


{"id":6330,"date":"2024-12-02T09:17:30","date_gmt":"2024-12-02T08:17:30","guid":{"rendered":"https:\/\/www.editions-eni.fr\/blog\/?p=6330"},"modified":"2025-02-04T11:32:22","modified_gmt":"2025-02-04T10:32:22","slug":"cyberattaque-anticiper-reagir-et-se-relever","status":"publish","type":"post","link":"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/","title":{"rendered":"Cyberattaque : anticiper, r\u00e9agir et s&#8217;en relever\u00a0"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-29px|auto||auto||&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; min_height=&#8221;178.8px&#8221; custom_margin=&#8221;-21px||13px|||&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<p><strong>Le contexte r\u00e8glementaire se renforce avec #NIS2 (Network and Information Security) et DORA (Digital Operational Resilience Act) en janvier, mais les attaques ne ralentissent pas pour autant. Entreprises, collectivit\u00e9s, institutions en tous genres et m\u00eame particuliers, personne n\u2019est \u00e9pargn\u00e9. Mais alors que peut-on faire pour se pr\u00e9munir au mieux de ce danger et comment faire face \u00e0 une attaque\u00a0?<\/strong><\/p>\n<p><strong>Pour r\u00e9pondre \u00e0 ces questions et aborder le th\u00e8me de la cybers\u00e9curit\u00e9 dans l\u2019informatique, le <a href=\"https:\/\/www.eni.fr\/\" target=\"_blank\" rel=\"noopener\">groupe ENI<\/a> vous proposait, mardi 26 novembre, son 9<sup>e<\/sup> ENI Talks intitul\u00e9 \u00ab\u00a0Cyberattaque : anticiper, r\u00e9agir et s&#8217;en relever\u00a0\u00bb.<\/strong><\/p>\n<p>&nbsp;<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<p>Entreprises, collectivit\u00e9s, institutions et particuliers : aucun acteur n\u2019\u00e9chappe aux risques grandissants des cyberattaques. Face \u00e0 des menaces toujours plus sophistiqu\u00e9es, la question n\u2019est plus de savoir <strong>si<\/strong> une attaque peut survenir, mais <strong>quand<\/strong> et comment y r\u00e9pondre efficacement. Quels sont les outils, les strat\u00e9gies et les r\u00e9flexes n\u00e9cessaires pour anticiper, r\u00e9agir et se relever ?<\/p>\n<p>Pour explorer ces enjeux cruciaux, le groupe ENI a organis\u00e9 son 9e ENI Talks le mardi 26 novembre \u00e0 18h30, sur le th\u00e8me <strong>\u00ab Cyberattaque : anticiper, r\u00e9agir et s\u2019en relever \u00bb<\/strong>. Autour d\u2019Olivier PIERS, directeur p\u00e9dagogique d\u2019ENI \u00c9cole Informatique, trois experts renomm\u00e9s ont partag\u00e9 leurs perspectives et solutions :\u00a0<\/p>\n<p style=\"text-align: center;\">&#8211; <strong>Christophe GRENIER<\/strong> : Responsable de l&#8217;offre cybers\u00e9curit\u00e9 Europe Capgemini, PhD<\/p>\n<p style=\"text-align: center;\">&#8211; <strong>Fran\u00e7ois KHOURBIGA<\/strong> : CEO &amp; Co-founder Defants, Expert en investigation de la menace<\/p>\n<p style=\"text-align: center;\">&#8211; <strong>Jo\u00ebl GAUCI<\/strong> : Solution lead engineer Google Cloud Google, Auteur Editions ENI<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_video src=&#8221;https:\/\/youtu.be\/PxmluIiLiic&#8221; module_id=&#8221;video_replay&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;18px|||||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h2 style=\"text-align: center;\">Introduction et contexte<\/h2>\n<p>La cybers\u00e9curit\u00e9 est devenue un enjeu strat\u00e9gique incontournable pour toutes les organisations, comme l&#8217;ont expliqu\u00e9 nos experts. Selon l\u2019<a href=\"https:\/\/cyber.gouv.fr\/\" target=\"_blank\" rel=\"noopener\">Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information (ANSSI)<\/a>, une <strong>cyberattaque est un \u00ab\u00a0ensemble coordonn\u00e9 d&#8217;actions men\u00e9es dans le cyberespace qui visent des informations ou les syst\u00e8mes qui les traitent, en portant atteinte \u00e0 leur disponibilit\u00e9, \u00e0 leur int\u00e9grit\u00e9 ou \u00e0 leur confidentialit\u00e9<\/strong>\u00a0\u00bb.