{"id":1243,"date":"2012-01-30T10:10:07","date_gmt":"2012-01-30T09:10:07","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=1243"},"modified":"2019-12-30T18:10:16","modified_gmt":"2019-12-30T17:10:16","slug":"securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/","title":{"rendered":"S\u00e9curit\u00e9 et r\u00e9seaux sociaux : ma\u00eetriser l\u2019exposition de l\u2019entreprise"},"content":{"rendered":"<p>Les r\u00e9seaux sociaux font partie de notre paysage quotidien : en France, 92% des internautes les utilisent tous les jours (source\u00a0: TNS Sofres 2011). \u00a0Apr\u00e8s avoir s\u00e9duit des millions d\u2019internautes, Facebook, Google+, Twitter ou encore LinkedIn poussent la porte des entreprises qui s\u2019engouffrent rapidement dans la br\u00e8che.<\/p>\n<p>Les opportunit\u00e9s sont multiples face \u00e0 des clients qui ont largement adopt\u00e9 ces r\u00e9seaux sociaux. Gestion de la relation client, campagnes marketing ou encore recrutement sont autant d\u2019utilisations possibles pour les diff\u00e9rents m\u00e9tiers, qui sont s\u00e9duits par la facilit\u00e9 d\u2019utilisation de ces plates-formes.<\/p>\n<h4>Des risques bien r\u00e9els \u00e0 ma\u00eetriser\u00a0!<\/h4>\n<p>Mais ces nouveaux usages am\u00e8nent de nouveaux risques pour l\u2019entreprise qui va s\u2019exposer au travers de pages Facebook, de fils Twitter, etc. En t\u00eate de ces risques, le d\u00e9tournement de pages et les atteintes \u00e0 l\u2019image r\u00e9sultant d\u2019une mauvaise utilisation de ces outils. Une page Facebook mal param\u00e9tr\u00e9e peut aussi conduire \u00e0 une usurpation d\u2019identit\u00e9, un d\u00e9tournement de la finalit\u00e9 du site\u2026 Les exemples r\u00e9cents de Fox News annon\u00e7ant la mort d\u2019Obama (<a href=\"http:\/\/www.guardian.co.uk\/news\/blog\/2011\/jul\/04\/fox-news-hacked-twitter-obama-dead\">http:\/\/www.guardian.co.uk\/news\/blog\/2011\/jul\/04\/fox-news-hacked-twitter-obama-dead<\/a>) ou encore de Microsoft et de sa cha\u00eene YouTube sont assez repr\u00e9sentatifs (<a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/10\/23\/microsofts-youtube-channel-has-been-hacked\/\">http:\/\/nakedsecurity.sophos.com\/2011\/10\/23\/microsofts-youtube-channel-has-been-hacked\/<\/a>).<\/p>\n<h4>Des projets \u00e0 ne pas sous-estimer<\/h4>\n<p>La facilit\u00e9 d\u2019utilisation des r\u00e9seaux sociaux par les m\u00e9tiers leur permet de lancer des initiatives sans aucune aide de la DSI ou du RSSI. Pourtant, il s\u2019agit d\u2019un projet comme un autre, m\u00eame si l\u2019outil utilis\u00e9 est en libre-service\u00a0! Il est donc primordial que les \u00e9quipes s\u00e9curit\u00e9 soient inform\u00e9es et qu\u2019elles sensibilisent et appuient les m\u00e9tiers sur leurs actions relatives aux r\u00e9seaux sociaux\u00a0: guide de param\u00e9trage d\u2019une page, r\u00e8gles de gestion des acc\u00e8s, etc.<\/p>\n<h4>Apr\u00e8s la charte administrateur, la charte \u00ab\u00a0Community Manager\u00a0\u00bb<\/h4>\n<p>Au-del\u00e0 de l\u2019administration \u00ab\u00a0technique\u00a0\u00bb du compte ou de la page, les m\u00e9tiers doivent \u00eatre conscients de l\u2019importance d\u2019une animation r\u00e9guli\u00e8re pour \u00e9viter les pages \u00e0 l\u2019abandon. Cette d\u00e9marche de \u00ab\u00a0community management\u00a0\u00bb permet d\u2019assurer une ma\u00eetrise du discours vers les clients et de g\u00e9rer les interactions avec eux au quotidien, mais aussi d\u2019assurer la s\u00e9curit\u00e9 gr\u00e2ce \u00e0 la sensibilisation et la responsabilisation des gestionnaires de communaut\u00e9 sur la confidentialit\u00e9 du mot de passe, la gestion du contenu, des abonn\u00e9s, la d\u00e9connexion, etc. Autant de th\u00e8mes qui justifient la cr\u00e9ation d\u2019une charte des gestionnaires de r\u00e9seaux sociaux au sein de l\u2019entreprise, qui formalise leurs r\u00f4les et responsabilit\u00e9s.<\/p>\n<h4>Des outils d\u00e9di\u00e9s et s\u00e9curis\u00e9s de gestion de communaut\u00e9<\/h4>\n<p>En compl\u00e9ment de la charte et de la sensibilisation, des outils viennent maintenant au secours des m\u00e9tiers et des RSSI pour \u00e9viter les mauvaises pratiques comme le partage du mot de passe d\u2019acc\u00e8s \u00e0 un compte ou une page \u00e0 tout le service\u00a0: les cas de d\u00e9parts malheureux ont d\u00e9j\u00e0 caus\u00e9 des incidents visibles (<a href=\"http:\/\/www.webmastertalkforums.com\/social-networks\/75948-mark-davidson-fires-employee-twitter-account-hacked.html\">http:\/\/www.webmastertalkforums.com\/social-networks\/75948-mark-davidson-fires-employee-twitter-account-hacked.html<\/a>)\u00a0! Heureusement, ces nouveaux outils de gestion de r\u00e9seaux sociaux en \u00e9quipe (par exemple CoTweet ou HootSuite) font enfin leur apparition et permettent de mettre en application des r\u00e8gles de s\u00e9curit\u00e9 \u00e9l\u00e9mentaires telles que la gestion des acc\u00e8s, la tra\u00e7abilit\u00e9, ou encore l\u2019imputabilit\u00e9 des actions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les r\u00e9seaux sociaux font partie de notre paysage quotidien : en France, 92% des internautes les utilisent tous les jours (source\u00a0: TNS Sofres 2011). \u00a0Apr\u00e8s avoir s\u00e9duit des millions d\u2019internautes, Facebook, Google+, Twitter ou encore LinkedIn poussent la porte des&#8230;<\/p>\n","protected":false},"author":14,"featured_media":3386,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[106,310],"coauthors":[782],"class_list":["post-1243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-reseaux-sociaux","tag-risque"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 et r\u00e9seaux sociaux : ma\u00eetriser l\u2019exposition de l\u2019entreprise - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 et r\u00e9seaux sociaux : ma\u00eetriser l\u2019exposition de l\u2019entreprise - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Les r\u00e9seaux sociaux font partie de notre paysage quotidien : en France, 92% des internautes les utilisent tous les jours (source\u00a0: TNS Sofres 2011). \u00a0Apr\u00e8s avoir s\u00e9duit des millions d\u2019internautes, Facebook, Google+, Twitter ou encore LinkedIn poussent la porte des...