


{"id":6185,"date":"2024-07-30T16:04:52","date_gmt":"2024-07-30T14:04:52","guid":{"rendered":"https:\/\/www.editions-eni.fr\/blog\/?p=6185"},"modified":"2024-11-28T12:13:56","modified_gmt":"2024-11-28T11:13:56","slug":"cybersecurite-au-coeur-de-linvestigation-numerique","status":"publish","type":"post","link":"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/","title":{"rendered":"Cybers\u00e9curit\u00e9\u00a0: au c\u0153ur de l\u2019investigation num\u00e9rique"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-13px|||||&#8221; custom_padding=&#8221;6px|||||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p><strong>D\u00e9couvrez les coulisses de l&#8217;investigation num\u00e9rique, discipline fascinante et m\u00e9connue de la cybers\u00e9curit\u00e9. \u00c0 l\u2019occasion de la sortie de <a href=\"https:\/\/www.editions-eni.fr\/livre\/investigation-numerique-microsoft-windows-et-gnu-linux-le-guide-complet-pour-l-analyste-en-investigation-numerique-9782409044908\" target=\"_blank\" rel=\"noopener\">son livre aux Editions ENI<\/a>, <a href=\"https:\/\/www.editions-eni.fr\/alain-menelet\" target=\"_blank\" rel=\"noopener\">Alain Menelet<\/a>, <\/strong><strong>Chef du centre d&#8217;excellence cyberd\u00e9fense a\u00e9rospatiale, nous a accord\u00e9 une interview.<\/strong><\/p>\n<p><strong>Cet expert y d\u00e9voile les enjeux, les m\u00e9thodes et les outils de ce domaine captivant et en constante \u00e9volution. De la notion de r\u00e9ponse \u00e0 incident \u00e0 la recherche de preuves en passant par la veille permanente, Alain Menelet l\u00e8ve un peu le voile sur cette pratique mais aussi sur son parcours et son exp\u00e9rience d\u2019\u00e9criture.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p><strong>ENI\u00a0: Comme le titre l\u2019indique, votre livre parle de l\u2019investigation num\u00e9rique. Qu\u2019est-ce que c\u2019est exactement\u00a0? <\/strong><\/p>\n<p><strong>Alain Menelet\u00a0:<\/strong> L&#8217;investigation, qu\u2019elle soit num\u00e9rique ou non, consiste \u00e0 s\u2019appuyer sur un ensemble de m\u00e9thodologies scientifiques ayant pour objectif de comprendre factuellement ce qu\u2019il s\u2019est pass\u00e9 et quelles sont les actions ayant conduit \u00e0 l\u2019incident observ\u00e9. \u00a0La collecte, la pr\u00e9servation et l&#8217;analyse des preuves occupent une place centrale dans cette d\u00e9marche, en commen\u00e7ant par leur pr\u00e9l\u00e8vement jusqu&#8217;\u00e0 leur exploitation en respectant notamment des contraintes d\u2019int\u00e9grit\u00e9. Il est particuli\u00e8rement captivant de d\u00e9m\u00ealer les actions de l\u2019attaquant et de les organiser chronologiquement.<\/p>\n<p>Elle s\u2019int\u00e8gre naturellement dans\u00a0un processus plus global\u00a0qui est celui de la r\u00e9ponse \u00e0 incident. Cette derni\u00e8re aborde des probl\u00e9matiques plus larges telles que la gestion de crise et la reprise d&#8217;activit\u00e9. L\u00e0 o\u00f9 la priorit\u00e9 de l\u2019investigation num\u00e9rique est de comprendre ce qu\u2019il s\u2019est pass\u00e9 et prendre le temps de r\u00e9pondre aux hypoth\u00e8ses formul\u00e9es, la r\u00e9ponse \u00e0 incident a des contraintes principalement p\u00e9cuniaires et il ne faut donc pas perdre trop de temps.<\/p>\n<p><strong>ENI\u00a0: Sur quels types d\u2019\u00e9v\u00e9nements ou contextes fait-on appel \u00e0 l\u2019investigation num\u00e9rique\u00a0? Est-ce en r\u00e9action d\u2019\u00e9v\u00e9nements ou parfois en anticipation\u00a0?<\/strong><\/p>\n<p><strong>AM\u00a0:<\/strong> C\u2019est une tr\u00e8s bonne question. Pour r\u00e9pondre \u00e0 la 2<sup>e<\/sup> partie de votre question, il faut revenir \u00e0 la r\u00e9ponse \u00e0 incident qui est de plusieurs natures.