rel=\"noreferrer noopener\"><br><\/a>Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est \u00e0 priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le.<\/p><\/div><\/div><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-donnees-dans-environnement-cloud\/\" target=\"\" aria-label=\"<a href=&quot;https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-donnees-dans-environnement-cloud\/&quot;&gt;S\u00e9curiser les donn\u00e9es dans un environnement cloud\u00a0<\/a&gt;\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-167167826.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-donnees-dans-environnement-cloud\/\">S\u00e9curiser les donn\u00e9es dans un environnement cloud\u00a0<\/a><\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">\u00c0 l\u2019\u00e8re du cloud, la data est partout, circulant entre les syst\u00e8mes, se d\u00e9ployant sur d\u2019innombrables terminaux. \u00a0Elle doit \u00eatre disponible \u00e0 tout moment pour quiconque en a besoin.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 6abf7470-89e1-4979-ad3c-88bc56fe991c\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CLOUD\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CLOUD\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Explorez le potentiel du cloud avec notre podcast d\u00e9di\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tExplorez le potentiel du cloud avec notre podcast d\u00e9di\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Objectif CLOUD\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cloud\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cloud\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCloud\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Acc\u00e9l\u00e9rez votre transformation vers le cloud avec un partenaire de confiance\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tAcc\u00e9l\u00e9rez votre transformation vers le cloud avec un partenaire de confiance\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Cloud\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cloud\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/Capgemini_Mountain_landscape.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/Capgemini_Mountain_landscape.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/Capgemini_Mountain_landscape.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/Capgemini_Mountain_landscape.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/Capgemini_Mountain_landscape.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/Capgemini_Mountain_landscape.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CYBER\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CYBER\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Le podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tLe podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Objectif CYBER\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cyber\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d&#8217;adaptation face \u00e0 l&#8217;\u00e9volution rapide des menaces et des technologies.<\/p>\n","protected":false},"author":166,"featured_media":744939,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"cb090ea2-90fb-4e67-beb9-6a60ac6fccc0\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"0e55849c-837c-4c32-87ce-de9bdca21c61\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[3,5,138],"tags":[188,192],"brand":[30],"service":[35,47],"industry":[],"partners":[],"blog-topic":[350,354],"content-group":[],"class_list":["post-744171","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","category-technologies","category-transformation","tag-cloud","tag-cybersecurite","brand-capgemini","service-cloud","service-cybersecurite","blog-topic-cloud","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9 - Capgemini France<\/title>\n<meta name=\"description\" content=\"Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d&#039;adaptation face \u00e0 l&#039;\u00e9volution rapide des menaces et des technologies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d&#039;adaptation face \u00e0 l&#039;\u00e9volution rapide des menaces et des technologies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-07T16:17:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T05:47:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Webpreview-blog-7Mars-cloud-et-cyber-un-pas-de-deux-vers-la-maturite-NewDesign.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abdembi Miraoui\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Webpreview-blog-7Mars-cloud-et-cyber-un-pas-de-deux-vers-la-maturite-NewDesign.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@anne.gautier@capgemini.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"anne.gautier@capgemini.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\"},\"author\":{\"name\":\"anne.gautier@capgemini.com\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e\"},\"headline\":\"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9\",\"datePublished\":\"2024-03-07T16:17:00+00:00\",\"dateModified\":\"2025-03-04T05:47:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\"},\"wordCount\":1298,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg\",\"keywords\":[\"Cloud\",\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Innovation\",\"Technologies\",\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\",\"name\":\"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9 - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg\",\"datePublished\":\"2024-03-07T16:17:00+00:00\",\"dateModified\":\"2025-03-04T05:47:36+00:00\",\"description\":\"Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d'adaptation face \u00e0 l'\u00e9volution rapide des menaces et des technologies.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg\",\"width\":3000,\"height\":1981},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e\",\"name\":\"anne.gautier@capgemini.com\",\"sameAs\":[\"https:\/\/x.com\/anne.gautier@capgemini.com\",\"anne.gautier@capgemini.com\"],\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/anne-gautiercapgemini-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9 - Capgemini France","description":"Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d'adaptation face \u00e0 l'\u00e9volution rapide des menaces et des technologies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","og_locale":"fr_FR","og_type":"article","og_title":"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9","og_description":"Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d'adaptation face \u00e0 l'\u00e9volution rapide des menaces et des technologies.