{"id":8857,"date":"2016-03-28T13:59:31","date_gmt":"2016-03-28T12:59:31","guid":{"rendered":"https:\/\/www.solucominsight.fr\/?p=8857"},"modified":"2020-01-03T09:35:04","modified_gmt":"2020-01-03T08:35:04","slug":"leurope-de-cybersecurite-on-y-croire","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/","title":{"rendered":"L\u2019Europe de la cybers\u00e9curit\u00e9 : peut-on y croire ?"},"content":{"rendered":"<p><em>Au cours du <a href=\"https:\/\/ec.europa.eu\/commission\/2014-2019\/oettinger\/announcements\/8th-international-cybersecurity-forum-lille-france_en\" target=\"_blank\" rel=\"noopener noreferrer\">Forum International de la Cybers\u00e9curit\u00e9 <\/a>(FIC) 2016, G\u00fcnther Oettinger, commissaire europ\u00e9en charg\u00e9 de l\u2019\u00e9conomie et de la soci\u00e9t\u00e9 num\u00e9riques a fait un constat simple : l\u2019\u00e9conomie europ\u00e9enne est profond\u00e9ment interconnect\u00e9e au reste du monde, et ses secteurs d\u2019activit\u00e9 vitaux (sant\u00e9, \u00e9nergie, transport\u2026), sont devenus d\u00e9pendants des syst\u00e8mes d\u2019information.<\/em><\/p>\n<h1>Le cyberespace, talon d\u2019Achille de l\u2019Europe<\/h1>\n<p>En l\u2019absence de s\u00e9curit\u00e9 suffisante, cette d\u00e9pendance des \u00c9tats comme des entreprises peut rapidement <strong>se transformer en talon d\u2019Achille<\/strong>. Elle peut en effet offrir \u00e0 des individus, des organisations ou des \u00c9tats la possibilit\u00e9 de <strong>voler<\/strong> des secrets industriels ou des donn\u00e9es en grande quantit\u00e9, de <strong>d\u00e9tourner<\/strong> des fonds ou, pire, de <strong>d\u00e9truire<\/strong> le potentiel \u00e9conomique ou de survie d\u2019un \u00c9tat.<\/p>\n<p>\u00c0 titre d\u2019exemple, en 2015 au Royaume-Uni, <a href=\"http:\/\/www.computerweekly.com\/news\/4500247376\/Cost-of-UK-cyber-breaches-up-to-314m\" target=\"_blank\" rel=\"noopener noreferrer\">90% des grandes entreprises et 74% des petites entreprises ont subi une cyberattaque<\/a>. Par ailleurs &#8211; en guise d\u2019illustration des cons\u00e9quences financi\u00e8res atteignables &#8211; <a href=\"http:\/\/www.bbc.com\/news\/uk-34675235\" target=\"_blank\" rel=\"noopener noreferrer\">la cyberattaque subie par Talk Talk <\/a>lui a cout\u00e9 au total plus de 75 millions d\u2019euros. Enfin, la cyberattaque contre la <a href=\"http:\/\/edition.cnn.com\/2016\/02\/03\/politics\/cyberattack-ukraine-power-grid\/\" target=\"_blank\" rel=\"noopener noreferrer\">centrale \u00e9lectrique ukrainienne<\/a> d\u00e9montre parfaitement le <strong>caract\u00e8re potentiellement destructeur<\/strong> pour les \u00c9tats des cyberattaques contre leurs infrastructures critiques.<\/p>\n<p>Face \u00e0 un cyberespace qui est autant <strong>cr\u00e9ateur de richesses que source de menaces<\/strong>, <strong>comment l\u2019Union europ\u00e9enne pr\u00e9pare-t-elle sa cyber protection ?<\/strong><\/p>\n<h1>Entre h\u00e9t\u00e9rog\u00e9n\u00e9it\u00e9, volont\u00e9 d\u2019harmonisation et d\u00e9sir de coop\u00e9ration<\/h1>\n<p>Aujourd\u2019hui, l\u2019Europe de la cybers\u00e9curit\u00e9 repose essentiellement sur des \u00c9tats europ\u00e9ens qui avancent <strong>en ordre dispers\u00e9<\/strong> lorsqu\u2019il s\u2019agit de se pr\u00e9munir contre les cybermenaces ; il existe en effet une forte <strong>h\u00e9t\u00e9rog\u00e9n\u00e9it\u00e9<\/strong> entre les pays membres dans leur <strong>sensibilit\u00e9<\/strong> et leur<strong> niveau de pr\u00e9paration<\/strong> en mati\u00e8re de cybers\u00e9curit\u00e9, et peu d\u2019initiatives associant deux ou plusieurs \u00c9tats sont mises en \u0153uvre.<\/p>\n<p>Sans surprise, la question de la cybers\u00e9curit\u00e9 se pose avec plus d\u2019acuit\u00e9 aux <strong>principales puissances \u00e9conomiques<\/strong> et militaires europ\u00e9ennes, qui ont le plus d\u2019<strong>int\u00e9r\u00eat<\/strong> et le plus de <strong>capacit\u00e9s financi\u00e8res<\/strong> et <strong>technologiques<\/strong> pour se pr\u00e9munir contre les menaces venues du cyberespace.