<\/p>\n<p>Elle peut avoir une nature pr\u00e9ventive. En d&#8217;autres termes, il s&#8217;agit de r\u00e9aliser un ensemble de pr\u00e9l\u00e8vements initiaux afin de pouvoir comparer nos r\u00e9f\u00e9rences avec l&#8217;\u00e9tat du syst\u00e8me lors d&#8217;un incident de s\u00e9curit\u00e9, garantissant ainsi la capacit\u00e9 \u00e0 effectuer une analyse comparative. Cette approche pr\u00e9sente l&#8217;avantage d&#8217;enrichir la compr\u00e9hension du syst\u00e8me d&#8217;information pour l&#8217;\u00e9quipe d&#8217;intervention en cas d&#8217;incident. Cependant, elle est confront\u00e9e \u00e0 plusieurs contraintes, notamment le suivi des \u00e9volutions du syst\u00e8me sur lequel les pr\u00e9l\u00e8vements ont \u00e9t\u00e9 effectu\u00e9s. En effet, si aucun pr\u00e9l\u00e8vement n&#8217;est r\u00e9alis\u00e9 apr\u00e8s les mises \u00e0 jour ou \u00e9volutions du syst\u00e8me, nos r\u00e9f\u00e9rences deviennent obsol\u00e8tes.<\/p>\n<p>L\u2019autre cas est l\u2019intervention \u00e0 la suite d\u2019un incident de s\u00e9curit\u00e9. Le CSIRT (Computer Security Incident Response Team) d\u00e9ploiera alors ses \u00e9quipes dans le but de r\u00e9aliser une r\u00e9ponse \u00e0 incident et une investigation num\u00e9rique. C\u2019est cette approche qui est d\u00e9taill\u00e9e dans le livre. \u00c0 noter que de nombreux outils sont communs \u00e0 ces deux approches.<\/p>\n<p>Pour revenir sur votre premi\u00e8re partie de question, l\u2019investigation num\u00e9rique intervient \u00e0 la suite d\u2019un incident de s\u00e9curit\u00e9 ou lors d\u2019enqu\u00eates plus larges. Pour illustrer cela, nous avons par exemple l\u2019intervention pour donner suite \u00e0 l\u2019attaque informatique d\u2019une PME avec chiffrement des donn\u00e9es ou bien l\u2019analyse d\u2019un t\u00e9l\u00e9phone mobile saisi dans le cadre d\u2019une perquisition.<\/p>\n<p><strong>ENI : Votre livre porte sur les syst\u00e8mes Microsoft Windows et GNU\/Linux. Qu\u2019en est-il sur les autres ? L\u2019approche est la m\u00eame pour les OS mobiles ?<\/strong><\/p>\n<p><strong>AM\u00a0:<\/strong> Le domaine est tellement vaste qu\u2019il a n\u00e9cessairement fallu r\u00e9duire le p\u00e9rim\u00e8tre. C\u2019est pour cela que le titre pr\u00e9cise les syst\u00e8mes d\u2019exploitation abord\u00e9es et les outils associ\u00e9s. Concernant Microsoft Windows, les outils et m\u00e9thodes pr\u00e9sent\u00e9es concernent les versions x86\/x64. Ceci exclut donc les versions ARM. Les particularit\u00e9s sont nombreuses notamment sur la base de registres.<\/p>\n<p>Pour GNU\/Linux, le p\u00e9rim\u00e8tre est d\u00e9fini \u00e0 cette grande famille ; les syst\u00e8mes mobiles Android ou IOS par exemple ne sont pas inclus. Cette restriction exclut \u00e9galement les syst\u00e8mes Unix et par effet de bord aussi MacOS. \u00c0 noter tout de m\u00eame qu\u2019une grosse partie des notions pr\u00e9sent\u00e9es sont communes. Cela pourra faire l\u2019objet d\u2019une seconde \u00e9dition, qui sait ^^<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p><strong>ENI\u00a0: Concilier th\u00e9orie et pratique dans un ouvrage sur ce th\u00e8me est tr\u00e8s rare\u2026 <\/strong><\/p>\n<p><strong>AM\u00a0:<\/strong> Je suis parti d\u2019un constat. En informatique et dans la cybers\u00e9curit\u00e9 au sens large, il est obligatoire selon moi d\u2019effectuer une veille permanente. Nous n\u2019avons pas le choix. Heureusement, nous avons \u00e0 notre disposition tellement de vecteurs de connaissance qu\u2019il n\u2019est plus possible de ne pas savoir. En revanche, il est devenu plus difficile de s\u2019assurer de l\u2019exactitude et de la pertinence d\u2019une donn\u00e9e dans cette masse d\u2019information.<\/p>\n<p>Il manquait selon moi un livre sur cette th\u00e9matique r\u00e9dig\u00e9 en langue fran\u00e7aise. Ceci est paradoxal lorsque l\u2019on sait l\u2019importance de la langue anglaise et que l\u2019on constate \u00e0 quel point la litt\u00e9rature est florissante sur ce sujet. Ayant eu la chance d\u2019enseigner l\u2019investigation num\u00e9rique dans de multiples contextes et j\u2019ai eu le sentiment que ce domaine expliqu\u00e9 en fran\u00e7ais manquait.