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-01-30T09:10:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-30T17:10:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/03\/Fotolia_43983645_ampoule1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"215\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marion Couturier\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marion Couturier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/\"},\"author\":{\"name\":\"Marion Couturier\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92\"},\"headline\":\"S\u00e9curit\u00e9 et r\u00e9seaux sociaux : ma\u00eetriser l\u2019exposition de l\u2019entreprise\",\"datePublished\":\"2012-01-30T09:10:07+00:00\",\"dateModified\":\"2019-12-30T17:10:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/\"},\"wordCount\":591,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/03\/Fotolia_43983645_ampoule1.jpg\",\"keywords\":[\"r\u00e9seaux sociaux\",\"Risque\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/\",\"name\":\"S\u00e9curit\u00e9 et r\u00e9seaux sociaux : ma\u00eetriser l\u2019exposition de l\u2019entreprise - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/03\/Fotolia_43983645_ampoule1.jpg\",\"datePublished\":\"2012-01-30T09:10:07+00:00\",\"dateModified\":\"2019-12-30T17:10:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/03\/Fotolia_43983645_ampoule1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/03\/Fotolia_43983645_ampoule1.jpg\",\"width\":573,\"height\":215},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 et r\u00e9seaux sociaux : ma\u00eetriser l\u2019exposition de l\u2019entreprise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92\",\"name\":\"Marion Couturier\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marion-couturier\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 et r\u00e9seaux sociaux : ma\u00eetriser l\u2019exposition de l\u2019entreprise - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/","og_locale":"en_US","og_type":"article","og_title":"S\u00e9curit\u00e9 et r\u00e9seaux sociaux : ma\u00eetriser l\u2019exposition de l\u2019entreprise - RiskInsight","og_description":"Les r\u00e9seaux sociaux font partie de notre paysage quotidien : en France, 92% des internautes les utilisent tous les jours (source\u00a0: TNS Sofres 2011). \u00a0Apr\u00e8s avoir s\u00e9duit des millions d\u2019internautes, Facebook, Google+, Twitter ou encore LinkedIn poussent la porte des...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/","og_site_name":"RiskInsight","article_published_time":"2012-01-30T09:10:07+00:00","article_modified_time":"2019-12-30T17:10:16+00:00","og_image":[{"width":573,"height":215,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/03\/Fotolia_43983645_ampoule1.jpg","type":"image\/jpeg"}],"author":"Marion Couturier","twitter_misc":{"Written by":"Marion Couturier","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/"},"author":{"name":"Marion Couturier","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92"},"headline":"S\u00e9curit\u00e9 et r\u00e9seaux sociaux : ma\u00eetriser l\u2019exposition de l\u2019entreprise","datePublished":"2012-01-30T09:10:07+00:00","dateModified":"2019-12-30T17:10:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/"},"wordCount":591,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/03\/Fotolia_43983645_ampoule1.jpg","keywords":["r\u00e9seaux sociaux","Risque"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/","name":"S\u00e9curit\u00e9 et r\u00e9seaux sociaux : ma\u00eetriser l\u2019exposition de l\u2019entreprise - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/03\/Fotolia_43983645_ampoule1.jpg","datePublished":"2012-01-30T09:10:07+00:00","dateModified":"2019-12-30T17:10:16+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/03\/Fotolia_43983645_ampoule1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/03\/Fotolia_43983645_ampoule1.jpg","width":573,"height":215},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/01\/securite-et-reseaux-sociaux-maitriser-lexposition-de-lentreprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 et r\u00e9seaux sociaux : ma\u00eetriser l\u2019exposition de l\u2019entreprise"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92","name":"Marion Couturier","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marion-couturier\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=1243"}],"version-history":[{"count":11,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1243\/revisions"}],"predecessor-version":[{"id":1251,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1243\/revisions\/1251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/3386"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=1243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=1243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=1243"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=1243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}