


{"id":5510,"date":"2023-11-17T17:58:28","date_gmt":"2023-11-17T16:58:28","guid":{"rendered":"https:\/\/www.editions-eni.fr\/blog\/?p=5510"},"modified":"2023-12-29T16:25:13","modified_gmt":"2023-12-29T15:25:13","slug":"la-cybersecurite-de-lindispensable-au-superflu","status":"publish","type":"post","link":"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/","title":{"rendered":"La cybers\u00e9curit\u00e9\u00a0: de l\u2019indispensable au superflu"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-29px|auto||auto||&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; min_height=&#8221;178.8px&#8221; custom_margin=&#8221;-21px||13px|||&#8221; custom_padding=&#8221;||0px|||&#8221;]<\/p>\n<p><em><strong>Replay du webinaire ENI TALKS \u00ab La cybers\u00e9curit\u00e9 : de l\u2019indispensable au superflu \u00bb.<\/strong><\/em><\/p>\n<p><strong>\ud83d\udee1\ufe0f<\/strong><span><strong>Cyberscore<\/strong><\/span><strong>, charte nationale\u2026 \u00e7a y est, cette fois la cybers\u00e9curit\u00e9 devient un enjeu national majeur\u00a0! Mais derri\u00e8re la volont\u00e9 affich\u00e9e, comment mettre en pratique au niveau des TPE, PME ou encore administrations\u00a0? Car, \u00e9videmment, au regard des moyens, les solutions ne peuvent pas \u00eatre les m\u00eames pour tous. <\/strong><\/p>\n<p><strong>Alors comment optimiser sa cybers\u00e9curit\u00e9\u00a0? Quelles sont les actions et m\u00e9thodes indispensables\u00a0? De quoi peut-on se passer\u00a0? Quels types de menaces anticiper et avec quels m\u00e9canismes\u00a0? Au c\u0153ur de l\u2019actualit\u00e9, la cybers\u00e9curit\u00e9 \u00e9tait aussi au c\u0153ur de notre tout premier ENI TALKS diffus\u00e9 mardi 14 novembre.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>Le Groupe ENI (<b><a href=\"https:\/\/www.editions-eni.fr\/\" data-attribute-index=\"0\" data-entity-type=\"MINI_COMPANY\" target=\"_blank\" rel=\"noopener\">Editions ENI<\/a><\/b>,\u00a0<b><a href=\"https:\/\/www.eni-service.fr\/\" data-attribute-index=\"2\" data-entity-type=\"MINI_COMPANY\" target=\"_blank\" rel=\"noopener\">ENI Service &#8211; Centre de Formation<\/a><\/b>,\u00a0<b><a href=\"https:\/\/www.eni-ecole.fr\/\" data-attribute-index=\"4\" data-entity-type=\"MINI_COMPANY\" target=\"_blank\" rel=\"noopener\">ENI Ecole Informatique<\/a><\/b>,\u00a0<b><a href=\"https:\/\/www.eni-elearning.com\/fr\/\" data-attribute-index=\"6\" data-entity-type=\"MINI_COMPANY\" target=\"_blank\" rel=\"noopener\">ENI elearning<\/a><\/b>) lan\u00e7ait ce 14 novembre les ENI Talks, des webinaires anim\u00e9s par des experts et expertes pour \u00e9clairer diverses th\u00e9matiques li\u00e9es \u00e0 l&#8217;informatique et \u00e0 la vie professionnelle de celles et ceux qui \u00e9voluent dans ce secteur dynamique\u00a0! Une occasion de d\u00e9couvrir \u00e9galement les parcours, formations, carri\u00e8res et comp\u00e9tences essentielles aux m\u00e9tiers du num\u00e9rique.<\/p>\n<p>Intitul\u00e9 \u00ab La cybers\u00e9curit\u00e9 : de l&#8217;indispensable au superflu \u00bb, ce premier \u00e9pisode en streaming r\u00e9unissait autour de Olivier Piers, Directeur p\u00e9dagogique de ENI Ecole Informatique, et ancien DSI exp\u00e9riment\u00e9 :<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Lucie POIRAUD\u00a0: RSSI de Groupe Atlantic<\/li>\n<li><a href=\"https:\/\/www.editions-eni.fr\/sebastien-deon\" target=\"_blank\" rel=\"noopener\">S\u00e9bastien DEON<\/a>\u00a0: DSI CIO &#8211; Conseil D\u00e9partemental de Meurthe-et-Moselle \/ Auteur<\/li>\n<li><a href=\"https:\/\/www.editions-eni.fr\/damien-bancal\" target=\"_blank\" rel=\"noopener\">Damien <\/a><a href=\"https:\/\/www.editions-eni.fr\/damien-bancal\" target=\"_blank\" rel=\"noopener\">Bancal<\/a><a href=\"https:\/\/www.editions-eni.fr\/damien-bancal\" target=\"_blank\" rel=\"noopener\"><\/a>, fondateur