{"id":3985,"date":"2013-08-05T09:31:59","date_gmt":"2013-08-05T08:31:59","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=3985"},"modified":"2020-01-02T11:16:21","modified_gmt":"2020-01-02T10:16:21","slug":"loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/","title":{"rendered":"Loi de programmation militaire 2013 : de r\u00e9elles avanc\u00e9es pour la cybers\u00e9curit\u00e9"},"content":{"rendered":"<p>Le projet de loi de programmation militaire a \u00e9t\u00e9 pr\u00e9sent\u00e9 au conseil des ministres le 2 ao\u00fbt. En attendant de disposer du texte complet, <a href=\"http:\/\/www.defense.gouv.fr\/content\/download\/216931\/2413504\/file\/LPM%202014-2019%20-%20Dossier%20th%C3%A9matique.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">un dossier r\u00e9sumant les points cl\u00e9s a \u00e9t\u00e9 publi\u00e9 par le minist\u00e8re de la d\u00e9fense<\/a>. Ce dernier est plein d\u2019enseignements sur les \u00e9volutions \u00e0 venir en mati\u00e8re de cyberd\u00e9fense et de cybers\u00e9curit\u00e9.<\/p>\n<p>Il met en particulier l\u2019ANSSI au c\u0153ur de la future strat\u00e9gie de la France dans ce domaine en renfor\u00e7ant ses pouvoirs et sa capacit\u00e9 d\u2019action. La majorit\u00e9 de ces points \u00e9taient connus ou envisag\u00e9s depuis <a title=\"Cyberd\u00e9fense : l\u2019Etat veut franchir une nouvelle \u00e9tape\" href=\"http:\/\/www.solucominsight.fr\/2013\/06\/cyberdefense-letat-veut-franchir-une-nouvelle-etape\/\" target=\"_blank\" rel=\"noopener noreferrer\">la publication du livre blanc D\u00e9fense et s\u00e9curit\u00e9 nationale 2013<\/a>. Mais ce document donne plus de d\u00e9tails sur les moyens d\u00e9ploy\u00e9s et les orientations \u00e0 venir.<\/p>\n<h2>Les op\u00e9rateurs d\u2019importance vitale (OIV), sous le contr\u00f4le rapproch\u00e9 de l\u2019ANSSI<\/h2>\n<p>Le texte pr\u00e9voit que le Premier ministre, avec l\u2019aide de l\u2019ANSSI, puisse imposer aux OIV, sur leurs p\u00e9rim\u00e8tres sensibles, la mise en place de mesures de s\u00e9curit\u00e9, la qualification des syst\u00e8mes de d\u00e9tection et la r\u00e9alisation d\u2019audit par l\u2019ANSSI. Comme pr\u00e9vu,<a title=\"Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?\" href=\"http:\/\/www.solucominsight.fr\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/\" target=\"_blank\" rel=\"noopener noreferrer\"> la notification des incidents <\/a>est int\u00e9gr\u00e9e au texte. Elle se d\u00e9finit par l\u2019obligation de fournir \u00ab\u00a0des informations sur les attaques qu\u2019ils peuvent subir\u00a0\u00bb.<\/p>\n<p>Au del\u00e0 du <a href=\"http:\/\/www.ssi.gouv.fr\/IMG\/pdf\/guide_hygiene_informatique_anssi.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">guide d\u2019hygi\u00e8ne informatique <\/a>qui pourrait \u00eatre la base des mesures impos\u00e9es, l\u2019ANSSI travaille actuellement sur d\u2019autres r\u00e9f\u00e9rentiels, par exemple sur les syst\u00e8mes industriels ou sur le cloud.<\/p>\n<p>En cas de non-respect de ces obligations, des sanctions p\u00e9nales sont pr\u00e9vues. Il se posera alors la difficile question des moyens \u00e0 disposition pour respecter ces obligations. Aujourd\u2019hui, m\u00eame si la s\u00e9curit\u00e9 est souvent pr\u00e9serv\u00e9e des coupes budg\u00e9taires, les budgets allou\u00e9s sont souvent trop faibles au regard des enjeux et des risques. Esp\u00e9rons que cette r\u00e9glementation, au-del\u00e0 de para\u00eetre \u00ab\u00a0intrusive\u00a0\u00bb, aura des vertus p\u00e9dagogiques et fera prendre conscience aux dirigeants des OIV des r\u00e9els enjeux de s\u00e9curit\u00e9 et permettra le d\u00e9blocage de ressources.<\/p>\n<h2>\u00a0La lutte informatique d\u00e9fensive dans le champ d\u2019action de l\u2019ANSSI<\/h2>\n<p>Le r\u00e9cent rapprochement \u00ab\u00a0g\u00e9ographique\u00a0\u00bb entre le <a href=\"http:\/\/www.defense.gouv.fr\/actualites\/dossiers\/sept-2011-cyberdefense-enjeu-du-21e-siecle\/france\/voir-les-articles\/le-calid-l-expert-technique-en-securite-informatique-du-ministere\" target=\"_blank\" rel=\"noopener noreferrer\">CALID <\/a>(centre d&#8217;analyse en lutte informatique d\u00e9fensive) du Minist\u00e8re de la D\u00e9fense et le <a href=\"http:\/\/www.ssi.gouv.fr\/fr\/anssi\/organisation\/centre-operationnel-de-la-securite-des-systemes-d-information-cossi.html\" target=\"_blank\" rel=\"noopener noreferrer\">COSSI<\/a> (centre op\u00e9rationnel en s\u00e9curit\u00e9 SI) de l\u2019ANSSI le laissait pr\u00e9sager. Il y a aujourd\u2019hui une volont\u00e9 de renforcer les capacit\u00e9s de lutte informatique d\u00e9fensive au sein de l\u2019Etat. L\u2019ANSSI sera ainsi en mesure \u00ab\u00a0d\u2019acc\u00e9der a\u0300 un serveur informatique a\u0300 l\u2019origine d\u2019une attaque afin d\u2019en neutraliser les effets\u00a0\u00bb. C\u2019est une premi\u00e8re dans ce domaine. Des dispositifs juridiques sont pr\u00e9vus pour que ces actions ne rentrent pas dans le champ des articles 323-1,2 et 3 du code p\u00e9nal qui r\u00e9priment des actions de ce type.