{"id":2053,"date":"2012-07-25T07:50:12","date_gmt":"2012-07-25T06:50:12","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=2053"},"modified":"2019-12-31T12:08:33","modified_gmt":"2019-12-31T11:08:33","slug":"management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/","title":{"rendered":"Management des risques : comment mettre en place une organisation de gestion des risques ?"},"content":{"rendered":"<p>Les pr\u00e9c\u00e9dents articles consacr\u00e9s \u00e0 la th\u00e9matique de la gestion des risques nous ont permis de d\u00e9crire un mod\u00e8le d&#8217;organisation facilitant une gestion des risques int\u00e9gr\u00e9e : la &#8220;tour de contr\u00f4le&#8221;.\u00a0 Dans ce dernier article, nous aborderons la question de sa mise en place,\u00a0 que l&#8217;on peut d\u00e9couper en 4 \u00e9tapes :\u00a0 utilisation d\u2019une \u00e9chelle commune, d\u00e9finition d\u2019un portefeuille de risques,\u00a0 optimisation du travail avec les m\u00e9tiers et mise en commun des plans d\u2019actions.<\/p>\n<h2>\u00c9tape 1 : utiliser une \u00e9chelle commune, un pr\u00e9-requis \u00e0 la d\u00e9marche<\/h2>\n<p>Disposer d\u2019une \u00e9chelle commune visant \u00e0 mesurer les risques semble une \u00e9vi\u00addence. Pourtant, il est rare que cette bonne pratique soit en place, ce qui complexifie la collaboration entre les fili\u00e8res. Cette lacune rend impossible une lecture d\u2019ensemble des cartogra\u00adphies des risques \u00e9labor\u00e9es. C\u2019est donc la pre\u00admi\u00e8re \u00e9tape pour int\u00e9grer les fili\u00e8res\u00a0! La collecte des \u00e9chelles en vigueur, leur analyse et la rencontre des porteurs des fili\u00e8res doivent permettre d\u2019iden\u00adtifier les points de d\u00e9pendance cl\u00e9s.<\/p>\n<p>Cette phase d\u2019analyse pass\u00e9e, il s\u2019agit ensuite de construire les \u00e9chelles cibles, en trouvant un compromis entre les visions des diff\u00e9rents acteurs. L\u2019atteinte d\u2019un consensus n\u2019est pas toujours ais\u00e9e, mais il est n\u00e9cessaire de rester ferme sur l\u2019utilisation d\u2019une \u00e9chelle commune pour permettre la suite de la d\u00e9marche.<\/p>\n<h2>\u00c9tape 2 &#8211; Construire un portefeuille de risques : un r\u00e9f\u00e9rentiel de pilotage unique<\/h2>\n<p>La constitution d\u2019un portefeuille de risques commence par l\u2019analyse de l\u2019existant : quels sont les objectifs de chacun ? Quels types de risques sont trait\u00e9s ? Cette premi\u00e8re \u00e9tape permet de structurer les types de risques g\u00e9r\u00e9s au sein de grands domaines constituant le portefeuille, dans une logique de \u00ab catalogue \u00bb de risques g\u00e9n\u00e9riques.<\/p>\n<p>Il convient ensuite d\u2019identifier les zones de recouvrement. En effet, il est bien souvent impossible de posi\u00adtionner un risque dans une seule et unique fili\u00e8re. Une fois ces recouvrements identifi\u00e9s, il devient possible de formaliser les responsa\u00adbilit\u00e9s sur ces risques pour \u00e9viter, dans le meilleur des cas, un travail redondant et dans le pire des cas des d\u00e9marches contradictoires.<\/p>\n<h2>\u00c9tape 3 : transformer la relation avec les m\u00e9tiers<\/h2>\n<p>Les m\u00e9tiers souffrent des nombreuses sollicitations des fili\u00e8res risques qui cr\u00e9ent une lassitude et leur rejet. La coordination et l\u2019optimisation de la relation avec les m\u00e9tiers est donc un enjeu majeur, l\u2019objectif \u00e9tant de repositionner les fili\u00e8res risques en conseillers et non en demandeurs.<\/p>\n<p>Plusieurs leviers d\u2019optimisation sont \u00e0 mettre en \u0153uvre\u00a0:<\/p>\n<ul>\n<li>\u00a0Le travail sur les zones d\u2019adh\u00e9rence des risques doit \u00eatre remis \u00e0 profit pour anticiper les redondances et les contourner au tra\u00advers d\u2019entretiens ou de questionnaires communs sur ces p\u00e9rim\u00e8tres.<\/li>\n<li>L\u2019\u00e9change des informations collect\u00e9es aupr\u00e8s des m\u00e9tiers doit permettre d\u2019enrichir la r\u00e9flexion de tous et de garantir une sollicitation efficace des m\u00e9tiers.