de <a href=\"https:\/\/www.zataz.com\/\" target=\"_blank\" rel=\"noopener\">Zataz<\/a> \/ Cyber intelligence \/ Auteur<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_video src=&#8221;https:\/\/youtu.be\/ziFaD6UCIvM&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;18px|||||&#8221;][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><strong>La cybers\u00e9curit\u00e9 au c\u0153ur de l\u2019actualit\u00e9 et des pr\u00e9occupations<\/strong><\/h2>\n<p>Apr\u00e8s \u00eatre revenu sur la notion de cybers\u00e9curit\u00e9 au sens large, notre plateau a \u00e9chang\u00e9 sur les questions que tout chef d\u2019entreprise devrait se poser en mati\u00e8re de cybers\u00e9curit\u00e9, de la petite entreprise \u00e0 la multinationale. <\/p>\n<p>La place des donn\u00e9es et leur nature, standard ou sensible, ainsi que le p\u00e9rim\u00e8tre et les \u00e9quipements font l\u2019objet d\u2019une attention particuli\u00e8re. Nos experts ont \u00e9galement soulign\u00e9 les cons\u00e9quences que peuvent avoir une cyberattaque sur une entreprise ou une administration.<\/p>\n<h2 style=\"text-align: center;\"><strong>Cybers\u00e9curit\u00e9 : l\u2019indispensable<\/strong><\/h2>\n<p>Face aux ransomwares et autres techniques de phishing, que doivent absolument prioriser les entreprises ?<\/p>\n<p>Nos experts se sont tous accord\u00e9s sur la n\u00e9cessit\u00e9 de faire des \u00e9tats des lieux de toute la situation et des exercices, accompagn\u00e9s par des experts.<\/p>\n<p>S\u00e9curiser le SI, mettre en place un SOC (centre de s\u00e9curit\u00e9 op\u00e9rationnel), d\u00e9ployer un EDR, voire embaucher un RSSI font partie des premi\u00e8res pierres tout comme la sensibilisation et l\u2019information aupr\u00e8s des collaborateurs. Durant cette partie, nos intervenants ont \u00e9galement d\u00e9crit ce qu\u2019ils consid\u00e8rent comme les premi\u00e8res actions \u00e0 faire dans toute entreprise.<\/p>\n<h2 style=\"text-align: center;\">Cybers\u00e9curit\u00e9 : le superflu<\/strong><\/h2>\n<p>Vouloir en faire trop peut \u00eatre contre-productif. Il faut que le budget et les syst\u00e8mes soient en ad\u00e9quation avec l\u2019environnement. C\u2019est la diff\u00e9rence entre efficience et efficacit\u00e9.<\/p>\n<p>Chaque pas en avant est une petite victoire, il ne faut donc pas complexifier, se noyer. Mais finalement, peu de choses sont superflues ! Sauvegardes, mises \u00e0 jour des \u00e9quipements et logiciels, SaaS, r\u00e9partition des risques sont in\u00e9vitables \u2026<\/p>\n<h2 style=\"text-align: center;\"><strong>Bonnes pratiques en mati\u00e8re de cybers\u00e9curit\u00e9<\/strong><\/h2>\n<p>Ne pas sous-traiter \u00e0 des sp\u00e9cialistes n\u2019est \u00e9galement pas un bon calcul dans la plupart des cas o\u00f9 il faut s\u00e9curiser un SI ou des donn\u00e9es, m\u00eame s\u2019il faut aussi des sp\u00e9cialistes en interne. Bien \u00e9videmment, le budget reste le facteur d\u00e9terminant. Il se d\u00e9bloque malheureusement parfois apr\u00e8s une attaque \u2026 D\u2019o\u00f9 l\u2019importance des prescripteurs et de bien conna\u00eetre la Loi (NIS 2\u2026). <\/p>\n<p>Nos experts ont \u00e9galement r\u00e9pondu aux questions des spectateurs avec par exemple leur \u00e9clairage sur les solutions Cloud des GAFAM, l\u2019impact de l\u2019IA dans la cybers\u00e9curit\u00e9 ou encore le compte num\u00e9rique individuel europ\u00e9en ![\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;150px&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong><span>Pour continuer sur la th\u00e9matique de la cybers\u00e9curit\u00e9\u00a0:<\/span><\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]\u27a1\ufe0f <strong>Explorez les formations propos\u00e9es par ENI \u00c9cole Informatique pour vous amener vers une carri\u00e8re \u00e9panouissante en