{"id":755128,"date":"2024-06-19T09:00:00","date_gmt":"2024-06-19T07:00:00","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=755128"},"modified":"2025-05-22T17:41:48","modified_gmt":"2025-05-22T15:41:48","slug":"ia-generative-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/","title":{"rendered":"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"\/wp-content\/themes\/capgemini2020\/assets\/images\/cg-logo.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Christophe Menant et Luca Bordonaro<\/h5><h5 class=\"blog-date\">19 juin 2024<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Chaque fois qu\u2019une innovation de rupture s\u2019invite dans les syst\u00e8mes d\u2019information, se pose aussit\u00f4t la question de ses cons\u00e9quences en mati\u00e8re de cybers\u00e9curit\u00e9. <\/h2><p class=\"intro-para-content\">L\u2019intelligence artificielle g\u00e9n\u00e9rative (Gen AI), qui conna\u00eet depuis 2022 un essor foudroyant, ne fait pas exception\u00a0: les interrogations la concernant rappellent tr\u00e8s exactement celles qui accompagnaient le cloud \u00e0 ses d\u00e9buts il y a une quinzaine d\u2019ann\u00e9es. <br>Quels services mettre en \u0153uvre\u00a0? Pour quels usages\u00a0? Que faut-il externaliser ou conserver en interne\u00a0? Quelles sont les nouvelles menaces, les r\u00e8glementations, les responsabilit\u00e9s\u00a0? Et comment mettre sous contr\u00f4le des usages spontan\u00e9s, ou <em>shadow AI<\/em>, qui foisonnent ? En somme, la Gen AI pose \u00e0 nouveau le dilemme traditionnel de l\u2019innovation\u00a0: d\u2019un c\u00f4t\u00e9, adopter une attitude restrictive et prudente vis-\u00e0-vis de potentielles nouvelles menaces, au risque de passer \u00e0 c\u00f4t\u00e9 d\u2019opportunit\u00e9s m\u00e9tiers significatives ; et de l\u2019autre, accorder une trop grande libert\u00e9, au risque d\u2019exposer l\u2019organisation \u00e0 de nouveaux risques non ma\u00eetris\u00e9s, et ainsi engendrer des impacts m\u00e9tiers significatifs.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-proteger-l-information-a-tout-prix\"><strong>Prot\u00e9ger l\u2019information \u00e0 tout prix<\/strong><\/h2>\n\n\n\n<p>C\u2019est l\u00e0 tout l\u2019enjeu de la s\u00e9curisation de l\u2019IA g\u00e9n\u00e9rative. Et c\u2019est sous l\u2019angle du risque qu\u2019il convient de l\u2019aborder, avec, pour les principaux&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>le risque de voir des informations sensibles expos\u00e9es, qu\u2019elles soient des donn\u00e9es&nbsp;confidentielles d\u2019entreprise et\/ou r\u00e9glement\u00e9es ;<\/li>\n\n\n\n<li>le risque de voir des processus, d\u00e9cisionnels ou op\u00e9rationnels perturb\u00e9s par des informations inexactes.<\/li>\n<\/ul>\n\n\n\n<p>Pour l\u2019essentiel, la probl\u00e9matique est donc d\u2019assurer une protection renforc\u00e9e des donn\u00e9es en entr\u00e9e et en sortie des syst\u00e8mes d\u2019IA. Avec son potentiel hors norme et l\u2019effervescence qui l\u2019entoure, la Gen AI est en fin de compte une nouvelle application <em>presque<\/em> comme les autres\u2026&nbsp;Il faut en effet lui appliquer les politiques et les dispositifs mis en \u0153uvre par ailleurs dans l\u2019entreprise, tout en les revisitant, et ce sur trois plans&nbsp;essentiels :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>la d\u00e9finition d\u2019un cadre et d\u2019une gouvernance de gestion des risques&nbsp;;<\/li>\n\n\n\n<li>la s\u00e9curisation des donn\u00e9es mais aussi des mod\u00e8les&nbsp;;<\/li>\n\n\n\n<li>la protection de l\u2019infrastructure et des environnements Gen AI eux-m\u00eames.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-definir-un-cadre-et-une-gouvernance-de-gestion-des-risques\"><strong><em>D\u00e9finir un cadre et une gouvernance de gestion des risques<\/em><\/strong><\/h3>\n\n\n\n<p>Face \u00e0 l\u2019engouement actuel pour l\u2019IA g\u00e9n\u00e9rative, la priorit\u00e9&nbsp;est d\u2019encadrer les pratiques au sein des organisations. Aujourd\u2019hui, les postures sont en effet encore tr\u00e8s disparates&nbsp;: de l\u2019interdiction pure et simple au laisser faire complet, en passant par la mise en place d\u2019environnements priv\u00e9s pour circonscrire les usages.