{"id":780529,"date":"2025-05-12T14:00:35","date_gmt":"2025-05-12T12:00:35","guid":{"rendered":"https:\/\/www.capgemini.com\/fr-fr\/?post_type=research-and-insight&#038;p=780529"},"modified":"2025-06-24T18:19:31","modified_gmt":"2025-06-24T16:19:31","slug":"nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/","title":{"rendered":"NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Cybers\u00e9curit\u00e9<\/span><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9<\/h1><\/div><div class=\"inner-row-insight download-btn\"><div class=\"col-md-4 downloadFiles addPadding\"><a class=\"button-download--small\" type=\"download\" href=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Capgemini-LivreBlanc-NIS2DORA.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><span>T\u00e9l\u00e9charger le livre blanc<\/span><span class=\"type\">5 MB  pdf<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/fr-fr\/?post_type=research-and-insight&amp;p=756802\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/fr-fr\/?post_type=research-and-insight&amp;p=756802\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Ouvrir dans une nouvelle fen\u00eatre\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-les-reglementations-dora-et-nis-2-marquent-un-tournant-majeur-dans-la-perception-de-la-securite-numerique-en-europe-nbsp-l-aboutissement-d-un-long-processus-de-maturation-qui-a-vu-la-securite-informatique-devenir-la-cybersecurite-puis-la-resilience-numerique-et-enfin-aujourd-hui-la-pierre-angulaire-de-la-resilience-operationnelle\">Les r\u00e9glementations DORA et NIS 2 marquent un tournant majeur dans la perception de la s\u00e9curit\u00e9 num\u00e9rique en Europe&nbsp;: l\u2019aboutissement d\u2019un long processus de maturation qui a vu la s\u00e9curit\u00e9 informatique devenir la cybers\u00e9curit\u00e9, puis la r\u00e9silience num\u00e9rique, et enfin, aujourd\u2019hui, la pierre angulaire de la r\u00e9silience op\u00e9rationnelle.<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Lorsqu\u2019elles en adoptent la philosophie, les organisations font bien plus que respecter une obligation r\u00e9glementaire : elles investissent pour s\u00e9curiser durablement la valeur qu\u2019elles cr\u00e9ent.<\/p>\n\n\n\n<p>Ce livret consacr\u00e9 aux r\u00e8glementations NIS 2 (Network and Information Systems) et DORA (Digital Operational Resilience Act) rassemble une s\u00e9rie d\u2019articles pr\u00e9c\u00e9demment publi\u00e9s mais r\u00e9cemment enrichis par nos experts afin de fournir une analyse approfondie et la plus \u00e0 jour possible. \u00c0 travers ces contributions, nous esp\u00e9rons offrir des \u00e9clairages pr\u00e9cieux et des conseils pratiques pour naviguer dans le paysage r\u00e9glementaire complexe de la cybers\u00e9curit\u00e9. Que vous soyez un professionnel de la s\u00e9curit\u00e9 informatique, un responsable de la conformit\u00e9 ou un d\u00e9cideur strat\u00e9gique, ce livret vous aidera \u00e0 renforcer la r\u00e9silience op\u00e9rationnelle de votre organisation.&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-style-default\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/LivreBlanc-NIS2DORA.pdf\"><img loading=\"lazy\" decoding=\"async\" width=\"3000\" height=\"2100\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Mockup-NIS2-DORA_V1.jpg\" alt=\"\" class=\"wp-image-782096\" srcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Mockup-NIS2-DORA_V1.jpg 3000w, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Mockup-NIS2-DORA_V1.jpg?resize=300,210 300w, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Mockup-NIS2-DORA_V1.jpg?resize=768,538 768w, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Mockup-NIS2-DORA_V1.jpg?resize=1024,717 1024w, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Mockup-NIS2-DORA_V1.jpg?resize=1536,1075 1536w, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Mockup-NIS2-DORA_V1.jpg?resize=2048,1434 2048w\" sizes=\"auto, (max-width: 3000px) 100vw, 3000px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Capgemini-LivreBlanc-NIS2DORA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">T\u00e9l\u00e9charger le livre blanc<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n\t\t<section\n\t\t\tclass=\"section section--lifeatcap-learning section--event-slider-careerInvent \">\n\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class='career-invent-header'>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t<div class=\"heading col-12 col-md-8\">\n\t\t\t\t\t\t\t\t<h2>Renforcez la r\u00e9silience op\u00e9rationnelle de votre organisation<\/h2>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"slider slider-fader 374711dd-c396-4798-9256-dcd35eb9a763\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\tclass=\"slider-list \">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"slide active \">\n\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\tclass=\"slide-bg-wrapper wp-block-cg-blocks-career-invent