<\/p>\n<h2>\u00a0Le volet militaire n\u2019est pas en reste\u00a0: recrutements et investissements sont pr\u00e9vus<\/h2>\n<p>De nombreuses autres \u00e9volutions sont pr\u00e9vues, en particulier dans le domaine du d\u00e9veloppement des capacit\u00e9s de cyberd\u00e9fense militaire avec la mise en place d\u2019une cha\u00eene op\u00e9rationnelle unifi\u00e9e, centralis\u00e9e et sp\u00e9cialis\u00e9e. Le projet de loi pr\u00e9voit la mise en place des capacit\u00e9s d\u00e9fensives mais aussi offensives pour pr\u00e9parer ou accompagner les op\u00e9rations militaires. Les moyens humains seront renforc\u00e9s et des investissements sont \u00e9galement pr\u00e9vus en particulier pour mieux surveiller les syst\u00e8mes critiques. La DGA sera en charge de la composante technique de cette organisation.<\/p>\n<h2>\u00a0L\u2019Etat investit dans la cybers\u00e9curit\u00e9\u2026 mais les entreprises restent \u00e0 convaincre<\/h2>\n<p>Nous ne sommes qu\u2019au d\u00e9but du processus l\u00e9gislatif et les d\u00e9bats au parlement et au s\u00e9nat am\u00e8neront certainement des modifications. Cependant, l\u2019orientation est claire et tout cela va dans la bonne direction pour renforcer nos capacit\u00e9s de d\u00e9fense face \u00e0 des attaquants de plus en plus virulents et pointus.<\/p>\n<p>Enfin, ce projet de loi d\u00e9montre que l\u2019\u00c9tat a compris les enjeux de la cybers\u00e9curit\u00e9 et investit fortement dans ce domaine. Esp\u00e9rons que cela sera un \u00e9lectrochoc pour les organisations priv\u00e9es, aujourd\u2019hui en retrait face aux \u00e9volutions de la cybercriminalit\u00e9.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le projet de loi de programmation militaire a \u00e9t\u00e9 pr\u00e9sent\u00e9 au conseil des ministres le 2 ao\u00fbt. En attendant de disposer du texte complet, un dossier r\u00e9sumant les points cl\u00e9s a \u00e9t\u00e9 publi\u00e9 par le minist\u00e8re de la d\u00e9fense. Ce&#8230;<\/p>\n","protected":false},"author":15,"featured_media":6080,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3226],"tags":[1166,1157,1160,1158,1247,3326],"coauthors":[837],"class_list":["post-3985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-compliance","tag-anssi","tag-cyberdefense","tag-defense-nationale","tag-notification","tag-oiv","tag-sectoral-regulations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Loi de programmation militaire 2013 : de r\u00e9elles avanc\u00e9es pour la cybers\u00e9curit\u00e9<\/title>\n<meta name=\"description\" content=\"Le projet de loi de programmation militaire a \u00e9t\u00e9 pr\u00e9sent\u00e9 au conseil des ministres le 2 ao\u00fbt. En attendant de disposer du texte complet, un dossier r\u00e9sumant les points cl\u00e9s a \u00e9t\u00e9 publi\u00e9 par le minist\u00e8re de la d\u00e9fense. Ce dernier est plein d\u2019enseignements sur les \u00e9volutions \u00e0 venir en mati\u00e8re de cyberd\u00e9fense et de cybers\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Loi de programmation militaire 2013 : de r\u00e9elles avanc\u00e9es pour la cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Le projet de loi de programmation militaire a \u00e9t\u00e9 pr\u00e9sent\u00e9 au conseil des ministres le 2 ao\u00fbt. En attendant de disposer du texte complet, un dossier r\u00e9sumant les points cl\u00e9s a \u00e9t\u00e9 publi\u00e9 par le minist\u00e8re de la d\u00e9fense. Ce dernier est plein d\u2019enseignements sur les \u00e9volutions \u00e0 venir en mati\u00e8re de cyberd\u00e9fense et de cybers\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-05T08:31:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T10:16:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1399\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Loi de programmation militaire 2013 : de r\u00e9elles avanc\u00e9es pour la cybers\u00e9curit\u00e9\",\"datePublished\":\"2013-08-05T08:31:59+00:00\",\"dateModified\":\"2020-01-02T10:16:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/\"},\"wordCount\":751,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"keywords\":[\"ANSSI\",\"cyberd\u00e9fense\",\"d\u00e9fense