{"id":800805,"date":"2026-01-12T09:00:00","date_gmt":"2026-01-12T08:00:00","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?p=800805"},"modified":"2026-02-09T10:03:47","modified_gmt":"2026-02-09T09:03:47","slug":"iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/","title":{"rendered":"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/Sebastien-Baule.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">S\u00e9bastien Baule<\/h5><h5 class=\"blog-date\">11 janvier 2026<\/h5><\/div><\/div><div class=\"brand-image\"><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Face \u00e0 la multiplication des cybermenaces et \u00e0 la complexit\u00e9 croissante des environnements IT, l\u2019Identity &amp; Access Management (IAM) est aujourd\u2019hui un levier strat\u00e9gique incontournable. <br><\/h2><p class=\"intro-para-content\">Dans mes \u00e9changes avec des CxO, je vois que l\u2019IAM n\u2019est plus per\u00e7u comme un simple projet IT, mais comme un pilier de la strat\u00e9gie digitale. Les discussions portent autant sur la s\u00e9curit\u00e9 que sur les performances op\u00e9rationnelles et l\u2019exp\u00e9rience utilisateur.<br><br>Selon Gartner, <a href=\"https:\/\/www.gartner.com\/en\/documents\/4856631\" target=\"_blank\" rel=\"noreferrer noopener\">un programme IAM<\/a> bien con\u00e7u ne se contente pas de s\u00e9curiser les acc\u00e8s\u00a0: Il cr\u00e9e de la valeur en am\u00e9liorant l\u2019agilit\u00e9, en r\u00e9duisant les co\u00fbts li\u00e9s aux incidents, et <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/identity-and-access-management-in-the-digital-age\" target=\"_blank\" rel=\"noreferrer noopener\">en facilitant la transformation digitale<\/a>.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-pourquoi-l-iam-est-devenu-strategique\">Pourquoi l\u2019IAM est devenu strat\u00e9gique<\/h2>\n\n\n\n<p>L\u2019IAM ne se limite plus \u00e0 g\u00e9rer les comptes utilisateurs. Il s\u2019agit d\u00e9sormais de <strong>contr\u00f4ler dynamiquement qui acc\u00e8de \u00e0 quoi, quand et comment<\/strong>, dans un \u00e9cosyst\u00e8me o\u00f9 les identit\u00e9s ne sont plus uniquement humaines : B2E, B2B, B2C, IoT, Cloud services, etc.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.kuppingercole.com\/research\/lc80893\/identity-fabrics\" rel=\"noreferrer noopener\" target=\"_blank\">KuppingerCole<\/a> parle d\u2019<strong>Identity Fabric<\/strong>, une approche qui permet d\u2019unifier la gestion des identit\u00e9s \u00e0 travers tous les types d\u2019utilisateurs et de syst\u00e8mes, en int\u00e9grant gouvernance, automatisation et s\u00e9curit\u00e9<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-l-identity-fabric\">L\u2019Identity Fabric<\/h2>\n\n\n\n<p>Le principe de l\u2019Identity Fabric est le lien entre toutes les briques de la Digital Identity qui permet d\u2019unifier les donn\u00e9es d\u2019identit\u00e9 provenant de toutes les sources (on-premise ou cloud) au sein d\u2019une organisation afin de les transformer en ressources r\u00e9utilisables et \u00e9volutives.<\/p>\n\n\n\n<p>Le lien entre toutes ces sources donne un profil global complet et riche pour chaque utilisateur. Ces donn\u00e9es sont alors consommables dans n\u2019importe quel protocole (SAML, OIDC, SCIM, \u2026)<\/p>\n\n\n\n<p>Les principes sur lesquels s\u2019appuient l\u2019Identity Fabric sont&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Authentification et autorisation<\/strong> (IAM, CIAM, f\u00e9d\u00e9ration)<\/li>\n\n\n\n<li><strong>Gestion des identit\u00e9s<\/strong> (provisionnement, cycle de vie, gouvernance)<\/li>\n\n\n\n<li><strong>S\u00e9curit\u00e9 adaptative<\/strong> (MFA, risk-based access)<\/li>\n\n\n\n<li><strong>Int\u00e9gration multi-environnements<\/strong> (cloud, on-prem, SaaS, API)<\/li>\n\n\n\n<li><strong>Exp\u00e9rience utilisateur fluide<\/strong> (SSO, self-service, consent management)<\/li>\n<\/ul>\n\n\n\n<p>Vous l\u2019aurez compris, l\u2019Identity Fabric ne repose pas forc\u00e9ment sur un seul produit, mais potentiellement sur plusieurs\u2026 (m\u00eame si certains y tendent) L\u2019Identity Fabric est une vision ambitieuse. Je constate que peu d\u2019organisations sont pr\u00eates \u00e0 l\u2019adopter pleinement, mais celles qui s\u2019y engagent gagnent en coh\u00e9rence et en rapidit\u00e9 d\u2019int\u00e9gration multi-cloud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-les-risques-d-un-iam-neglige\">Les risques d\u2019un IAM n\u00e9glig\u00e9<\/h2>\n\n\n\n<p>Lorsqu\u2019il est mal con\u00e7u ou insuffisamment gouvern\u00e9, un syst\u00e8me IAM peut devenir une faille critique dans l\u2019architecture de s\u00e9curit\u00e9 d\u2019une entreprise. Ce n\u2019est pas seulement une question de technologie, mais de ma\u00eetrise des acc\u00e8s \u00e0 l\u2019information, dans un contexte o\u00f9 les fronti\u00e8res entre utilisateurs internes (B2E), partenaires (B2B) et services cloud sont de plus en plus floues.