{"id":4350,"date":"2013-10-11T17:03:56","date_gmt":"2013-10-11T16:03:56","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=4350"},"modified":"2019-12-31T11:32:22","modified_gmt":"2019-12-31T10:32:22","slug":"vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/","title":{"rendered":"Vol de donn\u00e9es chez Vodafone : un rappel douloureux de la \u00ab&nbsp;menace int\u00e9rieure&nbsp;\u00bb"},"content":{"rendered":"<p>A l\u2019heure o\u00f9 la cybercriminalit\u00e9 sur internet d\u00e9fraie r\u00e9guli\u00e8rement la chronique, l\u2019incident de Vodafone nous rappelle que les incidents de s\u00e9curit\u00e9 peuvent \u00e9galement provenir de l\u2019int\u00e9rieur de l\u2019entreprise.<\/p>\n<h2>Une attaque motiv\u00e9e par la perspective de gains financiers<\/h2>\n<p>L\u2019enqu\u00eate semble converger vers un prestataire de l\u2019op\u00e9rateur qui aurait r\u00e9alis\u00e9 le vol de donn\u00e9es. Ce dernier a d\u00e9j\u00e0 \u00e9t\u00e9 interpell\u00e9 par les forces de l\u2019ordre, preuve pour les plus sceptiques, de l\u2019efficacit\u00e9 aujourd\u2019hui des autorit\u00e9s sur ces dossiers d\u2019attaques informatiques. Nous en saurons certainement plus dans les jours qui viennent sur ses motivations, mais la recherche de gains financiers ne doit pas \u00eatre n\u00e9glig\u00e9e. Aujourd\u2019hui, un \u00ab\u00a0enregistrement client\u00a0\u00bb (nom, pr\u00e9nom, adresse\u2026) peut se monnayer autour de 15 centimes de dollars, ce qui repr\u00e9sente quand m\u00eame plus 300\u00a0000 euros dans le cas de Vodafone.<\/p>\n<p>En effet, plus de deux millions de donn\u00e9es clients ont \u00e9t\u00e9 d\u00e9rob\u00e9es, dont certaines informations bancaires. Ces donn\u00e9es pourront servir \u00e0 r\u00e9aliser des attaques en <em>phishing<\/em> de \u00ab\u00a0haute qualit\u00e9\u00a0\u00bb, capables de tromper plus facilement les destinataires gr\u00e2ce \u00e0 des informations fiables. Heureusement, les enregistrements les plus sensibles (num\u00e9ro de carte, mot de passe\u2026) semblent avoir \u00e9t\u00e9 \u00e9pargn\u00e9s. Dans le cas contraire, \u00a0l\u2019impact aurait pu \u00eatre bien plus important\u00a0: des fraudes financi\u00e8res auraient pu \u00eatre r\u00e9alis\u00e9es directement.<\/p>\n<h2>\u00a0Prestataires et administrateurs\u00a0: des populations \u00e0 encadrer<\/h2>\n<p>Cet incident met \u00e0 nouveau en lumi\u00e8re la faille majeure que repr\u00e9sentent les fonctions d\u2019administrations du SI. Sans pr\u00e9juger de la situation de Vodafone, ces fonctions sont souvent externalis\u00e9es \u00e0 moindre co\u00fbt dans des m\u00e9ga-contrats dont les contours sont toujours difficiles \u00e0 cerner (qualification des employ\u00e9s, sous-traitance masqu\u00e9e, pays concern\u00e9s\u2026) et dont les mesures de s\u00e9curit\u00e9 cens\u00e9s encadrer les usages sont rarement v\u00e9rifi\u00e9es sur le terrain. Et cette situation se rencontre malheureusement dans de nombreux secteurs, m\u00eame les plus sensibles. N\u2019oublions pas qu\u2019Edward Snowden, administrateur sous-traitant, nous d\u00e9voile r\u00e9guli\u00e8rement depuis le d\u00e9but de l\u2019\u00e9t\u00e9 des documents secrets de la NSA\u2026<\/p>\n<h2>Des changements \u00e0 entamer \u00e0 la DSI et \u00e0 la direction des achats d\u00e8s aujourd\u2019hui pour limiter les risques<\/h2>\n<p>Vodafone vient de voir son image \u00e9corn\u00e9e et les co\u00fbts de gestion de l\u2019incident risquent d\u2019\u00eatre \u00e9lev\u00e9s. Au-del\u00e0 des co\u00fbts directs li\u00e9s aux investigations, le volet notification des clients peut \u00eatre majeur. Les chiffres en provenance des \u00c9tats-Unis parlent d\u2019un co\u00fbt autour de 100\u20ac par clients \u00e0 notifier, nous sommes dans une fourchette rapidement sup\u00e9rieures \u00e0 la centaine de millions d\u2019euros.<\/p>\n<p>Dans cette situation, et pour limiter les impacts, un contrat de cyber assurance peut \u00eatre utile, mais attention il ne doit pas contenir d\u2019exclusion sur les malveillances internes.