{"id":754,"date":"2011-09-30T14:18:29","date_gmt":"2011-09-30T13:18:29","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=754"},"modified":"2019-12-31T12:25:04","modified_gmt":"2019-12-31T11:25:04","slug":"du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/","title":{"rendered":"Du \u00ab secret d\u00e9fense \u00bb au \u00ab secret entreprise \u00bb : des mesures avanc\u00e9es \u00e0 d\u00e9ployer pour lutter contre les attaques cibl\u00e9es"},"content":{"rendered":"<p>Les attaques cibl\u00e9es sont difficiles \u00e0 d\u00e9tecter, \u00e0 juguler et \u00e0 emp\u00eacher. Le p\u00e9rim\u00e8tre de s\u00e9curit\u00e9 r\u00e9seaux et les applications web ne sont plus forc\u00e9ment les premi\u00e8res portes d\u2019entr\u00e9e. L\u2019attaque va souvent jouer sur plusieurs tableaux pour atteindre son objectif. Ing\u00e9nierie sociale, faille applicative, attaque sur les r\u00e9seaux\u00a0 internes\u2026 tout est envisageable et envisag\u00e9.<\/p>\n<p>Il s\u2019agit ici de situations similaires \u00e0 celles observ\u00e9es dans le secteur de la d\u00e9fense depuis de nombreuses ann\u00e9es. Mais aujourd\u2019hui, les grandes organisations y sont confront\u00e9es au quotidien. Pour prot\u00e9ger les donn\u00e9es extr\u00eamement sensibles, il leur faut donc mettre en \u0153uvre des moyens avanc\u00e9s, drastiques, similaires \u00e0 ceux employ\u00e9s dans le secteur de la d\u00e9fense.<\/p>\n<p>Elles devront alors <strong>cr\u00e9er un SI d\u00e9di\u00e9, sp\u00e9cialis\u00e9, pour g\u00e9rer le \u00ab secret entreprise \u00bb analogue au \u00ab secret d\u00e9fense \u00bb. <\/strong>Et, si aucune mesure de s\u00e9curit\u00e9 n\u2019est infaillible, ces \u00e9l\u00e9ments permettront d\u2019augmenter la difficult\u00e9 des attaques et donneront plus de temps pour les d\u00e9tecter et y r\u00e9pondre, le cas \u00e9ch\u00e9ant. Quatre grands chantiers doivent \u00eatre envisag\u00e9s :<\/p>\n<p><strong>\u00a0Cr\u00e9er des sanctuaires pour les donn\u00e9es sensibles. <\/strong>Bas\u00e9s sur une infrastructure d\u00e9di\u00e9e, ils associent un nombre important et vari\u00e9 de mesures de s\u00e9curit\u00e9 : filtrage, chiffrement, isolation interserveurs, authentification forte d\u00e9di\u00e9e, contr\u00f4le de conformit\u00e9\u2026 Mais ils disposent \u00e9galement de processus sp\u00e9cifiques de mise en production afin de s\u2019assurer que tout nouveau syst\u00e8me est s\u00e9curis\u00e9. Ces syst\u00e8mes et leur r\u00e9seau devront \u00eatre diff\u00e9rents de ceux utilis\u00e9s dans l\u2019entreprise de mani\u00e8re classique. Ces sanctuaires seront maintenus par des \u00e9quipes d\u00e9di\u00e9es internes, sans utiliser d\u2019acc\u00e8s distant.<\/p>\n<p><strong>\u00a0Sp\u00e9cialiser les terminaux clients. <\/strong>Vecteur d\u2019intrusion classique lors d\u2019attaques cibl\u00e9es, le poste de travail devra \u00eatre sp\u00e9cialis\u00e9 en fonction des usages. Si l\u2019utilisation de postes distincts en fonction des usages est fr\u00e9quemment rencontr\u00e9e, elle reste complexe \u00e0 g\u00e9n\u00e9raliser. Le recours \u00e0 de nouveaux OS virtualis\u00e9s et isolant les machines virtuelles suivant leur sensibilit\u00e9 est une piste \u00e0 explorer. L\u2019utilisation de solutions de d\u00e9port d\u2019\u00e9cran peut \u00eatre une option temporaire int\u00e9ressante avant la g\u00e9n\u00e9ralisation d\u2019un poste de travail virtualis\u00e9. Les \u00e9changes avec la zone sanctuaris\u00e9e seront bien entendu chiffr\u00e9s et les postes ne permettront pas de stockage local d\u2019informations tr\u00e8s sensibles.<\/p>\n<p><strong>\u00a0Sensibiliser et contraindre. <\/strong>Les utilisateurs manipulant les donn\u00e9es les plus critiques sont souvent les plus difficiles \u00e0 convaincre de l\u2019importance de la s\u00e9curit\u00e9. L\u2019utilisation d\u2019exemples concrets et surtout la mise en place d\u2019un m\u00e9canisme coercitif en cas d\u2019\u00e9carts permettront de diminuer les solutions de contournement. Sur ces p\u00e9rim\u00e8tres sp\u00e9cifiques, il ne faudra pas tol\u00e9rer d\u2019\u00e9cart aux politiques de s\u00e9curit\u00e9, comme cela peut aujourd\u2019hui \u00eatre le cas, et composer avec les impacts m\u00e9tiers cons\u00e9cutifs.