{"id":8579,"date":"2015-12-03T16:13:26","date_gmt":"2015-12-03T15:13:26","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=8579"},"modified":"2019-12-31T10:29:58","modified_gmt":"2019-12-31T09:29:58","slug":"cop21-quand-les-hacktivistes-sen-melent","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/","title":{"rendered":"COP21, quand les hacktivistes s&#8217;en m\u00ealent&#8230;"},"content":{"rendered":"<p><em>C&#8217;\u00e9tait pr\u00e9visible, et m\u00eame attendu par les autorit\u00e9s\u00a0: les\u00a0\u00ab\u00a0hacktivistes\u00a0\u00bb ne pouvaient pas laisser passer la COP21 sans faire parler d&#8217;eux. Retour sur les les motivations, l\u2019organisation de ces groupes et les cons\u00e9quences potentielles de ces attaques.<\/em><\/p>\n<p><strong>Comprendre les mouvances \u00ab\u00a0hacktivistes\u00a0\u00bb<\/strong><\/p>\n<p>\u00c9quivalent &#8220;cyber&#8221; des activistes dans le monde physique, ces groupes sont constitu\u00e9s de multiples mouvances, souvent auto-organis\u00e9es, qui se lient \u00e0 une cause et utilisent des moyens d&#8217;attaques dans le cyber espace pour faire passer leur message. Il est difficile de parler de groupes \u00ab\u00a0organis\u00e9s\u00a0\u00bb \u00e9tant donn\u00e9 le nombre de structures qui existent, les diff\u00e9rences d\u2019id\u00e9ologies revendiqu\u00e9es, et la multiplicit\u00e9 de causes d\u00e9fendues (lutte contre la finance, le terrorisme, la police, les \u00ab\u00a0pollueurs\u00a0\u00bb&#8230;).<\/p>\n<p>Ils r\u00e9alisent des actions telles que la publication d&#8217;information vol\u00e9es sur des sites, la modification de sites web officiels (defacement) ou encore des attaques en d\u00e9nis de service visant \u00e0 saturer des sites web et \u00e0 les rendre indisponibles.<\/p>\n<p>Leur force repose aussi sur la capacit\u00e9 \u00e0 rendre publiques et visibles leurs actions, en particulier gr\u00e2ce \u00e0 de nombreuses communications via les r\u00e9seaux sociaux et le lancement \u00ab\u00a0d\u2019op\u00e9rations\u00a0\u00bb qui se f\u00e9d\u00e8rent autour d\u2019un th\u00e8me et d\u2019un hashtag associ\u00e9.<\/p>\n<p><strong>Les premi\u00e8res attaques relatives \u00e0 la COP21<\/strong><\/p>\n<p>C&#8217;est justement l\u2019une des mouvances les plus connues, Anonymous, qui a fait parler d&#8217;elle. Tout d\u2019abord le lundi 30 novembre, o\u00f9 le groupe d&#8217;abord <a href=\"https:\/\/www.hackread.com\/anonymous-hacks-un-climate-change-website\/\">attaqu\u00e9 le site de l\u2019UNFCC<\/a> (\u00ab\u00a0United Nations Framework Convention on Climate Change \u00bb), r\u00e9ussissant \u00e0 d\u00e9rober des informations confidentielles telles que les noms, pr\u00e9noms, coordonn\u00e9es, mots de passe chiffr\u00e9s, questions secr\u00e8tes&#8230; Plus de 1500 personnes enregistr\u00e9es sur le site seraient touch\u00e9es par l\u2019attaque.<\/p>\n<p>Puis une deuxi\u00e8me attaque aurait touch\u00e9 un syst\u00e8me de diffusion de vid\u00e9o <a href=\"https:\/\/www.hackread.com\/anonymous-hacks-un-climate-changes-webcast-service-provider\/\">r\u00e9v\u00e9lant potentiellement les comptes et les mots de passe de 300 utilisateurs et employ\u00e9s de la soci\u00e9t\u00e9 fournissant des syst\u00e8mes utilis\u00e9s par l&#8217;UNFCC.<\/a> La sensibilit\u00e9 de ces donn\u00e9es, en particulier vis-\u00e0-vis du r\u00f4le des personnes touch\u00e9es, doit encore \u00eatre confirm\u00e9e. La motivation de ces attaquants : d\u00e9noncer les arrestations de dimanche \u00e0 Paris suite aux manifestions en partie violente.<\/p>\n<p>Un autre mouvement vise \u00e0 r\u00e9v\u00e9ler des informations compromettantes sur des entreprises ou des organisations accus\u00e9s d\u2019abuser des ressources naturelles. Cette campagne \u00ab\u00a0#OpCanary\u00a0\u00bb, existante depuis plusieurs mois, <a href=\"https:\/\/www.hackread.com\/anonymous-hacks-un-climate-changes-webcast-service-provider\/\">conna\u00eet une activit\u00e9 plus forte depuis la semaine derni\u00e8re et vise actuellement particuli\u00e8rement le Canada et la soci\u00e9t\u00e9 Barrick Gold<\/a>.