{"id":791247,"date":"2025-09-24T14:24:35","date_gmt":"2025-09-24T12:24:35","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=791247"},"modified":"2025-10-30T15:51:12","modified_gmt":"2025-10-30T14:51:12","slug":"cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industrielsrenforcer-la-resilience-des-entreprises-pour-les-environnements-industriels","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/","title":{"rendered":"Renforcer la r\u00e9silience des entreprises : strat\u00e9gies cl\u00e9s pour les environnements industriels"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Renforcer la r\u00e9silience des entreprises : strat\u00e9gies cl\u00e9s pour les environnements industriels<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/cg-logo-blue.svg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Lucie Shen et Noa Nataf<\/h5><h5 class=\"blog-date\">24 septembre 2025<\/h5><\/div><\/div><div class=\"brand-image\"><img decoding=\"async\" loading=\"lazy\" src=\"\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-invent-white.svg\" alt=\"capgemini-invent\"\/><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Les entreprises industrielles, de plus en plus interconnect\u00e9es num\u00e9riquement et avec leur \u00e9cosyst\u00e8me de partenaires, ont une sensibilit\u00e9 grandissante aux perturbations d\u2019origines diverses. <\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<p>Les tensions g\u00e9opolitiques r\u00e9centes mettent en lumi\u00e8re les crises qui peuvent d\u00e9couler d\u2019une d\u00e9cision \u00e9conomique, d\u2019une perte d\u2019un fournisseur cl\u00e9 ou d\u2019activit\u00e9s dans une r\u00e9gion basculant dans un conflit.<\/p>\n\n\n\n<p>Par ailleurs, la num\u00e9risation des op\u00e9rations ouvre la voie \u00e0 de nouveaux leviers de performance, mais s\u2019accompagne \u00e9galement d\u2019une mont\u00e9e en puissance des risques de perturbations, notamment d\u2019origine cyber.&nbsp;Ces perturbations engendrent de r\u00e9els enjeux de continuit\u00e9 d\u2019activit\u00e9 pour les entreprises du secteur industriel et manufacturier dont les pertes de production li\u00e9es aux temps d\u2019arr\u00eat machines non planifi\u00e9es sont estim\u00e9es \u00e0 <a href=\"https:\/\/industrie-du-futur.info\/senseye-evalue-le-cout-des-arrets-machines-non-planifies\/\" target=\"_blank\" rel=\"noreferrer noopener\">8% de leur chiffre d&#8217;affaires annuel.<\/a><\/p>\n\n\n\n<p>Dans ce contexte, la r\u00e9silience ne se limite pas \u00e0 la capacit\u00e9 \u00e0 g\u00e9rer une crise, mais englobe \u00e9galement le niveau de pr\u00e9paration et l\u2019agilit\u00e9 n\u00e9cessaires pour s\u2019adapter aux perturbations soudaines. Garantir la continuit\u00e9 d\u2019activit\u00e9 devient une priorit\u00e9 strat\u00e9gique pour les entreprises, alors m\u00eame que la r\u00e9glementation \u00e9volue pour adresser ces risques.<\/p>\n\n\n\n<p>En effet, les syst\u00e8mes industriels sont expos\u00e9s \u00e0 une multitude de menaces (cyber, physiques, environnementales\u2026) qui peuvent perturber gravement les op\u00e9rations avec des cons\u00e9quences syst\u00e9miques. L\u2019attaque de Colonial Pipeline de 2021 en est un tr\u00e8s bon exemple. L\u2019op\u00e9rateur du plus grand pipeline de produits raffin\u00e9s des Etats-Unis a \u00e9t\u00e9 contraint, \u00e0 la suite d\u2019un ransomware, d\u2019interrompre toutes ses op\u00e9rations pendant 5 jours, provoquant ainsi des p\u00e9nuries de carburant dans tout le sud-est des Etats-Unis.<\/p>\n\n\n\n<p>La r\u00e9silience joue un r\u00f4le essentiel dans la continuit\u00e9 de production et livraison de services, parfois essentiels \u00e0 l\u2019\u00e9conomie et la soci\u00e9t\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-dependance-a-une-chaine-d-approvisionnement-complexe\"><strong>Une d\u00e9pendance \u00e0 une cha\u00eene d\u2019approvisionnement complexe<\/strong><\/h2>\n\n\n\n<p>Les cha\u00eenes d\u2019approvisionnement industrielles sont des \u00e9cosyst\u00e8mes de plus en plus complexes, mobilisant une multitude d\u2019acteurs, r\u00e9partis sur plusieurs g\u00e9ographies et s\u2019appuyant sur des technologies h\u00e9t\u00e9rog\u00e8nes.