<\/p>\n<p>Avec le <strong>Royaume-Uni <\/strong>et l\u2019<strong>Allemagne<\/strong>, la <strong>France<\/strong> fait partie de ces \u00c9tats, cr\u00e9ant d\u00e8s 2008 l\u2019<a href=\"http:\/\/www.ssi.gouv.fr\/agence\/missions\/nos-publics-et-nos-actions\/\" target=\"_blank\" rel=\"noopener noreferrer\">ANSSI <\/a>, l\u2019autorit\u00e9 \u00e9tatique d\u00e9di\u00e9e \u00e0 la cybers\u00e9curit\u00e9, et se dotant d\u00e8s 2013 d\u2019<a href=\"https:\/\/www.solucominsight.fr\/2013\/08\/loi-de-programmation-militaire-2013-de-reelles-avancees-pour-la-cybersecurite\/\" target=\"_blank\" rel=\"noopener noreferrer\">un cadre juridique<\/a> imposant aux <strong>Op\u00e9rateurs d\u2019Importance Vital<\/strong>e de prot\u00e9ger leurs syst\u00e8mes d\u2019importance vitale (article 22 de la <a href=\"https:\/\/www.legifrance.gouv.fr\/affichTexte.do?cidTexte=JORFTEXT000028338825&amp;categorieLien=id\" target=\"_blank\" rel=\"noopener noreferrer\">loi de programmation militaire<\/a>). \u00c0 cela s\u2019ajoute la mise en \u0153uvre de moyens <a href=\"http:\/\/www.ssi.gouv.fr\/actualite\/la-strategie-nationale-pour-la-securite-du-numerique-une-reponse-aux-nouveaux-enjeux-des-usages-numeriques\/\" target=\"_blank\" rel=\"noopener noreferrer\">civils <\/a>et <a href=\"http:\/\/www.defense.gouv.fr\/portail-defense\/enjeux2\/cyberdefense\/la-cyberdefense\" target=\"_blank\" rel=\"noopener noreferrer\">militaires <\/a>d\u00e9di\u00e9s \u00e0 la protection contre les cybermenaces.<\/p>\n<p><strong>Outre-Rhin<\/strong> nous pourrions par exemple citer <a href=\"http:\/\/www.computerweekly.com\/news\/4500257182\/Germany-is-finalising-legislation-to-shore-up-CNI-cyber-security\" target=\"_blank\" rel=\"noopener noreferrer\">une loi adopt\u00e9e en 2015 <\/a>visant \u00e0 accro\u00eetre la cybers\u00e9curit\u00e9 des OIV allemands, ainsi que la coop\u00e9ration \u00e9troite qui lie l\u2019ANSSI et son homologue allemand, le BSI <em>(<span class=\"st\">Bundesamt f\u00fcr Sicherheit in der Informationstechnik<\/span>)<\/em>, depuis plus de cinq ans.<\/p>\n<p><strong>Outre-Manche<\/strong> le gouvernement britannique a annonc\u00e9 en 2015, <strong>1,9 milliards de livres sur cinq ans<\/strong> pour renforcer la cybers\u00e9curit\u00e9 du pays.<br \/>\nDepuis quelques ann\u00e9es, et face aux enjeux \u00e9conomiques que repr\u00e9sente la cybers\u00e9curit\u00e9 pour la communaut\u00e9 europ\u00e9enne, les autorit\u00e9s de l\u2019Union entendent participer davantage \u00e0 la protection contre les cybermenaces, notamment en harmonisant la l\u00e9gislation.<\/p>\n<p>Depuis 2005, <a href=\"https:\/\/www.coe.int\/en\/web\/conventions\/full-list\/-\/conventions\/treaty\/185\" target=\"_blank\" rel=\"noopener noreferrer\">la Convention de Budapest<\/a> , con\u00e7ue par le Conseil de l\u2019Europe, fournit par ratification \u00e0 tout pays une <strong>trame et des outils juridique<\/strong>s leur permettant de mieux se pr\u00e9munir contre la cybercriminalit\u00e9.<\/p>\n<p>Par ailleurs, la directive <em><a href=\"https:\/\/ec.europa.eu\/digital-single-market\/en\/news\/network-and-information-security-nis-directive\" target=\"_blank\" rel=\"noopener noreferrer\">Network and Information Systems<\/a><\/em> (NIS), prochainement adopt\u00e9e, <strong>harmonisera<\/strong> automatiquement \u00e0 l\u2019\u00e9chelle europ\u00e9enne les obligations des op\u00e9rateurs de services essentiels (d\u00e9nomination issue de la directive NIS) pour la protection de leurs syst\u00e8mes d\u2019information. Dans le m\u00eame temps <a href=\"https:\/\/www.solucominsight.fr\/2016\/03\/8822\/\">le futur r\u00e8glement europ\u00e9en sur la protection des donn\u00e9es personnelles <\/a>devrait accro\u00eetre la ma\u00eetrise des organisations sur les donn\u00e9es qu\u2019elles collectent, traitent et stockent, et donc limiter les cons\u00e9quences des cyberattaques en terme de fuite.