{"id":8337,"date":"2015-10-01T14:13:34","date_gmt":"2015-10-01T13:13:34","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=8337"},"modified":"2019-12-31T10:31:43","modified_gmt":"2019-12-31T09:31:43","slug":"cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/","title":{"rendered":"Cyber-r\u00e9silience : allier les forces du RPCA et du RSSI pour franchir une nouvelle \u00e9tape"},"content":{"rendered":"<p><em>\u00ab\u00a0Plier mais ne pas rompre\u00a0\u00bb, c\u2019est souvent de cette mani\u00e8re que la r\u00e9silience est pr\u00e9sent\u00e9e. Mais comment ce concept s\u2019applique face aux menaces cyber. Et quel est aujourd\u2019hui le niveau de pr\u00e9paration des grandes entreprises\u00a0face \u00e0 des attaques de plus en plus fr\u00e9quentes ?<\/em><\/p>\n<h2>Les cyberattaques mettent en lumi\u00e8re les limites de la r\u00e9silience actuelle et des plans de continuit\u00e9 d\u2019activit\u00e9<\/h2>\n<p>La continuit\u00e9 d\u2019activit\u00e9 est souvent pr\u00e9sent\u00e9e comme un des \u00e9l\u00e9ments majeurs de la strat\u00e9gie de r\u00e9silience des organisations. Ainsi, face \u00e0 des sinistres d\u2019ampleur entra\u00eenant l\u2019indisponibilit\u00e9 de ressources informatiques, d\u2019infrastructures de communication, d\u2019immeubles voire de collaborateurs, les organisations se sont dot\u00e9es de plans de continuit\u00e9 d\u2019activit\u00e9 (PCA) de mani\u00e8re \u00e0 assurer leur survie.<\/p>\n<p>Or les cyber-attaques, dans leur forme moderne, n\u2019ont pas \u00e9t\u00e9 prises en compte lors de l\u2019\u00e9laboration de la majorit\u00e9 des PCA. Ces derniers focalis\u00e9s sur un enjeu de disponibilit\u00e9, n\u2019appr\u00e9hendent pas la probl\u00e9matique de perte de confiance dans le SI induite par les cyber-attaques.<\/p>\n<p>De plus, les dispositifs de continuit\u00e9 du SI, le plus souvent intiment li\u00e9s aux ressources qu\u2019ils prot\u00e8gent, sont \u00e9galement affect\u00e9s par ces attaques. En effet, depuis plus d\u2019une d\u00e9cennie, les dispositifs de continuit\u00e9 (repli utilisateurs ou secours informatique) ont adopt\u00e9 les principes de mutualisation des infrastructures et de secours \u00ab\u00a0\u00e0 chaud\u00a0\u00bb \u00e0 la fois pour r\u00e9pondre aux exigences de reprise rapide des m\u00e9tiers et au besoin d\u2019une meilleure exploitabilit\u00e9.\u00a0De fait, cette \u00ab\u00a0proximit\u00e9\u00a0\u00bb entre le SI nominal et son secours rend vuln\u00e9rables les dispositifs de continuit\u00e9 aux cyber-attaques. A titre d\u2019exemple, les postes de secours d\u00e9di\u00e9s et connect\u00e9s des sites de repli sont aujourd\u2019hui tr\u00e8s souvent expos\u00e9s aux m\u00eames risques de contamination (et destruction) que les postes nominaux.<\/p>\n<p>Les historiques plans de reprise\/secours \u00ab\u00a0\u00e0 froid\u00a0\u00bb (consistant souvent \u00e0 activer les syst\u00e8mes de secours en cas d\u2019incident) concernent d\u00e9sormais de moins en moins d\u2019applications, et il s\u2019agit souvent d\u2019applications secondaires.<\/p>\n<p>Enfin, les sauvegardes, \u00e9tablies sur une base souvent quotidienne, constituent pour la plupart des organisations le dispositif de dernier recours pour reconstruire le SI. Malheureusement, du fait de l\u2019ant\u00e9riorit\u00e9 de l\u2019intrusion (souvent plusieurs centaines de jours avant sa d\u00e9tection), ces sauvegardes embarquent de fait les \u00e9l\u00e9ments de compromission\u00a0: <em>malwares<\/em>, camps de base, mais aussi les modifications d\u00e9j\u00e0 op\u00e9r\u00e9es par les attaquants.