{"id":10010,"date":"2017-09-22T16:48:05","date_gmt":"2017-09-22T15:48:05","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=10010\/"},"modified":"2019-12-30T13:55:44","modified_gmt":"2019-12-30T12:55:44","slug":"cybersecurite-startup-france-22","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/09\/cybersecurite-startup-france-22\/","title":{"rendered":"Startup cybers\u00e9curit\u00e9 en France, un \u00e9cosyst\u00e8me en pleine explosion (2\/2)"},"content":{"rendered":"<p><em>Apr\u00e8s un <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/09\/cybersecurite-startup-france-11\/\">premier article<\/a> consacr\u00e9 au sujet du radar des start-ups cybers\u00e9curit\u00e9 en France, ce deuxi\u00e8me article porte sur les leviers qui s&#8217;offrent \u00e0 elles pour assurer leur d\u00e9veloppement. Comment se rapprocher des grandes entreprises ? Comment s&#8217;exporter \u00e0 l&#8217;international ? Ce sont l\u00e0 parmi les nombreux d\u00e9fis \u00e0 relever pour nos start-ups<br \/>\n<\/em><\/p>\n<h2>Les grands comptes : des cibles existentielles mais complexes<\/h2>\n<p>Le tissu \u00e9conomique fran\u00e7ais repose beaucoup sur des grands groupes disposant de capacit\u00e9s d\u2019investissement important. Pour les startups cherchant \u00e0 commercialiser leur offre en cybers\u00e9curit\u00e9, ce sont des clients de choix. \u00a0Cependant, les processus rigides et complexes de ces grandes entreprises constituent un obstacle majeur pour les startups.<\/p>\n<p>Apr\u00e8s les emb\u00fbches li\u00e9es \u00e0 l\u2019identification des multiples donneurs d\u2019ordre dans la structure (RSSI, architecte, expert, DSI, achats\u2026), il reste tr\u00e8s difficile de signer son premier contrat. La dur\u00e9e du processus d\u2019achat allant de 3 \u00e0 6 mois et sa complexit\u00e9 ne correspondent pas au fonctionnement des startups, qui se voient demander des preuves de rentabilit\u00e9, un nombre important d\u2019ann\u00e9es d\u2019existence ou des r\u00e9f\u00e9rences d\u2019autres clients, ce qui est impossible lors des premiers contrats.<\/p>\n<p>Cette situation est exacerb\u00e9e pour la cybers\u00e9curit\u00e9 car les startups ne peuvent pas souvent compter sur les p\u00f4les Innovation cr\u00e9\u00e9s par les grands-comptes pour faciliter les \u00e9changes avec l\u2019\u00e9cosyst\u00e8me de l\u2019innovation. D\u2019une part car les startups ont du mal \u00e0 convaincre les apports m\u00e9tiers des solutions propos\u00e9es et d\u2019autre part car les \u00e9quipes Innovation ont du mal \u00e0 comprendre les apports concrets vu les sp\u00e9cificit\u00e9s des sujets abord\u00e9s. Les retours d\u2019exp\u00e9rience r\u00e9ussis montrent que la fili\u00e8re cybers\u00e9curit\u00e9 des grands-comptes doit souvent donner l\u2019impulsion, voir porter elle-m\u00eame les relations avec les startups cyber.<\/p>\n<h3>Des habitudes \u00e0 faire \u00e9voluer dans les grandes entreprises<\/h3>\n<p>Une fois la mise en relation r\u00e9alis\u00e9e, il reste une \u00e9tape\u00a0: la r\u00e9alisation de tests en conditions r\u00e9elles (<em>Proof of Concept<\/em>). C\u2019est un exemple de la difficult\u00e9 pour les startups de rivaliser avec les \u00e9diteurs cybers\u00e9curit\u00e9 classiques dans le monde des grands comptes. Ces tests sont demand\u00e9s pour \u00e9valuer l\u2019efficacit\u00e9 d\u2019une nouvelle solution. Les grands \u00e9diteurs, aux moyens financiers importants, offrent ces \u00ab\u00a0PoCs\u00a0\u00bb \u00e0 leurs clients, qui en retour se sont habitu\u00e9s \u00e0 ces tests \u00ab\u00a0gratuits\u00a0\u00bb \u00e0 leur profit.<\/p>\n<p>Pour les startups cependant la situation est diff\u00e9rente car leur besoin en fonds de roulement est tr\u00e8s court et r\u00e9aliser de tels tests gratuitement peut mettre en p\u00e9ril la structure toute enti\u00e8re\u00a0!<\/p>\n<p>Il est donc n\u00e9cessaire que les grands groupes pr\u00e9voient des budgets adapt\u00e9s, souvent de l\u2019ordre de quelques milliers d\u2019euros seulement, pour tester les solutions innovantes propos\u00e9es par les startups.