{"id":4948,"date":"2014-01-24T22:34:35","date_gmt":"2014-01-24T21:34:35","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=4948"},"modified":"2019-12-23T11:27:00","modified_gmt":"2019-12-23T10:27:00","slug":"rssi-communiquez-avec-ceux-qui-communiquent","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/","title":{"rendered":"RSSI, communiquez avec ceux qui communiquent !"},"content":{"rendered":"<p>Alors que \u00a02014 d\u00e9marre juste, les incidents de s\u00e9curit\u00e9 font d\u00e9j\u00e0 la Une des journaux. Du vol massif de donn\u00e9es clients dont a \u00e9t\u00e9 victime Target outre-Atlantique aux fuites d\u2019email en Allemagne, il ne se passe pas une semaine sans que la s\u00e9curit\u00e9 informatique ne fasse l\u2019actualit\u00e9.<\/p>\n<p>Cette multiplication d\u2019\u00e9v\u00e8nements montre que toutes les organisations peuvent \u00eatre concern\u00e9es. Et lorsqu\u2019un incident survient, c\u2019est tout l\u2019\u00e9cosyst\u00e8me de l\u2019entreprise qui doit \u00eatre mobilis\u00e9 pour g\u00e9rer la crise\u00a0: clients et collaborateurs, mais aussi fournisseurs, partenaires, presse\u2026<\/p>\n<p>Force est de constater que peu de structure ont d\u00e9j\u00e0 mise en place un plan de communication de crise face \u00e0 un incident li\u00e9 \u00e0 la cybercriminalit\u00e9. Aujourd\u2019hui, le RSSI doit se positionner comme le chef d\u2019orchestre de cette d\u00e9marche. Quelles sont les cibles prioritaires \u00e0 inclure\u00a0? Quel type de message\u00a0pr\u00e9parer ? Voici des \u00e9l\u00e9ments de r\u00e9ponses issues de nos retours d\u2019exp\u00e9rience.<\/p>\n<h2>La direction g\u00e9n\u00e9rale\u00a0: expliquer, analyser et mobiliser<\/h2>\n<p>Les RSSI parlent \u00e0 leur direction depuis des ann\u00e9es\u00a0; c\u2019est m\u00eame une de leurs cibles de pr\u00e9dilection. Mais les messages doivent aujourd\u2019hui changer. Jusqu\u2019alors en effet, le RSSI, essayait d\u2019attirer l\u2019attention sur son sujet, afin d\u2019obtenir des ressources par exemple.<\/p>\n<p>Aujourd\u2019hui, il doit d\u00e9mystifier ce qu\u2019il se passe, donner des cl\u00e9s de lecture sur un sujet qui touche maintenant le grand public. A titre d\u2019illustration, les Echos ont publi\u00e9 depuis juin 2013 <a href=\"http:\/\/recherche.lesechos.fr\/?exec=1&amp;texte=nsa&amp;ok=&amp;ob=datepub&amp;fco=Edward+Snowden&amp;page=1\" target=\"_blank\" rel=\"noopener noreferrer\">156 articles consacr\u00e9s \u00e0 Edward Snowde<\/a>n.\u00a0 Cette abondance d\u2019information peut g\u00e9n\u00e9rer des incompr\u00e9hensions ou des doutes\u00a0: en quoi mon entreprise est-elle concern\u00e9e\u00a0? Peut-on se prot\u00e9ger\u00a0? Un incident de type Target ou Vodafone est-il envisageable chez nous\u00a0? Que fait-on en mati\u00e8re de protection\u00a0? \u00a0Cette communication devra \u00eatre claire, synth\u00e9tique\u2026 et transparente. Sans sombrer dans le fatalisme ou au contraire l\u2019exc\u00e8s de confiance, elle mettra \u00a0en lumi\u00e8re la r\u00e9alit\u00e9 des menaces pour l\u2019entreprise et les vuln\u00e9rabilit\u00e9s qui demandent \u00e0 \u00eatre trait\u00e9es d\u00e8s aujourd\u2019hui.<\/p>\n<h2>Ressources humaines\u00a0et communication interne\u00a0: des alli\u00e9s pour sensibiliser les collaborateurs<\/h2>\n<p>Les collaborateurs sont une cible essentielle pour le RSSI. M\u00eame si les actions de sensibilisations ne sont pas \u00e0 100% efficaces, elles sont n\u00e9cessaires pour minimiser les risques. Comme dans le cas de la direction g\u00e9n\u00e9rale, le RSSI dispose avec l\u2019actualit\u00e9 r\u00e9cente d\u2019une opportunit\u00e9 de communication sans pr\u00e9c\u00e9dent.<\/p>\n<p>Des messages simples et clairs pourront \u00eatre adress\u00e9s \u00e0 l\u2019ensemble des utilisateurs pour leur rappeler leur devoir vis-\u00e0-vis du syst\u00e8me d\u2019information. Les ressources humaines et la communication interne apporteront\u00a0 \u00e0 ces campagnes leur ma\u00eetrise des canaux et des codes internes de communication, propre \u00e0 chaque entreprise. Pour renforcer l\u2019impact des messages, \u00a0n\u2019h\u00e9sitez pas \u00e0 faire un parall\u00e8le avec les situations de la vie priv\u00e9e que les utilisateurs rencontrent (banque en ligne, r\u00e9seaux sociaux\u2026), les messages seront mieux assimil\u00e9s.