{"id":2086,"date":"2012-08-06T14:53:01","date_gmt":"2012-08-06T13:53:01","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=2086"},"modified":"2019-12-31T12:08:02","modified_gmt":"2019-12-31T11:08:02","slug":"attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/","title":{"rendered":"Attaque du SI de l&#8217;Elys\u00e9e : la confirmation de nouvelles tendances en mati\u00e8re de cybercriminalit\u00e9 ?"},"content":{"rendered":"<p><em>Il y a quelques semaines, la presse r\u00e9v\u00e9lait l\u2019attaque dont a \u00e9t\u00e9 victime le syst\u00e8me d\u2019information de l\u2019\u00c9lys\u00e9e. D\u2019apr\u00e8s les informations &#8211; confirm\u00e9es par la Pr\u00e9sidence &#8211; cette attaque aurait frapp\u00e9 entre les deux tours de l\u2019\u00e9lection pr\u00e9sidentielle et entra\u00een\u00e9 une compromission assez large du SI. Heureusement, \u00a0elle a pu \u00eatre d\u00e9tect\u00e9e et contenue rapidement.<\/em><\/p>\n<p><em>Ce nouveau cas est en ligne avec ce que nous observons actuellement de mani\u00e8re plus globale et confirme deux grandes tendances\u00a0: l\u2019attaque a lieu en p\u00e9riode de faiblesse du syst\u00e8me d\u2019information et la compromission des syst\u00e8mes centraux est quasi syst\u00e9matique.<\/em><\/p>\n<h2>\u00a0<strong>Attaquer pendant une p\u00e9riode de faiblesse<\/strong><\/h2>\n<p>Le cas de l\u2019\u00c9lys\u00e9e montre que les attaquants savent tirer profit de l\u2019actualit\u00e9 de leur cible. L\u2019attaque de l\u2019\u00c9lys\u00e9e a eu lieu entre les deux tours, pendant une p\u00e9riode de changement pour cette structure et par cons\u00e9quent moment privil\u00e9gi\u00e9 pour s\u2019installer et se \u00ab\u00a0cacher\u00a0\u00bb dans le SI avant l\u2019arriv\u00e9e du nouvel occupant.<\/p>\n<p>Il est courant pour les attaquants de viser les p\u00e9riodes de faiblesse des organisations. Une majorit\u00e9 d\u2019attaque se d\u00e9roule le week-end ou pendant les heures non ouvr\u00e9es. Aujourd\u2019hui la plupart des organisations ne disposent ni des moyens ni des \u00e9quipes pour assurer un tel niveau de \u00a0protection et de surveillance. Et les attaquants le savent\u00a0!<\/p>\n<h2>\u00a0<strong>Compromettre les syst\u00e8mes centraux<\/strong><\/h2>\n<p>On estime souvent qu\u2019il faut prot\u00e9ger en priorit\u00e9 les serveurs m\u00e9tiers les plus critiques. Les attaques r\u00e9centes montrent cependant que ce sont bien souvent les syst\u00e8mes centraux de gestion du SI les cibles initiales des attaquants. Nous avons observ\u00e9 une majorit\u00e9 d\u2019attaques sur l\u2019Active Directory mais \u00e9galement sur d\u2019autres \u00e9l\u00e9ments \u00a0tels que la t\u00e9l\u00e9distribution. Ces syst\u00e8mes sont utilis\u00e9s pour prendre le contr\u00f4le de l\u2019ensemble du SI puis par rebond d\u2019acc\u00e9der aux serveurs m\u00e9tiers et aux pr\u00e9cieuses informations qu\u2019ils contiennent. Prendre pied \u00e0 ce niveau autorise \u00e9galement une installation dans la dur\u00e9e et une capacit\u00e9 d\u2019action sur l\u2019ensemble des postes de travail de l\u2019entreprise.<\/p>\n<h2>\u00a0<strong>Rester sur ses gardes et renforcer les processus d\u2019administration<\/strong><\/h2>\n<p>L\u2019\u00e9volution des menaces n\u00e9cessite de reposer certains fondamentaux de la protection. Les \u00e9quipes s\u00e9curit\u00e9 doivent aujourd\u2019hui se doter de moyens pour surveiller le SI et agir 24h sur 24. Si ce n\u2019est possible pour les \u00e9quipes internes, le recours \u00e0 un service tiers coupl\u00e9 \u00e0 une organisation d\u2019astreinte permet de r\u00e9pondre au besoin. Cette surveillance, qui lorsqu\u2019elle existe est souvent centr\u00e9e sur la p\u00e9riph\u00e9rie du r\u00e9seau, doit se r\u00e9organiser pour ajouter les syst\u00e8mes m\u00e9tiers sensibles et les services centraux.<\/p>\n<p>Mais attention\u00a0: la surveillance ne fait pas tout. Il est n\u00e9cessaire d\u2019\u00e9viter la compromission initiale et sur le volet des syst\u00e8mes centraux, il reste beaucoup \u00e0 faire\u00a0! En effet, les pratiques d\u2019administration sont souvent g\u00e9n\u00e9ratrices de risques\u00a0: multiplication des comptes administrateurs et des serveurs, utilisation de poste d\u2019administration pour des usages personnels (messagerie, surf internet\u2026), authentification simple et mot de passe partag\u00e9\u2026 Un audit sur ce p\u00e9rim\u00e8tre r\u00e9v\u00e8le souvent bien des mauvaises surprises et n\u00e9cessite d\u2019ajouter une rigueur n\u00e9cessaire vue la criticit\u00e9 des syst\u00e8mes manipul\u00e9s pour l\u2019organisation.<\/p>\n<p>Les attaques se suivent et bien souvent se ressemblent. Il est maintenant grand temps d\u2019agir sur les zones les plus \u00e0 risque et les retours d\u2019exp\u00e9riences montre clairement o\u00f9 elles se trouvent\u00a0!