{"id":814,"date":"2011-10-21T10:54:32","date_gmt":"2011-10-21T09:54:32","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=814"},"modified":"2019-12-31T12:23:55","modified_gmt":"2019-12-31T11:23:55","slug":"protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/","title":{"rendered":"Protection des donn\u00e9es : les r\u00e9seaux sociaux montrent la bonne direction"},"content":{"rendered":"<p>Derri\u00e8re ce titre provocateur se cache une r\u00e9alit\u00e9 contrast\u00e9e pour la protection des donn\u00e9es. D\u2019un cot\u00e9 les r\u00e9seaux sociaux, et les soci\u00e9t\u00e9s les exploitant, prennent r\u00e9guli\u00e8rement des largesses sur le respect de la vie priv\u00e9e de leurs membres. Changement peu clair des conditions g\u00e9n\u00e9rales d\u2019utilisation, apport de nouvelles fonctionnalit\u00e9s tr\u00e8s \u00ab\u00a0ouvertes\u00a0\u00bb, partage d\u2019informations \u00e0 but commercial sont autant d\u2019exemples r\u00e9cents. Et ce n\u2019est justement pas la direction \u00e0 suivre\u00a0!<\/p>\n<p>Mais de l\u2019autre cot\u00e9, les r\u00e9seaux sociaux impl\u00e9mentent des m\u00e9canismes innovants de protection et de partage de l\u2019information, pr\u00e9curseurs du futur de la protection des donn\u00e9es. M\u00eame si ces innovations sont moins \u00e9videntes de prime abord, elles sont concr\u00e8tes et en place d\u00e8s aujourd\u2019hui.<\/p>\n<p>Prenons l\u2019exemple du partage d\u2019information entre des applications. Aujourd\u2019hui, dans le monde de l\u2019entreprise, chaque application \u00e9change des flux avec d\u2019autres sans mettre en place (ou alors tr\u00e8s rarement) des m\u00e9canismes d\u2019authentification et d\u2019autorisation. A contrario, les plateformes tels que Twitter permettent des g\u00e9rer des droits d\u2019acc\u00e8s applicatifs de mani\u00e8re simple et\u00a0 efficace. L\u2019utilisateur, avec son compte Twitter, peut autoriser des applications tierces \u00e0 r\u00e9aliser plus ou moins d\u2019actions sur ses donn\u00e9es. Lire les messages, ajouter des utilisateurs, \u00e9crire des messages, il est possible de g\u00e9rer toutes ces op\u00e9rations de mani\u00e8re transparente et claire avec un tableau de bord qui r\u00e9sume les droits accord\u00e9s. Ces autorisations peuvent aussi \u00eatre limit\u00e9es dans le temps comme le propose LinkedIn.<\/p>\n<p>Innovation compl\u00e9mentaire, la simplification et le renforcement de l\u2019authentification de l\u2019utilisateur. De plus en plus d\u2019applications web permettent de s\u2019authentifier en utilisant le compte Twitter ou Facebook de l\u2019utilisateur. Voil\u00e0 un moyen simple de limiter le nombre de comptes et de mots de passe dans la lign\u00e9e des WebSSO mis en place dans l\u2019entreprise. Certains vont m\u00eame jusqu\u2019\u00e0 mettre en place gratuitement une authentification forte (Google par exemple) ou des m\u00e9canismes de r\u00e9-authentification pour les op\u00e9rations les plus sensibles. Ces m\u00eames applications vont g\u00e9n\u00e9rer des alertes en cas de comportements suspicieux (utilisation depuis un autre pays, \u00e0 des heures non coh\u00e9rentes). Ces m\u00e9canismes avanc\u00e9s, au combien difficile \u00e0 exiger en entreprise, sont impl\u00e9ment\u00e9s aujourd\u2019hui dans des applications grand public prot\u00e9geant parfois de simples photos de vacances\u00a0!<\/p>\n<p>Autre exemple, la gestion des droits d\u2019acc\u00e8s utilisateurs. L\u2019utilisation de Google Docs montre comment l\u2019utilisateur peut d\u00e9cider d\u2019accorder des acc\u00e8s de mani\u00e8re simple (lecture, modification) \u00e0 des utilisateurs qu\u2019il conna\u00eet. Coupl\u00e9 avec une tra\u00e7abilit\u00e9 et un suivi des modifications dans le temps impl\u00e9ment\u00e9es nativement, ces fonctionnalit\u00e9s sont \u00e0 des ann\u00e9es lumi\u00e8res de ce que permettent aujourd\u2019hui le partage de fichiers par messagerie, ou encore pire sur des cl\u00e9s USB. Google+ et sa gestion de \u00ab\u00a0cercles\u00a0\u00bb de contacts am\u00e8ne \u00e9galement une vue simple et compr\u00e9hensible par l\u2019utilisateur de la gestion des droits d\u2019acc\u00e8s.<\/p>\n<p>Bien entendu, ces m\u00e9canismes ne fonctionnent aujourd\u2019hui que dans un monde \u00ab\u00a0connect\u00e9\u00a0\u00bb et dans l\u2019\u00e9cosyst\u00e8me d\u2019un fournisseur (Google, Twitter, LinkedIn\u2026). Bien entendu les grands acteurs du web ont des ressources importantes et des \u00e9quipes exp\u00e9riment\u00e9es pour g\u00e9rer leurs \u00e9cosyst\u00e8mes. Mais les entreprises pourraient \u00e0 minima s\u2019inspirer de ces innovations, voire m\u00eame dans certains cas s\u2019appuyer sur elles\u00a0! Nul besoin de recr\u00e9er des comptes utilisateurs sur un site de recrutement externe, l\u2019utilisation du compte Twitter ou Facebook peuvent \u00eatre une alternative permettant de simplifier l\u2019acc\u00e8s pour les candidats. Ceci peut \u00e9galement \u00eatre vrai dans des campagnes de promotion B2C ou dans l\u2019acc\u00e8s \u00e0 certains espaces clients.