{"id":787594,"date":"2025-07-03T12:08:26","date_gmt":"2025-07-03T10:08:26","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=787594"},"modified":"2025-10-30T16:12:45","modified_gmt":"2025-10-30T15:12:45","slug":"cybersecurite-les-dilemnes-ia-genai","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","title":{"rendered":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Vincent-Laurens.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Vincent Laurens<\/h5><h5 class=\"blog-date\">3 juillet 2025<\/h5><\/div><\/div><div class=\"brand-image\"><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">En quelques mois, l\u2019intelligence artificielle (IA) et l\u2019intelligence artificielle g\u00e9n\u00e9rative (Gen AI) ont pris une place pr\u00e9pond\u00e9rante dans le paysage de la cybers\u00e9curit\u00e9 \u00e0 la fois comme ferments d\u2019innovation et comme arguments de vente. Cette omnipr\u00e9sence de l\u2019IA et de la Gen AI soul\u00e8ve cependant des questions majeures sur lesquelles les dirigeants doivent, selon moi, se pencher avant d\u2019investir.<\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-l-ia-et-la-gen-ai-apportent-elles-reellement-des-benefices-en-matiere-de-cybersecurite-nbsp\">L\u2019IA et la Gen AI apportent-elles r\u00e9ellement des b\u00e9n\u00e9fices en mati\u00e8re de cybers\u00e9curit\u00e9&nbsp;?<\/h2>\n\n\n\n<p>Avec des cas d\u2019usage d\u00e9sormais bien identifi\u00e9s, des impl\u00e9mentations suffisamment nombreuses et plusieurs mois de recul, la r\u00e9ponse est clairement oui.&nbsp;L\u2019IA et la Gen AI permettent notamment d\u2019optimiser les dispositifs de s\u00e9curit\u00e9, d\u2019affiner la d\u00e9tection, d\u2019automatiser les processus, ou encore d\u2019\u00e9conomiser et de r\u00e9affecter des comp\u00e9tences. Par exemple, j\u2019ai pu voir plusieurs entreprises du secteur financier utiliser la Gen AI pour leurs rapports de menaces de haut niveau. Capable de r\u00e9aliser une synth\u00e8se digeste et intelligible \u00e0 partir d\u2019une masse d\u2019informations techniques et business, elle s\u2019acquitte \u00e0 merveille de cette t\u00e2che, ce qui se traduit par des gains de temps, de qualit\u00e9 et de ressources, une am\u00e9lioration du processus de d\u00e9cision, et, in fine, de la s\u00e9curit\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-dans-quelle-mesure-les-acteurs-malveillants-utilisent-ils-eux-aussi-l-ia-et-la-gen-ai-nbsp\">Dans quelle mesure les acteurs malveillants utilisent-ils eux aussi l\u2019IA et la Gen AI&nbsp;?<\/h2>\n\n\n\n<p>Si <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/\" target=\"_blank\" rel=\"noreferrer noopener\">la d\u00e9fense peut ainsi tirer profit de l\u2019IA et de la Gen AI<\/a>, ne doit-on pas craindre que l\u2019attaque en fasse de m\u00eame&nbsp;? Pour l\u2019instant, la r\u00e9ponse est non. Certes, des <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/ia-generative-cybersecurite\/\" target=\"_blank\" rel=\"noreferrer noopener\">utilisations de la Gen AI dans quelques cas d\u2019ing\u00e9nierie sociale et d\u2019usurpation d\u2019identit\u00e9<\/a> ont d\u00e9j\u00e0 \u00e9t\u00e9 d\u00e9tect\u00e9es et d\u00e9jou\u00e9es, en particulier pour des tentatives de fraude au Pr\u00e9sident, mais on est loin de l\u2019usage massif tant redout\u00e9. Toutefois, ce n\u2019est sans doute qu\u2019une question de temps (6 mois&nbsp;? 1 an&nbsp;?) avant que des cybercriminels ne trouvent comment cr\u00e9er, gr\u00e2ce \u00e0 l\u2019IA et \u00e0 la Gen AI, des attaques plus efficaces, plus furtives et plus dangereuses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-l-utilisation-de-l-ia-et-de-la-gen-ai-dans-le-domaine-de-la-cybersecurite-engendre-t-elle-de-nouveaux-risques-nbsp\">L\u2019utilisation de l\u2019IA et de la Gen AI dans le domaine de la cybers\u00e9curit\u00e9 engendre-t-elle de nouveaux risques&nbsp;?