<\/p>\n<h3>En France, des retours positifs dans les interactions startup\/grands comptes<\/h3>\n<p>Cependant des collaborations r\u00e9ussies entre startup et grands comptes montrent que ces deux mondes peuvent travailler ensemble. Et l\u2019effort consenti apporte ensuite \u00e9norm\u00e9ment. Des startups comme Alsid ou Idecsi b\u00e9n\u00e9ficient ainsi de t\u00e9moignages de clients d\u2019ampleurs \u00e0 m\u00eame de rassurer d\u2019autres soci\u00e9t\u00e9s et les investisseurs.<\/p>\n<h3>Un \u00e9cosyst\u00e8me cybers\u00e9curit\u00e9 fran\u00e7ais valorisant l&#8217;innovation<\/h3>\n<p>En France, la pr\u00e9sence d\u2019un \u00e9cosyst\u00e8me qui fait la promotion r\u00e9guli\u00e8re de l\u2019innovation en associant grands comptes et startups\u00a0est notable : Assises de la S\u00e9curit\u00e9 avec le Prix de l\u2019Innovation, le FIC avec le prix de la PME Innovante ou encore le concours d\u00e9di\u00e9 \u00e0 la cybers\u00e9curit\u00e9 dans le milieu bancaire coorganis\u00e9 par la Soci\u00e9t\u00e9 G\u00e9n\u00e9rale et Wavestone. Ces initiatives permettent une mise en lumi\u00e8re de l\u2019innovation en cybers\u00e9curit\u00e9, ainsi que la mise en relation directe de diff\u00e9rents acteurs. Elles participent ainsi \u00e0 la cr\u00e9ation de la relation de confiance n\u00e9cessaire pour que les grands comptes investissent dans les solutions propos\u00e9es par des startups.<\/p>\n<h3>L&#8217;importance de l&#8217;existence d&#8217;une offre fran\u00e7aise pour la souverainet\u00e9 num\u00e9rique<\/h3>\n<p>La cybers\u00e9curit\u00e9 est une probl\u00e9matique mondiale mais rel\u00e8ve aussi de la s\u00e9curit\u00e9 nationale. L\u2019int\u00e9r\u00eat d\u2019avoir des produits de confiance dans ce domaine est \u00e9vident.<\/p>\n<p>M\u00eame si beaucoup reste \u00e0 faire pour garantir une souverainet\u00e9 num\u00e9rique, les initiatives de certaines startups fran\u00e7aises ont permis l\u2019importation de concepts n\u2019existant initialement qu\u2019\u00e0 l\u2019\u00e9tranger. C\u2019est par exemple le cas des plateformes de <em>Bug Bounty <\/em>(en fran\u00e7ais, \u00ab\u00a0chasse aux failles\u00a0\u00bb). En France, trois startups, Bug Bounty Factory, Bug Bounty Zone et Yogosha proposent des services dans ce domaine. Ceci pourra permettre \u00e0 terme de garder la connaissance de vuln\u00e9rabilit\u00e9s sensibles sur le territoire Europ\u00e9en ou national.<\/p>\n<p>Il est important de noter que le march\u00e9 hexagonal de la cybers\u00e9curit\u00e9 est largement anim\u00e9 par des acteurs du secteur de la d\u00e9fense, publics ou priv\u00e9s, qui investissent et aident aux d\u00e9veloppements de startups. Mais ces opportunit\u00e9s de d\u00e9veloppement sont en m\u00eame temps un frein \u00e0 l\u2019exportation et rendent plus difficile la communication de r\u00e9f\u00e9rences.<\/p>\n<h2>Demain, arriver \u00e0 sortir des fronti\u00e8res<\/h2>\n<h3>Le secteur de la recherche se structure<\/h3>\n<p>La recherche en cybers\u00e9curit\u00e9 est aussi tr\u00e8s active en France avec de nombreux laboratoires mobilis\u00e9s et des initiatives de premier plan. Le collectif Allistene, regroupant l\u2019INRIA, le CEA, le CNRS et plusieurs grandes \u00e9coles, en est un exemple. De premi\u00e8res chaires sont d\u00e9di\u00e9es aux sujets de la cybers\u00e9curit\u00e9 et de ses applications concr\u00e8tes, par exemple pour les v\u00e9hicules autonomes. Conjointement avec les initiatives des grandes entreprises, tout concourt \u00e0 cr\u00e9er un terreau positif pour l\u2019\u00e9closion et la croissance de nombreuses startups.<\/p>\n<h3>D\u00e9passer le cadre franco-fran\u00e7ais pour cro\u00eetre \u00e0 l&#8217;international<\/h3>\n<p>La France poss\u00e8de de nombreux talents en cybers\u00e9curit\u00e9, un terreau facilitant l\u2019\u00e9mergence des startups et un march\u00e9 permettant de faire vivre ces structures. Mais ce bilan tr\u00e8s positif ne doit cependant pas masquer la principale difficult\u00e9 actuelle\u00a0de nos startups : conna\u00eetre le succ\u00e8s et la croissance \u00e0 l\u2019international.