<\/p>\n<p><strong>\u00a0Surveiller, r\u00e9agir et pr\u00e9voir la reconstruction\u00a0: <\/strong>L\u2019attaque \u00e9tant tr\u00e8s probable, elle doit pouvoir \u00eatre d\u00e9tect\u00e9e et son impact minimis\u00e9. Une \u00e9quipe interne d\u00e9di\u00e9e \u00e0 la gestion des zones sanctuaris\u00e9es et \u00e0 la gestion des incidents et des crises devra \u00eatre form\u00e9e. La tra\u00e7abilit\u00e9 devra \u00eatre mise en place et suivie avec des moyens importants (H24, temps r\u00e9el, etc.). De nouvelles g\u00e9n\u00e9rations d\u2019outils devront \u00eatre test\u00e9es et d\u00e9ploy\u00e9es en particulier pour d\u00e9tecter les signaux faibles relatifs \u00e0 la fuite d\u2019information. Ces syst\u00e8mes seront \u00e9galement d\u2019une aide pr\u00e9cieuse pour enqu\u00eater sur les fuites de donn\u00e9es lors de l\u2019intrusion. D\u2019autre part, des actions de reconstruction devront \u00eatre imagin\u00e9es pour pouvoir repartir sur une base saine en cas de succ\u00e8s d\u2019une attaque. L\u2019utilisation du PCA\/PCI peut \u00e9galement \u00eatre envisag\u00e9e. Tous ces moyens sont contraignants et ont un co\u00fbt \u00e9lev\u00e9. Ils doivent \u00eatre limit\u00e9s \u00e0 un nombre restreint de traitements et de donn\u00e9es. C\u2019est le prix \u00e0 payer pour conserver un niveau de s\u00e9curit\u00e9 important. L\u2019arm\u00e9e am\u00e9ricaine estime que la s\u00e9curisation des projets tr\u00e8s sensibles entra\u00eene un surco\u00fbt de 20%, du fait des mesures additionnelles, mais aussi de la complexit\u00e9 et des contraintes pos\u00e9es sur le travail au quotidien (cloisonnement de l\u2019information, s\u00e9paration des \u00e9quipes, etc.).<\/p>\n<p>Certaines entreprises sont pr\u00eates aujourd\u2019hui \u00e0 franchir ce pas \u00e0 la vue des risques encourus. Il s\u2019agit en particulier du secteur de la d\u00e9fense, des soci\u00e9t\u00e9s fournissant des syst\u00e8mes de s\u00e9curit\u00e9, des soci\u00e9t\u00e9s o\u00f9 l\u2019innovation est r\u00e9alis\u00e9e sur des cycles longs de recherche et de d\u00e9veloppement. Pour d\u2019autres, la s\u00e9curisation ne sera pas acceptable, soit pour des raisons de pratiques internes, soit pour des raisons budg\u00e9taires (les co\u00fbts d\u00e9passant la rentabilit\u00e9 du SI ou bridant la comp\u00e9titivit\u00e9). Il faudra alors peut-\u00eatre d\u00e9cider de r\u00e9duire le p\u00e9rim\u00e8tre de protection, et accepter consciemment de potentielles fuites de donn\u00e9es qu\u2019il faudra justifier et valider avec le management.<\/p>\n<p><strong>Le r\u00f4le du RSSI, entre \u00e9valuation des risques et pouvoir de conviction<\/strong><\/p>\n<p>Il est \u00e9vident que ces menaces sont amen\u00e9es \u00e0 perdurer dans le temps. C\u2019est au RSSI de r\u00e9aliser\u00a0 l\u2019\u00e9valuation des risques de sa structure face \u00e0 ces menaces et de convaincre sa direction de l\u2019importance des actions \u00e0 mener.<\/p>\n<p>Se prot\u00e9ger \u00e0 tout prix contre les attaques cibl\u00e9es n\u2019est pas envisageable et n\u2019a pas de sens. Par contre, construire un socle solide r\u00e9sistant aux attaques opportunistes sur lequel viennent se greffer des sanctuaires s\u00e9curis\u00e9s est une orientation \u00e0 \u00e9valuer chez chacun.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les attaques cibl\u00e9es sont difficiles \u00e0 d\u00e9tecter, \u00e0 juguler et \u00e0 emp\u00eacher. Le p\u00e9rim\u00e8tre de s\u00e9curit\u00e9 r\u00e9seaux et les applications web ne sont plus forc\u00e9ment les premi\u00e8res portes d\u2019entr\u00e9e. L\u2019attaque va souvent jouer sur plusieurs tableaux pour atteindre son objectif&#8230;.<\/p>\n","protected":false},"author":15,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3225],"tags":[175,3320],"coauthors":[837],"class_list":["post-754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response","tag-apt","tag-incident-response-cert-w"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Du \u00ab secret d\u00e9fense \u00bb au \u00ab secret entreprise \u00bb : des mesures avanc\u00e9es \u00e0 d\u00e9ployer pour lutter contre les attaques cibl\u00e9es - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Du \u00ab secret d\u00e9fense \u00bb au \u00ab secret entreprise \u00bb : des mesures avanc\u00e9es \u00e0 d\u00e9ployer pour lutter contre les attaques cibl\u00e9es - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Les attaques cibl\u00e9es sont difficiles \u00e0 d\u00e9tecter, \u00e0 juguler et \u00e0 emp\u00eacher. Le p\u00e9rim\u00e8tre de s\u00e9curit\u00e9 r\u00e9seaux et les applications web ne sont plus forc\u00e9ment les premi\u00e8res portes d\u2019entr\u00e9e. L\u2019attaque va souvent jouer sur plusieurs tableaux pour atteindre son objectif....