{"id":1347,"date":"2024-05-23T16:22:26","date_gmt":"2024-05-23T15:22:26","guid":{"rendered":"https:\/\/trustable.fr\/?p=1347"},"modified":"2024-12-19T17:43:22","modified_gmt":"2024-12-19T16:43:22","slug":"comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable","status":"publish","type":"post","link":"https:\/\/trustable.fr\/en\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/","title":{"rendered":"How to assess the cyber risk of a company with a variable geometry?"},"content":{"rendered":"<p><span data-contrast=\"none\">De nos jours, pour une entreprise, assurer sa s\u00e9curit\u00e9 informatique est devenu un sport collectif o\u00f9 tous ses partenaires et ses fournisseurs doivent mouiller le maillot pour vaincre la cybermenace.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Dans un monde o\u00f9 les fronti\u00e8res num\u00e9riques s&rsquo;estompent entre les diff\u00e9rents acteurs de l\u2019\u00e9conomie, les donn\u00e9es circulent tous les jours et les collaborations avec des tiers se multiplient constamment. Dans ce contexte, le p\u00e9rim\u00e8tre que doit prot\u00e9ger une entreprise n\u2019est plus \u00e0 consid\u00e9rer comme un bloc solide et inerte, mais plut\u00f4t comme un flux s\u2019\u00e9tendant dans diverses directions simultan\u00e9ment.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Assurer la s\u00e9curit\u00e9 d\u2019un syst\u00e8me d\u2019information mouvant sur lequel reposent ses donn\u00e9es et ses services s\u2019av\u00e8re \u00eatre le d\u00e9fi crucial auquel sont confront\u00e9s les Responsables de la s\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information des entreprises d\u2019un nouveau genre, dites \u00e9tendues<\/span><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Entreprise_%C3%A9tendue\"><span data-contrast=\"none\">[1]<\/span><\/a><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">La digitalisation et l\u2019externalisation de tout ou partie des moyens de production, des canaux de vente et bien d\u2019autres organes structurant pour une entreprise, ont profond\u00e9ment chang\u00e9 le profil informatique des organisations. Ce dernier est pass\u00e9 d\u2019un bloc monolithique \u00e0 un patchwork IT constitu\u00e9 d\u2019un bout de syst\u00e8me d\u2019information local, d\u2019une multitude d\u2019environnements Cloud, de syst\u00e8mes mutualis\u00e9s et autres applications fournis par des tiers, faisant ainsi reposer les processus cl\u00e9 de l\u2019entreprise sur des environnements plus ou moins ma\u00eetris\u00e9s par celle-ci.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Chaque entreprise doit consid\u00e9rer son \u00e9cosyst\u00e8me num\u00e9rique dans le cadre de sa strat\u00e9gie de protection. Ainsi, chacun de ses tiers doit \u00eatre consid\u00e9r\u00e9 en fonction de son importance dans sa cha\u00eene de valeur en trois \u00e9tapes :<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Helvetica\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Identifier ses activit\u00e9s m\u00e9tier cl\u00e9 et les donn\u00e9es qui en d\u00e9pendent<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Helvetica\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Identifier les tiers qui sont impliqu\u00e9s dans ses activit\u00e9s cl\u00e9 ou qui disposent de ses informations sensibles<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri,Helvetica\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">\u00c9valuer de mani\u00e8re continue et proportionn\u00e9e le niveau de s\u00e9curit\u00e9 de chacun de ses tiers<\/span><\/li>\n<\/ol>\n<p><strong>1.Identifier ses activit\u00e9s m\u00e9tier cl\u00e9s et les donn\u00e9es qui en d\u00e9pendent\u00a0<\/strong><\/p>\n<p><span data-contrast=\"none\">L\u2019entreprise doit avant tout \u00eatre consciente des activit\u00e9s et des donn\u00e9es qui sont essentielles pour son bon fonctionnement. L\u2019exercice d\u2019inventaire des actifs de l\u2019entreprise est indispensable et syst\u00e9matique. Cela permet d\u2019identifier \u00e0 tout moment si les \u00e9l\u00e9ments qui sont ainsi reconnus comme importants sont correctement prot\u00e9g\u00e9s.<br \/>\n<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><strong>2.Cartographier son \u00e9cosyst\u00e8me\u00a0<\/strong><\/p>\n<p><span data-contrast=\"none\">L\u2019entreprise doit \u00eatre capable de savoir quels sont les tiers qui interviennent sur ses activit\u00e9s cl\u00e9 ou qui disposent de ses donn\u00e9es sensibles. Pour cela, il est recommand\u00e9 de compl\u00e9ter l\u2019analyse d\u2019impact m\u00e9tier par une cartographie des interactions existantes avec des partenaires et des fournisseurs, ce afin d\u2019appr\u00e9cier l\u2019impact que peut repr\u00e9senter la d\u00e9faillance de l\u2019un deux.