{"id":5514,"date":"2014-06-27T20:50:15","date_gmt":"2014-06-27T19:50:15","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=5514"},"modified":"2019-12-31T11:13:40","modified_gmt":"2019-12-31T10:13:40","slug":"fuite-donnees-personnelles-comment-stopper-lhemorragie","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/","title":{"rendered":"Fuite de donn\u00e9es personnelles : comment stopper l\u2019h\u00e9morragie ?"},"content":{"rendered":"<p><i>\u00a0Le 6 mai dernier, <a href=\"http:\/\/www.lemonde.fr\/economie\/article\/2014\/05\/07\/orange-de-nouveau-victime-d-une-cyberattaque-massive_4412779_3234.html\" target=\"_blank\" rel=\"noopener noreferrer\">Orange annon\u00e7ait avoir \u00e9t\u00e9 victime du vol d\u2019un \u00ab\u00a0nombre limit\u00e9\u00a0<\/a>\u00bb de donn\u00e9es de clients. C\u2019est la seconde fois en moins de 6 mois que l\u2019op\u00e9rateur fait la une de l\u2019actualit\u00e9 pour des faits similaires. Depuis <a href=\"http:\/\/www.lefigaro.fr\/societes\/2014\/06\/16\/20005-20140616ARTFIG00262-en-plein-mondial-domino-s-pizza-se-fait-hacker-les-donnees-de-ses-clients.php\" target=\"_blank\" rel=\"noopener noreferrer\">quelques semaines, c\u2019est Domino\u2019s Pizza qui est sous les feux de la rampe.<\/a> Le <a href=\"http:\/\/www.europe1.fr\/France\/Rex-Mundi-les-pirates-informatiques-qui-ont-voulu-ranconner-Domino-s-pizza-2155193\/\" target=\"_blank\" rel=\"noopener noreferrer\">groupe cybercriminel Rex Mundi r\u00e9clame une ran\u00e7on de 30\u00a0000\u20ac sous peine de publier les 650\u00a0000 donn\u00e9es clients d\u00e9rob\u00e9es<\/a> \u00e0 Domino\u2019s Pizza. Ces r\u00e9cents \u00e9v\u00e8nements illustrent les difficult\u00e9s actuelles des entreprises \u00e0 lutter efficacement face \u00e0 une menace cybercriminelle de plus en plus pr\u00e9gnante.<\/i><\/p>\n<h2>Des attaques cybercriminelles d\u2019une ampleur jusque-l\u00e0 in\u00e9gal\u00e9e<\/h2>\n<p>Ces attaques se r\u00e9p\u00e8tent et n\u2019\u00e9pargnent personne. En novembre 2013, <a href=\"http:\/\/www.itespresso.fr\/adobe-pirates-inscrivent-nouveau-record-69755.html\" target=\"_blank\" rel=\"noopener noreferrer\">l\u2019\u00e9diteur Adobe d\u00e9clare avoir \u00e9t\u00e9 victime du vol de 150 millions de comptes utilisateurs<\/a>. Quelques semaines plus tard c\u2019est au tour du g\u00e9ant am\u00e9ricain de la <a href=\"http:\/\/www.lemonde.fr\/economie\/article\/2014\/01\/22\/aux-etats-unis-piratage-geant-des-clients-de-target_4352310_3234.html\" target=\"_blank\" rel=\"noopener noreferrer\">distribution Target de faire les frais d\u2019une attaque de grande ampleur avec pour r\u00e9sultat les donn\u00e9es bancaires de 110 millions de clients dans la nature<\/a>. En mai 2014, <a href=\"http:\/\/www.lefigaro.fr\/secteur\/high-tech\/2014\/05\/21\/01007-20140521ARTFIG00249-victime-d-une-cyberattaque-ebay-recommande-de-changer-de-mot-de-passe.php\" target=\"_blank\" rel=\"noopener noreferrer\">Ebay annonce que les donn\u00e9es personnelles de 145 millions de clients ont \u00e9t\u00e9 d\u00e9rob\u00e9es<\/a>, sans atteinte cependant aux donn\u00e9es bancaires.<\/p>\n<p>Si les motivations des cybercriminels peuvent \u00eatre diverses\u00a0<a href=\"http:\/\/obsession.nouvelobs.com\/hacker-ouvert\/20110809.OBS8315\/qui-sont-les-anonymous.html\" target=\"_blank\" rel=\"noopener noreferrer\">(id\u00e9ologiques,<\/a> ludiques, <a href=\"http:\/\/rue89.nouvelobs.com\/2012\/06\/04\/stuxnet-comment-les-etats-unis-et-israel-ont-pirate-le-nucleaire-iranien-232728\" target=\"_blank\" rel=\"noopener noreferrer\">strat\u00e9giques<\/a>\u2026), ces op\u00e9rations sont tr\u00e8s souvent men\u00e9es \u00e0 des fins \u00e9conomiques. La multiplication, la professionnalisation et la diversification de <a href=\"http:\/\/www.silicon.fr\/votre-identite-vaut-de-quelques-cents-a-5-au-marche-noir-88729.html\" target=\"_blank\" rel=\"noopener noreferrer\">ces attaques mettent en lumi\u00e8re l\u2019existence d\u2019un v\u00e9ritable march\u00e9 noir de la donn\u00e9e personnelle<\/a>.<\/p>\n<h2>La protection des donn\u00e9es personnelles au c\u0153ur du d\u00e9bat<\/h2>\n<p>L\u2019Union Europ\u00e9enne s\u2019est saisie du sujet. En mars dernier, <a href=\"http:\/\/www.europarl.europa.eu\/news\/fr\/news-room\/content\/20140307IPR38204\/html\/Des-r%C3%A8gles-plus-strictes-pour-prot%C3%A9ger-la-vie-priv%C3%A9e-%C3%A0-l%27%C3%A8re-num%C3%A9rique\">le Parlement Europ\u00e9en a adopt\u00e9 le R\u00e8glement Europ\u00e9en sur la Protection des Donn\u00e9es personnelles\u00a0 <\/a>(N.B. le Conseil de l\u2019UE doit se prononcer dans les prochains mois). Ce nouveau r\u00e8glement pr\u00e9voit des r\u00e8gles plus strictes auxquelles devront se plier les entreprises, tout en augmentant drastiquement les sanctions.