{"id":755230,"date":"2024-07-02T09:00:00","date_gmt":"2024-07-02T07:00:00","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=755230"},"modified":"2025-03-04T06:42:36","modified_gmt":"2025-03-04T05:42:36","slug":"dora-un-modele-de-maturite-pour-les-tests-de-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/","title":{"rendered":"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/04\/Capgemini-PC.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Antoine Bonneville et Erwan Michel<\/h5><h5 class=\"blog-date\">10 juin 2024<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">En mati\u00e8re de politiques de s\u00e9curit\u00e9 informatique, les tests constituent l\u2019un des piliers fondamentaux, autant pour valider l\u2019efficacit\u00e9 des dispositifs mis en place pour prot\u00e9ger les syst\u00e8mes que pour r\u00e9v\u00e9ler des br\u00e8ches restant \u00e0 colmater.\u00a0\u00a0<\/h2><p class=\"intro-para-content\">Cependant, qu\u2019il s\u2019agisse de tests d\u2019intrusion, d\u2019analyse de code, de configuration ou encore d\u2019infrastructure, ces tests sont le plus souvent con\u00e7us, et parfois r\u00e9alis\u00e9s, en interne par les \u00e9quipes de la DSI et du RSSI. Il peut donc arriver que les enjeux soient couverts de fa\u00e7on incompl\u00e8te, morcel\u00e9e, voire partiale, donnant ainsi lieu \u00e0 diverses zones d\u2019ombre et angles morts.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>Consciente des menaces qui peuvent en r\u00e9sulter, la Commission Europ\u00e9enne a souhait\u00e9 encadrer et syst\u00e9matiser la pratique des tests dits de \u00ab\u202fr\u00e9silience op\u00e9rationnelle num\u00e9rique\u202f\u00bb avec la r\u00e9glementation DORA (<em>Digital Operational Resilience Act<\/em>).&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-le-test-comme-aboutissement-d-une-approche-par-les-risques\">Le test comme aboutissement d&#8217;une <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"text-decoration: underline;\">approche par les risques<\/span><\/a><\/h2>\n\n\n\n<p>DORA constitue un changement important de paradigme\u202f: d\u2019une pratique purement technologique \u00e0 la discr\u00e9tion de l\u2019organisation et de son RSSI, le test de cybers\u00e9curit\u00e9 devient l\u2019aboutissement obligatoire et formalis\u00e9 d\u2019une approche par les risques.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Ainsi, ces tests devront d\u00e9sormais \u00eatre d\u00e9finis au regard de sc\u00e9narios d\u2019attaque, lesquels devront eux-m\u00eames d\u00e9couler d\u2019une analyse des risques. La philosophie de DORA est donc de lier syst\u00e9matiquement et explicitement les tests \u00e0 une analyse de risques en amont.&nbsp;&nbsp;<\/p>\n\n\n\n<p>La cl\u00e9 de vo\u00fbte de son application r\u00e9sidera par cons\u00e9quent dans la mise en place d\u2019une collaboration entre les \u00e9quipes cyber et les \u00e9quipes risques afin de b\u00e2tir un cadre valid\u00e9 et promu par le plus haut niveau de l\u2019organisation, explicitant et expliquant\u202f:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>les objectifs de s\u00e9curit\u00e9\u202f;&nbsp;<\/li>\n\n\n\n<li>les sc\u00e9narios envisag\u00e9s\u202f;&nbsp;<\/li>\n\n\n\n<li>le programme de tests correspondant.&nbsp;&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Si leur statut d\u2019Organisations d\u2019Importance Vitale (OIV) imposait d\u00e9j\u00e0 aux plus grandes banques et compagnies d\u2019assurance un certain nombre d\u2019obligations, avec DORA, c\u2019est tout le secteur financier, au sens large, qui va devoir mettre en place une politique syst\u00e9matique, standard et rigoureuse en mati\u00e8re de tests de cybers\u00e9curit\u00e9, ce qui, m\u00eame pour les \u00e9tablissements les plus avanc\u00e9s, n\u00e9cessitera au minimum quelques ajustements.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-des-dispositions-pratiques-pour-encadrer-la-mise-en-oeuvre-nbsp\"><strong>Des dispositions pratiques pour encadrer la mise en \u0153uvre<\/strong>&nbsp;<\/h2>\n\n\n\n<p>DORA encadre la mise en \u0153uvre des tests par des dispositions pratiques et rigoureuses\u202f:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Les tests devront \u00eatre directement r\u00e9alis\u00e9s sur les environnements de production, et ce au moins une fois par an pour les fonctions dites critiques ou importantes.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Les entit\u00e9s les plus sensibles devront proc\u00e9der \u00e0 des tests avanc\u00e9s d\u2019intrusion tous les trois ans au moins, l\u2019autorit\u00e9 comp\u00e9tente pouvant, selon les circonstances, demander \u00e0 augmenter ou r\u00e9duire cette fr\u00e9quence.