{"id":11634,"date":"2019-02-01T18:27:25","date_gmt":"2019-02-01T17:27:25","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11634"},"modified":"2019-12-30T10:31:12","modified_gmt":"2019-12-30T09:31:12","slug":"retrospective-2018-ws-cyber","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/retrospective-2018-ws-cyber\/","title":{"rendered":"Wavestone Cybers\u00e9curit\u00e9 &#8211; R\u00e9trospective de l&#8217;ann\u00e9e pass\u00e9e"},"content":{"rendered":"<p>Les f\u00eates de fin d\u2019ann\u00e9e pass\u00e9es, c\u2019est d\u00e9sormais l\u2019heure des v\u0153ux et des bonnes r\u00e9solutions. Pour ce faire, quoi de mieux que de jeter un \u0153il dans le r\u00e9troviseur pour attaquer cette nouvelle ann\u00e9e ? Ce court billet de blog vous propose une r\u00e9trospective sur 2018 avec quelques-unes de nos plus belles r\u00e9alisations.<\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center;\"><strong>2018, L\u2019ann\u00e9e du RGPD <\/strong><\/h2>\n<figure id=\"post-11635 media-11635\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11635 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/RGPD.png\" alt=\"\" width=\"582\" height=\"403\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/RGPD.png 912w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/RGPD-276x191.png 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/RGPD-768x532.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/RGPD-56x39.png 56w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/RGPD-245x170.png 245w\" sizes=\"auto, (max-width: 582px) 100vw, 582px\" \/><\/figure>\n<p><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/rgpd-que-va-t-il-se-passer-apres-le-25-mai\/\">L\u2019entr\u00e9e en vigueur<\/a> du RGPD le 25 mai 2018 a \u00e9t\u00e9 au c\u0153ur des d\u00e9bats et a \u00e9t\u00e9 davantage propuls\u00e9 sous le feu des projecteurs avec le scandale <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/04\/cambridge-analytica-quels-enseignements-peut-on-deja-en-tirer\/\">Cambridge Analytica<\/a>. Vous avez \u00e9t\u00e9 plus de 4 000 lecteurs \u00e0 suivre nos s\u00e9ries sur les id\u00e9es re\u00e7ues du RGPD (Volume <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/3-idees-recues-sur-les-obligations-du-rgpd-13\/\">1<\/a>, <a href=\"https:\/\/www.riskinsight-wavestone.com\/2018\/06\/3-idees-recues-sur-les-obligations-du-rgpd-23\/\">2<\/a> et <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/\">3<\/a>) et sur la protection des donn\u00e9es personnelles, notamment notre <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/07\/au-lendemain-du-rgpd-ou-en-est-le-marche\/\">benchmark GDPR<\/a> &#8220;au lendemain du RGPD, o\u00f9 en est le march\u00e9 ?&#8221;. Fortement impliqu\u00e9 dans ces probl\u00e9matiques de confiance dans le num\u00e9rique, nous avons notamment anim\u00e9 une conf\u00e9rence lors de l\u2019Annual Privacy Forum \u00e0 Madrid le 14 juin, sur le th\u00e8me\u00a0: \u00ab\u00a0How to carry out one of the key principles of accountability\u00a0?\u00bb. Nous avons \u00e9galement organis\u00e9 notre annuel \u00ab\u00a0Cybersecurity and Privacy Insight Day\u00a0\u00bb qui a r\u00e9uni plus de 80 de nos clients dans nos locaux le 28 novembre, journ\u00e9e durant laquelle le sujet a \u00e9t\u00e9 aussi pr\u00e9pond\u00e9rant\u00a0: 1\/3 de nos ateliers traitaient du sujet. Ce sujet restera important pour l\u2019ann\u00e9e qui vient avec les poursuite des travaux engag\u00e9s et le passage au RUN pour certaines activit\u00e9s. Un bilan de la mise en application du r\u00e8glement est \u00e0 venir.<\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center;\"><strong>La directive NIS et la notion de r\u00e9silience<\/strong><\/h2>\n<figure id=\"post-11637 media-11637\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11637 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/IM-convention-cyber.jpg\" alt=\"\" width=\"612\" height=\"344\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/IM-convention-cyber.jpg 2000w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/IM-convention-cyber-340x191.jpg 340w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/IM-convention-cyber-768x432.jpg 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/IM-convention-cyber-69x39.jpg 