{"id":5318,"date":"2014-04-10T20:29:39","date_gmt":"2014-04-10T19:29:39","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=5318"},"modified":"2019-12-31T11:15:53","modified_gmt":"2019-12-31T10:15:53","slug":"industriel-securite-oser-transformation-partie-2","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/04\/industriel-securite-oser-transformation-partie-2\/","title":{"rendered":"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 2)"},"content":{"rendered":"<p>Comment nous l&#8217;avons vu dans un pr\u00e9c\u00e9dent article, les SI industriels comportent des sp\u00e9cificit\u00e9s indispensables \u00e0 prendre en compte avant de d\u00e9marrer une d\u00e9marche de s\u00e9curisation.<\/p>\n<h2>Initier la d\u00e9marche de s\u00e9curisation<\/h2>\n<p dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"182.8572562408447\">Avant d\u2019entreprendre de grands chantiers de s\u00e9curit\u00e9, il est important de savoir d\u2019o\u00f9 l\u2019on part. Le SII est-il vuln\u00e9rable ? Dans quelle mesure est-il ouvert sur l\u2019ext\u00e9rieur ? Quel est son v\u00e9ritable niveau d\u2019exposition face aux nouvelles menaces ?<\/p>\n<p dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"223.24004139804833\">Trois approches diff\u00e9rentes permettent de r\u00e9pondre \u00e0 ces questions. L\u2019audit \u00ab flash \u00bb sur les sites les plus sensibles ou ayant connu un incident r\u00e9cent, permet d\u2019identifier rapidement les vuln\u00e9rabilit\u00e9s et les zones non prot\u00e9g\u00e9es. L\u2019analyse de risques d\u2019un processus industriel permet de son c\u00f4t\u00e9 d\u2019estimer les impacts financiers, humains et environnementaux en cas d\u2019incident. Un bilan de conformit\u00e9 consiste quant \u00e0 lui \u00e0 demander \u00e0 chaque site industriel d\u2019\u00e9valuer son niveau de s\u00e9curit\u00e9 sur la base d\u2019un questionnaire. Si cette derni\u00e8re approche est moins concr\u00e8te et fiable, elle permet d\u2019avoir une vision globale plus rapidement. Il n\u2019y a pas de chemin type : les trois approches peuvent \u00eatre utilis\u00e9es ou combin\u00e9es. Elles doivent aussi \u00eatre l\u2019occasion de mobiliser la direction g\u00e9n\u00e9rale et les directions m\u00e9tiers dont l\u2019engagement et l\u2019implication dans la dur\u00e9e sont n\u00e9cessaires.<\/p>\n<h2 dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_144_0\" data-canvas-width=\"91.37205402374268\">Mettre en place une fili\u00e8re s\u00e9curit\u00e9 des SI industriels<\/h2>\n<p dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"68.10209737586976\">La mise en place d\u2019une gouvernance globale de la s\u00e9curit\u00e9 des SII est essentielle pour augmenter le niveau de s\u00e9curit\u00e9 dans la dur\u00e9e. Cela passe par la nomination d\u2019un Responsable de la s\u00e9curit\u00e9 des SII charg\u00e9 de la d\u00e9finir, de la mettre en \u0153uvre et de l\u2019animer. Qu\u2019il vienne du M\u00e9tier, du monde de la DSI, de la s\u00e9curit\u00e9 SI ou du monde industriel (automatisme, s\u00fbret\u00e9, etc.), il doit \u00eatre capable de jouer le r\u00f4le de facilitateur entre ces diff\u00e9rentes sph\u00e8res. La connaissance du m\u00e9tier industriel et les qualit\u00e9s humaines sont donc \u00e0 privil\u00e9gier lors de son identification plut\u00f4t qu\u2019une expertise en s\u00e9curit\u00e9. Son rattachement peut \u00eatre \u00e0 \u00e9tudier en fonction du contexte de l\u2019entreprise : s\u2019il est courant qu\u2019il fasse partie des \u00e9quipes s\u00e9curit\u00e9 SI, il est parfois directement rattach\u00e9 aux M\u00e9tiers concern\u00e9s.<\/p>\n<p dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"258.5978900356293\">Le Responsable de la s\u00e9curit\u00e9 des SII pourra s\u2019appuyer sur un r\u00e9seau de correspondants qui se feront le relais de la strat\u00e9gie et des actions sur les diff\u00e9rents sites industriels. Il d\u00e9veloppera \u00e9galement des relations \u00e9troites avec des acteurs incontournables du SII :<\/p>\n<div dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"238.9612494039536\">\n<ul>\n<li>les chefs de projets industriels, avec lesquels il faudra s\u2019assurer que la s\u00e9curit\u00e9 est prise en compte d\u00e8s la conception ;<\/li>\n<li>les responsables de la s\u00fbret\u00e9, avec lesquels il mettra en \u0153uvre une d\u00e9marche commune de gestion des risques industriels ;<\/li>\n<li>les responsables de l\u2019exploitation et la maintenance, pour s\u2019assurer de la bonne ex\u00e9cution des processus de maintien en condition op\u00e9rationnelle et de s\u00e9curit\u00e9 du SII ;<\/li>\n<li>\n<div dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"248.28515106582645\">les responsables des achats, pour diffuser les bonnes pratiques en mati\u00e8re des exigences de s\u00e9curit\u00e9 dans toutes relations avec les tiers et dans les contrats avec les fournisseurs ;<\/div>\n<\/li>\n<li>\n<div dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"56.47454782390595\">la DSI et le RSSI pour s\u2019interfacer avec le SI classique et capitaliser sur les bonnes pratiques.