{"id":3882,"date":"2013-07-08T07:55:14","date_gmt":"2013-07-08T06:55:14","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=3882"},"modified":"2015-08-17T10:13:44","modified_gmt":"2015-08-17T09:13:44","slug":"cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/","title":{"rendered":"Certifications : CISA, la caverne d\u2019Ali Baba des auditeurs et consultants informatiques ?"},"content":{"rendered":"<p><em>Le CISA\u00ae (Certified Information Systems Auditor) est un certificat international d\u00e9livr\u00e9 par l\u2019<a href=\"http:\/\/www.isaca.org\/french\/Pages\/default.aspx\" target=\"_blank\">ISACA <\/a>(Information System Audit and Control Association). Il atteste de la ma\u00eetrise \u00a0de la gouvernance, du management et du suivi des risques informatiques. Cette certification concerne plus de 100 000 professionnels IT dans plus de 160 pays.<\/em><\/p>\n<h2>\u00a0CISA<em>\u00ae<\/em>, culture IT par excellence<\/h2>\n<p>Le CISA<em>\u00ae<\/em> est un recueil des meilleures pratiques en mati\u00e8re de Gouvernance, Management et Suivi des risques IT. Il couvre tous les domaines de l\u2019Audit des Syst\u00e8mes d\u2019Information, des plus techniques aux plus organisationnels :<\/p>\n<p>&#8211; Processus d\u2019audit des syst\u00e8mes informatiques,<\/p>\n<p>&#8211; Gouvernance des SI,<\/p>\n<p>&#8211; Gestion du cycle de vie et de l&#8217;infrastructure des syst\u00e8mes,<\/p>\n<p>&#8211; Fourniture et support des services,<\/p>\n<p>&#8211; Protection des avoirs informatiques,<\/p>\n<p>&#8211; Plan de continuit\u00e9 et de secours informatique.<\/p>\n<p>Ce n&#8217;est bien s\u00fbr pas la seule certification existante &#8211; mais ce label repr\u00e9sente depuis 1978 un certificat de r\u00e9f\u00e9rence dans le monde anglo-saxon, qui en fait un crit\u00e8re de recrutement et de promotion pour tous les professionnels charg\u00e9s de veiller \u00e0 ce que les technologies et\u00a0syst\u00e8mes de l&#8217;entreprise soient convenablement contr\u00f4l\u00e9s, suivis et \u00e9valu\u00e9s\u00a0: auditeurs, directeurs s\u00e9curit\u00e9, directeurs informatiques, directeurs des risques, consultants informatiques, etc.<\/p>\n<h2>Quel d\u00e9veloppement en France ?<\/h2>\n<p>Poss\u00e9der ce certificat offre une reconnaissance \u00e0 l&#8217;international &#8211; mais alors que l\u2019on compte plus de 35000 professionnels CISA<em>\u00ae<\/em> dans le monde, seuls 300 d\u2019entre eux seraient fran\u00e7ais, d\u2019apr\u00e8s le site web de l\u2019AFAI (Association Fran\u00e7aise d\u2019Audit et de Conseil Informatiques). Alors, pourquoi ce certificat n\u2019est-il pas plus diffus\u00e9 en France\u00a0?<\/p>\n<div>\n<p>Doit-on voir un obstacle culturel \u00e0 son adoption\u00a0? Pour un fran\u00e7ais, il n\u2019existe pas qu&#8217;une seule \u00ab\u00a0bonne\u00a0\u00bb fa\u00e7on de faire les choses\u00a0: les bonnes pratiques ont des limites, en fonction des contextes et les maturit\u00e9s observ\u00e9s. Le QCM, qui permet de valider la certification, est ainsi souvent d\u00e9cri\u00e9 pour valoriser un apprentissage &#8220;par c\u0153ur&#8221;, sans r\u00e9flexion.<\/p>\n<p>Ou doit-on y voir \u00a0plut\u00f4t la cons\u00e9quence du lourd investissement en temps n\u00e9cessaire\u00a0? En effet,la connaissance fine du r\u00e9f\u00e9rentiel associ\u00e9 au CISA<em>\u00ae<\/em> et sur lequel reposent une bonne partie des questions de l\u2019examen, le COBIT<em>\u00ae<\/em> (Control OBjectives for Information and related Technology), n\u00e9cessite plus que quelques heures de formation.<\/p>\n<p>Et bien non. La raison principale n\u2019est \u00e9videmment ni culturelle, ni li\u00e9e \u00e0 l\u2019investissement n\u00e9cessaire, mais plut\u00f4t \u00e0 une m\u00e9connaissance de ce certificat dans les pays non anglo-saxons. Et c\u2019est dommage, parce que le CISA\u00ae apporte de vrais avantages\u00a0!<\/p>\n<h2>Le CISA<em>\u00ae<\/em>, une vision m\u00e9tier de l\u2019IT<\/h2>\n<p>La mise en \u0153uvre des bonnes pratiques du CISA<em>\u00ae<\/em> permet d&#8217;acqu\u00e9rir certains r\u00e9flexes qui repr\u00e9sentent un fort retour sur investissement, puisqu\u2019ils offrent la possibilit\u00e9 d\u2019am\u00e9liorer la ma\u00eetrise du SI en interne, tout en d\u00e9livrant une forte valeur ajout\u00e9e au m\u00e9tier.<\/p>\n<p>Le plus int\u00e9ressant peut-\u00eatre pour nos entreprises fran\u00e7aises, c\u2019est l\u2019accent port\u00e9 par ce r\u00e9f\u00e9rentiel sur cette vision m\u00e9tier. En effet, les anglo-saxons n\u2019oublient jamais que, dans l\u2019entreprise, \u00a0on ne fait jamais de l&#8217;IT \u00ab\u00a0par amour de l\u2019art\u00a0\u00bb mais pour servir des vrais besoins business\u2026<\/p>\n<h2>COBIT<em>\u00ae<\/em>, la bo\u00eete \u00e0 outil du CISA<em>\u00ae<\/em><\/h2>\n<p>En dehors de cette vision m\u00e9tier apport\u00e9e par le CISA<em>\u00ae<\/em>, son r\u00e9f\u00e9rentiel appliqu\u00e9, COBIT <em>\u00ae,<\/em>est devenu\u00a0 le r\u00e9f\u00e9rentiel de r\u00e9f\u00e9rence en mati\u00e8re de \u00a0ma\u00eetrise des processus et activit\u00e9s du syst\u00e8me d\u2019information. Son p\u00e9rim\u00e8tre reprend en particulier celui des r\u00e9f\u00e9rentiels suivants\u00a0:<\/p>\n<p>&#8211; ISO 27001 pour la s\u00e9curit\u00e9 (depuis la version v5 du COBIT<em>\u00ae)<\/em>,<\/p>\n<p>&#8211; ITIL pour la gestion des services IT,<\/p>\n<p>&#8211; CMMI pour la maturit\u00e9 des processus IT.