<\/p>\n<p>&nbsp;<\/p>\n<h2>La gestion de crise et les dispositifs de continuit\u00e9 doivent \u00eatre repens\u00e9s<\/h2>\n<p>Les crises cyber sont des crises particuli\u00e8res\u00a0: souvent longues (plusieurs semaines), parfois difficiles \u00e0 cerner (qu\u2019a pu faire l\u2019attaquant\u00a0? depuis combien de temps\u00a0? quels sont les impacts\u00a0?) et impliquant des parties externes (autorit\u00e9s, fournisseurs\u2026) eux-m\u00eames souvent peu pr\u00e9par\u00e9s sur ce sujet. Ces \u00e9l\u00e9ments d\u00e9montrent qu\u2019il est n\u00e9cessaire d\u2019ajuster les dispositifs existants. Un des th\u00e8mes vise \u00e0 anticiper des astreintes et des rotations des personnels cl\u00e9s. Au-del\u00e0 de l\u2019aspect interne, il faudra s\u2019assurer de disposer \u00e9galement des expertises en SSI (investigation num\u00e9rique, m\u00e9thode d\u2019attaque&#8230;) et de l\u2019outillage de recherche et d\u2019assainissement requis pour comprendre la position prise par l\u2019attaquant dans un SI toujours plus grand et dont les fronti\u00e8res sont de plus en plus difficiles \u00e0 d\u00e9terminer. Et parce qu\u2019il est primordial de s\u2019exercer en amont afin d\u2019\u00eatre pr\u00eat le jour o\u00f9 il faut faire face \u00e0 la crise et anticiper certaines r\u00e9ponses, la r\u00e9alisation d\u2019exercice de crise sera un bon r\u00e9v\u00e9lateur de la situation r\u00e9elle.<\/p>\n<p>Dans ce contexte, les dispositifs de continuit\u00e9 doivent \u00e9galement \u00e9voluer, voire \u00eatre compl\u00e8tement repens\u00e9s. Les solutions possibles sont nombreuses, nous pouvons citer en particulier la construction de cha\u00eenes applicatives alternatives (<em>non similar facilities<\/em>), visant \u00e0 \u00ab\u00a0dupliquer\u00a0\u00bb une application sans utiliser les m\u00eames logiciels, syst\u00e8mes d\u2019exploitation et \u00e9quipes de production. Il s\u2019agit l\u00e0 d\u2019une solution ultime, envisag\u00e9e pour certaines applications critiques dans le monde de la finance. D\u2019autres solutions, moins complexes, comme l\u2019ajout de contr\u00f4le fonctionnel d\u2019int\u00e9grit\u00e9 dans le processus m\u00e9tier pour d\u00e9tecter rapidement une attaque (<em>multi-levels controls<\/em>) ou encore la d\u00e9finition de zone d\u2019isolation syst\u00e8me et r\u00e9seau (<em>floodgate<\/em>) sont possibles.<\/p>\n<p>Ces \u00e9volutions, souvent majeures, doivent s\u2019inscrire dans une revue des strat\u00e9gies de secours existantes afin d\u2019\u00e9valuer leur vuln\u00e9rabilit\u00e9 et l\u2019int\u00e9r\u00eat de d\u00e9ployer des nouvelles solutions de cyber-r\u00e9silience, en particulier sur les syst\u00e8mes les plus critiques. L\u2019\u00e9volution des <em><span class=\"st\">Business Impact Analysis<\/span><\/em> (BIA) pour inclure cette dimension est certainement une premi\u00e8re \u00e9tape cl\u00e9.<\/p>\n<h2>Sans cybers\u00e9curit\u00e9, la cyber-r\u00e9silence n\u2019est rien<\/h2>\n<p>Impl\u00e9menter ces nouvelles mesures de cyber-r\u00e9silience n\u00e9cessite des efforts importants. Des efforts qui seront vains si ces solutions de secours et les syst\u00e8mes nominaux ne sont pas d\u00e9j\u00e0 s\u00e9curis\u00e9s correctement et surveill\u00e9s avec attention. Le RSSI est l\u2019acteur cl\u00e9 pour faire aboutir ces d\u00e9marches souvent entam\u00e9es mais rarement finalis\u00e9es. L\u2019aide du Responsable du Plan de Continuit\u00e9 d&#8217;Activit\u00e9 (RPCA) sera alors un plus\u00a0! Il est aujourd\u2019hui impossible de s\u00e9curiser des syst\u00e8mes \u00e0 100%, il faut donc accepter la probabilit\u00e9 d\u2019occurrence d\u2019une attaque et c\u2019est \u00e0 ce moment-l\u00e0 que le RPCA prendra tout son r\u00f4le.