<\/h2>\n\n\n\n<p>En d\u00e9pit de leur r\u00f4le protecteur, <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/\" target=\"_blank\" rel=\"noreferrer noopener\">les outils de cybers\u00e9curit\u00e9 font partie int\u00e9grante du syst\u00e8me d\u2019information (SI)<\/a> et, de ce fait, contribuent \u00e0 sa surface d\u2019exposition. Parall\u00e8lement aux services qu\u2019ils peuvent rendre, il faut donc toujours s\u2019interroger sur les risques que peuvent occasionner leur mise en \u0153uvre. Avec des solutions fond\u00e9es sur l\u2019IA ou la Gen AI, trois aspects sont plus particuli\u00e8rement \u00e0 surveiller&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Les donn\u00e9es<\/strong>&nbsp;:pour aider \u00e0 prot\u00e9ger le SI, l\u2019IA et le Gen AI seront amen\u00e9es \u00e0 rassembler, analyser et produire des informations extr\u00eamement sensibles&nbsp;: mots de passe, profils utilisateurs, r\u00e8gles, listes de vuln\u00e9rabilit\u00e9s\u2026 Il est essentiel de d\u00e9terminer qui aura acc\u00e8s \u00e0 ces donn\u00e9es,&nbsp;pour quoi faire,&nbsp;et comment elles seront \u00e0 leur tour s\u00e9curis\u00e9es. Sur un autre plan, il faudra aussi s\u2019interroger sur l\u2019empreinte environnementale&nbsp;des syst\u00e8mes qui stockeront et traiteront ces gigantesques masses de donn\u00e9es.<\/li>\n\n\n\n<li><strong>La d\u00e9pendance \u00e0 la machine<\/strong>&nbsp;: en mati\u00e8re de cybers\u00e9curit\u00e9, l\u2019IA et la Gen AI auront surtout pour r\u00f4le de fournir des informations permettant de prendre plus vite \u2013 voire d\u2019automatiser \u2013 les d\u00e9cisions. Or, celles-ci pouvant \u00eatre tr\u00e8s lourdes de cons\u00e9quences (dans une banque ou un OIV, par exemple), mieux vaut \u00eatre s\u00fbr du diagnostic comme du rem\u00e8de&nbsp;! C\u2019est pourquoi il faudra \u00eatre tr\u00e8s attentif \u00e0 la fiabilit\u00e9 et \u00e0 la transparence des algorithmes ainsi qu\u2019\u00e0 la mise en place de garde-fous humains.<\/li>\n\n\n\n<li><strong>La r\u00e9glementation<\/strong>&nbsp;: ces deux questions sensibles des donn\u00e9es et du contr\u00f4le des algorithmes inciteront tr\u00e8s probablement les autorit\u00e9s r\u00e9gulatrices (cyber, financiers, sectoriels\u2026) \u00e0 fixer un cadre plus sp\u00e9cifique que l\u2019AI Act europ\u00e9en pour l\u2019utilisation d\u00e9fensive de l\u2019IA et de la Gen AI. <a href=\"https:\/\/cyber.gouv.fr\/intelligence-artificielle-les-travaux-de-lanssi#:~:text=L'ANSSI%20s'implique%2C,fait%20appel%20%C3%A0%20la%20certification.\" target=\"_blank\" rel=\"noreferrer noopener\">L\u2019ANSSI y travaille d\u00e9j\u00e0<\/a>, mais le processus pourrait \u2013 devrait \u2013 s\u2019acc\u00e9l\u00e9rer dans les prochains mois.<\/li>\n<\/ul>\n\n\n\n<p>Tel est, en fin de compte, le grand paradoxe de l\u2019irruption de l\u2019IA et de la Gen AI dans le domaine de la cybers\u00e9curit\u00e9&nbsp;: elles apportent un surcro\u00eet d\u2019efficacit\u00e9 plus que bienvenu aux organisations prises en \u00e9tau entre la prolif\u00e9ration des menaces et la p\u00e9nurie des comp\u00e9tences, mais, dans le m\u00eame temps, elles suscitent de nouvelles interrogations et ouvrent de nouveaux fronts \u00e0 prot\u00e9ger.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-technologies-revolutionnaires-approche-classique\">\u00c0 technologies r\u00e9volutionnaires, approche classique<\/h2>\n\n\n\n<p>Toutefois, les incertitudes, notamment celles concernant de possibles r\u00e9glementations \u00e0 venir, ne doivent pas d\u00e9courager les organisations d\u2019investir dans l\u2019IA et la Gen AI pour la cybers\u00e9curit\u00e9. Elles doivent au contraire tirer sans plus tarder profit de ses b\u00e9n\u00e9fices av\u00e9r\u00e9s et de la longueur d\u2019avance qu\u2019a, pour une fois, la d\u00e9fense sur l\u2019attaque. En revanche, il faut avancer avec prudence, sans se laisser aveugler par les prouesses et <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/promesses-intelligence-artificielle-generative-pour-cybersecurite\/\" rel=\"noreferrer noopener\" target=\"_blank\">les promesses de ces nouveaux outils<\/a>, mais en gardant toujours \u00e0 l\u2019esprit leurs limites et les questions qu\u2019ils soul\u00e8vent. Pour cela, leur mise en \u0153uvre doit imp\u00e9rativement s\u2019accompagner de la mise en place d\u2019un cadre de gouvernance ainsi que d\u2019un processus de veille et de benchmark afin d\u2019en mesurer et d\u2019en valider l\u2019efficacit\u00e9, et de rem\u00e9dier au plus t\u00f4t \u00e0 d\u2019\u00e9ventuelles d\u00e9rives. Et c\u2019est l\u00e0, peut-\u00eatre, un ultime paradoxe de l\u2019IA et de la Gen AI, qui, pour r\u00e9volutionnaires qu\u2019elles soient, r\u00e9clament une approche on ne peut plus classique.