<\/p>\n\n\n\n<p>Prenons l\u2019exemple d\u2019un collaborateur quittant l\u2019entreprise&nbsp;: si ses acc\u00e8s ne sont pas r\u00e9voqu\u00e9s imm\u00e9diatement, il peut conserver un point d\u2019entr\u00e9e vers des ressources sensibles. De m\u00eame, l\u2019absence de visibilit\u00e9 sur les droits d\u2019acc\u00e8s cumul\u00e9s au fil du temps cr\u00e9e un terrain propice aux abus ou aux erreurs.<\/p>\n\n\n\n<p>C\u2019est un sc\u00e9nario que je rencontre souvent. La gestion du cycle de vie (Joiner-Mover-Leaver) reste un point faible dans beaucoup d\u2019entreprises, alors qu\u2019elle est critique pour \u00e9viter les acc\u00e8s fant\u00f4mes.<\/p>\n\n\n\n<p>Le ph\u00e9nom\u00e8ne de Shadow IT, o\u00f9 des utilisateurs contournent les processus officiels pour acc\u00e9der \u00e0 des outils non valid\u00e9s, est \u00e9galement amplifi\u00e9 par un IAM trop rigide ou mal int\u00e9gr\u00e9. Cela fragilise la posture de s\u00e9curit\u00e9 globale et complique la conformit\u00e9 aux r\u00e9glementations comme le RGPD, NIS2 ou DORA.<\/p>\n\n\n\n<p>Ces vuln\u00e9rabilit\u00e9s ne sont pas que th\u00e9oriques. D\u2019apr\u00e8s <a href=\"https:\/\/www.forrester.com\/blogs\/previsions-2024-securite-et-confidentialite-fr\/\" rel=\"noreferrer noopener\" target=\"_blank\">Forrester<\/a>, <strong>90 % des violations de donn\u00e9es impliquent un facteur humain, incluant notamment l\u2019utilisation d\u2019identifiants compromis ou mal prot\u00e9g\u00e9s. <\/strong>Ce chiffre souligne \u00e0 quel point la gestion des identit\u00e9s est devenue un vecteur d\u2019attaque privil\u00e9gi\u00e9 pour les cybercriminels.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-bonnes-pratiques-pour-les-cxo-pour-transformer-l-iam-en-avantage-strategique-les-dirigeants-doivent\">Bonnes pratiques pour les CxO<br>Pour transformer l\u2019IAM en avantage strat\u00e9gique, les dirigeants doivent :<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Adopter une approche Zero Trust<\/strong>, o\u00f9 chaque acc\u00e8s est valid\u00e9 selon le principe du moindre privil\u00e8ge.<\/li>\n\n\n\n<li><strong>Mettre en place une authentification forte (MFA)<\/strong>, r\u00e9sistante au phishing (ex. FIDO2).<\/li>\n\n\n\n<li><strong>Automatiser le cycle de vie des identit\u00e9s<\/strong> (Joiner \u2013 Mover \u2013 Leaver).<\/li>\n\n\n\n<li><strong>Superviser en continu les acc\u00e8s<\/strong> et d\u00e9tecter les comportements anormaux.<\/li>\n\n\n\n<li><strong>Aligner l\u2019IAM avec la strat\u00e9gie d\u2019entreprise<\/strong>, en impliquant les m\u00e9tiers.<\/li>\n\n\n\n<li>&nbsp;<strong>G\u00e9rer les comptes \u00e0 privil\u00e8ges<\/strong> pour limiter drastiquement les risques d\u2019attaques.<\/li>\n<\/ul>\n\n\n\n<p>Ne voyez pas ces pratiques comme des cases \u00e0 cocher, mais comme un cadre \u00e9volutif.<\/p>\n\n\n\n<p>Par exemple, l\u2019authentification forte ne doit pas \u00eatre v\u00e9cue comme une contrainte, mais comme un levier pour am\u00e9liorer l\u2019exp\u00e9rience utilisateur (cartes \u00e0 puce, passwordless, biom\u00e9trie, \u2026).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-constats-cles-sur-les-risques-et-la-maturite-des-organisations\">Constats cl\u00e9s sur les risques et la maturit\u00e9 des organisations<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Beaucoup d\u2019entreprises n\u2019ont pas encore mis en place les fondamentaux de l\u2019IAM moderne<\/strong> (Tendances observ\u00e9es dans les rapports Gartner (ex. Planning Guide for IAM 2025)<\/li>\n\n\n\n<li><strong>63 %<\/strong>&nbsp;des organisations sont dans une zone d\u2019exposition \u00e9lev\u00e9e faute de gouvernance des identit\u00e9s (<a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/cyberark-2023-identity-security-threat-landscape-report\" target=\"_blank\" rel=\"noreferrer noopener\">CyberArk, 2023<\/a>).