{"id":778710,"date":"2025-03-13T10:50:10","date_gmt":"2025-03-13T09:50:10","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=778710"},"modified":"2025-10-30T16:41:37","modified_gmt":"2025-10-30T15:41:37","slug":"dora-pour-une-gestion-de-crise-plus-structuree","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/","title":{"rendered":"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/08\/Olivier-Gellez.jpeg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Olivier Gellez<\/h5><h5 class=\"blog-date\">13 mars 2025<\/h5><\/div><\/div><div class=\"brand-image\"><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/insights\/expert-perspectives\/dora-pour-une-gestion-de-crise-plus-structuree\/\" target=\"_blank\" rel=\"noreferrer noopener\"><br><\/a>Conscientes qu\u2019en mati\u00e8re d\u2019IT le risque z\u00e9ro n\u2019existe pas, de plus en plus d\u2019organisations ont mis en place des dispositifs et des proc\u00e9dures afin de r\u00e9agir efficacement en cas d\u2019incident de s\u00e9curit\u00e9.\u00a0\u00a0<\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>Si ces plans de surveillance, de continuit\u00e9 et reprise d\u2019activit\u00e9, et de gestion de crise se fondent en g\u00e9n\u00e9ral sur de bonnes pratiques reconnues, ils ne sont ni syst\u00e9matiques ni homog\u00e8nes \u00e0 l\u2019\u00e9chelle sectorielle. En cas d\u2019incident, les clients, les collaborateurs et les partenaires peuvent rester dans le flou concernant sa nature, ses impacts et la dur\u00e9e de sa r\u00e9solution comme l\u2019ont encore montr\u00e9 derni\u00e8rement des dysfonctionnements affectant les syst\u00e8mes de paiement d\u2019acteurs majeurs.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Avec <a href=\"https:\/\/finance.ec.europa.eu\/regulation-and-supervision\/financial-services-legislation\/implementing-and-delegated-acts\/digital-operational-resilience-regulation_en\" target=\"_blank\" rel=\"noreferrer noopener\">le r\u00e8glement europ\u00e9en DORA (<em>Digital Operational Resilience Act)<\/em><\/a><em>,<\/em> la capacit\u00e9 de gestion de crise devient une obligation, poussant le secteur financier \u00e0 se structurer sur les plans op\u00e9rationnels et organisationnels. L\u2019objectif est \u00e0 la fois\u202f:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>de renforcer la protection des parties prenantes au niveau de chaque \u00e9tablissement,&nbsp;&nbsp;<\/li>\n\n\n\n<li>de renforcer la s\u00e9curit\u00e9 collective en ayant une visibilit\u00e9 accrue et plus pr\u00e9coce sur des incidents qui pourraient affecter tout le secteur,&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li>de r\u00e9pondre \u00e0 un besoin d\u2019harmonisation&nbsp;rendu fondamental par le caract\u00e8re transfrontalier et interd\u00e9pendant des risques. Ce qui a notamment fait d\u00e9faut lors de cyberattaques de grande envergure, telles que les ran\u00e7ongiciels <a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2018\/02\/15\/virus-informatique-notpetya-le-royaume-uni-accuse-la-russie-qui-dement_5257443_4408996.html\" target=\"_blank\" rel=\"noreferrer noopener\">NotPety<\/a><a href=\"https:\/\/www.zdnet.fr\/actualites\/notpetya-6-faits-essentiels-sur-l-attaque-mondiale-de-ransomware-39854322.htm\" target=\"_blank\" rel=\"noreferrer noopener\">a<\/a> et <a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2017\/05\/13\/ce-que-l-on-sait-du-logiciel-de-racket-qui-a-paralyse-les-hopitaux-britanniques-et-touche-des-dizaines-de-pays_5127351_4408996.html\" target=\"_blank\" rel=\"noreferrer noopener\">WannaCry<\/a> qui ont touch\u00e9 plusieurs milliers de soci\u00e9t\u00e9s dans le monde.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>DORA entend donc faire progresser les \u00e9tablissements financiers en mati\u00e8re de gestion de crise en ce qui concerne le partage d\u2019information, la communication et la n\u00e9cessit\u00e9 absolue de s\u2019entra\u00eener.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-remontee-d-information-formalisee\"><strong>Une remont\u00e9e d\u2019information formalis\u00e9e<\/strong>.<\/h2>\n\n\n\n<p>DORA formalise la notification aux r\u00e9gulateurs nationaux en cas d\u2019incident (en France l\u2019ACPR, l\u2019Autorit\u00e9 de Contr\u00f4le Prudentiel et de R\u00e9solution et l\u2019AMF, l\u2019Autorit\u00e9 des March\u00e9s Financiers), en demandant \u00e0 ce qu\u2019un certain nombre d\u2019\u00e9l\u00e9ments techniques standards soient syst\u00e9matiquement rapport\u00e9s aux autorit\u00e9s europ\u00e9ennes de surveillance. De cette mani\u00e8re, chaque acteur devient un capteur d\u2019indicateurs de compromission (IoC), contribuant \u00e0 accro\u00eetre la connaissance des menaces (<em>threat intelligence<\/em>) et permettant de pr\u00e9venir au plus t\u00f4t le reste de la place financi\u00e8re.