cybers\u00e9curit\u00e9&nbsp;:<\/strong><\/p>\n<ul>\n<li>\u00a0BAC+3 Administrateur Syst\u00e8me DevOps<\/li>\n<li>BAC+4 Administrateur Syst\u00e8me et R\u00e9seau<\/li>\n<li>BAC+5 Expert en S\u00e9curit\u00e9 Digitale<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;20px&#8221; width=&#8221;58%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;30px||30px||false|false&#8221; box_shadow_style=&#8221;preset2&#8243;]<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.eni-ecole.fr\/formations\/formations-eni\/\" target=\"_blank\" rel=\"noopener\"><strong>En savoir plus sur nos programmes de formations<\/strong><\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;150px&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<strong>\u27a1\ufe0f Retrouvez \u00e9galement nos ouvrages consacr\u00e9s \u00e0 la cybers\u00e9curit\u00e9 aux Editions ENI&nbsp;:<\/strong><\/p>\n<p>&#8211; &#8220;Cyber-r\u00e9silience en entreprise &#8211; Enjeux, r\u00e9f\u00e9rentiels et bonnes pratiques&#8221;<\/p>\n<p>&#8211; &#8220;S\u00e9curit\u00e9 informatique et Malwares &#8211; Coffret de 2 livres<\/p>\n<p>&#8211; &#8220;S\u00e9curit\u00e9 informatique &#8211; Ethical Hacking[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;20px&#8221; width=&#8221;67%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;30px||30px||false|false&#8221; box_shadow_style=&#8221;preset2&#8243;]<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.editions-eni.fr\/systeme-et-reseau\/securite-informatique\" target=\"_blank\" rel=\"noopener\"><strong>D\u00e9couvrir tous les ouvrages en s\u00e9curit\u00e9 informatique <\/strong><\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;150px&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]\u27a1\ufe0f <strong>Formez-vous en quelques jours, en pr\u00e9sentiel ou \u00e0 distance, avec ENI Service &#8211; Centre de formation informatique&nbsp;:<\/strong><\/p>\n<ul>\n<li>Ethical Hacking : Apprendre l\u2019attaque pour mieux se d\u00e9fendre<\/li>\n<li>Cybers\u00e9curit\u00e9 : Menaces, risques et architectures<\/li>\n<li>Cybers\u00e9curit\u00e9 des syst\u00e8mes industriels<\/li>\n<li>Introduction aux enjeux de s\u00e9curit\u00e9<\/li>\n<li>S\u00e9curit\u00e9 des r\u00e9seaux TCP\/IP<\/li>\n<li>Sondes IDS et honeypots<\/li>\n<li>Microsoft S\u00e9curit\u00e9<\/li>\n<li>ISO et EBIOS<\/li>\n<\/ul>\n<p>\u2026 et plus encore ![\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;20px&#8221; width=&#8221;58%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;30px||30px||false|false&#8221; box_shadow_style=&#8221;preset2&#8243;]<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.eni-service.fr\/categorie\/formation\/cybersecurite\/\" target=\"_blank\" rel=\"noopener\"><strong>Pour plus d&#8217;infos, consultez le site internet <\/strong><\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;6px|||||&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243;]<\/p>\n<h2>Nos <span style=\"color: #3bb6d5;\">experts<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#3BB6D5&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.9.0&#8243; max_width=&#8221;90px&#8221; max_width_tablet=&#8221;13%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_testimonial author=&#8221;Lucie Poiraud&#8221; job_title=&#8221;RSSI groupe Atlantic&#8221; portrait_url=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/Lucie_poiraud.jpeg&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221;]<\/p>\n<p><b>Lucie Poiraud\u00a0<\/b><span>est Responsable de la S\u00e9curit\u00e9 des Syst\u00e8mes d&#8217;Information du Groupe Atlantic, o\u00f9 elle avait \u00e9t\u00e9 auparavant alternante.\u00a0<\/span><span>Elle a obtenu un<\/span> Bac +4 Administratrice Syst\u00e8me &amp; R\u00e9seau (ASR) ainsi qu&#8217;un BAC+5 Experte en S\u00e9curit\u00e9 Digitale (<span>ESD) \u00e0 l&#8217;\u00e9cole ENI.