{"id":8621,"date":"2015-12-16T10:03:37","date_gmt":"2015-12-16T09:03:37","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=8621"},"modified":"2019-12-31T10:28:52","modified_gmt":"2019-12-31T09:28:52","slug":"assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/","title":{"rendered":"Assurer son syst\u00e8me d\u2019information industriel contre une cyberattaque, c\u2019est possible ?"},"content":{"rendered":"<p><em>Les cyberattaques r\u00e9centes nous ont rappel\u00e9 que des attaques sur les syst\u00e8mes d\u2019information peuvent avoir des impacts mat\u00e9riels, voire humains, avec des cons\u00e9quences financi\u00e8res tr\u00e8s importantes. Les attaques sur les syst\u00e8mes d\u2019information (SI) industriels en sont les exemples parfaits\u00a0: une compromission logique du SI industriel peut entrainer le d\u00e9r\u00e8glement et\/ou la destruction du mat\u00e9riel industriel associ\u00e9, et avoir des cons\u00e9quences d\u00e9sastreuses en fonction des activit\u00e9s de l\u2019entreprise. Face \u00e0 ces impacts financiers critiques, la question de l\u2019assurabilit\u00e9 de ce risque se pose alors. Mais le march\u00e9 de l\u2019assurance est-il aujourd\u2019hui capable de proposer des solutions satisfaisantes\u00a0? Que proposent les assurances traditionnelles (Dommages, Tous Risques Informatiques, Responsabilit\u00e9 Civile\u2026)\u00a0? La cyberassurance peut-elle r\u00e9pondre \u00e0 cette probl\u00e9matique\u00a0?<\/em><\/p>\n<h2>Pourquoi assurer son SI industriel\u00a0?<\/h2>\n<p>On d\u00e9finit les syst\u00e8mes d\u2019information industriels comme des syst\u00e8mes \u00ab\u00a0logiques\u00a0\u00bb permettant de piloter des outils de production \u00ab\u00a0physiques\u00a0\u00bb (cha\u00eenes de montage, machines-outils, fours, scanners m\u00e9dicaux, climatisations, aiguillages, pipelines\u2026). De plus en plus ouverts, ils se positionnent comme un interm\u00e9diaire entre le syst\u00e8me d\u2019information \u00ab\u00a0classique\u00a0\u00bb de l\u2019entreprise, et sa chaine de production physique.<\/p>\n<p>De par son positionnement cl\u00e9 pour l\u2019entreprise, la sensibilit\u00e9 des donn\u00e9es et syst\u00e8mes qu\u2019il manipule et son ouverture accrue sur le SI de l\u2019entreprise (voire parfois sur internet), le SI industriel devient de plus en plus souvent la cible d\u2019attaques aux motivations diff\u00e9rentes (destruction, espionnage, gain financier\u2026). Les r\u00e9centes attaques r\u00e9v\u00e9l\u00e9es en Allemagne par le BSI avec la <a href=\"http:\/\/www.lemagit.fr\/actualites\/2240237195\/Un-industriel-allemand-victime-dune-attaque-de-type-Stuxnet\">compromission du syst\u00e8me de contr\u00f4le du haut fourneau<\/a> ou en Cor\u00e9e du Sud avec <a href=\"http:\/\/www.securityweek.com\/south-korea-accuses-north-cyber-attacks-nuclear-plants\">le vol de donn\u00e9es sur les r\u00e9acteurs nucl\u00e9aires<\/a> ne font que confirmer la probabilit\u00e9 d\u2019attaques de ces syst\u00e8mes.<\/p>\n<p>En plus des dommages mat\u00e9riels (destruction de ses outils de production) et immat\u00e9riels (frais de reconstruction des donn\u00e9es, frais d\u2019expertise\u2026) pour l\u2019entreprise, les cons\u00e9quences de ces attaques peuvent \u00eatre consid\u00e9rables et d\u00e9passer le cadre m\u00eame de l\u2019entreprise\u00a0: fuite radioactive, d\u00e9raillement d\u2019un train\u2026<\/p>\n<p>Face \u00e0 ce risque majeur, et l\u2019impossibilit\u00e9 \u00e0 la fois d\u2019emp\u00eacher la totalit\u00e9 des attaques et d\u2019absorber l\u2019ensemble des impacts, le besoin d\u2019assurabilit\u00e9 de ces syst\u00e8mes se fait ressentir.<\/p>\n<h2>Les assurances traditionnelles ne r\u00e9pondent pas au besoin<\/h2>\n<p>Les assurances traditionnelles, et notamment les assurances \u00ab\u00a0Dommages\u00a0\u00bb, peuvent r\u00e9pondre \u00e0 certains risques li\u00e9s aux SI industriels. Elles permettent notamment de couvrir les dommages mat\u00e9riels li\u00e9s \u00e0 une panne informatique, ou \u00e0 un incendie. De m\u00eame, les polices \u00ab\u00a0Responsabilit\u00e9 Civile\u00a0\u00bb peuvent couvrir les dommages aux tiers suite \u00e0 un incident sur le SI industriel.