<\/p>\n\n\n\n<p>Cette diversit\u00e9 de partenaires rend les syst\u00e8mes plus vuln\u00e9rables et d\u00e9multiplie les risques de perturbation sur l\u2019ensemble de la cha\u00eene de valeur&nbsp;: risque de surd\u00e9pendance (\u00ab<em> vendor lock-in<\/em> \u00bb) vis-\u00e0-vis de certains prestataires, risque d\u2019un effet rebond d\u2019une d\u00e9faillance d\u2019un prestataire, risque li\u00e9 \u00e0 l\u2019augmentation des points d\u2019entr\u00e9e vers le syst\u00e8me d\u2019information pour se connecter avec des tiers, etc.<\/p>\n\n\n\n<p>Les r\u00e9glementations telles que NIS 2 en Europe mettent par ailleurs l&#8217;accent sur la r\u00e9silience de la cha\u00eene d&#8217;approvisionnement, imposant des exigences strictes en mati\u00e8re de gestion des risques, de notification des incidents notamment des prestataires de services num\u00e9riques \u00e0 leurs clients, et de coordination entre organisations et autorit\u00e9s.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-la-numerisation-des-processus-un-accelerateur-de-risques\"><strong>La num\u00e9risation des processus : un acc\u00e9l\u00e9rateur de risques<\/strong><\/h2>\n\n\n\n<p>Les infrastructures industrielles deviennent de plus en plus interconnect\u00e9es et d\u00e9pendantes aux technologies num\u00e9riques. Ainsi, la transformation num\u00e9rique des environnements et processus industriels s\u2019est traduite par une augmentation de la surface d\u2019attaque et de sensibilit\u00e9 aux pannes num\u00e9riques.<\/p>\n\n\n\n<p>De plus, la convergence entre les syst\u00e8mes d\u2019information (IT) et les syst\u00e8mes industriels (OT) augmente le risque de contagion de l\u2019un vers l\u2019autre en cas de cyber attaque. Si cette \u00e9volution offre de nombreuses opportunit\u00e9s \u2013 automatisation, supervision en temps r\u00e9el, maintenance pr\u00e9dictive \u2013, elle expose \u00e9galement les infrastructures \u00e0 de nouvelles menaces. Les syst\u00e8mes OT, historiquement con\u00e7us pour fonctionner en silo, sont d\u00e9sormais connect\u00e9s \u00e0 des r\u00e9seaux informatiques, parfois m\u00eame \u00e0 Internet (IoT). Cela \u00e9largit consid\u00e9rablement la surface d\u2019attaque et complexifie la gestion des vuln\u00e9rabilit\u00e9s.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-nbsp-minimum-viable-company-nbsp-nbsp-identifier-les-activites-les-plus-critiques\"><strong>\u00ab&nbsp;Minimum Viable Company&nbsp;\u00bb&nbsp;: Identifier les activit\u00e9s les plus critiques<\/strong><\/h2>\n\n\n\n<p>Pour b\u00e2tir une strat\u00e9gie de r\u00e9silience efficace, il est indispensable de ma\u00eetriser les processus m\u00e9tiers critiques de l\u2019entreprise, n\u00e9cessaires \u00e0 sa survie en cas de crise (<em>Minimum Viable Company<\/em>).&nbsp;Il est \u00e9galement primordial d\u2019identifier les actifs IT et OT qui permettent la mise en \u0153uvre de ces processus (syst\u00e8mes, \u00e9quipements, donn\u00e9es, infrastructures, fournisseurs, etc.).<\/p>\n\n\n\n<p>En particulier dans le milieu industriel, certains syst\u00e8mes sont essentiels au maintien des activit\u00e9s de production, comme les outils APS <em>(Advanced Planning and Scheduling)<\/em> de planification avanc\u00e9e ou de contr\u00f4le de la production (MES \u2013 <em>Manufacturing Ex\u00e9cution System<\/em>, SCADA &#8211; <em>Supervisory Control And Data Acquisition, etc.<\/em>).<\/p>\n\n\n\n<p>Cette cartographie permet de prioriser les plans de secours en fonction de la valeur et d\u2019identifier les d\u00e9pendances critiques. Elle aide \u00e9galement \u00e0 concentrer les efforts de protection et de contournement l\u00e0 o\u00f9 les perturbations auraient le plus d\u2019impact.<\/p>\n\n\n\n<p>Ce travail, \u00e0 faire en transverse, implique une collaboration \u00e9troite entre les directions m\u00e9tiers, technologiques, industrielles et r\u00e9silience\/s\u00e9curit\u00e9. Ces diff\u00e9rentes contributions permettent de garantir la pertinence des plans de continuit\u00e9 (PCA) et solutions de contournement associ\u00e9es, et des plans de reprise d\u2019activit\u00e9 (PRA), qui doivent \u00eatre adapt\u00e9s aux r\u00e9alit\u00e9s du terrain et r\u00e9guli\u00e8rement test\u00e9s.<\/p>\n\n\n\n<p>Cette approche de la r\u00e9silience, qui pousse \u00e0 analyser les processus en profondeur et \u00e0 faire ressortir ce qu\u2019il y a de plus essentiel pour l\u2019entreprise, ouvre \u00e9galement la voie \u00e0 l\u2019optimisation des processus et des co\u00fbts.