<\/p>\n\n\n\n<p>Poser un cadre est donc essentiel pour clarifier ce qui est autoris\u00e9 ou non, et \u00e9viter des d\u00e9rives dont l\u2019impact peut \u00eatre lourd et imm\u00e9diat. &nbsp;Pour cela, les organisations doivent se doter de doctrines, de r\u00e8gles et d\u2019instances de gouvernance. Ce cadre doit par ailleurs s\u2019accompagner de campagnes de sensibilisation et de formation des collaborateurs, qui, pour utiliser correctement la Gen AI, doivent en comprendre le fonctionnement, ses probl\u00e9matiques inh\u00e9rentes (hallucinations par exemple) et les risques qui l\u2019accompagnent.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-securiser-les-donnees-et-les-modeles-nbsp\"><em>S\u00e9curiser les donn\u00e9es et les mod\u00e8les&nbsp;<\/em><\/h3>\n\n\n\n<p>Le deuxi\u00e8me grand sujet concerne les donn\u00e9es elles-m\u00eames, et les mod\u00e8les qui les exploitent. Les applications de Gen AI s\u2019appuient en effet sur des mod\u00e8les qui ing\u00e8rent, assimilent et s\u2019entra\u00eenent sur des ensembles de donn\u00e9es massifs, pour g\u00e9n\u00e9rer \u00e0 leur tour de nouveaux contenus. &nbsp;<\/p>\n\n\n\n<p>Par discernement ou par ignorance, un utilisateur humain peut s\u2019abstenir d\u2019inclure certaines informations aux contenus qu\u2019il produit, mais la Gen AI n\u2019a pas ces filtres&nbsp;: la machine cherche dans tout ce \u00e0 quoi elle a acc\u00e8s, puis restitue ces connaissances en toute candeur. Il est donc imp\u00e9ratif de lui fixer des limites.<\/p>\n\n\n\n<p>Pour cela, on va inventorier les donn\u00e9es, les localiser, les classifier, et mettre en place des contr\u00f4les de qualit\u00e9, de repr\u00e9sentativit\u00e9, de validation, d\u2019int\u00e9grit\u00e9 ou encore d\u2019acc\u00e8s. On va \u00e9galement cr\u00e9er des r\u00e9f\u00e9rentiels de donn\u00e9es autoris\u00e9es et valid\u00e9es. Cette pratique permet de contr\u00f4ler les donn\u00e9es <em>d\u2019entr\u00e9e<\/em>, c\u2019est-\u00e0-dire celles qui peuvent servir \u00e0 entra\u00eener, sp\u00e9cialiser ou encore affiner les mod\u00e8les de Gen AI.<\/p>\n\n\n\n<p>Pour les donn\u00e9es dites <em>de sortie<\/em>, outre l\u2019indispensable contr\u00f4le humain pour valider l\u2019exactitude de la r\u00e9ponse, on pourra mettre en place les outils usuels de restriction d\u2019acc\u00e8s aux r\u00e9sultats ou de protection contre les fuites de donn\u00e9es. Mais avec la Gen AI, il faudra aller plus loin&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>limiter l\u2019utilisation de sous-ensembles de donn\u00e9es en fonction du besoin d\u2019en conna\u00eetre&nbsp;;<\/li>\n\n\n\n<li>mettre en place des v\u00e9rifications des donn\u00e9es g\u00e9n\u00e9r\u00e9es par des mod\u00e8les de Gen AI pour d\u00e9tecter toute r\u00e9ponse erron\u00e9e ou <em>hallucination<\/em><\/li>\n\n\n\n<li>mettre en place les v\u00e9rifications n\u00e9cessaires pour d\u00e9tecter toute d\u00e9rive dans le temps d\u2019un mod\u00e8le ainsi que tout biais engendr\u00e9 par des mod\u00e8les entra\u00een\u00e9s avec des donn\u00e9es non repr\u00e9sentatives ou \u00e0 la fiabilit\u00e9 douteuse<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-proteger-l-infrastructure-et-les-environnements-gen-ai\"><em><strong><em>Prot\u00e9ger l\u2019infrastructure et les environnements Gen AI<\/em><\/strong><\/em><\/h3>\n\n\n\n<p>S\u00e9curiser les environnements de Gen AI est indispensable pour \u00e9viter, par exemple, que les mod\u00e8les puissent \u00eatre rendus inop\u00e9rants ou indisponibles. Cela passera&nbsp;par l\u2019application de mesures&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>qu\u2019il suffira d\u2019\u00e9tendre, comme le filtrage des acc\u00e8s&nbsp;;<\/li>\n\n\n\n<li>qu\u2019il faudra adapter, comme des r\u00e8gles de monitoring de s\u00e9curit\u00e9 sp\u00e9cifiques&nbsp;;<\/li>\n\n\n\n<li>qu\u2019il faudra cr\u00e9er enti\u00e8rement, comme des contr\u00f4les pour d\u00e9tecter des attaques sp\u00e9cifiques (<em>prompt injection<\/em> par exemple).