is-style-sapphire2\">\n\t\t\t\t\t\t\t\t<div class=\"bgImagesection\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"col-md-6 col-sm-12 box-inner \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"bgColor\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"explore-header\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdata-maxlength=\"68\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Cybers\u00e9curit\u00e9, une responsabilit\u00e9 partag\u00e9e\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCybers\u00e9curit\u00e9, une responsabilit\u00e9 partag\u00e9e\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tclass=\"box-title \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 data-maxlength=\"144\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Les entreprises adoptent les r\u00e8glementations NIS 2 et DORA pour renforcer la cybers\u00e9curit\u00e9 et prot\u00e9ger leurs syst\u00e8mes critiques.\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"white-space: pre-wrap;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tLes entreprises adoptent les r\u00e8glementations NIS 2 et DORA pour renforcer la cybers\u00e9curit\u00e9 et prot\u00e9ger leurs syst\u00e8mes critiques.\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\"> <a class=\"more2\" data-maxlength=\"24\" aria-label=\"T\u00e9l\u00e9charger le livre blanc A propos Cybers\u00e9curit\u00e9, une responsabilit\u00e9 partag\u00e9e\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttitle=\"Opens in new window\" tabindex=\"0\" href=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Capgemini-LivreBlanc-NIS2DORA.pdf\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tT\u00e9l\u00e9charger le livre blanc\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a> <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-sm-12 text-right box-img-wrapper escaper escaper-right\">\n\t\t\t\t\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Screen-Cloud-de-Confiance-Benefices.jpg?w=1200&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Screen-Cloud-de-Confiance-Benefices.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Screen-Cloud-de-Confiance-Benefices.jpg?w=600&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Screen-Cloud-de-Confiance-Benefices.jpg?w=1200&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Screen-Cloud-de-Confiance-Benefices.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Screen-Cloud-de-Confiance-Benefices.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<source\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrcset=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Screen-Cloud-de-Confiance-Benefices.jpg?w=400&amp;quality=90 1x, https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Screen-Cloud-de-Confiance-Benefices.jpg?w=800&amp;quality=90 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\" \/>\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" class=\"box-img\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Screen-Cloud-de-Confiance-Benefices.jpg\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tobject-position: 48% 42%; object-fit: cover;\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\" \/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"box-img\" src=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\n\t\t\t\t\t\t\t\t\t\t\tstyle=\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\" alt=\"\"\n\t\t\t\t\t\t\t\t\t\t\/> -->\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/section>\n\n\t\t\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Nos experts<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Vincent-Laurens.png\" alt=\"Vincent Laurens\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Vincent Laurens<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directeur du d\u00e9veloppement Cyber pour la r\u00e9gion Europe du Sud, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/www.linkedin.com\/in\/vincent-laurens-90b6195\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Vincent a d\u00e9but\u00e9 sa carri\u00e8re en s\u00e9curit\u00e9 informatique dans les ann\u00e9es 90, travaillant avec diverses organisations, y compris des services de renseignement et des industries sp\u00e9cialis\u00e9es. En 2013, Vincent a rejoint Sogeti au Luxembourg, puis est devenu vice-pr\u00e9sident mondial de la cybers\u00e9curit\u00e9 en 2018. Depuis 2022, Vincent est vice-pr\u00e9sident et strat\u00e8ge mondial de la s\u00e9curit\u00e9 chez Devo, et en 2024, il a rejoint Capgemini pour diriger la cybers\u00e9curit\u00e9 dans la r\u00e9gion SCE. Depuis 2019, il est \u00e9galement administrateur non ex\u00e9cutif pour plusieurs start-ups technologiques et conseille des dirigeants et des conseils d&#8217;administration en cybers\u00e9curit\u00e9.