{"id":754478,"date":"2024-06-13T10:38:17","date_gmt":"2024-06-13T08:38:17","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=754478"},"modified":"2025-03-04T06:44:12","modified_gmt":"2025-03-04T05:44:12","slug":"migrations-cloud-et-gouvernance-de-la-securite","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/","title":{"rendered":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Migrations cloud et gouvernance de la s\u00e9curit\u00e9<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/05\/Pic-Louis-Xavier-Haensler.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Louis-Xavier Haensler<\/h5><h5 class=\"blog-date\">13 juin 2024<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Bien que cela soit rarement la motivation premi\u00e8re, une migration vers le cloud pr\u00e9sente de nombreux avantages en mati\u00e8re de s\u00e9curit\u00e9. <\/h2><p class=\"intro-para-content\">En effet, basculer vers le cloud, c\u2019est b\u00e9n\u00e9ficier d\u2019une infrastructure plus r\u00e9siliente et plus r\u00e9sistante, de l\u2019application imm\u00e9diate des correctifs et des mises \u00e0 jour techniques et r\u00e9glementaires, et de ressources de cybers\u00e9curit\u00e9 \u00e0 l\u2019\u00e9tat de l\u2019art, g\u00e9n\u00e9ralement sous forme de services nativement int\u00e9gr\u00e9s \u00e0 la plateforme (chiffrement, IAM\u2026).<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>Ceci ne d\u00e9charge cependant pas le client de sa responsabilit\u00e9 sur des aspects de s\u00e9curit\u00e9 qui lui incombent, notamment celle des donn\u00e9es et des acc\u00e8s qui vont \u00e9voluer avec ce nouvel environnement (\u00ab\u202fs\u00e9curit\u00e9 dans le cloud\u202f\u00bb). La transformation cloud a donc des cons\u00e9quences importantes sur la fa\u00e7on dont la s\u00e9curit\u00e9 est organis\u00e9e et g\u00e9r\u00e9e au sein de l\u2019organisation puisqu\u2019il va falloir l\u2019adapter \u00e0 la fois \u00e0 de nouveaux syst\u00e8mes, \u00e0 un p\u00e9rim\u00e8tre de responsabilit\u00e9s red\u00e9fini et \u00e0 des risques sp\u00e9cifiques, li\u00e9s, par exemple, \u00e0 la multiplication des <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-donnees-dans-environnement-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">transferts de donn\u00e9es<\/a> ou \u00e0 la difficult\u00e9 d\u2019isoler certaines ressources mutualis\u00e9es.<\/p>\n\n\n\n<p>Pour que ces syst\u00e8mes dans le cloud soient convenablement prot\u00e9g\u00e9s, on ne peut donc se contenter de transposer telles quelles les dispositions prises pour les syst\u00e8mes on-premise. Il faut d\u00e9finir et mettre en place un nouveau mod\u00e8le en faisant \u00e9voluer la politique de s\u00e9curit\u00e9, l\u2019organisation charg\u00e9e de la faire appliquer ainsi que sa gouvernance, ses proc\u00e9dures et ses outils.<\/p>\n\n\n\n<p>Dans ce nouveau mod\u00e8le, toutes les activit\u00e9s ne vont pas \u00eatre impact\u00e9es de la m\u00eame mani\u00e8re. Certaines activit\u00e9s, comme la gestion des acc\u00e8s, ne n\u00e9cessiteront qu\u2019un ajustement de param\u00e8tres. D\u2019autres, en revanche, seront nouvelles vont \u00e9voluer, comme la gestion des logs au niveau du SOC. C\u2019est aussi le cas de la gestion des tiers avec notamment des fournisseurs de cloud en mesure d\u2019imposer leurs conditions en termes de droit de regard ou de contr\u00f4le de leurs activit\u00e9s. Il peut en d\u00e9couler des rigidit\u00e9s techniques, op\u00e9rationnelles ou contractuelles qu\u2019il faudra pouvoir prendre en compte (par exemple, l\u2019impossibilit\u00e9 de les soumettre \u00e0 ses propres audits de s\u00e9curit\u00e9 et n\u00e9cessit\u00e9 de les adapter).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-evolution-des-competences-des-roles-des-responsabilites\">\u00c9volution des comp\u00e9tences, des r\u00f4les, des responsabilit\u00e9s<\/h2>\n\n\n\n<p>Pour mettre en \u0153uvre ce nouveau mod\u00e8le, on pourra s\u2019appuyer soit sur ses \u00e9quipes internes, soit sur des services propos\u00e9s par les fournisseurs de cloud. Dans le premier cas, il sera n\u00e9cessaire de renforcer les comp\u00e9tences de ses collaborateurs (upskilling), voire d\u2019embaucher des sp\u00e9cialistes, par exemple sur les nouvelles architectures, car le p\u00e9rim\u00e8tre sera \u00e0 la fois plus vaste et plus complexe. Dans le second cas, il faudra red\u00e9ployer ses ressources (reskilling), notamment pour piloter le prestataire.