<\/p>\n<p><strong>Des cons\u00e9quences sur les n\u00e9gociations\u00a0?<\/strong><\/p>\n<p>M\u00eame si la v\u00e9racit\u00e9 des attaques et des donn\u00e9es doit encore \u00eatre confirm\u00e9e, le premier objectif de ces attaquants est en partie atteint : ils font passer leur message publiquement. Au-del\u00e0 des r\u00e9v\u00e9lations de donn\u00e9es, il est important de souligner que d&#8217;autres attaques pourraient \u00eatre r\u00e9alis\u00e9es gr\u00e2ce aux donn\u00e9es vol\u00e9es. En particulier les mots de passe, si les personnes concern\u00e9es ont utilis\u00e9s les m\u00eames sur plusieurs sites ou ordinateurs <a href=\"http:\/\/media.ofcom.org.uk\/news\/2013\/uk-adults-taking-online-password-security-risks\/\">(ce qui est tr\u00e8s courant comme le montrait une \u00e9tude de l&#8217;OFCOM au Royaume-Uni avec des taux de r\u00e9utilisation sup\u00e9rieur \u00e0 55%)<\/a>, leur r\u00e9v\u00e9lation pourraient entra\u00eener d&#8217;autres fuites de donn\u00e9es. Et, si des officiels sont touch\u00e9s, cela pourrait \u00eatre encore plus dommageable en particulier sur les teneurs des n\u00e9gociations.<\/p>\n<p>Affaire \u00e0 suivre &#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C&#8217;\u00e9tait pr\u00e9visible, et m\u00eame attendu par les autorit\u00e9s\u00a0: les\u00a0\u00ab\u00a0hacktivistes\u00a0\u00bb ne pouvaient pas laisser passer la COP21 sans faire parler d&#8217;eux. Retour sur les les motivations, l\u2019organisation de ces groupes et les cons\u00e9quences potentielles de ces attaques. Comprendre les mouvances \u00ab\u00a0hacktivistes\u00a0\u00bb&#8230;<\/p>\n","protected":false},"author":15,"featured_media":8581,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3225],"tags":[641,2536,3038],"coauthors":[837],"class_list":["post-8579","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response","tag-hackers","tag-hacktivistes","tag-threat-intelligence"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>COP21, quand les hacktivistes s&#039;en m\u00ealent... - RiskInsight<\/title>\n<meta name=\"description\" content=\"C&#039;\u00e9tait pr\u00e9visible, et m\u00eame attendu par les autorit\u00e9s : les \u00ab hacktivistes \u00bb ne pouvaient pas laisser passer la COP21 sans faire parler d&#039;eux. Retour sur les les motivations, l\u2019organisation de ces groupes et les cons\u00e9quences potentielles de ces attaques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"COP21, quand les hacktivistes s&#039;en m\u00ealent... - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"C&#039;\u00e9tait pr\u00e9visible, et m\u00eame attendu par les autorit\u00e9s : les \u00ab hacktivistes \u00bb ne pouvaient pas laisser passer la COP21 sans faire parler d&#039;eux. Retour sur les les motivations, l\u2019organisation de ces groupes et les cons\u00e9quences potentielles de ces attaques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-03T15:13:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:29:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_78219251_Subscription_Monthly_XXL-hacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3873\" \/>\n\t<meta property=\"og:image:height\" content=\"3873\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"COP21, quand les hacktivistes s&#8217;en m\u00ealent&#8230;\",\"datePublished\":\"2015-12-03T15:13:26+00:00\",\"dateModified\":\"2019-12-31T09:29:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/\"},\"wordCount\":598,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_78219251_Subscription_Monthly_XXL-hacker.jpg\",\"keywords\":[\"hackers\",\"hacktivistes\",\"Threat intelligence\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/\",\"name\":\"COP21, quand les hacktivistes s'en m\u00ealent... - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_78219251_Subscription_Monthly_XXL-hacker.jpg\",\"datePublished\":\"2015-12-03T15:13:26+00:00\",\"dateModified\":\"2019-12-31T09:29:58+00:00\",\"description\":\"C'\u00e9tait pr\u00e9visible, et m\u00eame attendu par les autorit\u00e9s : les \u00ab hacktivistes \u00bb ne pouvaient pas laisser passer la COP21 sans faire parler d'eux. Retour sur les les motivations, l\u2019organisation de ces groupes et les cons\u00e9quences potentielles de ces attaques.