&nbsp;<\/p>\n\n\n\n<p>Cette grille, dont le contenu attendu est pr\u00e9cis\u00e9 par les textes d\u2019application, fait \u00e9voluer les rapports d\u2019incidents que les entreprises produisaient jusqu\u2019ici, souvent avec un prisme essentiellement technique et interne.<\/p>\n\n\n\n<p>Outre les caract\u00e9ristiques et les impacts techniques de l\u2019incident, il faudra en effet \u00eatre capable d\u2019\u00e9valuer tout ce qu\u2019il entra\u00eene\u202fpour l\u2019organisation et ses parties prenantes\u202f: co\u00fbts, impacts sur les op\u00e9rations et les affaires, cons\u00e9quences pour les clients et les collaborateurs\u2026 La DSI et les risques ne pouvant appr\u00e9cier seuls l\u2019\u00e9tendue de ces r\u00e9percussions, le r\u00e8glement DORA pousse donc \u00e0 ce que le risque num\u00e9rique soit d\u00e9sormais pris en compte de fa\u00e7on globale et transverse au sein de toute l\u2019organisation, sous l\u2019\u0153il et le patronage de la direction g\u00e9n\u00e9rale.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-l-importance-cle-de-la-communication\"><strong>L\u2019importance cl\u00e9 de la communication<\/strong>.<\/h2>\n\n\n\n<p>DORA met \u00e9galement l\u2019accent sur l\u2019importance de la communication en cas de crise. Le texte impose notamment de d\u00e9finir une strat\u00e9gie d\u00e9di\u00e9e et de d\u00e9signer un responsable pour communiquer en cas de crise.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Avec cette obligation, l\u2019\u00e9tablissement qui ne communiquera pas, ou mal, en cas d\u2019incident sera d\u00e9cr\u00e9dibilis\u00e9 aupr\u00e8s de ses pairs, des autorit\u00e9s de r\u00e9gulation et, surtout, du public.<\/p>\n\n\n\n<p>Pour ne pas se retrouver dans cette situation, il est fondamental d\u2019anticiper divers sc\u00e9narios de crise et de pr\u00e9parer pour chacun d\u2019eux des \u00e9l\u00e9ments de langage ad\u00e9quats, de pr\u00e9-r\u00e9diger des contenus et d\u2019identifier les destinataires (clients, autorit\u00e9s, m\u00e9dias, personnel\u2026) de la communication. On veillera aussi \u00e0 adapter les messages \u00e0 ces cibles tout en restant coh\u00e9rent avec le positionnement et le discours usuel de la marque (\u00e0 l\u2019inverse, on sera aussi attentif \u00e0 \u00e9viter dans la communication ordinaire de l\u2019entreprise tout \u00e9l\u00e9ment qui pourrait se retourner contre elle en cas crise).<\/p>\n\n\n\n<p>Les organisations devront aussi veiller \u00e0 disposer d\u2019un outillage appropri\u00e9 et particuli\u00e8rement robuste. Celui-ci doit en effet \u00eatre imperm\u00e9able \u00e0 la crise pour que les acteurs cl\u00e9s puissent quoi qu\u2019il arrive collaborer et diffuser leurs messages en interne et en externe.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-s-entrainer-une-necessite\"><strong>S\u2019entra\u00eener, une n\u00e9cessit\u00e9<\/strong> !<\/h2>\n\n\n\n<p>Aucune pr\u00e9paration n\u2019est toutefois compl\u00e8te sans entra\u00eenement ni confrontation avec la r\u00e9alit\u00e9. L\u2019ensemble de la proc\u00e9dure de gestion de crise devra donc \u00eatre test\u00e9e dans des conditions les plus proches possibles d\u2019un v\u00e9ritable incident, et les acteurs devront s\u2019exercer pour tenir efficacement leur r\u00f4le le moment venu.<\/p>\n\n\n\n<p>Des enseignements devront \u00eatre tir\u00e9s de ces entra\u00eenements pour compl\u00e9ter et ajuster le dispositif afin d\u2019\u00e9viter les mauvaises surprises. Enfin, l\u2019implication et le <em>sponsorship<\/em> de la direction sont particuli\u00e8rement importants pour que chacun soit mobilis\u00e9 et contribue \u00e0 ces efforts de pr\u00e9paration avec le s\u00e9rieux qui s\u2019impose.<\/p>\n\n\n\n<p>Comme sur les autres aspects de<a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blogs\/cyber-resilience-entre-cybersecurite-et-gestion-du-risque-strategique\/\"> la r\u00e9silience face au risque num\u00e9rique<\/a>, le r\u00e8glement europ\u00e9en DORA pourrait pr\u00e9figurer pour le secteur financier en mati\u00e8re de gestion de crise ce que NIS2 demandera \u00e0 l\u2019ensemble des entreprises. Et, ici aussi, cela doit \u00eatre moins per\u00e7u comme une contrainte que comme l\u2019opportunit\u00e9 de structurer, renforcer et harmoniser les pratiques pour mettre en r\u00e9sonance protections individuelle et collective.