69w\" sizes=\"auto, (max-width: 612px) 100vw, 612px\" \/><\/figure>\n<p>La Directive NIS, qui arrive dans le prolongement du dispositif de cybers\u00e9curit\u00e9 des op\u00e9rateurs d\u2019importance vitale (OIV), a \u00e9galement \u00e9t\u00e9 un sujet pr\u00e9dominant en 2018. En effet, la date butoir pour sa transposition dans le droit Fran\u00e7ais \u00e9tait fix\u00e9e au 9 mai 2018. Nous avons analys\u00e9 celle-ci pour vous dans l\u2019article &#8220;<a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/bilan-directive-nis\/\">Directive europ\u00e9enne NIS<\/a> : quelle transposition dans le droit fran\u00e7ais et quel impact pour les entreprises ?&#8221;. Plus globalement, la r\u00e9silience aura \u00e9t\u00e9 un enjeu majeur de 2018, notamment suite aux attaques de 2017 (WannaCry, NotPetya) et \u00e0 leur m\u00e9diatisation. Vous avez \u00e9t\u00e9 nombreux \u00e0 assister \u00e0 notre <a href=\"https:\/\/www.youtube.com\/watch?v=yv1i64-qyfM\">pr\u00e9sentation \u00e0 ce sujet<\/a> lors de l\u2019\u00e9dition 2018 du FIC. Afin de vous illustrer au mieux les impacts de cette attaque et la r\u00e9alit\u00e9 de la gestion de crise qui en d\u00e9coule, nous avons choisi de vous raconter l\u2019exp\u00e9rience de nos \u00e9quipes CERT (\u00e9quipes de r\u00e9ponse \u00e0 incident) chez nos clients. Nous ne nous sommes pas arr\u00eat\u00e9s \u00e0 ce travail de sensibilisation et nous avons par la suite travailler en collaboration avec l\u2019Institut Montaigne (en tant que rapporteurs) pour r\u00e9aliser une <a href=\"https:\/\/fr.wavestone.com\/fr\/insight\/cybermenace-avis-de-tempete\/\">\u00e9tude dimensionnante sur la cyberr\u00e9silience du tissu \u00e9conomique Fran\u00e7ais.<\/a> Pour ce, nous avons imagin\u00e9 la France face \u00e0 un cyberouragan, sc\u00e9nario qui peut para\u00eetre lointain, aux premiers abords. Cette \u00e9tude a donn\u00e9 lieu \u00e0 13 recommandations pour faire face \u00e0 un tel ouragan. Un ma\u00eetre mot\u00a0: <strong>la solidarit\u00e9.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center;\"><strong>L\u2019innovation et les start-ups<\/strong><\/h2>\n<figure id=\"post-11639 media-11639\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-11639 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/STARTUP-INNO.png\" alt=\"\" width=\"624\" height=\"432\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/STARTUP-INNO.png 909w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/STARTUP-INNO-276x191.png 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/STARTUP-INNO-768x531.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/STARTUP-INNO-56x39.png 56w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/STARTUP-INNO-245x170.png 245w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/figure>\n<p>Comme chaque ann\u00e9e, nous avons publi\u00e9 notre <a href=\"https:\/\/fr.wavestone.com\/fr\/insight\/startups-cybersecurite-france\/\">radar des Start-ups Cybers\u00e9curit\u00e9 en France<\/a>, cette fois \u00e0 l\u2019occasion du <a href=\"https:\/\/www.linkedin.com\/pulse\/french-cybersecurity-start-ups-radar-2018-key-takeways-gerome-billois\/\">salon Vivatech 2018<\/a>. Cette initiative a mis en lumi\u00e8re les sp\u00e9cificit\u00e9s du panorama fran\u00e7ais et propose des axes d\u2019am\u00e9lioration pour booster l\u2019\u00e9cosyst\u00e8me fran\u00e7ais. Ce radar a \u00e9galement \u00e9t\u00e9 d\u00e9clin\u00e9 au <a href=\"https:\/\/hk.wavestone.com\/en\/insight\/2018-uk-cybersecurity-start-up-radar\/\">Royaume-Uni<\/a>, qui pr\u00e9sente un environnement prosp\u00e8re \u00e0 l\u2019innovation et \u00e0 l\u2019entreprenariat, et le sera en 2019 aux <a href=\"https:\/\/www.digital.nyc\/news\/cybersecurity-startup-radar-new-york-city-economic-development-corporation-wavestone-team\">Etats-Unis<\/a>, en collaboration avec la mairie de New York. Notre implication dans l\u2019innovation cyber ne s\u2019arr\u00eate pas l\u00e0. Nous avons \u00e9galement organis\u00e9, \u00a0en partenariat avec Soci\u00e9t\u00e9 G\u00e9n\u00e9rale, les \u00ab\u00a0<a href=\"https:\/\/www.banking-cybersecurity-innovation.com\/\">Banking CyberSecurity Innovation Awards<\/a>\u00a0\u00bb (BCSIA). Ce concours vise \u00e0 mettre en avant et de r\u00e9compenser les start-ups qui construisent <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/bcsia-ils-construisent-la-cybersecurite-de-demain\/\">la cybers\u00e9curit\u00e9 de la banque demain<\/a>. Cette \u00e9dition a mis en lumi\u00e8re une v\u00e9ritable richesse technologique, ce qui est prometteur pour l\u2019\u00e9dition 2019 qui d\u00e9bute d\u00e8s le 1<sup>er<\/sup> f\u00e9vrier.