{"id":794325,"date":"2025-10-20T19:00:55","date_gmt":"2025-10-20T17:00:55","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=794325"},"modified":"2026-03-12T12:28:04","modified_gmt":"2026-03-12T11:28:04","slug":"assises-de-la-cybersecurite-2025-lheure-du-retour-aux-fondamentaux","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/","title":{"rendered":"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Vincent-Laurens.png?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Vincent Laurens<\/h5><h5 class=\"blog-date\">20 octobre 2025<\/h5><\/div><\/div><div class=\"brand-image\"><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-2\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-8\"><h2 class=\"intro-para-title\">La cybers\u00e9curit\u00e9 rassemble en France une communaut\u00e9 extr\u00eamement vivace, soud\u00e9e, comp\u00e9tente, qui est \u00e0 la fois soutenue et aiguillonn\u00e9e par un r\u00e9gulateur, l\u2019ANSSI, tr\u00e8s impliqu\u00e9 et proactif. <\/h2><p class=\"intro-para-content\">Comme chaque ann\u00e9e, les Assises de la cybers\u00e9curit\u00e9 de Monaco ont permis \u00e0 ces professionnels de se retrouver, et leurs \u00e9changes nourris et approfondis sont un r\u00e9v\u00e9lateur de premi\u00e8re main des tendances et de l\u2019\u00e9tat de l\u2019art de la discipline.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"grid-container\"><div><div class=\"article-text article-quote-text\">\n<p>Bien entendu, le contexte qui structure de la cybers\u00e9curit\u00e9 reste \u2013 et restera sans doute longtemps \u2013 inchang\u00e9&nbsp;: tensions g\u00e9opolitiques exacerb\u00e9es, professionnalisation des cybercriminels, pression r\u00e9glementaire, p\u00e9nurie de comp\u00e9tences. \u00c0 ces invariants, d\u00e9sormais assimil\u00e9s, s\u2019est ajout\u00e9e cette ann\u00e9e la dimension macro\u00e9conomique. Tr\u00e8s pr\u00e9sente dans les conversations, la r\u00e9duction des co\u00fbts fait maintenant partie int\u00e9grante de l\u2019\u00e9quation cyber.<\/p>\n\n\n\n<p>Parall\u00e8lement, l\u2019offre se r\u00e9v\u00e8le toujours aussi foisonnante. Loin de la consolidation annonc\u00e9e depuis des ann\u00e9es, la cybers\u00e9curit\u00e9 semble engendrer toujours plus de startups, d\u2019\u00e9diteurs et de solutions, o\u00f9 l\u2019IA est devenue incontournable. Que ce soit pour affiner la d\u00e9tection, renforcer la r\u00e9ponse, automatiser les processus ou accro\u00eetre l\u2019efficacit\u00e9 op\u00e9rationnelle, <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/\">l\u2019IA \u2013 classique ou g\u00e9n\u00e9rative \u2013 s\u2019invite \u00e0 chaque \u00e9tape du dispositif cyber<\/a>, m\u00eame si, faute d\u2019un recul suffisant, son apport reste difficile \u00e0 quantifier pr\u00e9cis\u00e9ment.<\/p>\n\n\n\n<p>Ainsi, les organisations sont parfaitement conscientes des menaces et savent donc tr\u00e8s bien ce qu\u2019elles auraient \u00e0 faire. Mais, aux prises avec une offre pl\u00e9thorique, un calendrier r\u00e9glementaire contraignant et des moyens en berne, elles peinent souvent \u00e0 d\u00e9finir la marche \u00e0 suivre. C\u2019est certainement ce qui explique un retour tr\u00e8s net aux fondamentaux&nbsp;: entre l\u2019urgence et la perplexit\u00e9, l\u2019enjeu est clairement d\u2019adresser les principaux risques de la mani\u00e8re la plus efficace et la plus efficiente possible.<\/p>\n\n\n\n<p>Ce pragmatisme appara\u00eet comme la ligne directrice qui sous-tend les grandes tendances que l\u2019on a pu observer aux <a href=\"https:\/\/www.capgemini.com\/fr-fr\/actualites\/evenements\/les-assises-de-la-cybersecurite\/\">Assises de Monaco<\/a>, \u00e0 savoir&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>la servicisation<\/strong>&nbsp;: la fonction cyber se r\u00e9organise en centres de services pour rationaliser son fonctionnement, gagner en agilit\u00e9 et optimiser la gestion et la disponibilit\u00e9 de ses comp\u00e9tences, voire r\u00e9duire ses co\u00fbts en transf\u00e9rant certaines capacit\u00e9s \u00e0 des structures offshore&nbsp;;<\/li>\n\n\n\n<li><strong>la plateformisation<\/strong>&nbsp;: pour rationaliser l\u2019outillage, consolider les investissements et passer les solutions \u00e0 l\u2019\u00e9chelle, les plateformes cyber que proposent certains grands \u00e9diteurs suscitent un int\u00e9r\u00eat croissant. S\u2019il n\u2019y aura jamais de r\u00e9ponse d\u00e9finitive \u00e0 l\u2019\u00e9ternel d\u00e9bat entre solutions int\u00e9gr\u00e9es et best-of-breed \u2013 tout d\u00e9pend du contexte, du m\u00e9tier et des moyens dont on dispose \u2013, la plateformisation n\u2019en est pas moins une vraie opportunit\u00e9 pour aller vite et couvrir l\u2019essentiel des menaces \u00e0 moindre co\u00fbt.