<\/p>\n<p>Il va donc \u00eatre int\u00e9ressant de suivre toutes les innovations apport\u00e9es par ces r\u00e9seaux sociaux dans la protection des donn\u00e9es et d\u2019estimer, en analysant les risques, comment ceux-ci peuvent \u00eatre transpos\u00e9s ou utilis\u00e9s dans les syst\u00e8mes d\u2019information des grandes entreprises\u00a0!<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Derri\u00e8re ce titre provocateur se cache une r\u00e9alit\u00e9 contrast\u00e9e pour la protection des donn\u00e9es. D\u2019un cot\u00e9 les r\u00e9seaux sociaux, et les soci\u00e9t\u00e9s les exploitant, prennent r\u00e9guli\u00e8rement des largesses sur le respect de la vie priv\u00e9e de leurs membres. Changement peu&#8230;<\/p>\n","protected":false},"author":15,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36,37],"tags":[3259,412,106],"coauthors":[837],"class_list":["post-814","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","category-digital-innovation","tag-data-protection-2","tag-donnees-a-caractere-personnel","tag-reseaux-sociaux"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protection des donn\u00e9es : les r\u00e9seaux sociaux montrent la bonne direction - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protection des donn\u00e9es : les r\u00e9seaux sociaux montrent la bonne direction - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Derri\u00e8re ce titre provocateur se cache une r\u00e9alit\u00e9 contrast\u00e9e pour la protection des donn\u00e9es. D\u2019un cot\u00e9 les r\u00e9seaux sociaux, et les soci\u00e9t\u00e9s les exploitant, prennent r\u00e9guli\u00e8rement des largesses sur le respect de la vie priv\u00e9e de leurs membres. Changement peu...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-10-21T09:54:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:23:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Protection des donn\u00e9es : les r\u00e9seaux sociaux montrent la bonne direction\",\"datePublished\":\"2011-10-21T09:54:32+00:00\",\"dateModified\":\"2019-12-31T11:23:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/\"},\"wordCount\":725,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"data protection\",\"DPO\",\"r\u00e9seaux sociaux\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\",\"M\u00e9tiers - Digital &amp; innovation\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/\",\"name\":\"Protection des donn\u00e9es : les r\u00e9seaux sociaux montrent la bonne direction - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2011-10-21T09:54:32+00:00\",\"dateModified\":\"2019-12-31T11:23:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protection des donn\u00e9es : les r\u00e9seaux sociaux montrent la bonne direction\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protection des donn\u00e9es : les r\u00e9seaux sociaux montrent la bonne direction - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/","og_locale":"en_US","og_type":"article","og_title":"Protection des donn\u00e9es : les r\u00e9seaux sociaux montrent la bonne direction - RiskInsight","og_description":"Derri\u00e8re ce titre provocateur se cache une r\u00e9alit\u00e9 contrast\u00e9e pour la protection des donn\u00e9es. D\u2019un cot\u00e9 les r\u00e9seaux sociaux, et les soci\u00e9t\u00e9s les exploitant, prennent r\u00e9guli\u00e8rement des largesses sur le respect de la vie priv\u00e9e de leurs membres. Changement peu...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/","og_site_name":"RiskInsight","article_published_time":"2011-10-21T09:54:32+00:00","article_modified_time":"2019-12-31T11:23:55+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Protection des donn\u00e9es : les r\u00e9seaux sociaux montrent la bonne direction","datePublished":"2011-10-21T09:54:32+00:00","dateModified":"2019-12-31T11:23:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/"},"wordCount":725,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["data protection","DPO","r\u00e9seaux sociaux"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust","M\u00e9tiers - Digital &amp; innovation"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/","url":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/","name":"Protection des donn\u00e9es : les r\u00e9seaux sociaux montrent la bonne direction - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2011-10-21T09:54:32+00:00","dateModified":"2019-12-31T11:23:55+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/10\/protection-des-donnees-les-reseaux-sociaux-montrent-la-bonne-direction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Protection des donn\u00e9es : les r\u00e9seaux sociaux montrent la bonne direction"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=814"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/814\/revisions"}],"predecessor-version":[{"id":6488,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/814\/revisions\/6488"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=814"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}