<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_testimonial author=&#8221;S\u00e9bastien D\u00e9on&#8221; job_title=&#8221;Notre experte Cybers\u00e9curit\u00e9&#8221; portrait_url=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/Sebastien-Deon-1.png&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221;]<\/p>\n<p><strong>S\u00e9bastien DEON<\/strong><span>\u00a0est Directeur des Syst\u00e8mes d\u2019Information au sein du Conseil D\u00e9partemental de Meurthe-et-Moselle. Expert dans les domaines de la gouvernance et de la strat\u00e9gie\u00a0des syst\u00e8mes d&#8217;information, de la cybers\u00e9curit\u00e9, de l\u2019H\u00e9bergement de Donn\u00e9es de Sant\u00e9 (HDS) et de la conception de produits et services IT critiques et sensibles depuis plus de 30 ans, il travaille r\u00e9guli\u00e8rement sur des projets li\u00e9s \u00e0 ces domaines (architectures de cloud computing priv\u00e9 et public Iaas\/Paas\/SaaS, cybers\u00e9curit\u00e9, ISO 27k, \u00e9change et partage de donn\u00e9es en environnement hybride, cartographie de SI, urbanisation, sauvegarde externalis\u00e9e, PCA\/PRA&#8230;) ainsi que sur des th\u00e9matiques d&#8217;actualit\u00e9 comme la gouvernance de la donn\u00e9e, le num\u00e9rique responsable et l&#8217;intelligence artificielle g\u00e9n\u00e9rative. Il a notamment con\u00e7u et mis en \u0153uvre des infrastructures s\u00e9curis\u00e9es de FAI pour plusieurs milliers de clients, des plateformes HDS et de messageries s\u00e9curis\u00e9es. \u00c9galement chroniqueur, il est auteur de plusieurs livres et vid\u00e9os publi\u00e9s aux \u00c9ditions ENI.<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_testimonial author=&#8221;Damien Bancal&#8221; job_title=&#8221;Notre expert Cybers\u00e9curit\u00e9&#8221; portrait_url=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/Damien-BANCAL-2.png&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221;]<\/p>\n<p><span>Journaliste sp\u00e9cialiste des questions de cybers\u00e9curit\u00e9 depuis 1989, <strong>Damien Bancal<\/strong> Fondateur du blog de r\u00e9f\u00e9rence internationale Zataz.com. Intervenant de la licence CDAISI de l&#8217;universit\u00e9 de Valenciennes et pour l&#8217;\u00c9cole Europ\u00e9enne d&#8217;Intelligence \u00c9conomique. Commandant de r\u00e9serve de la Gendarmerie Nationale &#8211; Groupe Cyberd\u00e9fense. Chroniqueur pour la cha\u00eene r\u00e9gionale WEO et BsmartTv.<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;][et_pb_row _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243;]<\/p>\n<h2>Vous souhaitez aller <span style=\"color: #3bb6d5;\">plus loin ?<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#3BB6D5&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.9.0&#8243; max_width=&#8221;90px&#8221; max_width_tablet=&#8221;13%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/cyber-resilience-en-entreprise-enjeux-referentiels-et-bonnes-pratiques-2e-edition-9782409041440_XL.jpg&#8221; alt=&#8221;Livre Passez au DevOps Votre nouvelle fa\u00e7on de travailler&#8221; title_text=&#8221;Livre Passez au DevOps Votre nouvelle fa\u00e7on de travailler&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/cyber-resilience-en-entreprise-enjeux-referentiels-et-bonnes-pratiques-2e-edition-9782409041440&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]Livre[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/livre\/apache-spark-developpez-en-python-pour-le-big-data-9782409033780?utm_source=sendinblue&#038;utm_campaign=2022-03-GROUPE-Webinaire-Machine-Learning&#038;utm_medium=email&#8221;]<strong>Cyber-r\u00e9silience en entreprise<\/strong><br \/>\nEnjeux, r\u00e9f\u00e9rentiels et bonnes pratiques[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/securite-informatique-ethical-hacking-apprendre-l-attaque-pour-mieux-se-defendre-6e-edition-9782409033667_XL.jpg&#8221; alt=&#8221;Livre