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Auteur<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/08\/Olivier-Gellez.jpeg\" alt=\"Olivier Gellez\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Olivier Gellez<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Cybersecurity practice leader &#8211; Governance, risk &amp; compliance, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Sur le m\u00eame sujet <\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\" aria-label=\"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\" aria-label=\"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9\"><h3 class=\"expert-subtitle\">DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">juil. 2, 2024<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-dora-gouvernance\/\" aria-label=\"NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-dora-gouvernance\/\" aria-label=\"NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences\"><h3 class=\"expert-subtitle\">NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">mars 13, 2024<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\" aria-label=\"DORA ou l&#039;approche fond\u00e9e sur les risques\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/\" aria-label=\"DORA ou l&#039;approche fond\u00e9e sur les risques\"><h3 class=\"expert-subtitle\">DORA ou l&#039;approche fond\u00e9e sur les risques<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">f\u00e9vr. 12, 2024<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 70174935-8b7a-43cf-a4db-ef4a6d93a03b\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CYBER\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CYBER\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Le podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tLe podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Objectif CYBER\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cyber\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 51% 47%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Faites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tFaites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 75% 47%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>Conscientes qu\u2019en mati\u00e8re d\u2019IT le risque z\u00e9ro n\u2019existe pas, de plus en plus d\u2019organisations ont mis en place des dispositifs et des proc\u00e9dures afin de r\u00e9agir efficacement en cas d\u2019incident de s\u00e9curit\u00e9.<\/p>\n","protected":false},"author":12386,"featured_media":778752,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":"{\"x\":0.5,\"y\":0.49}"},"categories":[138],"tags":[192],"brand":[],"service":[47],"industry":[27,732],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-778710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-transformation","tag-cybersecurite","service-cybersecurite","industry-banques","industry-financial-services","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0 - Capgemini France<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment DORA renforce la gestion de crise et la pr\u00e9paration aux incidents dans le secteur financier.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment DORA renforce la gestion de crise et la pr\u00e9paration aux incidents dans le secteur financier.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-13T09:50:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-30T15:41:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Webpreview-Dora-pour-une-gestion-de-crise-plus-structuree-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Olivier Gellez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tarek Edde Gomez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\"},\"author\":{\"name\":\"Tarek Edde Gomez\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa\"},\"headline\":\"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0\",\"datePublished\":\"2025-03-13T09:50:10+00:00\",\"dateModified\":\"2025-10-30T15:41:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\"},\"wordCount\":997,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\",\"name\":\"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0 - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg\",\"datePublished\":\"2025-03-13T09:50:10+00:00\",\"dateModified\":\"2025-10-30T15:41:37+00:00\",\"description\":\"D\u00e9couvrez comment DORA renforce la gestion de crise et la pr\u00e9paration aux incidents dans le secteur financier.