<\/li>\n<\/ul>\n\n\n\n<p>La nature des solutions Gen AI devra \u00e9galement \u00eatre consid\u00e9r\u00e9e&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>pour les solutions en mode Software as a Service (SaaS), il faudra d\u00e9limiter par contrat les engagements et les responsabilit\u00e9s du fournisseur en mati\u00e8re de s\u00e9curit\u00e9 et conformit\u00e9&nbsp;;<\/li>\n\n\n\n<li>pour les solutions d\u00e9velopp\u00e9es en interne, il faudra faire preuve de la m\u00eame hygi\u00e8ne de s\u00e9curit\u00e9 et de conformit\u00e9 au niveau des infrastructures (stockage, r\u00e9seau, syst\u00e8me) que pour n\u2019importe quelle application manipulant des donn\u00e9es confidentielles et\/ou r\u00e9glement\u00e9es.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-retenir\">\u00c0 retenir<\/h2>\n\n\n\n<p>Dans ce domaine qui \u00e9volue extr\u00eamement rapidement, les prochains mois verront sans doute se mat\u00e9rialiser de nouvelles menaces et \u00e9merger de nouvelles solutions de s\u00e9curit\u00e9 sp\u00e9cialis\u00e9es. Nous verrons \u00e9galement \u00e9voluer la maturit\u00e9 des fonctions s\u00e9curit\u00e9 natives dans les solutions Gen AI ou encore leurs capacit\u00e9s \u00e0 s\u2019int\u00e9grer \u00e0 des solutions externes de s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Cependant, les organisations ne doivent en aucun cas attendre pour s\u2019emparer de la question de la s\u00e9curit\u00e9 de la Gen AI :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>elles ont d\u00e8s \u00e0 pr\u00e9sent les moyens techniques et organisationnels pour la s\u00e9curiser ;<\/li>\n\n\n\n<li>elles ont pour les guider les directives de <a href=\"https:\/\/artificialintelligenceact.eu\/fr\/\">l\u2019AI Act<\/a> en Europe&nbsp;ou ses \u00e9quivalents dans le reste du monde, ainsi que les recommandations de l\u2019ANSSI.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Auteurs<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/02\/P1090723.jpg\" alt=\"Christophe Menant new\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/christophe-menant-8b55b9\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Christophe Menant<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur de l&#039;offre Cybers\u00e9curit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/christophe-menant-8b55b9\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Directeur, responsable du portefeuille d\u2019offre et de l\u2019innovation cybers\u00e9curit\u00e9 de CAPGEMINI France. Plus de 30 ans d\u2019exp\u00e9rience en informatique et plus de 25 ans dans le domaine de la cybers\u00e9curit\u00e9. Christophe a une vaste exp\u00e9rience dans des environnements internationaux et mondiaux. Christophe a aid\u00e9 ces clients \u00e0 \u00e9laborer et \u00e0 ex\u00e9cuter leurs strat\u00e9gies et leurs programmes de transformation s\u00e9curit\u00e9, a g\u00e9r\u00e9 des crises majeures li\u00e9es \u00e0 des cyber-attaques de types ransomware ou espionnage industriel, a d\u00e9finit des m\u00e9thodes, des architectures et des processus de r\u00e9f\u00e9rences ainsi que des offres de s\u00e9curit\u00e9. Ceci a eu pour but de mieux adresser les demandes du march\u00e9 de la s\u00e9curit\u00e9 ou pour contribuer \u00e0 la s\u00e9curit\u00e9 interne des soci\u00e9t\u00e9s pour lesquelles il a travaill\u00e9. Christophe a travaill\u00e9 15 ans chez IBM puis 8 ans chez HPE\/DXC avant de rejoindre CAPGEMINI.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/Design-sans-titre.png\" alt=\"Luca Bordonaro\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucabordonaro\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Luca Bordonaro<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Consultant Cybers\u00e9curit\u00e9, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucabordonaro\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Luca est consultant chez Capgemini Invent au sein de l\u2019offre Digital Trust &#038; Security et travaille plus particuli\u00e8rement sur des sujets strat\u00e9giques m\u00ealant cybers\u00e9curit\u00e9 et nouvelles technologies.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n<section class=\"latest-insights layout-even layout-even-all-purple-cards \"><div class=\"container\"><div class=\"insight-title\"><h2 class=\"latest-insight-title\">Pour aller plus loin<\/h2><\/div><div class=\"layout-two-card cards-normal\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/surfer-vague-ia-generative\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Capgemini_Raise_PoV_WebBanner-.