<\/p>\n<p>Au-del\u00e0 de cette mesure de compensation, il est bien \u00e9videmment n\u00e9cessaire de v\u00e9rifier sur les p\u00e9rim\u00e8tres les plus sensibles de l\u2019entreprise, la qualit\u00e9 et la s\u00e9curit\u00e9 des processus d\u2019administration. Il s\u2019agit d\u2019un chantier d\u2019ampleur, qui au-del\u00e0 de la mise en place de mesures techniques (mise en place de plateforme de rebond, journalisation des actions, limitations des comptes d\u2019administration, utilisation de postes de travail d\u00e9di\u00e9s non connect\u00e9s \u00e0 Internet\u2026) est avant tout un projet de conduite du changement. Un changement \u00e0 mener \u00e0 deux niveaux, aupr\u00e8s de populations de la DSI souvent tr\u00e8s (voir trop) autonomes dans la r\u00e9alisation de leurs actions au quotidien qui doivent accepter la mise en place de mesure de s\u00e9curit\u00e9 et de contr\u00f4le, mais aussi et peut \u00eatre surtout au niveau de la direction des achats pour valoriser les fonctions d\u2019administration du SI et faire de la s\u00e9curit\u00e9 un des crit\u00e8res de premiers plans dans les contrats d\u2019externalisation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A l\u2019heure o\u00f9 la cybercriminalit\u00e9 sur internet d\u00e9fraie r\u00e9guli\u00e8rement la chronique, l\u2019incident de Vodafone nous rappelle que les incidents de s\u00e9curit\u00e9 peuvent \u00e9galement provenir de l\u2019int\u00e9rieur de l\u2019entreprise. Une attaque motiv\u00e9e par la perspective de gains financiers L\u2019enqu\u00eate semble converger&#8230;<\/p>\n","protected":false},"author":15,"featured_media":6227,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3222,36,43],"tags":[1349,183,412,1149,3304],"coauthors":[837],"class_list":["post-4350","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy","category-cybersecurity-digital-trust","category-telcos","tag-cyberassurance","tag-cybercriminalite","tag-donnees-a-caractere-personnel","tag-phishing","tag-risk-management-strategy-governance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vol de donn\u00e9es chez Vodafone : un rappel douloureux de la \u00ab menace int\u00e9rieure \u00bb<\/title>\n<meta name=\"description\" content=\"A l\u2019heure o\u00f9 la cybercriminalit\u00e9 sur internet d\u00e9fraie r\u00e9guli\u00e8rement la chronique, l\u2019incident de Vodafone nous rappelle que les incidents de s\u00e9curit\u00e9 peuvent \u00e9galement provenir de l\u2019int\u00e9rieur de l\u2019entreprise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vol de donn\u00e9es chez Vodafone : un rappel douloureux de la \u00ab menace int\u00e9rieure \u00bb\" \/>\n<meta property=\"og:description\" content=\"A l\u2019heure o\u00f9 la cybercriminalit\u00e9 sur internet d\u00e9fraie r\u00e9guli\u00e8rement la chronique, l\u2019incident de Vodafone nous rappelle que les incidents de s\u00e9curit\u00e9 peuvent \u00e9galement provenir de l\u2019int\u00e9rieur de l\u2019entreprise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-11T16:03:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:32:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Vol de donn\u00e9es chez Vodafone : un rappel douloureux de la \u00ab&nbsp;menace int\u00e9rieure&nbsp;\u00bb\",\"datePublished\":\"2013-10-11T16:03:56+00:00\",\"dateModified\":\"2019-12-31T10:32:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/\"},\"wordCount\":672,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg\",\"keywords\":[\"cyberassurance\",\"Cybercriminalit\u00e9\",\"DPO\",\"phishing\",\"Risk management\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\",\"M\u00e9tiers - Telcos\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/\",\"name\":\"Vol de donn\u00e9es chez Vodafone : un rappel douloureux de la \u00ab menace int\u00e9rieure \u00bb\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg\",\"datePublished\":\"2013-10-11T16:03:56+00:00\",\"dateModified\":\"2019-12-31T10:32:22+00:00\",\"description\":\"A l\u2019heure o\u00f9 la cybercriminalit\u00e9 sur internet d\u00e9fraie r\u00e9guli\u00e8rement la chronique, l\u2019incident de Vodafone nous rappelle que les incidents de s\u00e9curit\u00e9 peuvent \u00e9galement provenir de l\u2019int\u00e9rieur de l\u2019entreprise.