<\/p>\n\n\n\n<p>L\u2019identification des actifs et des processus critiques permettent non seulement d\u2019am\u00e9liorer l\u2019efficacit\u00e9 des strat\u00e9gies de r\u00e9silience des entreprises, de prioriser la r\u00e9cup\u00e9ration des activit\u00e9s critiques, mais aussi de cibler l\u2019allocation des ressources en concentrant les efforts financiers l\u00e0 o\u00f9 ils ont le plus grand impact pour le m\u00e9tier.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Nos expertes<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Shen-Lucie-photo-pro-visage.png\" alt=\"Lucie Shen\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucie-shen-8a8347138\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Lucie Shen<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Digital Trust &amp; Security Managing Consultant, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/lucie-shen-8a8347138\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Lucie porte l&#8217;offre de R\u00e9silience num\u00e9rique de Capgemini Invent. Elle accompagne les organisations pour d\u00e9finir et mettre en \u0153uvre leur strat\u00e9gie de cybers\u00e9curit\u00e9 et de r\u00e9silience.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Photo-Pro-Noa-Nataf.jpeg\" alt=\"Noa Nataf\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/arnaud-richard\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Noa Nataf<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Digital Trust &amp; Security Consultant, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/arnaud-richard\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Noa est contributrice sur l&#8217;offre de R\u00e9silience num\u00e9rique de Capgemini Invent. Elle accompagne les organisations pour d\u00e9finir et mettre en \u0153uvre leur strat\u00e9gie de cybers\u00e9curit\u00e9 et de r\u00e9silience.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Curseur pr\u00e9c\u00e9dent\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Curseur suivant\"><\/button><\/div><\/div><\/section>\n\n\n<section class=\"latest-insights layout-odd \"><div class=\"container\"><div class=\"insight-title\"><h2 class=\"latest-insight-title\">Sujets associ\u00e9s<\/h2><\/div><div class=\"layout-single-card\">\n                      <div class=\"row align-items-center w-lg-100\">\n                        <div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/trajectoires\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=500&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1000&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg\" alt=\"\" style=\"object-position: 49% 47%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div>\n                            <div class=\"col-12 col-md-5 col-lg-7\"><\/div>\n                        <div class=\"col-12 col-md-7 col-lg-5\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/trajectoires\/\" aria-label=\"Trajectoires\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Transformation Digitale<\/div>\n                                <h3 class=\"card-title\">Trajectoires<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                     <\/div>\n                    <\/div><div class=\"layout-two-card cards-reversed\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/cryptographie-post-quantique-cyber\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg\" alt=\"Post quantum crypto - hero banner\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-md-6 col-lg-4 flex-sm-order-reverse\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/ia-confiance-defense-ouvrage-collectif-avenir\/\" aria-label=\"IA de confiance dans la D\u00e9fense : un ouvrage collectif pour b\u00e2tir l\u2019avenir\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Cybers\u00e9curit\u00e9<\/div>\n                                <h3 class=\"card-title\">IA de confiance dans la D\u00e9fense : un ouvrage collectif pour b\u00e2tir l\u2019avenir<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-white.svg\" alt=\"capgemini\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-white.svg\" alt=\"capgemini\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/cryptographie-post-quantique-cyber\/\" aria-label=\"Cryptographie post-quantique\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Cybers\u00e9curit\u00e9<\/div>\n                                <h3 class=\"card-title\">Cryptographie