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/livre_3d_investigation.webp&#8221; alt=&#8221;livre Investigation num\u00e9rique Microsoft Windows et GNU\/Linux&#8221; title_text=&#8221;livre Investigation num\u00e9rique Microsoft Windows et GNU\/Linux&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/investigation-numerique-microsoft-windows-et-gnu-linux-le-guide-complet-pour-l-analyste-en-investigation-numerique-9782409044908&#8243; url_new_window=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text quote_border_color=&#8221;#3BB6D5&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>Concilier th\u00e9orie et pratique s\u2019est d\u00e9mocratis\u00e9 ces derni\u00e8res ann\u00e9es dans la litt\u00e9rature anglo-saxone avec des auteurs comme Sparc Flow ou bien Peter Kim qui couvrent de nombreuses m\u00e9thodes offensives avec un contexte et une pratique pertinente. Sans pr\u00e9tendre proposer la m\u00eame qualit\u00e9 de contenu, l\u2019id\u00e9e derri\u00e8re mon travail est de d\u00e9tailler des approches et m\u00e9thodes sc\u00e9naris\u00e9es en \u00e9tudes de cas. Il ne s\u2019agit que d\u2019une infime partie des cas possibles mais qui, selon moi, repr\u00e9sentent ce que nous sommes susceptible de traiter au quotidien.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-33px|auto|-33px|auto|true|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text quote_border_color=&#8221;#3BB6D5&#8243; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p><strong>ENI\u00a0: Vous parliez de la n\u00e9cessaire veille mais vous oblige-t-elle \u00e0 constamment mettre \u00e0 jour la pratique\u00a0?<\/strong><\/p>\n<p><strong>AM\u00a0:<\/strong> Oui et non. La compr\u00e9hension des modes op\u00e9ratoires adverses est importante avec une vision offensive et d\u00e9fensive. L\u2019attaquant va tenter de r\u00e9duire au minimum ses traces et il est donc n\u00e9cessaire de comprendre les outils, actions utilis\u00e9es afin de savoir o\u00f9 chercher. Cela induit aussi le d\u00e9veloppement d\u2019outils de d\u00e9tection selon les \u00e9l\u00e9ments offensifs utilis\u00e9s. Un v\u00e9ritable jeu du chat et de la souris\u00a0!<\/p>\n<p>Un point important est la maitrise par l\u2019analyste de ses outils et notamment de l\u2019innocuit\u00e9.<\/p>\n<p><strong>ENI\u00a0: Le domaine de l\u2019investigation num\u00e9rique est aussi mis en lumi\u00e8re avec les nombreuses actualit\u00e9s autour de la cybers\u00e9curit\u00e9. Ne devient-il pas plus important\u00a0? <\/strong><\/p>\n<p><strong>AM\u00a0:<\/strong> La r\u00e9ponse \u00e0 incident et l\u2019investigation num\u00e9rique ont pas mal \u00e9volu\u00e9es ces derni\u00e8res ann\u00e9es, principalement avec la d\u00e9mocratisation des solutions Cloud. Cela s\u2019accompagne d\u2019un nouveau terrain de jeu, de nouveaux outils et une l\u00e9gislation en construction. Cela am\u00e8ne de nouvelles questions telles que, o\u00f9 sont stock\u00e9es mes donn\u00e9es ou bien comment r\u00e9aliser les pr\u00e9l\u00e8vements\u2026 Les journaux d\u2019\u00e9v\u00e8nements prennent une place cruciale, laissant en retrait le traditionnel pr\u00e9l\u00e8vement de disque dur par exemple.<\/p>\n<p><strong>ENI\u00a0: Vous parlez des pr\u00e9l\u00e8vements virtuels dans le livre, pouvez-vous nous en dire plus\u00a0?<\/strong><\/p>\n<p><strong>AM\u00a0:<\/strong> Pour \u00eatre pr\u00e9cis, il s\u2019agit de pr\u00e9l\u00e8vements effectu\u00e9s en environnement virtualis\u00e9 par opposition aux pr\u00e9l\u00e8vements physique.<\/p>\n<p>Il faut dans ce cas prendre en consid\u00e9ration les particularit\u00e9s des hyperviseurs et des formats associ\u00e9s.<\/p>\n<p><strong>ENI\u00a0: Il va falloir se r\u00e9inventer ? <\/strong><\/p>\n<p><strong>AM :<\/strong> Cela est coh\u00e9rent avec la notion de veille permanente et la n\u00e9cessit\u00e9 de toujours rester en alerte afin de conna\u00eetre les outils et m\u00e9thodologies des attaquants mais aussi les doctrines et \u00e9volutions en mati\u00e8re de r\u00e8glementation et de proc\u00e9dure judiciaires.