{"id":2257,"date":"2012-09-17T08:30:49","date_gmt":"2012-09-17T07:30:49","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=2257"},"modified":"2019-12-31T12:05:15","modified_gmt":"2019-12-31T11:05:15","slug":"sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/","title":{"rendered":"Sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information : o\u00f9 en sont les entreprises ?"},"content":{"rendered":"<p>La protection du patrimoine informationnel de l\u2019entreprise contre les diff\u00e9rentes menaces, qu\u2019elles soient internes ou externes, est devenue un enjeu majeur pour les entreprises. Si de nombreuses solutions techniques et organisationnelles sont d\u00e9j\u00e0 en place, le maillon faible est souvent le comportement des utilisateurs\u00a0! La sensibilisation des collaborateurs est donc un \u00e9l\u00e9ment cl\u00e9 de la d\u00e9marche de s\u00e9curit\u00e9 de l\u2019information. Mais quelles sont les pratiques des grandes entreprises \u00e0 ce sujet aujourd\u2019hui\u00a0? Quels sont les nouveaux challenges de la sensibilisation\u00a0? Pour r\u00e9pondre \u00e0 ces questions, Solucom a analys\u00e9 les pratiques de pr\u00e8s de 25 grandes entreprises fran\u00e7aises.<\/p>\n<h2><strong>Sensibiliser, mais \u00e0 quel prix\u00a0?<\/strong><\/h2>\n<p>Affiches, e-mails, jeux, etc., il existe une multitude de moyens de sensibilisation pr\u00e9sentant chacun leurs avantages et leurs d\u00e9fauts. \u00a0Largement pl\u00e9biscit\u00e9 par 78% des entreprises du panel \u00e9tudi\u00e9, l\u2019e-mail est le vecteur de sensibilisation le plus utilis\u00e9. Facile \u00e0 d\u00e9ployer, peu co\u00fbteux, il n\u2019est n\u00e9anmoins pas suffisant pour garantir l\u2019efficacit\u00e9 d\u2019une campagne de sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information. Ainsi, plus de 60% des entreprises optent pour la mise en place compl\u00e9mentaire d\u2019\u00e9v\u00e8nements s\u00e9curit\u00e9 et de contenu dynamique sur Intranet, la diffusion de plaquettes et de fiches pratiques. Seules 25% des entreprises utilisent des solutions plus \u00e9labor\u00e9es telles que la diffusion de contenu multim\u00e9dia, la mise en place d\u2019e-learning ou encore le d\u00e9ploiement de jeux et de quizz.<\/p>\n<p>Comment expliquer l\u2019utilisation massive d\u2019e-mails qui ne seront pas forcement efficaces alors que la diffusion d\u2019un contenu multim\u00e9dia assurerait un impact plus important\u00a0aupr\u00e8s des collaborateurs \u00e0 sensibiliser ? La r\u00e9ponse tient en un mot\u00a0: budget. L\u00e0 o\u00f9 une campagne de mailing repr\u00e9sentera un co\u00fbt pratiquement nul pour l\u2019entreprise, le tournage d\u2019un clip vid\u00e9o de sensibilisation ou la mise en place d\u2019un e-learning peuvent s\u2019\u00e9lever \u00e0 plusieurs dizaines de milliers d\u2019euros, notamment en cas de recours \u00e0 une agence de communication. Seules les entreprises ayant les budgets sensibilisation les plus importants peuvent donc orienter vers cette solution.<\/p>\n<h2><strong>\u00a0<\/strong><strong>Les m\u00eames moyens de sensibilisation pour tous ? Focus sur le Plan de Continuit\u00e9 d\u2019Activit\u00e9 (PCA)<\/strong><\/h2>\n<p>Seules 25% des entreprises utilisent l\u2019e-mail comme moyen de sensibilisation au PCA alors qu\u2019elles sont 78% \u00e0 l\u2019utiliser pour la sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information. Cette diff\u00e9rence tient dans le fait que la sensibilisation au PCA vise notamment \u00e0 inculquer les r\u00e9flexes \u00e0 avoir en cas de sinistre informatique. Les supports d\u00e9mat\u00e9rialis\u00e9s ne seraient donc plus accessibles ! Les plaquettes sont d\u00e8s lors beaucoup plus utilis\u00e9es. Cela illustre la n\u00e9cessit\u00e9 d\u2019adapter les supports de sensibilisation, que ce soit en fonction de la cible vis\u00e9e ou des sp\u00e9cificit\u00e9s du sujet trait\u00e9.<\/p>\n<h2>\u00a0<strong>La sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information et nouvelles technologies\u00a0: une course contre la montre<\/strong><\/h2>\n<p>Web 2.0, r\u00e9seaux sociaux, Bring Your Own Device, etc., ces nouvelles pratiques ne cessent de se d\u00e9velopper au sein des entreprises, amenant avec elles de nouvelles menaces pour la s\u00e9curit\u00e9 de l\u2019information. La ma\u00eetrise des risques li\u00e9s \u00e0 ces services \u00e9voluant en permanence n\u00e9cessite un effort constant pour rester efficace et ne pas subir l\u2019innovation. La d\u00e9mocratisation progressive de l\u2019utilisation de ces services au sein de l\u2019entreprise doit donc s\u2019accompagner d\u2019une sensibilisation \u00e0 leur utilisation en toute s\u00e9curit\u00e9.<\/p>\n<p>Parmi les usages r\u00e9cents, l\u2019utilisation des r\u00e9seaux sociaux s\u2019est g\u00e9n\u00e9ralis\u00e9e depuis 2008. 65% des entreprises en autorisent maintenant l\u2019usage, majoritairement en en limitant l\u2019acc\u00e8s \u00e0 certaines populations m\u00e9tier (55%). Mais ces outils ayant p\u00e9n\u00e9tr\u00e9 aussi nos vies personnelles, elles sont aujourd\u2019hui plus de 90% \u00e0 sensibiliser leurs collaborateurs aux risques inh\u00e9rents \u00e0 leur utilisation. En revanche, le BYOD et les services de cloud computing personnels (Dropbox, Google Drive\u2026) qui sont plus r\u00e9cents et moins r\u00e9pandus font encore peu l\u2019objet de l\u2019attention des utilisateurs\u00a0: 12% des entreprises sensibilisent leurs collaborateurs au risque de fuite d\u2019information que repr\u00e9sentent ces derniers, et seulement 8% les sensibilisent aux risques du Bring Your Own Device.<\/p>\n<p>L\u2019un des grands enjeux de la s\u00e9curit\u00e9 de l\u2019information aujourd\u2019hui est donc, \u00e0 d\u00e9faut de pouvoir traiter imm\u00e9diatement toutes les menaces, de tenter de r\u00e9duire le d\u00e9lai entre leur apparition et leur prise en compte effective\u00a0!