<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<h2 dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"238.9612494039536\">Int\u00e9grer la s\u00e9curit\u00e9 d\u00e8s la conception<\/h2>\n<div dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"238.9612494039536\">\n<p>Concevoir une usine, un site industriel ou un \u00e9quipement embarqu\u00e9 s\u2019accompagne la plupart du temps d\u2019\u00e9tudes de s\u00fbret\u00e9. Il faut tirer partide cette culture d\u00e9j\u00e0 bien ancr\u00e9e pour y ins\u00e9rer les \u00e9tudes de s\u00e9curit\u00e9 du SI Industriel qui seront centr\u00e9es sur les risques de cybers\u00e9curit\u00e9.<\/p>\n<p dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"147.41594431972504\">Attention toutefois \u00e0 rester vigilant et ne pas se focaliser uniquement sur le proc\u00e9d\u00e9 industriel lui-m\u00eame. L\u2019environnement proche ou \u00e9loign\u00e9 du SII est \u00e9galement \u00e0 \u00e9tudier pour chaque projet : dans quelles conditions les interventions de tiers pour la t\u00e9l\u00e9gestion et la t\u00e9l\u00e9maintenance seront\u00a0 r\u00e9alis\u00e9es ? Le fournisseur s\u2019applique-t-il lui-m\u00eame des exigences de s\u00e9curit\u00e9 lorsqu\u2019il d\u00e9veloppe les solutions industrielles ?<\/p>\n<h2 dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_144_0\" data-canvas-width=\"191.07743341445925\">Traiter les urgences sans n\u00e9gliger la s\u00e9curisation \u00e0 moyen terme<\/h2>\n<p dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"120.24044536685943\">Les particularit\u00e9s des SII poussent souvent les entreprises \u00e0 allier des solutions palliatives \u00e0 court terme, et \u00e0 saisir l\u2019opportunit\u00e9 de faire des modifications en profondeur quand elle se pr\u00e9sente : arr\u00eat de production, renouvellement de l\u2019outil industriel, changement de fournisseur, etc.<\/p>\n<p dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"278.3936107158661\">C\u2019est particuli\u00e8rement vrai pour la mise en \u0153uvre du cloisonnement et de la segmentation des r\u00e9seaux : si on peut isoler le SI de gestion, les changements sur les r\u00e9seaux de production sont plus complexes \u00e0 organiser !<\/p>\n<p dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"278.4968892688751\">La refonte des acc\u00e8s distants est \u00e9galement \u00e0 int\u00e9grer dans cette r\u00e9flexion. Elle n\u00e9cessite de revoir les contrats \u00e9tablis sur plusieurs ann\u00e9es, dont la ren\u00e9gociation des modalit\u00e9s d\u2019intervention, de t\u00e9l\u00e9gestion et de t\u00e9l\u00e9maintenance est peu fr\u00e9quente. En parall\u00e8le, une fois les vuln\u00e9rabilit\u00e9s sur le syst\u00e8me identifi\u00e9es, il faut \u00eatre en capacit\u00e9 de les corriger.<\/p>\n<p dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"234.27359097290037\">Appliquer les correctifs n\u2019est parfois pas envisageable et remplacer les \u00e9quipements par d\u2019autres plus r\u00e9cents offrant les derni\u00e8res fonctions de s\u00e9curit\u00e9 pr\u00e9sente un co\u00fbt non n\u00e9gligeable, tant en termes financiers qu\u2019en perte d\u2019exploitation potentielle sur des syst\u00e8mes o\u00f9 la disponibilit\u00e9 est cruciale.<\/p>\n<div dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"234.27359097290037\">\n<p dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"207.98909198570246\">Conscient des vuln\u00e9rabilit\u00e9s des SII, il est crucial de mettre en place sur l\u2019installation industrielle des dispositifs de surveillance afin de d\u00e9tecter et de r\u00e9agir face aux incidents. L\u2019int\u00e9gration du SII au SOC ou au CERT de l\u2019entreprise peut \u00eatre envisag\u00e9e dans une strat\u00e9gie de r\u00e9action globale.<\/p>\n<div dir=\"ltr\" data-angle=\"0\" data-font-name=\"g_font_138_0\" data-canvas-width=\"278.47712938499456\">La mise en \u0153uvre de la s\u00e9curit\u00e9 pour les SI industriels ne pourra se faire qu\u2019en s\u2019accommodant des sp\u00e9cificit\u00e9s et des contextes particuliers dans lesquels ils \u00e9voluent. Mobiliser les directions m\u00e9tiers et combiner les savoir-faire issus du monde industriel et de gestion sont assur\u00e9ment des facteurs cl\u00e9 de succ\u00e8s. En parall\u00e8le, les fonctions de responsable de la s\u00e9curit\u00e9 du SI de gestion et de responsable de la s\u00e9curit\u00e9 du SI Industriel doivent s\u2019associer, voire fusionner, pour assurer la coh\u00e9rence de la d\u00e9marche de s\u00e9curisation de l\u2019entreprise de bout en bout dans une approche globale.