{"id":3086,"date":"2013-02-08T16:55:54","date_gmt":"2013-02-08T15:55:54","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=3086"},"modified":"2019-12-31T11:45:12","modified_gmt":"2019-12-31T10:45:12","slug":"outillage-securite-la-ruee-vers-le-big-data-est-en-cours","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/","title":{"rendered":"Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours"},"content":{"rendered":"<p>Les r\u00e9centes annonces ne laissent pas de place au doute\u00a0: la s\u00e9curit\u00e9 se dirige vers le Big Data. Que doit-on en retenir\u00a0?<\/p>\n<h2>\u00a0<strong>Quelle est la nature des annonces r\u00e9centes dans le domaine du Big Data et de la s\u00e9curit\u00e9\u00a0?<\/strong><\/h2>\n<p><strong>\u00a0<\/strong>Le buzzword \u00ab\u00a0big data\u00a0\u00bb a fait son entr\u00e9e en force cette semaine dans le monde de la s\u00e9curit\u00e9 de l\u2019information. Deux acteurs majeurs ont pris position sur le march\u00e9. D\u2019un c\u00f4t\u00e9, <a href=\"http:\/\/www.emc.com\/about\/news\/press\/2013\/20130130-01.htm\" target=\"_blank\" rel=\"noopener noreferrer\">RSA a annonc\u00e9 son outil<\/a> \u00ab\u00a0Analytics\u00a0\u00bb. Son objectif\u00a0: d\u00e9tecter les fameux \u00ab\u00a0signaux faibles\u00a0\u00bb dans le volume des journaux de s\u00e9curit\u00e9 g\u00e9n\u00e9r\u00e9s dans le syst\u00e8me d\u2019information. De l\u2019autre, <a href=\"http:\/\/www.zdnet.com\/cisco-acquires-cognitive-security-aims-to-boost-network-security-7000010519\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco annonce le rachat de la soci\u00e9t\u00e9 \u00ab\u00a0Cognitive Security\u00a0\u00bb<\/a>, une start-up tch\u00e8que sp\u00e9cialis\u00e9e dans l\u2019analyse analytique des m\u00eames journaux. Cisco envisage un rapprochement effectif au 3<sup>\u00e8me<\/sup> trimestre de cette ann\u00e9e et l\u2019inclusion des technologies dans ces services cloud de s\u00e9curit\u00e9.<\/p>\n<h2><strong>Est-ce que cela repr\u00e9sente une avanc\u00e9e significative pour la s\u00e9curit\u00e9\u00a0?<\/strong><span style=\"font-size: 13px;\">\u00a0<\/span><\/h2>\n<p>Dans un sens oui, l\u2019adoption de ces technologies par de grands acteurs valide l\u2019int\u00e9r\u00eat des m\u00e9thodes statistiques afin de d\u00e9tecter des attaques cibl\u00e9es. Nous savons qu\u2019il y a une attente forte sur ce point. Les statistiques le montrent clairement, aujourd\u2019hui il faut en moyenne 412 jours pour d\u00e9tecter une attaque cibl\u00e9e. Plus frappant encore,cette d\u00e9tection provient dans 94% des cas\u00a0 de tiers externes \u00e0 l\u2019entreprise (<a href=\"http:\/\/www.mandiant.com\/resources\/m-trends\/\" target=\"_blank\" rel=\"noopener noreferrer\">Rapport Mandiant 2012<\/a>) tandis que les premi\u00e8res exfiltrations de donn\u00e9es ont lieu 24h apr\u00e8s le d\u00e9but de l\u2019attaque ! Il y a donc clairement un probl\u00e8me \u00e0 r\u00e9soudre. D\u2019ailleurs nous disposons de retours d\u2019exp\u00e9rience positifs avec des outils existants d\u00e9j\u00e0 sur le march\u00e9. Je pense en particulier \u00e0 la solution de la soci\u00e9t\u00e9 fran\u00e7aise <a href=\"http:\/\/www.picviz.com\/\">PicViz.<\/a> Elle est d\u00e9j\u00e0 en place dans plusieurs soci\u00e9t\u00e9s o\u00f9 elle a permis des avanc\u00e9es significatives.<\/p>\n<h2><strong>Comment une entreprise peut-elle tirer parti de ces innovations\u00a0?<\/strong><\/h2>\n<p>Ces outils n\u2019ont rien de magique, les acheter et les d\u00e9ployer ne r\u00e9soudra pas tout. Ils vont requ\u00e9rir d\u2019une part d\u2019\u00eatre aliment\u00e9s par des donn\u00e9es \u2013 les journaux de s\u00e9curit\u00e9 &#8211; et d\u2019autre part de disposer de comp\u00e9tences pour analyser les r\u00e9sultats. Et ces deux points sont aujourd&#8217;hui des points faibles dans beaucoup d\u2019entreprises\u00a0! En premier lieu, il faut augmenter le volume de journaux g\u00e9n\u00e9r\u00e9s \u00e0 tous les niveaux du SI pour pouvoir \u00ab\u00a0nourrir\u00a0\u00bb correctement l\u2019outil. L\u2019avantage, c\u2019est que ces solutions, contrairement au SIEM (<em>Security Information and Event Management<\/em>) historique, font de l\u2019analyse sans chercher des sc\u00e9narios particuliers qu&#8217;il faut d\u00e9finir au pr\u00e9alable. Ils sont donc plus efficaces pour d\u00e9tecter les attaques cibl\u00e9es.