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Notre expert<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Vincent-Laurens.png\" alt=\"Vincent Laurens\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Vincent Laurens<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur du d\u00e9veloppement Cyber pour la r\u00e9gion Europe du Sud, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Vincent a d\u00e9but\u00e9 sa carri\u00e8re en s\u00e9curit\u00e9 informatique dans les ann\u00e9es 90, travaillant avec diverses organisations, y compris des services de renseignement et des industries sp\u00e9cialis\u00e9es. En 2013, Vincent a rejoint Sogeti au Luxembourg, puis est devenu vice-pr\u00e9sident mondial de la cybers\u00e9curit\u00e9 en 2018. Depuis 2022, Vincent est vice-pr\u00e9sident et strat\u00e8ge mondial de la s\u00e9curit\u00e9 chez Devo, et en 2024, il a rejoint Capgemini pour diriger la cybers\u00e9curit\u00e9 dans la r\u00e9gion SCE. Depuis 2019, il est \u00e9galement administrateur non ex\u00e9cutif pour plusieurs start-ups technologiques et conseille des dirigeants et des conseils d&#8217;administration en cybers\u00e9curit\u00e9.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-learn-more updated-new-sample-amal learnMoreBlock\"><div class=\"container\"><div class=\"content-title\"><h2 class=\"learnmore-heading\">Sujets associ\u00e9s<\/h2><\/div><div class=\"row\"><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/share.transistor.fm\/s\/0853e5e1\" target=\"_blank\" aria-label=\"Demain tous hack\u00e9s par l\u2019IA ?\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-ECOUTONS.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-ECOUTONS.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-ECOUTONS.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\">Demain tous hack\u00e9s par l\u2019IA ?<\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Explorez avec nos invit\u00e9s de notre podcast l\u2019impact de l\u2019IA sur la cybers\u00e9curit\u00e9 et les d\u00e9fis \u00e0 relever pour assurer un monde num\u00e9rique de confiance<\/p><\/div><\/div><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/ia-confiance-defense-ouvrage-collectif-avenir\/\" target=\"_blank\" aria-label=\"IA de confiance dans la D\u00e9fense\" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/FI-LB-PEC.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/FI-LB-PEC.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/FI-LB-PEC.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\">IA de confiance dans la D\u00e9fense<\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Pour \u00e9clairer ces enjeux, le\u00a0P\u00f4le d\u2019excellence cyber\u00a0publie un ouvrage collectif consacr\u00e9 \u00e0 l\u2019IA de confiance dans la D\u00e9fense, auquel\u00a0Capgemini a activement contribu\u00e9.<\/p><\/div><\/div><div class=\"col-md-4\"><div class=\"box\"><div class=\"box-wrapper\"><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/\" target=\"\" aria-label=\"NIS 2 &amp; DORA : \" rel=\"noopener noreferrer\"><div class=\"box-img-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=500&amp;quality=70\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=500&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=1000&amp;quality=70 2x\" class=\"box-img\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"lazy\"\/><\/div><h3 class=\"titleWithoutLink_learnMore\">NIS 2 &amp; DORA : <\/h3><\/a><\/div><\/div><div class=\"box-inner\"><p class=\"box-desc\">Un guide pratique pour s\u2019orienter dans le cadre r\u00e9glementaire complexe de la cybers\u00e9curit\u00e9<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 7b533e83-e739-4d0a-a021-de4825213bbe\">\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper smallDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next \"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent \">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Faites de la cybers\u00e9curit\u00e9 le moteur de votre transformation.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tFaites de la cybers\u00e9curit\u00e9 le moteur de votre transformation.\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"24\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\taria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"0\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"object-position: 50% 50%; object-fit: cover;\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent \">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Data et intelligence artificielle\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tData et intelligence artificielle\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Ma\u00eetrisez vos donn\u00e9es et transformez votre organisation.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tMa\u00eetrisez vos donn\u00e9es et transformez votre organisation.