{"id":1719,"date":"2012-04-05T09:06:11","date_gmt":"2012-04-05T08:06:11","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=1719"},"modified":"2019-12-31T12:14:41","modified_gmt":"2019-12-31T11:14:41","slug":"windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/","title":{"rendered":"Windows 8 : des \u00e9volutions s\u00e9curit\u00e9 \u00e0 court terme, une r\u00e9volution \u00e0 long terme ?"},"content":{"rendered":"<p>Un mois apr\u00e8s la sortie de la <em>Consumer Preview<\/em> de Windows 8, les premiers retours semblent indiquer un v\u00e9ritable renouveau de l\u2019exp\u00e9rience utilisateur, notamment gr\u00e2ce \u00e0 l\u2019interface Metro.<\/p>\n<p>Qu\u2019en est-il des aspects s\u00e9curit\u00e9 de la derni\u00e8re mouture de l\u2019OS\u00a0?<\/p>\n<p>Les deux versions pr\u00e9c\u00e9dentes (Vista et Windows 7) avaient fait l\u2019objet d\u2019une communication s\u00e9curit\u00e9 appuy\u00e9e.<\/p>\n<p>Windows 8 ne d\u00e9roge pas \u00e0 la r\u00e8gle, et de nombreux d\u00e9tails sont d\u2019ores et d\u00e9j\u00e0 connus\u00a0: Microsoft annonce plusieurs \u00e9volutions substantielles des outils de protection, mais ce n\u2019est pas l\u00e0 que se trouve la vraie r\u00e9volution qui se pr\u00e9pare.<\/p>\n<h2>Des \u00e9volutions et de nouvelles fonctions de s\u00e9curit\u00e9<\/h2>\n<p>Tout d\u2019abord, les m\u00e9canismes existants sont presque tous am\u00e9lior\u00e9s (chiffrement BitLocker, contr\u00f4le des logiciels AppLocker, ainsi que l\u2019ASLR qui charge le syst\u00e8me dans des zones m\u00e9moire al\u00e9atoires pour \u00e9viter les attaques). L\u2019antimalware Windows Defender sera capable de d\u00e9tecter de nouveaux types de logiciels malveillants, et le navigateur Internet Explorer 10 gagnera en robustesse.<\/p>\n<p>Ces annonces ne changeront pas \u00e0 elles seules le paysage s\u00e9curitaire de Windows. Une fonction faisant son apparition m\u00e9ritera tout de m\u00eame une attention particuli\u00e8re\u00a0: <em>Windows-to-Go<\/em>.<\/p>\n<p>Elle permettra d\u2019utiliser une version portative du poste de travail Windows 8 de l\u2019entreprise, sur cl\u00e9 USB. Les opportunit\u00e9s d\u2019usage sont multiples\u00a0: fourniture d\u2019un \u00ab\u00a0poste virtuel\u00a0\u00bb entreprise aux prestataires \u00e0 moindre co\u00fbt, tests applicatifs, cl\u00e9s pr\u00eates \u00e0 l\u2019usage en cas de d\u00e9clenchement d\u2019un plan de continuit\u00e9 informatique\u2026 Il s\u2019agit m\u00eame d\u2019une r\u00e9ponse possible aux probl\u00e9matiques de <a href=\"http:\/\/www.solucominsight.fr\/2012\/03\/byod-ou-en-sont-les-entreprises\/\" target=\"_blank\" rel=\"noopener noreferrer\">BYOD<\/a>.<\/p>\n<p>Malgr\u00e9 ces \u00e9volutions, les cellules de veille et de gestion de la s\u00e9curit\u00e9, ainsi que les \u00e9diteurs de solutions ont encore de beaux jours devant eux\u00a0: les failles de s\u00e9curit\u00e9 ne dispara\u00eetront pas par magie \u00e0 court terme\u00a0!<\/p>\n<h2>Un renouveau par les fondamentaux<\/h2>\n<p>La base de l\u2019OS a cependant pris un tournant significatif vers une s\u00e9curit\u00e9 plus moderne.<\/p>\n<p>Si l\u2019on peut se f\u00e9liciter des am\u00e9liorations apport\u00e9es aux fonctions de s\u00e9curit\u00e9, il faut reconna\u00eetre que d\u2019autres changements touchant au fonctionnement-m\u00eame de Windows, vont \u00eatre les porteurs d\u2019une s\u00e9curit\u00e9 \u00ab\u00a0by design\u00a0\u00bb, moins monolithique, et int\u00e9gr\u00e9e au c\u0153ur du syst\u00e8me.<\/p>\n<p>Windows 8 adopte en effet une approche qui rappelle celles des principales plates-formes mobiles du moment\u00a0:<\/p>\n<ul>\n<li>L\u2019utilisation d\u2019un \u00ab\u00a0magasin\u00a0\u00bb d\u2019applications v\u00e9rifi\u00e9es, qui va tendre \u00e0 assainir l\u2019\u00e9cosyst\u00e8me Windows, en tentant de trouver un \u00e9quilibre entre contr\u00f4le des applications et libert\u00e9 d\u2019installation.