<\/li>\n<li>La mutualisation de la restitu\u00adtion et du <em>reporting<\/em> doit permettre la mise en perspective des risques et les \u00e9ventuels arbitrages lors de la valida\u00adtion des risques.<\/li>\n<\/ul>\n<h2>\u00c9tape 4 : partager les plans d\u2019actions<\/h2>\n<p>En int\u00e9grant la vision des risques, la d\u00e9finition des plans d\u2019ac\u00adtions est plus simple \u00e0 optimiser. Les actions identifi\u00e9es par chaque fili\u00e8re sont partag\u00e9es, des synergies peu\u00advent \u00eatre d\u00e9gag\u00e9es et les budgets mieux allou\u00e9s sur l\u2019ensemble du p\u00e9rim\u00e8tre :<\/p>\n<ul>\n<li>Les actions de r\u00e9duction des risques sur les zones d\u2019adh\u00e9\u00adrence peuvent ainsi \u00eatre d\u00e9fi\u00adnies coll\u00e9gialement, chaque fili\u00e8re traitant d\u2019une compo\u00adsante du risque ;<\/li>\n<li>Les actions redondantes, voire contradictoires, peuvent \u00eatre identifi\u00e9es et arbitr\u00e9es.<\/li>\n<\/ul>\n<p>Chaque fili\u00e8re dispose alors de sa feuille de route projet, dont elle porte la mise en \u0153uvre et\/ou le suivi selon les cas. Un suivi r\u00e9gu\u00adlier et commun doit alors \u00eatre mis en place, afin de mesurer l\u2019\u00e9volution du niveau de risque en int\u00e9grant l\u2019en\u00adsemble des composantes des plans de traitement.<\/p>\n<p>La d\u00e9marche de gestion des risques SI se doit donc d\u2019\u00eatre transverse : c\u2019est seulement en avan\u00e7ant ensemble vers une organisation int\u00e9gr\u00e9e et en se dotant d\u2019outils partag\u00e9s que la ma\u00eetrise globale des risques pourra s\u2019am\u00e9liorer. La transformation des fili\u00e8res n\u00e9cessitera une mise en \u0153uvre progressive en s\u2019appuyant sur les p\u00e9rim\u00e8tres les plus m\u00fbrs pour amorcer la dynamique et ensuite \u00e9tendre la d\u00e9marche \u00e0 d\u2019autres domaines de risques. Comme tous les changements d\u2019organisation associ\u00e9s, elle n\u00e9cessitera un accompagnement par une conduite du changement.<\/p>\n<p>Lire les pr\u00e9c\u00e9dents articles <a title=\"Management des risques\u00a0: une gestion des risques SI au c\u0153ur de l\u2019innovation et des m\u00e9tiers\" href=\"http:\/\/www.solucominsight.fr\/2012\/07\/une-gestion-des-risques-si-au-coeur-de-linnovation-et-des-metiers\/\">une gestion des risques SI au c\u0153ur de l\u2019innovation et des m\u00e9tiers<\/a> et <a title=\"Management des risques : casser les silos en articulant les fili\u00e8res de gestion de risques\" href=\"http:\/\/www.solucominsight.fr\/2012\/07\/management-des-risques-casser-les-silos-en-articulant-les-filieres-de-gestion-de-risques\/\">casser les silos en articulant les fili\u00e8res de gestion de risques<\/a>.<\/p>\n<p>Pour en savoir plus, vous pouvez \u00e9galement consulter notre synth\u00e8se :\u00a0 <a href=\"http:\/\/www.solucom.fr\/Publications\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Management des risques : plaidoyer pour une vision unifi\u00e9e&#8221;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les pr\u00e9c\u00e9dents articles consacr\u00e9s \u00e0 la th\u00e9matique de la gestion des risques nous ont permis de d\u00e9crire un mod\u00e8le d&#8217;organisation facilitant une gestion des risques int\u00e9gr\u00e9e : la &#8220;tour de contr\u00f4le&#8221;.\u00a0 Dans ce dernier article, nous aborderons la question de&#8230;<\/p>\n","protected":false},"author":15,"featured_media":6344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3222,36],"tags":[70,3304,310],"coauthors":[837],"class_list":["post-2053","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy","category-cybersecurity-digital-trust","tag-gestion-des-risques","tag-risk-management-strategy-governance","tag-risque"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Management des risques : comment mettre en place une organisation de gestion des risques ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Management des risques : comment mettre en place une organisation de gestion des risques ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Les pr\u00e9c\u00e9dents articles consacr\u00e9s \u00e0 la th\u00e9matique de la gestion des risques nous ont permis de d\u00e9crire un mod\u00e8le d&#8217;organisation facilitant une gestion des risques int\u00e9gr\u00e9e : la &#8220;tour de contr\u00f4le&#8221;.