{"id":1043,"date":"2011-12-20T09:10:49","date_gmt":"2011-12-20T08:10:49","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=1043"},"modified":"2019-12-31T12:22:07","modified_gmt":"2019-12-31T11:22:07","slug":"louverture-cle-de-developpement-des-grandes-organisations","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/","title":{"rendered":"OUVERTURE &#8211; La cl\u00e9 du d\u00e9veloppement des grandes organisations"},"content":{"rendered":"<p>Ouverture, un mot synonyme d\u2019innovation et de d\u00e9veloppement pour les grandes organisations. L\u2019ouverture a \u00e9t\u00e9 l\u2019un des enjeux de 2011, elle reste une priorit\u00e9 en 2012 pour s\u2019assurer de l\u2019agilit\u00e9 n\u00e9cessaire dans des temps \u00e9conomiquement troubl\u00e9s.<\/p>\n<p><strong>L\u2019ouverture sous toutes ses formes<\/strong><\/p>\n<p>Tout d\u2019abord, l\u2019ouverture vers de nouveaux m\u00e9tiers et de nouveaux partenaires est essentiel pour r\u00e9ussir dans un monde aujourd\u2019hui friand d\u2019alliances parfois improbables entre secteurs (qui aurait imagin\u00e9, par exemple, que les banques vendraient un jour des \u00a0forfaits de t\u00e9l\u00e9phonie\u00a0?).<\/p>\n<p>L\u2019ouverture, c\u2019est \u00e9galement un \u00e9lan vers de nouveaux horizons de d\u00e9veloppement, par exemple \u00e0 l\u2019international ou vers les nouveaux march\u00e9s \u00e9mergents, relais de croissance essentiel.<\/p>\n<p><!--more-->L\u2019ouverture, c\u2019est aussi promouvoir de nouveaux usages et de nouvelles mani\u00e8res de faire. L\u2019arriv\u00e9e en force des smartphones et des tablettes l\u2019illustre bien. Le <em>cloud computing<\/em>, vecteur de r\u00e9duction des co\u00fbts mais aussi de la cr\u00e9ation de SI plus souples, a commenc\u00e9 \u00e0 d\u00e9montrer ses bienfaits.<\/p>\n<p>L\u2019ouverture est d\u2019ailleurs de plus en plus exig\u00e9e par les utilisateurs eux-m\u00eames. Les r\u00e9seaux sociaux, publics ou d\u2019entreprise, la volont\u00e9 d\u2019utilisation d\u2019\u00e9quipements personnels des collaborateurs (le fameux BYOD \u00ab\u00a0Bring Your Own Device\u00a0\u00bb) seront certainement des sujets d\u2019actualit\u00e9 en 2012.<\/p>\n<p><strong>Ma\u00eetriser l\u2019ouverture du SI<\/strong><\/p>\n<p>Bien \u00e9videmment, l\u2019actualit\u00e9 r\u00e9cente et les diff\u00e9rents incidents de s\u00e9curit\u00e9 majeurs rencontr\u00e9s \u00e0 l\u2019\u00e9tranger comme en France, nous rappelle que l\u2019ouverture doit \u00eatre raisonn\u00e9e et r\u00e9fl\u00e9chie. Il ne s\u2019agit pas d\u2019ouvrir sans contr\u00f4le un SI au c\u0153ur de la performance de l\u2019entreprise et de laisser en libre acc\u00e8s des informations confidentielles.<\/p>\n<p>Dans ce contexte, il est crucial de bien ma\u00eetriser les fondamentaux de la protection de l\u2019information. Savoir o\u00f9 sont les informations sensibles, qui les poss\u00e8de, comment elles sont utilis\u00e9es sont des \u00e9l\u00e9ments cl\u00e9s\u00a0! Cette connaissance permet de prot\u00e9ger de mani\u00e8re ad\u00e9quate les informations les plus sensibles tout en autorisant de nouveaux usages sur le reste du syst\u00e8me d\u2019information, moins sensible.<\/p>\n<p><strong>Transformer son SI pour tendre vers l\u2019ouverture<\/strong><\/p>\n<p>Pour autoriser l\u2019ouverture, des mouvements de fonds dans le SI doivent \u00eatre envisag\u00e9s. Les priorit\u00e9s de 2012 seront certainement la cr\u00e9ation de \u00ab\u00a0sanctuaires\u00a0\u00bb pour prot\u00e9ger les informations les plus sensibles de mani\u00e8re avanc\u00e9e, le renforcement de la s\u00e9curit\u00e9 des applications (\u00e0 la fois lors de l\u2019expression des besoins, mais aussi et surtout du d\u00e9veloppement et des recettes) et finalement la cr\u00e9ation de syst\u00e8mes de gestion d\u2019identit\u00e9 et d\u2019acc\u00e8s qui seront capables d\u2019interagir avec les services du <em>cloud<\/em> pour garantir la continuit\u00e9 de la protection. La surveillance du SI et l\u2019adaptation des processus de gestion de crises et d\u2019incidents aux nouvelles menaces seront aussi des \u00e9l\u00e9ments cl\u00e9s.<\/p>\n<p>L\u2019ouverture est essentielle pour accompagner et d\u00e9velopper nos organisations et les rendre comp\u00e9titives tout en pr\u00e9servant leurs ressources\u00a0! 2012 sera sans conteste l\u2019ann\u00e9e de l\u2019ouverture, comme un levier de r\u00e9duction des co\u00fbts et d\u2019\u00e9mergence de nouveaux services. Un incontournable pour assurer le d\u00e9veloppement des grandes organisations\u00a0!