<\/p>\n<h2>Les fonctions SI \/ m\u00e9tiers critiques\u00a0: maintenir la vigilance des fonctions les plus cibl\u00e9es<\/h2>\n<p>Les incidents r\u00e9cents montrent clairement qu\u2019aujourd\u2019hui les cybercriminels savent mener des attaques cibl\u00e9es sur les fonctions sensibles de l\u2019entreprise. M\u00eame s\u2019ils sont connus, ces sc\u00e9narios restent encore tr\u00e8s efficaces. Une communication sp\u00e9cifique pour maintenir l\u2019attention de ces populations en \u00e9veil est n\u00e9cessaire. L\u2019utilisation d\u2019exemples concrets sera particuli\u00e8rement efficace et il en existe de nombreux, <a href=\"http:\/\/www.dailymail.co.uk\/news\/article-2522056\/G20-diplomats-computers-hacked-clicking-attachment-labelled-naked-pictures-Carla-Bruni.html\" target=\"_blank\" rel=\"noopener noreferrer\">des photos de Carla Bruni pour pi\u00e9ger des diplomates<\/a>\u00a0 \u00e0 l\u2019appel t\u00e9l\u00e9phonique pour <a href=\"http:\/\/www.symantec.com\/connect\/blogs\/francophoned-sophisticated-social-engineering-attack\" target=\"_blank\" rel=\"noopener noreferrer\">pousser un utilisateur \u00e0 r\u00e9aliser des virements frauduleux. <\/a><\/p>\n<p>Ces trois premi\u00e8res cat\u00e9gories ne sont pas nouvelles\u00a0: les RSSI ont l\u2019habitude de travailler avec elles. Leurs messages doivent n\u00e9anmoins s\u2019adapter.<\/p>\n<p>Surtout, nous assistons \u00e0 l\u2019\u00e9mergence de deux nouvelles cibles de communication, \u00e0 qui les \u00e9v\u00e8nements r\u00e9cents ont conf\u00e9r\u00e9 une forte importance.<\/p>\n<h2>La direction de la communication : pr\u00e9parer la crise pour en r\u00e9duire l\u2019impact aupr\u00e8s du public<\/h2>\n<p>La probabilit\u00e9 qu\u2019un incident se produise dans les grandes organisations augmente singuli\u00e8rement ces derniers temps, avec des cas dans tous les secteurs d\u2019activit\u00e9s et de plus en plus d\u2019occurrence en Europe et en France. Surtout, la conscience que de tels incidents peuvent se produire augmente, rendent les directions de la communication plus r\u00e9ceptives au discours des RSSI.<\/p>\n<p>Une communication rapide, structur\u00e9e clairement, \u00a0est n\u00e9cessaire \u00a0dans des situations de crise. Bien souvent n\u00e9anmoins, les crises li\u00e9s \u00e0 la cybercriminalit\u00e9 ne sont ni connues ni envisag\u00e9es par les \u00e9quipes de communication. C\u2019est le bon moment pour le RSSI d\u2019\u00e9changer avec ces entit\u00e9s (communication institutionnelle mais aussi de crise) et de les sensibiliser \u00e0 ce qui pourrait se passer en cas d\u2019attaques.<\/p>\n<p>Quelques r\u00e9unions de travail, permettront de r\u00e9fl\u00e9chir ensemble aux diff\u00e9rents temps m\u00e9diatiques et de d\u00e9finir les postures de base \u00e0 adopter en cas de <em>phishing<\/em> (email frauduleux aux clients), de sites web modifi\u00e9 (d\u00e9facement) ou encore en cas d\u2019interruption de service (D\u00e9nis de service DDoS).<\/p>\n<h2>Direction de la relation clients\u00a0: savoir activer les canaux en cas de crise<\/h2>\n<p>2014 va rendre cet interlocuteur incontournable pour le RSSI\u2026 cette ann\u00e9e sera en effet celle du vote du r\u00e8glement europ\u00e9en sur la protection des donn\u00e9es \u00e0 caract\u00e8re personnel. Le texte devrait imposer la notification des incidents de s\u00e9curit\u00e9 aux clients concern\u00e9s par un vol de donn\u00e9es \u00e0 partir de 2016.<\/p>\n<p>Il s\u2019agira d\u2019une obligation majeure qui entra\u00eenera un changement de posture dans la relation client. Ce changement doit \u00eatre anticip\u00e9 d\u00e8s maintenant. Les retours d\u2019exp\u00e9rience\u00a0 montrent qu\u2019au-del\u00e0 du co\u00fbt important li\u00e9 \u00e0 ces notifications (entre 10 et 200 \u20ac par client suivant la gravit\u00e9 des fuites de donn\u00e9es et les pays concern\u00e9s), les effets sont r\u00e9els sur les canaux de communication classique (agences, call-center, site web, r\u00e9seaux sociaux\u2026) qui peuvent se retrouver d\u00e9pass\u00e9s par l\u2019afflux de demandes li\u00e9s \u00e0 l\u2019incident. Il faudra donc anticiper ces communications, qu\u2019elles soient requises par la loi ou rendues n\u00e9cessaires en r\u00e9ponse \u00e0 la publication par les attaquants des donn\u00e9es. Comme avec les directions de la communication, des premi\u00e8res r\u00e9unions de sensibilisation et de d\u00e9couverte du sujet pourront \u00eatre organis\u00e9es. La r\u00e9alisation de fiches r\u00e9flexes de communication ou encore d\u2019exercices de crise est un bon moyen d\u2019avancer ensuite.