\u00a0 Dans ce dernier article, nous aborderons la question de...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-07-25T06:50:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:08:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Management des risques : comment mettre en place une organisation de gestion des risques ?\",\"datePublished\":\"2012-07-25T06:50:12+00:00\",\"dateModified\":\"2019-12-31T11:08:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/\"},\"wordCount\":875,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"keywords\":[\"Gestion des risques\",\"Risk management\",\"Risque\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/\",\"name\":\"Management des risques : comment mettre en place une organisation de gestion des risques ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"datePublished\":\"2012-07-25T06:50:12+00:00\",\"dateModified\":\"2019-12-31T11:08:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Management des risques : comment mettre en place une organisation de gestion des risques ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Management des risques : comment mettre en place une organisation de gestion des risques ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/","og_locale":"en_US","og_type":"article","og_title":"Management des risques : comment mettre en place une organisation de gestion des risques ? - RiskInsight","og_description":"Les pr\u00e9c\u00e9dents articles consacr\u00e9s \u00e0 la th\u00e9matique de la gestion des risques nous ont permis de d\u00e9crire un mod\u00e8le d&#8217;organisation facilitant une gestion des risques int\u00e9gr\u00e9e : la &#8220;tour de contr\u00f4le&#8221;.\u00a0 Dans ce dernier article, nous aborderons la question de...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/","og_site_name":"RiskInsight","article_published_time":"2012-07-25T06:50:12+00:00","article_modified_time":"2019-12-31T11:08:33+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Management des risques : comment mettre en place une organisation de gestion des risques ?","datePublished":"2012-07-25T06:50:12+00:00","dateModified":"2019-12-31T11:08:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/"},"wordCount":875,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","keywords":["Gestion des risques","Risk management","Risque"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/","name":"Management des risques : comment mettre en place une organisation de gestion des risques ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","datePublished":"2012-07-25T06:50:12+00:00","dateModified":"2019-12-31T11:08:33+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/07\/management-des-risques-comment-mettre-en-place-une-organisation-de-gestion-des-risques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Management des risques : comment mettre en place une organisation de gestion des risques ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=2053"}],"version-history":[{"count":10,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2053\/revisions"}],"predecessor-version":[{"id":12467,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2053\/revisions\/12467"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6344"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=2053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=2053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=2053"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=2053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}