<\/p>\n<p>Hormis quelques <em>success story<\/em>, comme historiquement Qualys ou plus r\u00e9cemment Linkurious aux Etats-Unis, les startups fran\u00e7aises ont du mal \u00e0 sortir des fronti\u00e8res hexagonales. Elle se heurtent \u00e0 des barri\u00e8res sur leur capacit\u00e9 \u00e0 communiquer de mani\u00e8re percutante en anglais, sur la faiblesse de r\u00e9f\u00e9rences clients fran\u00e7aises, sur des probl\u00e8mes juridiques mais aussi psychologiques \u00e0 s\u2019expatrier. Alors que la qualit\u00e9 des profils fran\u00e7ais en cybers\u00e9curit\u00e9 est largement reconnue, la qualit\u00e9 des startups, est-elle encore inconnue.<\/p>\n<p>D\u00e9passer ce plafond de verre requiert des initiatives conjointes de l\u2019Etat, des grandes entreprises et un esprit de conqu\u00eate exacerb\u00e9 chez les fondateurs de startups. Mobilisons-nous collectivement, chacun avec ses forces, pour que cela devienne une r\u00e9alit\u00e9 dans les ann\u00e9es \u00e0 venir.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apr\u00e8s un premier article consacr\u00e9 au sujet du radar des start-ups cybers\u00e9curit\u00e9 en France, ce deuxi\u00e8me article porte sur les leviers qui s&#8217;offrent \u00e0 elles pour assurer leur d\u00e9veloppement. Comment se rapprocher des grandes entreprises ? Comment s&#8217;exporter \u00e0 l&#8217;international&#8230;<\/p>\n","protected":false},"author":15,"featured_media":10016,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[254,95,3076,2505],"coauthors":[837,807,2864],"class_list":["post-10010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-developpement","tag-innovation","tag-radar","tag-start-up"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Startup cybers\u00e9curit\u00e9 en France, un \u00e9cosyst\u00e8me en pleine explosion 2\/2<\/title>\n<meta name=\"description\" content=\"Ce deuxi\u00e8me article au sujet du radar des start-up cybers\u00e9curit\u00e9 en France porte sur leur d\u00e9veloppement avec les grandes groupe et \u00e0 l&#039;international\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Startup cybers\u00e9curit\u00e9 en France, un \u00e9cosyst\u00e8me en pleine explosion 2\/2\" \/>\n<meta property=\"og:description\" content=\"Ce deuxi\u00e8me article au sujet du radar des start-up cybers\u00e9curit\u00e9 en France porte sur leur d\u00e9veloppement avec les grandes groupe et \u00e0 l&#039;international\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-22T15:48:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-30T12:55:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/Fotolia_71229456_Subscription_Monthly_XXL-business-people-analytics-business-graph-and-seo-on-web\u00a9-apinan.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"5000\" \/>\n\t<meta property=\"og:image:height\" content=\"3000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois, Gabriel Amirault, Jules Haddad\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois, Gabriel Amirault, Jules Haddad\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Startup cybers\u00e9curit\u00e9 en France, un \u00e9cosyst\u00e8me en pleine explosion (2\/2)\",\"datePublished\":\"2017-09-22T15:48:05+00:00\",\"dateModified\":\"2019-12-30T12:55:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/\"},\"wordCount\":1182,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/Fotolia_71229456_Subscription_Monthly_XXL-business-people-analytics-business-graph-and-seo-on-web\u00a9-apinan.jpg\",\"keywords\":[\"d\u00e9veloppement\",\"Innovation\",\"radar\",\"start-up\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/\",\"name\":\"Startup cybers\u00e9curit\u00e9 en France, un \u00e9cosyst\u00e8me en pleine explosion 2\/2\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/Fotolia_71229456_Subscription_Monthly_XXL-business-people-analytics-business-graph-and-seo-on-web\u00a9-apinan.jpg\",\"datePublished\":\"2017-09-22T15:48:05+00:00\",\"dateModified\":\"2019-12-30T12:55:44+00:00\",\"description\":\"Ce deuxi\u00e8me article au sujet du radar des start-up cybers\u00e9curit\u00e9 en France porte sur leur d\u00e9veloppement avec les grandes groupe et \u00e0 l'international\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/Fotolia_71229456_Subscription_Monthly_XXL-business-people-analytics-business-graph-and-seo-on-web\u00a9-apinan.