{"id":9112,"date":"2016-07-27T12:52:53","date_gmt":"2016-07-27T11:52:53","guid":{"rendered":"https:\/\/www.solucominsight.fr\/?p=9112"},"modified":"2020-01-02T11:10:47","modified_gmt":"2020-01-02T10:10:47","slug":"directive-nis-confiance-accrue-cyberespace-europeen","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/","title":{"rendered":"Directive NIS : Une confiance accrue dans le cyberespace europ\u00e9en"},"content":{"rendered":"<p><em>Le 6 juillet 2016 \u00e9tait publi\u00e9e la <a href=\"http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=uriserv:OJ.L_.2016.194.01.0001.01.ENG&amp;toc=OJ:L:2016:194:TOC\">directive europ\u00e9enne NIS<\/a> (Network Information Security). Issu d\u2019une r\u00e9flexion commenc\u00e9e en 2013, ce texte ajoute une nouvelle brique au chantier de la s\u00e9curisation du march\u00e9 unique num\u00e9rique europ\u00e9en. Avec le <a href=\"https:\/\/www.solucominsight.fr\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/\">r\u00e8glement eIDAS<\/a>, cette directive vise \u00e0 renforcer la confiance des utilisateurs du cyberespace europ\u00e9en en proposant un cadre et une collaboration renforc\u00e9e entre les pays membres et les institutions europ\u00e9ennes.<\/em><\/p>\n<h1>La directive NIS fixe un cap<\/h1>\n<p>Comme l\u2019indique son nom, la directive NIS n\u2019est ni une loi, ni un r\u00e8glement. Elle donne un objectif \u00e0 atteindre, mais laisse le choix des moyens pour y arriver. Comme pour toute directive, elle doit \u00eatre transpos\u00e9e par chacun des pays membres en lois qui fixeront les moyens pour y arriver. La LPM fran\u00e7aise ou le IT Security Act allemand en sont des exemples. L\u2019ANSSI a r\u00e9cemment annonc\u00e9 \u00eatre <a href=\"https:\/\/twitter.com\/ANSSI_FR\/status\/757577797187596288\">en charge du pilotage de la d\u00e9clinaison en France<\/a>.<\/p>\n<p>Il est possible de diviser les obligations donn\u00e9es par\u00a0la directive en trois cat\u00e9gories\u00a0:<\/p>\n<ul>\n<li><strong>D\u00e9finition d\u2019un mod\u00e8le de gouvernance national\u00a0<\/strong>(articles 5,6,7) : chaque \u00c9tat membre doit adopter une strat\u00e9gie nationale, en d\u00e9finissant des <strong>objectifs et une l\u00e9gislation appropri\u00e9e<\/strong> dans le but d\u2019atteindre un haut niveau de s\u00e9curit\u00e9 national.<br \/>\nPour cela chaque pays doit se doter au moins d\u2019une <strong>autorit\u00e9 comp\u00e9tente, charg\u00e9e de la transposition de la directive en loi<\/strong>. Cette autorit\u00e9 peut \u00eatre unique, comme c\u2019est le cas en France avec l\u2019ANSSI, ou peut \u00eatre divis\u00e9e selon les diff\u00e9rents secteurs essentiels. Les dites-autorit\u00e9s sont invit\u00e9es \u00e0 se rapprocher de l\u2019ENISA (<strong>Agence europ\u00e9enne charg\u00e9e de la s\u00e9curit\u00e9 des r\u00e9seaux et de l&#8217;information<\/strong>) pour obtenir de l\u2019aide.<br \/>\nDe m\u00eame, un <strong>CSIRT<\/strong> (Computer Security Incident Response Team) national doit \u00eatre d\u00e9sign\u00e9. En charge de la gestion d\u2019incident nationaux, il a pour mission d\u2019alerter et de partager sur les risques et les incidents, et de reporter les notifications d\u2019incidents aux entit\u00e9s ad\u00e9quates. Enfin, <strong>un point de contact unique<\/strong> doit \u00eatre d\u00e9sign\u00e9 pour participer \u00e0 la coop\u00e9ration transfrontali\u00e8re sur les objectifs strat\u00e9giques et les moyens mis en place.<\/li>\n<\/ul>\n<ul>\n<li><strong>Mise en place de mesures de s\u00e9curit\u00e9 et de syst\u00e8mes de notification d\u2019incident pour les op\u00e9rateurs de services essentiels <\/strong>(article 14 et 15a)\u00a0: les entit\u00e9s identifi\u00e9es par les pays comme indispensables \u00e0 la p\u00e9rennit\u00e9 d\u2019activit\u00e9s critiques (\u00e9conomiques ou sociales) doivent mettre en place des <strong>mesures pour appr\u00e9hender les risques<\/strong> ainsi que leurs impacts. Ces op\u00e9rateurs ont \u00e9galement l\u2019obligation de <strong>notifier imm\u00e9diatement<\/strong> \u00e0 l\u2019autorit\u00e9 comp\u00e9tente tout incident dont la nature pourrait impacter significativement la continuit\u00e9 du service. La notion d\u2019impact,laiss\u00e9e \u00e0 la libre \u00e9valuation de l\u2019entit\u00e9, d\u00e9pend du nombre d\u2019utilisateurs touch\u00e9s, de la dur\u00e9e de l\u2019incident et de la port\u00e9e g\u00e9ographique.