{"id":783323,"date":"2025-03-20T10:00:00","date_gmt":"2025-03-20T09:00:00","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=783323"},"modified":"2025-12-09T09:14:57","modified_gmt":"2025-12-09T08:14:57","slug":"cybersecurite-nis-2-dora-une-incitation-a-la-modernisation","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/","title":{"rendered":"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/08\/Olivier-Gellez.jpeg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Olivier Gellez<\/h5><h5 class=\"blog-date\">20 mars 2025<\/h5><\/div><\/div><div class=\"brand-image\"><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/insights\/expert-perspectives\/dora-pour-une-gestion-de-crise-plus-structuree\/\" target=\"_blank\" rel=\"noreferrer noopener\"><br><\/a>Bien que les r\u00e8glementations europ\u00e9ennes DORA et NIS 2 n\u2019aient ni le m\u00eame p\u00e9rim\u00e8tre ni tout \u00e0 fait le m\u00eame objectif, ces deux textes partagent de nombreux points communs, parmi lesquels l\u2019attention toute particuli\u00e8re port\u00e9e \u00e0 la gestion des incidents. Celle-ci doit d\u00e9sormais faire l\u2019objet d\u2019une d\u00e9marche structur\u00e9e, pr\u00e9voyant la mise en place de processus et outillages appropri\u00e9s. De quoi poser la question plus globale du renouvellement complet du syst\u00e8me d\u2019information (SI) des organisations.\u00a0\u00a0\u00a0\u00a0<\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-une-gestion-de-crise-plus-structuree\">Une gestion de crise plus structur\u00e9e<\/h2>\n\n\n\n<p>Jusqu\u2019\u00e0 pr\u00e9sent, si l\u2019on exclut les Op\u00e9rateurs d\u2019Importance Vitale (OIV) et les organisations d\u00e9j\u00e0 soumises \u00e0 NIS 1, chacun g\u00e9rait ses incidents de cybers\u00e9curit\u00e9 \u00e0 sa mani\u00e8re, en interne, avec ses prestataires et, si possible, en toute discr\u00e9tion.<\/p>\n\n\n\n<p>Avec NIS 2 et DORA, la grande nouveaut\u00e9 est qu\u2019il faut d\u00e9sormais <a href=\"https:\/\/aide.monespacenis2.cyber.gouv.fr\/fr\/article\/quelles-sont-les-exigences-en-matiere-de-cybersecurite-auxquelles-les-entites-regulees-a-la-directive-nis-2-devront-se-soumettre-193huwi\/\" target=\"_blank\" rel=\"noreferrer noopener\">syst\u00e9matiquement alerter les autorit\u00e9s<\/a>, en respectant des grilles de <em>reporting<\/em> standards, et dans des d\u00e9lais tr\u00e8s brefs (4h pour la notification initiale de l\u2019incident au titre de DORA).<\/p>\n\n\n\n<p>Les organisations sont par cons\u00e9quent dans l\u2019obligation d\u2019avoir mis en place des processus efficients et un outillage appropri\u00e9 pour pouvoir d\u00e9tecter au plus t\u00f4t les incidents, en \u00e9valuer rapidement la gravit\u00e9 et les impacts, notamment business, et enfin structurer ces informations pour les communiquer aux autorit\u00e9s.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-un-outillage-approprie\">Un outillage appropri\u00e9<\/h2>\n\n\n\n<p>Nombre d\u2019organisations ne disposent pas pour le moment de l\u2019outillage ad\u00e9quat pour g\u00e9rer correctement un incident de s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>M\u00eame pour celles ayant d\u00e9j\u00e0 un <em>Security Operations Center<\/em> ou SOC (ce qui est loin d\u2019\u00eatre toujours le cas&nbsp;!), celui-ci donne surtout une vision technique des incidents et ne dit rien, le plus souvent, de ses cons\u00e9quences pour les clients. Quant aux organisations qui poss\u00e8dent d\u00e9j\u00e0 des grilles d\u2019impacts, il est peu probable qu\u2019elles co\u00efncident avec ce qui sera demand\u00e9 et la question se posera de savoir s\u2019il vaudra mieux avoir deux <em>reportings<\/em> distincts en parall\u00e8le ou les fusionner.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-des-processus-efficients\">Des processus efficients<\/h2>\n\n\n\n<p>Apr\u00e8s la d\u00e9tection et la notification de l\u2019incident vient son traitement proprement dit, pour lequel NIS 2 exige l\u00e0 aussi que des processus ad\u00e9quats aient \u00e9t\u00e9 pr\u00e9vus.<\/p>\n\n\n\n<p>C\u2019est bien s\u00fbr tr\u00e8s utile, mais aussi extr\u00eamement contraignant, surtout pour les plus petites entit\u00e9s concern\u00e9es. En effet, beaucoup, comme les collectivit\u00e9s locales, sont aujourd\u2019hui tr\u00e8s en retard en mati\u00e8re de cybers\u00e9curit\u00e9, non qu\u2019elles ne prennent pas le sujet au s\u00e9rieux mais parce qu\u2019elles n\u2019ont ni les ressources financi\u00e8res et humaines, ni la taille critique pour s\u2019\u00e9quiper.<\/p>\n\n\n\n<p>Souvent d\u2019ailleurs pour les m\u00eames raisons, ces organisations s\u2019appuient encore largement sur des syst\u00e8mes anciens, h\u00e9t\u00e9rog\u00e8nes, mal entretenus, peu surveill\u00e9s et qui sont pr\u00e9cis\u00e9ment les plus vuln\u00e9rables et les plus difficiles \u00e0 prot\u00e9ger. Pour elles, aussi bien en termes financiers que de comp\u00e9tences, de culture et, bien s\u00fbr, de technologies, la marche de la mise en conformit\u00e9 sera donc assez haute.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-et-s-il-valait-mieux-moderniser-nbsp\">Et s\u2019il valait mieux moderniser&nbsp;?