<\/p>\n<p>Il propose un certain nombre d\u2019indicateurs, de processus, de facteurs cl\u00e9s de succ\u00e8s et de bonnes pratiques pour aider les entreprises \u00e0 tirer parti au maximum de leur syst\u00e8me d\u2019information.<\/p>\n<p>A l\u2019heure o\u00f9 les entreprises sont de plus en plus soumises \u00e0 un environnement r\u00e8glementaire et technologique complexe, la certification CISA\u00ae offre un avantage concurrentiel fort. Elle permet de devenir un acteur actif du changement IT, ma\u00eetrisant les bonnes pratiques, sachant identifier et r\u00e9duire les risques IT, tout en restant conscient des besoins business en mati\u00e8re d&#8217;IT.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Le CISA\u00ae (Certified Information Systems Auditor) est un certificat international d\u00e9livr\u00e9 par l\u2019ISACA (Information System Audit and Control Association). Il atteste de la ma\u00eetrise \u00a0de la gouvernance, du management et du suivi des risques informatiques. Cette certification concerne plus de&#8230;<\/p>\n","protected":false},"author":179,"featured_media":3776,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"tags":[135,1199,1201,1200,122],"coauthors":[1198],"class_list":["post-3882","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strategie-projets-it","tag-certification","tag-cisa","tag-cobit","tag-isaca","tag-itil"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Certifications : CISA, la caverne d\u2019Ali Baba des auditeurs et consultants informatiques ?<\/title>\n<meta name=\"description\" content=\"Le CISA\u00ae (Certified Information Systems Auditor) est un certificat international d\u00e9livr\u00e9 par l\u2019ISACA (Information System Audit and Control Association). Il atteste de la ma\u00eetrise de la gouvernance, du management et du suivi des risques informatiques. La certification CISA\u00ae concerne plus de 100 000 professionnels IT dans plus de 160 pays.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Certifications : CISA, la caverne d\u2019Ali Baba des auditeurs et consultants informatiques ?\" \/>\n<meta property=\"og:description\" content=\"Le CISA\u00ae (Certified Information Systems Auditor) est un certificat international d\u00e9livr\u00e9 par l\u2019ISACA (Information System Audit and Control Association). Il atteste de la ma\u00eetrise de la gouvernance, du management et du suivi des risques informatiques. La certification CISA\u00ae concerne plus de 100 000 professionnels IT dans plus de 160 pays.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-08T06:55:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-08-17T09:13:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/05\/Fotolia_33861020_M-photos-immeubles-utilisation-LUV-NB.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1541\" \/>\n\t<meta property=\"og:image:height\" content=\"1233\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Florence Collins\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Florence Collins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/\"},\"author\":{\"name\":\"Florence Collins\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e3b381ba47f4d2a38f741984cc0e06b9\"},\"headline\":\"Certifications : CISA, la caverne d\u2019Ali Baba des auditeurs et consultants informatiques ?\",\"datePublished\":\"2013-07-08T06:55:14+00:00\",\"dateModified\":\"2015-08-17T09:13:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/\"},\"wordCount\":759,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/05\/Fotolia_33861020_M-photos-immeubles-utilisation-LUV-NB.jpg\",\"keywords\":[\"certification\",\"CISA\",\"COBIT\",\"ISACA\",\"ITIL\"],\"articleSection\":[\"M\u00e9tiers - Strat\u00e9gie &amp; projets IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/\",\"name\":\"Certifications : CISA, la caverne d\u2019Ali Baba des auditeurs et consultants informatiques ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/05\/Fotolia_33861020_M-photos-immeubles-utilisation-LUV-NB.jpg\",\"datePublished\":\"2013-07-08T06:55:14+00:00\",\"dateModified\":\"2015-08-17T09:13:44+00:00\",\"description\":\"Le CISA\u00ae (Certified Information Systems Auditor) est un certificat international d\u00e9livr\u00e9 par l\u2019ISACA (Information System Audit and Control Association). Il atteste de la ma\u00eetrise de la gouvernance, du management et du suivi des risques informatiques. La certification CISA\u00ae concerne plus de 100 000 professionnels IT dans plus de 160 pays.