<\/p>\n<p><strong>ENI\u00a0: C\u2019\u00e9tait votre premier livre. Quelle exp\u00e9rience cela a-t-il \u00e9t\u00e9\u00a0et pourquoi l\u2019avez-vous \u00e9crit ?<br \/><\/strong><strong>AM\u00a0:<\/strong> Lol. Exp\u00e9rience \u00e0 la fois riche et frustrante. \u00c9crire seul est un exercice particulier et j\u2019avoue avoir surestim\u00e9 ma capacit\u00e9 \u00e0 m\u2019auto-critiquer. Heureusement, j\u2019ai pu \u00eatre \u00e9paul\u00e9 par un ami tout au long de la r\u00e9daction de ce livre. Et lorsque le gros est fini, j\u2019ai pu compter sur une <span>relecture bienveillante.<\/span><\/p>\n<p>Pourquoi l\u2019avoir \u00e9crit\u00a0? Pour le partage. J\u2019appr\u00e9cie la citation \u00ab\u00a0le savoir ne vaut que s\u2019il est partag\u00e9\u00a0\u00bb. Elle a accompagn\u00e9 ce livre et mon quotidien.<\/p>\n<p>J\u2019ai d\u00e9j\u00e0 \u00e9crit quelques articles et si l\u2019occasion se pr\u00e9sente je n\u2019h\u00e9site pas. C\u2019est un exercice int\u00e9ressant et particuli\u00e8rement la critique effectu\u00e9e par des pairs. Elle est toujours constructive et ne peut qu\u2019aider \u00e0 progresser.<\/p>\n<p><strong>ENI\u00a0: Quel parcours vous a amen\u00e9 \u00e0 ce domaine de l\u2019investigation num\u00e9rique et quels conseils donneriez-vous pour suivre cette voie\u00a0? <br \/><\/strong><strong>AM\u00a0:<\/strong>\u00a0Avant de faire de la cyberd\u00e9fense, \u00e0 mon sens, il faut avoir un bagage en informatique. Cela peut para\u00eetre curieux dit comme cela mais j\u2019ai le sentiment que c\u2019est souvent occult\u00e9. Ce domaine est transverse a tellement de domaines en informatique (r\u00e9seau, syst\u00e8me, web, d\u00e9veloppement \u2026) qu\u2019il faut s\u2019appuyer sur des bases solides.<\/p>\n<p>Ing\u00e9nieur en informatique, je reste confiant sur le niveau des \u00e9coles d\u2019ing\u00e9nieur et sur leur capacit\u00e9 \u00e0 r\u00e9pondre aux enjeux de demain. \u00c0 l\u2019issue de ce type de formation, les opportunit\u00e9s sont plus que nombreuses aussi bien dans un SOC (Security Operation Center) que dans une \u00e9quipe CSIRT. Et puis le plus important, la passion\u00a0\ud83d\ude0a<\/p>\n<p>Nous vivons dans une belle \u00e9poque car si les biblioth\u00e8ques sont moins peupl\u00e9es, des plateformes d\u2019apprentissage pr\u00e9sentent une plus-value ind\u00e9niable. Je pense par exemple \u00e0 Hack the box avec une branche academy de valeur ou bien \u00e0 Root-Me avec un gout de l\u2019effort r\u00e9compens\u00e9.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_testimonial author=&#8221;Alain M\u00e9nelet&#8221; job_title=&#8221;Chef du centre d&#8217;excellence cyberd\u00e9fense a\u00e9rospatiale&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||20px||false|false&#8221; custom_padding=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p><strong>Alain MENELET<\/strong><span>\u00a0a \u00e9t\u00e9 responsable d\u2019\u00e9quipes de r\u00e9ponse \u00e0 incident au sein du minist\u00e8re des arm\u00e9es ainsi que chef de projet d\u2019un SOC, ce qui lui permet d\u2019avoir une vision compl\u00e8te des processus r\u00e9gissant la d\u00e9tection et la r\u00e9ponse \u00e0 un incident cyber. Il est \u00e9galement l\u2019auteur de nombreux articles et enseigne l\u2019investigation num\u00e9rique, les strat\u00e9gies de d\u00e9tection au sein des SOC et l\u2019analyse de malwares. Aujourd\u2019hui responsable du centre d\u2019excellence cyberd\u00e9fense dans le domaine a\u00e9rospatial au sein de l\u2019\u00e9cole de l\u2019Air et de l\u2019Espace, il propose un livre empreint de toute son expertise sur l\u2019investigation num\u00e9rique en environnement Microsoft Windows et GNU\/Linux.