{"id":787211,"date":"2025-06-24T11:48:31","date_gmt":"2025-06-24T09:48:31","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=787211"},"modified":"2026-01-07T13:40:33","modified_gmt":"2026-01-07T12:40:33","slug":"cybersecurite-et-ia-un-nouvel-horizon-pour-la-defense","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/","title":{"rendered":"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Vincent-Laurens.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Vincent Laurens<\/h5><h5 class=\"blog-date\">23 juin 2025<\/h5><\/div><\/div><div class=\"brand-image\"><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">L\u2019IA bouleverse tous les aspects du domaine militaire, du centre de commandement au th\u00e9\u00e2tre des op\u00e9rations, des fonctions de soutien aux syst\u00e8mes de combat. Pour les forces arm\u00e9es, elle est un formidable atout, leur permettant de se pr\u00e9parer et d\u2019agir avec davantage d\u2019anticipation, de pr\u00e9cision et d\u2019efficacit\u00e9, mais elle est aussi une redoutable menace, car elle d\u00e9multiplie dans les m\u00eames proportions les capacit\u00e9s de l\u2019adversaire.<\/h2><p class=\"intro-para-content\">De la d\u00e9sinformation au sabotage des infrastructures en passant par l\u2019usage massif des drones, les conflits en cours r\u00e9v\u00e8lent la place pr\u00e9pond\u00e9rante qu\u2019elle occupe d\u00e9sormais. Dans un contexte g\u00e9opolitique particuli\u00e8rement tendu et incertain, et face \u00e0 des acteurs de plus en plus d\u00e9sinhib\u00e9s, le monde de la d\u00e9fense doit absolument faire de la cybers\u00e9curit\u00e9 de, et par, l\u2019IA une priorit\u00e9 absolue.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>La s\u00e9curisation des syst\u00e8mes d\u2019IA comporte deux volets compl\u00e9mentaires&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><em>D\u00e9velopper des solutions nativement s\u00e9curis\u00e9es<\/em><\/strong>&nbsp;: Pour \u00e9viter que l\u2019on puisse exfiltrer ou polluer les donn\u00e9es d\u2019un syst\u00e8me d\u2019IA, le paralyser ou s\u2019y introduire pour en prendre le contr\u00f4le, il est imp\u00e9ratif d\u2019en envisager la s\u00e9curit\u00e9 d\u00e8s l\u2019origine, c\u2019est-\u00e0-dire d\u00e8s la conception des algorithmes et de l\u2019application qui va les int\u00e9grer. On s\u2019appuiera pour cela sur les bonnes pratiques usuelles de la s\u00e9curit\u00e9 by design, auxquelles s\u2019ajoutera une dimension sp\u00e9cifique d\u2019\u00e9thique by design afin de maintenir la solution et ses r\u00e9ponses dans le cadre des valeurs de l\u2019institution.<\/li>\n\n\n\n<li><strong><em>Prot\u00e9ger les actifs lorsque les syst\u00e8mes sont utilis\u00e9s<\/em><\/strong>&nbsp;: En plus de prot\u00e9ger les syst\u00e8mes d\u2019IA contre les attaques ext\u00e9rieures, il faut aussi \u00e9viter que leur utilisation elle-m\u00eame \u2013 maladroite ou malveillante \u2013 ne puisse avoir des cons\u00e9quences dommageables. Pour \u00e9viter les d\u00e9cisions erron\u00e9es ou la divulgation d\u2019informations sensibles, on mettra en place des garde-fous automatis\u00e9s et humains, et l\u2019on veillera tout particuli\u00e8rement \u00e0 la qualit\u00e9 des donn\u00e9es d\u2019entra\u00eenement et d\u2019analyse (RAG) pour minimiser les biais et les hallucinations.<\/li>\n<\/ul>\n\n\n\n<p>La puissance de l\u2019IA peut par ailleurs \u00eatre mise au service de la cybers\u00e9curit\u00e9, l\u00e0 aussi de deux mani\u00e8res&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><em>Prendre de meilleures d\u00e9cisions<\/em><\/strong>&nbsp;: Dans la masse des donn\u00e9es de toutes natures que collectent les organismes de d\u00e9fense, l\u2019IA est capable de rep\u00e9rer des signaux faibles, des sch\u00e9mas r\u00e9v\u00e9lateurs d\u2019une attaque, d\u2019en identifier et d\u2019en localiser avec pr\u00e9cision l\u2019origine, de fournir aux personnels une information claire et compl\u00e8te, d\u2019automatiser les r\u00e9ponses\u2026 Ces capacit\u00e9s b\u00e9n\u00e9ficient \u00e0 la cybers\u00e9curit\u00e9 de m\u00eame qu\u2019\u00e0 tous les enjeux de la d\u00e9fense dans le monde physique&nbsp;: communication et renseignement, syst\u00e8mes op\u00e9rationnels, g\u00e9nie, logistique, MCO\u2026<\/li>\n\n\n\n<li><strong><em>Contrecarrer des activit\u00e9s malveillantes employant elle-m\u00eame l\u2019IA<\/em><\/strong>&nbsp;: Les acteurs malveillants mettent eux aussi \u00e0 profit l\u2019IA pour d\u00e9velopper des attaques toujours plus sophistiqu\u00e9es, et seule l\u2019IA est parfois capable de les contrer. Elle peut, par exemple, identifier \u00e0 la vol\u00e9e les deepfakes et les messages de phishing, ou encore lutter contre les malwares polymorphes.