{"id":12598,"date":"2020-01-29T14:58:45","date_gmt":"2020-01-29T13:58:45","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=12598"},"modified":"2021-07-12T09:54:59","modified_gmt":"2021-07-12T08:54:59","slug":"radar-du-rssi-3-3-tendances-2020","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/","title":{"rendered":"Radar du RSSI (3\/3) \u2013 Quelles tendances anticiper en 2020 et au-del\u00e0 ?"},"content":{"rendered":"<p><em>Apr\u00e8s avoir pr\u00e9sent\u00e9 le radar du RSSI 2020 et sa m\u00e9thodologie de construction, les chantiers majeurs \u00e0 lancer durant l\u2019ann\u00e9e ont \u00e9t\u00e9 expos\u00e9s. Il est temps d\u00e9sormais d\u2019analyser les tendances pour l\u2019avenir de la fili\u00e8re cybers\u00e9curit\u00e9.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>L\u2019analyse de risque orient\u00e9e sur la menace<\/h2>\n<p>Historiquement centr\u00e9e sur l\u2019identification et la protection des actifs les plus critiques des organisations, l\u2019analyse de risque est en train de conna\u00eetre une \u00e9volution importante en se recentrant sur la prise en compte des attaquants, de leurs moyens et de leurs motivations. Cette \u00e9volution permet une meilleure appropriation des r\u00e9sultats et une concr\u00e9tisation plus claire des risques pour les m\u00e9tiers. En France, cette \u00e9volution se caract\u00e9rise par la publication de la m\u00e9thodologie EBIOS RM. Elle va requ\u00e9rir de mettre \u00e0 jour les processus et de changer les habitudes pour en tirer pleinement partie.<\/p>\n<p>&nbsp;<\/p>\n<h2>La s\u00e9curisation des produits<\/h2>\n<p>Ce sera en particulier le cas dans le secteur manufacturier, du fait de la connexion d\u2019objets existants (voitures, trains, \u00e9lectrom\u00e9nager, \u00e9quipements industriels\u2026) ou de la cr\u00e9ation de nouveaux objets connect\u00e9s. Apr\u00e8s l\u2019apparition des fili\u00e8res d\u00e9di\u00e9es \u00e0 la s\u00e9curit\u00e9 des SI industriels pour prot\u00e9ger l\u2019outil de production, les sentent le besoin de s\u00e9curiser les produits vendus \u00e0 leurs clients.<\/p>\n<p>Parfois car elles ont connu des attaques visant leurs produits, souvent car leurs clients exigent dans le cadre des appels d\u2019offres un niveau de s\u00e9curit\u00e9 particulier voire une certification. L\u2019initialisation d\u2019une telle d\u00e9marche passe par la cr\u00e9ation d\u2019un nouveau poste, le \u00ab product security officer \u00bb dont le positionnement dans l\u2019organigramme de l\u2019organisation reste encore \u00e0 stabiliser.<\/p>\n<p>&nbsp;<\/p>\n<h2>Le partage inter-communaut\u00e9s autour de la cr\u00e9ation de lieux Totem<\/h2>\n<p>Des projets sont en cours et devraient voir le jour en 2020 ou 2021, en France avec le CyberCampus, \u00e0 New-York avec le projet CyberNYC ou encore au Royaume-Uni avec CyNam. Toutes ces initiatives visent \u00e0 structurer l\u2019\u00e9cosyst\u00e8me public, priv\u00e9, acad\u00e9mique, et innovation afin de le faire foisonner et d\u2019en tirer le meilleur parti.<\/p>\n<p>&nbsp;<\/p>\n<h2>Cloud, API, Gestion des identit\u00e9s : premi\u00e8res bases d\u2019un mod\u00e8le zero trust<\/h2>\n<p>Bien que la th\u00e9orie ne soit pas nouvelle, le \u00ab Z\u00e9ro-Trust \u00bb a le vent en poupe. Il vise \u00e0 construire un mod\u00e8le de s\u00e9curit\u00e9 permettant une approche de la s\u00e9curit\u00e9 sans fronti\u00e8re, s\u2019appliquant \u00e0 la fois sur les infrastructures de l\u2019organisation mais aussi sur celles de ses fournisseurs et partenaires. Celle-ci s\u2019appuie sur des standards permettant l\u2019\u00e9valuation en temps-r\u00e9el du niveau de s\u00e9curit\u00e9 et l\u2019application de mesures adapt\u00e9es au niveau de risque.