{"id":8636,"date":"2015-12-22T11:40:27","date_gmt":"2015-12-22T10:40:27","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=8636"},"modified":"2019-12-31T10:28:30","modified_gmt":"2019-12-31T09:28:30","slug":"cybersecurite-priorite-a-la-professionnalisation-en-2016","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/","title":{"rendered":"Cybers\u00e9curit\u00e9 : priorit\u00e9 \u00e0 la professionnalisation en 2016 ?"},"content":{"rendered":"<p>2015 sera certainement per\u00e7ue dans le futur comme une ann\u00e9e charni\u00e8re. En effet, de grands programmes de cybers\u00e9curit\u00e9 ont fait leur apparition cette ann\u00e9e. Ces derniers, associ\u00e9s \u00e0 des budgets cons\u00e9quents, montrent la prise de conscience au plus haut niveau dans les entreprises des risques cyber.<\/p>\n<p>Mais au-del\u00e0 de cette succession de nouveaut\u00e9s, cette situation pose surtout des d\u00e9fis en termes d\u2019organisation et de gestion des comp\u00e9tences qui devront \u00eatre au c\u0153ur des actions en 2016.<\/p>\n<h2>2015\u00a0: une ann\u00e9e charni\u00e8re<\/h2>\n<p>L\u2019actualit\u00e9 du triptyque \u00ab\u00a0menaces \/ r\u00e9glementations \/ produits\u00a0\u00bb a \u00e9t\u00e9 d\u00e9bordante sur 2015.<\/p>\n<p>Des incidents ultra-m\u00e9diatis\u00e9s (Sony Pictures, <a href=\"https:\/\/www.solucominsight.fr\/2015\/05\/tv5monde-une-cyberattaque-de-grande-ampleur-mediatique\/\">TV5 Monde<\/a>, Ashley Madison, VTech\u2026) ont rappel\u00e9 r\u00e9guli\u00e8rement les vuln\u00e9rabilit\u00e9s des syst\u00e8mes et l\u2019attrait des cybercriminels et des \u00e9tats pour les donn\u00e9es immat\u00e9rielles des entreprises. Cette m\u00e9diatisation, parfois exag\u00e9r\u00e9e, a au moins le m\u00e9rite d\u2019attirer l\u2019attention sur la cybers\u00e9curit\u00e9 au plus haut niveau dans les entreprises mais aussi largement sur l\u2019ensemble de la population.<\/p>\n<p>Les r\u00e9glementations se sont renforc\u00e9es drastiquement (Loi de Programmation Militaire, <a href=\"https:\/\/www.solucominsight.fr\/2016\/03\/8822\/\">R\u00e8glement europ\u00e9en sur les donn\u00e9es \u00e0 caract\u00e8re personnel<\/a>\u2026) et vont n\u00e9cessiter des investissements de grande ampleur. 2016 sera une ann\u00e9e o\u00f9 il faudra int\u00e9grer ces nouvelles exigences et cadrer les projets de d\u00e9clinaison, les \u00e9ch\u00e9ances commen\u00e7ant \u00e0 tomber d\u00e8s 2017.<\/p>\n<p>Les \u00e9diteurs n\u2019ont pas \u00e9t\u00e9 sans imagination pour inventer des nouvelles cat\u00e9gories de produits ou de nouveaux concepts. Apr\u00e8s \u00ab\u00a0l\u2019anti APT\u00a0\u00bb, les mots-cl\u00e9s \u00ab\u00a0<em>machine learning<\/em>\u00a0\u00bb, \u00ab\u00a0<em>Self Defined Security<\/em>\u00a0\u00bb, \u00ab\u00a0<em>Cloud Access Security Broker<\/em> &#8211; CASB\u00a0\u00bb et bien d\u2019autres nous promettent d\u2019arriver \u00e0 s\u00e9curiser les donn\u00e9es dans un contexte de changement permanent o\u00f9 les fronti\u00e8res du SI n\u2019existent plus et o\u00f9 le <em>Cloud<\/em> est devenu une r\u00e9alit\u00e9. De nombreuses startups \u00e9mergent dans ces domaines et des incubateurs\/acc\u00e9l\u00e9rateurs se sp\u00e9cialisent (Euratechnologies, Cylon\u2026). Nous ne serons donc pas \u00e0 court de solutions innovantes.<\/p>\n<p>Les cercles et associations s\u2019int\u00e9ressant \u00e0 la cybers\u00e9curit\u00e9 connaissent \u00e9galement une progression rapide et des commissions \u00ab\u00a0cybers\u00e9curit\u00e9\u00a0\u00bb se relancent ou font leur apparition dans des cercles d\u2019influence qui en \u00e9taient alors d\u00e9pourvus (Syntec, Cigref, Medef\u2026).<\/p>\n<h2>Comp\u00e9tences et pilotage : les cl\u00e9s pour r\u00e9ussir les grands programmes cybers\u00e9curit\u00e9<\/h2>\n<p>Mais au-del\u00e0 de cette succession d\u2019\u00e9v\u00e8nements \u00e0 prendre en compte, la situation actuelle pose des d\u00e9fis nouveaux en mati\u00e8re de professionnalisation et de gestion des comp\u00e9tences qui devront \u00eatre au c\u0153ur des actions en 2016.<\/p>\n<p>En particulier, le retour d\u2019exp\u00e9rience du d\u00e9roulement des grands programmes met en lumi\u00e8re deux limites.<\/p>\n<p>La premi\u00e8re, c\u2019est la difficult\u00e9 \u00e0 disposer des comp\u00e9tences n\u00e9cessaires pour mener \u00e0 bien ces programmes. Que cela soit dans les entreprises ou au niveau des fournisseurs conseil ou int\u00e9gration, les profils ne sont pas aujourd\u2019hui assez nombreux. D\u2019importants efforts de reconversion ou de recrutement sont en cours (par exemple chez Solucom nous avons recrut\u00e9 plus de 90 personnes cette ann\u00e9e dans le domaine de la cybers\u00e9curit\u00e9). Mais ceux-ci ne donneront tous leurs fruits que dans quelques ann\u00e9es.