<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-34px|||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2>Pour aller <span style=\"color: #3bb6d5;\">plus loin<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#3BB6D5&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;90px&#8221; max_width_tablet=&#8221;13%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/cybersecurite-et-malwares-detection-analyse-et-threat-intelligence-4e-edition-9782409038105_XL.jpg&#8221; alt=&#8221;vid\u00e9o S\u00e9curit\u00e9 informatique Les bonnes pratiques pour l&#8217;utilisateur&#8221; title_text=&#8221;securite-informatique-les-bonnes-pratiques-pour-l-utilisateur-vesec_XL&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/cybersecurite-et-malwares-detection-analyse-et-threat-intelligence-4e-edition-9782409038105&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]Livre[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<strong>Cybers\u00e9curit\u00e9 et Malwares<\/strong><br \/>\nD\u00e9tection, analyse et Threat Intelligence[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/la-menace-cyber-mieux-la-connaitre-pour-mieux-s-en-proteger-9782409043857_XL.webp&#8221; alt=&#8221;Cybers\u00e9curit\u00e9 et PowerShell&#8221; title_text=&#8221;cybersecurite-et-powershell-de-l-attaque-a-la-defense-du-systeme-d-information-9782409034145_XL&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/la-menace-cyber-mieux-la-connaitre-pour-mieux-s-en-proteger-9782409043857&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]Livre[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<strong>La menace cyber<\/strong><br \/>\nMieux la conna\u00eetre pour mieux s\u2019en prot\u00e9ger[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2023\/11\/securite-informatique-ethical-hacking-apprendre-l-attaque-pour-mieux-se-defendre-6e-edition-9782409033667_XL.jpg&#8221; alt=&#8221;Coffret s\u00e9curit\u00e9 informatique et malwares&#8221; title_text=&#8221;securite-informatique-et-malwares-coffret-de-2-livres-attaques-menaces-et-contre-mesures-3e-edition-9782409038815_XL&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/securite-informatique-ethical-hacking-apprendre-l-attaque-pour-mieux-se-defendre-6e-edition-9782409033667&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>Livre<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/livre\/informatique-quantique-de-la-physique-quantique-a-la-programmation-quantique-en-q-9782409017414&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<strong>S\u00e9curit\u00e9 informatique<\/strong><br \/>\nEthical Hacking : Apprendre l&#8217;attaque pour mieux se d\u00e9fendre[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/les-fondamentaux-de-la-cybersecurite-avec-watchguard-9782409043642_XL.webp&#8221; alt=&#8221;Livre cybers\u00e9curit\u00e9 et malwares&#8221; title_text=&#8221;cybersecurite-et-malwares-detection-analyse-et-threat-intelligence-4e-edition-9782409038105_XL&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/les-fondamentaux-de-la-cybersecurite-avec-watchguard-9782409043642&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;||0px||false|false&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>Livre<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<strong>Les fondamentaux de la cybers\u00e9curit\u00e9 avec WatchGuard<\/strong>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||50px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#7ebec5&#8243; custom_margin=&#8221;40px||||false|false&#8221; custom_padding=&#8221;20px||0px|20px|false|false&#8221; border_radii=&#8221;off|20px|20px||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h3><span style=\"color: #333333; font-weight:normal,\">POUR LES ENTREPRISES<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h4><span style=\"color: #666666; font-weight: normal;\">D\u00e9couvrez nos solutions de formation pour vos \u00e9quipes et apprenants :<\/span><\/h4>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#7ebec5&#8243; custom_padding=&#8221;|30px|30px|30px|false|false&#8221; border_radii=&#8221;off|||20px|20px&#8221; border_color_all=&#8221;#3BB6D5&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#3BB6D5&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/reflechir.jpg&#8221; alt=&#8221;R\u00e9fl\u00e9chir