{"id":10133,"date":"2017-10-13T10:24:20","date_gmt":"2017-10-13T09:24:20","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=10133\/"},"modified":"2019-12-31T09:59:21","modified_gmt":"2019-12-31T08:59:21","slug":"cyber-resilience-plier-pas-rompre-22","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/","title":{"rendered":"Cyber-r\u00e9silience : plier pour ne pas rompre (2\/2)"},"content":{"rendered":"<p><em>Suite \u00e0 un <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/10\/cyber-resilience-plier-pas-rompre-12\/\">premier article<\/a> pr\u00e9sentant les vuln\u00e9rabilit\u00e9s des dispositifs de continuit\u00e9 et quelques grandes attaques majeures ayant paralys\u00e9 une partie du SI de l&#8217;entreprise, voici quelques pistes pour am\u00e9liorer sa strat\u00e9gie de cyber-r\u00e9silience.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>Muscler la gestion de crise<\/h2>\n<p>Les crises cyber sont des crises particuli\u00e8res\u00a0: souvent longues (plusieurs semaines), parfois difficiles \u00e0 cerner (qu\u2019a pu faire l\u2019attaquant ? depuis combien de temps ? quels sont les impacts ?) et impliquant des parties externes elles-m\u00eames souvent peu pr\u00e9par\u00e9es sur ce sujet (avocats, huissiers, autorit\u00e9s, fournisseurs, voire les clients\u2026). Il est donc n\u00e9cessaire d\u2019ajuster les dispositifs existants qui n\u2019ont pas \u00e9t\u00e9 con\u00e7us pour int\u00e9grer la dimension cyber.<\/p>\n<p>Acteur op\u00e9rationnel de la gestion de la crise cyber, la DSI ne doit pas \u00eatre sur-mobilis\u00e9e sur l\u2019investigation et la d\u00e9fense au d\u00e9triment de la production et du secours. Cet aspect constitue un point d\u2019anticipation important \u00e0 ne pas n\u00e9gliger. Il s\u2019agira donc d\u2019identifier clairement les \u00e9quipes \u00e0 mobiliser sur la crise et d\u2019organiser les interventions parall\u00e8les d\u2019investigation et de construction de plan de d\u00e9fense.<\/p>\n<p>Au-del\u00e0 de l\u2019aspect organisationnel, il faudra s\u2019assurer de disposer \u00e9galement de l\u2019outillage d\u2019investigation (cartographie, recherche de signature de l\u2019attaque, SI de gestion de crise ind\u00e9pendant, capacit\u00e9 d\u2019analyse de malware inconnu\u2026), d\u2019assainissement (capacit\u00e9 de d\u00e9ploiement rapide de correctifs ou de \u00ab\u00a0vaccin \u00bb, isolation en urgence de portions non touch\u00e9es du SI, isolation r\u00e9seau\u2026) et de reconstruction (acc\u00e8s rapide aux sauvegardes, acc\u00e8s aux documentations minimum de reconstruction, support des fournisseurs cl\u00e9s sur le SI, capacit\u00e9 \u00e0 r\u00e9installer massivement des postes de travail\u2026) requis pour comprendre la position de l\u2019attaquant, stopper sa propagation et faire repartir au plus vite l\u2019activit\u00e9.<\/p>\n<p>La d\u00e9finition d\u2019un guide de gestion de crise, d\u00e9finissant les \u00e9tapes structurantes, les responsabilit\u00e9s macroscopiques et les points de cl\u00e9s de d\u00e9cision sera un plus. Et parce qu\u2019il est primordial de s\u2019exercer en amont afin d\u2019\u00eatre pr\u00eat le jour o\u00f9 il faut faire face \u00e0 la crise, la r\u00e9alisation d\u2019exercice de crise sera un bon r\u00e9v\u00e9lateur de la situation r\u00e9elle.<\/p>\n<figure id=\"post-10124 media-10124\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10124 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/image-1.png\" alt=\"\" width=\"1420\" height=\"749\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/image-1.png 1420w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/image-1-362x191.png 362w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/image-1-768x405.