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">En effet, certains processus cl\u00e9 de l\u2019entreprise peuvent \u00eatre assur\u00e9s par un tiers, ce qui rendrait l\u2019entreprise tributaire de sa fiabilit\u00e9.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>3.\u00c9valuer ses tiers de fa\u00e7on continue et proportionn\u00e9e\u00a0<\/strong><\/p>\n<p><span data-contrast=\"none\">L\u2019entreprise doit \u00eatre en mesure d\u2019avoir une id\u00e9e pr\u00e9cise du niveau de s\u00e9curit\u00e9 de chacun de ses tiers \u00e0 tout moment pour savoir o\u00f9 et quand elle doit mettre en \u0153uvre une solution palliative pour limiter le risque que pourrait repr\u00e9senter la d\u00e9faillance de l\u2019un d\u2019entre eux.\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Pour que cette approche soit \u00e9conomiquement viable, l&rsquo;automatisation est essentielle. Une \u00e9valuation continue et adapt\u00e9e \u00e0 la criticit\u00e9 de chacun des tiers doit \u00eatre mise en place, s&rsquo;appuyant sur des donn\u00e9es actualis\u00e9es en temps r\u00e9el pour refl\u00e9ter au mieux la r\u00e9alit\u00e9 du terrain.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Traditionnellement, le risque cyber est \u00e9valu\u00e9 de mani\u00e8re ponctuelle, au mieux une fois par an ; cela ne suffit plus dans un environnement o\u00f9 les menaces \u00e9voluent chaque jour. Le v\u00e9ritable enjeu est de passer \u00e0 une \u00e9valuation dynamique et continue, o\u00f9 chaque mouvement des acteurs de l\u2019\u00e9cosyst\u00e8me de l\u2019entreprise est observ\u00e9 et analys\u00e9 pour anticiper les attaques.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">En conclusion, la s\u00e9curit\u00e9 des entreprises ne d\u00e9pend plus uniquement de leurs propres d\u00e9fenses, mais aussi de celles de leurs partenaires. C\u2019est le collectif qui doit gagner\u202f! Et pour cela, adopter une approche dynamique et collaborative est indispensable. Cette d\u00e9marche doit pouvoir s\u2019appuyer sur des outils adapt\u00e9s pour relever ce d\u00e9fi et assurer la protection de nos entreprises dans un monde num\u00e9rique en constante \u00e9volution.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>De nos jours, pour une entreprise, assurer sa s\u00e9curit\u00e9 informatique est devenu un sport collectif o\u00f9 tous ses partenaires et ses fournisseurs doivent mouiller le maillot pour vaincre la cybermenace.\u00a0 Dans un monde o\u00f9 les fronti\u00e8res num\u00e9riques s&rsquo;estompent entre les diff\u00e9rents acteurs de l\u2019\u00e9conomie, les donn\u00e9es circulent tous les jours et les collaborations avec des [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-1347","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tribunes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable ? - Trustable<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les derni\u00e8res tendances, analyses et expertises en cybers\u00e9curit\u00e9 sur le blog de Trustable. Restez inform\u00e9 des enjeux et des bonnes pratiques pour prot\u00e9ger votre entreprise contre les cybermenaces. \ud83d\ude80\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustable.fr\/en\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable ? - Trustable\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les derni\u00e8res tendances, analyses et expertises en cybers\u00e9curit\u00e9 sur le blog de Trustable. Restez inform\u00e9 des enjeux et des bonnes pratiques pour prot\u00e9ger votre entreprise contre les cybermenaces. \ud83d\ude80\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustable.fr\/en\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustable\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-23T15:22:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-19T16:43:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustable.fr\/wp-content\/uploads\/2024\/12\/Comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Trustable\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Trustable\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/\"},\"author\":{\"name\":\"Trustable\",\"@id\":\"https:\\\/\\\/trustable.fr\\\/#\\\/schema\\\/person\\\/6eedd4bacea503a9e024aaee119ef7ff\"},\"headline\":\"Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable ?\",\"datePublished\":\"2024-05-23T15:22:26+00:00\",\"dateModified\":\"2024-12-19T16:43:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/\"},\"wordCount\":775,\"publisher\":{\"@id\":\"https:\\\/\\\/trustable.