<\/p>\n<p>Enfin, il a \u00e9t\u00e9 annonc\u00e9 par la Commission europ\u00e9enne lors du FIC 2016 que la cybers\u00e9curit\u00e9 fera, dans un avenir proche, <strong>de plus en plus partie des textes europ\u00e9ens \u00e0 port\u00e9e sectorielle.<\/strong><\/p>\n<p>La <strong>directive NIS<\/strong> d\u00e9finit en outre une <strong>gouvernance europ\u00e9enne de la cybers\u00e9curit\u00e9,<\/strong> in\u00e9dite et r\u00e9solument tourn\u00e9e vers la coop\u00e9ration entre les instances europ\u00e9ennes (Commission europ\u00e9enne, <a href=\"https:\/\/www.enisa.europa.eu\/about-enisa\" target=\"_blank\" rel=\"noopener noreferrer\">ENISA <\/a>&#8211; Agence Europ\u00e9enne charg\u00e9e de la s\u00e9curit\u00e9 des r\u00e9seaux et de l&#8217;information -, CERT-EU &#8211; Computer Emergency Response Team -)\u00a0 et entre les \u00c9tats membres.<\/p>\n<p><strong>Deux nouveaux organes seront donc cr\u00e9\u00e9s :<\/strong><\/p>\n<ul>\n<li><strong>Un groupe de coop\u00e9ration<\/strong> charg\u00e9 de <strong>soutenir et de faciliter la coop\u00e9ration strat\u00e9gique<\/strong> entre les \u00c9tats membres, notamment \u00e0 travers l\u2019\u00e9change d\u2019informations et de bonnes pratiques. Ce groupe r\u00e9unira la Commission europ\u00e9enne, l\u2019ENISA et les repr\u00e9sentants des \u00c9tats membres.<\/li>\n<li>Un<strong> r\u00e9seau de CSIRTs<\/strong> (Computer Security Incident Response Team), regroupant le <strong>CERT-EU<\/strong> et le <strong>CSIRT<\/strong> de chaque \u00c9tat membre dont l\u2019existence est rendue obligatoire par la directive. Il est charg\u00e9 de p<strong>romouvoir la coop\u00e9ration op\u00e9rationnelle entre les \u00c9tats membres.<\/strong> L\u2019ENISA assurera le secr\u00e9tariat de ce r\u00e9seau et la Commission europ\u00e9enne aura un statut d\u2019observateur.<\/li>\n<\/ul>\n<h1>Des d\u00e9fis qui appellent une volont\u00e9 politique commune<\/h1>\n<p>Ces initiatives europ\u00e9ennes &#8211; compl\u00e9mentaires des initiatives des \u00c9tats les plus avanc\u00e9s en mati\u00e8re de cybers\u00e9curit\u00e9 &#8211; sont \u00e9videmment salutaires, mais ne doivent pas faire oublier les d\u00e9fis, politiques et \u00e9conomiques, que l\u2019Europe devra d\u00e9passer afin de <strong>disposer d\u2019une cybers\u00e9curit\u00e9 efficace et assurant sa cyber r\u00e9silience<\/strong>.<\/p>\n<p>Au d\u00e9fi que pose la <strong>coop\u00e9ration de 28 \u00c9tats membres<\/strong> s\u2019ajoute la question des <strong>moyens qui permettront sa mise en \u0153uvre effective<\/strong>, tant au niveau strat\u00e9gique qu\u2019op\u00e9rationnel. Nul doute que les \u00c9tats d\u00e9j\u00e0 en avance p\u00e9renniseront leurs efforts. Mais quid des autres \u00c9tats, les plus nombreux : <strong>mobiliseront-ils les moyens suffisants pour se prot\u00e9ger ?<\/strong> La probl\u00e9matique des moyens se pose aussi <a href=\"http:\/\/www.euractiv.fr\/section\/societe-de-l-information\/news\/l-ue-ne-consacre-pas-assez-de-fonds-a-la-cybersecurite\/\" target=\"_blank\" rel=\"noopener noreferrer\">au niveau de la gouvernance europ\u00e9enne<\/a> : \u00e0 titre d\u2019exemple le budget de l\u2019ENISA est de seulement 10,1 millions d\u2019euros. <strong>Ce budget est-il r\u00e9ellement \u00e0 la hauteur des enjeux ?<\/strong><\/p>\n<p>Par ailleurs, comment envisager une Europe de la cybers\u00e9curit\u00e9 <strong>sans une v\u00e9ritable industrie europ\u00e9enne de la cybers\u00e9curit\u00e9 ?<\/strong> De l\u2019<a href=\"http:\/\/ec.europa.eu\/smart-regulation\/roadmaps\/docs\/2015_cnect_004_cybersecurity_en.