<\/p>\n<p>La deuxi\u00e8me c\u2019est la difficult\u00e9 \u00e0 faire aboutir ces programmes d\u2019ampleur. D\u2019un c\u00f4t\u00e9 les acteurs historiques de la cybers\u00e9curit\u00e9 sont peu habitu\u00e9s \u00e0 g\u00e9rer autant de projets (parfois quasiment une centaine) et de budget (plusieurs dizaines de millions d\u2019euros), dans des d\u00e9lais aussi courts. De l\u2019autre c\u00f4t\u00e9, ces chantiers impactent de mani\u00e8re transversale l\u2019entreprise, et en particulier les \u00e9quipes en charge du SI. Ces derni\u00e8res, qui sont plut\u00f4t en phase de r\u00e9duction des co\u00fbts, comprennent peu l\u2019engagement de moyens sur la cybers\u00e9curit\u00e9, voire n\u2019ont pas la capacit\u00e9 \u00e0 r\u00e9aliser les actions demand\u00e9es. D\u2019autant plus qu\u2019il s\u2019agit souvent d\u2019actions \u00ab\u00a0de fond\u00a0\u00bb telles que la cartographie du SI ou encore une gestion rapide et efficace des changements et des incidents, sujets d\u00e9j\u00e0 complexes et en souffrance depuis des ann\u00e9es. Sans oublier que le syst\u00e8me d\u2019information est de plus en plus diffus, en particulier via le <em>Cloud<\/em>, et il est toujours aussi difficile de savoir o\u00f9 sont et o\u00f9 vont les donn\u00e9es alors qu\u2019elles constituent pourtant &#8211; encore plus aujourd\u2019hui qu\u2019hier &#8211; une grande partie du patrimoine de l\u2019entreprise.<\/p>\n<p>Ce constat n\u00e9cessite de renforcer la fili\u00e8re cybers\u00e9curit\u00e9, en particulier de lui adjoindre des ressources, pas forc\u00e9ment expertes en s\u00e9curit\u00e9, mais en mesure de porter des grands programmes.<\/p>\n<h2>Une priorit\u00e9\u00a0: r\u00e9inventer la fili\u00e8re \u00ab\u00a0cybers\u00e9curit\u00e9\u00a0\u00bb<\/h2>\n<p>2016 sera tr\u00e8s certainement une ann\u00e9e rythm\u00e9e par des incidents, des cadrages r\u00e9glementaires, des grands programmes de s\u00e9curit\u00e9 et des tests de produits innovants. Mais 2016 devrait aussi \u00eatre l\u2019ann\u00e9e o\u00f9 la fili\u00e8re \u00ab\u00a0cybers\u00e9curite\u00a0\u00bb tirera les fruits de la prise de conscience et se r\u00e9inventera en s\u2019emparant de ces enjeux.<\/p>\n<p>Comme souvent dans notre secteur, les banques montrent le chemin. Elles ont lanc\u00e9 cette ann\u00e9e plusieurs projets de r\u00e9organisation de leur fili\u00e8re pour l\u2019adapter aux nouveaux enjeux. Ce mouvement doit se d\u00e9cliner dans les autres secteurs d\u2019activit\u00e9 et entra\u00eener la mise en place d\u2019une organisation \u00e9quilibr\u00e9e, r\u00e9partie dans et hors de la DSI. Cette nouvelle organisation devra \u00eatre \u00e0 m\u00eame de porter des grands programmes et de s\u2019emparer des enjeux m\u00e9tiers, tout en d\u00e9veloppant son expertise et en assurant au quotidien le maintien en condition de s\u00e9curit\u00e9 du syst\u00e8me d\u2019information.<\/p>\n<p>Ce qui pouvait para\u00eetre impossible pr\u00e9c\u00e9demment l\u2019est de moins en moins avec le support \u00e9vident aujourd\u2019hui des directions g\u00e9n\u00e9rales. Mais ces derni\u00e8res attendent des r\u00e9sultats visibles et rapides.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2015 sera certainement per\u00e7ue dans le futur comme une ann\u00e9e charni\u00e8re. En effet, de grands programmes de cybers\u00e9curit\u00e9 ont fait leur apparition cette ann\u00e9e. Ces derniers, associ\u00e9s \u00e0 des budgets cons\u00e9quents, montrent la prise de conscience au plus haut niveau&#8230;<\/p>\n","protected":false},"author":15,"featured_media":8637,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3222,36],"tags":[3284,2541,78,3304],"coauthors":[837],"class_list":["post-8636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy","category-cybersecurity-digital-trust","tag-menace","tag-priorite","tag-reglementation","tag-risk-management-strategy-governance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 : priorit\u00e9 \u00e0 la professionnalisation en 2016 ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"Mais au-del\u00e0 de cette succession de nouveaut\u00e9s, cette situation pose surtout des d\u00e9fis en termes d\u2019organisation et de gestion des comp\u00e9tences qui devront \u00eatre au c\u0153ur des actions en 2016.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 : priorit\u00e9 \u00e0 la professionnalisation en 2016 ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Mais au-del\u00e0 de cette succession de nouveaut\u00e9s, cette situation pose surtout des d\u00e9fis en termes d\u2019organisation et de gestion des comp\u00e9tences qui devront \u00eatre au c\u0153ur des actions en 2016.