<br \/>\nLa directive impose des actions similaires aux \u00ab\u00a0fournisseurs de services num\u00e9riques\u00a0\u00bb. Ces fournisseurs correspondent aux les places de march\u00e9s en ligne, les moteurs de recherches, les services cloud, \u00e0 l\u2019exception des TPE et des microentreprises (2003\/361\/EC). Leurs obligations sont l\u00e9g\u00e8rement moindres (r\u00e8gles sp\u00e9cifiques au niveau des \u00c9tats et obligation de notifications plus restreintes), comme leurs activit\u00e9s ne nuiront pas directement \u00e0 la vie des personnes, mais plut\u00f4t \u00e0 l\u2019\u00e9conomie.<\/li>\n<\/ul>\n<ul>\n<li><strong>Participation aux initiatives de partage d\u2019information et collaboration\u00a0<\/strong>(article 8) : Lors de la pr\u00e9sentation de la directive, le vice-pr\u00e9sident de la Commission Europ\u00e9enne en charge du March\u00e9 unique num\u00e9rique, Adrus Ansip, et le Commissaire europ\u00e9en \u00e0 l&#8217;\u00c9conomie et \u00e0 la Soci\u00e9t\u00e9 num\u00e9rique, G\u00fcnther H. Oettinger, ont <a href=\"http:\/\/europa.eu\/rapid\/press-release_STATEMENT-16-2424_en.htm\">insist\u00e9 sur la <strong>n\u00e9cessit\u00e9 d\u2019une coop\u00e9ration<\/strong><\/a> entre les institutions publiques europ\u00e9ennes et nationales avec les acteurs priv\u00e9s. Ils ont \u00e9galement rappel\u00e9 <strong>l\u2019importance de la standardisation<\/strong> pour faciliter les \u00e9changes inter-frontaliers. Une r\u00e9ponse \u00e0 ces besoins se traduit par la cr\u00e9ation d\u2019un r\u00e9seau de <strong>CSIRT<\/strong> et d\u2019un <strong>groupe de coop\u00e9ration strat\u00e9gique<\/strong> compos\u00e9 de repr\u00e9sentants des pays membres de la Commission Europ\u00e9enne et de l\u2019ENISA.<\/li>\n<\/ul>\n<h1>La directive NIS en renfort de la LPM<\/h1>\n<p>En France, la directive NIS vient accro\u00eetre la <strong>l\u00e9gitimit\u00e9 de la Loi de programmation militaire<\/strong> dont certains arr\u00eat\u00e9s ont \u00e9t\u00e9 publi\u00e9s le 23 juin dernier.<\/p>\n<p>Plusieurs diff\u00e9rences sont toutefois notables entre le texte europ\u00e9en et la loi fran\u00e7aise, notamment dans la partie concernant les obligations des entreprises.<\/p>\n<ul>\n<li>Alors que la France a identifi\u00e9 12 secteurs d\u2019importance vitale (SIV), la directive NIS n\u2019en reconnait que 6 (\u00e9nergie, transport, banques, distribution et provision d\u2019eau potable, infrastructures financi\u00e8res, sant\u00e9) <strong>auxquels s\u2019ajoutent les fournisseurs de services num\u00e9riques non couverts par la LPM actuelle<\/strong>. Ces fournisseurs ont \u00e9t\u00e9 <a href=\"http:\/\/europa.eu\/rapid\/press-release_MEMO-13-71_fr.htm\">estim\u00e9s\u00a0\u00e0 pr\u00e8s de 1400 pour l&#8217;ensemble du territoire europ\u00e9en<\/a>. De plus, certains secteurs comme l\u2019industrie ne sont pas inclus dans la d\u00e9marche, et ne profiteront pas de l\u2019impulsion donn\u00e9e au sommet de l\u2019Europe.<\/li>\n<li>Au sein d\u2019un m\u00eame secteur, les op\u00e9rateurs concern\u00e9s ne seront pas forc\u00e9ment identiques. En effet, la directive NIS ne consid\u00e8re que ceux dont l\u2019activit\u00e9 d\u00e9pend fondamentalement des r\u00e9seaux et des syst\u00e8mes d\u2019information.<\/li>\n<li>Bien que les obligations pour les entit\u00e9s consid\u00e9r\u00e9es comme sensibles soient similaires, la LPM va un cran plus loin et requi\u00e8re que les organisations identifi\u00e9es dans le secteur d\u2019importance vitale soient audit\u00e9es par des prestataires qualifi\u00e9s, alors que cela n\u2019est pas rendu obligatoire par le texte europ\u00e9en. Chaque pays sera libre d\u2019adapt\u00e9 le texte.<\/li>\n<\/ul>\n<p class=\"Tableau\">En d\u00e9finitive, les op\u00e9rateurs des secteurs d\u2019importance vitale fran\u00e7ais ayant initi\u00e9 un processus de mise en conformit\u00e9 \u00e0 LPM seront globalement en accord avec les objectifs fix\u00e9s par la directive. En revanche, certaines organisations devront mettre en place des mesures pour identifier et r\u00e9duire les risques, en particulier celles du secteur de fournisseurs de services num\u00e9riques car non concern\u00e9es par la LPM.