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\n\n\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/09\/Heure-Jeanne_New.jpg\" alt=\"Jeanne Heur\u00e9\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/bit.ly\/3QNheOE\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Jeanne Heur\u00e9<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Directrice Confiance et S\u00e9curit\u00e9 Num\u00e9rique, Capgemini Invent France<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" href=\"https:\/\/bit.ly\/3QNheOE\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Jeanne Heur\u00e9 porte le d\u00e9partement de Confiance et s\u00e9curit\u00e9 num\u00e9rique de Capgemini Invent pour accompagner les dirigeants dans leur strat\u00e9gie et transformations cyber. Issue des sciences politiques et Affaires europ\u00e9ennes, elle a d\u2019abord abord\u00e9 ces sujets sous l\u2019angle des enjeux nationaux\/internationaux de s\u00e9curit\u00e9 num\u00e9rique \u2013 c\u2019est ce qui a toujours donn\u00e9 du sens a son activit\u00e9. Membre du Board Cyber Capgemini France et coordinatrice du d\u00e9veloppement des \u00e9quipes cyber Capgemini Invent \u00e0 l\u2019international, elle intervient dans tous les secteurs march\u00e9 sur ses sujets de pr\u00e9dilection : pilotage &#038; performance de la s\u00e9curit\u00e9 num\u00e9rique \u2013 Offres de services cyber &#038; relations IT\/m\u00e9tiers \u2013 Programmes de transformation cyber complexes \u2013 Cyber-r\u00e9silience \u2013 Cyber4good<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Poursuivez votre lecture avec ces articles de blog<\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\" aria-label=\"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"NSI 2_DORA_refletlunettes_Gettyimages\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/GettyImages-1469706273.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-nis-2-dora-une-incitation-a-la-modernisation\/\" aria-label=\"NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?\"><h3 class=\"expert-subtitle\">NIS 2, DORA\u00a0: une incitation \u00e0 la modernisation\u00a0?<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">mars 20, 2025<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\" aria-label=\"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/03\/Blog-cyber-Dora-pour-une-gestion-de-crise-plsu-structuree.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 49%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-pour-une-gestion-de-crise-plus-structuree\/\" aria-label=\"\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0\"><h3 class=\"expert-subtitle\">\u00a0DORA\u202f: pour une gestion de crise plus structur\u00e9e\u00a0<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">mars 13, 2025<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\" aria-label=\"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/06\/GettyImages-1186089388.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybers\u00e9curit\u00e9<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/blog\/cybersecurite-dora-modele-maturite-tests\/\" aria-label=\"DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9\"><h3 class=\"expert-subtitle\">DORA, un mod\u00e8le de maturit\u00e9 pour les tests de cybers\u00e9curit\u00e9<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"light\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-blue.svg\" \/><img decoding=\"async\" class=\"dark\" loading=\"lazy\" alt=\"Capgemini\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/themes\/capgemini2025\/assets\/images\/cg-logo-white.svg\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Capgemini<\/div><div class=\"date-text\">juil. 2, 2024<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\t<section class=\"wp-block-cg-blocks-wrapper-learning-slider section learning-slider\">\n\t\t<div class=\"container\">\n\t\t\t<div class=\"learning-header\">\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\t<div class=\"slider slider-fader\">\n\t\t\t\t<div class=\"slider-list\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"slide active card-learning-slide right-card short-copy\" data-align-right=\"false\" data-long-copy=\"false\">\n\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t\t<div class=\"slide-bg-wrapper\">\n\n                                        \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n                                            \n                                            \n                                            \n                                            <img decoding=\"async\" loading=\"lazy\" class=\"slide-bg d-md-block\" src=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2024\/07\/Capgemini_WebsiteBanner-CYBER.jpg\" alt=\"\" style=\"object-position: 50% 50%;object-fit: cover\" \/>\n                                        \n\n                  \t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"slide-reveal\"><\/div>\n\n\t\t\t\t\t\t\t\t\t\t<div class=\"container slide-info-wrapper card-learning-slider\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-10 col-xl-6 col-xxl-6 right-card\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"slide-info short-copy\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"title-link\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/objectif-cyber\/\" target=\"\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"title-text\" data-maxlength=\"88\">Objectif Cyber<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p data-maxlength=\"330\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tL\u2019\u00e9mission du podcast Objectif Tech qui qui d\u00e9crypte toutes les facettes de la cybers\u00e9curit\u00e9.