<\/li>\n<\/ul>\n\n\n\n<p>L\u2019urgence est de se renforcer sur ces quatre aspects fondamentaux. Cependant, ces enjeux imm\u00e9diats ne doivent pas occulter les cons\u00e9quences \u00e0 plus long terme de l\u2019IA, dont il faut aussi tenir compte terme dans l\u2019\u00e9laboration des strat\u00e9gies, des capacit\u00e9s et des syst\u00e8mes futurs. En ce qui concerne la cybers\u00e9curit\u00e9, deux sujets doivent d\u00e8s \u00e0 pr\u00e9sent entrer dans les r\u00e9flexions&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><em>La perte de comp\u00e9tences<\/em><\/strong> : Bien que les taux d&#8217;hallucinations restent \u00e9lev\u00e9s (et m\u00eame augmentent selon certaines observations), la confiance des utilisateurs envers l\u2019IA s\u2019accro\u00eet \u00e0 mesure qu\u2019elle s\u2019installe dans leur quotidien. Il pourrait s\u2019ensuivre une d\u00e9perdition des savoirs qu\u2019ils sont de plus en plus enclins \u00e0 d\u00e9l\u00e9guer \u00e0 la machine. L\u2019exemple de l\u2019industrie nucl\u00e9aire montre que l\u2019attrition des comp\u00e9tences peut \u00eatre tr\u00e8s rapide. Manquera-t-on bient\u00f4t d\u2019experts pour valider les r\u00e9sultats des syst\u00e8mes d\u2019IA ou prendre les d\u00e9cisions finales ? La d\u00e9fense ne peut ignorer cette question cruciale.<\/li>\n\n\n\n<li><strong><em>L\u2019\u00e9mergence de l\u2019IA agentique<\/em><\/strong> : Alors que les capacit\u00e9s des LLM pourraient \u00e0 terme plafonner faute de donn\u00e9es d\u2019apprentissage en quantit\u00e9, en qualit\u00e9 et en originalit\u00e9 suffisantes, les IA dites \u00ab agentiques \u00bb \u2013 des syst\u00e8mes sp\u00e9cialis\u00e9s, ferm\u00e9s, entra\u00een\u00e9s sur des corpus restreints, et capables d\u2019accomplir seuls des t\u00e2ches complexes comme coordonner le vol d\u2019un essaim de drones \u2013 offrent des perspectives tr\u00e8s prometteuses. Cependant, ces IA agentiques poseront des d\u00e9fis de s\u00e9curit\u00e9 in\u00e9dits. Il faudra par exemple int\u00e9grer les agents aux syst\u00e8mes d\u2019authentification et d\u2019habilitation, s\u00e9curiser leurs interconnexions\u2026 Pour l\u2019heure, il n\u2019existe pas encore de standards en la mati\u00e8re, et encore moins de niveau d\u00e9fense, mais des travaux sont en cours.<\/li>\n<\/ul>\n\n\n\n<p>Que ce soit en tant que cible, menace ou parade, l\u2019IA repousse les fronti\u00e8res de la cybers\u00e9curit\u00e9 avec, aux c\u00f4t\u00e9s de probl\u00e9matiques des plus classiques, des enjeux d\u2019une nature ou d\u2019une magnitude in\u00e9dite. Pour le monde de la d\u00e9fense, il s\u2019agit d\u2019un d\u00e9fi majeur et vital. Pour le relever, il lui faut se doter d\u2019une doctrine et d\u2019une strat\u00e9gie, de comp\u00e9tences et de ressources technologiques, et d\u2019instruments de veille, d\u2019analyse et d\u2019innovation pour rester au contact d\u2019\u00e9volutions extr\u00eamement rapides. Et tout cela sans perdre un instant.<\/p>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Conf\u00e9rence au Salon du Bourget<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">Renforcer la cybers\u00e9curit\u00e9 gr\u00e2ce \u00e0 l&#8217;IA<\/p><\/div><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/-6qIMnsv-XU\" frameborder=\"0\" rel=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Auteurs<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Vincent-Laurens.png\" alt=\"Vincent Laurens\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Vincent Laurens<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur du d\u00e9veloppement Cyber pour la r\u00e9gion Europe du Sud, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Vincent a d\u00e9but\u00e9 sa carri\u00e8re en s\u00e9curit\u00e9 