<\/p>\n<p>Pour autant ces contrats traditionnels trouvent parfois leurs limites dans un contexte cyber.<\/p>\n<p>En effet, ces assurances couvrent tr\u00e8s rarement les dommages immat\u00e9riels, quel que soit le sc\u00e9nario de sinistre, et encore moins si le sc\u00e9nario est une cyberattaque. De fait, les frais de reconstitution des donn\u00e9es et d\u2019expertise technique (par exemple pour les investigations num\u00e9riques suite \u00e0 une attaque) sont rarement couverts par ces assurances.<\/p>\n<p>De plus, la plupart de ces contrats ont des exclusions li\u00e9es la cause du sinistre et excluent les cyberattaques. Il est parfois possible de \u00ab\u00a0racheter\u00a0\u00bb ces exclusions moyennant une hausse de la prime annuelle, mais ce n\u2019est pas toujours le cas et la couverture se limite quasiment toujours aux dommages mat\u00e9riels.<\/p>\n<h2>La cyberassurance est-elle la solution\u00a0?<\/h2>\n<p>Se pr\u00e9sentant comme l\u2019assurance des risques cyber, on pourrait naturellement imaginer qu\u2019elle couvre compl\u00e8tement les besoins d\u2019assurance des SI industriels relatifs au risque de cyberattaque. Malheureusement, il n\u2019en est rien\u00a0: si certains contrats commencent \u00e0 proposer des solutions couvrant la particularit\u00e9 logique\/physique des SI industriels, la plupart n\u2019y r\u00e9pond que partiellement.<\/p>\n<p>Le premier frein \u00e0 la couverture totale est le fait que la cyberassurance couvre majoritairement les dommages immat\u00e9riels, puisque destin\u00e9e principalement aux syst\u00e8mes d\u2019information \u00ab\u00a0classiques\u00a0\u00bb. En effet, l\u2019impact naturel associ\u00e9 \u00e0 une cyberattaque est une atteinte aux donn\u00e9es, et non au mat\u00e9riel. Avec cette approche, de nombreux frais sont couverts\u00a0: frais de reconstruction des donn\u00e9es, frais d\u2019expertise, frais de notification, frais de justice\u2026. Pour autant, l\u2019ensemble des dommages mat\u00e9riels, et notamment sur les syst\u00e8mes physiques industriels d\u00e9truits, ne sont pratiquement jamais couverts, ce qui entraine un manque notable dans la couverture du risque pour un SI industriel, et peut ainsi freiner la souscription d\u2019une cyberassurance.<\/p>\n<p>Par ailleurs, au vu des impacts importants li\u00e9s aux SI industriels qui peuvent d\u00e9passer le cadre m\u00eame de l\u2019entreprise, certains assureurs excluent directement dans leur police la couverture de l\u2019ensemble des frais li\u00e9s \u00e0 ces syst\u00e8mes, qu\u2019ils soient immat\u00e9riels ou mat\u00e9riels. Le risque n\u2019est alors pas (ou peu) couvert.<\/p>\n<h2>Une \u00e9volution en vue\u00a0?<\/h2>\n<p>Cependant, avec la demande croissante des acteurs de l\u2019industrie, les cyberassureurs commencent \u00e0 int\u00e9grer la couverture des dommages mat\u00e9riels (voire humains) \u00e0 leur police. Pour autant, il est \u00e0 noter que des sous-limites (limitation de garantie pour certains frais) contraignantes y sont souvent associ\u00e9es, ce qui peut parfois en limiter consid\u00e9rablement l\u2019int\u00e9r\u00eat. Cependant, dans un march\u00e9 fortement concurrentiel et compte tenu des impacts associ\u00e9s, cet argument peut rapidement apparaitre comme diff\u00e9renciateur.<\/p>\n<p>&nbsp;<\/p>\n<p>Il existe un \u00ab\u00a0vide\u00a0\u00bb dans la couverture assurantielle des risques cyber pour les syst\u00e8mes d\u2019information industriels. Les assurances traditionnelles montrent un certain nombre de limites en excluant souvent les sc\u00e9narios cyber, et a contrario les cyberassurances couvrent rarement les dommages mat\u00e9riels, pourtant centre de co\u00fbt cl\u00e9 des SI industriels. Pour autant, les cyberassurances commencent \u00e0 proposer des solutions avec une couverture plus globale incluant les dommages mat\u00e9riels. Mais la demande doit continuer d\u2019augmenter et le march\u00e9 se d\u00e9mocratiser pour atteindre une couverture optimale des SI industriels. Pour 2016\u00a0?