<\/li>\n\n\n\n<li>Le co\u00fbt moyen d\u2019une violation de donn\u00e9es est estim\u00e9 \u00e0 <strong>4,45 M$ <\/strong>(<a href=\"https:\/\/newsroom.ibm.com\/2023-07-24-IBM-Report-Half-of-Breached-Organizations-Unwilling-to-Increase-Security-Spend-Despite-Soaring-Breach-Costs\" target=\"_blank\" rel=\"noreferrer noopener\">IBM Security<\/a>).<\/li>\n\n\n\n<li><strong>75 %<\/strong> des entreprises sont expos\u00e9es \u00e0 des risques li\u00e9s aux applications ne supportant que les mots de passe (CyberArk, 2023).<\/li>\n\n\n\n<li><strong>77 %<\/strong> des d\u00e9veloppeurs disposent de privil\u00e8ges excessifs, les rendant vuln\u00e9rables aux attaques (CyberArk, 2023).<\/li>\n<\/ul>\n\n\n\n<p>Ces statistiques confirment ce que j\u2019observe&nbsp;: la maturit\u00e9 IAM est encore faible. Beaucoup d\u2019organisations investissent dans des solutions, mais sans gouvernance ni \u00e9volutivit\u00e9, le risque reste \u00e9lev\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n\n\n\n<p><strong>L\u2019IAM n\u2019est plus un sujet IT secondaire. Il est devenu un pilier de la strat\u00e9gie de cybers\u00e9curit\u00e9 et un acc\u00e9l\u00e9rateur de transformation digitale. <\/strong>Pour les CxO, il est temps de consid\u00e9rer l\u2019IAM comme un investissement strat\u00e9gique, au m\u00eame titre que la gouvernance des donn\u00e9es ou la r\u00e9silience op\u00e9rationnelle.<\/p>\n\n\n\n<p>Ma conviction est que L\u2019IAM est un acc\u00e9l\u00e9rateur de transformation digitale. Les entreprises qui l\u2019int\u00e8grent dans leur strat\u00e9gie globale gagnent en s\u00e9curit\u00e9 et en agilit\u00e9.<\/p>\n\n\n\n<p><strong>Et vous, o\u00f9 en est votre organisation dans la maturit\u00e9 IAM\u202f?<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Notre expert<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/Sebastien-Baule.jpg\" alt=\"S\u00e9bastien Baule\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">S\u00e9bastien Baule<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Head of Service Line Digital Identity, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Apr\u00e8s 12 ans dans l\u2019IAM et toujours en constante \u00e9volution (D\u00e9veloppeur Java, Int\u00e9grateur, Architecte, Chef de projets), S\u00e9bastien exerce le m\u00e9tier de Manager depuis 6 ans chez Capgemini o\u00f9 il g\u00e8re les partenaires sur l\u2019aspect technique, la communaut\u00e9 IAM, l\u2019organisation interne et les projets de bout en bout, de l\u2019avant-vente \u00e0 la r\u00e9alisation en passant par la gestion d\u2019\u00e9quipe.\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Curseur pr\u00e9c\u00e9dent\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Curseur suivant\"><\/button><\/div><\/div><\/section>\n\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Sur le m\u00eame sujet <\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/\" aria-label=\"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/02\/Image-generique-article-blog-gestion-de-crises-cyber.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-renforcer-sa-cybersecurite-4-scenarios-pour-preparer-votre-organisation\/\" aria-label=\"Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation\"><h3 class=\"expert-subtitle\">Renforcer sa cybers\u00e9curit\u00e9 en 2026 : 4 sc\u00e9narios pour pr\u00e9parer votre organisation<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">f\u00e9vr. 26, 2026<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" aria-label=\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_92ca44.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-assises-de-la-cybers-2025-lheure-du-retour-aux-fondamentaux\/\" aria-label=\"Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux\"><h3 class=\"expert-subtitle\">Assises de la cybers\u00e9curit\u00e9 2025\u00a0: l\u2019heure du retour aux fondamentaux<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">oct. 20, 2025<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/menace-quantique-entreprises-regardent-ailleurs\/\" aria-label=\"La menace quantique se pr\u00e9cise, les entreprises regardent ailleurs\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/2025-FR-Blog-Cybermenace-Quantique-2.