\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"24\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\taria-label=\"En savoir plus A propos Data et intelligence artificielle\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"-1\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.capgemini.com\/fr-fr\/services\/data-intelligence-artificielle\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/03\/Data-and-AI-Web-banner.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/03\/Data-and-AI-Web-banner.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/03\/Data-and-AI-Web-banner.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/03\/Data-and-AI-Web-banner.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/03\/Data-and-AI-Web-banner.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/03\/Data-and-AI-Web-banner.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/03\/Data-and-AI-Web-banner.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/03\/Data-and-AI-Web-banner.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/03\/Data-and-AI-Web-banner.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"object-position: 50% 50%; object-fit: cover;\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-wrapper largeDevice\">\n\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 text-center\">\n\t\t\t\t\t\t\t\t<div class=\"slider-nav\">\n\t\t\t\t\t\t\t\t\t<button class=\"slider-prev inactive\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur pr\u00e9c\u00e9dent\"><\/button>\n\t\t\t\t\t\t\t\t\t<ul class=\"slider-paginator\"><\/ul>\n\t\t\t\t\t\t\t\t\t<button class=\"slider-next\"\n\t\t\t\t\t\t\t\t\t\taria-label=\"Curseur suivant\"><\/button>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malgr\u00e9 les incertitudes r\u00e9glementaires, les organisations doivent investir d\u00e8s maintenant dans l\u2019IA pour la cybers\u00e9curit\u00e9, tout en avan\u00e7ant avec prudence, en encadrant son usage par une gouvernance rigoureuse et une veille continue.<\/p>\n","protected":false},"author":166,"featured_media":787787,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,46,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[138],"tags":[192,174],"brand":[30],"service":[47,49],"industry":[],"partners":[],"blog-topic":[354,359],"content-group":[],"class_list":["post-787594","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-transformation","tag-cybersecurite","tag-ia-et-data","brand-capgemini","service-cybersecurite","service-ia-data","blog-topic-cybersecurite","blog-topic-ia-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9 - Capgemini France<\/title>\n<meta name=\"description\" content=\"L\u2019IA et la Gen AI transforment la cybers\u00e9curit\u00e9 : entre gains d\u2019efficacit\u00e9, risques \u00e9mergents et n\u00e9cessit\u00e9 d\u2019un cadre de gouvernance solide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"L\u2019IA et la Gen AI transforment la cybers\u00e9curit\u00e9 : entre gains d\u2019efficacit\u00e9, risques \u00e9mergents et n\u00e9cessit\u00e9 d\u2019un cadre de gouvernance solide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-03T10:08:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-30T15:12:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Webpreview-IA-Gen-IA-cyber-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Vincent Laurens\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@anne.gautier@capgemini.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"anne.gautier@capgemini.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/\"},\"author\":{\"name\":\"anne.gautier@capgemini.com\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e\"},\"headline\":\"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9\",\"datePublished\":\"2025-07-03T10:08:26+00:00\",\"dateModified\":\"2025-10-30T15:12:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/\"},\"wordCount\":1129,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\",\"IA &amp; Data\"],\"articleSection\":[\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/\",\"name\":\"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9 - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg\",\"datePublished\":\"2025-07-03T10:08:26+00:00\",\"dateModified\":\"2025-10-30T15:12:45+00:00\",\"description\":\"L\u2019IA et la Gen AI transforment la cybers\u00e9curit\u00e9 : entre gains d\u2019efficacit\u00e9, risques \u00e9mergents et n\u00e9cessit\u00e9 d\u2019un cadre de gouvernance solide.