<\/p>\n\n\n\n<p>Au sein de l\u2019organisation s\u00e9curit\u00e9, certains r\u00f4les vont aussi \u00e9voluer. Ce sera le cas du SOC, dont le p\u00e9rim\u00e8tre et les moyens d\u2019action vont changer. Ce sera aussi le cas du DPO (Data Protection Office) et de la GRC (Governance, Risks &amp; Compliance), qui devront appr\u00e9hender toutes les implications des nouvelles modalit\u00e9s de stockage, d\u2019acc\u00e8s et d\u2019\u00e9change des donn\u00e9es. En particulier, c\u2019est \u00e0 eux que se posera la question \u00e9mergente de la souverainet\u00e9 et de la protection des donn\u00e9es vis-\u00e0-vis des lois extraterritoriales.&nbsp;<\/p>\n\n\n\n<p>Enfin, le cloud soul\u00e8ve des interrogations nouvelles en mati\u00e8re de responsabilit\u00e9. La plupart des risques et des incidents se situent en effet au niveau des interfaces entre l\u2019organisation et ses fournisseurs, ou entre les services d\u2019un ou plusieurs fournisseurs. Il est imp\u00e9ratif de d\u00e9terminer qui surveille ces zones parfois floues et qui doit rem\u00e9dier \u00e0 d\u2019\u00e9ventuels incidents. Dans la mesure du possible, il faudra clarifier ces points dans les contrats de service avec l\u2019aide du service juridique.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-un-enjeu-culturel-au-dela-de-la-fonction-securite\">Un enjeu culturel au-del\u00e0 de la fonction s\u00e9curit\u00e9<\/h2>\n\n\n\n<p>En fixant les grands principes en mati\u00e8re de s\u00e9curit\u00e9, la politique de s\u00e9curit\u00e9 permet d\u2019avoir une approche coh\u00e9rente sur l\u2019ensemble des syst\u00e8mes auxquels elle s\u2019impose. Avec l\u2019arriv\u00e9e du cloud (et plus encore dans des configurations hybrides ou multiclouds), elle devra \u00eatre r\u00e9vis\u00e9e et adapt\u00e9e pour int\u00e9grer ces nouveaux environnements. Ces adaptations devront notamment tenir compte des usages envisag\u00e9s pour le cloud et de sa doctrine d\u2019utilisation. Ainsi, le passage au cloud s\u2019accompagne souvent d\u2019un champ d\u2019action accrue pour les \u00e9quipes\u202f: il faudra donc fixer les guidelines en cons\u00e9quence afin d\u2019encadrer les nouvelles pratiques, ceci en faisant bien comprendre aux utilisateurs qu\u2019il s\u2019agit bien d\u2019une protection et non d\u2019une contrainte.<\/p>\n\n\n\n<p>La s\u00e9curit\u00e9 dans le cloud passe donc aussi par un changement de culture \u00e0 tous les niveaux, et des actions de formation et de sensibilisation devront \u00eatre men\u00e9es aupr\u00e8s des \u00e9quipes s\u00e9curit\u00e9, bien s\u00fbr, mais aussi des \u00e9quipes IT non s\u00e9curit\u00e9 (architectes, d\u00e9veloppeurs\u2026) et m\u00eame des utilisateurs m\u00e9tiers, qui doivent comprendre les capacit\u00e9s mais aussi les risques d\u2019un outil aussi puissant. Comprendre&nbsp;permettra aux interlocuteurs m\u00e9tiers de l\u2019IT de pouvoir choisir la meilleure solution propos\u00e9e par l\u2019IT en connaissance de cause au vu des besoins qu\u2019ils \u00e9mettent.<\/p>\n\n\n\n<p>Toutefois, la s\u00e9curit\u00e9 n\u2019est que trop rarement une priorit\u00e9 des migrations vers le cloud. On observe une tendance \u00e0 la prendre en compte en fin de projet, plus en r\u00e9action et en phase aval qu\u2019en amont des transformations et comme un crit\u00e8re influen\u00e7ant la solution \u00e0 d\u00e9ployer. Or, pr\u00e9cis\u00e9ment parce qu\u2019on n\u2019est plus dans ce cadre propri\u00e9taire et ma\u00eetris\u00e9, une telle approche n\u2019est plus possible. Une simple adaptation a posteriori des politiques et des pratiques existantes ne suffira pas car les impacts sur l\u2019organisation, les comp\u00e9tences, les processus et la gouvernance de la s\u00e9curit\u00e9 sont trop importants. C\u2019est pourquoi il est fondamental de prendre en compte la s\u00e9curit\u00e9 d\u00e8s l\u2019origine du projet et d\u2019en faire un \u00e9l\u00e9ment structurant du design et de la mise en \u0153uvre de la transformation.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Auteur<\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/05\/Pic-Louis-Xavier-Haensler.jpg\" alt=\"Louis-Xavier Haensler\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/louis-xavier-haensler-8b7129a0\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Louis-Xavier Haensler<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Managing Consultant en Strat\u00e9gie et Transformation Digitale, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/louis-xavier-haensler-8b7129a0\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Managing Consultant chez Capgemini Invent au sein de la tribu Digital Trust and Cybersecurity, Louis-Xavier s&#8217;est sp\u00e9cialis\u00e9 de par son parcours sur les sujets technologiques et cyber, notamment sur les challenges cyber soulev\u00e9s par le cloud ou par l&#8217;IA. Il anime \u00e9galement une veille sur les sujets Cyber du tech radar Capgemini Invent, dont fait partie l&#8217;identit\u00e9 num\u00e9rique.