&nbsp;<\/li>\n\n\n\n<li>Afin d\u2019\u00e9viter les conflits d\u2019int\u00e9r\u00eat, les tests devront toujours \u00eatre r\u00e9alis\u00e9s par des testeurs externes pour les \u00e9tablissements de cr\u00e9dit sensibles, et au minimum tous les trois tests pour les autres \u00e9tablissements. Pour r\u00e9aliser leur inspection ou leur audit dans les r\u00e8gles de l\u2019art, ces testeurs devront avoir le niveau requis et pr\u00e9senter un certain nombre de garanties de comp\u00e9tences et d\u2019ind\u00e9pendance, en particulier via une certification (ISO 19011). Id\u00e9alement, on s\u2019efforcera aussi de varier les approches et les m\u00e9thodes.&nbsp;<\/li>\n\n\n\n<li>\u00c9tant donn\u00e9 l\u2019importance croissante de la <em>supply chain<\/em> comme vecteur de menace, DORA pr\u00e9cise aussi les conditions de mise en \u0153uvre des tests chez les fournisseurs IT. Ceux-ci ne pourront s\u2019y opposer et les contrats pass\u00e9s avec les prestataires de fonctions critiques ou importantes devront faire appara\u00eetre des contraintes telles que l\u2019obligation de coop\u00e9rer pleinement aux pentests et un acc\u00e8s illimit\u00e9 au donneur d\u2019ordre ou \u00e0 l\u2019autorit\u00e9 pour leurs audits.&nbsp;&nbsp;<\/li>\n\n\n\n<li>En revanche, pour all\u00e9ger les co\u00fbts et le fardeau pour les donneurs d\u2019ordre comme pour leurs fournisseurs, le texte autorise la r\u00e9alisation de tests group\u00e9s de ces derniers. Dans cette perspective, les organismes de Place (Office de Coordination Bancaire et Financi\u00e8re, F\u00e9d\u00e9ration Bancaire Fran\u00e7aise, F\u00e9d\u00e9ration Fran\u00e7aise des Soci\u00e9t\u00e9s d\u2019Assurance\u2026) pourraient jouer un r\u00f4le pour favoriser et organiser cette mutualisation.&nbsp;<\/li>\n\n\n\n<li>Enfin, les organisations devront documenter la d\u00e9marche et produire un rapport structur\u00e9, lequel d\u00e9bouchera sur d&#8217;\u00e9ventuelles mesures correctives. Ces \u00e9l\u00e9ments devront \u00eatre communiqu\u00e9s aux autorit\u00e9s, qui pourront surveiller la mise en \u0153uvre et les r\u00e9sultats de ce plan d&#8217;action.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-retenir\"><em>\u00c0 retenir<\/em><\/h2>\n\n\n\n<p>Analyse des risques en amont, ind\u00e9pendance des testeurs, transparence, am\u00e9lioration continue\u202f: en d\u00e9finitive, DORA appara\u00eet moins comme une nouvelle contrainte r\u00e9glementaire que comme la marche \u00e0 suivre pour hisser les tests de cybers\u00e9curit\u00e9 au niveau de maturit\u00e9 qu\u2019exige le grand virage num\u00e9rique actuel du secteur financier.&nbsp;&nbsp;<\/p>\n\n\n\n<p>De bonnes pratiques dont les organisations des autres secteurs d\u2019activit\u00e9 auraient sans doute grand int\u00e9r\u00eat \u00e0 s\u2019inspirer elles aussi, puisque la directive NIS 2 (<em>Network and Information Systems<\/em>) qui les concerne et entrera en application en octobre prochain impose des exigences plus limit\u00e9es en mati\u00e8re de tests\u2026&nbsp;&nbsp;<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Auteurs<\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/c3c3-bonneville-antoine-11-2.jpg\" alt=\"Antoine Bonneville\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Antoine Bonneville<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Consulant senior cybers\u00e9curit\u00e9<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/1516802463581-1.png\" alt=\"Erwan Michel\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/erwanmichel\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Erwan Michel<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Consultant en S\u00e9curit\u00e9 de l&#039;Information<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/erwanmichel\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Curseur pr\u00e9c\u00e9dent\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Curseur suivant\"><\/button><\/div><\/div><\/section>\n\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Sur le m\u00eame sujet <\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-dora-gouvernance\/\" aria-label=\"NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\"><\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-dora-gouvernance\/\" aria-label=\"NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences\"><h3 class=\"expert-subtitle\">NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">mars 13, 2024<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\" aria-label=\"DORA ou l&#039;approche fond\u00e9e sur les