<\/p>\n<h1>21 mois pour s\u2019aligner \u00e0 la directive<\/h1>\n<p>La directive NIS entrera en vigueur 20 jours apr\u00e8s publication au Journal Officiel de l\u2019Union Europ\u00e9enne, c\u2019est-\u00e0-dire en ao\u00fbt 2016. Suite \u00e0 cela, les diff\u00e9rents \u00c9tats membres disposeront <strong>de 21 mois<\/strong> pour transposer cette directive en lois nationales. Une p\u00e9riode de 6 mois suppl\u00e9mentaire sera donn\u00e9e pour identifier les op\u00e9rateurs de services essentiels correspondants aux secteurs identifi\u00e9s.<\/p>\n<p>Afin d\u2019aligner la gouvernance nationale avec le cap fix\u00e9 par la directive NIS<strong>, il restera un certain nombre d\u2019interrogations<\/strong> auxquelles devra r\u00e9pondre chacun des pays de l\u2019UE : Qui va prendre en charge cette transposition ? Combien d\u2019autorit\u00e9s comp\u00e9tentes ou de CSIRT d\u00e9signer \u00e0 l\u2019\u00e9chelle nationale\u00a0? Quels moyens faut-il mettre \u00e0 disposition\u00a0? Est-il n\u00e9cessaire d\u2019\u00e9crire de nouvelles lois ou simplement faire des amendements d\u2019anciennes lois\u00a0?<\/p>\n<p>La directive NIS est un pas important pour obtenir une cybers\u00e9curit\u00e9 unifi\u00e9e \u00e0 l\u2019\u00e9chelle europ\u00e9enne\u00a0et c\u2019est devenu une n\u00e9cessit\u00e9, car les cybercriminels eux, ne connaissent pas les fronti\u00e8res.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le 6 juillet 2016 \u00e9tait publi\u00e9e la directive europ\u00e9enne NIS (Network Information Security). Issu d\u2019une r\u00e9flexion commenc\u00e9e en 2013, ce texte ajoute une nouvelle brique au chantier de la s\u00e9curisation du march\u00e9 unique num\u00e9rique europ\u00e9en. Avec le r\u00e8glement eIDAS, cette&#8230;<\/p>\n","protected":false},"author":300,"featured_media":9114,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3226],"tags":[2597,70,105,78,3326,447],"coauthors":[2545],"class_list":["post-9112","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-compliance","tag-csirt","tag-gestion-des-risques","tag-gouvernance","tag-reglementation","tag-sectoral-regulations","tag-strategie"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Directive NIS : Une confiance accrue dans le cyberespace europ\u00e9en - RiskInsight<\/title>\n<meta name=\"description\" content=\"Le 6 juillet 2016 \u00e9tait publi\u00e9e la directive NIS. Ce texte ajoute une nouvelle brique au chantier de la s\u00e9curisation du march\u00e9 unique num\u00e9rique europ\u00e9en.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Directive NIS : Une confiance accrue dans le cyberespace europ\u00e9en - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Le 6 juillet 2016 \u00e9tait publi\u00e9e la directive NIS. Ce texte ajoute une nouvelle brique au chantier de la s\u00e9curisation du march\u00e9 unique num\u00e9rique europ\u00e9en.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-27T11:52:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T10:10:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/07\/Fotolia_72331203_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1378\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"GEneviEveLardon\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GEneviEveLardon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/\"},\"author\":{\"name\":\"GEneviEveLardon\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6328ecf0d12a69d39d6929b70de77994\"},\"headline\":\"Directive NIS : Une confiance accrue dans le cyberespace europ\u00e9en\",\"datePublished\":\"2016-07-27T11:52:53+00:00\",\"dateModified\":\"2020-01-02T10:10:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/\"},\"wordCount\":1231,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/07\/Fotolia_72331203_Subscription_Monthly_M.jpg\",\"keywords\":[\"CSIRT\",\"Gestion des risques\",\"gouvernance\",\"R\u00e8glementation\",\"sectoral regulations\",\"strat\u00e9gie\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/\",\"name\":\"Directive NIS : Une confiance accrue dans le cyberespace europ\u00e9en - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/07\/Fotolia_72331203_Subscription_Monthly_M.jpg\",\"datePublished\":\"2016-07-27T11:52:53+00:00\",\"dateModified\":\"2020-01-02T10:10:47+00:00\",\"description\":\"Le 6 juillet 2016 \u00e9tait publi\u00e9e la directive NIS. Ce texte ajoute une nouvelle brique au chantier de la s\u00e9curisation du march\u00e9 unique num\u00e9rique europ\u00e9en.