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">aveu de la Commission europ\u00e9enne<\/a>, l\u2019offre europ\u00e9enne est<strong> encore trop fragment\u00e9e<\/strong> et port\u00e9e par des acteurs qui n\u2019ont pas encore atteint une taille suffisante,<strong> portant pr\u00e9judice \u00e0 leur comp\u00e9titivit\u00e9 face aux multinationales<\/strong>, am\u00e9ricaines notamment. Mais une industrie suffisamment puissante \u00e9conomiquement, sachant produire des produits et services europ\u00e9ens, est aussi <strong>un enjeu de souverainet\u00e9<\/strong>. \u00c0 l\u2019heure de la comp\u00e9tition \u00e9conomique mondiale, <strong>peut-on b\u00e2tir une Europe de la cybers\u00e9curit\u00e9 avec du mat\u00e9riel et des services chinois ou am\u00e9ricains ?<\/strong><\/p>\n<p>On ne peut que saluer les efforts que compte produire l\u2019Europe en mati\u00e8re de cybers\u00e9curit\u00e9 dans les prochaines ann\u00e9es. Stimul\u00e9 par des cybermenaces toujours plus nombreuses, ce projet pourra-t-il s\u2019appuyer sur une<strong> volont\u00e9 politique et des actions communes et durables<\/strong> ? Ou bien la <strong>dynamique europ\u00e9enne lanc\u00e9e s\u2019essoufflera-t-elle<\/strong> faute d\u2019une volont\u00e9 politique commune suffisante, laissant les \u00c9tats membres <strong>en ordre dispers\u00e9<\/strong> au sujet de la cybers\u00e9curit\u00e9, \u00e0 l\u2019image de l<a href=\"http:\/\/www.lemonde.fr\/idees\/article\/2012\/09\/18\/europe-de-la-defense-mythes-et-realites_1761684_3232.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u2019Europe de la s\u00e9curit\u00e9 ou de la d\u00e9fense<\/a> ?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Au cours du Forum International de la Cybers\u00e9curit\u00e9 (FIC) 2016, G\u00fcnther Oettinger, commissaire europ\u00e9en charg\u00e9 de l\u2019\u00e9conomie et de la soci\u00e9t\u00e9 num\u00e9riques a fait un constat simple : l\u2019\u00e9conomie europ\u00e9enne est profond\u00e9ment interconnect\u00e9e au reste du monde, et ses secteurs&#8230;<\/p>\n","protected":false},"author":1136,"featured_media":8823,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3226],"tags":[2596,2597,2470,1167,2599,2598,3326],"coauthors":[2580],"class_list":["post-8857","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-compliance","tag-cert","tag-csirt","tag-cyberresilience","tag-enisa","tag-fic","tag-nis","tag-sectoral-regulations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L\u2019Europe de la cybers\u00e9curit\u00e9 : peut-on y croire ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L\u2019Europe de la cybers\u00e9curit\u00e9 : peut-on y croire ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Au cours du Forum International de la Cybers\u00e9curit\u00e9 (FIC) 2016, G\u00fcnther Oettinger, commissaire europ\u00e9en charg\u00e9 de l\u2019\u00e9conomie et de la soci\u00e9t\u00e9 num\u00e9riques a fait un constat simple : l\u2019\u00e9conomie europ\u00e9enne est profond\u00e9ment interconnect\u00e9e au reste du monde, et ses secteurs...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-28T12:59:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-03T08:35:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/03\/Fotolia_85564309_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1688\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julien DOUILLARD\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien DOUILLARD\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/\"},\"author\":{\"name\":\"Julien DOUILLARD\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/9a3add82fd84daa83e4a027403207f02\"},\"headline\":\"L\u2019Europe de la cybers\u00e9curit\u00e9 : peut-on y croire ?