<\/p>\n<p>L\u2019aspect \u00ab\u00a0communication\u00a0\u00bb de la fonction du RSSI ne doit donc pas \u00eatre n\u00e9glig\u00e9. Celle-ci conna\u00eet \u00a0aujourd\u2019hui une \u00e9volution forte, passant d\u2019un r\u00f4le de sensibilisation aux bonnes pratiques \u00e0 une d\u00e9mystification de l\u2019actualit\u00e9 jusqu\u2019\u00e0 un vrai r\u00f4le de communiquant op\u00e9rationnel lors de gestion des crises.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alors que \u00a02014 d\u00e9marre juste, les incidents de s\u00e9curit\u00e9 font d\u00e9j\u00e0 la Une des journaux. Du vol massif de donn\u00e9es clients dont a \u00e9t\u00e9 victime Target outre-Atlantique aux fuites d\u2019email en Allemagne, il ne se passe pas une semaine sans&#8230;<\/p>\n","protected":false},"author":15,"featured_media":6168,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3222,36,32],"tags":[1131,181],"coauthors":[837],"class_list":["post-4948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy","category-cybersecurity-digital-trust","category-marketing-relation-client","tag-communication","tag-rssi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RSSI, communiquez avec ceux qui communiquent !<\/title>\n<meta name=\"description\" content=\"Alors que 2014 d\u00e9marre juste, les incidents de s\u00e9curit\u00e9 font d\u00e9j\u00e0 la Une des journaux. Cette multiplication d\u2019\u00e9v\u00e8nements montre que toutes les organisations peuvent \u00eatre concern\u00e9es. Et lorsqu\u2019un incident survient, c\u2019est tout l\u2019\u00e9cosyst\u00e8me de l\u2019entreprise qui doit \u00eatre mobilis\u00e9 pour g\u00e9rer la crise : clients et collaborateurs, mais aussi fournisseurs, partenaires, presse\u2026 et adress\u00e9 par le RSSI.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RSSI, communiquez avec ceux qui communiquent !\" \/>\n<meta property=\"og:description\" content=\"Alors que 2014 d\u00e9marre juste, les incidents de s\u00e9curit\u00e9 font d\u00e9j\u00e0 la Une des journaux. Cette multiplication d\u2019\u00e9v\u00e8nements montre que toutes les organisations peuvent \u00eatre concern\u00e9es. Et lorsqu\u2019un incident survient, c\u2019est tout l\u2019\u00e9cosyst\u00e8me de l\u2019entreprise qui doit \u00eatre mobilis\u00e9 pour g\u00e9rer la crise : clients et collaborateurs, mais aussi fournisseurs, partenaires, presse\u2026 et adress\u00e9 par le RSSI.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-24T21:34:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-23T10:27:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/03\/sergey-sivens-fotolia.commegaphone.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"RSSI, communiquez avec ceux qui communiquent !\",\"datePublished\":\"2014-01-24T21:34:35+00:00\",\"dateModified\":\"2019-12-23T10:27:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/\"},\"wordCount\":1163,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/03\/sergey-sivens-fotolia.commegaphone.jpg\",\"keywords\":[\"communication\",\"RSSI\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\",\"M\u00e9tiers - Marketing et relation client\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/\",\"name\":\"RSSI, communiquez avec ceux qui communiquent !\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/03\/sergey-sivens-fotolia.commegaphone.jpg\",\"datePublished\":\"2014-01-24T21:34:35+00:00\",\"dateModified\":\"2019-12-23T10:27:00+00:00\",\"description\":\"Alors que 2014 d\u00e9marre juste, les incidents de s\u00e9curit\u00e9 font d\u00e9j\u00e0 la Une des journaux. Cette multiplication d\u2019\u00e9v\u00e8nements montre que toutes les organisations peuvent \u00eatre concern\u00e9es. Et lorsqu\u2019un incident survient, c\u2019est tout l\u2019\u00e9cosyst\u00e8me de l\u2019entreprise qui doit \u00eatre mobilis\u00e9 pour g\u00e9rer la crise : clients et collaborateurs, mais aussi fournisseurs, partenaires, presse\u2026 et adress\u00e9 par le RSSI.