{"id":2153,"date":"2012-08-30T11:57:06","date_gmt":"2012-08-30T10:57:06","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=2153"},"modified":"2015-01-21T09:56:12","modified_gmt":"2015-01-21T08:56:12","slug":"service-desk-les-cles-de-loptimisation","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/08\/service-desk-les-cles-de-loptimisation\/","title":{"rendered":"Service desk : les cl\u00e9s de l\u2019optimisation !"},"content":{"rendered":"<p align=\"left\">D\u00e9ploy\u00e9 largement dans les entreprises, le service desk n\u2019est pas une fonction r\u00e9cente au sein de la DSI. Pour autant, dans un contexte de recherche d\u2019\u00e9conomies et d\u2019efficacit\u00e9, bon nombre d\u2019organisations s\u2019interrogent sur les optimisations qui peuvent \u00eatre atteintes tant d\u2019un point de vue op\u00e9rationnel qu\u2019\u00e9conomique.<\/p>\n<p align=\"left\">Quelles sont les leviers d\u2019une optimisation r\u00e9ussie d\u2019un service desk\u00a0? Quelles sont les \u00e9conomies possibles sur un service desk d\u00e9j\u00e0 bien en place\u00a0? En quoi le choix des indicateurs structure-t-il le pilotage et le suivi de la performance ?<\/p>\n<p align=\"left\">Nous vous proposons ici 4 actions cl\u00e9s pour une optimisation r\u00e9ussie.<\/p>\n<p align=\"left\"><strong>N\u00b01 &#8211; Bien r\u00e9guler la demande<\/strong><\/p>\n<p align=\"left\"><strong>\u00a0<\/strong>Le premier levier d\u2019optimisation consiste \u00e0 bien diff\u00e9rencier l\u2019offre de services offerte aux clients\/utilisateurs aux travers de classes de services.\u00a0 Il est fr\u00e9quent d\u2019offrir des niveaux de services bien sup\u00e9rieurs aux besoins des utilisateurs ce qui se traduit par des co\u00fbts plus \u00e9lev\u00e9s. La mise en place de classe de service Gold\/Silver\/Bronze offrant des services diff\u00e9rents en terme d\u2019ouverture de service, de taux de r\u00e9solution au premier contact, de taux de r\u00e9solution permet de d\u00e9gager 3 \u00e0 5% d\u2019\u00e9conomies sur les co\u00fbts du service desk.<\/p>\n<p align=\"left\">\u00a0<strong>N\u00b02 &#8211; Externaliser des activit\u00e9s permettant des engagements contractuels de bout-en-bout<br \/>\n<\/strong><\/p>\n<p align=\"left\">\u00a0Le march\u00e9 du service desk est aujourd\u2019hui mature sur lequel les fournisseurs proposent des offres industrielles. Au-del\u00e0 d\u2019un simple aspect de massification, le p\u00e9rim\u00e8tre confi\u00e9 \u00e0 un partenaire doit \u00eatre le plus large possible pour lui permettre de prendre des engagements de bout-en-bout et faciliter l\u2019industrialisation des activit\u00e9s de support. La s\u00e9paration des activit\u00e9s de help desk et de proximit\u00e9 ne favorise pas le d\u00e9veloppement de synergies par la centralisation de certains actes de support. Les p\u00e9rim\u00e8tres confi\u00e9s aux partenaires doivent \u00e0 minima int\u00e9grer le support N0\/N1 pour le traitement des incidents et des demandes, le support de proximit\u00e9 et peuvent \u00e9galement int\u00e9grer les activit\u00e9s de support N2 sur le poste de travail et sur les infrastructures associ\u00e9es.<\/p>\n<p align=\"left\">\u00a0<strong>N\u00b03 &#8211; Gagner en productivit\u00e9 et r\u00e9duire le nombre d\u2019interventions de proximit\u00e9<\/strong><\/p>\n<p align=\"left\"><strong>\u00a0<\/strong>Point de contact des utilisateurs, la productivit\u00e9 du service desk est directement li\u00e9e \u00e0 l\u2019h\u00e9t\u00e9rog\u00e9n\u00e9it\u00e9 du p\u00e9rim\u00e8tre technique\/applicatif g\u00e9r\u00e9. Des actions d\u2019homog\u00e9n\u00e9isation et de standardisation des environnements techniques (postes de travail notamment) et applicatifs permettront de simplifier les actes de support, de r\u00e9duire les outils de support, de limiter les temps de formation. Ces optimisations permettent en g\u00e9n\u00e9ral d\u2019obtenir 3 \u00e0 7% d\u2019\u00e9conomies sur les co\u00fbts du service desk.<\/p>\n<p align=\"left\">\u00a0Parall\u00e8lement, une r\u00e9duction des interventions de proximit\u00e9 doit \u00eatre engag\u00e9e par un d\u00e9placement de centre de gravit\u00e9 service Desk\/proximit\u00e9 vers le service desk. Le d\u00e9ploiement d\u2019outils de prise en main \u00e0 distance (PMAD) est une piste \u00e0 \u00e9tudier, elle peut peut d\u00e9gager environ 3 \u00e0 5% d\u2019\u00e9conomies.