<\/h2>\n\n\n\n<p>Dans ces conditions, cela peut \u00eatre l\u2019opportunit\u00e9 d\u2019adopter une d\u00e9marche radicale et de consid\u00e9rer que la meilleure fa\u00e7on de traiter des incidents est encore de ne pas en avoir&nbsp;! En modernisant son IT, en se dotant d\u2019un SI \u00e0 l\u2019\u00e9tat de l\u2019art des technologies, nativement s\u00e9curis\u00e9, surveill\u00e9 et administr\u00e9 par des experts (dans le cloud ou en infog\u00e9rance), et compatible avec des outils de s\u00e9curit\u00e9 modernes, les risques sont consid\u00e9rablement diminu\u00e9s et la mise en conformit\u00e9 grandement facilit\u00e9e.<\/p>\n\n\n\n<p>Tout bien pes\u00e9, il pourrait donc \u00eatre plus efficace, et pas forc\u00e9ment plus compliqu\u00e9 ni plus co\u00fbteux, de migrer ses anciens syst\u00e8mes vers de nouvelles solutions que de chercher \u00e0 les s\u00e9curiser. Et cela sans m\u00eame tenir compte des b\u00e9n\u00e9fices m\u00e9tiers induits par cette modernisation&nbsp;: innovation, exp\u00e9rience utilisateur, co\u00fbts de possession\u2026<\/p>\n\n\n\n<p>Que ce soit intentionnel ou non de la part du l\u00e9gislateur, NIS 2 appara\u00eet donc comme un <a href=\"https:\/\/aide.monespacenis2.cyber.gouv.fr\/fr\/article\/comment-la-directive-nis-2-sarticule-t-elle-avec-le-reglement-digital-operational-resilience-act-dora-s4ntec\/\">acc\u00e9l\u00e9rateur indirect du renouvellement des SI des organisations<\/a>, de la m\u00eame mani\u00e8re que le renforcement des normes de s\u00e9curit\u00e9 a pu l\u2019\u00eatre pour le parc automobile. Avec des exigences proches, DORA pourrait jouer un r\u00f4le similaire dans le secteur financier, m\u00eame si l\u2019\u00e9quipement et la culture en mati\u00e8re de cybers\u00e9curit\u00e9 y sont souvent d\u00e9j\u00e0 plus d\u00e9velopp\u00e9s qu\u2019ailleurs.<\/p>\n\n\n\n<p>Reste que les d\u00e9lais sont courts, m\u00eame si, en ce qui concerne NIS 2, les autorit\u00e9s semblent dispos\u00e9es \u00e0 <a href=\"https:\/\/www.banquedesterritoires.fr\/nis-2-le-perimetre-et-le-calendrier-sont-ils-realistes\">accorder un peu plus de temps aux organisations pour se pr\u00e9parer<\/a>. Ce r\u00e9pit n\u2019est n\u00e9anmoins pas destin\u00e9 \u00e0 diff\u00e9rer le chantier, mais bien \u00e0 y consacrer toute l\u2019attention n\u00e9cessaire. Pour b\u00e2tir une strat\u00e9gie de mise en conformit\u00e9 (passant ou non par la modernisation), r\u00e9unir les budgets, choisir les solutions, les mettre en \u0153uvre et accompagner le changement, ce sursis ne sera pas de trop.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Auteur<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/08\/Olivier-Gellez.jpeg\" alt=\"Olivier Gellez\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Olivier Gellez<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Cybersecurity practice leader &#8211; Governance, risk &amp; compliance, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Sur le m\u00eame sujet <\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\" aria-label=\"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 49%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\" aria-label=\"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0\"><h3 class=\"expert-subtitle\">\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">mars 13, 2025<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\" aria-label=\"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\" aria-label=\"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9\"><h3 class=\"expert-subtitle\">DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">juil. 2, 2024<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-dora-gouvernance\/\" aria-label=\"NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-dora-gouvernance\/\" aria-label=\"NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences\"><h3 class=\"expert-subtitle\">NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">mars 13, 2024<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader e2a10e8c-7a13-4400-9945-c66c2c90b20c\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Objectif CYBER\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tObjectif CYBER\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Le podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tLe podcast qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Objectif CYBER\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/objectif-cyber\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/CyberseOBJECTIF-CYBERcurite.webp\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 51% 47%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Faites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tFaites de la cybers\u00e9curit\u00e9 votre moteur de transformation. \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"-1\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/Capgemini_services_Cybersecurity-1.webp\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 75% 47%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>Bien que les r\u00e8glementations europ\u00e9ennes DORA et NIS 2 n\u2019aient ni le m\u00eame p\u00e9rim\u00e8tre ni tout \u00e0 fait le m\u00eame objectif, ces deux textes partagent de nombreux points communs, parmi lesquels l\u2019attention toute particuli\u00e8re port\u00e9e \u00e0 la gestion des incidents. Celle-ci doit d\u00e9sormais faire l\u2019objet d\u2019une d\u00e9marche structur\u00e9e, pr\u00e9voyant la mise en place de processus et outillages appropri\u00e9s. De quoi poser la question plus globale du renouvellement complet du syst\u00e8me d\u2019information (SI) des organisations.