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Capgemini_Raise_PoV_WebBanner-.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Capgemini_Raise_PoV_WebBanner-.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Capgemini_Raise_PoV_WebBanner-.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Capgemini_Raise_PoV_WebBanner-.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Capgemini_Raise_PoV_WebBanner-.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Capgemini_Raise_PoV_WebBanner-.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Capgemini_Raise_PoV_WebBanner-.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Capgemini_Raise_PoV_WebBanner-.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/surfer-vague-ia-generative\/\" aria-label=\"Surfer sur la vague de l\u2019IA g\u00e9n\u00e9rative\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Point de vue<\/div>\n                                <h3 class=\"card-title\">Surfer sur la vague de l\u2019IA g\u00e9n\u00e9rative<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/objectif-cyber\/\" aria-label=\"Objectif Cyber\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Podcasts<\/div>\n                                <h3 class=\"card-title\">Objectif Cyber<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                    <\/div><div class=\"layout-two-card cards-reversed\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/ia-generative-dans-les-organisations\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/DotCom_Banner_2880X1800.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/DotCom_Banner_2880X1800.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/DotCom_Banner_2880X1800.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/DotCom_Banner_2880X1800.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/DotCom_Banner_2880X1800.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/DotCom_Banner_2880X1800.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/DotCom_Banner_2880X1800.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/DotCom_Banner_2880X1800.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/DotCom_Banner_2880X1800.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-md-6 col-lg-4 flex-sm-order-reverse\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/intelligence-artificielle-dans-gestion-des-identites-et-acces\/\" aria-label=\"L\u2019intelligence artificielle dans la gestion des identit\u00e9s et des acc\u00e8s\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Point de vue<\/div>\n                                <h3 class=\"card-title\">L\u2019intelligence artificielle dans la gestion des identit\u00e9s et des acc\u00e8s<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/ia-generative-dans-les-organisations\/\" aria-label=\"L&#039;IA g\u00e9n\u00e9rative dans les organisations\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Rapport<\/div>\n                                <h3 class=\"card-title\">L&#039;IA g\u00e9n\u00e9rative dans les organisations<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute.svg\" alt=\"capgemini-research-institute\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><\/div>\n                    <\/div><\/div><\/section>\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Nos articles de blog<\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/\" aria-label=\"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\"><\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/\" aria-label=\"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation\"><h3 class=\"expert-subtitle\">Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">f\u00e9vr. 26, 2026<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" aria-label=\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\"><\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" aria-label=\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises\"><h3 class=\"expert-subtitle\">IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/Sebastien-Baule.jpg?w=705\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">S\u00e9bastien Baule<\/div><div class=\"date-text\">janv. 12, 