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les cyberattaques r\u00e9centes nous ont rappel\u00e9 que des attaques sur les syst\u00e8mes d\u2019information peuvent avoir des impacts mat\u00e9riels, voire humains, avec des cons\u00e9quences financi\u00e8res tr\u00e8s importantes. Les attaques sur les syst\u00e8mes d\u2019information (SI) industriels en sont les exemples parfaits\u00a0: une&#8230;<\/p>\n","protected":false},"author":178,"featured_media":8622,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3227],"tags":[1349,3300,411,1260],"coauthors":[1193],"class_list":["post-8621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-manufacturing-industry-4-0","tag-cyberassurance","tag-manuf-industry-4-0","tag-protection","tag-si-industriel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Assurer son syst\u00e8me d\u2019information industriel contre une cyberattaque, c\u2019est possible ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"Les cyberattaques r\u00e9centes nous ont rappel\u00e9 que des attaques sur les syst\u00e8mes d\u2019information peuvent avoir des impacts mat\u00e9riels, voire humains, avec des cons\u00e9quences financi\u00e8res tr\u00e8s importantes. La cyberassurance peut-elle r\u00e9pondre \u00e0 cette probl\u00e9matique ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Assurer son syst\u00e8me d\u2019information industriel contre une cyberattaque, c\u2019est possible ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Les cyberattaques r\u00e9centes nous ont rappel\u00e9 que des attaques sur les syst\u00e8mes d\u2019information peuvent avoir des impacts mat\u00e9riels, voire humains, avec des cons\u00e9quences financi\u00e8res tr\u00e8s importantes. La cyberassurance peut-elle r\u00e9pondre \u00e0 cette probl\u00e9matique ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-16T09:03:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:28:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_72331203_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Martin Descazeaux\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Martin Descazeaux\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/\"},\"author\":{\"name\":\"Martin Descazeaux\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/5313e1dcdc080301dfa36da4f43e3d3a\"},\"headline\":\"Assurer son syst\u00e8me d\u2019information industriel contre une cyberattaque, c\u2019est possible ?\",\"datePublished\":\"2015-12-16T09:03:37+00:00\",\"dateModified\":\"2019-12-31T09:28:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/\"},\"wordCount\":1018,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_72331203_Subscription_Monthly_M.jpg\",\"keywords\":[\"cyberassurance\",\"manuf &amp; industry 4.0\",\"protection\",\"SI industriel\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/\",\"name\":\"Assurer son syst\u00e8me d\u2019information industriel contre une cyberattaque, c\u2019est possible ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_72331203_Subscription_Monthly_M.jpg\",\"datePublished\":\"2015-12-16T09:03:37+00:00\",\"dateModified\":\"2019-12-31T09:28:52+00:00\",\"description\":\"Les cyberattaques r\u00e9centes nous ont rappel\u00e9 que des attaques sur les syst\u00e8mes d\u2019information peuvent avoir des impacts mat\u00e9riels, voire humains, avec des cons\u00e9quences financi\u00e8res tr\u00e8s importantes. La cyberassurance peut-elle r\u00e9pondre \u00e0 cette probl\u00e9matique ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_72331203_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_72331203_Subscription_Monthly_M.jpg\",\"width\":1378,\"height\":1378},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Assurer son syst\u00e8me d\u2019information industriel contre une cyberattaque, c\u2019est possible ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/5313e1dcdc080301dfa36da4f43e3d3a\",\"name\":\"Martin