post-quantique<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute.svg\" alt=\"capgemini-research-institute\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><\/div>\n                    <\/div><\/div><\/section>\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Pour aller plus loin<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 4e03f538-ee29-4d25-acea-3201a676c386\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-blue-capgemini-theme\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Acc\u00e9l\u00e9rez la transformation de votre entreprise avec une cybers\u00e9curit\u00e9 en laquelle vous pouvez avoir confiance.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tAcc\u00e9l\u00e9rez la transformation de votre entreprise avec une cybers\u00e9curit\u00e9 en laquelle vous pouvez avoir confiance.<br>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/08\/Cyber-resilience-web-banner.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 50% 50%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>Dans un monde industriel hyperconnect\u00e9, les entreprises sont de plus en plus vuln\u00e9rables aux perturbations g\u00e9opolitiques et \u00e9conomiques, rendant la r\u00e9silience de leur \u00e9cosyst\u00e8me strat\u00e9gique.<\/p>\n","protected":false},"author":12386,"featured_media":791682,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,46,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[138],"tags":[192],"brand":[30,31],"service":[47],"industry":[68],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-791247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-transformation","tag-cybersecurite","brand-capgemini","brand-capgemini-invent","service-cybersecurite","industry-industries","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Renforcer la r\u00e9silience des entreprises - Capgemini France<\/title>\n<meta name=\"description\" content=\"Comment renforcer la r\u00e9silience des entreprises face aux risques cyber, g\u00e9opolitiques et aux perturbations de la cha\u00eene d\u2019approvisionnement ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Renforcer la r\u00e9silience des entreprises : strat\u00e9gies cl\u00e9s pour les environnements industriels\" \/>\n<meta property=\"og:description\" content=\"Comment renforcer la r\u00e9silience des entreprises face aux risques cyber, g\u00e9opolitiques et aux perturbations de la cha\u00eene d\u2019approvisionnement ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-24T12:24:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-30T14:51:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-industrielle-Webpreview.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lucie Shen et Noa Nataf\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tarek Edde Gomez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/\"},\"author\":{\"name\":\"Tarek Edde Gomez\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa\"},\"headline\":\"Renforcer la r\u00e9silience des entreprises : strat\u00e9gies cl\u00e9s pour les environnements industriels\",\"datePublished\":\"2025-09-24T12:24:35+00:00\",\"dateModified\":\"2025-10-30T14:51:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/\"},\"wordCount\":1013,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/\",\"name\":\"Renforcer la r\u00e9silience des entreprises - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg\",\"datePublished\":\"2025-09-24T12:24:35+00:00\",\"dateModified\":\"2025-10-30T14:51:12+00:00\",\"description\":\"Comment renforcer la r\u00e9silience des entreprises face aux risques cyber, g\u00e9opolitiques et aux perturbations de la cha\u00eene d\u2019approvisionnement ?\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg\",\"width\":5760,\"height\":3840,\"caption\":\"Clock gear set closeup, industrial background\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa\",\"name\":\"Tarek Edde Gomez\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/tarekgomez\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Renforcer la r\u00e9silience des entreprises - Capgemini France","description":"Comment renforcer la r\u00e9silience des entreprises face aux risques cyber, g\u00e9opolitiques et aux perturbations de la cha\u00eene d\u2019approvisionnement ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/","og_locale":"fr_FR","og_type":"article","og_title":"Renforcer