{"id":696236,"date":"2022-09-19T14:28:30","date_gmt":"2022-09-19T12:28:30","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?post_type=research-and-insight&#038;p=696236"},"modified":"2026-01-07T14:06:33","modified_gmt":"2026-01-07T13:06:33","slug":"securite-numerique-et-informatique-quantique","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/","title":{"rendered":"S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable is-style-blue-line header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:52% 61%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Cybers\u00e9curit\u00e9 &amp; Quantique<\/span><\/div><\/div><div class=\"brandInfo\"><div class=\"brandLogo\"><img decoding=\"async\" loading=\"lazy\" src=\"\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-invent-white.svg\" alt=\"capgemini-invent\" class=\"dark\"\/><img decoding=\"async\" loading=\"lazy\" src=\"\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-invent.svg\" alt=\"capgemini-invent\" class=\"light\"\/><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale<\/h1><\/div><div class=\"inner-row-insight download-btn\"><div class=\"col-md-4 downloadFiles addPadding\"><a class=\"button-download--small\" type=\"download\" href=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Capgemini-Invent_POV_securite-numerique-informatique-quantique.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><span>Point de vue<\/span><span class=\"type\">2 MB pdf<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined is-style-default section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">L\u2019ensemble de nos actions en ligne est r\u00e9gi par un ensemble de r\u00e8gles cryptographiques permettant les \u00e9changes s\u00e9curis\u00e9s entre les diff\u00e9rentes parties.<\/h2><p class=\"intro-para-content\">Alors que nous attendons impatiemment l\u2019\u00e9mergence de l\u2019application des technologies quantiques, porteuses de progr\u00e8s technologiques majeurs, Internet se pr\u00e9pare pour le jour o\u00f9 les ordinateurs quantiques seront capables de d\u00e9crypter nos communications s\u00e9curis\u00e9es, appel\u00e9 par certains le Q-Day\u00a0; une nouvelle menace se profile certainement sur nos donn\u00e9es.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Capgemini-Invent_POV_securite-numerique-informatique-quantique.pdf\"><img loading=\"lazy\" decoding=\"async\" width=\"394\" height=\"555\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/couverture-pov-cyber-quantique.png\" alt=\"\" class=\"wp-image-696265\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/couverture-pov-cyber-quantique.png 394w, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/couverture-pov-cyber-quantique.png?resize=213,300 213w\" sizes=\"auto, (max-width: 394px) 100vw, 394px\" \/><\/a><\/figure>\n\n\n\n<p>Et alors que le hardware quantique n\u2019est pas encore suffisamment mature pour d\u00e9crypter les algorithmes utilis\u00e9s, nos donn\u00e9es sont d\u00e9j\u00e0 \u00e0 risque des hackers qui accumulent des donn\u00e9es crypt\u00e9es afin de les d\u00e9crypter dans le futur. Comment alors se pr\u00e9parer \u00e0 cette \u00e9ventualit\u00e9 et comment cette menace a, d\u00e8s aujourd\u2019hui, chang\u00e9 la fa\u00e7on dont nous r\u00e9fl\u00e9chissons cette relation entre cybers\u00e9curit\u00e9 et informatique quantique ?<br><br>L\u2019informatique quantique est une \u00e9volution technologique scientifique. A l\u2019inverse, la s\u00e9curit\u00e9 num\u00e9rique est un concept : par essence, elle peut \u00eatre interpr\u00e9t\u00e9e diff\u00e9remment en fonction de ses usages, parfois concurrents. Explorer la relation entre l\u2019informatique quantique et la s\u00e9curit\u00e9 num\u00e9rique peut donc g\u00e9n\u00e9rer des discours paradoxaux :<br>Le paradoxe du progr\u00e8s quantique : menace ou opportunit\u00e9 pour la s\u00e9curit\u00e9 ?<br>Le paradoxe de la recherche quantique : attendre trop longtemps ou agir trop rapidement ?<br>Le paradoxe g\u00e9opolitique : un enjeu universel ou une question de souverainet\u00e9 ?<br><\/p>\n\n\n\n<p>Pour en savoir plus sur la cybers\u00e9curit\u00e9 et le quantique, t\u00e9l\u00e9chargez le point de vue r\u00e9dig\u00e9 par les experts de Capgemini Invent.