risques\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\"><\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\" aria-label=\"DORA ou l&#039;approche fond\u00e9e sur les risques\"><h3 class=\"expert-subtitle\">DORA ou l&#039;approche fond\u00e9e sur les risques<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">f\u00e9vr. 12, 2024<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/tests-dintrusion-au-coeur-de-demarche-damelioration-continue-pour-la-cybersecurite\/\" aria-label=\"Les tests d\u2019intrusion au c\u0153ur de la d\u00e9marche d\u2019am\u00e9lioration continue pour la cybers\u00e9curit\u00e9\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\"><\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/tests-dintrusion-au-coeur-de-demarche-damelioration-continue-pour-la-cybersecurite\/\" aria-label=\"Les tests d\u2019intrusion au c\u0153ur de la d\u00e9marche d\u2019am\u00e9lioration continue pour la cybers\u00e9curit\u00e9\"><h3 class=\"expert-subtitle\">Les tests d\u2019intrusion au c\u0153ur de la d\u00e9marche d\u2019am\u00e9lioration continue pour la cybers\u00e9curit\u00e9<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/Nicolas-Bottero.png?w=400\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Nicolas Bottero<\/div><div class=\"date-text\">juin 12, 2023<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader a57d0b55-c243-4df4-8242-aa7e0756ac20\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CYBER\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CYBER\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Le podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tLe podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Objectif CYBER\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cyber\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Capgemini_podcast_vignette-CYBER.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 51% 47%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent \">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Faites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tFaites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 75% 47%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>En mati\u00e8re de politiques de s\u00e9curit\u00e9 informatique, les tests constituent l\u2019un des piliers fondamentaux, autant pour valider l\u2019efficacit\u00e9 des dispositifs mis en place pour prot\u00e9ger les syst\u00e8mes que pour r\u00e9v\u00e9ler des br\u00e8ches restant \u00e0 colmater.\u00a0\u00a0<\/p>\n","protected":false},"author":247,"featured_media":755260,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"{\"uuid\":\"c0c5f480-5ed1-4b85-bbcd-c2d99a460d90\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"9b260a31-4ba8-4f80-8149-bcebf5f0eea2\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[5],"tags":[192],"brand":[30],"service":[47],"industry":[],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-755230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technologies","tag-cybersecurite","brand-capgemini","service-cybersecurite","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9 - Capgemini France<\/title>\n<meta name=\"description\" content=\"En mati\u00e8re de politiques de s\u00e9curit\u00e9 informatique, les tests constituent l\u2019un des piliers fondamentaux, autant pour valider l\u2019efficacit\u00e9 des dispositifs mis en place pour prot\u00e9ger les syst\u00e8mes que pour r\u00e9v\u00e9ler des br\u00e8ches restant \u00e0 colmater.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"En mati\u00e8re de politiques de s\u00e9curit\u00e9 informatique, les tests constituent l\u2019un des piliers fondamentaux, autant pour valider l\u2019efficacit\u00e9 des dispositifs mis en place pour prot\u00e9ger les syst\u00e8mes que pour r\u00e9v\u00e9ler des br\u00e8ches restant \u00e0 colmater.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-02T07:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T05:42:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/webpreview_blog_dora_tests.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Antoine Bonneville et Erwan Michel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"quentinkieken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\"},\"author\":{\"name\":\"quentinkieken\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c\"},\"headline\":\"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9\",\"datePublished\":\"2024-07-02T07:00:00+00:00\",\"dateModified\":\"2025-03-04T05:42:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\"},\"wordCount\":936,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Technologies\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\",\"name\":\"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9 - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg\",\"datePublished\":\"2024-07-02T07:00:00+00:00\",\"dateModified\":\"2025-03-04T05:42:36+00:00\",\"description\":\"En mati\u00e8re de politiques de s\u00e9curit\u00e9 informatique, les tests constituent l\u2019un des piliers fondamentaux, autant pour valider l\u2019efficacit\u00e9 des dispositifs mis en place pour prot\u00e9ger les syst\u00e8mes que pour r\u00e9v\u00e9ler des br\u00e8ches restant \u00e0 colmater.