<\/p>\n<p>S\u2019il ne pourra \u00eatre mis en place avant plusieurs ann\u00e9es, 2020 sera marqu\u00e9 par les premi\u00e8res \u00e9tudes techniques sur le sujet. En effet, le mod\u00e8le, th\u00e9oris\u00e9 depuis des ann\u00e9es, peut maintenant \u00eatre mis en \u0153uvre gr\u00e2ce \u00e0 des nouvelles solutions techniques. M\u00eame si tout n\u2019est pas parfait, des renforcements peuvent \u00eatre notamment envisag\u00e9s sur les trois pans suivants :<\/p>\n<ul>\n<li>Utilisation des fonctions de s\u00e9curit\u00e9 dans le cloud : aujourd\u2019hui par faute de comp\u00e9tences et de connaissance, les acc\u00e8s cloud b\u00e9n\u00e9ficient rarement des fonctions de s\u00e9curit\u00e9 avanc\u00e9es, pourtant propos\u00e9es par les offreurs majeurs du cloud.<\/li>\n<li>S\u00e9curisation des API : l\u2019API-fication du SI n\u00e9cessite d\u2019embarquer by design les fonctions de s\u00e9curit\u00e9 dans les services expos\u00e9s.<\/li>\n<li>Mont\u00e9e en maturit\u00e9 de la gestion des identit\u00e9s : condition sine qua non de la mise en place d\u2019un tel mod\u00e8le, les organisations doivent franchir un niveau de maturit\u00e9 dans la ma\u00eetrise des identit\u00e9s, notamment celles de leurs clients.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>L\u2019enjeu soci\u00e9t\u00e9 grandissant<\/h2>\n<p>Devant la crainte de plus en plus forte du grand public, l\u2019\u00e9volution des postures offensives des \u00e9tats, la multiplication des actes cybercriminels, l\u2019attention des r\u00e9gulateurs et des organismes de notation financi\u00e8re, la cybers\u00e9curit\u00e9 devient v\u00e9ritablement un crit\u00e8re d\u2019\u00e9valuation de la performance soci\u00e9tale de l\u2019organisation.<\/p>\n<p>Toutes ces \u00e9volutions poussent \u00e0 une prise en compte \u00e0 haut niveau de la cybers\u00e9curit\u00e9 dans la strat\u00e9gie de l\u2019organisation !<\/p>\n<p>Le RSSI peut \u00eatre un acteur d\u00e9terminant dans ce domaine et valoriser les efforts r\u00e9alis\u00e9s, pas uniquement pour prot\u00e9ger son organisation mais la valoriser aupr\u00e8s de ses clients et de la soci\u00e9t\u00e9 au sens large. Cela peut se concr\u00e9tiser par la r\u00e9alisation de s\u00e9ances de sensibilisation aupr\u00e8s des clients, par un appui op\u00e9rationnel aupr\u00e8s de ses fournisseurs TPE\/PME, par la participation \u00e0 des initiatives nationales comme le mois de la s\u00e9curit\u00e9. Toutes ces initiatives pourront ensuite \u00eatre valoris\u00e9es positivement dans la communication de l\u2019organisation, en particulier pourquoi pas dans son rapport annuel.<\/p>\n<p>L\u2019analyse men\u00e9e sur 260 rapports annuels \u00e0 l\u2019\u00e9chelle internationale en 2019 [4] montre que les efforts de communication ont commenc\u00e9 mais qu\u2019ils peuvent \u00eatre encore am\u00e9lior\u00e9s.<\/p>\n<p>&nbsp;<\/p>\n<h2>La s\u00e9curit\u00e9 de l\u2019intelligence artificielle<\/h2>\n<p>Les projets m\u00e9tiers se multiplient mais la mise en place de mesures de s\u00e9curit\u00e9 sp\u00e9cifiques au machine learning reste encore confidentielle. Les premi\u00e8res vuln\u00e9rabilit\u00e9s sont pourtant clairement d\u00e9montr\u00e9es, que ce soit pour empoisonner une IA, lui soutirer des informations ou encore lui faire reconna\u00eetre certaines choses pour d\u2019autres.<\/p>\n<p>Pour \u00e9viter de construire un futur trop risqu\u00e9, il va \u00eatre important pour les fili\u00e8res SSI d\u2019aller \u00e0 la rencontre des \u00e9quipes innovation, data science ou encore fraude, pour \u00e9voquer avec elles comment elles envisagent la r\u00e9sistance de leurs syst\u00e8mes \u00e0 une attaque cyber. Des solutions existent pour contrer ces vuln\u00e9rabilit\u00e9s, des plus simples (liste blanche, liste noire\u2026) aux plus complexes, en passant par l\u2019utilisation de moteur d\u2019IA d\u00e9tectant les tentatives de d\u00e9viation des mod\u00e8les.