2026<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" aria-label=\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\"><\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" aria-label=\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux\"><h3 class=\"expert-subtitle\">Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">oct. 20, 2025<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-call-to-action undefined call-to-action-block\"><div class=\"container\"><div class=\"call-to-action-block-content-wrapper has-description\"><div class=\"text-wrapper has-description\"><h3 class=\"title\" data-maxlength=\"144\">Newsletter Cybers\u00e9curit\u00e9<\/h3><p class=\"description\" data-maxlength=\"210\">Abonnez-vous \u00e0 notre newsletter et recevez nos derni\u00e8res actualit\u00e9s d\u00e9di\u00e9es \u00e0 la cybers\u00e9curit\u00e9<\/p><\/div><div class=\"button-wrapper has-description\"><a class=\" cta-btn action-valid\" href=\"https:\/\/go.capgeminigroup.com\/newsletter-cybersecurite\" target=\"_blank\" rel=\"noopener noreferrer\" aria-label=\"S'abonner A propos Newsletter Cybers\u00e9curit\u00e9\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" data-maxlength=\"24\" tabindex=\"0\"> S&#8217;abonner <\/a><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Chaque fois qu\u2019une innovation de rupture s\u2019invite dans les syst\u00e8mes d\u2019information, se pose aussit\u00f4t la question de ses cons\u00e9quences en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>\n","protected":false},"author":247,"featured_media":755158,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"c5cac3dc-1913-4070-b4bc-83cd549abe57\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"790ae37a-3202-4bb4-bc0f-f2b51af5dba9\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[138],"tags":[192],"brand":[30],"service":[49],"industry":[],"partners":[],"blog-topic":[354,359],"content-group":[],"class_list":["post-755128","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-transformation","tag-cybersecurite","brand-capgemini","service-ia-data","blog-topic-cybersecurite","blog-topic-ia-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9 - Capgemini France<\/title>\n<meta name=\"description\" content=\"Chaque fois qu\u2019une innovation de rupture s\u2019invite dans les syst\u00e8mes d\u2019information, se pose aussit\u00f4t la question de ses cons\u00e9quences en mati\u00e8re de cybers\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Chaque fois qu\u2019une innovation de rupture s\u2019invite dans les syst\u00e8mes d\u2019information, se pose aussit\u00f4t la question de ses cons\u00e9quences en mati\u00e8re de cybers\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-19T07:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-22T15:41:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Webpreview_cyber_genai.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christophe Menant et Luca Bordonaro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"quentinkieken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/\"},\"author\":{\"name\":\"quentinkieken\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c\"},\"headline\":\"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9\",\"datePublished\":\"2024-06-19T07:00:00+00:00\",\"dateModified\":\"2025-05-22T15:41:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/\"},\"wordCount\":1271,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/\",\"name\":\"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9 - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg\",\"datePublished\":\"2024-06-19T07:00:00+00:00\",\"dateModified\":\"2025-05-22T15:41:48+00:00\",\"description\":\"Chaque fois qu\u2019une innovation de rupture s\u2019invite dans les syst\u00e8mes d\u2019information, se pose aussit\u00f4t la question de ses cons\u00e9quences en mati\u00e8re de cybers\u00e9curit\u00e9.