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/07\/Fotolia_72331203_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/07\/Fotolia_72331203_Subscription_Monthly_M.jpg\",\"width\":1378,\"height\":1378},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Directive NIS : Une confiance accrue dans le cyberespace europ\u00e9en\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6328ecf0d12a69d39d6929b70de77994\",\"name\":\"GEneviEveLardon\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/genevievelardon-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Directive NIS : Une confiance accrue dans le cyberespace europ\u00e9en - RiskInsight","description":"Le 6 juillet 2016 \u00e9tait publi\u00e9e la directive NIS. Ce texte ajoute une nouvelle brique au chantier de la s\u00e9curisation du march\u00e9 unique num\u00e9rique europ\u00e9en.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/","og_locale":"en_US","og_type":"article","og_title":"Directive NIS : Une confiance accrue dans le cyberespace europ\u00e9en - RiskInsight","og_description":"Le 6 juillet 2016 \u00e9tait publi\u00e9e la directive NIS. Ce texte ajoute une nouvelle brique au chantier de la s\u00e9curisation du march\u00e9 unique num\u00e9rique europ\u00e9en.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/","og_site_name":"RiskInsight","article_published_time":"2016-07-27T11:52:53+00:00","article_modified_time":"2020-01-02T10:10:47+00:00","og_image":[{"width":1378,"height":1378,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/07\/Fotolia_72331203_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"GEneviEveLardon","twitter_misc":{"Written by":"GEneviEveLardon","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/"},"author":{"name":"GEneviEveLardon","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6328ecf0d12a69d39d6929b70de77994"},"headline":"Directive NIS : Une confiance accrue dans le cyberespace europ\u00e9en","datePublished":"2016-07-27T11:52:53+00:00","dateModified":"2020-01-02T10:10:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/"},"wordCount":1231,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/07\/Fotolia_72331203_Subscription_Monthly_M.jpg","keywords":["CSIRT","Gestion des risques","gouvernance","R\u00e8glementation","sectoral regulations","strat\u00e9gie"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/","url":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/","name":"Directive NIS : Une confiance accrue dans le cyberespace europ\u00e9en - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/07\/Fotolia_72331203_Subscription_Monthly_M.jpg","datePublished":"2016-07-27T11:52:53+00:00","dateModified":"2020-01-02T10:10:47+00:00","description":"Le 6 juillet 2016 \u00e9tait publi\u00e9e la directive NIS. Ce texte ajoute une nouvelle brique au chantier de la s\u00e9curisation du march\u00e9 unique num\u00e9rique europ\u00e9en.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/07\/Fotolia_72331203_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/07\/Fotolia_72331203_Subscription_Monthly_M.jpg","width":1378,"height":1378},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/07\/directive-nis-confiance-accrue-cyberespace-europeen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Directive NIS : Une confiance accrue dans le cyberespace europ\u00e9en"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6328ecf0d12a69d39d6929b70de77994","name":"GEneviEveLardon","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/genevievelardon-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/300"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=9112"}],"version-history":[{"count":9,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9112\/revisions"}],"predecessor-version":[{"id":9142,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/9112\/revisions\/9142"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9114"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=9112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=9112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=9112"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=9112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}