\u00a0\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg\",\"width\":8256,\"height\":5504,\"caption\":\"Portrait of a young businessman working on a computer in an office at night\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c\",\"name\":\"quentinkieken\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/quentinkieken\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9 - Capgemini France","description":"En mati\u00e8re de politiques de s\u00e9curit\u00e9 informatique, les tests constituent l\u2019un des piliers fondamentaux, autant pour valider l\u2019efficacit\u00e9 des dispositifs mis en place pour prot\u00e9ger les syst\u00e8mes que pour r\u00e9v\u00e9ler des br\u00e8ches restant \u00e0 colmater.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/","og_locale":"fr_FR","og_type":"article","og_title":"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9","og_description":"En mati\u00e8re de politiques de s\u00e9curit\u00e9 informatique, les tests constituent l\u2019un des piliers fondamentaux, autant pour valider l\u2019efficacit\u00e9 des dispositifs mis en place pour prot\u00e9ger les syst\u00e8mes que pour r\u00e9v\u00e9ler des br\u00e8ches restant \u00e0 colmater.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/","og_site_name":"Capgemini France","article_published_time":"2024-07-02T07:00:00+00:00","article_modified_time":"2025-03-04T05:42:36+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/webpreview_blog_dora_tests.png","type":"image\/png"}],"author":"Antoine Bonneville et Erwan Michel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"quentinkieken","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/"},"author":{"name":"quentinkieken","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c"},"headline":"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9","datePublished":"2024-07-02T07:00:00+00:00","dateModified":"2025-03-04T05:42:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/"},"wordCount":936,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Technologies"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/","name":"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9 - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg","datePublished":"2024-07-02T07:00:00+00:00","dateModified":"2025-03-04T05:42:36+00:00","description":"En mati\u00e8re de politiques de s\u00e9curit\u00e9 informatique, les tests constituent l\u2019un des piliers fondamentaux, autant pour valider l\u2019efficacit\u00e9 des dispositifs mis en place pour prot\u00e9ger les syst\u00e8mes que pour r\u00e9v\u00e9ler des br\u00e8ches restant \u00e0 colmater.\u00a0","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg","width":8256,"height":5504,"caption":"Portrait of a young businessman working on a computer in an office at night"},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c","name":"quentinkieken","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/quentinkieken\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":5,"name":"Technologies","slug":"technologies"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg"},"articleSection":"Technologies","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2024-07-02T07:00:00Z","datePublished":"2024-07-02T07:00:00Z","dateModified":"2025-03-04T05:42:36Z"},"rendered":"<meta name=\"parsely-title\" content=\"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-07-02T07:00:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Technologies\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":747040,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-dora-gouvernance\/","url_meta":{"origin":755230,"position":0},"title":"NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences","author":"quentinkieken","date":"March 13, 2024","format":false,"excerpt":"Afin de s\u00e9curiser davantage le tissu \u00e9conomique face \u00e0 des risques num\u00e9riques grandissants, l\u2019Union europ\u00e9enne a adopt\u00e9 en 2022 deux textes majeurs qui entreront prochainement en vigueur\u00a0: NIS2 et DORA.