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-22T10:40:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:28:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_62798858_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1453\" \/>\n\t<meta property=\"og:image:height\" content=\"1308\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Cybers\u00e9curit\u00e9 : priorit\u00e9 \u00e0 la professionnalisation en 2016 ?\",\"datePublished\":\"2015-12-22T10:40:27+00:00\",\"dateModified\":\"2019-12-31T09:28:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/\"},\"wordCount\":999,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_62798858_Subscription_Monthly_M.jpg\",\"keywords\":[\"menace\",\"priorit\u00e9\",\"R\u00e8glementation\",\"Risk management\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/\",\"name\":\"Cybers\u00e9curit\u00e9 : priorit\u00e9 \u00e0 la professionnalisation en 2016 ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_62798858_Subscription_Monthly_M.jpg\",\"datePublished\":\"2015-12-22T10:40:27+00:00\",\"dateModified\":\"2019-12-31T09:28:30+00:00\",\"description\":\"Mais au-del\u00e0 de cette succession de nouveaut\u00e9s, cette situation pose surtout des d\u00e9fis en termes d\u2019organisation et de gestion des comp\u00e9tences qui devront \u00eatre au c\u0153ur des actions en 2016.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_62798858_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_62798858_Subscription_Monthly_M.jpg\",\"width\":1453,\"height\":1308},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 : priorit\u00e9 \u00e0 la professionnalisation en 2016 ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 : priorit\u00e9 \u00e0 la professionnalisation en 2016 ? - RiskInsight","description":"Mais au-del\u00e0 de cette succession de nouveaut\u00e9s, cette situation pose surtout des d\u00e9fis en termes d\u2019organisation et de gestion des comp\u00e9tences qui devront \u00eatre au c\u0153ur des actions en 2016.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/","og_locale":"en_US","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 : priorit\u00e9 \u00e0 la professionnalisation en 2016 ? - RiskInsight","og_description":"Mais au-del\u00e0 de cette succession de nouveaut\u00e9s, cette situation pose surtout des d\u00e9fis en termes d\u2019organisation et de gestion des comp\u00e9tences qui devront \u00eatre au c\u0153ur des actions en 2016.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/","og_site_name":"RiskInsight","article_published_time":"2015-12-22T10:40:27+00:00","article_modified_time":"2019-12-31T09:28:30+00:00","og_image":[{"width":1453,"height":1308,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_62798858_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Cybers\u00e9curit\u00e9 : priorit\u00e9 \u00e0 la professionnalisation en 2016 ?","datePublished":"2015-12-22T10:40:27+00:00","dateModified":"2019-12-31T09:28:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/"},"wordCount":999,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_62798858_Subscription_Monthly_M.jpg","keywords":["menace","priorit\u00e9","R\u00e8glementation","Risk management"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/","url":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/","name":"Cybers\u00e9curit\u00e9 : priorit\u00e9 \u00e0 la professionnalisation en 2016 ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_62798858_Subscription_Monthly_M.jpg","datePublished":"2015-12-22T10:40:27+00:00","dateModified":"2019-12-31T09:28:30+00:00","description":"Mais au-del\u00e0 de cette succession de nouveaut\u00e9s, cette situation pose surtout des d\u00e9fis en termes d\u2019organisation et de gestion des comp\u00e9tences qui devront \u00eatre au c\u0153ur des actions en 2016.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_62798858_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/12\/Fotolia_62798858_Subscription_Monthly_M.jpg","width":1453,"height":1308},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/12\/cybersecurite-priorite-a-la-professionnalisation-en-2016\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 : priorit\u00e9 \u00e0 la professionnalisation en 2016 ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8636"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8636\/revisions"}],"predecessor-version":[{"id":8887,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8636\/revisions\/8887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/8637"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8636"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}