informatique dans les ann\u00e9es 90, travaillant avec diverses organisations, y compris des services de renseignement et des industries sp\u00e9cialis\u00e9es. En 2013, Vincent a rejoint Sogeti au Luxembourg, puis est devenu vice-pr\u00e9sident mondial de la cybers\u00e9curit\u00e9 en 2018. Depuis 2022, Vincent est vice-pr\u00e9sident et strat\u00e8ge mondial de la s\u00e9curit\u00e9 chez Devo, et en 2024, il a rejoint Capgemini pour diriger la cybers\u00e9curit\u00e9 dans la r\u00e9gion SCE. Depuis 2019, il est \u00e9galement administrateur non ex\u00e9cutif pour plusieurs start-ups technologiques et conseille des dirigeants et des conseils d&#8217;administration en cybers\u00e9curit\u00e9.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/10\/Jerome_Desbonnet-square.jpg\" alt=\"J\u00e9r\u00f4me Desbonnet\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/jeromedesbonnet\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">J\u00e9r\u00f4me Desbonnet<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>VP &#8211; Cybersecurity CTIO &#8211; Chief cybersecurity Architect CIS GBL&#039;s, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/jeromedesbonnet\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">En tant que VP, Cybersecurity CTIO, J\u00e9r\u00f4me\u00a0cr\u00e9e des mod\u00e8les d\u2019architecture de s\u00e9curit\u00e9. J\u00e9r\u00f4me planifie et ex\u00e9cute d\u2019importants programmes de s\u00e9curit\u00e9 afin de garantir que les clients de Capgemini sont bien prot\u00e9g\u00e9s.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Curseur pr\u00e9c\u00e9dent\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Curseur suivant\"><\/button><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader a6f52e8f-8905-4fb6-a4f6-0af789fd7939\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire1\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Acc\u00e9l\u00e9rez la transformation de votre entreprise avec une cybers\u00e9curit\u00e9 en laquelle vous pouvez avoir confiance.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tAcc\u00e9l\u00e9rez la transformation de votre entreprise avec une cybers\u00e9curit\u00e9 en laquelle vous pouvez avoir confiance.<br>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"24\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\taria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"0\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"object-position: 50% 50%; object-fit: cover;\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire1\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"A\u00e9ronautique et d\u00e9fense\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tA\u00e9ronautique et d\u00e9fense\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Capgemini r\u00e9unit les capacit\u00e9s n\u00e9cessaires pour r\u00e9imaginer la fa\u00e7on dont les leaders de l\u2019a\u00e9ronautique et de la d\u00e9fense con\u00e7oivent, fabriquent e\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCapgemini r\u00e9unit les capacit\u00e9s n\u00e9cessaires pour r\u00e9imaginer la fa\u00e7on dont les leaders de l\u2019a\u00e9ronautique et de la d\u00e9fense con\u00e7oivent, fabriquent e\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"24\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\taria-label=\"En savoir plus A propos A\u00e9ronautique et d\u00e9fense\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"-1\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.capgemini.com\/fr-fr\/secteurs\/aeronautique-et-defense\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_Client-stories_HELPING-A-GLOBAL-AEROSPACE-MANUFACTURER-TAKE-OFF.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_Client-stories_HELPING-A-GLOBAL-AEROSPACE-MANUFACTURER-TAKE-OFF.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_Client-stories_HELPING-A-GLOBAL-AEROSPACE-MANUFACTURER-TAKE-OFF.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_Client-stories_HELPING-A-GLOBAL-AEROSPACE-MANUFACTURER-TAKE-OFF.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_Client-stories_HELPING-A-GLOBAL-AEROSPACE-MANUFACTURER-TAKE-OFF.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_Client-stories_HELPING-A-GLOBAL-AEROSPACE-MANUFACTURER-TAKE-OFF.