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ouverture, un mot synonyme d\u2019innovation et de d\u00e9veloppement pour les grandes organisations. L\u2019ouverture a \u00e9t\u00e9 l\u2019un des enjeux de 2011, elle reste une priorit\u00e9 en 2012 pour s\u2019assurer de l\u2019agilit\u00e9 n\u00e9cessaire dans des temps \u00e9conomiquement troubl\u00e9s. L\u2019ouverture sous toutes ses&#8230;<\/p>\n","protected":false},"author":15,"featured_media":6344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[64,254,95,3302],"coauthors":[837],"class_list":["post-1043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-byod","tag-developpement","tag-innovation","tag-security-architecture"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OUVERTURE - La cl\u00e9 du d\u00e9veloppement des grandes organisations - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OUVERTURE - La cl\u00e9 du d\u00e9veloppement des grandes organisations - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Ouverture, un mot synonyme d\u2019innovation et de d\u00e9veloppement pour les grandes organisations. L\u2019ouverture a \u00e9t\u00e9 l\u2019un des enjeux de 2011, elle reste une priorit\u00e9 en 2012 pour s\u2019assurer de l\u2019agilit\u00e9 n\u00e9cessaire dans des temps \u00e9conomiquement troubl\u00e9s. L\u2019ouverture sous toutes ses...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-12-20T08:10:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:22:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"OUVERTURE &#8211; La cl\u00e9 du d\u00e9veloppement des grandes organisations\",\"datePublished\":\"2011-12-20T08:10:49+00:00\",\"dateModified\":\"2019-12-31T11:22:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/\"},\"wordCount\":568,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"keywords\":[\"BYOD\",\"d\u00e9veloppement\",\"Innovation\",\"security architecture\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/\",\"name\":\"OUVERTURE - La cl\u00e9 du d\u00e9veloppement des grandes organisations - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"datePublished\":\"2011-12-20T08:10:49+00:00\",\"dateModified\":\"2019-12-31T11:22:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OUVERTURE &#8211; La cl\u00e9 du d\u00e9veloppement des grandes organisations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OUVERTURE - La cl\u00e9 du d\u00e9veloppement des grandes organisations - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/","og_locale":"en_US","og_type":"article","og_title":"OUVERTURE - La cl\u00e9 du d\u00e9veloppement des grandes organisations - RiskInsight","og_description":"Ouverture, un mot synonyme d\u2019innovation et de d\u00e9veloppement pour les grandes organisations. L\u2019ouverture a \u00e9t\u00e9 l\u2019un des enjeux de 2011, elle reste une priorit\u00e9 en 2012 pour s\u2019assurer de l\u2019agilit\u00e9 n\u00e9cessaire dans des temps \u00e9conomiquement troubl\u00e9s. L\u2019ouverture sous toutes ses...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/","og_site_name":"RiskInsight","article_published_time":"2011-12-20T08:10:49+00:00","article_modified_time":"2019-12-31T11:22:07+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"OUVERTURE &#8211; La cl\u00e9 du d\u00e9veloppement des grandes organisations","datePublished":"2011-12-20T08:10:49+00:00","dateModified":"2019-12-31T11:22:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/"},"wordCount":568,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","keywords":["BYOD","d\u00e9veloppement","Innovation","security architecture"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/","url":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/","name":"OUVERTURE - La cl\u00e9 du d\u00e9veloppement des grandes organisations - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","datePublished":"2011-12-20T08:10:49+00:00","dateModified":"2019-12-31T11:22:07+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/12\/louverture-cle-de-developpement-des-grandes-organisations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"OUVERTURE &#8211; La cl\u00e9 du d\u00e9veloppement des grandes organisations"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=1043"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1043\/revisions"}],"predecessor-version":[{"id":6458,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1043\/revisions\/6458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6344"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=1043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=1043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=1043"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=1043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}