<\/li>\n\n\n\n<li><strong>la souverainisation<\/strong>&nbsp;: exception culturelle oblige, les organisations tendent \u00e0 privil\u00e9gier des solutions fran\u00e7aises ou, du moins, op\u00e9r\u00e9es en France. Il faut cependant prendre garde \u00e0 ne pas surpond\u00e9rer cet aspect et \u00e0 toujours le mettre en balance avec les autres crit\u00e8res de d\u00e9cision cyber. De la m\u00eame fa\u00e7on, on doit veiller \u00e0 ce que l\u2019imp\u00e9ratif de conformit\u00e9 n\u2019aille pas jusqu\u2019\u00e0 supplanter la s\u00e9curit\u00e9, que ce soit en termes d\u2019investissements ou m\u00eame de choix lorsque les besoins ne sont pas align\u00e9s.<\/li>\n<\/ul>\n\n\n\n<p>Cette recherche pragmatique d\u2019une efficience maximale marque un tournant dans le monde de la cybers\u00e9curit\u00e9 et, peut-\u00eatre, un changement d\u2019\u00e8re. Un cycle semble s\u2019achever&nbsp;\u2013 celui de la prise de conscience des enjeux, de la maturation des concepts et des solutions cl\u00e9s (<a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-csma-avenir-des-strategies-zero-trust\/\">Zero Trust<\/a>, SIEM, <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/\">CNAPP<\/a>, <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/innovation-cybermenace-quantique-passer-a-laction\/\">Post Quantum Cryptographie<\/a>\u2026) et de l\u2019exp\u00e9rimentation tous azimuts \u2013 et un autre s\u2019ouvrir&nbsp;: celui de la consolidation, de la rationalisation et de l\u2019industrialisation des d\u00e9fenses face \u00e0 des menaces, certes multiples et \u00e9volutives, mais d\u00e9sormais bien appr\u00e9hend\u00e9es. En 2025, la cybers\u00e9curit\u00e9 n\u2019a d\u2019autre choix que de se banaliser, de se consum\u00e9riser, pour devenir aussi omnipr\u00e9sente et permanente que le risque qu\u2019elle est charg\u00e9e de combattre.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Notre expert<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Vincent-Laurens.png\" alt=\"Vincent Laurens\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Vincent Laurens<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur du d\u00e9veloppement Cyber pour la r\u00e9gion Europe du Sud, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Vincent a d\u00e9but\u00e9 sa carri\u00e8re en s\u00e9curit\u00e9 informatique dans les ann\u00e9es 90, travaillant avec diverses organisations, y compris des services de renseignement et des industries sp\u00e9cialis\u00e9es. En 2013, Vincent a rejoint Sogeti au Luxembourg, puis est devenu vice-pr\u00e9sident mondial de la cybers\u00e9curit\u00e9 en 2018. Depuis 2022, Vincent est vice-pr\u00e9sident et strat\u00e8ge mondial de la s\u00e9curit\u00e9 chez Devo, et en 2024, il a rejoint Capgemini pour diriger la cybers\u00e9curit\u00e9 dans la r\u00e9gion SCE. Depuis 2019, il est \u00e9galement administrateur non ex\u00e9cutif pour plusieurs start-ups technologiques et conseille des dirigeants et des conseils d&#8217;administration en cybers\u00e9curit\u00e9.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Curseur pr\u00e9c\u00e9dent\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Curseur suivant\"><\/button><\/div><\/div><\/section>\n\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Sujets associ\u00e9s<\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/\" aria-label=\"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/\" aria-label=\"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation\"><h3 class=\"expert-subtitle\">Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">f\u00e9vr. 26, 2026<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" aria-label=\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" aria-label=\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises\"><h3 class=\"expert-subtitle\">IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/Sebastien-Baule.jpg?w=705\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">S\u00e9bastien Baule<\/div><div class=\"date-text\">janv. 12, 2026<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/menace-quantique-entreprises-regardent-ailleurs\/\" aria-label=\"La menace quantique se pr\u00e9cise, les entreprises regardent ailleurs\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/2025-FR-Blog-Cybermenace-Quantique-2.