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_Client-stories_HELPING-A-GLOBAL-AEROSPACE-MANUFACTURER-TAKE-OFF.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_Client-stories_HELPING-A-GLOBAL-AEROSPACE-MANUFACTURER-TAKE-OFF.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2021\/09\/Capgemini_Client-stories_HELPING-A-GLOBAL-AEROSPACE-MANUFACTURER-TAKE-OFF.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"object-position: 50% 50%; object-fit: cover;\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>L\u2019IA bouleverse tous les aspects du domaine militaire, du centre de commandement au th\u00e9\u00e2tre des op\u00e9rations, des fonctions de soutien aux syst\u00e8mes de combat. Pour les forces arm\u00e9es, elle est un formidable atout, leur permettant de se pr\u00e9parer et d\u2019agir avec davantage d\u2019anticipation, de pr\u00e9cision et d\u2019efficacit\u00e9, mais elle est aussi une redoutable menace, car elle d\u00e9multiplie dans les m\u00eames proportions les capacit\u00e9s de l\u2019adversaire.<\/p>\n","protected":false},"author":247,"featured_media":787244,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,46,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[3,5,138],"tags":[192,174],"brand":[30],"service":[47,49],"industry":[23],"partners":[],"blog-topic":[354,359],"content-group":[],"class_list":["post-787211","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","category-technologies","category-transformation","tag-cybersecurite","tag-ia-et-data","brand-capgemini","service-cybersecurite","service-ia-data","industry-aerospatiale-and-defense","blog-topic-cybersecurite","blog-topic-ia-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense - Capgemini France<\/title>\n<meta name=\"description\" content=\"L\u2019IA bouleverse tous les aspects du domaine militaire, du centre de commandement au th\u00e9\u00e2tre des op\u00e9rations, des fonctions de soutien aux syst\u00e8mes de combat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense\" \/>\n<meta property=\"og:description\" content=\"L\u2019IA bouleverse tous les aspects du domaine militaire, du centre de commandement au th\u00e9\u00e2tre des op\u00e9rations, des fonctions de soutien aux syst\u00e8mes de combat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T09:48:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-07T12:40:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/Webpreview_blog_cyber_ia_defense.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Vincent Laurens\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"quentinkieken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/\"},\"author\":{\"name\":\"quentinkieken\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c\"},\"headline\":\"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense\",\"datePublished\":\"2025-06-24T09:48:31+00:00\",\"dateModified\":\"2026-01-07T12:40:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/\"},\"wordCount\":1029,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\",\"IA &amp; Data\"],\"articleSection\":[\"Innovation\",\"Technologies\",\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/\",\"name\":\"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg\",\"datePublished\":\"2025-06-24T09:48:31+00:00\",\"dateModified\":\"2026-01-07T12:40:33+00:00\",\"description\":\"L\u2019IA bouleverse tous les aspects du domaine militaire, du centre de commandement au th\u00e9\u00e2tre des op\u00e9rations, des fonctions de soutien aux syst\u00e8mes de combat.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c\",\"name\":\"quentinkieken\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/quentinkieken\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense - Capgemini France","description":"L\u2019IA bouleverse tous les aspects du domaine militaire, du centre de commandement au th\u00e9\u00e2tre des op\u00e9rations, des fonctions de soutien aux syst\u00e8mes de combat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense","og_description":"L\u2019IA bouleverse tous les aspects du domaine militaire, du centre de commandement au th\u00e9\u00e2tre des op\u00e9rations, des fonctions de soutien aux syst\u00e8mes de combat.