<\/p>\n<p>Prot\u00e9ger, d\u00e9tecter, r\u00e9agir, assainir et reconstruire, voil\u00e0 donc les piliers d\u2019une cyber-r\u00e9silience solide. Cyber-r\u00e9silience qui ne pourra \u00eatre atteinte que si le RPCA et le RSSI travaillent main dans la main\u00a0!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00ab\u00a0Plier mais ne pas rompre\u00a0\u00bb, c\u2019est souvent de cette mani\u00e8re que la r\u00e9silience est pr\u00e9sent\u00e9e. Mais comment ce concept s\u2019applique face aux menaces cyber. Et quel est aujourd\u2019hui le niveau de pr\u00e9paration des grandes entreprises\u00a0face \u00e0 des attaques de plus&#8230;<\/p>\n","protected":false},"author":24,"featured_media":8338,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[3313,391,2470,131,2471,181],"coauthors":[821,837],"class_list":["post-8337","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-bcp-cyberresilience","tag-continuite-dactivite","tag-cyberresilience","tag-pca","tag-rpca","tag-rssi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber-r\u00e9silience : allier les forces du RPCA et du RSSI pour franchir une nouvelle \u00e9tape - RiskInsight<\/title>\n<meta name=\"description\" content=\"\u00ab Plier mais ne pas rompre \u00bb, c\u2019est souvent de cette mani\u00e8re que la r\u00e9silience est pr\u00e9sent\u00e9e. Mais comment ce concept s\u2019applique face aux menaces cyber ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-r\u00e9silience : allier les forces du RPCA et du RSSI pour franchir une nouvelle \u00e9tape - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"\u00ab Plier mais ne pas rompre \u00bb, c\u2019est souvent de cette mani\u00e8re que la r\u00e9silience est pr\u00e9sent\u00e9e. Mais comment ce concept s\u2019applique face aux menaces cyber ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-01T13:13:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:31:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/10\/alliance.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Frederic Chollet, G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Frederic Chollet, G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/\"},\"author\":{\"name\":\"Frederic Chollet\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1806516c0e27ec00d49f55331e465892\"},\"headline\":\"Cyber-r\u00e9silience : allier les forces du RPCA et du RSSI pour franchir une nouvelle \u00e9tape\",\"datePublished\":\"2015-10-01T13:13:34+00:00\",\"dateModified\":\"2019-12-31T09:31:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/\"},\"wordCount\":979,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/10\/alliance.jpg\",\"keywords\":[\"BCP &amp; cyberresilience\",\"continuit\u00e9 d'activit\u00e9\",\"cyberresilience\",\"PCA\",\"RPCA\",\"RSSI\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/\",\"name\":\"Cyber-r\u00e9silience : allier les forces du RPCA et du RSSI pour franchir une nouvelle \u00e9tape - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/10\/alliance.jpg\",\"datePublished\":\"2015-10-01T13:13:34+00:00\",\"dateModified\":\"2019-12-31T09:31:43+00:00\",\"description\":\"\u00ab Plier mais ne pas rompre \u00bb, c\u2019est souvent de cette mani\u00e8re que la r\u00e9silience est pr\u00e9sent\u00e9e. Mais comment ce concept s\u2019applique face aux menaces cyber ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/10\/alliance.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/10\/alliance.jpg\",\"width\":1378,\"height\":1378,\"caption\":\"Two businessmen with beards working and planning things together. Business idea concept. Vector flat design Illustration.