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider next\"><\/button><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-learn-more learnMoreBlock updated-new-sample-amal\"><div class=\"container\"><div class=\"content-title\"><h2 class=\"learnmore-heading\">Nos autres articles de blog<\/h2><\/div><div class=\"row\"><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/\" target=\"\" aria-label=\"<a href=&quot;https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/&quot;&gt;Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP<\/a&gt;\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/04\/Blog-Cloud-et-Cybersecurite-Le-Cnapp-unifie-la-securite-dans-le-cloud.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-le-cnapp-pour-securiser-le-cloud\/\">Unifier la s\u00e9curit\u00e9 dans le cloud gr\u00e2ce au CNAPP<\/a><\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Simplifier la surveillance, la d\u00e9tection et la neutralisation des menaces et des vuln\u00e9rabilit\u00e9s potentielles pour la s\u00e9curit\u00e9 du cloud.<\/p><\/div><\/div><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/\" target=\"\" aria-label=\"<a href=&quot;https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/&quot;&gt;Confiance dans le cloud\u00a0: la s\u00e9curit\u00e9 est cl\u00e9<\/a&gt;\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/GettyImages-1464389523.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/confiance-cloud-securite-cle\/\">Confiance dans le cloud\u00a0: la s\u00e9curit\u00e9 est cl\u00e9<\/a><\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Le cloud a amplement d\u00e9montr\u00e9 ses b\u00e9n\u00e9fices en termes d\u2019agilit\u00e9, de rapidit\u00e9 et de capacit\u00e9 d\u2019innovation.<br>Pourtant, certains h\u00e9sitent encore, le plus souvent parce qu\u2019ils craignent pour la confidentialit\u00e9 de leurs donn\u00e9es et de leurs transactions.<\/p><\/div><\/div><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/\" target=\"\" aria-label=\"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\">Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9<\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d&#8217;adaptation face \u00e0 l&#8217;\u00e9volution rapide des menaces et des technologies.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 3fc3576a-b290-49dd-b724-cc86cb0fa889\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CLOUD\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CLOUD\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Explorez le potentiel du cloud avec notre podcast d\u00e9di\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tExplorez le potentiel du cloud avec notre podcast d\u00e9di\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"24\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\taria-label=\"En savoir plus A propos Objectif CLOUD\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"0\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cloud\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/Capgemini_podcast_vignette-CLOUD.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"object-position: 52% 52%; object-fit: cover;\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cloud\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCloud\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Acc\u00e9l\u00e9rez votre transformation vers le cloud avec un partenaire de confiance\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tAcc\u00e9l\u00e9rez votre transformation vers le cloud avec un partenaire de confiance\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"24\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\taria-label=\"En savoir plus A propos Cloud\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"-1\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cloud\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/01\/Capgemini_Mountain_landscape.