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg\",\"width\":5800,\"height\":3264,\"caption\":\"3d rendering Curve Dynamic Fluid Liquid Wallpaper. Light Pastel Cold Color Colorful Swirl Gradient Mesh. Bright Pink Vivid Vibrant Smooth Surface. Blurred Water Multicolor Neon Sky Gradient Background\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c\",\"name\":\"quentinkieken\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/quentinkieken\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9 - Capgemini France","description":"Chaque fois qu\u2019une innovation de rupture s\u2019invite dans les syst\u00e8mes d\u2019information, se pose aussit\u00f4t la question de ses cons\u00e9quences en mati\u00e8re de cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/","og_locale":"fr_FR","og_type":"article","og_title":"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9","og_description":"Chaque fois qu\u2019une innovation de rupture s\u2019invite dans les syst\u00e8mes d\u2019information, se pose aussit\u00f4t la question de ses cons\u00e9quences en mati\u00e8re de cybers\u00e9curit\u00e9.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/","og_site_name":"Capgemini France","article_published_time":"2024-06-19T07:00:00+00:00","article_modified_time":"2025-05-22T15:41:48+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Webpreview_cyber_genai.png","type":"image\/png"}],"author":"Christophe Menant et Luca Bordonaro","twitter_card":"summary_large_image","twitter_misc":{"Written by":"quentinkieken","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/"},"author":{"name":"quentinkieken","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c"},"headline":"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9","datePublished":"2024-06-19T07:00:00+00:00","dateModified":"2025-05-22T15:41:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/"},"wordCount":1271,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/","name":"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9 - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg","datePublished":"2024-06-19T07:00:00+00:00","dateModified":"2025-05-22T15:41:48+00:00","description":"Chaque fois qu\u2019une innovation de rupture s\u2019invite dans les syst\u00e8mes d\u2019information, se pose aussit\u00f4t la question de ses cons\u00e9quences en mati\u00e8re de cybers\u00e9curit\u00e9.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg","width":5800,"height":3264,"caption":"3d rendering Curve Dynamic Fluid Liquid Wallpaper. Light Pastel Cold Color Colorful Swirl Gradient Mesh. Bright Pink Vivid Vibrant Smooth Surface. Blurred Water Multicolor Neon Sky Gradient Background"},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c","name":"quentinkieken","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/quentinkieken\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"},{"id":359,"name":"IA &amp; Data"}],"taxonomy_info":{"category":[{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":49,"name":"IA &amp; Data","slug":"ia-data"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"},{"id":359,"name":"IA &amp; Data","slug":"ia-data"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg"},"articleSection":"Transformation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2024-06-19T07:00:00Z","datePublished":"2024-06-19T07:00:00Z","dateModified":"2025-05-22T15:41:48Z"},"rendered":"<meta name=\"parsely-title\" content=\"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-06-19T07:00:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Transformation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":787594,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","url_meta":{"origin":755128,"position":0},"title":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9","author":"anne.gautier@capgemini.com","date":"July 3, 2025","format":false,"excerpt":"Malgr\u00e9 les incertitudes r\u00e9glementaires, les organisations doivent investir d\u00e8s maintenant dans l\u2019IA pour la cybers\u00e9curit\u00e9, tout en avan\u00e7ant avec prudence, en encadrant son usage par une gouvernance rigoureuse et une veille continue.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":733969,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/","url_meta":{"origin":755128,"position":1},"title":"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9","author":"","date":"October 26, 2023","format":false,"excerpt":"L\u2019intelligence artificielle g\u00e9n\u00e9rative (IAG) est une cat\u00e9gorie particuli\u00e8re de mod\u00e8les d\u2019intelligence artificielle (IA) qui r\u00e9pond \u00e0 une interrogation (prompt) par un contenu original, un texte, une image, un code, etc. Si l\u2019IA usuelle augmente les capacit\u00e9s humaines et acc\u00e9l\u00e8re l\u2019ex\u00e9cution, l\u2019IAG ajoute donc la cr\u00e9ativit\u00e9 d\u2019une r\u00e9ponse imm\u00e9diatement exploitable.