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/03\/sergey-sivens-fotolia.commegaphone.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/03\/sergey-sivens-fotolia.commegaphone.jpg\",\"width\":1500,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RSSI, communiquez avec ceux qui communiquent !\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RSSI, communiquez avec ceux qui communiquent !","description":"Alors que 2014 d\u00e9marre juste, les incidents de s\u00e9curit\u00e9 font d\u00e9j\u00e0 la Une des journaux. Cette multiplication d\u2019\u00e9v\u00e8nements montre que toutes les organisations peuvent \u00eatre concern\u00e9es. Et lorsqu\u2019un incident survient, c\u2019est tout l\u2019\u00e9cosyst\u00e8me de l\u2019entreprise qui doit \u00eatre mobilis\u00e9 pour g\u00e9rer la crise : clients et collaborateurs, mais aussi fournisseurs, partenaires, presse\u2026 et adress\u00e9 par le RSSI.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/","og_locale":"en_US","og_type":"article","og_title":"RSSI, communiquez avec ceux qui communiquent !","og_description":"Alors que 2014 d\u00e9marre juste, les incidents de s\u00e9curit\u00e9 font d\u00e9j\u00e0 la Une des journaux. Cette multiplication d\u2019\u00e9v\u00e8nements montre que toutes les organisations peuvent \u00eatre concern\u00e9es. Et lorsqu\u2019un incident survient, c\u2019est tout l\u2019\u00e9cosyst\u00e8me de l\u2019entreprise qui doit \u00eatre mobilis\u00e9 pour g\u00e9rer la crise : clients et collaborateurs, mais aussi fournisseurs, partenaires, presse\u2026 et adress\u00e9 par le RSSI.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/","og_site_name":"RiskInsight","article_published_time":"2014-01-24T21:34:35+00:00","article_modified_time":"2019-12-23T10:27:00+00:00","og_image":[{"width":1500,"height":840,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/03\/sergey-sivens-fotolia.commegaphone.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"RSSI, communiquez avec ceux qui communiquent !","datePublished":"2014-01-24T21:34:35+00:00","dateModified":"2019-12-23T10:27:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/"},"wordCount":1163,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/03\/sergey-sivens-fotolia.commegaphone.jpg","keywords":["communication","RSSI"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust","M\u00e9tiers - Marketing et relation client"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/","name":"RSSI, communiquez avec ceux qui communiquent !","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/03\/sergey-sivens-fotolia.commegaphone.jpg","datePublished":"2014-01-24T21:34:35+00:00","dateModified":"2019-12-23T10:27:00+00:00","description":"Alors que 2014 d\u00e9marre juste, les incidents de s\u00e9curit\u00e9 font d\u00e9j\u00e0 la Une des journaux. Cette multiplication d\u2019\u00e9v\u00e8nements montre que toutes les organisations peuvent \u00eatre concern\u00e9es. Et lorsqu\u2019un incident survient, c\u2019est tout l\u2019\u00e9cosyst\u00e8me de l\u2019entreprise qui doit \u00eatre mobilis\u00e9 pour g\u00e9rer la crise : clients et collaborateurs, mais aussi fournisseurs, partenaires, presse\u2026 et adress\u00e9 par le RSSI.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/03\/sergey-sivens-fotolia.commegaphone.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/03\/sergey-sivens-fotolia.commegaphone.jpg","width":1500,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/01\/rssi-communiquez-avec-ceux-qui-communiquent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"RSSI, communiquez avec ceux qui communiquent !"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=4948"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4948\/revisions"}],"predecessor-version":[{"id":12439,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4948\/revisions\/12439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6168"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=4948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=4948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=4948"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=4948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}