{"id":2137,"date":"2012-08-21T09:12:21","date_gmt":"2012-08-21T08:12:21","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=2137"},"modified":"2019-12-30T17:48:47","modified_gmt":"2019-12-30T16:48:47","slug":"apple-et-authentec-guerre-des-brevets-ou-reelle-innovation","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/","title":{"rendered":"Apple et Authentec : guerre des brevets ou r\u00e9elle innovation ?"},"content":{"rendered":"<p>Apple a une fois de plus fait les feux de l\u2019actualit\u00e9 d\u00e9but juillet en annon\u00e7ant le rachat de la soci\u00e9t\u00e9 Authentec, sp\u00e9cialiste des solutions de protection des donn\u00e9es. Que cache cette op\u00e9ration\u00a0? Une guerre des brevets encore plus large sur le secteur des smartphones\u00a0ou une r\u00e9elle volont\u00e9 d\u2019innovation pour la s\u00e9curit\u00e9 des clients d\u2019Apple ?<\/p>\n<p><strong>Authentec, une cible inattendue pour Apple<\/strong><\/p>\n<p>En annon\u00e7ant le rachat d\u2019Authentec pour 356 millions de dollars, Apple a surpris le march\u00e9. Il s\u2019agit en effet d\u2019un achat au prix fort, Authentec r\u00e9alisant quasiment 70 millions de dollars de chiffre d\u2019affaires et \u00e9tant actuellement d\u00e9ficitaire avec une perte nette de 10 millions de dollars. C\u2019est\u00a0 une des op\u00e9rations les plus importants pour Apple. Cible inattendue, d\u2019autant que la s\u00e9curit\u00e9 n\u2019est pas au c\u0153ur du m\u00e9tier d\u2019Apple, connu pour ses solutions grand public.<\/p>\n<p><strong>Une strat\u00e9gie pour acqu\u00e9rir des brevets de premier plan sur la s\u00e9curit\u00e9\u00a0?<\/strong><\/p>\n<p>Authentec est une soci\u00e9t\u00e9 bien install\u00e9e sur le secteur de la t\u00e9l\u00e9phonie mobile, elle compte aujourd\u2019hui pour clients des g\u00e9ants du secteur comme Samsung, Nokia, Motorola\u2026 Et surtout cette soci\u00e9t\u00e9 d\u00e9tient plus de 200 brevets sur de multiples solutions de s\u00e9curit\u00e9 (protection des donn\u00e9es, communication s\u00e9curis\u00e9e\u2026), et en particulier les brevets \u00ab\u00a0fondamentaux\u00a0\u00bb sur l\u2019authentification biom\u00e9trique. De l\u00e0 \u00e0 imaginer qu\u2019Apple voudrait renforcer son arsenal de brevets, il n\u2019y a qu\u2019un pas\u00a0! Cela serait une mauvaise nouvelle pour l\u2019innovation\u2026 Nous observons tous les jours les effets d\u00e9l\u00e9t\u00e8res des guerres que se livrent les grands acteurs du secteur\u00a0: Oracle et Google, Apple et Samsung, et bien d\u2019autres\u2026<\/p>\n<p><strong>Les r\u00e9centes annonces font pencher la balance vers l\u2019innovation\u00a0!<\/strong><\/p>\n<p>Des documents r\u00e9cemment r\u00e9v\u00e9l\u00e9s par la SEC (le gendarme de la bourse aux Etats-Unis) montrent que cette acquisition a \u00e9t\u00e9 r\u00e9alis\u00e9e de mani\u00e8re rapide, apparemment avant tout pour garantir l\u2019approvisionnement en composants aupr\u00e8s d\u2019Apple. Voil\u00e0 qui pourrait cacher les futures innovations qui seront peut \u00eatre pr\u00e9sentes dans l\u2019iPhone 5\u00a0? En effet, Authentec dispose de technologies qui lui permettent d\u2019int\u00e9grer des lecteurs d\u2019empreintes digitales de mani\u00e8re simple dans les smartphones. Les derniers produits pr\u00e9sent\u00e9s permettraient m\u00eame d\u2019imaginer un lecteur d\u2019empreintes digitales dans le bouton \u00ab\u00a0Home\u00a0\u00bb de nos iPhone\u00a0!<\/p>\n<p>Une id\u00e9e qui pourrait plaire \u00e0 Apple pour simplifier l\u2019authentification de ses clients et ainsi faciliter l\u2019adoption de technologie comme le NFC, mais aussi constituer un avantage distinctif de son futur syst\u00e8me de \u00ab\u00a0portefeuille\u00a0virtuel\u00a0\u00bb Passbook\u00a0! L\u2019utilisation d\u2019authentification biom\u00e9trique pourrait \u00e0 la fois simplifier la vie de l\u2019utilisateur (plus de mots de passe\u2026)\u00a0 et rassurer les cybermarchands (diminution des cas de fraude\u2026).<\/p>\n<p>Voil\u00e0 donc un rachat qui pourrait s\u2019av\u00e9rer une avanc\u00e9e significative dans l\u2019adoption de m\u00e9canismes de s\u00e9curit\u00e9 dans le grand public\u00a0! Croisons les doigts et attendons peut-\u00eatre le 12 septembre pour voir si la prochaine \u00ab\u00a0Keynote\u00a0\u00bb r\u00e9v\u00e8lera les plans du g\u00e9ant \u00e0 la pomme\u00a0dans ce domaine.