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/","og_site_name":"Capgemini France","article_published_time":"2025-06-24T09:48:31+00:00","article_modified_time":"2026-01-07T12:40:33+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/Webpreview_blog_cyber_ia_defense.png","type":"image\/png"}],"author":"Vincent Laurens","twitter_card":"summary_large_image","twitter_misc":{"Written by":"quentinkieken","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/"},"author":{"name":"quentinkieken","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c"},"headline":"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense","datePublished":"2025-06-24T09:48:31+00:00","dateModified":"2026-01-07T12:40:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/"},"wordCount":1029,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg","keywords":["Cybers\u00e9curit\u00e9","IA &amp; Data"],"articleSection":["Innovation","Technologies","Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/","name":"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg","datePublished":"2025-06-24T09:48:31+00:00","dateModified":"2026-01-07T12:40:33+00:00","description":"L\u2019IA bouleverse tous les aspects du domaine militaire, du centre de commandement au th\u00e9\u00e2tre des op\u00e9rations, des fonctions de soutien aux syst\u00e8mes de combat.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg","width":2880,"height":1800},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/0102b736b468cc97963c6c8590fb611c","name":"quentinkieken","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/quentinkieken\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"},{"id":359,"name":"IA &amp; Data"}],"taxonomy_info":{"category":[{"id":3,"name":"Innovation","slug":"innovation"},{"id":5,"name":"Technologies","slug":"technologies"},{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"},{"id":174,"name":"IA &amp; Data","slug":"ia-et-data"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"},{"id":49,"name":"IA &amp; Data","slug":"ia-data"}],"industry":[{"id":23,"name":"A\u00e9ronautique et d\u00e9fense","slug":"aerospatiale-and-defense"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"},{"id":359,"name":"IA &amp; Data","slug":"ia-data"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg"},"articleSection":"Innovation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9","ia &amp; data"],"dateCreated":"2025-06-24T09:48:31Z","datePublished":"2025-06-24T09:48:31Z","dateModified":"2026-01-07T12:40:33Z"},"rendered":"<meta name=\"parsely-title\" content=\"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-06-24T09:48:31Z\" \/>\n<meta name=\"parsely-section\" content=\"Innovation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9,ia &amp; data\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":787594,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","url_meta":{"origin":787211,"position":0},"title":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9","author":"anne.gautier@capgemini.com","date":"July 3, 2025","format":false,"excerpt":"Malgr\u00e9 les incertitudes r\u00e9glementaires, les organisations doivent investir d\u00e8s maintenant dans l\u2019IA pour la cybers\u00e9curit\u00e9, tout en avan\u00e7ant avec prudence, en encadrant son usage par une gouvernance rigoureuse et une veille continue.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":733969,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/","url_meta":{"origin":787211,"position":1},"title":"Les promesses de l\u2019intelligence artificielle g\u00e9n\u00e9rative pour la cybers\u00e9curit\u00e9","author":"","date":"October 26, 2023","format":false,"excerpt":"L\u2019intelligence artificielle g\u00e9n\u00e9rative (IAG) est une cat\u00e9gorie particuli\u00e8re de mod\u00e8les d\u2019intelligence artificielle (IA) qui r\u00e9pond \u00e0 une interrogation (prompt) par un contenu original, un texte, une image, un code, etc. Si l\u2019IA usuelle augmente les capacit\u00e9s humaines et acc\u00e9l\u00e8re l\u2019ex\u00e9cution, l\u2019IAG ajoute donc la cr\u00e9ativit\u00e9 d\u2019une r\u00e9ponse imm\u00e9diatement exploitable.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1301010665.