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9, Innovation<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/menace-quantique-entreprises-regardent-ailleurs\/\" aria-label=\"La menace quantique se pr\u00e9cise, les entreprises regardent ailleurs\"><h3 class=\"expert-subtitle\">La menace quantique se pr\u00e9cise, les entreprises regardent ailleurs<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">oct. 15, 2025<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n<section class=\"latest-insights layout-odd \"><div class=\"container\"><div class=\"insight-title\"><h2 class=\"latest-insight-title\"><\/h2><\/div><div class=\"layout-single-card\">\n                      <div class=\"row align-items-center w-lg-100\">\n                        <div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/trajectoires\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=500&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg?w=1000&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/ObjectifTech-Trajectoires-WebsiteBanner_4608c2.jpg\" alt=\"\" style=\"object-position: 49% 47%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div>\n                            <div class=\"col-12 col-md-5 col-lg-7\"><\/div>\n                        <div class=\"col-12 col-md-7 col-lg-5\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/trajectoires\/\" aria-label=\"Trajectoires\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Transformation Digitale<\/div>\n                                <h3 class=\"card-title\">Trajectoires<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                     <\/div>\n                    <\/div><div class=\"layout-two-card cards-reversed\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/cryptographie-post-quantique-cyber\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Post-quantum-crypto-web-banner.jpg\" alt=\"Post quantum crypto - hero banner\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-md-6 col-lg-4 flex-sm-order-reverse\">\n                            <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/ia-confiance-defense-ouvrage-collectif-avenir\/\" aria-label=\"IA de confiance dans la D\u00e9fense : un ouvrage collectif pour b\u00e2tir l\u2019avenir\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Cybers\u00e9curit\u00e9<\/div>\n                                <h3 class=\"card-title\">IA de confiance dans la D\u00e9fense : un ouvrage collectif pour b\u00e2tir l\u2019avenir<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-white.svg\" alt=\"capgemini\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-white.svg\" alt=\"capgemini\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/cryptographie-post-quantique-cyber\/\" aria-label=\"Cryptographie post-quantique\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Cybers\u00e9curit\u00e9<\/div>\n                                <h3 class=\"card-title\">Cryptographie post-quantique<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute.svg\" alt=\"capgemini-research-institute\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><\/div>\n                    <\/div><\/div><\/section>\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader f4ea2ccb-fca1-4aef-97d5-6741d1e457af\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Passer du risque et du co\u00fbt \u00e0 la r\u00e9silience et aux opportunit\u00e9s.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tPasser du risque et du co\u00fbt \u00e0 la r\u00e9silience et aux opportunit\u00e9s.\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"24\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\taria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"0\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"object-position: 50% 50%; object-fit: cover;\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ce que les Assises de la Cybers\u00e9curit\u00e9 2025 r\u00e9v\u00e8lent sur l\u2019avenir du secteur.<\/p>\n","protected":false},"author":166,"featured_media":1000001164370,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,46,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[3,138],"tags":[192],"brand":[30],"service":[47],"industry":[],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-794325","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","category-transformation","tag-cybersecurite","brand-capgemini","service-cybersecurite","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux - Capgemini France<\/title>\n<meta name=\"description\" content=\"Au-del\u00e0 des technologies, les Assises ont mis en lumi\u00e8re une conviction partag\u00e9e : la cybers\u00e9curit\u00e9 doit animer la strat\u00e9gie d&#039;entreprise et l&#039;ensemble des m\u00e9tiers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux\" \/>\n<meta property=\"og:description\" content=\"Au-del\u00e0 des technologies, les Assises ont mis en lumi\u00e8re une conviction partag\u00e9e : la cybers\u00e9curit\u00e9 doit animer la strat\u00e9gie d&#039;entreprise et l&#039;ensemble des m\u00e9tiers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-20T17:00:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T11:28:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/image-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vincent Laurens\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@anne.gautier@capgemini.