<\/li>\n<li>Une\u00a0 isolation inter-applicative permettant d\u2019\u00e9viter qu\u2019un programme malveillant en contamine un autre.<\/li>\n<li>Le <em>Secure Boot<\/em>, m\u00e9canisme n\u2019autorisant Windows \u00e0 se lancer que si la s\u00e9quence de d\u00e9marrage est v\u00e9rifi\u00e9e comme \u00e9tant\u00a0 int\u00e8gre, offre une piste de r\u00e9ponse aux <em>rootkits<\/em> (ces virus furtifs qui s\u2019installent dans les couches basses du syst\u00e8me, et qui ont caus\u00e9 des d\u00e9g\u00e2ts dans plusieurs grandes soci\u00e9t\u00e9s ces derni\u00e8res ann\u00e9es). Windows 8 abandonne par ailleurs l\u2019utilisation du BIOS historique, pour son successeur, l\u2019UEFI.<\/li>\n<\/ul>\n<p>C\u2019est ici que se joue le futur de la s\u00e9curit\u00e9 de l\u2019OS. Microsoft tente ainsi de se mettre \u00e0 la page, y compris dans le monde de la mobilit\u00e9 apr\u00e8s le d\u00e9marrage poussif de Windows Phone 7.<\/p>\n<p>La disponibilit\u00e9 de Windows 8 sur les PC et tablettes (peut-\u00eatre les <em>smartphones<\/em>\u00a0?) sera donc un argument de poids, en particulier pour les entreprises souhaitant \u00e9viter une trop grande fragmentation de leur parc, et donc de leur s\u00e9curit\u00e9.<\/p>\n<p>Reste un obstacle de taille\u00a0: la r\u00e9trocompatibilit\u00e9. M\u00eame si Microsoft fait des efforts importants dans ce domaine, il faudra <em>a minima<\/em> des ann\u00e9es pour que le parc, mat\u00e9riel mais surtout applicatif (en particulier les applications m\u00e9tier) s\u2019adapte \u00e0 ce mod\u00e8le de s\u00e9curit\u00e9, qui est donc plut\u00f4t une cible \u00e0 long terme.<\/p>\n<p>En attendant la sortie du syst\u00e8me \u00e0 l\u2019automne, il est d\u00e9j\u00e0 possible de le tester facilement, par exemple sur une machine virtuelle, et se faire son avis sur les avanc\u00e9es et les opportunit\u00e9s \u00e0 venir\u00a0!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un mois apr\u00e8s la sortie de la Consumer Preview de Windows 8, les premiers retours semblent indiquer un v\u00e9ritable renouveau de l\u2019exp\u00e9rience utilisateur, notamment gr\u00e2ce \u00e0 l\u2019interface Metro. Qu\u2019en est-il des aspects s\u00e9curit\u00e9 de la derni\u00e8re mouture de l\u2019OS\u00a0? Les&#8230;<\/p>\n","protected":false},"author":13,"featured_media":3381,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[434,1070,436,3302,404],"coauthors":[801],"class_list":["post-1719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-evolution","tag-outillage","tag-rootkits","tag-security-architecture","tag-windows-8"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Windows 8 : des \u00e9volutions s\u00e9curit\u00e9 \u00e0 court terme, une r\u00e9volution \u00e0 long terme ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows 8 : des \u00e9volutions s\u00e9curit\u00e9 \u00e0 court terme, une r\u00e9volution \u00e0 long terme ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Un mois apr\u00e8s la sortie de la Consumer Preview de Windows 8, les premiers retours semblent indiquer un v\u00e9ritable renouveau de l\u2019exp\u00e9rience utilisateur, notamment gr\u00e2ce \u00e0 l\u2019interface Metro. Qu\u2019en est-il des aspects s\u00e9curit\u00e9 de la derni\u00e8re mouture de l\u2019OS\u00a0? Les...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-04-05T08:06:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:14:41+00:00\" \/>\n<meta name=\"author\" content=\"Chadi Hantouche\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chadi Hantouche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/\"},\"author\":{\"name\":\"Chadi Hantouche\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\"},\"headline\":\"Windows 8 : des \u00e9volutions s\u00e9curit\u00e9 \u00e0 court terme, une r\u00e9volution \u00e0 long terme ?