Descazeaux\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/m3rtindescazeaux\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Assurer son syst\u00e8me d\u2019information industriel contre une cyberattaque, c\u2019est possible ? - RiskInsight","description":"Les cyberattaques r\u00e9centes nous ont rappel\u00e9 que des attaques sur les syst\u00e8mes d\u2019information peuvent avoir des impacts mat\u00e9riels, voire humains, avec des cons\u00e9quences financi\u00e8res tr\u00e8s importantes. La cyberassurance peut-elle r\u00e9pondre \u00e0 cette probl\u00e9matique ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/","og_locale":"en_US","og_type":"article","og_title":"Assurer son syst\u00e8me d\u2019information industriel contre une cyberattaque, c\u2019est possible ? - RiskInsight","og_description":"Les cyberattaques r\u00e9centes nous ont rappel\u00e9 que des attaques sur les syst\u00e8mes d\u2019information peuvent avoir des impacts mat\u00e9riels, voire humains, avec des cons\u00e9quences financi\u00e8res tr\u00e8s importantes. La cyberassurance peut-elle r\u00e9pondre \u00e0 cette probl\u00e9matique ?","og_url":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/","og_site_name":"RiskInsight","article_published_time":"2015-12-16T09:03:37+00:00","article_modified_time":"2019-12-31T09:28:52+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_72331203_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Martin Descazeaux","twitter_misc":{"Written by":"Martin Descazeaux","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/"},"author":{"name":"Martin Descazeaux","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/5313e1dcdc080301dfa36da4f43e3d3a"},"headline":"Assurer son syst\u00e8me d\u2019information industriel contre une cyberattaque, c\u2019est possible ?","datePublished":"2015-12-16T09:03:37+00:00","dateModified":"2019-12-31T09:28:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/"},"wordCount":1018,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_72331203_Subscription_Monthly_M.jpg","keywords":["cyberassurance","manuf &amp; industry 4.0","protection","SI industriel"],"articleSection":["Cybersecurity &amp; Digital Trust","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/","url":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/","name":"Assurer son syst\u00e8me d\u2019information industriel contre une cyberattaque, c\u2019est possible ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_72331203_Subscription_Monthly_M.jpg","datePublished":"2015-12-16T09:03:37+00:00","dateModified":"2019-12-31T09:28:52+00:00","description":"Les cyberattaques r\u00e9centes nous ont rappel\u00e9 que des attaques sur les syst\u00e8mes d\u2019information peuvent avoir des impacts mat\u00e9riels, voire humains, avec des cons\u00e9quences financi\u00e8res tr\u00e8s importantes. La cyberassurance peut-elle r\u00e9pondre \u00e0 cette probl\u00e9matique ?","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_72331203_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_72331203_Subscription_Monthly_M.jpg","width":1378,"height":1378},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/assurer-son-systeme-dinformation-industriel-contre-une-cyberattaque-cest-possible\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Assurer son syst\u00e8me d\u2019information industriel contre une cyberattaque, c\u2019est possible ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/5313e1dcdc080301dfa36da4f43e3d3a","name":"Martin Descazeaux","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/m3rtindescazeaux\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8621"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8621\/revisions"}],"predecessor-version":[{"id":8625,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8621\/revisions\/8625"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/8622"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8621"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}