<\/p>\n<p>Si la <a href=\"http:\/\/www.solucominsight.fr\/2012\/12\/protection-des-donnees-personnelles-la-conformite-a-la-loi-ne-suffit-plus\/\">conformit\u00e9 \u00e0 la loi devrait permettre de diminuer le risque de fuite de donn\u00e9es personnelles, cela ne suffit pas<\/a>. Pour prot\u00e9ger les donn\u00e9es de mani\u00e8re plus efficace, le RSSI doit aller au-del\u00e0 et proposer des solutions qui permettront d\u2019agir \u00e0 la fois en amont et pendant la crise.<\/p>\n<h2>Prioriser la d\u00e9tection et la r\u00e9action par la supervision s\u00e9curit\u00e9<\/h2>\n<p>On estime aujourd\u2019hui qu\u2019environ 80% des entreprises ont \u00e9t\u00e9 victimes d\u2019attaques de type APT. <a href=\"http:\/\/pro.01net.com\/editorial\/618124\/les-entreprises-trop-lentes-a-detecter-les-attaques-informatiques\/?page=1&amp;order=ASC\" target=\"_blank\" rel=\"noopener noreferrer\">Selon le rapport M-Trend Mandiant 2014<\/a>, le temps moyen de d\u00e9tection de ces attaques est de 229 jours\u00a0!<\/p>\n<p>L\u2019am\u00e9lioration des capacit\u00e9s de d\u00e9tection est donc un enjeu vital pour prot\u00e9ger les donn\u00e9es sensibles. <a href=\"http:\/\/www.solucominsight.fr\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">Une solution efficace est la supervision s\u00e9curit\u00e9,<\/a> qui vise \u00e0 am\u00e9liorer et acc\u00e9l\u00e9rer la d\u00e9tection des activit\u00e9s malicieuses sur le SI de l\u2019entreprise. A l\u2019initiative du RSSI, l\u2019entreprise doit r\u00e9aliser une analyse de risque qui permettra d\u2019identifier les zones les plus sensibles de son SI. La collecte et l\u2019analyse des logs des \u00e9l\u00e9ments sensibles lui permettront de garder un \u0153il attentif et <a href=\"http:\/\/www.usine-digitale.fr\/article\/pour-arreter-les-attaques-ciblees-cherchez-les-signaux-faibles.N205193\" target=\"_blank\" rel=\"noopener noreferrer\">de r\u00e9agir en cas d\u2019identification de signaux faibles<\/a> indiquant une compromission.<\/p>\n<h2>Traiter en priorit\u00e9 le maillon faible de la cha\u00eene cyber-s\u00e9curit\u00e9<\/h2>\n<p>Les utilisateurs du SI sont le maillon faible de la cha\u00eene cyber-s\u00e9curit\u00e9 et apparaissent comme des cibles de choix\u00a0: l\u2019exploitation de failles humaines est \u00e0 l\u2019origine de 70 \u00e0 80% des attaques cybercriminelles. Afin de pr\u00e9venir ces incidents, le RSSI doit s\u2019appuyer sur les Ressources Humaines et la Communication Interne afin d\u2019inscrire la sensibilisation SSI dans des actions de communication. A l\u2019image d\u2019Axa, qui a organis\u00e9 un concours vid\u00e9o sur le th\u00e8me de la pr\u00e9vention num\u00e9rique, en partenariat avec l\u2019EICAR, une \u00e9cole de cr\u00e9ation audiovisuelle. Des spots de sensibilisation \u00e0 la cyber-s\u00e9curit\u00e9 <a href=\"https:\/\/www.youtube.com\/watch?v=PeG1Vbr1YoA\" target=\"_blank\" rel=\"noopener noreferrer\">(phishing<\/a>, <a href=\"https:\/\/www.youtube.com\/watch?v=pOYqfP1iljA\" target=\"_blank\" rel=\"noopener noreferrer\">social engineering<\/a>) ont \u00e9t\u00e9 produits, cumulant au total plus d\u2019un million de vues. La Soci\u00e9t\u00e9 G\u00e9n\u00e9rale a \u00e9galement men\u00e9 des <a href=\"https:\/\/entreprises.societegenerale.fr\/securite.html\" target=\"_blank\" rel=\"noopener noreferrer\">actions de sensibilisation<\/a> de ce type.<\/p>\n<p><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/t9eXiR50gEI\" width=\"425\" height=\"350\" frameborder=\"0\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<h2>R\u00e9agir \u00e0 la survenance d\u2019un incident<\/h2>\n<p>Ces mesures permettent-elles pour autant de se pr\u00e9munir \u00e0 100% du risque de fuite de donn\u00e9e\u00a0? Non, bien \u00e9videmment. La question n\u2019est pas de savoir si un tel incident risque de se produire, mais comment faire face quand il se produira.