<\/p>\n<h2><\/h2>\n<h2 style=\"text-align: center;\"><strong>La s\u00e9curit\u00e9 des syst\u00e8mes industriels<\/strong><\/h2>\n<figure id=\"post-11642 media-11642\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-11642 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Triton.png\" alt=\"\" width=\"608\" height=\"429\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Triton.png 892w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Triton-271x191.png 271w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Triton-768x542.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Triton-55x39.png 55w\" sizes=\"auto, (max-width: 608px) 100vw, 608px\" \/><\/figure>\n<p>Avec l\u2019apparition de Triton, les attaques sur les infrastructures industrielles ont pass\u00e9 un nouveau cap. Il s\u2019agit en effet de la premi\u00e8re v\u00e9ritable attaque cyber sur les SIS (syst\u00e8mes instrument\u00e9s de s\u00e9curit\u00e9), autrement dit sur la derni\u00e8re barri\u00e8re de d\u00e9fense des syst\u00e8mes industriels. Le sujet est port\u00e9 par les travaux autour de la Loi de Programmation Militaire (LPM) qui positionne les SI Industriels comme des syst\u00e8mes critiques et les soumettra \u00e0 des obligations en mati\u00e8re de cybers\u00e9curit\u00e9. Nous en avons profit\u00e9 pour vous exposer notre vision sur la d\u00e9marche d\u2019homologation \u00e0 mettre en \u0153uvre dans notre <a href=\"https:\/\/www.riskinsight-wavestone.com\/2018\/01\/homologation-de-securite-cle-de-voute-de-la-mise-en-conformite-lpm\/\">article<\/a> &#8220;l&#8217;homologation de s\u00e9curit\u00e9, cl\u00e9 de voute de la mise en conformit\u00e9 LPM&#8221;. Tout comme l\u2019a fait WannaCry ou NotPetya par le pass\u00e9 sur un autre p\u00e9rim\u00e8tre, Triton a v\u00e9ritablement mis en lumi\u00e8re de nombreuses vuln\u00e9rabilit\u00e9s sur les syst\u00e8mes industriels.\u00a0Nous \u00e9tions pr\u00e9sents \u00e0 la 26<sup>\u00e8me<\/sup> \u00e9dition de la conf\u00e9rence de s\u00e9curit\u00e9 DEF CON \u00e0 Las Vegas et avons mis \u00e0 votre disposition <a href=\"https:\/\/www.securityinsider-wavestone.com\/2018\/11\/bring-summer-back-compte-rendu-des_21.html\">les comptes-rendus<\/a> des diverses conf\u00e9rences \u00e0 ce sujet. Nous avons aussi anim\u00e9 un <a href=\"https:\/\/media.defcon.org\/DEF%20CON%2026\/\">atelier<\/a> de 4 heures sur la s\u00e9curit\u00e9 des syst\u00e8mes industriels. Enfin, autre initiative lanc\u00e9e dans le but de sensibiliser \u00e0 ces probl\u00e9matiques, nous avons mont\u00e9 et partag\u00e9 une <a href=\"https:\/\/www.securityinsider-wavestone.com\/2018\/12\/pentesting-ics-one-0-one.html\">vid\u00e9o<\/a> sur la base de notre maquette de train afin de pr\u00e9senter les principales attaques sur les SI, et en particulier l\u2019ins\u00e9curit\u00e9 des protocoles industriels, sous la forme d\u2019un v\u00e9ritable \u00ab\u00a0Capture the Flag\u00a0\u00bb physique.<\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center;\"><strong>Sans oublier nos fondamentaux : la r\u00e9vision de nos benchmarks<\/strong><\/h2>\n<figure id=\"post-11644 media-11644\" class=\"align-none\">\n<figure id=\"post-11678 media-11678\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-11678 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Benchmarks-1.png\" alt=\"\" width=\"605\" height=\"413\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Benchmarks-1.png 605w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Benchmarks-1-280x191.png 280w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Benchmarks-1-57x39.png 57w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/figure>\n<\/figure>\n<p>La cybers\u00e9curit\u00e9 est un secteur en constante \u00e9volution. Pour vous aider \u00e0 vous situer vis-\u00e0-vis sur votre