{"id":80,"date":"2011-02-25T16:16:50","date_gmt":"2011-02-25T15:16:50","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=80"},"modified":"2019-12-31T12:28:31","modified_gmt":"2019-12-31T11:28:31","slug":"2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/","title":{"rendered":"2010 \u2013 2011 : prot\u00e9ger les infrastructures ou prot\u00e9ger les donn\u00e9es ?"},"content":{"rendered":"<h2>2010, une actualit\u00e9 riche pour la s\u00e9curit\u00e9<\/h2>\n<p>De nombreux incidents ont rythm\u00e9 l\u2019ann\u00e9e. Deux cas ressortent particuli\u00e8rement : Stuxnet, premier virus ciblant sp\u00e9cifiquement des \u00e9quipements industriels, Wikileaks et la fuite de donn\u00e9es gigantesque qui a touch\u00e9 les Etats-Unis. 2010 a \u00e9galement \u00e9t\u00e9 une ann\u00e9e o\u00f9 de nouveaux usages se sont d\u00e9velopp\u00e9s! La virtualisation, qui est maintenant d\u00e9finitivement entr\u00e9e dans les datacenters, le cloud computing, qui fait ses premi\u00e8res preuves ou encore les smartphones et autres tablettes avec des premiers d\u00e9ploiements m\u00e9tiers mais \u00e9galement des premiers usages innovants d\u2019utilisation d\u2019\u00e9quipements personnels.<\/p>\n<h2><!--more-->Une nouvelle approche pour de nouveaux enjeux<\/h2>\n<p><strong><br \/>\n<\/strong>L\u2019ensemble de ces \u00e9v\u00e8nements a aussi montr\u00e9 la limite des approches s\u00e9curit\u00e9 classiques. Celles-ci sont bas\u00e9es avant tout sur une protection de l\u2019infrastructure du SI. Nous ajoutons des m\u00e9canismes de s\u00e9curit\u00e9 sur les diff\u00e9rentes briques que sont le poste de travail, le r\u00e9seau d\u2019entreprise, l\u2019acc\u00e8s Internet, voir le datacenter. Mais cette approche ne permet plus de r\u00e9pondre aux nouveaux enjeux\u00a0! En effet l\u2019information est de moins en moins trait\u00e9e sur les infrastructures de l\u2019organisation. Elle est de plus en plus partag\u00e9e, avec des partenaires et des clients, acc\u00e9d\u00e9es depuis des \u00e9quipements mobiles voir personnels, parfois encore trait\u00e9es sur des syst\u00e8mes aux contours plus ou moins connus comme dans le cadre du cloud computing.<br \/>\nUne nouvelle strat\u00e9gie de r\u00e9ponse doit \u00eatre envisag\u00e9e face \u00e0 ces \u00e9volutions, une strat\u00e9gie qui devra \u00eatre bas\u00e9 sur un principe simple\u00a0: prot\u00e9ger au plus pr\u00e8s les informations les plus sensibles. En effet pour \u00eatre efficace et p\u00e9renne la s\u00e9curit\u00e9 doit se rapprocher de l\u2019information, voir \u00eatre port\u00e9e par l\u2019information elle-m\u00eame, pour pouvoir \u00eatre mieux partag\u00e9e tout en \u00e9tant toujours s\u00e9curis\u00e9e.<\/p>\n<h2>Quelles en sont les cons\u00e9quences\u00a0?<\/h2>\n<p>Ceci n\u00e9cessite de planifier des chantiers ambitieux, li\u00e9 par exemple \u00e0 la classification des informations les plus sensibles, \u00e0 la mise en place de m\u00e9canismes de protections des donn\u00e9es (chiffrement, DRM, DLP\u2026) ou encore \u00e0 l\u2019inclusion des mesures de s\u00e9curit\u00e9 dans les applications (chiffrement, scellement, authentification, processus projet\u2026). Bien entendu les fondamentaux de la gestion des identit\u00e9s jouent un r\u00f4le essentiel et devront \u00eatre encore renforc\u00e9s pour y ajouter la gestion des partenaires et des clients. Mais il faudra aussi faire \u00e9voluer les habitudes, en ayant un focus particulier sur les \u00e9quipes en charge des applications au c\u0153ur de cette nouvelle probl\u00e9matique de protection.L\u2019objectif de 2011 est de faire \u00e9voluer nos principes pour aller de la protection de l\u2019infrastructure \u00e0 une vraie protection des donn\u00e9es. Voici une ann\u00e9e qui s\u2019annonce donc riche en projets et en challenge\u00a0!