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg\",\"width\":6681,\"height\":4454,\"caption\":\"Young woman programmer hacker using computer\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa\",\"name\":\"Tarek Edde Gomez\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/tarekgomez\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0 - Capgemini France","description":"D\u00e9couvrez comment DORA renforce la gestion de crise et la pr\u00e9paration aux incidents dans le secteur financier.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/","og_locale":"fr_FR","og_type":"article","og_title":"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0","og_description":"D\u00e9couvrez comment DORA renforce la gestion de crise et la pr\u00e9paration aux incidents dans le secteur financier.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/","og_site_name":"Capgemini France","article_published_time":"2025-03-13T09:50:10+00:00","article_modified_time":"2025-10-30T15:41:37+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Webpreview-Dora-pour-une-gestion-de-crise-plus-structuree-.png","type":"image\/png"}],"author":"Olivier Gellez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tarek Edde Gomez","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/"},"author":{"name":"Tarek Edde Gomez","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa"},"headline":"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0","datePublished":"2025-03-13T09:50:10+00:00","dateModified":"2025-10-30T15:41:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/"},"wordCount":997,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/","name":"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0 - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg","datePublished":"2025-03-13T09:50:10+00:00","dateModified":"2025-10-30T15:41:37+00:00","description":"D\u00e9couvrez comment DORA renforce la gestion de crise et la pr\u00e9paration aux incidents dans le secteur financier.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg","width":6681,"height":4454,"caption":"Young woman programmer hacker using computer"},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa","name":"Tarek Edde Gomez","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/tarekgomez\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"industry":[{"id":27,"name":"Banques","slug":"banques"},{"id":732,"name":"Services Financiers","slug":"financial-services"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg"},"articleSection":"Transformation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2025-03-13T09:50:10Z","datePublished":"2025-03-13T09:50:10Z","dateModified":"2025-10-30T15:41:37Z"},"rendered":"<meta name=\"parsely-title\" content=\"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-03-13T09:50:10Z\" \/>\n<meta name=\"parsely-section\" content=\"Transformation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":727157,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/eim-strategies-data\/","url_meta":{"origin":778710,"position":0},"title":"Avec l\u2019EIM, les donn\u00e9es non structur\u00e9es ne sont plus les oubli\u00e9es des strat\u00e9gies data","author":"cyrille.joseph-lockel@capgemini.com","date":"September 9, 2023","format":false,"excerpt":"Bien que constituant une large part du patrimoine de donn\u00e9es, les donn\u00e9es non structur\u00e9es sont trop souvent n\u00e9glig\u00e9es.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/08\/2023-FR-Featured-Image-Blog-EIM.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/08\/2023-FR-Featured-Image-Blog-EIM.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/08\/2023-FR-Featured-Image-Blog-EIM.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/08\/2023-FR-Featured-Image-Blog-EIM.