<\/p>\n<p>Cette question s\u2019adresse principalement au RSSI, qui a la responsabilit\u00e9 de l\u2019instanciation du sc\u00e9nario cybercriminalit\u00e9 et de son int\u00e9gration dans l\u2019organisation de gestion de crise globale de l\u2019entreprise. Le dispositif de gestion de crise cyber-s\u00e9curit\u00e9 peut comprendre des fiches-r\u00e9flexes, des checklists ou <a href=\"http:\/\/www.solucominsight.fr\/2014\/03\/reseaux-sociaux-gestion-crise-anticiper-les-risques-maitriser-communication\/\" target=\"_blank\" rel=\"noopener noreferrer\">encore des \u00e9l\u00e9ments de communication<\/a> (\u00e9l\u00e9ments de langage, communiqu\u00e9 de presse, etc.).<\/p>\n<p>A ce jour, <a title=\"Dispositifs de gestion de crise et s\u00e9curit\u00e9 des SI : que font les grands comptes fran\u00e7ais ?\" href=\"http:\/\/www.solucominsight.fr\/2013\/11\/dispositifs-de-gestion-de-crise-et-securite-des-si-que-font-les-grands-comptes-francais\/\" target=\"_blank\" rel=\"noopener noreferrer\">seulement 20% des grands comptes fran\u00e7ais sont pr\u00e9par\u00e9s \u00e0 g\u00e9rer une crise cyber-s\u00e9curit\u00e9.<\/a> Compte tenu de l\u2019accroissement constant du nombre d\u2019attaques et de leur ampleur, il y a fort \u00e0 parier que les RSSI trouveront aupr\u00e8s de la direction g\u00e9n\u00e9rale une oreille attentive pour les appuyer dans la mise en place de solutions destin\u00e9es tant \u00e0 pr\u00e9venir les incidents (supervision, sensibilisation) qu\u2019\u00e0 g\u00e9rer la crise au moment o\u00f9, in\u00e9vitablement, elle surviendra.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0Le 6 mai dernier, Orange annon\u00e7ait avoir \u00e9t\u00e9 victime du vol d\u2019un \u00ab\u00a0nombre limit\u00e9\u00a0\u00bb de donn\u00e9es de clients. C\u2019est la seconde fois en moins de 6 mois que l\u2019op\u00e9rateur fait la une de l\u2019actualit\u00e9 pour des faits similaires. Depuis quelques&#8230;<\/p>\n","protected":false},"author":16,"featured_media":6135,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3226],"tags":[3299,412,2960,78],"coauthors":[804,1582],"class_list":["post-5514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-compliance","tag-digital-privacy","tag-donnees-a-caractere-personnel","tag-eu","tag-reglementation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fuite de donn\u00e9es personnelles : comment stopper l\u2019h\u00e9morragie ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"Les grandes entreprises semblent d\u00e9munies face \u00e0 la multiplication de fuites de donn\u00e9es : comment peut-on agir ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fuite de donn\u00e9es personnelles : comment stopper l\u2019h\u00e9morragie ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Les grandes entreprises semblent d\u00e9munies face \u00e0 la multiplication de fuites de donn\u00e9es : comment peut-on agir ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-27T19:50:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:13:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/06\/fotolia_44428940.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rapha\u00ebl Brun, Guillaume Bour\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rapha\u00ebl Brun, Guillaume Bour\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/\"},\"author\":{\"name\":\"Rapha\u00ebl Brun\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/45dd574ed29861f917c3763e0fbcb494\"},\"headline\":\"Fuite de donn\u00e9es personnelles : comment stopper l\u2019h\u00e9morragie ?\",\"datePublished\":\"2014-06-27T19:50:15+00:00\",\"dateModified\":\"2019-12-31T10:13:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/\"},\"wordCount\":905,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/06\/fotolia_44428940.jpg\",\"keywords\":[\"Digital privacy\",\"DPO\",\"EU\",\"R\u00e8glementation\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/\",\"name\":\"Fuite de donn\u00e9es personnelles : comment stopper l\u2019h\u00e9morragie ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/06\/fotolia_44428940.jpg\",\"datePublished\":\"2014-06-27T19:50:15+00:00\",\"dateModified\":\"2019-12-31T10:13:40+00:00\",\"description\":\"Les grandes entreprises semblent d\u00e9munies face \u00e0 la multiplication de fuites de donn\u00e9es : comment peut-on agir ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/06\/fotolia_44428940.