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2010, une actualit\u00e9 riche pour la s\u00e9curit\u00e9 De nombreux incidents ont rythm\u00e9 l\u2019ann\u00e9e. Deux cas ressortent particuli\u00e8rement : Stuxnet, premier virus ciblant sp\u00e9cifiquement des \u00e9quipements industriels, Wikileaks et la fuite de donn\u00e9es gigantesque qui a touch\u00e9 les Etats-Unis. 2010 a&#8230;<\/p>\n","protected":false},"author":15,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[80,3119,3259,59],"coauthors":[837],"class_list":["post-80","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-cloud","tag-cloud-security","tag-data-protection-2","tag-donnees"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2010 \u2013 2011 : prot\u00e9ger les infrastructures ou prot\u00e9ger les donn\u00e9es ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2010 \u2013 2011 : prot\u00e9ger les infrastructures ou prot\u00e9ger les donn\u00e9es ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"2010, une actualit\u00e9 riche pour la s\u00e9curit\u00e9 De nombreux incidents ont rythm\u00e9 l\u2019ann\u00e9e. Deux cas ressortent particuli\u00e8rement : Stuxnet, premier virus ciblant sp\u00e9cifiquement des \u00e9quipements industriels, Wikileaks et la fuite de donn\u00e9es gigantesque qui a touch\u00e9 les Etats-Unis. 2010 a...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-02-25T15:16:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:28:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"2010 \u2013 2011 : prot\u00e9ger les infrastructures ou prot\u00e9ger les donn\u00e9es ?\",\"datePublished\":\"2011-02-25T15:16:50+00:00\",\"dateModified\":\"2019-12-31T11:28:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/\"},\"wordCount\":483,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"Cloud\",\"Cloud security\",\"data protection\",\"donn\u00e9es\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/\",\"name\":\"2010 \u2013 2011 : prot\u00e9ger les infrastructures ou prot\u00e9ger les donn\u00e9es ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2011-02-25T15:16:50+00:00\",\"dateModified\":\"2019-12-31T11:28:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2010 \u2013 2011 : prot\u00e9ger les infrastructures ou prot\u00e9ger les donn\u00e9es ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2010 \u2013 2011 : prot\u00e9ger les infrastructures ou prot\u00e9ger les donn\u00e9es ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/","og_locale":"en_US","og_type":"article","og_title":"2010 \u2013 2011 : prot\u00e9ger les infrastructures ou prot\u00e9ger les donn\u00e9es ? - RiskInsight","og_description":"2010, une actualit\u00e9 riche pour la s\u00e9curit\u00e9 De nombreux incidents ont rythm\u00e9 l\u2019ann\u00e9e. Deux cas ressortent particuli\u00e8rement : Stuxnet, premier virus ciblant sp\u00e9cifiquement des \u00e9quipements industriels, Wikileaks et la fuite de donn\u00e9es gigantesque qui a touch\u00e9 les Etats-Unis. 2010 a...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/","og_site_name":"RiskInsight","article_published_time":"2011-02-25T15:16:50+00:00","article_modified_time":"2019-12-31T11:28:31+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"2010 \u2013 2011 : prot\u00e9ger les infrastructures ou prot\u00e9ger les donn\u00e9es ?","datePublished":"2011-02-25T15:16:50+00:00","dateModified":"2019-12-31T11:28:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/"},"wordCount":483,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["Cloud","Cloud security","data protection","donn\u00e9es"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/","url":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/","name":"2010 \u2013 2011 : prot\u00e9ger les infrastructures ou prot\u00e9ger les donn\u00e9es ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2011-02-25T15:16:50+00:00","dateModified":"2019-12-31T11:28:31+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/02\/2010-2011-proteger-les-infrastructures-ou-proteger-les-donnees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"2010 \u2013 2011 : prot\u00e9ger les infrastructures ou prot\u00e9ger les donn\u00e9es ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/80","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=80"}],"version-history":[{"count":21,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/80\/revisions"}],"predecessor-version":[{"id":6563,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/80\/revisions\/6563"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=80"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=80"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=80"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=80"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}