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Capgemini-Invent_POV_securite-numerique-informatique-quantique.pdf\">T\u00e9l\u00e9charger le point de vue<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Quantique et Cybers\u00e9curit\u00e9<\/h3><div class=\"video-info\"><p data-maxlength=\"68\">D\u00e9couvrez toutes les opportunit\u00e9s qu&#8217;offre le quantique<\/p><\/div><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/9sTtBOGskO8?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Auteurs<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Heure-Jeanne_New.jpg\" alt=\"Jeanne Heur\u00e9\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/bit.ly\/3QNheOE\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Jeanne Heur\u00e9<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directrice Confiance et S\u00e9curit\u00e9 Num\u00e9rique, Capgemini Invent France<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/bit.ly\/3QNheOE\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Jeanne Heur\u00e9 porte le d\u00e9partement de Confiance et s\u00e9curit\u00e9 num\u00e9rique de Capgemini Invent pour accompagner les dirigeants dans leur strat\u00e9gie et transformations cyber. Issue des sciences politiques et Affaires europ\u00e9ennes, elle a d\u2019abord abord\u00e9 ces sujets sous l\u2019angle des enjeux nationaux\/internationaux de s\u00e9curit\u00e9 num\u00e9rique \u2013 c\u2019est ce qui a toujours donn\u00e9 du sens a son activit\u00e9. Membre du Board Cyber Capgemini France et coordinatrice du d\u00e9veloppement des \u00e9quipes cyber Capgemini Invent \u00e0 l\u2019international, elle intervient dans tous les secteurs march\u00e9 sur ses sujets de pr\u00e9dilection : pilotage &#038; performance de la s\u00e9curit\u00e9 num\u00e9rique \u2013 Offres de services cyber &#038; relations IT\/m\u00e9tiers \u2013 Programmes de transformation cyber complexes \u2013 Cyber-r\u00e9silience \u2013 Cyber4good<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/04\/ELT_4297-Edit-2-identie\u0301.jpeg\" alt=\"Nicolas Gaudilli\u00e8re\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/nicolasgaudilliere\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Nicolas Gaudilli\u00e8re<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Chief Technology Officer, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/nicolasgaudilliere\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Ing\u00e9nieur CentraleSupelec, Nicolas a d\u00e9marr\u00e9 sa carri\u00e8re dans les ann\u00e9es 2000. Tout d\u2019abord consultant en cybers\u00e9curit\u00e9 puis pour accompagner la mise en place de plateformes de services Cloud aupr\u00e8s des op\u00e9rateurs telcos et grands int\u00e9grateurs. En 2015, il rejoint Capgemini Invent en tant que CTO afin de se concentrer sur les transformations organisationnelles et humaines n\u00e9cessaire \u00e0 l\u2019adoption des nombreuses innovations technologiques telles que l\u2019IoT, le cloud,\u00a0 l\u2019IA, la blockchain, la 5G, le quantique.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2023\/07\/Design-sans-titre-4.png\" alt=\"Cl\u00e9ment Brauner\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/bit.ly\/3eYWLJa\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Cl\u00e9ment Brauner<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Quantum Computing Lead, Capgemini Invent<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/bit.ly\/3eYWLJa\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Cl\u00e9ment est un manager chez Capgemini Invent. Passionn\u00e9 de technologie, il travaille aujourd\u2019hui en tant que SPOC des activit\u00e9s quantiques en France et est membre du \u00ab Capgemini Quantum Lab \u00bb qui a pour but d\u2019aider ses clients \u00e0 monter en comp\u00e9tence sur les technologies quantiques, d\u2019explorer les cas d\u2019usages pertinents et de les accompagner dans leurs exp\u00e9rimentations et leurs partenariats.