march\u00e9, mais aussi pour sensibiliser la communaut\u00e9, Wavestone r\u00e9alise et met \u00e0 jour ses benchmarks r\u00e9guli\u00e8rement. Cette ann\u00e9e, deux benchmarks ont particuli\u00e8rement attis\u00e9 votre curiosit\u00e9\u00a0:<\/p>\n<ul>\n<li>Nous avons d\u2019abord sorti notre <a href=\"https:\/\/fr.wavestone.com\/fr\/insight\/benchmark-securite-sites-2018\/\">benchmark<\/a> <strong>de la s\u00e9curit\u00e9 des sites<\/strong>. Le m\u00eame indicateur fort ressort, et ce depuis 3 ans\u00a0: nos tests web ont r\u00e9v\u00e9l\u00e9 la pr\u00e9sence d\u2019au moins une faille de s\u00e9curit\u00e9 sur l\u2019int\u00e9gralit\u00e9 des sites analys\u00e9s. Pour 56% d\u2019entre eux, il s\u2019agit d\u2019une faille majeure\u00a0!<\/li>\n<li>Notre deuxi\u00e8me <a href=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/07\/Wavestone-Cybersecurite-Analyse-des-documents-de-references-du-CAC-40-2018_vFinale.pdf\">benchmark<\/a> porte sur la <strong>prise en compte de la cybers\u00e9curit\u00e9 dans les comptes annuels des entreprises du CAC40<\/strong>. Bonne surprise, il appara\u00eet que 100% des entreprises du CAC 40 se mobilisent sur le sujet de la cybers\u00e9curit\u00e9, ce qui est encourageant\u00a0et ce qui d\u00e9note une vraie prise de conscience au niveau des grandes organisations. Cependant, il appara\u00eet que seulement 25% des groupes du CAC40 adressent la probl\u00e9matique cyber au niveau du comit\u00e9 ex\u00e9cutif. A garder en t\u00eate \u00e9galement, l\u2019int\u00e9gration de nouvelles technologies devrait toujours embarquer une s\u00e9curisation adapt\u00e9e\u00a0!<\/li>\n<\/ul>\n<p style=\"text-align: center;\">\n","protected":false},"excerpt":{"rendered":"<p>Les f\u00eates de fin d\u2019ann\u00e9e pass\u00e9es, c\u2019est d\u00e9sormais l\u2019heure des v\u0153ux et des bonnes r\u00e9solutions. Pour ce faire, quoi de mieux que de jeter un \u0153il dans le r\u00e9troviseur pour attaquer cette nouvelle ann\u00e9e ? Ce court billet de blog&#8230;<\/p>\n","protected":false},"author":1271,"featured_media":11647,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36],"tags":[3093],"coauthors":[2769],"class_list":["post-11634","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","tag-retrospective"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wavestone Cybers\u00e9curit\u00e9 - R\u00e9trospective de l&#039;ann\u00e9e pass\u00e9e - RiskInsight<\/title>\n<meta name=\"description\" content=\"En ce d\u00e9but d&#039;ann\u00e9e 2019, quoi de mieux que de jeter un \u0153il dans le r\u00e9troviseur pour attaquer cette nouvelle ann\u00e9e ? Voici donc notre r\u00e9trospective de 2018.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wavestone Cybers\u00e9curit\u00e9 - R\u00e9trospective de l&#039;ann\u00e9e pass\u00e9e - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"En ce d\u00e9but d&#039;ann\u00e9e 2019, quoi de mieux que de jeter un \u0153il dans le r\u00e9troviseur pour attaquer cette nouvelle ann\u00e9e ? Voici donc notre r\u00e9trospective de 2018.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-01T17:27:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-30T09:31:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_70667003_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ris4InsigHt\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ris4InsigHt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/\"},\"author\":{\"name\":\"Ris4InsigHt\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7d402de4c00acb1a73cc38330d1a3df2\"},\"headline\":\"Wavestone Cybers\u00e9curit\u00e9 &#8211; R\u00e9trospective de l&#8217;ann\u00e9e pass\u00e9e\",\"datePublished\":\"2019-02-01T17:27:25+00:00\",\"dateModified\":\"2019-12-30T09:31:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/\"},\"wordCount\":1189,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_70667003_Subscription_Monthly_M.jpg\",\"keywords\":[\"retrospective\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/\",\"name\":\"Wavestone Cybers\u00e9curit\u00e9 - R\u00e9trospective de l'ann\u00e9e pass\u00e9e - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_70667003_Subscription_Monthly_M.jpg\",\"datePublished\":\"2019-02-01T17:27:25+00:00\",\"dateModified\":\"2019-12-30T09:31:12+00:00\",\"description\":\"En ce d\u00e9but d'ann\u00e9e 2019, quoi de mieux que de jeter un \u0153il dans le r\u00e9troviseur pour attaquer cette nouvelle ann\u00e9e ? Voici donc notre r\u00e9trospective de 2018.