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trustable.fr\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable-.jpg\",\"articleSection\":[\"Tribunes\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/\",\"url\":\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/\",\"name\":\"Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable ? - Trustable\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/trustable.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trustable.fr\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable-.jpg\",\"datePublished\":\"2024-05-23T15:22:26+00:00\",\"dateModified\":\"2024-12-19T16:43:22+00:00\",\"description\":\"D\u00e9couvrez les derni\u00e8res tendances, analyses et expertises en cybers\u00e9curit\u00e9 sur le blog de Trustable. Restez inform\u00e9 des enjeux et des bonnes pratiques pour prot\u00e9ger votre entreprise contre les cybermenaces. \ud83d\ude80\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/#primaryimage\",\"url\":\"https:\\\/\\\/trustable.fr\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable-.jpg\",\"contentUrl\":\"https:\\\/\\\/trustable.fr\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable-.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/trustable.fr\\\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/trustable.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/trustable.fr\\\/#website\",\"url\":\"https:\\\/\\\/trustable.fr\\\/\",\"name\":\"Trustable\",\"description\":\"Ma\u00eetrisez vos Risques Cyber et Conformit\u00e9 SWIFT\",\"publisher\":{\"@id\":\"https:\\\/\\\/trustable.fr\\\/#organization\"},\"alternateName\":\"Trustable\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/trustable.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/trustable.fr\\\/#organization\",\"name\":\"Trustable\",\"alternateName\":\"Trustable\",\"url\":\"https:\\\/\\\/trustable.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/trustable.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/trustable.fr\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/logo-trustable.png\",\"contentUrl\":\"https:\\\/\\\/trustable.fr\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/logo-trustable.png\",\"width\":340,\"height\":100,\"caption\":\"Trustable\"},\"image\":{\"@id\":\"https:\\\/\\\/trustable.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/trustable-cyber-expedition\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/trustable.fr\\\/#\\\/schema\\\/person\\\/6eedd4bacea503a9e024aaee119ef7ff\",\"name\":\"Trustable\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f44b0ec7e7e11d9a3de40703fd8bb62b78e27d89b49a36798d1973b04c863e3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f44b0ec7e7e11d9a3de40703fd8bb62b78e27d89b49a36798d1973b04c863e3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f44b0ec7e7e11d9a3de40703fd8bb62b78e27d89b49a36798d1973b04c863e3d?s=96&d=mm&r=g\",\"caption\":\"Trustable\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable ? - Trustable","description":"D\u00e9couvrez les derni\u00e8res tendances, analyses et expertises en cybers\u00e9curit\u00e9 sur le blog de Trustable. Restez inform\u00e9 des enjeux et des bonnes pratiques pour prot\u00e9ger votre entreprise contre les cybermenaces. \ud83d\ude80","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustable.fr\/en\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/","og_locale":"en_GB","og_type":"article","og_title":"Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable ? - Trustable","og_description":"D\u00e9couvrez les derni\u00e8res tendances, analyses et expertises en cybers\u00e9curit\u00e9 sur le blog de Trustable. Restez inform\u00e9 des enjeux et des bonnes pratiques pour prot\u00e9ger votre entreprise contre les cybermenaces. \ud83d\ude80","og_url":"https:\/\/trustable.fr\/en\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/","og_site_name":"Trustable","article_published_time":"2024-05-23T15:22:26+00:00","article_modified_time":"2024-12-19T16:43:22+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/trustable.fr\/wp-content\/uploads\/2024\/12\/Comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable-.jpg","type":"image\/jpeg"}],"author":"Trustable","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Trustable","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/#article","isPartOf":{"@id":"https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/"},"author":{"name":"Trustable","@id":"https:\/\/trustable.fr\/#\/schema\/person\/6eedd4bacea503a9e024aaee119ef7ff"},"headline":"Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable ?","datePublished":"2024-05-23T15:22:26+00:00","dateModified":"2024-12-19T16:43:22+00:00","mainEntityOfPage":{"@id":"https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/"},"wordCount":775,"publisher":{"@id":"https:\/\/trustable.fr\/#organization"},"image":{"@id":"https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/#primaryimage"},"thumbnailUrl":"https:\/\/trustable.fr\/wp-content\/uploads\/2024\/12\/Comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable-.jpg","articleSection":["Tribunes"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/","url":"https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/","name":"Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable ? - Trustable","isPartOf":{"@id":"https:\/\/trustable.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/#primaryimage"},"image":{"@id":"https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/#primaryimage"},"thumbnailUrl":"https:\/\/trustable.fr\/wp-content\/uploads\/2024\/12\/Comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable-.jpg","datePublished":"2024-05-23T15:22:26+00:00","dateModified":"2024-12-19T16:43:22+00:00","description":"D\u00e9couvrez les derni\u00e8res tendances, analyses et expertises en cybers\u00e9curit\u00e9 sur le blog de Trustable. Restez inform\u00e9 des enjeux et des bonnes pratiques pour prot\u00e9ger votre entreprise contre les cybermenaces. \ud83d\ude80","breadcrumb":{"@id":"https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/#primaryimage","url":"https:\/\/trustable.fr\/wp-content\/uploads\/2024\/12\/Comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable-.jpg","contentUrl":"https:\/\/trustable.fr\/wp-content\/uploads\/2024\/12\/Comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable-.jpg","width":1920,"height":1080,"caption":"Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable"},{"@type":"BreadcrumbList","@id":"https:\/\/trustable.fr\/comment-evaluer-le-risque-cyber-dune-entreprise-a-geometrie-variable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/trustable.fr\/"},{"@type":"ListItem","position":2,"name":"Comment \u00e9valuer le risque cyber d\u2019une entreprise \u00e0 g\u00e9om\u00e9trie variable ?"}]},{"@type":"WebSite","@id":"https:\/\/trustable.fr\/#website","url":"https:\/\/trustable.fr\/","name":"Trustable","description":"Ma\u00eetrisez vos Risques Cyber et Conformit\u00e9 SWIFT","publisher":{"@id":"https:\/\/trustable.fr\/#organization"},"alternateName":"Trustable","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustable.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustable.fr\/#organization","name":"Trustable","alternateName":"Trustable","url":"https:\/\/trustable.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustable.fr\/#\/schema\/logo\/image\/","url":"https:\/\/trustable.fr\/wp-content\/uploads\/2024\/12\/logo-trustable.png","contentUrl":"https:\/\/trustable.fr\/wp-content\/uploads\/2024\/12\/logo-trustable.png","width":340,"height":100,"caption":"Trustable"},"image":{"@id":"https:\/\/trustable.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/trustable-cyber-expedition\/"]},{"@type":"Person","@id":"https:\/\/trustable.fr\/#\/schema\/person\/6eedd4bacea503a9e024aaee119ef7ff","name":"Trustable","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f44b0ec7e7e11d9a3de40703fd8bb62b78e27d89b49a36798d1973b04c863e3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f44b0ec7e7e11d9a3de40703fd8bb62b78e27d89b49a36798d1973b04c863e3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f44b0ec7e7e11d9a3de40703fd8bb62b78e27d89b49a36798d1973b04c863e3d?s=96&d=mm&r=g","caption":"Trustable"}}]}},"_links":{"self":[{"href":"https:\/\/trustable.fr\/en\/wp-json\/wp\/v2\/posts\/1347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustable.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustable.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustable.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/trustable.fr\/en\/wp-json\/wp\/v2\/comments?post=1347"}],"version-history":[{"count":6,"href":"https:\/\/trustable.fr\/en\/wp-json\/wp\/v2\/posts\/1347\/revisions"}],"predecessor-version":[{"id":1534,"href":"https:\/\/trustable.fr\/en\/wp-json\/wp\/v2\/posts\/1347\/revisions\/1534"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustable.fr\/en\/wp-json\/wp\/v2\/media\/1531"}],"wp:attachment":[{"href":"https:\/\/trustable.fr\/en\/wp-json\/wp\/v2\/media?parent=1347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustable.fr\/en\/wp-json\/wp\/v2\/categories?post=1347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustable.fr\/en\/wp-json\/wp\/v2\/tags?post=1347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}