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire3\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CYBER\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CYBER\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Le podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tLe podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"24\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\taria-label=\"En savoir plus A propos Objectif CYBER\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"-1\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cyber\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":166,"featured_media":755227,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"ac1e60b5-8bd3-4218-aa66-8149609d9fb6\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"e624de26-8ed7-4dfa-8e9f-eb5d499fd9fc\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"La migration vers le cloud implique de repenser en profondeur la gouvernance et l'organisation de la s\u00e9curit\u00e9 en reconsid\u00e9rant les politiques, processus, r\u00f4les et responsabilit\u00e9s pour une meilleur adaptation \u00e0 ce nouvel environnement.","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[3,138],"tags":[188,192,13],"brand":[],"service":[35,47,29],"industry":[],"partners":[],"blog-topic":[350,354],"content-group":[],"class_list":["post-754478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","category-transformation","tag-cloud","tag-cybersecurite","tag-digital-transformation","service-cloud","service-cybersecurite","service-business-innovation-transformation","blog-topic-cloud","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Migrations cloud et gouvernance de la s\u00e9curit\u00e9 - Capgemini France<\/title>\n<meta name=\"description\" content=\"D\u00e9fis et changements \u00e0 prendre en compte au niveau de la gouvernance et de l&#039;organisation de la s\u00e9curit\u00e9 lors d&#039;une migration vers le cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Migrations cloud et gouvernance de la s\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"D\u00e9fis et changements \u00e0 prendre en compte au niveau de la gouvernance et de l&#039;organisation de la s\u00e9curit\u00e9 lors d&#039;une migration vers le cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-13T08:38:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T05:44:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Webpreview-blog-13-Juin-Migrations-cloud-et-gouvernance-de-la-securite.VDef_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Louis-Xavier Haensler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@anne.gautier@capgemini.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"anne.gautier@capgemini.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/\"},\"author\":{\"name\":\"anne.gautier@capgemini.com\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e\"},\"headline\":\"Migrations cloud et gouvernance de la s\u00e9curit\u00e9\",\"datePublished\":\"2024-06-13T08:38:17+00:00\",\"dateModified\":\"2025-03-04T05:44:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/\"},\"wordCount\":1226,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg\",\"keywords\":[\"Cloud\",\"Cybers\u00e9curit\u00e9\",\"Transformation Digitale\"],\"articleSection\":[\"Innovation\",\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/\",\"name\":\"Migrations cloud et gouvernance de la s\u00e9curit\u00e9 - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg\",\"datePublished\":\"2024-06-13T08:38:17+00:00\",\"dateModified\":\"2025-03-04T05:44:12+00:00\",\"description\":\"D\u00e9fis et changements \u00e0 prendre en compte au niveau de la gouvernance et de l'organisation de la s\u00e9curit\u00e9 lors d'une migration vers le cloud.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg\",\"width\":4804,\"height\":3203},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e\",\"name\":\"anne.gautier@capgemini.com\",\"sameAs\":[\"https:\/\/x.com\/anne.gautier@capgemini.com\",\"anne.gautier@capgemini.com\"],\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/anne-gautiercapgemini-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9 - Capgemini France","description":"D\u00e9fis et changements \u00e0 prendre en compte au niveau de la gouvernance et de l'organisation de la s\u00e9curit\u00e9 lors d'une migration vers le cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/","og_locale":"fr_FR","og_type":"article","og_title":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9","og_description":"D\u00e9fis et changements \u00e0 prendre en compte au niveau de la gouvernance et de l'organisation de la s\u00e9curit\u00e9 lors d'une migration vers le cloud.