\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-bottom\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-12 col-md-6\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"slide-info-footer\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"brand-logo-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-12 col-md-6\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"btnDiv\">\t<a class=\"more2\" aria-label=\"En savoir plus A propos Objectif Cyber\" href=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/podcast-objectif-tech\/objectif-cyber\/\" target=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tEn savoir plus\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t         \t\t\t<\/div>\n\n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"slider-nav-wrapper container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"slider-nav-content col-12 col-lg-10 col-xl-6 col-xxl-6\" data-nav-content>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"slide-nav-container\">\n                                                                                                            <\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t<\/section>\n\n\t\n\n\n<section class=\"wp-block-cg-blocks-call-to-action undefined call-to-action-block is-style-cg-secondary-2\"><div class=\"container\"><div class=\"call-to-action-block-content-wrapper has-description\"><div class=\"text-wrapper has-description\"><h3 class=\"title\" data-maxlength=\"144\">T\u00e9l\u00e9chargez le livre blanc<\/h3><p class=\"description\" data-maxlength=\"210\">Et naviguez dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9<\/p><\/div><div class=\"button-wrapper has-description\"><a class=\" cta-btn action-valid\" href=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/05\/Capgemini-LivreBlanc-NIS2DORA.pdf\" target=\"\" rel=\"noopener noreferrer\" aria-label=\"T\u00e9l\u00e9charger A propos T\u00e9l\u00e9chargez le livre blanc\" title=\"Ouvrir dans une nouvelle fen\u00eatre\" data-maxlength=\"24\" tabindex=\"0\"> T\u00e9l\u00e9charger <\/a><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Les r\u00e9glementations DORA et NIS 2 marquent un tournant majeur dans la perception de la s\u00e9curit\u00e9 num\u00e9rique en Europe et, par cons\u00e9quent, dans la fa\u00e7on de l\u2019aborder.<\/p>\n","protected":false},"author":12386,"featured_media":782464,"template":"","meta":{"cg_dt_proposed_to":[21,46,41],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"b3bc2106-6906-4899-bfe3-9c91d835c107\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":false,\"isCrossLink\":false,\"hasCrossLink\":false,\"isEnabled\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":48,"primary_term":"Cybers\u00e9curit\u00e9","featured_focal_points":""},"tags":[192],"research-and-insight-type":[202],"theme":[48],"brand":[],"service":[47],"industry":[],"partners":[],"content-group":[],"class_list":["post-780529","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry","tag-cybersecurite","research-and-insight-type-livre-blanc","theme-cybersecurite","service-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Livre blanc NIS 2 &amp; DORA - Capgemini France<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les r\u00e9glementations NIS 2 et DORA avec ce livre blanc, pour renforcer la r\u00e9silience de votre organisation.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les r\u00e9glementations NIS 2 et DORA avec ce livre blanc, pour renforcer la r\u00e9silience de votre organisation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini France\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T16:19:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/image-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/\",\"name\":\"Livre blanc NIS 2 & DORA - Capgemini France\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg\",\"datePublished\":\"2025-05-12T12:00:35+00:00\",\"dateModified\":\"2025-06-24T16:19:31+00:00\",\"description\":\"D\u00e9couvrez les r\u00e9glementations NIS 2 et DORA avec ce livre blanc, pour renforcer la r\u00e9silience de votre organisation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg\",\"width\":6000,\"height\":3750},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/fr-fr\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#website\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"name\":\"Capgemini France\",\"description\":\"Just another www.capgemini.com site\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#organization\",\"name\":\"Capgemini France\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png\",\"width\":202,\"height\":60,\"caption\":\"Capgemini France\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Livre blanc NIS 2 & DORA - Capgemini France","description":"D\u00e9couvrez les r\u00e9glementations NIS 2 et DORA avec ce livre blanc, pour renforcer la r\u00e9silience de votre organisation.