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":742555,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/","url_meta":{"origin":755230,"position":1},"title":"DORA ou l&#8217;approche fond\u00e9e sur les risques","author":"quentinkieken","date":"February 12, 2024","format":false,"excerpt":"En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":736810,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/zero-trust-maturite\/","url_meta":{"origin":755230,"position":2},"title":"Zero Trust, sur la voie de la maturit\u00e9","author":"","date":"January 17, 2024","format":false,"excerpt":"Le mod\u00e8le de cybers\u00e9curit\u00e9 Zero Trust repose sur un principe simple mais radical\u00a0: ne faire confiance \u00e0 personne, tout v\u00e9rifier (never trust, always verify). Souvent per\u00e7ue comme tr\u00e8s novatrice, cette approche s\u2019appuie largement sur de bonnes pratiques en fait d\u00e9j\u00e0 connues, comme par exemple celle du moindre privil\u00e8ge. En revanche,\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-932635766.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":721330,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/tests-dintrusion-au-coeur-de-demarche-damelioration-continue-pour-la-cybersecurite\/","url_meta":{"origin":755230,"position":3},"title":"Les tests d\u2019intrusion au c\u0153ur de la d\u00e9marche d\u2019am\u00e9lioration continue pour la cybers\u00e9curit\u00e9","author":"","date":"June 12, 2023","format":false,"excerpt":"Dans un monde connect\u00e9 et num\u00e9rique en pleine expansion, les cyberattaques repr\u00e9sentent une menace r\u00e9elle et prot\u00e9iforme pour les entreprises. Les pirates informatiques sont constamment \u00e0 l'aff\u00fbt des vuln\u00e9rabilit\u00e9s pour acc\u00e9der aux donn\u00e9es sensibles et causer des dommages parfois irr\u00e9versibles.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":783323,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/","url_meta":{"origin":755230,"position":4},"title":"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?","author":"Tarek Edde Gomez","date":"March 20, 2025","format":false,"excerpt":"Bien que les r\u00e8glementations europ\u00e9ennes DORA et NIS 2 n\u2019aient ni le m\u00eame p\u00e9rim\u00e8tre ni tout \u00e0 fait le m\u00eame objectif, ces deux textes partagent de nombreux points communs, parmi lesquels l\u2019attention toute particuli\u00e8re port\u00e9e \u00e0 la gestion des incidents. Celle-ci doit d\u00e9sormais faire l\u2019objet d\u2019une d\u00e9marche structur\u00e9e, pr\u00e9voyant la\u2026","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"NSI 2_DORA_refletlunettes_Gettyimages","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":718569,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/mobilite-connectee-de-confiance\/","url_meta":{"origin":755230,"position":5},"title":"Pour une mobilit\u00e9 connect\u00e9e de confiance","author":"","date":"June 5, 2023","format":false,"excerpt":"La multiplication des applications mobiles et des syst\u00e8mes embarqu\u00e9s connect\u00e9s, associ\u00e9e au d\u00e9veloppement des communications performantes gr\u00e2ce \u00e0 la 5G, offrent des opportunit\u00e9s sans pr\u00e9c\u00e9dent de nouveaux services num\u00e9riques. Ces opportunit\u00e9s sont rendues possibles par la convergence de moyens techniques multiples.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/05\/GettyImages-1164294814.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg","author_title":"Capgemini","author_thumbnail_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/cg-logo-blue.svg?w=960","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/755230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/247"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=755230"}],"version-history":[{"count":16,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/755230\/revisions"}],"predecessor-version":[{"id":778711,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/755230\/revisions\/778711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/755260"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=755230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=755230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=755230"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=755230"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=755230"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=755230"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=755230"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=755230"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=755230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}