<\/p>\n<p>&nbsp;<\/p>\n<h2>Le confidential computing<\/h2>\n<p>V\u00e9ritable graal de la cybers\u00e9curit\u00e9, derri\u00e8re ce terme se cache l\u2019ensemble des technologies permettant d\u2019ex\u00e9cuter des traitements dans des environnements non ma\u00eetris\u00e9s mais de mani\u00e8re s\u00e9curis\u00e9e. La technologie la plus prometteuse restant le chiffrement homomorphique qui permet la r\u00e9alisation de traitements directement sur des donn\u00e9es chiffr\u00e9es, sans avoir \u00e0 les d\u00e9chiffrer !<\/p>\n<p>Moins ambitieux mais fonctionnant d\u00e9j\u00e0 aujourd\u2019hui, l\u2019utilisation d\u2019enclaves s\u00e9curis\u00e9es permet de r\u00e9duire certains risques de fuite. De mani\u00e8re g\u00e9n\u00e9rale, ces solutions permettront de lever de nombreux freins dans les migrations vers le cloud. Le march\u00e9 se structure avec la cr\u00e9ation r\u00e9cente du \u00ab Confidential Computing Consortium \u00bb, des annonces r\u00e9centes de Microsoft dans Azure ou encore l\u2019arriv\u00e9e de la startup fran\u00e7aise Cosmian.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apr\u00e8s avoir pr\u00e9sent\u00e9 le radar du RSSI 2020 et sa m\u00e9thodologie de construction, les chantiers majeurs \u00e0 lancer durant l\u2019ann\u00e9e ont \u00e9t\u00e9 expos\u00e9s. Il est temps d\u00e9sormais d\u2019analyser les tendances pour l\u2019avenir de la fili\u00e8re cybers\u00e9curit\u00e9. &nbsp; L\u2019analyse de risque&#8230;<\/p>\n","protected":false},"author":15,"featured_media":12586,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3222,36],"tags":[105,3076,181,447,3455],"coauthors":[837,807,3091],"class_list":["post-12598","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy","category-cybersecurity-digital-trust","tag-gouvernance","tag-radar","tag-rssi","tag-strategie","tag-tendances"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Radar du RSSI (3\/3) - Quelles tendances anticiper en 2020 et au-del\u00e0 ?<\/title>\n<meta name=\"description\" content=\"Apr\u00e8s avoir pr\u00e9sent\u00e9 le radar du RSSI 2020 et les chantiers majeurs \u00e0 lancer durant l\u2019ann\u00e9e, il est temps d\u2019analyser les tendances d&#039;avenir de la fili\u00e8re.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Radar du RSSI (3\/3) - Quelles tendances anticiper en 2020 et au-del\u00e0 ?\" \/>\n<meta property=\"og:description\" content=\"Apr\u00e8s avoir pr\u00e9sent\u00e9 le radar du RSSI 2020 et les chantiers majeurs \u00e0 lancer durant l\u2019ann\u00e9e, il est temps d\u2019analyser les tendances d&#039;avenir de la fili\u00e8re.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-29T13:58:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T08:54:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois, Gabriel Amirault, Ana\u00efs Etienne\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois, Gabriel Amirault, Ana\u00efs Etienne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Radar du RSSI (3\/3) \u2013 Quelles tendances anticiper en 2020 et au-del\u00e0 ?\",\"datePublished\":\"2020-01-29T13:58:45+00:00\",\"dateModified\":\"2021-07-12T08:54:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/\"},\"wordCount\":1158,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw-scaled.jpg\",\"keywords\":[\"gouvernance\",\"radar\",\"RSSI\",\"strat\u00e9gie\",\"tendances\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/\",\"name\":\"Radar du RSSI (3\/3) - Quelles tendances anticiper en 2020 et au-del\u00e0 ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw-scaled.jpg\",\"datePublished\":\"2020-01-29T13:58:45+00:00\",\"dateModified\":\"2021-07-12T08:54:59+00:00\",\"description\":\"Apr\u00e8s avoir pr\u00e9sent\u00e9 le radar du RSSI 2020 et les chantiers majeurs \u00e0 lancer durant l\u2019ann\u00e9e, il est temps d\u2019analyser les tendances d'avenir de la fili\u00e8re.