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg\",\"width\":4525,\"height\":3887},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e\",\"name\":\"anne.gautier@capgemini.com\",\"sameAs\":[\"https:\/\/x.com\/anne.gautier@capgemini.com\",\"anne.gautier@capgemini.com\"],\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/anne-gautiercapgemini-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9 - Capgemini France","description":"L\u2019IA et la Gen AI transforment la cybers\u00e9curit\u00e9 : entre gains d\u2019efficacit\u00e9, risques \u00e9mergents et n\u00e9cessit\u00e9 d\u2019un cadre de gouvernance solide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","og_locale":"fr_FR","og_type":"article","og_title":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9","og_description":"L\u2019IA et la Gen AI transforment la cybers\u00e9curit\u00e9 : entre gains d\u2019efficacit\u00e9, risques \u00e9mergents et n\u00e9cessit\u00e9 d\u2019un cadre de gouvernance solide.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","og_site_name":"Capgemini France","article_published_time":"2025-07-03T10:08:26+00:00","article_modified_time":"2025-10-30T15:12:45+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Webpreview-IA-Gen-IA-cyber-2.png","type":"image\/png"}],"author":"Vincent Laurens","twitter_card":"summary_large_image","twitter_creator":"@anne.gautier@capgemini.com","twitter_misc":{"Written by":"anne.gautier@capgemini.com","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/"},"author":{"name":"anne.gautier@capgemini.com","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e"},"headline":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9","datePublished":"2025-07-03T10:08:26+00:00","dateModified":"2025-10-30T15:12:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/"},"wordCount":1129,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg","keywords":["Cybers\u00e9curit\u00e9","IA &amp; Data"],"articleSection":["Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","name":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9 - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg","datePublished":"2025-07-03T10:08:26+00:00","dateModified":"2025-10-30T15:12:45+00:00","description":"L\u2019IA et la Gen AI transforment la cybers\u00e9curit\u00e9 : entre gains d\u2019efficacit\u00e9, risques \u00e9mergents et n\u00e9cessit\u00e9 d\u2019un cadre de gouvernance solide.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg","width":4525,"height":3887},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e","name":"anne.gautier@capgemini.com","sameAs":["https:\/\/x.com\/anne.gautier@capgemini.com","anne.gautier@capgemini.com"],"url":"https:\/\/www.capgemini.com\/fr-fr\/author\/anne-gautiercapgemini-com\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"},{"id":359,"name":"IA &amp; Data"}],"taxonomy_info":{"category":[{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"},{"id":174,"name":"IA &amp; Data","slug":"ia-et-data"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"},{"id":49,"name":"IA &amp; Data","slug":"ia-data"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"},{"id":359,"name":"IA &amp; Data","slug":"ia-data"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg"},"articleSection":"Transformation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9","ia &amp; data"],"dateCreated":"2025-07-03T10:08:26Z","datePublished":"2025-07-03T10:08:26Z","dateModified":"2025-10-30T15:12:45Z"},"rendered":"<meta name=\"parsely-title\" content=\"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-07-03T10:08:26Z\" \/>\n<meta name=\"parsely-section\" content=\"Transformation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9,ia &amp; data\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":755128,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-intelligence-artificielle\/","url_meta":{"origin":787594,"position":0},"title":"IA g\u00e9n\u00e9rative et cybers\u00e9curit\u00e9, un classique revisit\u00e9","author":"quentinkieken","date":"June 19, 2024","format":false,"excerpt":"Chaque fois qu\u2019une innovation de rupture s\u2019invite dans les syst\u00e8mes d\u2019information, se pose aussit\u00f4t la question de ses cons\u00e9quences en mati\u00e8re de cybers\u00e9curit\u00e9.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1455941485.