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Il y a quelques semaines, la presse r\u00e9v\u00e9lait l\u2019attaque dont a \u00e9t\u00e9 victime le syst\u00e8me d\u2019information de l\u2019\u00c9lys\u00e9e. D\u2019apr\u00e8s les informations &#8211; confirm\u00e9es par la Pr\u00e9sidence &#8211; cette attaque aurait frapp\u00e9 entre les deux tours de l\u2019\u00e9lection pr\u00e9sidentielle et entra\u00een\u00e9&#8230;<\/p>\n","protected":false},"author":15,"featured_media":6344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3225],"tags":[474,590,1241,183,3038],"coauthors":[837],"class_list":["post-2086","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response","tag-attaque","tag-compromission-du-si","tag-cyberattaque","tag-cybercriminalite","tag-threat-intelligence"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attaque du SI de l&#039;Elys\u00e9e : la confirmation de nouvelles tendances en mati\u00e8re de cybercriminalit\u00e9 ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attaque du SI de l&#039;Elys\u00e9e : la confirmation de nouvelles tendances en mati\u00e8re de cybercriminalit\u00e9 ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Il y a quelques semaines, la presse r\u00e9v\u00e9lait l\u2019attaque dont a \u00e9t\u00e9 victime le syst\u00e8me d\u2019information de l\u2019\u00c9lys\u00e9e. D\u2019apr\u00e8s les informations &#8211; confirm\u00e9es par la Pr\u00e9sidence &#8211; cette attaque aurait frapp\u00e9 entre les deux tours de l\u2019\u00e9lection pr\u00e9sidentielle et entra\u00een\u00e9...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-08-06T13:53:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:08:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Attaque du SI de l&#8217;Elys\u00e9e : la confirmation de nouvelles tendances en mati\u00e8re de cybercriminalit\u00e9 ?\",\"datePublished\":\"2012-08-06T13:53:01+00:00\",\"dateModified\":\"2019-12-31T11:08:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/\"},\"wordCount\":635,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"keywords\":[\"attaque\",\"compromission du SI\",\"Cyberattaque\",\"Cybercriminalit\u00e9\",\"Threat intelligence\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/\",\"name\":\"Attaque du SI de l'Elys\u00e9e : la confirmation de nouvelles tendances en mati\u00e8re de cybercriminalit\u00e9 ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"datePublished\":\"2012-08-06T13:53:01+00:00\",\"dateModified\":\"2019-12-31T11:08:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attaque du SI de l&rsquo;Elys\u00e9e : la confirmation de nouvelles tendances en mati\u00e8re de cybercriminalit\u00e9 ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attaque du SI de l'Elys\u00e9e : la confirmation de nouvelles tendances en mati\u00e8re de cybercriminalit\u00e9 ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/","og_locale":"en_US","og_type":"article","og_title":"Attaque du SI de l'Elys\u00e9e : la confirmation de nouvelles tendances en mati\u00e8re de cybercriminalit\u00e9 ? - RiskInsight","og_description":"Il y a quelques semaines, la presse r\u00e9v\u00e9lait l\u2019attaque dont a \u00e9t\u00e9 victime le syst\u00e8me d\u2019information de l\u2019\u00c9lys\u00e9e. D\u2019apr\u00e8s les informations &#8211; confirm\u00e9es par la Pr\u00e9sidence &#8211; cette attaque aurait frapp\u00e9 entre les deux tours de l\u2019\u00e9lection pr\u00e9sidentielle et entra\u00een\u00e9...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/","og_site_name":"RiskInsight","article_published_time":"2012-08-06T13:53:01+00:00","article_modified_time":"2019-12-31T11:08:02+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Attaque du SI de l&#8217;Elys\u00e9e : la confirmation de nouvelles tendances en mati\u00e8re de cybercriminalit\u00e9 ?","datePublished":"2012-08-06T13:53:01+00:00","dateModified":"2019-12-31T11:08:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/"},"wordCount":635,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","keywords":["attaque","compromission du SI","Cyberattaque","Cybercriminalit\u00e9","Threat intelligence"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/","name":"Attaque du SI de l'Elys\u00e9e : la confirmation de nouvelles tendances en mati\u00e8re de cybercriminalit\u00e9 ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","datePublished":"2012-08-06T13:53:01+00:00","dateModified":"2019-12-31T11:08:02+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/attaque-du-si-de-lelysee-la-confirmation-de-nouvelles-tendances-en-matiere-de-cybercriminalite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Attaque du SI de l&rsquo;Elys\u00e9e : la confirmation de nouvelles tendances en mati\u00e8re de cybercriminalit\u00e9 ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=2086"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2086\/revisions"}],"predecessor-version":[{"id":6396,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2086\/revisions\/6396"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6344"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=2086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=2086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=2086"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=2086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}