DevOps Int\u00e9grez et d\u00e9ployez en continu&#8221; title_text=&#8221;devops-integrez-et-deployez-en-continu-avec-exemple-cles-en-main-9782409017155_XL&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/securite-informatique-ethical-hacking-apprendre-l-attaque-pour-mieux-se-defendre-6e-edition-9782409033667&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]Livre[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/livre\/gradient-boosting-exploitez-les-arbres-de-decision-pour-le-machine-learning-xgboost-catboost-lightgbm-9782409034022&#8243;]<strong>S\u00e9curit\u00e9 informatique<\/strong><br \/>\nEthical Hacking : Apprendre l&#8217;attaque pour mieux se d\u00e9fendre[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/devsecops-developpez-et-administrez-vos-services-en-toute-securite-9782409039188_XL.jpg&#8221; alt=&#8221;Vid\u00e9o Comprendre et mettre en \u0153uvre la culture DevOps&#8221; title_text=&#8221;comprendre-et-mettre-en-uvre-la-culture-devops-vt2devops_XL&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/devsecops-developpez-et-administrez-vos-services-en-toute-securite-9782409039188&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Livre<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/video\/machine-learning-concepts-et-enjeux-vt2ml&#8221;]<strong>DevSecOps<\/strong><br \/>\nD\u00e9veloppez et administrez vos services en toute s\u00e9curit\u00e9[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/cybersecurite-et-malwares-detection-analyse-et-threat-intelligence-4e-edition-9782409038105_XL.jpg&#8221; alt=&#8221;Scrum Master Coffret de 2 livres : Ma\u00eetrisez vos missions dans une organisation agile Scrum&#8221; title_text=&#8221;scrum-master-coffret-de-2-livres-maitrisez-vos-missions-dans-une-organisation-agile-scrum-9782409032936_XL&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/cybersecurite-et-malwares-detection-analyse-et-threat-intelligence-4e-edition-9782409038105&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221;]<\/p>\n<p>Livre<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/video\/machine-learning-concepts-et-enjeux-vt2ml&#8221;]<strong>Cybers\u00e9curit\u00e9 et Malwares<\/strong><br \/>\nD\u00e9tection, analyse et Threat Intelligence[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||50px||false|false&#8221; locked=&#8221;off&#8221;][et_pb_row _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#7ebec5&#8243; custom_margin=&#8221;40px||||false|false&#8221; custom_padding=&#8221;20px||0px|20px|false|false&#8221; border_radii=&#8221;off|20px|20px||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243;]<\/p>\n<h3><span style=\"color: #333333; font-weight:normal,\">POUR LES ENTREPRISES<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243;]<\/p>\n<h4><span style=\"color: #666666; font-weight: normal;\">D\u00e9couvrez nos solutions de formation pour vos \u00e9quipes et apprenants :<\/span><\/h4>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#7ebec5&#8243; custom_padding=&#8221;|30px|30px|30px|false|false&#8221; border_radii=&#8221;off|||20px|20px&#8221; border_color_all=&#8221;#3BB6D5&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#3BB6D5&#8243;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/reflechir.jpg&#8221; alt=&#8221;R\u00e9fl\u00e9chir en amont&#8221; title_text=&#8221;reflechir&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset1&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/10\/iconeElearning.png&#8221; alt=&#8221;elearning&#8221; title_text=&#8221;iconeElearning&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||||false|false&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h4 style=\"text-align: center;\"><span style=\"color: #ffffff;\">En e-learning avec notre offre pour les