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-r\u00e9silience : allier les forces du RPCA et du RSSI pour franchir une nouvelle \u00e9tape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1806516c0e27ec00d49f55331e465892\",\"name\":\"Frederic Chollet\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/frederic-chollet\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber-r\u00e9silience : allier les forces du RPCA et du RSSI pour franchir une nouvelle \u00e9tape - RiskInsight","description":"\u00ab Plier mais ne pas rompre \u00bb, c\u2019est souvent de cette mani\u00e8re que la r\u00e9silience est pr\u00e9sent\u00e9e. Mais comment ce concept s\u2019applique face aux menaces cyber ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/","og_locale":"en_US","og_type":"article","og_title":"Cyber-r\u00e9silience : allier les forces du RPCA et du RSSI pour franchir une nouvelle \u00e9tape - RiskInsight","og_description":"\u00ab Plier mais ne pas rompre \u00bb, c\u2019est souvent de cette mani\u00e8re que la r\u00e9silience est pr\u00e9sent\u00e9e. Mais comment ce concept s\u2019applique face aux menaces cyber ?","og_url":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/","og_site_name":"RiskInsight","article_published_time":"2015-10-01T13:13:34+00:00","article_modified_time":"2019-12-31T09:31:43+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/10\/alliance.jpg","type":"image\/jpeg"}],"author":"Frederic Chollet, G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"Frederic Chollet, G\u00e9r\u00f4me Billois","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/"},"author":{"name":"Frederic Chollet","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1806516c0e27ec00d49f55331e465892"},"headline":"Cyber-r\u00e9silience : allier les forces du RPCA et du RSSI pour franchir une nouvelle \u00e9tape","datePublished":"2015-10-01T13:13:34+00:00","dateModified":"2019-12-31T09:31:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/"},"wordCount":979,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/10\/alliance.jpg","keywords":["BCP &amp; cyberresilience","continuit\u00e9 d'activit\u00e9","cyberresilience","PCA","RPCA","RSSI"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/","url":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/","name":"Cyber-r\u00e9silience : allier les forces du RPCA et du RSSI pour franchir une nouvelle \u00e9tape - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/10\/alliance.jpg","datePublished":"2015-10-01T13:13:34+00:00","dateModified":"2019-12-31T09:31:43+00:00","description":"\u00ab Plier mais ne pas rompre \u00bb, c\u2019est souvent de cette mani\u00e8re que la r\u00e9silience est pr\u00e9sent\u00e9e. Mais comment ce concept s\u2019applique face aux menaces cyber ?","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/10\/alliance.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/10\/alliance.jpg","width":1378,"height":1378,"caption":"Two businessmen with beards working and planning things together. Business idea concept. Vector flat design Illustration."},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/10\/cyber-resilience-allier-les-forces-du-rpca-et-du-rssi-pour-franchir-une-nouvelle-etape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber-r\u00e9silience : allier les forces du RPCA et du RSSI pour franchir une nouvelle \u00e9tape"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1806516c0e27ec00d49f55331e465892","name":"Frederic Chollet","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/frederic-chollet\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8337"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8337\/revisions"}],"predecessor-version":[{"id":8344,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8337\/revisions\/8344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/8338"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8337"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}