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9, Innovation<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/menace-quantique-entreprises-regardent-ailleurs\/\" aria-label=\"La menace quantique se pr\u00e9cise, les entreprises regardent ailleurs\"><h3 class=\"expert-subtitle\">La menace quantique se pr\u00e9cise, les entreprises regardent ailleurs<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">oct. 15, 2025<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 28b3db5b-e464-4465-b74b-e0be7025e0e9\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Passer du risque et du co\u00fbt \u00e0 la r\u00e9silience et aux opportunit\u00e9s.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tPasser du risque et du co\u00fbt \u00e0 la r\u00e9silience et aux opportunit\u00e9s.\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"En savoir plus A propos Cybers\u00e9curit\u00e9\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/services\/cybersecurite\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2025\/10\/Cyber-resilience-web-banner_b688e9.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 50% 50%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>Face \u00e0 la multiplication des cybermenaces et \u00e0 la complexit\u00e9 croissante des environnements IT, l\u2019Identity &#038; Access Management (IAM) est aujourd\u2019hui un levier strat\u00e9gique incontournable.<\/p>\n","protected":false},"author":12386,"featured_media":800903,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[21,46,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"30","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[3,138],"tags":[192],"brand":[30],"service":[47],"industry":[],"partners":[],"blog-topic":[354],"content-group":[],"class_list":["post-800805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","category-transformation","tag-cybersecurite","brand-capgemini","service-cybersecurite","blog-topic-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises - Capgemini France<\/title>\n<meta name=\"description\" content=\"L\u2019IAM, pilier strat\u00e9gique face aux cybermenaces, am\u00e9liore s\u00e9curit\u00e9, agilit\u00e9 et exp\u00e9rience digitale. D\u00e9couvrez pourquoi il est essentiel.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises\" \/>\n<meta property=\"og:description\" content=\"L\u2019IAM, pilier strat\u00e9gique face aux cybermenaces, am\u00e9liore s\u00e9curit\u00e9, agilit\u00e9 et exp\u00e9rience digitale. D\u00e9couvrez pourquoi il est essentiel.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-12T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-09T09:03:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-Cyber-Webpreview-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"S\u00e9bastien Baule\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tarek Edde Gomez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\"},\"author\":{\"name\":\"Tarek Edde Gomez\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa\"},\"headline\":\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises\",\"datePublished\":\"2026-01-12T08:00:00+00:00\",\"dateModified\":\"2026-02-09T09:03:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\"},\"wordCount\":1106,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Innovation\",\"Transformation\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\",\"name\":\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg\",\"datePublished\":\"2026-01-12T08:00:00+00:00\",\"dateModified\":\"2026-02-09T09:03:47+00:00\",\"description\":\"L\u2019IAM, pilier strat\u00e9gique face aux cybermenaces, am\u00e9liore s\u00e9curit\u00e9, agilit\u00e9 et exp\u00e9rience digitale. D\u00e9couvrez pourquoi il est essentiel.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg\",\"width\":1200,\"height\":900},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa\",\"name\":\"Tarek Edde Gomez\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/author\/tarekgomez\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises - Capgemini France","description":"L\u2019IAM, pilier strat\u00e9gique face aux cybermenaces, am\u00e9liore s\u00e9curit\u00e9, agilit\u00e9 et exp\u00e9rience digitale. D\u00e9couvrez pourquoi il est essentiel.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/","og_locale":"fr_FR","og_type":"article","og_title":"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises","og_description":"L\u2019IAM, pilier strat\u00e9gique face aux cybermenaces, am\u00e9liore s\u00e9curit\u00e9, agilit\u00e9 et exp\u00e9rience digitale. D\u00e9couvrez pourquoi il est essentiel.