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Curseur pr\u00e9c\u00e9dent\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Curseur suivant\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019ensemble de nos actions en ligne est r\u00e9gi par un ensemble de r\u00e8gles cryptographiques permettant les \u00e9changes s\u00e9curis\u00e9s entre les diff\u00e9rentes parties. Alors que nous attendons impatiemment l\u2019\u00e9mergence de l\u2019application des technologies quantiques, porteuses de progr\u00e8s technologiques majeurs, Internet se pr\u00e9pare pour le jour o\u00f9 les ordinateurs quantiques seront capables de d\u00e9crypter nos communications s\u00e9curis\u00e9es, appel\u00e9 par certains le Q-Day ; une nouvelle menace se profile certainement sur nos donn\u00e9es.<\/p>\n","protected":false},"author":201,"featured_media":696262,"template":"","meta":{"cg_dt_proposed_to":[21],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"e24c5106-041a-4dee-ae19-d41bd2faef41\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":48,"primary_term":"","featured_focal_points":""},"tags":[192],"research-and-insight-type":[85],"theme":[48,55],"brand":[31],"service":[47],"industry":[],"partners":[],"content-group":[],"class_list":["post-696236","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry","tag-cybersecurite","research-and-insight-type-points-de-vue","theme-cybersecurite","theme-innovation-et-technologies","brand-capgemini-invent","service-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale - Capgemini France<\/title>\n<meta name=\"description\" content=\"L\u2019ensemble de nos actions en ligne est r\u00e9gi par un ensemble de r\u00e8gles cryptographiques permettant les \u00e9changes s\u00e9curis\u00e9s entre les diff\u00e9rentes parties. Alors que nous attendons impatiemment l\u2019\u00e9mergence de l\u2019application des technologies quantiques, porteuses de progr\u00e8s technologiques majeurs, Internet se pr\u00e9pare pour le jour o\u00f9 les ordinateurs quantiques seront capables de d\u00e9crypter nos communications s\u00e9curis\u00e9es, appel\u00e9 par certains le Q-Day ; une nouvelle menace se profile certainement sur nos donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale\" \/>\n<meta property=\"og:description\" content=\"L\u2019ensemble de nos actions en ligne est r\u00e9gi par un ensemble de r\u00e8gles cryptographiques permettant les \u00e9changes s\u00e9curis\u00e9s entre les diff\u00e9rentes parties. Alors que nous attendons impatiemment l\u2019\u00e9mergence de l\u2019application des technologies quantiques, porteuses de progr\u00e8s technologiques majeurs, Internet se pr\u00e9pare pour le jour o\u00f9 les ordinateurs quantiques seront capables de d\u00e9crypter nos communications s\u00e9curis\u00e9es, appel\u00e9 par certains le Q-Day ; une nouvelle menace se profile certainement sur nos donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-07T13:06:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Invent_Article-securite-quantique_Webpreview.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1313\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/\",\"name\":\"S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg\",\"datePublished\":\"2022-09-19T12:28:30+00:00\",\"dateModified\":\"2026-01-07T13:06:33+00:00\",\"description\":\"L\u2019ensemble de nos actions en ligne est r\u00e9gi par un ensemble de r\u00e8gles cryptographiques permettant les \u00e9changes s\u00e9curis\u00e9s entre les diff\u00e9rentes parties. Alors que nous attendons impatiemment l\u2019\u00e9mergence de l\u2019application des technologies quantiques, porteuses de progr\u00e8s technologiques majeurs, Internet se pr\u00e9pare pour le jour o\u00f9 les ordinateurs quantiques seront capables de d\u00e9crypter nos communications s\u00e9curis\u00e9es, appel\u00e9 par certains le Q-Day ; une nouvelle menace se profile certainement sur nos donn\u00e9es.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg\",\"width\":4900,\"height\":2756,\"caption\":\"quantum computer\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/fr-fr\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale - Capgemini France","description":"L\u2019ensemble de nos actions en ligne est r\u00e9gi par un ensemble de r\u00e8gles cryptographiques permettant les \u00e9changes s\u00e9curis\u00e9s entre les diff\u00e9rentes parties. Alors que nous attendons impatiemment l\u2019\u00e9mergence de l\u2019application des technologies quantiques, porteuses de progr\u00e8s technologiques majeurs, Internet se pr\u00e9pare pour le jour o\u00f9 les ordinateurs quantiques seront capables