<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Comment nous l&#8217;avons vu dans un pr\u00e9c\u00e9dent article, les SI industriels comportent des sp\u00e9cificit\u00e9s indispensables \u00e0 prendre en compte avant de d\u00e9marrer une d\u00e9marche de s\u00e9curisation. Initier la d\u00e9marche de s\u00e9curisation Avant d\u2019entreprendre de grands chantiers de s\u00e9curit\u00e9, il est&#8230;<\/p>\n","protected":false},"author":188,"featured_media":6080,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3227],"tags":[3300,1260],"coauthors":[1257],"class_list":["post-5318","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-manufacturing-industry-4-0","tag-manuf-industry-4-0","tag-si-industriel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 2) - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 2) - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Comment nous l&#8217;avons vu dans un pr\u00e9c\u00e9dent article, les SI industriels comportent des sp\u00e9cificit\u00e9s indispensables \u00e0 prendre en compte avant de d\u00e9marrer une d\u00e9marche de s\u00e9curisation. Initier la d\u00e9marche de s\u00e9curisation Avant d\u2019entreprendre de grands chantiers de s\u00e9curit\u00e9, il est...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-10T19:29:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:15:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1399\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anthony di Prima\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anthony di Prima\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/\"},\"author\":{\"name\":\"Anthony di Prima\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96\"},\"headline\":\"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 2)\",\"datePublished\":\"2014-04-10T19:29:39+00:00\",\"dateModified\":\"2019-12-31T10:15:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/\"},\"wordCount\":1109,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"keywords\":[\"manuf &amp; industry 4.0\",\"SI industriel\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/\",\"name\":\"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 2) - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"datePublished\":\"2014-04-10T19:29:39+00:00\",\"dateModified\":\"2019-12-31T10:15:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg\",\"width\":1500,\"height\":1399},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96\",\"name\":\"Anthony di Prima\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anthony-di-prima\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 2) - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/","og_locale":"en_US","og_type":"article","og_title":"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 2) - RiskInsight","og_description":"Comment nous l&#8217;avons vu dans un pr\u00e9c\u00e9dent article, les SI industriels comportent des sp\u00e9cificit\u00e9s indispensables \u00e0 prendre en compte avant de d\u00e9marrer une d\u00e9marche de s\u00e9curisation. Initier la d\u00e9marche de s\u00e9curisation Avant d\u2019entreprendre de grands chantiers de s\u00e9curit\u00e9, il est...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/","og_site_name":"RiskInsight","article_published_time":"2014-04-10T19:29:39+00:00","article_modified_time":"2019-12-31T10:15:53+00:00","og_image":[{"width":1500,"height":1399,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","type":"image\/jpeg"}],"author":"Anthony di Prima","twitter_misc":{"Written by":"Anthony di Prima","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/"},"author":{"name":"Anthony di Prima","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96"},"headline":"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 2)","datePublished":"2014-04-10T19:29:39+00:00","dateModified":"2019-12-31T10:15:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/"},"wordCount":1109,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","keywords":["manuf &amp; industry 4.0","SI industriel"],"articleSection":["Cybersecurity &amp; Digital Trust","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/","url":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/","name":"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 2) - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","datePublished":"2014-04-10T19:29:39+00:00","dateModified":"2019-12-31T10:15:53+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/10\/antonio-gravante-fotolia.com-foule1.jpg","width":1500,"height":1399},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/04\/industriel-securite-oser-transformation-partie-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"SI industriel et s\u00e9curit\u00e9 : oser la transformation (partie 2)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/867a6b25c4337e03d57b1a80f7f1ff96","name":"Anthony di Prima","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anthony-di-prima\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=5318"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5318\/revisions"}],"predecessor-version":[{"id":6161,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5318\/revisions\/6161"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6080"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=5318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=5318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=5318"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=5318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}