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/Fotolia_71229456_Subscription_Monthly_XXL-business-people-analytics-business-graph-and-seo-on-web\u00a9-apinan.jpg\",\"width\":5000,\"height\":3000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Startup cybers\u00e9curit\u00e9 en France, un \u00e9cosyst\u00e8me en pleine explosion (2\/2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Startup cybers\u00e9curit\u00e9 en France, un \u00e9cosyst\u00e8me en pleine explosion 2\/2","description":"Ce deuxi\u00e8me article au sujet du radar des start-up cybers\u00e9curit\u00e9 en France porte sur leur d\u00e9veloppement avec les grandes groupe et \u00e0 l'international","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/","og_locale":"en_US","og_type":"article","og_title":"Startup cybers\u00e9curit\u00e9 en France, un \u00e9cosyst\u00e8me en pleine explosion 2\/2","og_description":"Ce deuxi\u00e8me article au sujet du radar des start-up cybers\u00e9curit\u00e9 en France porte sur leur d\u00e9veloppement avec les grandes groupe et \u00e0 l'international","og_url":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/","og_site_name":"RiskInsight","article_published_time":"2017-09-22T15:48:05+00:00","article_modified_time":"2019-12-30T12:55:44+00:00","og_image":[{"width":5000,"height":3000,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/Fotolia_71229456_Subscription_Monthly_XXL-business-people-analytics-business-graph-and-seo-on-web\u00a9-apinan.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois, Gabriel Amirault, Jules Haddad","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois, Gabriel Amirault, Jules Haddad","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Startup cybers\u00e9curit\u00e9 en France, un \u00e9cosyst\u00e8me en pleine explosion (2\/2)","datePublished":"2017-09-22T15:48:05+00:00","dateModified":"2019-12-30T12:55:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/"},"wordCount":1182,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/Fotolia_71229456_Subscription_Monthly_XXL-business-people-analytics-business-graph-and-seo-on-web\u00a9-apinan.jpg","keywords":["d\u00e9veloppement","Innovation","radar","start-up"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/","url":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/","name":"Startup cybers\u00e9curit\u00e9 en France, un \u00e9cosyst\u00e8me en pleine explosion 2\/2","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/Fotolia_71229456_Subscription_Monthly_XXL-business-people-analytics-business-graph-and-seo-on-web\u00a9-apinan.jpg","datePublished":"2017-09-22T15:48:05+00:00","dateModified":"2019-12-30T12:55:44+00:00","description":"Ce deuxi\u00e8me article au sujet du radar des start-up cybers\u00e9curit\u00e9 en France porte sur leur d\u00e9veloppement avec les grandes groupe et \u00e0 l'international","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/Fotolia_71229456_Subscription_Monthly_XXL-business-people-analytics-business-graph-and-seo-on-web\u00a9-apinan.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/Fotolia_71229456_Subscription_Monthly_XXL-business-people-analytics-business-graph-and-seo-on-web\u00a9-apinan.jpg","width":5000,"height":3000},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/09\/cybersecurite-startup-france-22\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Startup cybers\u00e9curit\u00e9 en France, un \u00e9cosyst\u00e8me en pleine explosion (2\/2)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=10010"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10010\/revisions"}],"predecessor-version":[{"id":10020,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10010\/revisions\/10020"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/10016"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=10010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=10010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=10010"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=10010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}