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_78219251_Subscription_Monthly_XXL-hacker.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_78219251_Subscription_Monthly_XXL-hacker.jpg\",\"width\":3873,\"height\":3873},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"COP21, quand les hacktivistes s&rsquo;en m\u00ealent&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"COP21, quand les hacktivistes s'en m\u00ealent... - RiskInsight","description":"C'\u00e9tait pr\u00e9visible, et m\u00eame attendu par les autorit\u00e9s : les \u00ab hacktivistes \u00bb ne pouvaient pas laisser passer la COP21 sans faire parler d'eux. Retour sur les les motivations, l\u2019organisation de ces groupes et les cons\u00e9quences potentielles de ces attaques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/","og_locale":"en_US","og_type":"article","og_title":"COP21, quand les hacktivistes s'en m\u00ealent... - RiskInsight","og_description":"C'\u00e9tait pr\u00e9visible, et m\u00eame attendu par les autorit\u00e9s : les \u00ab hacktivistes \u00bb ne pouvaient pas laisser passer la COP21 sans faire parler d'eux. Retour sur les les motivations, l\u2019organisation de ces groupes et les cons\u00e9quences potentielles de ces attaques.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/","og_site_name":"RiskInsight","article_published_time":"2015-12-03T15:13:26+00:00","article_modified_time":"2019-12-31T09:29:58+00:00","og_image":[{"width":3873,"height":3873,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_78219251_Subscription_Monthly_XXL-hacker.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"COP21, quand les hacktivistes s&#8217;en m\u00ealent&#8230;","datePublished":"2015-12-03T15:13:26+00:00","dateModified":"2019-12-31T09:29:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/"},"wordCount":598,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_78219251_Subscription_Monthly_XXL-hacker.jpg","keywords":["hackers","hacktivistes","Threat intelligence"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/","url":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/","name":"COP21, quand les hacktivistes s'en m\u00ealent... - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_78219251_Subscription_Monthly_XXL-hacker.jpg","datePublished":"2015-12-03T15:13:26+00:00","dateModified":"2019-12-31T09:29:58+00:00","description":"C'\u00e9tait pr\u00e9visible, et m\u00eame attendu par les autorit\u00e9s : les \u00ab hacktivistes \u00bb ne pouvaient pas laisser passer la COP21 sans faire parler d'eux. Retour sur les les motivations, l\u2019organisation de ces groupes et les cons\u00e9quences potentielles de ces attaques.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_78219251_Subscription_Monthly_XXL-hacker.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_78219251_Subscription_Monthly_XXL-hacker.jpg","width":3873,"height":3873},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cop21-quand-les-hacktivistes-sen-melent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"COP21, quand les hacktivistes s&rsquo;en m\u00ealent&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8579"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8579\/revisions"}],"predecessor-version":[{"id":8584,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8579\/revisions\/8584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/8581"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8579"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}