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":755128,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/","url_meta":{"origin":787211,"position":2},"title":"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9","author":"quentinkieken","date":"June 19, 2024","format":false,"excerpt":"Chaque fois qu\u2019une innovation de rupture s\u2019invite dans les syst\u00e8mes d\u2019information, se pose aussit\u00f4t la question de ses cons\u00e9quences en mati\u00e8re de cybers\u00e9curit\u00e9.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":721330,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/tests-dintrusion-au-coeur-de-demarche-damelioration-continue-pour-la-cybersecurite\/","url_meta":{"origin":787211,"position":3},"title":"Les tests d\u2019intrusion au c\u0153ur de la d\u00e9marche d\u2019am\u00e9lioration continue pour la cybers\u00e9curit\u00e9","author":"","date":"June 12, 2023","format":false,"excerpt":"Dans un monde connect\u00e9 et num\u00e9rique en pleine expansion, les cyberattaques repr\u00e9sentent une menace r\u00e9elle et prot\u00e9iforme pour les entreprises. Les pirates informatiques sont constamment \u00e0 l'aff\u00fbt des vuln\u00e9rabilit\u00e9s pour acc\u00e9der aux donn\u00e9es sensibles et causer des dommages parfois irr\u00e9versibles.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/06\/GettyImages-1442990892.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":731732,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/intelligence-artificielle-alliee-puissante-pour-cyber-defense-center\/","url_meta":{"origin":787211,"position":4},"title":"L\u2019intelligence artificielle, une alli\u00e9e puissante pour le Cyber Defense Center","author":"","date":"October 18, 2023","format":false,"excerpt":"L\u2019enjeu d\u2019un Cyber Defense Center (CDC) est d\u2019anticiper et d\u2019identifier au plus t\u00f4t ce qui est important \u2013 attaques, pr\u00e9mices d\u2019attaques ou menaces potentielles \u2013 parmi le bruit \u00e9mis par toutes les alertes, av\u00e9r\u00e9es ou non, et parmi toutes les informations disponibles. Or, aujourd\u2019hui, s\u2019il y a davantage d\u2019attaques, il\u2026","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1442975224.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":800419,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/ia-sap-et-entreprise-et-si-l-avenir-ressemblait-surtout-a-une-evidence\/","url_meta":{"origin":787211,"position":5},"title":"L\u2019IA, SAP et l\u2019entreprise : et si l\u2019avenir ressemblait surtout \u00e0 une \u00e9vidence ?\u00a0","author":"audreykone","date":"January 12, 2026","format":false,"excerpt":"\u00ab De SAP aux IA g\u00e9n\u00e9ratives, l\u2019informatique a suivi la m\u00eame \u00e9volution que nos smartphones : hier, on s\u2019adaptait \u00e0 la machine. Aujourd\u2019hui, c\u2019est elle qui s\u2019adapte \u00e0 nous. \u00bb Amine Loukil, expert SAP et IA chez Capgemini, t\u00e9moigne de 20 ans de transformation continue des interfaces homme\u2013machine.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-1251534885.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-1251534885.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-1251534885.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-1251534885.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/787211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/247"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=787211"}],"version-history":[{"count":10,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/787211\/revisions"}],"predecessor-version":[{"id":799910,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/787211\/revisions\/799910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/787244"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=787211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=787211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=787211"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=787211"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=787211"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=787211"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=787211"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=787211"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=787211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}