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"fr_FR","og_type":"article","og_title":"NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9","og_description":"D\u00e9couvrez les r\u00e9glementations NIS 2 et DORA avec ce livre blanc, pour renforcer la r\u00e9silience de votre organisation.","og_url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/","og_site_name":"Capgemini France","article_modified_time":"2025-06-24T16:19:31+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/10\/image-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/","name":"Livre blanc NIS 2 & DORA - Capgemini France","isPartOf":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg","datePublished":"2025-05-12T12:00:35+00:00","dateModified":"2025-06-24T16:19:31+00:00","description":"D\u00e9couvrez les r\u00e9glementations NIS 2 et DORA avec ce livre blanc, pour renforcer la r\u00e9silience de votre organisation.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/#primaryimage","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg","width":6000,"height":3750},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/fr-fr\/research-and-insight\/"},{"@type":"ListItem","position":2,"name":"NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/fr-fr\/#website","url":"https:\/\/www.capgemini.com\/fr-fr\/","name":"Capgemini France","description":"Just another www.capgemini.com site","publisher":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/fr-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/fr-fr\/#organization","name":"Capgemini France","url":"https:\/\/www.capgemini.com\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","contentUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2022\/08\/Logo-Capgemini.png","width":202,"height":60,"caption":"Capgemini France"},"image":{"@id":"https:\/\/www.capgemini.com\/fr-fr\/#\/schema\/logo\/image\/"}}]}},"theme_term_info":[{"id":48,"name":"Cybers\u00e9curit\u00e9"}],"industry_term_info":[],"services_term_info":[{"id":47,"name":"Cybersecurit\u00e9"}],"partners_term_info":[],"brand_term_info":[],"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9","url":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini France","logo":""},"keywords":["cybers\u00e9curit\u00e9"],"dateCreated":"2025-05-12T12:00:35Z","datePublished":"2025-05-12T12:00:35Z","dateModified":"2025-06-24T16:19:31Z"},"rendered":"<meta name=\"parsely-title\" content=\"NIS 2 &amp; DORA : naviguer dans le nouveau cadre r\u00e9glementaire de la cybers\u00e9curit\u00e9\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/fr-fr\/perspectives\/publications\/nis-2-dora-naviguer-dans-le-nouveau-cadre-reglementaire-de-la-cybersecurite\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2025-05-12T12:00:35Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>\n<meta name=\"parsely-tags\" content=\"cybers\u00e9curit\u00e9\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini France","distributor_original_site_url":"https:\/\/www.capgemini.com\/fr-fr","push-errors":false,"tag_names":["Cybers\u00e9curit\u00e9"],"featured_image_url":"https:\/\/www.capgemini.com\/fr-fr\/wp-content\/uploads\/sites\/6\/2025\/04\/Invent_Livret-NIS2-DORA_BanniereWeb.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/research-and-insight\/780529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/users\/12386"}],"version-history":[{"count":20,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/research-and-insight\/780529\/revisions"}],"predecessor-version":[{"id":788028,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/research-and-insight\/780529\/revisions\/788028"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media\/782464"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=780529"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=780529"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/research-and-insight-type?post=780529"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/theme?post=780529"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/brand?post=780529"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/service?post=780529"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/industry?post=780529"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/partners?post=780529"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/fr-fr\/wp-json\/wp\/v2\/content-group?post=780529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}