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":787211,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/","url_meta":{"origin":787594,"position":1},"title":"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense","author":"quentinkieken","date":"June 24, 2025","format":false,"excerpt":"L\u2019IA bouleverse tous les aspects du domaine militaire, du centre de commandement au th\u00e9\u00e2tre des op\u00e9rations, des fonctions de soutien aux syst\u00e8mes de combat. Pour les forces arm\u00e9es, elle est un formidable atout, leur permettant de se pr\u00e9parer et d\u2019agir avec davantage d\u2019anticipation, de pr\u00e9cision et d\u2019efficacit\u00e9, mais elle est\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":800316,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/ia-generative-dans-les-transformations-de-rise-with-sap\/","url_meta":{"origin":787594,"position":2},"title":"Un catalyseur de changement : l&#8217;IA g\u00e9n\u00e9rative dans les transformations\u00a0de\u00a0RISE\u00a0with\u00a0SAP","author":"audreykone","date":"January 12, 2026","format":false,"excerpt":"L\u2019intelligence artificielle (IA) et l\u2019IA g\u00e9n\u00e9rative (Gen\u00a0AI) jouent toutes deux un r\u00f4le cl\u00e9 dans les transformations\u00a0de\u00a0RISE\u00a0with\u00a0SAP.\u00a0Mais l\u2019IA g\u00e9n\u00e9rative va plus loin : elle apporte des capacit\u00e9s sp\u00e9cifiques qui enrichissent le d\u00e9ploiement de RISE\u00a0with\u00a0SAP et permettent d\u2019en exploiter tout le potentiel.\u00a0","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-2244832366.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-2244832366.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-2244832366.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/GettyImages-2244832366.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":761324,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/processus-metiers-la-genai-au-service-de-la-creation-de-valeur\/","url_meta":{"origin":787594,"position":3},"title":"Processus m\u00e9tiers\u00a0: la Gen AI au service de la cr\u00e9ation de valeur","author":"Tarek Edde Gomez","date":"September 23, 2024","format":false,"excerpt":"Avec la GenAI, tous les processus des entreprises peuvent gagner en performance et en fluidit\u00e9. R\u00e9sultat\u00a0: cette technologie devient un levier incontournable, y compris lorsqu\u2019elle est int\u00e9gr\u00e9e aux ERP.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":783590,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-gestion-des-infras-it-porte-dentree-pour-la-genai-dans-les-dsi\/","url_meta":{"origin":787594,"position":4},"title":"La gestion des infrastructures IT, une porte d\u2019entr\u00e9e pour la Gen AI dans les DSI","author":"Tarek Edde Gomez","date":"May 21, 2025","format":false,"excerpt":"Les r\u00e9flexions sur l\u2019IA g\u00e9n\u00e9rative d\u00e9bouchent aujourd\u2019hui sur une premi\u00e8re g\u00e9n\u00e9ration de solutions sp\u00e9cifiques aux besoins des DSI, propre \u00e0 inciter les organisations \u00e0 se lancer.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Gen-AI-dans-la-DSI.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Gen-AI-dans-la-DSI.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Gen-AI-dans-la-DSI.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Gen-AI-dans-la-DSI.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":801609,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/","url_meta":{"origin":787594,"position":5},"title":"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation","author":"Tarek Edde Gomez","date":"February 26, 2026","format":false,"excerpt":"Dans un contexte g\u00e9opolitique et technologique instable, les crises touchant les organisations se multiplient et deviennent de plus en plus impr\u00e9visibles et impactantes.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/787594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=787594"}],"version-history":[{"count":17,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/787594\/revisions"}],"predecessor-version":[{"id":797641,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/787594\/revisions\/797641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/787787"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=787594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=787594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=787594"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=787594"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=787594"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=787594"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=787594"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=787594"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=787594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}