en amont&#8221; title_text=&#8221;reflechir&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/10\/iconeElearning.png&#8221; alt=&#8221;elearning&#8221; title_text=&#8221;iconeElearning&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_4_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h4 style=\"text-align: center;\"><strong>En e-learning avec<\/strong><br \/><strong>notre offre pour les professionnels<\/strong><\/h4>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-elearning.com\/fr\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;En savoir plus&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#EEEEEE&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/10\/iconeFormateur.png&#8221; alt=&#8221;formateur&#8221; title_text=&#8221;iconeFormateur&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h4 style=\"text-align: center;\"><span style=\"color: #ffffff;\">Avec un formateur, en pr\u00e9sentiel ou \u00e0 distance<\/span><\/h4>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-service.fr\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;En savoir plus&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>D\u00e9couvrez les coulisses de l&#8217;investigation num\u00e9rique, discipline fascinante et m\u00e9connue de la cybers\u00e9curit\u00e9. \u00c0 l\u2019occasion de la sortie de son livre aux Editions ENI, Alain Menelet, Chef du centre d&#8217;excellence cyberd\u00e9fense a\u00e9rospatiale, nous a accord\u00e9 une interview. Cet expert y d\u00e9voile les enjeux, les m\u00e9thodes et les outils de ce domaine captivant et en constante [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":6186,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[18,5],"tags":[],"genre":[33,36],"class_list":["post-6185","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-d-experts","category-securite-informatique","genre-parole-dexpert","genre-securite-informatique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybers\u00e9curit\u00e9\u00a0: au c\u0153ur de l\u2019investigation num\u00e9rique - Eni Blog<\/title>\n<meta name=\"description\" content=\"Coulisses enjeux, m\u00e9thodes et outils de l&#039;investigation num\u00e9rique. Optimisez la cybers\u00e9curit\u00e9 et comprenez les r\u00e9ponses \u00e0 incident.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9\u00a0: au c\u0153ur de l\u2019investigation num\u00e9rique - Eni Blog\" \/>\n<meta property=\"og:description\" content=\"Coulisses enjeux, m\u00e9thodes et outils de l&#039;investigation num\u00e9rique. Optimisez la cybers\u00e9curit\u00e9 et comprenez les r\u00e9ponses \u00e0 incident.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/\" \/>\n<meta property=\"og:site_name\" content=\"Eni Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-30T14:04:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-28T11:13:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/investigation-numerique.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"383\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Denis Poillerat\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Denis Poillerat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/\",\"name\":\"Cybers\u00e9curit\u00e9\u00a0: au c\u0153ur de l\u2019investigation num\u00e9rique - Eni Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/investigation-numerique.webp\",\"datePublished\":\"2024-07-30T14:04:52+00:00\",\"dateModified\":\"2024-11-28T11:13:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6\"},\"description\":\"Coulisses enjeux, m\u00e9thodes et outils de l'investigation num\u00e9rique. Optimisez la cybers\u00e9curit\u00e9 et comprenez les r\u00e9ponses \u00e0 incident.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/#primaryimage\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/investigation-numerique.webp\",\"contentUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/investigation-numerique.webp\",\"width\":1080,\"height\":383},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editions-eni.