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":794325,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/","url_meta":{"origin":755128,"position":2},"title":"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux","author":"anne.gautier@capgemini.com","date":"October 20, 2025","format":false,"excerpt":"Ce que les Assises de la Cybers\u00e9curit\u00e9 2025 r\u00e9v\u00e8lent sur l\u2019avenir du secteur.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":787211,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/","url_meta":{"origin":755128,"position":3},"title":"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense","author":"quentinkieken","date":"June 24, 2025","format":false,"excerpt":"L\u2019IA bouleverse tous les aspects du domaine militaire, du centre de commandement au th\u00e9\u00e2tre des op\u00e9rations, des fonctions de soutien aux syst\u00e8mes de combat. Pour les forces arm\u00e9es, elle est un formidable atout, leur permettant de se pr\u00e9parer et d\u2019agir avec davantage d\u2019anticipation, de pr\u00e9cision et d\u2019efficacit\u00e9, mais elle est\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":783590,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-gestion-des-infras-it-porte-dentree-pour-la-genai-dans-les-dsi\/","url_meta":{"origin":755128,"position":4},"title":"La gestion des infrastructures IT, une porte d\u2019entr\u00e9e pour la Gen AI dans les DSI","author":"Tarek Edde Gomez","date":"May 21, 2025","format":false,"excerpt":"Les r\u00e9flexions sur l\u2019IA g\u00e9n\u00e9rative d\u00e9bouchent aujourd\u2019hui sur une premi\u00e8re g\u00e9n\u00e9ration de solutions sp\u00e9cifiques aux besoins des DSI, propre \u00e0 inciter les organisations \u00e0 se lancer.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Gen-AI-dans-la-DSI.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Gen-AI-dans-la-DSI.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Gen-AI-dans-la-DSI.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Gen-AI-dans-la-DSI.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":721330,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/tests-dintrusion-au-coeur-de-demarche-damelioration-continue-pour-la-cybersecurite\/","url_meta":{"origin":755128,"position":5},"title":"Les tests d\u2019intrusion au c\u0153ur de la d\u00e9marche d\u2019am\u00e9lioration continue pour la cybers\u00e9curit\u00e9","author":"","date":"June 12, 2023","format":false,"excerpt":"Dans un monde connect\u00e9 et num\u00e9rique en pleine expansion, les cyberattaques repr\u00e9sentent une menace r\u00e9elle et prot\u00e9iforme pour les entreprises. Les pirates informatiques sont constamment \u00e0 l'aff\u00fbt des vuln\u00e9rabilit\u00e9s pour acc\u00e9der aux donn\u00e9es sensibles et causer des dommages parfois irr\u00e9versibles.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg","author_title":"Capgemini","author_thumbnail_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/cg-logo-blue.svg?w=960","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/755128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/247"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=755128"}],"version-history":[{"count":15,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/755128\/revisions"}],"predecessor-version":[{"id":776557,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/755128\/revisions\/776557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/755158"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=755128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=755128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=755128"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=755128"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=755128"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=755128"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=755128"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=755128"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=755128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}