\u00a0\u00a0<\/p>\n","protected":false},"author":12386,"featured_media":779319,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[138],"tags":[192],"brand":[30],"service":[47],"industry":[25,27,732],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-783323","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-transformation","tag-cybersecurite","brand-capgemini","service-cybersecurite","industry-automobile","industry-banques","industry-financial-services","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0? - Capgemini France<\/title>\n<meta name=\"description\" content=\"Comment Les r\u00e8glementations NIS 2 et DORA incitent \u00e0 moderniser les syst\u00e8mes d&#039;information pour mieux g\u00e9rer les incidents de cybers\u00e9curit\u00e9 ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?\" \/>\n<meta property=\"og:description\" content=\"Comment Les r\u00e8glementations NIS 2 et DORA incitent \u00e0 moderniser les syst\u00e8mes d&#039;information pour mieux g\u00e9rer les incidents de cybers\u00e9curit\u00e9 ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-20T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T08:14:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/WEBPREVIEW-NIS-2-DORA_UP-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Olivier Gellez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tarek Edde Gomez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\"},\"author\":{\"name\":\"Tarek Edde Gomez\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa\"},\"headline\":\"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?\",\"datePublished\":\"2025-03-20T09:00:00+00:00\",\"dateModified\":\"2025-12-09T08:14:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\"},\"wordCount\":900,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\",\"name\":\"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0? - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg\",\"datePublished\":\"2025-03-20T09:00:00+00:00\",\"dateModified\":\"2025-12-09T08:14:57+00:00\",\"description\":\"Comment Les r\u00e8glementations NIS 2 et DORA incitent \u00e0 moderniser les syst\u00e8mes d'information pour mieux g\u00e9rer les incidents de cybers\u00e9curit\u00e9 ?\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg\",\"width\":5617,\"height\":3746,\"caption\":\"Asian man, developer and thinking in coding at night or programming software or application development. Male programmer or coder troubleshooting and working late on code in problem solving at office\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa\",\"name\":\"Tarek Edde Gomez\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/tarekgomez\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0? - Capgemini France","description":"Comment Les r\u00e8glementations NIS 2 et DORA incitent \u00e0 moderniser les syst\u00e8mes d'information pour mieux g\u00e9rer les incidents de cybers\u00e9curit\u00e9 ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/","og_locale":"fr_FR","og_type":"article","og_title":"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?","og_description":"Comment Les r\u00e8glementations NIS 2 et DORA incitent \u00e0 moderniser les syst\u00e8mes d'information pour mieux g\u00e9rer les incidents de cybers\u00e9curit\u00e9 ?","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/","og_site_name":"Capgemini France","article_published_time":"2025-03-20T09:00:00+00:00","article_modified_time":"2025-12-09T08:14:57+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/WEBPREVIEW-NIS-2-DORA_UP-1.png","type":"image\/png"}],"author":"Olivier Gellez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tarek Edde Gomez","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/"},"author":{"name":"Tarek Edde Gomez","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa"},"headline":"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?","datePublished":"2025-03-20T09:00:00+00:00","dateModified":"2025-12-09T08:14:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/"},"wordCount":900,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/","name":"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0? - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg","datePublished":"2025-03-20T09:00:00+00:00","dateModified":"2025-12-09T08:14:57+00:00","description":"Comment Les r\u00e8glementations NIS 2 et DORA incitent \u00e0 moderniser les syst\u00e8mes d'information pour mieux g\u00e9rer les incidents de cybers\u00e9curit\u00e9 ?","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg","width":5617,"height":3746,"caption":"Asian man, developer and thinking in coding at night or programming software or application development. Male programmer or coder troubleshooting and working late on code in problem solving at office"},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa","name":"Tarek Edde