{"id":564,"date":"2011-08-10T17:40:18","date_gmt":"2011-08-10T16:40:18","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=564"},"modified":"2011-08-22T12:51:59","modified_gmt":"2011-08-22T11:51:59","slug":"69","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/08\/69\/","title":{"rendered":"69"},"content":{"rendered":"<p>c&#8217;est, en pourcentage,\u00a0 le\u00a0 nombre de\u00a0 responsables m\u00e9tiers qui conserve un budget pour des achats IT en propre,\u00a0 hors processus DSI, selon une \u00e9tude Forrester. Et ceci en particulier pour utiliser des services Cloud computing&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>c&#8217;est, en pourcentage,\u00a0 le\u00a0 nombre de\u00a0 responsables m\u00e9tiers qui conserve un budget pour des achats IT en propre,\u00a0 hors processus DSI, selon une \u00e9tude Forrester. Et ceci en particulier pour utiliser des services Cloud computing&#8230;<\/p>\n","protected":false},"author":463,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"coauthors":[719],"class_list":["post-564","post","type-post","status-publish","format-standard","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>69 - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"69 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"c&#8217;est, en pourcentage,\u00a0 le\u00a0 nombre de\u00a0 responsables m\u00e9tiers qui conserve un budget pour des achats IT en propre,\u00a0 hors processus DSI, selon une \u00e9tude Forrester. Et ceci en particulier pour utiliser des services Cloud computing&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-10T16:40:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2011-08-22T11:51:59+00:00\" \/>\n<meta name=\"author\" content=\"LAUQUE M\u00e9lodie\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"LAUQUE M\u00e9lodie\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/\"},\"author\":{\"name\":\"LAUQUE M\u00e9lodie\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7633e44801e5f8ff61c63b099bc17a97\"},\"headline\":\"69\",\"datePublished\":\"2011-08-10T16:40:18+00:00\",\"dateModified\":\"2011-08-22T11:51:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/\"},\"wordCount\":37,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/\",\"name\":\"69 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"datePublished\":\"2011-08-10T16:40:18+00:00\",\"dateModified\":\"2011-08-22T11:51:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"69\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7633e44801e5f8ff61c63b099bc17a97\",\"name\":\"LAUQUE M\u00e9lodie\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/LAUQUEM\u00e9lodie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"69 - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/","og_locale":"en_US","og_type":"article","og_title":"69 - RiskInsight","og_description":"c&#8217;est, en pourcentage,\u00a0 le\u00a0 nombre de\u00a0 responsables m\u00e9tiers qui conserve un budget pour des achats IT en propre,\u00a0 hors processus DSI, selon une \u00e9tude Forrester. Et ceci en particulier pour utiliser des services Cloud computing&#8230;","og_url":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/","og_site_name":"RiskInsight","article_published_time":"2011-08-10T16:40:18+00:00","article_modified_time":"2011-08-22T11:51:59+00:00","author":"LAUQUE M\u00e9lodie","twitter_misc":{"Written by":"LAUQUE M\u00e9lodie"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/"},"author":{"name":"LAUQUE M\u00e9lodie","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7633e44801e5f8ff61c63b099bc17a97"},"headline":"69","datePublished":"2011-08-10T16:40:18+00:00","dateModified":"2011-08-22T11:51:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/"},"wordCount":37,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/","url":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/","name":"69 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"datePublished":"2011-08-10T16:40:18+00:00","dateModified":"2011-08-22T11:51:59+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/69\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"69"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7633e44801e5f8ff61c63b099bc17a97","name":"LAUQUE M\u00e9lodie","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/LAUQUEM\u00e9lodie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/463"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=564"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/564\/revisions"}],"predecessor-version":[{"id":578,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/564\/revisions\/578"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=564"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}