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/image-1-71x37.png 71w\" sizes=\"auto, (max-width: 1420px) 100vw, 1420px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<h2>Repenser les dispositifs de continuit\u00e9<\/h2>\n<p>Les dispositifs de continuit\u00e9 doivent \u00e9galement \u00e9voluer pour s\u2019adapter aux menaces cyber. Les solutions possibles sont nombreuses et peuvent toucher tous les types de dispositifs de continuit\u00e9. Le plan de reprise utilisateur peut int\u00e9grer par exemple la mise \u00e0 disposition de cl\u00e9s USB avec un syst\u00e8me alternatif. Les collaborateurs pourraient l\u2019utiliser en cas de destruction logique de leur poste de travail.<\/p>\n<p>Certains \u00e9tablissements ont fait le choix de provisionner des volumes de postes de travail de remplacement directement avec leurs fournisseurs de mat\u00e9riel afin de les d\u00e9livrer rapidement en cas de destruction physique.<\/p>\n<p>Le plan de continuit\u00e9 informatique peut inclure de nouvelles solutions pour \u00eatre efficace en cas de cyberattaque. La plus embl\u00e9matique vise \u00e0 construire des cha\u00eenes applicatives alternatives. Il s\u2019agit de \u00ab\u00a0dupliquer \u00bb une application sans utiliser les m\u00eames logiciels, syst\u00e8mes d\u2019exploitation et \u00e9quipes de production. C\u2019est une solution extr\u00eame, tr\u00e8s co\u00fbteuse et difficile \u00e0 maintenir, mais qui est envisag\u00e9e pour certaines applications critiques dans le monde de la finance (notamment les infrastructures de paiement \u00e0 caract\u00e8re syst\u00e9mique).<\/p>\n<p>D\u2019autres solutions moins complexes sont envisag\u00e9es. Il s\u2019agit par exemple de l\u2019ajout de contr\u00f4le fonctionnel d\u2019int\u00e9grit\u00e9 dans le processus m\u00e9tier. Son concept repose sur la r\u00e9alisation de contr\u00f4les r\u00e9guliers, \u00e0 diff\u00e9rents niveaux et \u00e0 diff\u00e9rents endroits dans la cha\u00eene applicative (\u00ab multi-level controls\u00a0\u00bb). Ceci permet de d\u00e9tecter rapidement des attaques qui toucheraient par exemple les couches techniques (modification d\u2019une valeur directement dans une base de donn\u00e9es) sans avoir \u00e9t\u00e9 r\u00e9alis\u00e9es par les actions m\u00e9tier classiques (via les interfaces graphiques). Ces m\u00e9canismes peuvent aussi s\u2019appliquer aux syst\u00e8mes d\u2019infrastructures, par exemple en r\u00e9conciliant les tickets de demande de cr\u00e9ation de compte d\u2019administration avec le nombre de comptes r\u00e9ellement dans le syst\u00e8me.<\/p>\n<p>D\u2019un niveau de complexit\u00e9 interm\u00e9diaire, il est possible d\u2019envisager la d\u00e9finition de zone d\u2019isolation syst\u00e8me et r\u00e9seau (\u00ab <em>floodgate<\/em>\u00a0\u00bb) que l\u2019on peut activer en cas d\u2019attaques et qui vont isoler les syst\u00e8mes les plus sensibles du reste du SI. Le SI industriel pourra, \u00e0 ce titre, constituer \u00e0 lui seul, une de ces zones d\u2019isolation vis-\u00e0-vis du reste du SI.<\/p>\n<p>Ces \u00e9volutions, souvent majeures, doivent s\u2019inscrire dans une revue des strat\u00e9gies de secours existantes afin d\u2019\u00e9valuer leur vuln\u00e9rabilit\u00e9 et l\u2019int\u00e9r\u00eat de d\u00e9ployer des nouvelles solutions de cyber-r\u00e9silience, en particulier sur les syst\u00e8mes les plus critiques. L\u2019\u00e9volution des Business Impact Analysis (BIA) pour inclure cette dimension est certainement une premi\u00e8re \u00e9tape cl\u00e9.<\/p>\n<figure id=\"post-10138 media-10138\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10138 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Image-3.png\" alt=\"\" width=\"1355\" height=\"596\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Image-3.png 1355w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Image-3-434x191.png 434w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Image-3-768x338.