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/05\/Fotolia_33861020_M-photos-immeubles-utilisation-LUV-NB.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/05\/Fotolia_33861020_M-photos-immeubles-utilisation-LUV-NB.jpg\",\"width\":1541,\"height\":1233},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Certifications : CISA, la caverne d\u2019Ali Baba des auditeurs et consultants informatiques ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e3b381ba47f4d2a38f741984cc0e06b9\",\"name\":\"Florence Collins\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/florence-collins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Certifications : CISA, la caverne d\u2019Ali Baba des auditeurs et consultants informatiques ?","description":"Le CISA\u00ae (Certified Information Systems Auditor) est un certificat international d\u00e9livr\u00e9 par l\u2019ISACA (Information System Audit and Control Association). Il atteste de la ma\u00eetrise de la gouvernance, du management et du suivi des risques informatiques. La certification CISA\u00ae concerne plus de 100 000 professionnels IT dans plus de 160 pays.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/","og_locale":"en_US","og_type":"article","og_title":"Certifications : CISA, la caverne d\u2019Ali Baba des auditeurs et consultants informatiques ?","og_description":"Le CISA\u00ae (Certified Information Systems Auditor) est un certificat international d\u00e9livr\u00e9 par l\u2019ISACA (Information System Audit and Control Association). Il atteste de la ma\u00eetrise de la gouvernance, du management et du suivi des risques informatiques. La certification CISA\u00ae concerne plus de 100 000 professionnels IT dans plus de 160 pays.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/","og_site_name":"RiskInsight","article_published_time":"2013-07-08T06:55:14+00:00","article_modified_time":"2015-08-17T09:13:44+00:00","og_image":[{"width":1541,"height":1233,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/05\/Fotolia_33861020_M-photos-immeubles-utilisation-LUV-NB.jpg","type":"image\/jpeg"}],"author":"Florence Collins","twitter_misc":{"Written by":"Florence Collins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/"},"author":{"name":"Florence Collins","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e3b381ba47f4d2a38f741984cc0e06b9"},"headline":"Certifications : CISA, la caverne d\u2019Ali Baba des auditeurs et consultants informatiques ?","datePublished":"2013-07-08T06:55:14+00:00","dateModified":"2015-08-17T09:13:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/"},"wordCount":759,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/05\/Fotolia_33861020_M-photos-immeubles-utilisation-LUV-NB.jpg","keywords":["certification","CISA","COBIT","ISACA","ITIL"],"articleSection":["M\u00e9tiers - Strat\u00e9gie &amp; projets IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/","url":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/","name":"Certifications : CISA, la caverne d\u2019Ali Baba des auditeurs et consultants informatiques ?","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/05\/Fotolia_33861020_M-photos-immeubles-utilisation-LUV-NB.jpg","datePublished":"2013-07-08T06:55:14+00:00","dateModified":"2015-08-17T09:13:44+00:00","description":"Le CISA\u00ae (Certified Information Systems Auditor) est un certificat international d\u00e9livr\u00e9 par l\u2019ISACA (Information System Audit and Control Association). Il atteste de la ma\u00eetrise de la gouvernance, du management et du suivi des risques informatiques. La certification CISA\u00ae concerne plus de 100 000 professionnels IT dans plus de 160 pays.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/05\/Fotolia_33861020_M-photos-immeubles-utilisation-LUV-NB.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/05\/Fotolia_33861020_M-photos-immeubles-utilisation-LUV-NB.jpg","width":1541,"height":1233},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/cisa-ou-la-caverne-dali-baba-des-auditeurs-et-consultants-informatiques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Certifications : CISA, la caverne d\u2019Ali Baba des auditeurs et consultants informatiques ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e3b381ba47f4d2a38f741984cc0e06b9","name":"Florence Collins","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/florence-collins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/179"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=3882"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3882\/revisions"}],"predecessor-version":[{"id":3908,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3882\/revisions\/3908"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/3776"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=3882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=3882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=3882"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=3882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}