professionnels<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-elearning.com\/fr\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;En savoir plus&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#EEEEEE&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/10\/iconeFormateur.png&#8221; alt=&#8221;formateur&#8221; title_text=&#8221;iconeFormateur&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||||false|false&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h4 style=\"text-align: center;\"><span style=\"color: #ffffff;\">Avec un formateur, en pr\u00e9sentiel ou \u00e0 distance<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-service.fr\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;En savoir plus&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Replay du webinaire ENI TALKS \u00ab La cybers\u00e9curit\u00e9 : de l\u2019indispensable au superflu \u00bb. \ud83d\udee1\ufe0fCyberscore, charte nationale\u2026 \u00e7a y est, cette fois la cybers\u00e9curit\u00e9 devient un enjeu national majeur\u00a0! Mais derri\u00e8re la volont\u00e9 affich\u00e9e, comment mettre en pratique au niveau des TPE, PME ou encore administrations\u00a0? Car, \u00e9videmment, au regard des moyens, les solutions ne [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":5511,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[18,5,3,14],"tags":[],"genre":[33,36,38,40],"class_list":["post-5510","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-d-experts","category-securite-informatique","category-systemes-et-reseaux","category-webinaires","genre-parole-dexpert","genre-securite-informatique","genre-systemes-et-reseaux","genre-webinaire"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>La cybers\u00e9curit\u00e9\u00a0: de l\u2019indispensable au superflu - Eni Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La cybers\u00e9curit\u00e9\u00a0: de l\u2019indispensable au superflu - Eni Blog\" \/>\n<meta property=\"og:description\" content=\"Replay du webinaire ENI TALKS \u00ab La cybers\u00e9curit\u00e9 : de l\u2019indispensable au superflu \u00bb. \ud83d\udee1\ufe0fCyberscore, charte nationale\u2026 \u00e7a y est, cette fois la cybers\u00e9curit\u00e9 devient un enjeu national majeur\u00a0! Mais derri\u00e8re la volont\u00e9 affich\u00e9e, comment mettre en pratique au niveau des TPE, PME ou encore administrations\u00a0? Car, \u00e9videmment, au regard des moyens, les solutions ne [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/\" \/>\n<meta property=\"og:site_name\" content=\"Eni Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-17T16:58:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-29T15:25:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/Banniere_BlogService_1920x680.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Denis Poillerat\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Denis Poillerat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/\",\"name\":\"La cybers\u00e9curit\u00e9\u00a0: de l\u2019indispensable au superflu - Eni Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/Banniere_BlogService_1920x680.jpg\",\"datePublished\":\"2023-11-17T16:58:28+00:00\",\"dateModified\":\"2023-12-29T15:25:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/#primaryimage\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/Banniere_BlogService_1920x680.jpg\",\"contentUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/Banniere_BlogService_1920x680.jpg\",\"width\":1920,\"height\":680,\"caption\":\"Illustration webinaire Cybers\u00e9curit\u00e9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editions-eni.