\",\"datePublished\":\"2012-04-05T08:06:11+00:00\",\"dateModified\":\"2019-12-31T11:14:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/\"},\"wordCount\":728,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"\u00e9volution\",\"outillage\",\"rootkits\",\"security architecture\",\"windows 8\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/\",\"name\":\"Windows 8 : des \u00e9volutions s\u00e9curit\u00e9 \u00e0 court terme, une r\u00e9volution \u00e0 long terme ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2012-04-05T08:06:11+00:00\",\"dateModified\":\"2019-12-31T11:14:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows 8 : des \u00e9volutions s\u00e9curit\u00e9 \u00e0 court terme, une r\u00e9volution \u00e0 long terme ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\",\"name\":\"Chadi Hantouche\",\"description\":\"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows 8 : des \u00e9volutions s\u00e9curit\u00e9 \u00e0 court terme, une r\u00e9volution \u00e0 long terme ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/","og_locale":"en_US","og_type":"article","og_title":"Windows 8 : des \u00e9volutions s\u00e9curit\u00e9 \u00e0 court terme, une r\u00e9volution \u00e0 long terme ? - RiskInsight","og_description":"Un mois apr\u00e8s la sortie de la Consumer Preview de Windows 8, les premiers retours semblent indiquer un v\u00e9ritable renouveau de l\u2019exp\u00e9rience utilisateur, notamment gr\u00e2ce \u00e0 l\u2019interface Metro. Qu\u2019en est-il des aspects s\u00e9curit\u00e9 de la derni\u00e8re mouture de l\u2019OS\u00a0? Les...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/","og_site_name":"RiskInsight","article_published_time":"2012-04-05T08:06:11+00:00","article_modified_time":"2019-12-31T11:14:41+00:00","author":"Chadi Hantouche","twitter_misc":{"Written by":"Chadi Hantouche","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/"},"author":{"name":"Chadi Hantouche","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc"},"headline":"Windows 8 : des \u00e9volutions s\u00e9curit\u00e9 \u00e0 court terme, une r\u00e9volution \u00e0 long terme ?","datePublished":"2012-04-05T08:06:11+00:00","dateModified":"2019-12-31T11:14:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/"},"wordCount":728,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#primaryimage"},"thumbnailUrl":"","keywords":["\u00e9volution","outillage","rootkits","security architecture","windows 8"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/","name":"Windows 8 : des \u00e9volutions s\u00e9curit\u00e9 \u00e0 court terme, une r\u00e9volution \u00e0 long terme ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#primaryimage"},"thumbnailUrl":"","datePublished":"2012-04-05T08:06:11+00:00","dateModified":"2019-12-31T11:14:41+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/04\/windows-8-des-evolutions-securite-a-court-terme-une-revolution-a-long-terme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Windows 8 : des \u00e9volutions s\u00e9curit\u00e9 \u00e0 court terme, une r\u00e9volution \u00e0 long terme ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc","name":"Chadi Hantouche","description":"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=1719"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1719\/revisions"}],"predecessor-version":[{"id":12475,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1719\/revisions\/12475"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=1719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=1719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=1719"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=1719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}