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg\",\"width\":1500,\"height\":1125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vol de donn\u00e9es chez Vodafone : un rappel douloureux de la \u00ab&nbsp;menace int\u00e9rieure&nbsp;\u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vol de donn\u00e9es chez Vodafone : un rappel douloureux de la \u00ab menace int\u00e9rieure \u00bb","description":"A l\u2019heure o\u00f9 la cybercriminalit\u00e9 sur internet d\u00e9fraie r\u00e9guli\u00e8rement la chronique, l\u2019incident de Vodafone nous rappelle que les incidents de s\u00e9curit\u00e9 peuvent \u00e9galement provenir de l\u2019int\u00e9rieur de l\u2019entreprise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/","og_locale":"en_US","og_type":"article","og_title":"Vol de donn\u00e9es chez Vodafone : un rappel douloureux de la \u00ab menace int\u00e9rieure \u00bb","og_description":"A l\u2019heure o\u00f9 la cybercriminalit\u00e9 sur internet d\u00e9fraie r\u00e9guli\u00e8rement la chronique, l\u2019incident de Vodafone nous rappelle que les incidents de s\u00e9curit\u00e9 peuvent \u00e9galement provenir de l\u2019int\u00e9rieur de l\u2019entreprise.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/","og_site_name":"RiskInsight","article_published_time":"2013-10-11T16:03:56+00:00","article_modified_time":"2019-12-31T10:32:22+00:00","og_image":[{"width":1500,"height":1125,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Vol de donn\u00e9es chez Vodafone : un rappel douloureux de la \u00ab&nbsp;menace int\u00e9rieure&nbsp;\u00bb","datePublished":"2013-10-11T16:03:56+00:00","dateModified":"2019-12-31T10:32:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/"},"wordCount":672,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg","keywords":["cyberassurance","Cybercriminalit\u00e9","DPO","phishing","Risk management"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust","M\u00e9tiers - Telcos"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/","url":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/","name":"Vol de donn\u00e9es chez Vodafone : un rappel douloureux de la \u00ab menace int\u00e9rieure \u00bb","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg","datePublished":"2013-10-11T16:03:56+00:00","dateModified":"2019-12-31T10:32:22+00:00","description":"A l\u2019heure o\u00f9 la cybercriminalit\u00e9 sur internet d\u00e9fraie r\u00e9guli\u00e8rement la chronique, l\u2019incident de Vodafone nous rappelle que les incidents de s\u00e9curit\u00e9 peuvent \u00e9galement provenir de l\u2019int\u00e9rieur de l\u2019entreprise.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg","width":1500,"height":1125},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/vol-de-donnees-chez-vodafone-un-rappel-douloureux-de-la-menace-interieure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Vol de donn\u00e9es chez Vodafone : un rappel douloureux de la \u00ab&nbsp;menace int\u00e9rieure&nbsp;\u00bb"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=4350"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4350\/revisions"}],"predecessor-version":[{"id":6336,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4350\/revisions\/6336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6227"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=4350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=4350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=4350"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=4350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}