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"anne.gautier@capgemini.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\"},\"author\":{\"name\":\"anne.gautier@capgemini.com\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e\"},\"headline\":\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux\",\"datePublished\":\"2025-10-20T17:00:55+00:00\",\"dateModified\":\"2026-03-12T11:28:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\"},\"wordCount\":744,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Innovation\",\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\",\"name\":\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg\",\"datePublished\":\"2025-10-20T17:00:55+00:00\",\"dateModified\":\"2026-03-12T11:28:04+00:00\",\"description\":\"Au-del\u00e0 des technologies, les Assises ont mis en lumi\u00e8re une conviction partag\u00e9e : la cybers\u00e9curit\u00e9 doit animer la strat\u00e9gie d'entreprise et l'ensemble des m\u00e9tiers.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e\",\"name\":\"anne.gautier@capgemini.com\",\"sameAs\":[\"https:\/\/x.com\/anne.gautier@capgemini.com\",\"anne.gautier@capgemini.com\"],\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/anne-gautiercapgemini-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux - Capgemini France","description":"Au-del\u00e0 des technologies, les Assises ont mis en lumi\u00e8re une conviction partag\u00e9e : la cybers\u00e9curit\u00e9 doit animer la strat\u00e9gie d'entreprise et l'ensemble des m\u00e9tiers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/","og_locale":"fr_FR","og_type":"article","og_title":"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux","og_description":"Au-del\u00e0 des technologies, les Assises ont mis en lumi\u00e8re une conviction partag\u00e9e : la cybers\u00e9curit\u00e9 doit animer la strat\u00e9gie d'entreprise et l'ensemble des m\u00e9tiers.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/","og_site_name":"Capgemini France","article_published_time":"2025-10-20T17:00:55+00:00","article_modified_time":"2026-03-12T11:28:04+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/image-1.jpg","type":"image\/jpeg"}],"author":"Vincent Laurens","twitter_card":"summary_large_image","twitter_creator":"@anne.gautier@capgemini.com","twitter_misc":{"Written by":"anne.gautier@capgemini.com","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/"},"author":{"name":"anne.gautier@capgemini.com","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e"},"headline":"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux","datePublished":"2025-10-20T17:00:55+00:00","dateModified":"2026-03-12T11:28:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/"},"wordCount":744,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Innovation","Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/","name":"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg","datePublished":"2025-10-20T17:00:55+00:00","dateModified":"2026-03-12T11:28:04+00:00","description":"Au-del\u00e0 des technologies, les Assises ont mis en lumi\u00e8re une conviction partag\u00e9e : la cybers\u00e9curit\u00e9 doit animer la strat\u00e9gie d'entreprise et l'ensemble des m\u00e9tiers.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/#primaryimage","url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg","contentUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg"},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/816b44b24d8e4a4d607a37f64955250e","name":"anne.gautier@capgemini.com","sameAs":["https:\/\/x.com\/anne.gautier@capgemini.com","anne.gautier@capgemini.com"],"url":"https:\/\/www.capgemini.com\/fr-fr\/author\/anne-gautiercapgemini-com\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":3,"name":"Innovation","slug":"innovation"},{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg"},"articleSection":"Innovation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2025-10-20T17:00:55Z","datePublished":"2025-10-20T17:00:55Z","dateModified":"2026-03-12T11:28:04Z"},"rendered":"<meta name=\"parsely-title\" content=\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-10-20T17:00:55Z\" \/>\n<meta name=\"parsely-section\" content=\"Innovation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":696052,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cyber4good-philosophie-cybersecurite\/","url_meta":{"origin":794325,"position":0},"title":"Cyber4Good, une nouvelle philosophie pour la cybers\u00e9curit\u00e9","author":"","date":"October 2, 2022","format":false,"excerpt":"Les enjeux autour de la s\u00e9curit\u00e9 du cyberespace ne sont plus \u00e0 d\u00e9montrer, la France est ainsi le 4\u00e8me pays au monde le plus touch\u00e9 par des attaques par ransomware. La cybers\u00e9curit\u00e9 est vitale.