<\/p>\n<p align=\"left\"><strong>N\u00b04 &#8211; Choisir les bons indicateurs de performance \u00e9conomique et op\u00e9rationnelle<\/strong><\/p>\n<p align=\"left\"><strong>\u00a0<\/strong>La performance financi\u00e8re sera obtenue au travers de la mise en place des bons KPI (<em>key performance indicators<\/em>) de mesure de la performance op\u00e9rationnelle. Les indicateurs retenus doivent pouvoir \u00eatre benchmarkables. Ci-dessous les indicateurs \u00e0 utiliser pour piloter la performance du service desk\u00a0:<\/p>\n<p><a href=\"http:\/\/www.solucominsight.fr\/2012\/08\/service-desk-les-cles-de-loptimisation\/imageservicedesk\/\" rel=\"attachment wp-att-2154\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2154\" title=\"Imageservicedesk\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2012\/08\/Imageservicedesk.png\" alt=\"\" width=\"663\" height=\"238\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/08\/Imageservicedesk.png 663w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/08\/Imageservicedesk-437x157.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/08\/Imageservicedesk-71x25.png 71w\" sizes=\"auto, (max-width: 663px) 100vw, 663px\" \/><\/a><\/p>\n<p align=\"left\"><strong>Des optimisations qui doivent permettre de r\u00e9pondre aux enjeux de demain<\/strong><\/p>\n<p align=\"left\">Le service desk reste un maillon dans la cha\u00eene d\u2019acteurs mobilis\u00e9s pour rendre le service aux utilisateurs. Les optimisations au niveau du service desk sont \u00e0 consid\u00e9rer dans un contexte plus large\u00a0: le co\u00fbt de support au niveau 2 ou au niveau 3 est en effet 5 \u00e0 9 fois plus \u00e9lev\u00e9\u00a0!<\/p>\n<p align=\"left\">V\u00e9ritable vitrine de la DSI, le service desk est \u00e0 l\u2019avant-garde de la diversification de ses services\u00a0: g\u00e9n\u00e9ralisation des contacts multiples (t\u00e9l\u00e9phone, mail, interface web, self-service), introduction du kiosque ou de la conciergerie, voire adaptation n\u00e9cessaire \u00e0 la consum\u00e9risation de l\u2019IT. Des d\u00e9fis de taille qu\u2019il est imp\u00e9ratif de r\u00e9ussir !<\/p>\n<p align=\"left\">\n","protected":false},"excerpt":{"rendered":"<p>D\u00e9ploy\u00e9 largement dans les entreprises, le service desk n\u2019est pas une fonction r\u00e9cente au sein de la DSI. Pour autant, dans un contexte de recherche d\u2019\u00e9conomies et d\u2019efficacit\u00e9, bon nombre d\u2019organisations s\u2019interrogent sur les optimisations qui peuvent \u00eatre atteintes tant&#8230;<\/p>\n","protected":false},"author":57,"featured_media":6344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"tags":[615,176,616,258,614],"coauthors":[820,915],"class_list":["post-2153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strategie-projets-it","tag-gouvernance-si-2","tag-kpi","tag-performance-operationnelle","tag-pilotage","tag-service-desk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Service desk : les cl\u00e9s de l\u2019optimisation ! - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Service desk : les cl\u00e9s de l\u2019optimisation ! - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"D\u00e9ploy\u00e9 largement dans les entreprises, le service desk n\u2019est pas une fonction r\u00e9cente au sein de la DSI. Pour autant, dans un contexte de recherche d\u2019\u00e9conomies et d\u2019efficacit\u00e9, bon nombre d\u2019organisations s\u2019interrogent sur les optimisations qui peuvent \u00eatre atteintes tant...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-08-30T10:57:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-01-21T08:56:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erwan Le Lan, Beno\u00eet Lair\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erwan Le Lan, Beno\u00eet Lair\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/\"},\"author\":{\"name\":\"Erwan Le Lan\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f30b69c13f8fba4e683fa80a6d6feb3d\"},\"headline\":\"Service desk : les cl\u00e9s de l\u2019optimisation !