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/","og_site_name":"Capgemini France","article_published_time":"2026-01-12T08:00:00+00:00","article_modified_time":"2026-02-09T09:03:47+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-Cyber-Webpreview-1.jpg","type":"image\/jpeg"}],"author":"S\u00e9bastien Baule","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tarek Edde Gomez","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/"},"author":{"name":"Tarek Edde Gomez","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa"},"headline":"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises","datePublished":"2026-01-12T08:00:00+00:00","dateModified":"2026-02-09T09:03:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/"},"wordCount":1106,"publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Innovation","Transformation"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/","name":"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg","datePublished":"2026-01-12T08:00:00+00:00","dateModified":"2026-02-09T09:03:47+00:00","description":"L\u2019IAM, pilier strat\u00e9gique face aux cybermenaces, am\u00e9liore s\u00e9curit\u00e9, agilit\u00e9 et exp\u00e9rience digitale. D\u00e9couvrez pourquoi il est essentiel.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg","width":1200,"height":900},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/person\/286d7d6ac3401df4d6874916bd234aaa","name":"Tarek Edde Gomez","url":"https:\/\/www.capgemini.com\/fr-fr\/author\/tarekgomez\/"}]}},"blog_topic_info":[{"id":354,"name":"Cybers\u00e9curit\u00e9"}],"taxonomy_info":{"category":[{"id":3,"name":"Innovation","slug":"innovation"},{"id":138,"name":"Transformation","slug":"transformation"}],"post_tag":[{"id":192,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}],"brand":[{"id":30,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":47,"name":"Cybersecurit\u00e9","slug":"cybersecurite"}],"blog-topic":[{"id":354,"name":"Cybers\u00e9curit\u00e9","slug":"cybersecurite"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg"},"articleSection":"Innovation","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2026-01-12T08:00:00Z","datePublished":"2026-01-12T08:00:00Z","dateModified":"2026-02-09T09:03:47Z"},"rendered":"<meta name=\"parsely-title\" content=\"IAM, le cha\u00eenon manquant de la cybers\u00e9curit\u00e9 strat\u00e9gique des entreprises\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-iam-le-chainon-manquant-de-la-cybersecurite-strategique-des-entreprises\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2026-01-12T08:00:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Innovation\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":779182,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-csma-avenir-des-strategies-zero-trust\/","url_meta":{"origin":800805,"position":0},"title":"Cybersecurity Mesh Architecture : l&#8217;avenir des strat\u00e9gies Zero Trust ?\u00a0","author":"Tarek Edde Gomez","date":"April 30, 2025","format":false,"excerpt":"La CSMA est comme un filet qui viendrait relier l\u2019ensemble des outils de s\u00e9curit\u00e9 d\u2019une organisation, leur permettant de communiquer entre eux.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/GettyImages-Zero-Trust-CSMA.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/GettyImages-Zero-Trust-CSMA.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/GettyImages-Zero-Trust-CSMA.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/GettyImages-Zero-Trust-CSMA.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":713145,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-et-cloud-de-confiance-un-mariage-de-raison\/","url_meta":{"origin":800805,"position":1},"title":"Cybers\u00e9curit\u00e9 et cloud de confiance, un mariage de raison","author":"","date":"March 9, 2023","format":false,"excerpt":"Lorsqu\u2019une entreprise ou une institution envisage de s\u2019appuyer sur un cloud de confiance, c\u2019est \u00e0 priori parce qu\u2019elle manipule des donn\u00e9es sensibles et qu\u2019elle ne souhaite pas les voir \u00e9chapper \u00e0 son contr\u00f4le. Il peut s\u2019agir de donn\u00e9es personnelles, bancaires ou de sant\u00e9, de propri\u00e9t\u00e9 intellectuelle, ou encore de documents\u2026","rel":"","context":"In &quot;Technologies&quot;","block_context":{"text":"Technologies","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/03\/GettyImages-1434678850.