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","og_site_name":"Capgemini France","article_published_time":"2024-03-07T16:17:00+00:00","article_modified_time":"2025-03-04T05:47:36+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Webpreview-blog-7Mars-cloud-et-cyber-un-pas-de-deux-vers-la-maturite-NewDesign.jpg","type":"image\/jpeg"}],"author":"Abdembi Miraoui","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Webpreview-blog-7Mars-cloud-et-cyber-un-pas-de-deux-vers-la-maturite-NewDesign.jpg","twitter_creator":"@anne.gautier@capgemini.com","twitter_misc":{"Written by":"anne.gautier@capgemini.com","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/"},"author":{"name":"anne.gautier@capgemini.com","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e"},"headline":"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9","datePublished":"2024-03-07T16:17:00+00:00","dateModified":"2025-03-04T05:47:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/"},"wordCount":1298,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg","keywords":["Cloud","Cybers\u00e9curit\u00e9"],"articleSection":["Innovation","Technologies","Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","name":"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9 - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg","datePublished":"2024-03-07T16:17:00+00:00","dateModified":"2025-03-04T05:47:36+00:00","description":"Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d'adaptation face \u00e0 l'\u00e9volution rapide des menaces et des technologies.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg","width":3000,"height":1981},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e","name":"anne.gautier@capgemini.com","sameAs":["https:\/\/x.com\/anne.gautier@capgemini.com","anne.gautier@capgemini.com"],"url":"https:\/\/www.capgemini.com\/fr-fr\/author\/anne-gautiercapgemini-com\/"}]}},"blog_topic_info":[{"id":350,"name":"Cloud"},{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":3,"name":"Innovation","slug":"innovation"},{"id":5,"name":"Technologies","slug":"technologies"},{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":188,"name":"Cloud","slug":"cloud"},{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":35,"name":"Cloud","slug":"cloud"},{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":350,"name":"Cloud","slug":"cloud"},{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg"},"articleSection":"Innovation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cloud","cybers\u00e9curit\u00e9"],"dateCreated":"2024-03-07T16:17:00Z","datePublished":"2024-03-07T16:17:00Z","dateModified":"2025-03-04T05:47:36Z"},"rendered":"<meta name=\"parsely-title\" content=\"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-03-07T16:17:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Innovation\" \/>\n<meta name=\"parsely-tags\" content=\"cloud,cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":769739,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","url_meta":{"origin":744171,"position":0},"title":"La s\u00e9curit\u00e9 des applications dans le cloud","author":"Tarek Edde Gomez","date":"November 27, 2024","format":false,"excerpt":"La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche comme le mod\u00e8le Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":750452,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/","url_meta":{"origin":744171,"position":1},"title":"Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP","author":"anne.gautier@capgemini.com","date":"April 11, 2024","format":false,"excerpt":"Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":754478,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/","url_meta":{"origin":744171,"position":2},"title":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9","author":"anne.gautier@capgemini.com","date":"June 13, 2024","format":false,"excerpt":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9Louis-Xavier Haensler13 juin 2024 FacebookLinkedinBien que cela soit rarement la motivation premi\u00e8re, une migration vers le cloud pr\u00e9sente de nombreux avantages en mati\u00e8re de s\u00e9curit\u00e9. En effet, basculer vers le cloud, c\u2019est b\u00e9n\u00e9ficier d\u2019une infrastructure plus r\u00e9siliente et plus r\u00e9sistante, de l\u2019application imm\u00e9diate des\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":713145,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/","url_meta":{"origin":744171,"position":3},"title":"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison","author":"","date":"March 9, 2023","format":false,"excerpt":"Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est \u00e0 priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le. Il peut s\u2019agir de donn\u00e9es personnelles, bancaires ou de sant\u00e9, de propri\u00e9t\u00e9 intellectuelle, ou encore de documents\u2026","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":796179,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-souverainete-numerique\/","url_meta":{"origin":744171,"position":4},"title":"Souverainet\u00e9 num\u00e9rique\u00a0: l\u2019heure de la maturit\u00e9, le temps de l\u2019action","author":"Tarek Edde Gomez","date":"November 13, 2025","format":false,"excerpt":"Longtemps rest\u00e9e th\u00e9orique, la souverainet\u00e9 num\u00e9rique devient aujourd\u2019hui un crit\u00e8re concret de d\u00e9cision IT, gr\u00e2ce \u00e0 l\u2019\u00e9mergence de cadres juridiques et de solutions technologiques adapt\u00e9es.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/07\/2022-FR-Featured-Image-CP-Cloud-Souverain.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/07\/2022-FR-Featured-Image-CP-Cloud-Souverain.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/07\/2022-FR-Featured-Image-CP-Cloud-Souverain.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/07\/2022-FR-Featured-Image-CP-Cloud-Souverain.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":724456,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-un-tremplin-vers-linformatique-quantique\/","url_meta":{"origin":744171,"position":5},"title":"Le cloud, un tremplin vers l\u2019informatique quantique","author":"","date":"July 13, 2023","format":false,"excerpt":"M\u00eame si l\u2019informatique quantique reste, pour une large part, un domaine exp\u00e9rimental, ses progr\u00e8s sont si rapides que l\u2019heure de sa diffusion \u00e0 grande \u00e9chelle approche \u00e0 grands pas. D\u2019ores et d\u00e9j\u00e0, il existe des syst\u00e8mes parfaitement op\u00e9rationnels qui permettent de toucher du doigt ses possibilit\u00e9s ph\u00e9nom\u00e9nales.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/07\/GettyImages-1393513197.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/07\/GettyImages-1393513197.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/07\/GettyImages-1393513197.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/07\/GettyImages-1393513197.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/744171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=744171"}],"version-history":[{"count":19,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/744171\/revisions"}],"predecessor-version":[{"id":776571,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/744171\/revisions\/776571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/744939"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=744171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=744171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=744171"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=744171"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=744171"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=744171"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=744171"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=744171"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=744171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}