{"id":16452,"date":"2021-08-23T09:47:26","date_gmt":"2021-08-23T08:47:26","guid":{"rendered":"http:\/\/riskinsight-prepro.s189758.zephyr32.atester.fr\/?page_id=16452"},"modified":"2021-09-16T17:01:10","modified_gmt":"2021-09-16T16:01:10","slug":"about-the-blog","status":"publish","type":"page","link":"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/","title":{"rendered":"About the blog"},"content":{"rendered":"\n<p><strong>RiskInsight<\/strong> is the blog of Wavestone consultants, experts in Cybersecurity &amp; Digital Trust. We share our thoughts, analyses and news about cybersecurity on the following topics: risk, governance, digital identity, digital awareness.<\/p>\n<p>You can also contact us via the <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/contact-us\/\">Contact Us<\/a> form.<\/p>\n<h2>Our expertise<\/h2>\n<p><a href=\"https:\/\/www.wavestone.com\/en\/capabilities\/cybersecurity-digital-trust\/\" target=\"_blank\" rel=\"noopener\">Read more about our Cybersecurity &amp; digital trust offer<\/a><\/p>\n<h2>About Wavestone<\/h2>\n<p><strong>At the convergence of management and digital consulting, Wavestone supports leading organizations in delivering their most critical transformations.<\/strong><\/p>\n<p>In a world where knowing how to drive transformation is the key to success, Wavestone&#8217;s mission is to inform and guide large organizations in their most critical transformations, with the ambition of a positive outcome for all stakeholders. As a true driver of change, we place our energy at the service of our customers&#8217; development, innovation, efficiency and resilience by creating the conditions that make everyone want to act. That\u2019s what we call &#8220;The Positive Way.\u201d<\/p>\n<p>A mindset that drives our 3,000 consultants on a daily basis, and which is driven by our taste for challenge, our ability to imagine new paths and the pleasure of succeeding together.<\/p>\n<p>Wavestone offers its clients a broad palette of expertise of three distinct types:<\/p>\n<ul>\n<li>sector-specific excellence solutions designed to address core business challenges in many different business sectors;<\/li>\n<li>functional excellence used by the firm to address major corporate functions;<\/li>\n<li>strong technological expertise, anchored in Wavestone&#8217;s DNA, that enables the firm to provide an unparalleled range of digital, technology and cybersecurity solutions.<\/li>\n<\/ul>\n<p>In each of these areas, Wavestone contributes an unrivaled depth of expertise. The essence of our value proposition is our ability to combine these skills seamlessly in multidisciplinary teams that cut through the silo-management approach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RiskInsight is the blog of Wavestone consultants, experts in Cybersecurity &amp; Digital Trust. We share our thoughts, analyses and news about cybersecurity on the following topics: risk, governance, digital identity, digital awareness. You can also contact us via the Contact&#8230;<\/p>\n","protected":false},"author":300,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"coauthors":[2545],"class_list":["post-16452","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>About the blog - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About the blog - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"RiskInsight is the blog of Wavestone consultants, experts in Cybersecurity &amp; Digital Trust. We share our thoughts, analyses and news about cybersecurity on the following topics: risk, governance, digital identity, digital awareness. You can also contact us via the Contact...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-16T16:01:10+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"GEneviEveLardon\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/\",\"name\":\"About the blog - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"datePublished\":\"2021-08-23T08:47:26+00:00\",\"dateModified\":\"2021-09-16T16:01:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About the blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"About the blog - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/","og_locale":"en_US","og_type":"article","og_title":"About the blog - RiskInsight","og_description":"RiskInsight is the blog of Wavestone consultants, experts in Cybersecurity &amp; Digital Trust. We share our thoughts, analyses and news about cybersecurity on the following topics: risk, governance, digital identity, digital awareness. You can also contact us via the Contact...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/","og_site_name":"RiskInsight","article_modified_time":"2021-09-16T16:01:10+00:00","twitter_misc":{"Est. reading time":"2 minutes","Written by":"GEneviEveLardon"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/","name":"About the blog - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"datePublished":"2021-08-23T08:47:26+00:00","dateModified":"2021-09-16T16:01:10+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/about-the-blog\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"About the blog"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/pages\/16452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/300"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=16452"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/pages\/16452\/revisions"}],"predecessor-version":[{"id":16828,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/pages\/16452\/revisions\/16828"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=16452"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=16452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}