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-09-30T13:18:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:25:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Du \u00ab secret d\u00e9fense \u00bb au \u00ab secret entreprise \u00bb : des mesures avanc\u00e9es \u00e0 d\u00e9ployer pour lutter contre les attaques cibl\u00e9es\",\"datePublished\":\"2011-09-30T13:18:29+00:00\",\"dateModified\":\"2019-12-31T11:25:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/\"},\"wordCount\":1004,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"APT\",\"incident response CERT-W\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/\",\"name\":\"Du \u00ab secret d\u00e9fense \u00bb au \u00ab secret entreprise \u00bb : des mesures avanc\u00e9es \u00e0 d\u00e9ployer pour lutter contre les attaques cibl\u00e9es - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2011-09-30T13:18:29+00:00\",\"dateModified\":\"2019-12-31T11:25:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Du \u00ab secret d\u00e9fense \u00bb au \u00ab secret entreprise \u00bb : des mesures avanc\u00e9es \u00e0 d\u00e9ployer pour lutter contre les attaques cibl\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Du \u00ab secret d\u00e9fense \u00bb au \u00ab secret entreprise \u00bb : des mesures avanc\u00e9es \u00e0 d\u00e9ployer pour lutter contre les attaques cibl\u00e9es - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/","og_locale":"en_US","og_type":"article","og_title":"Du \u00ab secret d\u00e9fense \u00bb au \u00ab secret entreprise \u00bb : des mesures avanc\u00e9es \u00e0 d\u00e9ployer pour lutter contre les attaques cibl\u00e9es - RiskInsight","og_description":"Les attaques cibl\u00e9es sont difficiles \u00e0 d\u00e9tecter, \u00e0 juguler et \u00e0 emp\u00eacher. Le p\u00e9rim\u00e8tre de s\u00e9curit\u00e9 r\u00e9seaux et les applications web ne sont plus forc\u00e9ment les premi\u00e8res portes d\u2019entr\u00e9e. L\u2019attaque va souvent jouer sur plusieurs tableaux pour atteindre son objectif....","og_url":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/","og_site_name":"RiskInsight","article_published_time":"2011-09-30T13:18:29+00:00","article_modified_time":"2019-12-31T11:25:04+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Du \u00ab secret d\u00e9fense \u00bb au \u00ab secret entreprise \u00bb : des mesures avanc\u00e9es \u00e0 d\u00e9ployer pour lutter contre les attaques cibl\u00e9es","datePublished":"2011-09-30T13:18:29+00:00","dateModified":"2019-12-31T11:25:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/"},"wordCount":1004,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["APT","incident response CERT-W"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/","url":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/","name":"Du \u00ab secret d\u00e9fense \u00bb au \u00ab secret entreprise \u00bb : des mesures avanc\u00e9es \u00e0 d\u00e9ployer pour lutter contre les attaques cibl\u00e9es - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2011-09-30T13:18:29+00:00","dateModified":"2019-12-31T11:25:04+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/09\/du-secret-defense-au-secret-entreprise-des-mesures-avancees-a-deployer-pour-lutter-contre-les-attaques-ciblees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Du \u00ab secret d\u00e9fense \u00bb au \u00ab secret entreprise \u00bb : des mesures avanc\u00e9es \u00e0 d\u00e9ployer pour lutter contre les attaques cibl\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=754"}],"version-history":[{"count":9,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/754\/revisions"}],"predecessor-version":[{"id":6497,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/754\/revisions\/6497"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=754"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}