\",\"datePublished\":\"2016-03-28T12:59:31+00:00\",\"dateModified\":\"2020-01-03T08:35:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/\"},\"wordCount\":1278,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/03\/Fotolia_85564309_Subscription_Monthly_M.jpg\",\"keywords\":[\"CERT\",\"CSIRT\",\"cyberresilience\",\"ENISA\",\"FIC\",\"NIS\",\"sectoral regulations\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/\",\"name\":\"L\u2019Europe de la cybers\u00e9curit\u00e9 : peut-on y croire ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/03\/Fotolia_85564309_Subscription_Monthly_M.jpg\",\"datePublished\":\"2016-03-28T12:59:31+00:00\",\"dateModified\":\"2020-01-03T08:35:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/03\/Fotolia_85564309_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/03\/Fotolia_85564309_Subscription_Monthly_M.jpg\",\"width\":1688,\"height\":1125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u2019Europe de la cybers\u00e9curit\u00e9 : peut-on y croire ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/9a3add82fd84daa83e4a027403207f02\",\"name\":\"Julien DOUILLARD\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/julien-douillard\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L\u2019Europe de la cybers\u00e9curit\u00e9 : peut-on y croire ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/","og_locale":"en_US","og_type":"article","og_title":"L\u2019Europe de la cybers\u00e9curit\u00e9 : peut-on y croire ? - RiskInsight","og_description":"Au cours du Forum International de la Cybers\u00e9curit\u00e9 (FIC) 2016, G\u00fcnther Oettinger, commissaire europ\u00e9en charg\u00e9 de l\u2019\u00e9conomie et de la soci\u00e9t\u00e9 num\u00e9riques a fait un constat simple : l\u2019\u00e9conomie europ\u00e9enne est profond\u00e9ment interconnect\u00e9e au reste du monde, et ses secteurs...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/","og_site_name":"RiskInsight","article_published_time":"2016-03-28T12:59:31+00:00","article_modified_time":"2020-01-03T08:35:04+00:00","og_image":[{"width":1688,"height":1125,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/03\/Fotolia_85564309_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Julien DOUILLARD","twitter_misc":{"Written by":"Julien DOUILLARD","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/"},"author":{"name":"Julien DOUILLARD","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/9a3add82fd84daa83e4a027403207f02"},"headline":"L\u2019Europe de la cybers\u00e9curit\u00e9 : peut-on y croire ?","datePublished":"2016-03-28T12:59:31+00:00","dateModified":"2020-01-03T08:35:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/"},"wordCount":1278,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/03\/Fotolia_85564309_Subscription_Monthly_M.jpg","keywords":["CERT","CSIRT","cyberresilience","ENISA","FIC","NIS","sectoral regulations"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/","url":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/","name":"L\u2019Europe de la cybers\u00e9curit\u00e9 : peut-on y croire ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/03\/Fotolia_85564309_Subscription_Monthly_M.jpg","datePublished":"2016-03-28T12:59:31+00:00","dateModified":"2020-01-03T08:35:04+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/03\/Fotolia_85564309_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/03\/Fotolia_85564309_Subscription_Monthly_M.jpg","width":1688,"height":1125},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/03\/leurope-de-cybersecurite-on-y-croire\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"L\u2019Europe de la cybers\u00e9curit\u00e9 : peut-on y croire ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/9a3add82fd84daa83e4a027403207f02","name":"Julien DOUILLARD","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/julien-douillard\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1136"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8857"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8857\/revisions"}],"predecessor-version":[{"id":12394,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8857\/revisions\/12394"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/8823"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8857"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}