nationale\",\"notification\",\"OIV\",\"sectoral regulations\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/\",\"name\":\"Loi de programmation militaire 2013 : de r\u00e9elles avanc\u00e9es pour la cybers\u00e9curit\u00e9\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"datePublished\":\"2013-08-05T08:31:59+00:00\",\"dateModified\":\"2020-01-02T10:16:21+00:00\",\"description\":\"Le projet de loi de programmation militaire a \u00e9t\u00e9 pr\u00e9sent\u00e9 au conseil des ministres le 2 ao\u00fbt. En attendant de disposer du texte complet, un dossier r\u00e9sumant les points cl\u00e9s a \u00e9t\u00e9 publi\u00e9 par le minist\u00e8re de la d\u00e9fense. Ce dernier est plein d\u2019enseignements sur les \u00e9volutions \u00e0 venir en mati\u00e8re de cyberd\u00e9fense et de cybers\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"width\":1500,\"height\":1399},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Loi de programmation militaire 2013 : de r\u00e9elles avanc\u00e9es pour la cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Loi de programmation militaire 2013 : de r\u00e9elles avanc\u00e9es pour la cybers\u00e9curit\u00e9","description":"Le projet de loi de programmation militaire a \u00e9t\u00e9 pr\u00e9sent\u00e9 au conseil des ministres le 2 ao\u00fbt. En attendant de disposer du texte complet, un dossier r\u00e9sumant les points cl\u00e9s a \u00e9t\u00e9 publi\u00e9 par le minist\u00e8re de la d\u00e9fense. Ce dernier est plein d\u2019enseignements sur les \u00e9volutions \u00e0 venir en mati\u00e8re de cyberd\u00e9fense et de cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/","og_locale":"en_US","og_type":"article","og_title":"Loi de programmation militaire 2013 : de r\u00e9elles avanc\u00e9es pour la cybers\u00e9curit\u00e9","og_description":"Le projet de loi de programmation militaire a \u00e9t\u00e9 pr\u00e9sent\u00e9 au conseil des ministres le 2 ao\u00fbt. En attendant de disposer du texte complet, un dossier r\u00e9sumant les points cl\u00e9s a \u00e9t\u00e9 publi\u00e9 par le minist\u00e8re de la d\u00e9fense. Ce dernier est plein d\u2019enseignements sur les \u00e9volutions \u00e0 venir en mati\u00e8re de cyberd\u00e9fense et de cybers\u00e9curit\u00e9.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/","og_site_name":"RiskInsight","article_published_time":"2013-08-05T08:31:59+00:00","article_modified_time":"2020-01-02T10:16:21+00:00","og_image":[{"width":1500,"height":1399,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Loi de programmation militaire 2013 : de r\u00e9elles avanc\u00e9es pour la cybers\u00e9curit\u00e9","datePublished":"2013-08-05T08:31:59+00:00","dateModified":"2020-01-02T10:16:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/"},"wordCount":751,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","keywords":["ANSSI","cyberd\u00e9fense","d\u00e9fense nationale","notification","OIV","sectoral regulations"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/","name":"Loi de programmation militaire 2013 : de r\u00e9elles avanc\u00e9es pour la cybers\u00e9curit\u00e9","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","datePublished":"2013-08-05T08:31:59+00:00","dateModified":"2020-01-02T10:16:21+00:00","description":"Le projet de loi de programmation militaire a \u00e9t\u00e9 pr\u00e9sent\u00e9 au conseil des ministres le 2 ao\u00fbt. En attendant de disposer du texte complet, un dossier r\u00e9sumant les points cl\u00e9s a \u00e9t\u00e9 publi\u00e9 par le minist\u00e8re de la d\u00e9fense. Ce dernier est plein d\u2019enseignements sur les \u00e9volutions \u00e0 venir en mati\u00e8re de cyberd\u00e9fense et de cybers\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","width":1500,"height":1399},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Loi de programmation militaire 2013 : de r\u00e9elles avanc\u00e9es pour la cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=3985"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3985\/revisions"}],"predecessor-version":[{"id":12446,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3985\/revisions\/12446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6080"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=3985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=3985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=3985"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=3985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}