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Image-3-71x31.png 71w\" sizes=\"auto, (max-width: 1355px) 100vw, 1355px\" \/><\/figure>\n<figure id=\"post-10136 media-10136\" class=\"align-none\"><\/figure>\n<h2>Sans cybers\u00e9curit\u00e9, la cyber-r\u00e9silience n\u2019est rien<\/h2>\n<p>Impl\u00e9menter ces nouvelles mesures de cyber-r\u00e9silience n\u00e9cessite des efforts importants. Des efforts qui seront vains si ces solutions de secours et les syst\u00e8mes nominaux ne sont pas eux-m\u00eames d\u00e9j\u00e0 s\u00e9curis\u00e9s correctement et surveill\u00e9s avec attention. Le RSSI est l\u2019acteur cl\u00e9 pour faire aboutir ces d\u00e9marches souvent entam\u00e9es mais rarement finalis\u00e9es. L\u2019aide du Risk Manager (RM) \u2013 ou, s\u2019il est d\u00e9sign\u00e9, son Responsable du Plan de Continuit\u00e9 d\u2019Activit\u00e9 (RPCA) \u2013 sera alors un plus. Il est aujourd\u2019hui commun\u00e9ment acquis qu\u2019il est impossible de s\u00e9curiser des syst\u00e8mes \u00e0 100%, il faut donc accepter la probabilit\u00e9 d\u2019occurrence d\u2019une attaque et c\u2019est \u00e0 ce moment-l\u00e0 que le RM ou son RPCA prendra tout son r\u00f4le.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: right;\"><em>Cet article est issu de notre focus &#8220;<a href=\"https:\/\/www.wavestone.com\/fr\/insight\/cyber-resilience\/\">Cyber-r\u00e9silience : plier pour ne pas rompre<\/a>&#8220;.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Suite \u00e0 un premier article pr\u00e9sentant les vuln\u00e9rabilit\u00e9s des dispositifs de continuit\u00e9 et quelques grandes attaques majeures ayant paralys\u00e9 une partie du SI de l&#8217;entreprise, voici quelques pistes pour am\u00e9liorer sa strat\u00e9gie de cyber-r\u00e9silience. &nbsp; Muscler la gestion de crise&#8230;<\/p>\n","protected":false},"author":24,"featured_media":10134,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[3313,590,244,1241,2470,2868,447,1203,2874],"coauthors":[821,837],"class_list":["post-10133","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-bcp-cyberresilience","tag-compromission-du-si","tag-crise","tag-cyberattaque","tag-cyberresilience","tag-notpetya","tag-strategie","tag-vulnerabilites","tag-wannacry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber-r\u00e9silience : plier pour ne pas rompre (2\/2) - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-r\u00e9silience : plier pour ne pas rompre (2\/2) - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Suite \u00e0 un premier article pr\u00e9sentant les vuln\u00e9rabilit\u00e9s des dispositifs de continuit\u00e9 et quelques grandes attaques majeures ayant paralys\u00e9 une partie du SI de l&#8217;entreprise, voici quelques pistes pour am\u00e9liorer sa strat\u00e9gie de cyber-r\u00e9silience. &nbsp; Muscler la gestion de crise...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-13T09:24:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T08:59:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Fotolia_79061644_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Frederic Chollet, G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Frederic Chollet, G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/\"},\"author\":{\"name\":\"Frederic Chollet\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1806516c0e27ec00d49f55331e465892\"},\"headline\":\"Cyber-r\u00e9silience : plier pour ne pas rompre (2\/2)\",\"datePublished\":\"2017-10-13T09:24:20+00:00\",\"dateModified\":\"2019-12-31T08:59:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/\"},\"wordCount\":1004,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Fotolia_79061644_Subscription_Monthly_M.jpg\",\"keywords\":[\"BCP &amp; cyberresilience\",\"compromission du SI\",\"crise\",\"Cyberattaque\",\"cyberresilience\",\"Notpetya\",\"strat\u00e9gie\",\"vuln\u00e9rabilit\u00e9s\",\"Wannacry\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/\",\"name\":\"Cyber-r\u00e9silience : plier pour ne pas rompre (2\/2) - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Fotolia_79061644_Subscription_Monthly_M.jpg\",\"datePublished\":\"2017-10-13T09:24:20+00:00\",\"dateModified\":\"2019-12-31T08:59:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Fotolia_79061644_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Fotolia_79061644_Subscription_Monthly_M.jpg\",\"width\":1378,\"height\":1378,\"caption\":\"Two businessmen with beards working and planning things together. Business idea concept. Vector flat design Illustration.