Gomez","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/tarekgomez\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"industry":[{"id":25,"name":"Automobile","slug":"automobile"},{"id":27,"name":"Banques","slug":"banques"},{"id":732,"name":"Services Financiers","slug":"financial-services"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg"},"articleSection":"Transformation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2025-03-20T09:00:00Z","datePublished":"2025-03-20T09:00:00Z","dateModified":"2025-12-09T08:14:57Z"},"rendered":"<meta name=\"parsely-title\" content=\"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-03-20T09:00:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Transformation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg","featured_image_alt":"NSI 2_DORA_refletlunettes_Gettyimages","jetpack-related-posts":[{"id":747040,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-dora-gouvernance\/","url_meta":{"origin":783323,"position":0},"title":"NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences","author":"quentinkieken","date":"March 13, 2024","format":false,"excerpt":"Afin de s\u00e9curiser davantage le tissu \u00e9conomique face \u00e0 des risques num\u00e9riques grandissants, l\u2019Union europ\u00e9enne a adopt\u00e9 en 2022 deux textes majeurs qui entreront prochainement en vigueur\u00a0: NIS2 et DORA.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":755230,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/","url_meta":{"origin":783323,"position":1},"title":"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9","author":"quentinkieken","date":"July 2, 2024","format":false,"excerpt":"En mati\u00e8re de politiques de s\u00e9curit\u00e9 informatique, les tests constituent l\u2019un des piliers fondamentaux, autant pour valider l\u2019efficacit\u00e9 des dispositifs mis en place pour prot\u00e9ger les syst\u00e8mes que pour r\u00e9v\u00e9ler des br\u00e8ches restant \u00e0 colmater.\u00a0\u00a0","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":742555,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/","url_meta":{"origin":783323,"position":2},"title":"DORA ou l&#8217;approche fond\u00e9e sur les risques","author":"quentinkieken","date":"February 12, 2024","format":false,"excerpt":"En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":778710,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/","url_meta":{"origin":783323,"position":3},"title":"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0","author":"Tarek Edde Gomez","date":"March 13, 2025","format":false,"excerpt":"Conscientes qu\u2019en mati\u00e8re d\u2019IT le risque z\u00e9ro n\u2019existe pas, de plus en plus d\u2019organisations ont mis en place des dispositifs et des proc\u00e9dures afin de r\u00e9agir efficacement en cas d\u2019incident de s\u00e9curit\u00e9.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":787594,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","url_meta":{"origin":783323,"position":4},"title":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9","author":"anne.gautier@capgemini.com","date":"July 3, 2025","format":false,"excerpt":"Malgr\u00e9 les incertitudes r\u00e9glementaires, les organisations doivent investir d\u00e8s maintenant dans l\u2019IA pour la cybers\u00e9curit\u00e9, tout en avan\u00e7ant avec prudence, en encadrant son usage par une gouvernance rigoureuse et une veille continue.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":781784,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/innovation-cybermenace-quantique-passer-a-laction\/","url_meta":{"origin":783323,"position":5},"title":"Face \u00e0 la cybermenace quantique, sortir du d\u00e9ni et passer \u00e0 l\u2019action","author":"cyrille.joseph-lockel@capgemini.com","date":"April 9, 2025","format":false,"excerpt":"Moins en vue que l\u2019intelligence artificielle, l\u2019informatique quantique progresse n\u00e9anmoins tout aussi vite.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/2025-FR-FC-Blog-Cyber-Quantique.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/2025-FR-FC-Blog-Cyber-Quantique.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/2025-FR-FC-Blog-Cyber-Quantique.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/2025-FR-FC-Blog-Cyber-Quantique.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/783323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/12386"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=783323"}],"version-history":[{"count":15,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/783323\/revisions"}],"predecessor-version":[{"id":798464,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/783323\/revisions\/798464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/779319"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=783323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=783323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=783323"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=783323"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=783323"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=783323"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=783323"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=783323"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=783323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}