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw-scaled.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"flat design for team work concept over yellow\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Radar du RSSI (3\/3) \u2013 Quelles tendances anticiper en 2020 et au-del\u00e0 ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Radar du RSSI (3\/3) - Quelles tendances anticiper en 2020 et au-del\u00e0 ?","description":"Apr\u00e8s avoir pr\u00e9sent\u00e9 le radar du RSSI 2020 et les chantiers majeurs \u00e0 lancer durant l\u2019ann\u00e9e, il est temps d\u2019analyser les tendances d'avenir de la fili\u00e8re.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/","og_locale":"en_US","og_type":"article","og_title":"Radar du RSSI (3\/3) - Quelles tendances anticiper en 2020 et au-del\u00e0 ?","og_description":"Apr\u00e8s avoir pr\u00e9sent\u00e9 le radar du RSSI 2020 et les chantiers majeurs \u00e0 lancer durant l\u2019ann\u00e9e, il est temps d\u2019analyser les tendances d'avenir de la fili\u00e8re.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/","og_site_name":"RiskInsight","article_published_time":"2020-01-29T13:58:45+00:00","article_modified_time":"2021-07-12T08:54:59+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw-scaled.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois, Gabriel Amirault, Ana\u00efs Etienne","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois, Gabriel Amirault, Ana\u00efs Etienne","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Radar du RSSI (3\/3) \u2013 Quelles tendances anticiper en 2020 et au-del\u00e0 ?","datePublished":"2020-01-29T13:58:45+00:00","dateModified":"2021-07-12T08:54:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/"},"wordCount":1158,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw-scaled.jpg","keywords":["gouvernance","radar","RSSI","strat\u00e9gie","tendances"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/","name":"Radar du RSSI (3\/3) - Quelles tendances anticiper en 2020 et au-del\u00e0 ?","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw-scaled.jpg","datePublished":"2020-01-29T13:58:45+00:00","dateModified":"2021-07-12T08:54:59+00:00","description":"Apr\u00e8s avoir pr\u00e9sent\u00e9 le radar du RSSI 2020 et les chantiers majeurs \u00e0 lancer durant l\u2019ann\u00e9e, il est temps d\u2019analyser les tendances d'avenir de la fili\u00e8re.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw-scaled.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Fotolia_69576340_Subscription_Monthly_XXL-flat-design-for-team-work-concept\u00a9-kchungtw-scaled.jpg","width":2560,"height":2560,"caption":"flat design for team work concept over yellow"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/radar-du-rssi-3-3-tendances-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Radar du RSSI (3\/3) \u2013 Quelles tendances anticiper en 2020 et au-del\u00e0 ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=12598"}],"version-history":[{"count":1,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12598\/revisions"}],"predecessor-version":[{"id":12599,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12598\/revisions\/12599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/12586"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=12598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=12598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=12598"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=12598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}