la r\u00e9silience des entreprises : strat\u00e9gies cl\u00e9s pour les environnements industriels","og_description":"Comment renforcer la r\u00e9silience des entreprises face aux risques cyber, g\u00e9opolitiques et aux perturbations de la cha\u00eene d\u2019approvisionnement ?","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/","og_site_name":"Capgemini France","article_published_time":"2025-09-24T12:24:35+00:00","article_modified_time":"2025-10-30T14:51:12+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-industrielle-Webpreview.png","type":"image\/png"}],"author":"Lucie Shen et Noa Nataf","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tarek Edde Gomez","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/"},"author":{"name":"Tarek Edde Gomez","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa"},"headline":"Renforcer la r\u00e9silience des entreprises : strat\u00e9gies cl\u00e9s pour les environnements industriels","datePublished":"2025-09-24T12:24:35+00:00","dateModified":"2025-10-30T14:51:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/"},"wordCount":1013,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/","name":"Renforcer la r\u00e9silience des entreprises - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg","datePublished":"2025-09-24T12:24:35+00:00","dateModified":"2025-10-30T14:51:12+00:00","description":"Comment renforcer la r\u00e9silience des entreprises face aux risques cyber, g\u00e9opolitiques et aux perturbations de la cha\u00eene d\u2019approvisionnement ?","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg","width":5760,"height":3840,"caption":"Clock gear set closeup, industrial background"},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa","name":"Tarek Edde Gomez","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/tarekgomez\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"},{"id":31,"name":"Capgemini Invent","slug":"capgemini-invent"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"industry":[{"id":68,"name":"Industries","slug":"industries"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Renforcer la r\u00e9silience des entreprises : strat\u00e9gies cl\u00e9s pour les environnements industriels","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg"},"articleSection":"Transformation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2025-09-24T12:24:35Z","datePublished":"2025-09-24T12:24:35Z","dateModified":"2025-10-30T14:51:12Z"},"rendered":"<meta name=\"parsely-title\" content=\"Renforcer la r\u00e9silience des entreprises : strat\u00e9gies cl\u00e9s pour les environnements industriels\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-la-resilience-des-entreprises-strategies-cles-pour-les-environnements-industriels\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-09-24T12:24:35Z\" \/>\n<meta name=\"parsely-section\" content=\"Transformation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":749807,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/intelligent-industry-renforcer-resilience-supply-chain-tour-de-controle\/","url_meta":{"origin":791247,"position":0},"title":"La tour de contr\u00f4le pour renforcer la r\u00e9silience de la supply chain","author":"cyrille.joseph-lockel@capgemini.com","date":"April 5, 2024","format":false,"excerpt":"Comment les nouveaux usages de la donn\u00e9e permettent d\u2019assurer collectivement la gestion des risques autour de la Supply Chain ?","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/2024-FR-Featured-Image-blog-control-tower.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/2024-FR-Featured-Image-blog-control-tower.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/2024-FR-Featured-Image-blog-control-tower.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/2024-FR-Featured-Image-blog-control-tower.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":762594,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/resilience-supply-chain-automobile\/","url_meta":{"origin":791247,"position":1},"title":"Renforcer la r\u00e9silience de la supply chain automobile gr\u00e2ce \u00e0 la data et l\u2019intelligence artificielle","author":"quentinkieken","date":"September 26, 2024","format":false,"excerpt":"Tensions g\u00e9opolitiques, fluctuations des prix des mati\u00e8res premi\u00e8res, p\u00e9nuries de composants, al\u00e9as climatiques et risques de cybers\u00e9curit\u00e9\u2026 Les constructeurs automobiles font face \u00e0 une multitude de risques strat\u00e9giques, logistiques et technologiques, complexifiant la gestion de leurs cha\u00eenes d\u2019approvisionnement.