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/06\/fotolia_44428940.jpg\",\"width\":1500,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fuite de donn\u00e9es personnelles : comment stopper l\u2019h\u00e9morragie ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/45dd574ed29861f917c3763e0fbcb494\",\"name\":\"Rapha\u00ebl Brun\",\"description\":\"Rapha\u00ebl BRUN is a Senior Manager at Wavestone within the Cybersecurity and Digital Trust practice. He graduated from the University of Technology of Troyes in France in 2008. He has expertise in crisis management, business continuity management and cybersecurity governance, developed over 10 years of experience. Raphael is also a seasoned speaker about data privacy: he addresses this topic on a regular basis on Insurance Speaker or Risk Insight.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/raphael-brun\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fuite de donn\u00e9es personnelles : comment stopper l\u2019h\u00e9morragie ? - RiskInsight","description":"Les grandes entreprises semblent d\u00e9munies face \u00e0 la multiplication de fuites de donn\u00e9es : comment peut-on agir ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/","og_locale":"en_US","og_type":"article","og_title":"Fuite de donn\u00e9es personnelles : comment stopper l\u2019h\u00e9morragie ? - RiskInsight","og_description":"Les grandes entreprises semblent d\u00e9munies face \u00e0 la multiplication de fuites de donn\u00e9es : comment peut-on agir ?","og_url":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/","og_site_name":"RiskInsight","article_published_time":"2014-06-27T19:50:15+00:00","article_modified_time":"2019-12-31T10:13:40+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/06\/fotolia_44428940.jpg","type":"image\/jpeg"}],"author":"Rapha\u00ebl Brun, Guillaume Bour","twitter_misc":{"Written by":"Rapha\u00ebl Brun, Guillaume Bour","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/"},"author":{"name":"Rapha\u00ebl Brun","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/45dd574ed29861f917c3763e0fbcb494"},"headline":"Fuite de donn\u00e9es personnelles : comment stopper l\u2019h\u00e9morragie ?","datePublished":"2014-06-27T19:50:15+00:00","dateModified":"2019-12-31T10:13:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/"},"wordCount":905,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/06\/fotolia_44428940.jpg","keywords":["Digital privacy","DPO","EU","R\u00e8glementation"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/","url":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/","name":"Fuite de donn\u00e9es personnelles : comment stopper l\u2019h\u00e9morragie ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/06\/fotolia_44428940.jpg","datePublished":"2014-06-27T19:50:15+00:00","dateModified":"2019-12-31T10:13:40+00:00","description":"Les grandes entreprises semblent d\u00e9munies face \u00e0 la multiplication de fuites de donn\u00e9es : comment peut-on agir ?","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/06\/fotolia_44428940.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/06\/fotolia_44428940.jpg","width":1500,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/06\/fuite-donnees-personnelles-comment-stopper-lhemorragie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Fuite de donn\u00e9es personnelles : comment stopper l\u2019h\u00e9morragie ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/45dd574ed29861f917c3763e0fbcb494","name":"Rapha\u00ebl Brun","description":"Rapha\u00ebl BRUN is a Senior Manager at Wavestone within the Cybersecurity and Digital Trust practice. He graduated from the University of Technology of Troyes in France in 2008. He has expertise in crisis management, business continuity management and cybersecurity governance, developed over 10 years of experience. Raphael is also a seasoned speaker about data privacy: he addresses this topic on a regular basis on Insurance Speaker or Risk Insight.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/raphael-brun\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=5514"}],"version-history":[{"count":9,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5514\/revisions"}],"predecessor-version":[{"id":12425,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5514\/revisions\/12425"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6135"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=5514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=5514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=5514"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=5514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}