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple a une fois de plus fait les feux de l\u2019actualit\u00e9 d\u00e9but juillet en annon\u00e7ant le rachat de la soci\u00e9t\u00e9 Authentec, sp\u00e9cialiste des solutions de protection des donn\u00e9es. Que cache cette op\u00e9ration\u00a0? Une guerre des brevets encore plus large sur&#8230;<\/p>\n","protected":false},"author":15,"featured_media":6344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36,32],"tags":[354,164,95],"coauthors":[837],"class_list":["post-2137","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","category-marketing-relation-client","tag-apple","tag-authentification","tag-innovation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple et Authentec : guerre des brevets ou r\u00e9elle innovation ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple et Authentec : guerre des brevets ou r\u00e9elle innovation ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Apple a une fois de plus fait les feux de l\u2019actualit\u00e9 d\u00e9but juillet en annon\u00e7ant le rachat de la soci\u00e9t\u00e9 Authentec, sp\u00e9cialiste des solutions de protection des donn\u00e9es. Que cache cette op\u00e9ration\u00a0? Une guerre des brevets encore plus large sur...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-08-21T08:12:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-30T16:48:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Apple et Authentec : guerre des brevets ou r\u00e9elle innovation ?\",\"datePublished\":\"2012-08-21T08:12:21+00:00\",\"dateModified\":\"2019-12-30T16:48:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/\"},\"wordCount\":549,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"keywords\":[\"Apple\",\"authentification\",\"Innovation\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\",\"M\u00e9tiers - Marketing et relation client\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/\",\"name\":\"Apple et Authentec : guerre des brevets ou r\u00e9elle innovation ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"datePublished\":\"2012-08-21T08:12:21+00:00\",\"dateModified\":\"2019-12-30T16:48:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple et Authentec : guerre des brevets ou r\u00e9elle innovation ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple et Authentec : guerre des brevets ou r\u00e9elle innovation ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/","og_locale":"en_US","og_type":"article","og_title":"Apple et Authentec : guerre des brevets ou r\u00e9elle innovation ? - RiskInsight","og_description":"Apple a une fois de plus fait les feux de l\u2019actualit\u00e9 d\u00e9but juillet en annon\u00e7ant le rachat de la soci\u00e9t\u00e9 Authentec, sp\u00e9cialiste des solutions de protection des donn\u00e9es. Que cache cette op\u00e9ration\u00a0? Une guerre des brevets encore plus large sur...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/","og_site_name":"RiskInsight","article_published_time":"2012-08-21T08:12:21+00:00","article_modified_time":"2019-12-30T16:48:47+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Apple et Authentec : guerre des brevets ou r\u00e9elle innovation ?","datePublished":"2012-08-21T08:12:21+00:00","dateModified":"2019-12-30T16:48:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/"},"wordCount":549,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","keywords":["Apple","authentification","Innovation"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust","M\u00e9tiers - Marketing et relation client"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/","name":"Apple et Authentec : guerre des brevets ou r\u00e9elle innovation ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","datePublished":"2012-08-21T08:12:21+00:00","dateModified":"2019-12-30T16:48:47+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/apple-et-authentec-guerre-des-brevets-ou-reelle-innovation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Apple et Authentec : guerre des brevets ou r\u00e9elle innovation ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=2137"}],"version-history":[{"count":9,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2137\/revisions"}],"predecessor-version":[{"id":6388,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2137\/revisions\/6388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6344"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=2137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=2137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=2137"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=2137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}