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_70667003_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_70667003_Subscription_Monthly_M.jpg\",\"width\":1378,\"height\":1378,\"caption\":\"Vector modern flat style concept for tourism industry, travelling on airplane, planning summer vacations.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wavestone Cybers\u00e9curit\u00e9 &#8211; R\u00e9trospective de l&rsquo;ann\u00e9e pass\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7d402de4c00acb1a73cc38330d1a3df2\",\"name\":\"Ris4InsigHt\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/ris4insight\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wavestone Cybers\u00e9curit\u00e9 - R\u00e9trospective de l'ann\u00e9e pass\u00e9e - RiskInsight","description":"En ce d\u00e9but d'ann\u00e9e 2019, quoi de mieux que de jeter un \u0153il dans le r\u00e9troviseur pour attaquer cette nouvelle ann\u00e9e ? Voici donc notre r\u00e9trospective de 2018.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/","og_locale":"en_US","og_type":"article","og_title":"Wavestone Cybers\u00e9curit\u00e9 - R\u00e9trospective de l'ann\u00e9e pass\u00e9e - RiskInsight","og_description":"En ce d\u00e9but d'ann\u00e9e 2019, quoi de mieux que de jeter un \u0153il dans le r\u00e9troviseur pour attaquer cette nouvelle ann\u00e9e ? Voici donc notre r\u00e9trospective de 2018.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/","og_site_name":"RiskInsight","article_published_time":"2019-02-01T17:27:25+00:00","article_modified_time":"2019-12-30T09:31:12+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_70667003_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Ris4InsigHt","twitter_misc":{"Written by":"Ris4InsigHt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/"},"author":{"name":"Ris4InsigHt","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7d402de4c00acb1a73cc38330d1a3df2"},"headline":"Wavestone Cybers\u00e9curit\u00e9 &#8211; R\u00e9trospective de l&#8217;ann\u00e9e pass\u00e9e","datePublished":"2019-02-01T17:27:25+00:00","dateModified":"2019-12-30T09:31:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/"},"wordCount":1189,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_70667003_Subscription_Monthly_M.jpg","keywords":["retrospective"],"articleSection":["Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/","url":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/","name":"Wavestone Cybers\u00e9curit\u00e9 - R\u00e9trospective de l'ann\u00e9e pass\u00e9e - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_70667003_Subscription_Monthly_M.jpg","datePublished":"2019-02-01T17:27:25+00:00","dateModified":"2019-12-30T09:31:12+00:00","description":"En ce d\u00e9but d'ann\u00e9e 2019, quoi de mieux que de jeter un \u0153il dans le r\u00e9troviseur pour attaquer cette nouvelle ann\u00e9e ? Voici donc notre r\u00e9trospective de 2018.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_70667003_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_70667003_Subscription_Monthly_M.jpg","width":1378,"height":1378,"caption":"Vector modern flat style concept for tourism industry, travelling on airplane, planning summer vacations."},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/02\/retrospective-2018-ws-cyber\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Wavestone Cybers\u00e9curit\u00e9 &#8211; R\u00e9trospective de l&rsquo;ann\u00e9e pass\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7d402de4c00acb1a73cc38330d1a3df2","name":"Ris4InsigHt","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/ris4insight\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11634"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11634\/revisions"}],"predecessor-version":[{"id":11681,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11634\/revisions\/11681"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/11647"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11634"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}