<\/p>\n<p>Parall\u00e8lement, les \u00e9quipes d\u00e9di\u00e9es \u00e0 l\u2019analyse de ces journaux doivent \u00eatre renforc\u00e9es (en effectifs et en formations) afin d\u2019\u00eatre en mesure de comprendre les analyses et d\u2019y r\u00e9agir de mani\u00e8re appropri\u00e9e. Notre exp\u00e9rience le montre, nous n\u2019\u00e9chappons pas aux faux positifs\u2026 L\u2019externalisation d\u2019une partie de l\u2019\u00e9quipe en charge\u00a0 de\u00a0 surveiller les SI est \u00a0une solution possible. De r\u00e9cents appels d\u2019offres que nous avons conduits ont montr\u00e9 que les acteurs du march\u00e9 se sont multipli\u00e9s et qu&#8217;ils proposent de nouvelles solutions aux probl\u00e8mes rencontr\u00e9s au quotidien par les entreprises dans le domaine de la s\u00e9curit\u00e9.<\/p>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Les r\u00e9centes annonces ne laissent pas de place au doute\u00a0: la s\u00e9curit\u00e9 se dirige vers le Big Data. Que doit-on en retenir\u00a0? \u00a0Quelle est la nature des annonces r\u00e9centes dans le domaine du Big Data et de la s\u00e9curit\u00e9\u00a0? \u00a0Le&#8230;<\/p>\n","protected":false},"author":15,"featured_media":2763,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[3021,3322,59,613],"coauthors":[837],"class_list":["post-3086","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-analyse","tag-big-data-security","tag-donnees","tag-siem"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours<\/title>\n<meta name=\"description\" content=\"L&#039;outillage s\u00e9curit\u00e9 se dirige de plus en plus vers le Big data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours\" \/>\n<meta property=\"og:description\" content=\"L&#039;outillage s\u00e9curit\u00e9 se dirige de plus en plus vers le Big data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-08T15:55:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:45:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"693\" \/>\n\t<meta property=\"og:image:height\" content=\"693\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours\",\"datePublished\":\"2013-02-08T15:55:54+00:00\",\"dateModified\":\"2019-12-31T10:45:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/\"},\"wordCount\":610,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg\",\"keywords\":[\"analyse\",\"big data security\",\"donn\u00e9es\",\"SIEM\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/\",\"name\":\"Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg\",\"datePublished\":\"2013-02-08T15:55:54+00:00\",\"dateModified\":\"2019-12-31T10:45:12+00:00\",\"description\":\"L'outillage s\u00e9curit\u00e9 se dirige de plus en plus vers le Big data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg\",\"width\":693,\"height\":693},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours","description":"L'outillage s\u00e9curit\u00e9 se dirige de plus en plus vers le Big data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/","og_locale":"en_US","og_type":"article","og_title":"Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours","og_description":"L'outillage s\u00e9curit\u00e9 se dirige de plus en plus vers le Big data.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/","og_site_name":"RiskInsight","article_published_time":"2013-02-08T15:55:54+00:00","article_modified_time":"2019-12-31T10:45:12+00:00","og_image":[{"width":693,"height":693,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours","datePublished":"2013-02-08T15:55:54+00:00","dateModified":"2019-12-31T10:45:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/"},"wordCount":610,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg","keywords":["analyse","big data security","donn\u00e9es","SIEM"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/","url":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/","name":"Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg","datePublished":"2013-02-08T15:55:54+00:00","dateModified":"2019-12-31T10:45:12+00:00","description":"L'outillage s\u00e9curit\u00e9 se dirige de plus en plus vers le Big data.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/12\/Fotolia_42688016_S.jpg","width":693,"height":693},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=3086"}],"version-history":[{"count":9,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3086\/revisions"}],"predecessor-version":[{"id":12458,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3086\/revisions\/12458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/2763"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=3086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=3086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=3086"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=3086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}