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":783323,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/","url_meta":{"origin":778710,"position":1},"title":"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?","author":"Tarek Edde Gomez","date":"March 20, 2025","format":false,"excerpt":"Bien que les r\u00e8glementations europ\u00e9ennes DORA et NIS 2 n\u2019aient ni le m\u00eame p\u00e9rim\u00e8tre ni tout \u00e0 fait le m\u00eame objectif, ces deux textes partagent de nombreux points communs, parmi lesquels l\u2019attention toute particuli\u00e8re port\u00e9e \u00e0 la gestion des incidents. Celle-ci doit d\u00e9sormais faire l\u2019objet d\u2019une d\u00e9marche structur\u00e9e, pr\u00e9voyant la\u2026","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"NSI 2_DORA_refletlunettes_Gettyimages","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":762594,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/resilience-supply-chain-automobile\/","url_meta":{"origin":778710,"position":2},"title":"Renforcer la r\u00e9silience de la supply chain automobile gr\u00e2ce \u00e0 la data et l\u2019intelligence artificielle","author":"quentinkieken","date":"September 26, 2024","format":false,"excerpt":"Tensions g\u00e9opolitiques, fluctuations des prix des mati\u00e8res premi\u00e8res, p\u00e9nuries de composants, al\u00e9as climatiques et risques de cybers\u00e9curit\u00e9\u2026 Les constructeurs automobiles font face \u00e0 une multitude de risques strat\u00e9giques, logistiques et technologiques, complexifiant la gestion de leurs cha\u00eenes d\u2019approvisionnement.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":754687,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/vers-une-flexibilite-renforcee-de-la-supply-chain-et-des-architectures-it\/","url_meta":{"origin":778710,"position":3},"title":"Vers une flexibilit\u00e9 renforc\u00e9e de la Supply Chain et des architectures IT\u00a0","author":"","date":"June 5, 2024","format":false,"excerpt":"La Supply Chain \u00e9volue naturellement, comme tout processus organisationnel, contrainte par les impacts de la technologie ou les obligations r\u00e8glementaires notamment li\u00e9es au d\u00e9veloppement durable.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/2024-FR-Hero-Banner-Blog-architectures-IT.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/2024-FR-Hero-Banner-Blog-architectures-IT.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/2024-FR-Hero-Banner-Blog-architectures-IT.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/2024-FR-Hero-Banner-Blog-architectures-IT.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":791247,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/","url_meta":{"origin":778710,"position":4},"title":"Renforcer la r\u00e9silience des entreprises : strat\u00e9gies cl\u00e9s pour les environnements industriels","author":"Tarek Edde Gomez","date":"September 24, 2025","format":false,"excerpt":"Dans un monde industriel hyperconnect\u00e9, les entreprises sont de plus en plus vuln\u00e9rables aux perturbations g\u00e9opolitiques et \u00e9conomiques, rendant la r\u00e9silience de leur \u00e9cosyst\u00e8me strat\u00e9gique.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":756490,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/intelligent-industry-supply-chain-systeme-hybride-humain-data\/","url_meta":{"origin":778710,"position":5},"title":"Contr\u00f4ler sa supply chain gr\u00e2ce \u00e0 un syst\u00e8me hybride s\u2019appuyant sur l\u2019Humain et la data\u00a0","author":"","date":"July 4, 2024","format":false,"excerpt":"Comment d\u00e9ployer des ressources expertes au plus pr\u00e8s de ses fournisseurs pour les accompagner dans le changement ?","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/2024-FR-fi-Blog-Supply-chain-humain.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/2024-FR-fi-Blog-Supply-chain-humain.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/2024-FR-fi-Blog-Supply-chain-humain.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/2024-FR-fi-Blog-Supply-chain-humain.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/778710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/12386"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=778710"}],"version-history":[{"count":19,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/778710\/revisions"}],"predecessor-version":[{"id":798466,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/778710\/revisions\/798466"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/778752"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=778710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=778710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=778710"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=778710"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=778710"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=778710"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=778710"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=778710"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=778710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}