<\/p>\n<p>[Article r\u00e9dig\u00e9 en collaboration avec Lo\u00efc Dechoux, consultant]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La protection du patrimoine informationnel de l\u2019entreprise contre les diff\u00e9rentes menaces, qu\u2019elles soient internes ou externes, est devenue un enjeu majeur pour les entreprises. Si de nombreuses solutions techniques et organisationnelles sont d\u00e9j\u00e0 en place, le maillon faible est souvent&#8230;<\/p>\n","protected":false},"author":14,"featured_media":6344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3222,36,37],"tags":[703,3303,396,400],"coauthors":[782,934],"class_list":["post-2257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy","category-cybersecurity-digital-trust","category-digital-innovation","tag-benchmark","tag-cyberawareness","tag-gamification","tag-sensibilisation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information : o\u00f9 en sont les entreprises ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information : o\u00f9 en sont les entreprises ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"La protection du patrimoine informationnel de l\u2019entreprise contre les diff\u00e9rentes menaces, qu\u2019elles soient internes ou externes, est devenue un enjeu majeur pour les entreprises. Si de nombreuses solutions techniques et organisationnelles sont d\u00e9j\u00e0 en place, le maillon faible est souvent...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-17T07:30:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:05:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marion Couturier, Loic Dechoux\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marion Couturier, Loic Dechoux\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/\"},\"author\":{\"name\":\"Marion Couturier\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92\"},\"headline\":\"Sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information : o\u00f9 en sont les entreprises ?\",\"datePublished\":\"2012-09-17T07:30:49+00:00\",\"dateModified\":\"2019-12-31T11:05:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/\"},\"wordCount\":760,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"keywords\":[\"benchmark\",\"cyberawareness\",\"gamification\",\"sensibilisation\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\",\"M\u00e9tiers - Digital &amp; innovation\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/\",\"name\":\"Sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information : o\u00f9 en sont les entreprises ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"datePublished\":\"2012-09-17T07:30:49+00:00\",\"dateModified\":\"2019-12-31T11:05:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information : o\u00f9 en sont les entreprises ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92\",\"name\":\"Marion Couturier\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marion-couturier\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information : o\u00f9 en sont les entreprises ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/","og_locale":"en_US","og_type":"article","og_title":"Sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information : o\u00f9 en sont les entreprises ? - RiskInsight","og_description":"La protection du patrimoine informationnel de l\u2019entreprise contre les diff\u00e9rentes menaces, qu\u2019elles soient internes ou externes, est devenue un enjeu majeur pour les entreprises. Si de nombreuses solutions techniques et organisationnelles sont d\u00e9j\u00e0 en place, le maillon faible est souvent...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/","og_site_name":"RiskInsight","article_published_time":"2012-09-17T07:30:49+00:00","article_modified_time":"2019-12-31T11:05:15+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","type":"image\/jpeg"}],"author":"Marion Couturier, Loic Dechoux","twitter_misc":{"Written by":"Marion Couturier, Loic Dechoux","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/"},"author":{"name":"Marion Couturier","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92"},"headline":"Sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information : o\u00f9 en sont les entreprises ?","datePublished":"2012-09-17T07:30:49+00:00","dateModified":"2019-12-31T11:05:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/"},"wordCount":760,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","keywords":["benchmark","cyberawareness","gamification","sensibilisation"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust","M\u00e9tiers - Digital &amp; innovation"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/","name":"Sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information : o\u00f9 en sont les entreprises ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","datePublished":"2012-09-17T07:30:49+00:00","dateModified":"2019-12-31T11:05:15+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/09\/sensibilisation-a-la-securite-de-linformation-ou-en-sont-les-entreprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Sensibilisation \u00e0 la s\u00e9curit\u00e9 de l\u2019information : o\u00f9 en sont les entreprises ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92","name":"Marion Couturier","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marion-couturier\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=2257"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2257\/revisions"}],"predecessor-version":[{"id":6364,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2257\/revisions\/6364"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6344"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=2257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=2257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=2257"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=2257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}