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-496737104.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-496737104.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-496737104.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-496737104.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":801609,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/","url_meta":{"origin":794325,"position":1},"title":"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation","author":"Tarek Edde Gomez","date":"February 26, 2026","format":false,"excerpt":"Dans un contexte g\u00e9opolitique et technologique instable, les crises touchant les organisations se multiplient et deviennent de plus en plus impr\u00e9visibles et impactantes.","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":787211,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-ia-defense\/","url_meta":{"origin":794325,"position":2},"title":"Cybers\u00e9curit\u00e9 et IA : un nouvel horizon pour la d\u00e9fense","author":"quentinkieken","date":"June 24, 2025","format":false,"excerpt":"L\u2019IA bouleverse tous les aspects du domaine militaire, du centre de commandement au th\u00e9\u00e2tre des op\u00e9rations, des fonctions de soutien aux syst\u00e8mes de combat. Pour les forces arm\u00e9es, elle est un formidable atout, leur permettant de se pr\u00e9parer et d\u2019agir avec davantage d\u2019anticipation, de pr\u00e9cision et d\u2019efficacit\u00e9, mais elle est\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/06\/banner_blog_cyber_ia_defense.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":800805,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/","url_meta":{"origin":794325,"position":3},"title":"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises","author":"Tarek Edde Gomez","date":"January 12, 2026","format":false,"excerpt":"Face \u00e0 la multiplication des cybermenaces et \u00e0 la complexit\u00e9 croissante des environnements IT, l\u2019Identity & Access Management (IAM) est aujourd\u2019hui un levier strat\u00e9gique incontournable.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":787594,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-les-dilemnes-ia-genai\/","url_meta":{"origin":794325,"position":4},"title":"Les paradoxes de l\u2019IA et de la Gen AI pour la cybers\u00e9curit\u00e9","author":"anne.gautier@capgemini.com","date":"July 3, 2025","format":false,"excerpt":"Malgr\u00e9 les incertitudes r\u00e9glementaires, les organisations doivent investir d\u00e8s maintenant dans l\u2019IA pour la cybers\u00e9curit\u00e9, tout en avan\u00e7ant avec prudence, en encadrant son usage par une gouvernance rigoureuse et une veille continue.","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/07\/Getty-Images-IA-Gen-AI-dans-la-cybersecurite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":715927,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/renforcer-cybersecurite-industrielle\/","url_meta":{"origin":794325,"position":5},"title":"Renforcer la cybers\u00e9curit\u00e9 industrielle","author":"cyrille.joseph-lockel@capgemini.com","date":"May 15, 2025","format":false,"excerpt":"Depuis plusieurs ann\u00e9es, les syst\u00e8mes industriels sont vis\u00e9s par des attaques qui rentrent dans deux cadres principaux","rel":"","context":"In &quot;Transformation&quot;","block_context":{"text":"Transformation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/transformation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/2023-FR-Hero-banner-Blog-Renforcer-Securite-Industrielle.jpg.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/2023-FR-Hero-banner-Blog-Renforcer-Securite-Industrielle.jpg.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/2023-FR-Hero-banner-Blog-Renforcer-Securite-Industrielle.jpg.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/04\/2023-FR-Hero-banner-Blog-Renforcer-Securite-Industrielle.jpg.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/794325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=794325"}],"version-history":[{"count":13,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/794325\/revisions"}],"predecessor-version":[{"id":804885,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/794325\/revisions\/804885"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=794325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=794325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=794325"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=794325"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=794325"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=794325"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=794325"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=794325"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=794325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}