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La cybers\u00e9curit\u00e9\u00a0: de l\u2019indispensable au superflu\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/\",\"name\":\"Eni Blog\",\"description\":\"Blog des Editions ENI\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6\",\"name\":\"Denis Poillerat\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/author\/dpoillerat\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La cybers\u00e9curit\u00e9\u00a0: de l\u2019indispensable au superflu - Eni Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/","og_locale":"fr_FR","og_type":"article","og_title":"La cybers\u00e9curit\u00e9\u00a0: de l\u2019indispensable au superflu - Eni Blog","og_description":"Replay du webinaire ENI TALKS \u00ab La cybers\u00e9curit\u00e9 : de l\u2019indispensable au superflu \u00bb. \ud83d\udee1\ufe0fCyberscore, charte nationale\u2026 \u00e7a y est, cette fois la cybers\u00e9curit\u00e9 devient un enjeu national majeur\u00a0! Mais derri\u00e8re la volont\u00e9 affich\u00e9e, comment mettre en pratique au niveau des TPE, PME ou encore administrations\u00a0? Car, \u00e9videmment, au regard des moyens, les solutions ne [&hellip;]","og_url":"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/","og_site_name":"Eni Blog","article_published_time":"2023-11-17T16:58:28+00:00","article_modified_time":"2023-12-29T15:25:13+00:00","og_image":[{"width":1920,"height":680,"url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/Banniere_BlogService_1920x680.jpg","type":"image\/jpeg"}],"author":"Denis Poillerat","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Denis Poillerat","Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/","url":"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/","name":"La cybers\u00e9curit\u00e9\u00a0: de l\u2019indispensable au superflu - Eni Blog","isPartOf":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/#primaryimage"},"image":{"@id":"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/#primaryimage"},"thumbnailUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/Banniere_BlogService_1920x680.jpg","datePublished":"2023-11-17T16:58:28+00:00","dateModified":"2023-12-29T15:25:13+00:00","author":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6"},"breadcrumb":{"@id":"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/#primaryimage","url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/Banniere_BlogService_1920x680.jpg","contentUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/Banniere_BlogService_1920x680.jpg","width":1920,"height":680,"caption":"Illustration webinaire Cybers\u00e9curit\u00e9"},{"@type":"BreadcrumbList","@id":"https:\/\/www.editions-eni.fr\/blog\/la-cybersecurite-de-lindispensable-au-superflu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editions-eni.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"La cybers\u00e9curit\u00e9\u00a0: de l\u2019indispensable au superflu"}]},{"@type":"WebSite","@id":"https:\/\/www.editions-eni.fr\/blog\/#website","url":"https:\/\/www.editions-eni.fr\/blog\/","name":"Eni Blog","description":"Blog des Editions ENI","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6","name":"Denis Poillerat","url":"https:\/\/www.editions-eni.fr\/blog\/author\/dpoillerat\/"}]}},"_links":{"self":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/5510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/comments?post=5510"}],"version-history":[{"count":9,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/5510\/revisions"}],"predecessor-version":[{"id":5611,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/5510\/revisions\/5611"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media\/5511"}],"wp:attachment":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media?parent=5510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/categories?post=5510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/tags?post=5510"},{"taxonomy":"genre","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/genre?post=5510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}