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/","og_site_name":"Capgemini France","article_published_time":"2024-06-13T08:38:17+00:00","article_modified_time":"2025-03-04T05:44:12+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Webpreview-blog-13-Juin-Migrations-cloud-et-gouvernance-de-la-securite.VDef_.jpg","type":"image\/jpeg"}],"author":"Louis-Xavier Haensler","twitter_card":"summary_large_image","twitter_creator":"@anne.gautier@capgemini.com","twitter_misc":{"Written by":"anne.gautier@capgemini.com","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/"},"author":{"name":"anne.gautier@capgemini.com","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e"},"headline":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9","datePublished":"2024-06-13T08:38:17+00:00","dateModified":"2025-03-04T05:44:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/"},"wordCount":1226,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg","keywords":["Cloud","Cybers\u00e9curit\u00e9","Transformation Digitale"],"articleSection":["Innovation","Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/","name":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9 - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg","datePublished":"2024-06-13T08:38:17+00:00","dateModified":"2025-03-04T05:44:12+00:00","description":"D\u00e9fis et changements \u00e0 prendre en compte au niveau de la gouvernance et de l'organisation de la s\u00e9curit\u00e9 lors d'une migration vers le cloud.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg","width":4804,"height":3203},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e","name":"anne.gautier@capgemini.com","sameAs":["https:\/\/x.com\/anne.gautier@capgemini.com","anne.gautier@capgemini.com"],"url":"https:\/\/www.capgemini.com\/fr-fr\/author\/anne-gautiercapgemini-com\/"}]}},"blog_topic_info":[{"id":350,"name":"Cloud"},{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":3,"name":"Innovation","slug":"innovation"},{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":188,"name":"Cloud","slug":"cloud"},{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"},{"id":13,"name":"Transformation Digitale","slug":"digital-transformation"}],"service":[{"id":35,"name":"Cloud","slug":"cloud"},{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"},{"id":29,"name":"Transformation &amp; Innovation","slug":"business-innovation-transformation"}],"blog-topic":[{"id":350,"name":"Cloud","slug":"cloud"},{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg"},"articleSection":"Innovation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cloud","cybers\u00e9curit\u00e9","transformation digitale"],"dateCreated":"2024-06-13T08:38:17Z","datePublished":"2024-06-13T08:38:17Z","dateModified":"2025-03-04T05:44:12Z"},"rendered":"<meta name=\"parsely-title\" content=\"Migrations cloud et gouvernance de la s\u00e9curit\u00e9\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-06-13T08:38:17Z\" \/>\n<meta name=\"parsely-section\" content=\"Innovation\" \/>\n<meta name=\"parsely-tags\" content=\"cloud,cybers\u00e9curit\u00e9,transformation digitale\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":769739,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","url_meta":{"origin":754478,"position":0},"title":"La s\u00e9curit\u00e9 des applications dans le cloud","author":"Tarek Edde Gomez","date":"November 27, 2024","format":false,"excerpt":"La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche comme le mod\u00e8le Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":784960,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/invisibiliser-la-banque-de-detail-avec-le-cloud-et-lapisation\/","url_meta":{"origin":754478,"position":1},"title":"Invisibiliser la banque de d\u00e9tail avec le Cloud et l\u2019APIsation","author":"audreykone","date":"May 28, 2025","format":false,"excerpt":"L\u2019Invisible Banking, en s\u2019appuyant sur le Cloud et l\u2019APIsation, offre aux banques de d\u00e9tail le pouvoir de satisfaire les attentes des clients en offrant des services fluides, personnalis\u00e9s et int\u00e9gr\u00e9s, transformant l'exp\u00e9rience bancaire en une interaction sans friction.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/GettyImages-2148852052.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/GettyImages-2148852052.