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-r\u00e9silience : plier pour ne pas rompre (2\/2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1806516c0e27ec00d49f55331e465892\",\"name\":\"Frederic Chollet\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/frederic-chollet\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber-r\u00e9silience : plier pour ne pas rompre (2\/2) - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/","og_locale":"en_US","og_type":"article","og_title":"Cyber-r\u00e9silience : plier pour ne pas rompre (2\/2) - RiskInsight","og_description":"Suite \u00e0 un premier article pr\u00e9sentant les vuln\u00e9rabilit\u00e9s des dispositifs de continuit\u00e9 et quelques grandes attaques majeures ayant paralys\u00e9 une partie du SI de l&#8217;entreprise, voici quelques pistes pour am\u00e9liorer sa strat\u00e9gie de cyber-r\u00e9silience. &nbsp; Muscler la gestion de crise...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/","og_site_name":"RiskInsight","article_published_time":"2017-10-13T09:24:20+00:00","article_modified_time":"2019-12-31T08:59:21+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Fotolia_79061644_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Frederic Chollet, G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"Frederic Chollet, G\u00e9r\u00f4me Billois","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/"},"author":{"name":"Frederic Chollet","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1806516c0e27ec00d49f55331e465892"},"headline":"Cyber-r\u00e9silience : plier pour ne pas rompre (2\/2)","datePublished":"2017-10-13T09:24:20+00:00","dateModified":"2019-12-31T08:59:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/"},"wordCount":1004,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Fotolia_79061644_Subscription_Monthly_M.jpg","keywords":["BCP &amp; cyberresilience","compromission du SI","crise","Cyberattaque","cyberresilience","Notpetya","strat\u00e9gie","vuln\u00e9rabilit\u00e9s","Wannacry"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/","url":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/","name":"Cyber-r\u00e9silience : plier pour ne pas rompre (2\/2) - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Fotolia_79061644_Subscription_Monthly_M.jpg","datePublished":"2017-10-13T09:24:20+00:00","dateModified":"2019-12-31T08:59:21+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Fotolia_79061644_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/10\/Fotolia_79061644_Subscription_Monthly_M.jpg","width":1378,"height":1378,"caption":"Two businessmen with beards working and planning things together. Business idea concept. Vector flat design Illustration."},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2017\/10\/cyber-resilience-plier-pas-rompre-22\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber-r\u00e9silience : plier pour ne pas rompre (2\/2)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1806516c0e27ec00d49f55331e465892","name":"Frederic Chollet","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/frederic-chollet\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=10133"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10133\/revisions"}],"predecessor-version":[{"id":10250,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10133\/revisions\/10250"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/10134"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=10133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=10133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=10133"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=10133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}