\",\"datePublished\":\"2012-08-30T10:57:06+00:00\",\"dateModified\":\"2015-01-21T08:56:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/\"},\"wordCount\":698,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"keywords\":[\"gouvernance SI\",\"KPI\",\"performance op\u00e9rationnelle\",\"pilotage\",\"service desk\"],\"articleSection\":[\"M\u00e9tiers - Strat\u00e9gie &amp; projets IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/\",\"name\":\"Service desk : les cl\u00e9s de l\u2019optimisation ! - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"datePublished\":\"2012-08-30T10:57:06+00:00\",\"dateModified\":\"2015-01-21T08:56:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service desk : les cl\u00e9s de l\u2019optimisation !\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f30b69c13f8fba4e683fa80a6d6feb3d\",\"name\":\"Erwan Le Lan\",\"description\":\"Erwan Le Lan est senior manager chez Solucom, au sein de la practice Excellence Op\u00e9rationnelle depuis 2007. Dipl\u00f4m\u00e9 de l\u2019ENSEEIHT et de la Metropolitan University, il est sp\u00e9cialis\u00e9 sur les probl\u00e9matiques de transformation des organisations de la fili\u00e8re IT pour d\u00e9gager plus de performance \u00e9conomique et\/ou op\u00e9rationnelle au service des m\u00e9tiers.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/erwan-le-lan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Service desk : les cl\u00e9s de l\u2019optimisation ! - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/","og_locale":"en_US","og_type":"article","og_title":"Service desk : les cl\u00e9s de l\u2019optimisation ! - RiskInsight","og_description":"D\u00e9ploy\u00e9 largement dans les entreprises, le service desk n\u2019est pas une fonction r\u00e9cente au sein de la DSI. Pour autant, dans un contexte de recherche d\u2019\u00e9conomies et d\u2019efficacit\u00e9, bon nombre d\u2019organisations s\u2019interrogent sur les optimisations qui peuvent \u00eatre atteintes tant...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/","og_site_name":"RiskInsight","article_published_time":"2012-08-30T10:57:06+00:00","article_modified_time":"2015-01-21T08:56:12+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","type":"image\/jpeg"}],"author":"Erwan Le Lan, Beno\u00eet Lair","twitter_misc":{"Written by":"Erwan Le Lan, Beno\u00eet Lair","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/"},"author":{"name":"Erwan Le Lan","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f30b69c13f8fba4e683fa80a6d6feb3d"},"headline":"Service desk : les cl\u00e9s de l\u2019optimisation !","datePublished":"2012-08-30T10:57:06+00:00","dateModified":"2015-01-21T08:56:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/"},"wordCount":698,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","keywords":["gouvernance SI","KPI","performance op\u00e9rationnelle","pilotage","service desk"],"articleSection":["M\u00e9tiers - Strat\u00e9gie &amp; projets IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/","name":"Service desk : les cl\u00e9s de l\u2019optimisation ! - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","datePublished":"2012-08-30T10:57:06+00:00","dateModified":"2015-01-21T08:56:12+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/08\/service-desk-les-cles-de-loptimisation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Service desk : les cl\u00e9s de l\u2019optimisation !"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f30b69c13f8fba4e683fa80a6d6feb3d","name":"Erwan Le Lan","description":"Erwan Le Lan est senior manager chez Solucom, au sein de la practice Excellence Op\u00e9rationnelle depuis 2007. Dipl\u00f4m\u00e9 de l\u2019ENSEEIHT et de la Metropolitan University, il est sp\u00e9cialis\u00e9 sur les probl\u00e9matiques de transformation des organisations de la fili\u00e8re IT pour d\u00e9gager plus de performance \u00e9conomique et\/ou op\u00e9rationnelle au service des m\u00e9tiers.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/erwan-le-lan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=2153"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2153\/revisions"}],"predecessor-version":[{"id":6382,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2153\/revisions\/6382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6344"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=2153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=2153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=2153"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=2153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}