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9\u00a0: au c\u0153ur de l\u2019investigation num\u00e9rique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/\",\"name\":\"Eni Blog\",\"description\":\"Blog des Editions ENI\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6\",\"name\":\"Denis Poillerat\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/author\/dpoillerat\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9\u00a0: au c\u0153ur de l\u2019investigation num\u00e9rique - Eni Blog","description":"Coulisses enjeux, m\u00e9thodes et outils de l'investigation num\u00e9rique. Optimisez la cybers\u00e9curit\u00e9 et comprenez les r\u00e9ponses \u00e0 incident.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9\u00a0: au c\u0153ur de l\u2019investigation num\u00e9rique - Eni Blog","og_description":"Coulisses enjeux, m\u00e9thodes et outils de l'investigation num\u00e9rique. Optimisez la cybers\u00e9curit\u00e9 et comprenez les r\u00e9ponses \u00e0 incident.","og_url":"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/","og_site_name":"Eni Blog","article_published_time":"2024-07-30T14:04:52+00:00","article_modified_time":"2024-11-28T11:13:56+00:00","og_image":[{"width":1080,"height":383,"url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/investigation-numerique.webp","type":"image\/webp"}],"author":"Denis Poillerat","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Denis Poillerat","Dur\u00e9e de lecture estim\u00e9e":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/","url":"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/","name":"Cybers\u00e9curit\u00e9\u00a0: au c\u0153ur de l\u2019investigation num\u00e9rique - Eni Blog","isPartOf":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/#primaryimage"},"image":{"@id":"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/investigation-numerique.webp","datePublished":"2024-07-30T14:04:52+00:00","dateModified":"2024-11-28T11:13:56+00:00","author":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6"},"description":"Coulisses enjeux, m\u00e9thodes et outils de l'investigation num\u00e9rique. Optimisez la cybers\u00e9curit\u00e9 et comprenez les r\u00e9ponses \u00e0 incident.","breadcrumb":{"@id":"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/#primaryimage","url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/investigation-numerique.webp","contentUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/investigation-numerique.webp","width":1080,"height":383},{"@type":"BreadcrumbList","@id":"https:\/\/www.editions-eni.fr\/blog\/cybersecurite-au-coeur-de-linvestigation-numerique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editions-eni.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9\u00a0: au c\u0153ur de l\u2019investigation num\u00e9rique"}]},{"@type":"WebSite","@id":"https:\/\/www.editions-eni.fr\/blog\/#website","url":"https:\/\/www.editions-eni.fr\/blog\/","name":"Eni Blog","description":"Blog des Editions ENI","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6","name":"Denis Poillerat","url":"https:\/\/www.editions-eni.fr\/blog\/author\/dpoillerat\/"}]}},"_links":{"self":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/comments?post=6185"}],"version-history":[{"count":6,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6185\/revisions"}],"predecessor-version":[{"id":6329,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6185\/revisions\/6329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media\/6186"}],"wp:attachment":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media?parent=6185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/categories?post=6185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/tags?post=6185"},{"taxonomy":"genre","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/genre?post=6185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}