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":744171,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite\/","url_meta":{"origin":800805,"position":2},"title":"Cloud et cybers\u00e9curit\u00e9 : un pas de deux vers la maturit\u00e9","author":"anne.gautier@capgemini.com","date":"March 7, 2024","format":false,"excerpt":"Une d\u00e9marche conjointe et indissociable afin de r\u00e9pondre aux besoins d'adaptation face \u00e0 l'\u00e9volution rapide des menaces et des technologies.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/03\/Blog-Cloud-et-cybersecurite-un-pas-de-deux-vers-la-maturite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":769739,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-zero-trust-la-recette-de-la-securite-des-applications-dans-le-cloud\/","url_meta":{"origin":800805,"position":3},"title":"La s\u00e9curit\u00e9 des applications dans le cloud","author":"Tarek Edde Gomez","date":"November 27, 2024","format":false,"excerpt":"La migration vers le cloud exige une s\u00e9curit\u00e9 renforc\u00e9e avec une approche comme le mod\u00e8le Zero Trust pour v\u00e9rifier chaque acc\u00e8s et prot\u00e9ger les donn\u00e9es.","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/11\/Blog-Cloud-Cyber-La-securite-des-applications-dans-le-cloud.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":734836,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/securiser-5g-pour-cybersecuriser-lindustrie\/","url_meta":{"origin":800805,"position":4},"title":"S\u00e9curiser la 5G pour cybers\u00e9curiser l&#8217;industrie","author":"","date":"November 30, 2023","format":false,"excerpt":"Avec ses niveaux de performances sans pr\u00e9c\u00e9dent (d\u00e9bit, latence, volumes de connexions\u2026), ses innovations fonctionnelles (slicing, edge computing\u2026) et la convergence qu\u2019elle op\u00e8re entre le num\u00e9rique (IT), l\u2019informatique industrielle (OT) et les technologies r\u00e9seaux (NT), la 5G ouvre en effet des possibilit\u00e9s immenses dans des domaines tels que la production,\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/11\/GettyImages-200365125-001-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":754478,"url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cloud-et-cybersecurite-migrations-et-gouvernance-de-la-securite\/","url_meta":{"origin":800805,"position":5},"title":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9","author":"anne.gautier@capgemini.com","date":"June 13, 2024","format":false,"excerpt":"Migrations cloud et gouvernance de la s\u00e9curit\u00e9Louis-Xavier Haensler13 juin 2024 FacebookLinkedinBien que cela soit rarement la motivation premi\u00e8re, une migration vers le cloud pr\u00e9sente de nombreux avantages en mati\u00e8re de s\u00e9curit\u00e9. En effet, basculer vers le cloud, c\u2019est b\u00e9n\u00e9ficier d\u2019une infrastructure plus r\u00e9siliente et plus r\u00e9sistante, de l\u2019application imm\u00e9diate des\u2026","rel":"","context":"In &quot;Innovation&quot;","block_context":{"text":"Innovation","link":"https:\/\/www.capgemini.com\/fr-fr\/category\/innovation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/Blog-Cloud-Cybersecurite-Migrations-cloud-et-gouvernance-de-la-securite.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/IAM-cyber.jpg","author_title":"S\u00e9bastien Baule","author_thumbnail_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2026\/01\/Sebastien-Baule.jpg?w=705","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/800805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/12386"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=800805"}],"version-history":[{"count":20,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/800805\/revisions"}],"predecessor-version":[{"id":801332,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/posts\/800805\/revisions\/801332"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/800903"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=800805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=800805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=800805"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=800805"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=800805"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=800805"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=800805"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/blog-topic?post=800805"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=800805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}