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":786783,"url":"https:\/\/www.capgemini.com\/fr-fr\/insights\/expert-perspectives\/cs3d-un-accelerateur-de-transformation-plus-que-jamais-incontournable\/","url_meta":{"origin":791247,"position":2},"title":"CS3D\u202f: un acc\u00e9l\u00e9rateur de transformation plus que jamais incontournable\u00a0","author":"audreykone","date":"June 20, 2025","format":false,"excerpt":"Les entreprises sont confront\u00e9es \u00e0 des exigences de reporting durable d\u2019une ampleur in\u00e9dite. Pour leur permettre d\u2019y faire face, la Commission europ\u00e9enne a propos\u00e9 d\u00e9but 2025 des mesures l\u00e9gislatives visant \u00e0 ajuster ou \u00e0 reporter certaines obligations\u202f: le paquet Omnibus. Un coup de frein qui ne remet pas pour autant\u2026","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/GettyImages-2185029522.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/GettyImages-2185029522.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/GettyImages-2185029522.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/GettyImages-2185029522.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":742555,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-approche-fondee-risques\/","url_meta":{"origin":791247,"position":3},"title":"DORA ou l&#8217;approche fond\u00e9e sur les risques","author":"quentinkieken","date":"February 12, 2024","format":false,"excerpt":"En 2022, les institutions financi\u00e8res ont \u00e9t\u00e9 plus expos\u00e9es aux cyberattaques que la plupart des autres secteurs, en dehors de la sant\u00e9.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/02\/GettyImages-684641103.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":730671,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/quels-cyber-risques-dans-metaverse\/","url_meta":{"origin":791247,"position":4},"title":"Quels cyber risques dans le Metaverse\u00a0?","author":"","date":"October 3, 2023","format":false,"excerpt":"Soutenu par une combinaison de technologies telles que la r\u00e9alit\u00e9 virtuelle (VR), la r\u00e9alit\u00e9 augment\u00e9e (AR) et\/ou le Web 3.0, le Metaverse est un environnement immersif dans lequel le r\u00e9el rencontre le virtuel.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/10\/GettyImages-1383547890.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":747040,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-dora-gouvernance\/","url_meta":{"origin":791247,"position":5},"title":"NIS2, DORA\u00a0: la gouvernance au c\u0153ur des exigences","author":"quentinkieken","date":"March 13, 2024","format":false,"excerpt":"Afin de s\u00e9curiser davantage le tissu \u00e9conomique face \u00e0 des risques num\u00e9riques grandissants, l\u2019Union europ\u00e9enne a adopt\u00e9 en 2022 deux textes majeurs qui entreront prochainement en vigueur\u00a0: NIS2 et DORA.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/GettyImages-1670005397.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/09\/Resilience-Industrielle.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/791247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/12386"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=791247"}],"version-history":[{"count":19,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/791247\/revisions"}],"predecessor-version":[{"id":795594,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/791247\/revisions\/795594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/791682"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=791247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=791247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=791247"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=791247"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=791247"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=791247"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=791247"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=791247"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=791247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}