de d\u00e9crypter nos communications s\u00e9curis\u00e9es, appel\u00e9 par certains le Q-Day ; une nouvelle menace se profile certainement sur nos donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale","og_description":"L\u2019ensemble de nos actions en ligne est r\u00e9gi par un ensemble de r\u00e8gles cryptographiques permettant les \u00e9changes s\u00e9curis\u00e9s entre les diff\u00e9rentes parties. Alors que nous attendons impatiemment l\u2019\u00e9mergence de l\u2019application des technologies quantiques, porteuses de progr\u00e8s technologiques majeurs, Internet se pr\u00e9pare pour le jour o\u00f9 les ordinateurs quantiques seront capables de d\u00e9crypter nos communications s\u00e9curis\u00e9es, appel\u00e9 par certains le Q-Day ; une nouvelle menace se profile certainement sur nos donn\u00e9es.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/","og_site_name":"Capgemini France","article_modified_time":"2026-01-07T13:06:33+00:00","og_image":[{"width":2500,"height":1313,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Invent_Article-securite-quantique_Webpreview.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/","name":"S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg","datePublished":"2022-09-19T12:28:30+00:00","dateModified":"2026-01-07T13:06:33+00:00","description":"L\u2019ensemble de nos actions en ligne est r\u00e9gi par un ensemble de r\u00e8gles cryptographiques permettant les \u00e9changes s\u00e9curis\u00e9s entre les diff\u00e9rentes parties. Alors que nous attendons impatiemment l\u2019\u00e9mergence de l\u2019application des technologies quantiques, porteuses de progr\u00e8s technologiques majeurs, Internet se pr\u00e9pare pour le jour o\u00f9 les ordinateurs quantiques seront capables de d\u00e9crypter nos communications s\u00e9curis\u00e9es, appel\u00e9 par certains le Q-Day ; une nouvelle menace se profile certainement sur nos donn\u00e9es.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg","width":4900,"height":2756,"caption":"quantum computer"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/fr-fr\/research-and-insight\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}}]}},"theme_term_info":[{"id":48,"name":"Cybers\u00e9curit\u00e9"},{"id":55,"name":"Innovation &amp; technologies"}],"industry_term_info":[],"services_term_info":[{"id":47,"name":"Cybersecurit\u00e9"}],"partners_term_info":[],"brand_term_info":[{"id":31,"name":"Capgemini Invent","slug":"capgemini-invent"}],"brand_term":[{"id":31,"slug":"capgemini-invent"}],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2022-09-19T12:28:30Z","datePublished":"2022-09-19T12:28:30Z","dateModified":"2026-01-07T13:06:33Z"},"rendered":"<meta name=\"parsely-title\" content=\"S\u00e9curite num\u00e9rique et informatique quantique : une relation essentiellement paradoxale\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/securite-numerique-et-informatique-quantique\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2022-09-19T12:28:30Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"tag_names":["Cybers\u00e9curit\u00e9"],"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/GettyImages-1393513175.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/research-and-insight\/696236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/201"}],"version-history":[{"count":20,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/research-and-insight\/696236\/revisions"}],"predecessor-version":[{"id":799943,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/research-and-insight\/696236\/revisions\/799943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/696262"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=696236"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=696236"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/research-and-insight-type?post=696236"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/theme?post=696236"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=696236"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=696236"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=696236"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=696236"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=696236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}