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/GettyImages-2148852052.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/GettyImages-2148852052.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":749656,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-le-role-crucial-du-finops-pour-maitriser-les-couts\/","url_meta":{"origin":754478,"position":2},"title":"Le FinOps, incontournable pour ma\u00eetriser le cloud","author":"anne.gautier@capgemini.com","date":"March 28, 2024","format":false,"excerpt":"Avec l'essor du cloud, la consommation des donn\u00e9es qui s'\u00e9tend, des applications plus exigeantes et l'augmentation des prix de l'\u00e9nergie, le FinOps devient essentiel pour contr\u00f4ler les d\u00e9penses","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Plume-rouge-blog1-GettyImages-497417019.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Plume-rouge-blog1-GettyImages-497417019.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Plume-rouge-blog1-GettyImages-497417019.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Plume-rouge-blog1-GettyImages-497417019.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":770248,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-dans-les-systemes-de-paiement\/","url_meta":{"origin":754478,"position":3},"title":"Le cloud dans les syst\u00e8mes de paiement","author":"Tarek Edde Gomez","date":"December 4, 2024","format":false,"excerpt":"Le m\u00e9tier du paiement est \u00e0 son tour rattrap\u00e9 par la transformation num\u00e9rique et les nouveaux usages des consommateurs, et le cloud est devenu une n\u00e9cessit\u00e9 pour les acteurs du paiement\u202f.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":797355,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-le-veritable-cout-du-cloud\/","url_meta":{"origin":754478,"position":4},"title":"Le v\u00e9ritable co\u00fbt du cloud : ma\u00eetriser les d\u00e9penses croissantes sans pour autant sacrifier l\u2019innovation\u00a0","author":"Tarek Edde Gomez","date":"November 27, 2025","format":false,"excerpt":"Dans tous les secteurs, les organisations adoptent des technologies \u00e0 la demande, qu\u2019il s\u2019agisse d\u2019IaaS, de PaaS ou de solutions SaaS, int\u00e9grant l\u2019IA g\u00e9n\u00e9rative pour renforcer leur agilit\u00e9, stimuler l\u2019innovation et acc\u00e9l\u00e9rer la mise \u00e0 l\u2019\u00e9chelle.\u00a0","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/CRI-Cloud-research-web-banner.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/CRI-Cloud-research-web-banner.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/CRI-Cloud-research-web-banner.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/CRI-Cloud-research-web-banner.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":719405,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/benefices-couts-cloud-de-confiance\/","url_meta":{"origin":754478,"position":5},"title":"B\u00e9n\u00e9fices et co\u00fbts du cloud de confiance","author":"","date":"May 25, 2023","format":false,"excerpt":"Le Cloud de Confiance offre une alternative aux services de Cloud public pour les entreprises et services publics confront\u00e9s \u00e0 des contraintes r\u00e9glementaires et\/ou de souverainet\u00e9.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1279517535.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1279517535.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1279517535.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1279517535.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/754478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=754478"}],"version-history":[{"count":13,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/754478\/revisions"}],"predecessor-version":[{"id":776558,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/754478\/revisions\/776558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/755227"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=754478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=754478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=754478"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=754478"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=754478"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=754478"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=754478"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=754478"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=754478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}