<\/p>\n<p>Contrairement aux id\u00e9es re\u00e7ues, les cibles ne se limitent pas aux services num\u00e9riques. Les industries, les cha\u00eenes de production, et d\u2019autres secteurs sous-estim\u00e9s en termes de vuln\u00e9rabilit\u00e9s sont \u00e9galement expos\u00e9s. Ces attaques, souvent moins m\u00e9diatis\u00e9es, peuvent avoir des impacts d\u2019autant plus graves qu\u2019ils ne sont pas anticip\u00e9s.<\/p>\n<p><strong>Personne n\u2019est \u00e0 l\u2019abri<\/strong>. La d\u00e9mocratisation des comp\u00e9tences des cybercriminels et leurs motivations diverses \u2013 souvent financi\u00e8res ou \u00e9conomiques \u2013 \u00e9largissent le spectre des cibles. Les PME, fr\u00e9quemment per\u00e7ues comme des &#8220;proies faciles&#8221;, sont particuli\u00e8rement concern\u00e9es. En plus des cons\u00e9quences techniques et financi\u00e8res, les <strong>impacts secondaires<\/strong>, comme les atteintes \u00e0 l\u2019image de marque ou les variations des cours boursiers, sont des dommages collat\u00e9raux qu\u2019il ne faut pas n\u00e9gliger.<\/p>\n<p>Pour y faire face, l&#8217;approche ne peut pas se limiter \u00e0 des solutions techniques : elle doit int\u00e9grer l\u2019ensemble des \u00e9quipes, y compris le top management, pour que <strong>la cybers\u00e9curit\u00e9 soit une priorit\u00e9 collective.<\/strong><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h2 style=\"text-align: center;\"><strong>Anticiper les cyberattaques<\/strong><\/h2>\n<p><strong>L\u2019anticipation est l\u2019arme la plus puissante<\/strong> contre les cyberattaques. Le premier pas consiste \u00e0 d\u00e9finir le minimum vital n\u00e9cessaire pour que l\u2019entreprise continue de fonctionner. \u00c0 partir de l\u00e0, il devient possible de dresser une cartographie des risques en se concentrant sur ces \u00e9l\u00e9ments critiques.<\/p>\n<p>Bien conna\u00eetre son syst\u00e8me d\u2019information est fondamental. Cela permet de concentrer les efforts sur les points les plus sensibles. Nos intervenants ont \u00e9voqu\u00e9 plusieurs m\u00e9thodes pour renforcer la pr\u00e9paration avec, entre autres :<\/p>\n<ul>\n<li><strong>Simulations<\/strong> : Les exercices pratiques permettent de tester les r\u00e9actions et de d\u00e9tecter les failles dans les processus.<\/li>\n<li><strong>Audits de compromission<\/strong> : Ces analyses approfondies identifient les vuln\u00e9rabilit\u00e9s et les \u00e9ventuelles traces d\u2019intrusions pass\u00e9es.<\/li>\n<li><strong>S\u00e9curisation des API<\/strong> : Un point essentiel, car les API repr\u00e9sentent une part majoritaire du trafic web, et leur protection est cruciale pour \u00e9viter les br\u00e8ches.<\/li>\n<\/ul>\n<p>Ces efforts doivent \u00eatre accompagn\u00e9s d\u2019une priorisation des investissements de s\u00e9curit\u00e9 l\u00e0 o\u00f9 les risques sont les plus \u00e9lev\u00e9s.<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h2 style=\"text-align: center;\"><strong>R\u00e9agir \u00e0 une cyberattaque<\/strong><\/h2>\n<p>Face \u00e0 une cyberattaque, il n&#8217;existe pas de r\u00e9ponse universelle, comme l\u2019ont soulign\u00e9 nos experts. La gestion de crise d\u00e9pend de multiples facteurs, notamment la nature de l\u2019attaque et la pr\u00e9paration en amont.<\/p>\n<p>Une question cl\u00e9 : <strong>faut-il d\u00e9connecter le syst\u00e8me pour limiter les d\u00e9g\u00e2ts ?<\/strong> La r\u00e9ponse repose sur une \u00e9valuation rapide des risques et des b\u00e9n\u00e9fices. Si l\u2019architecture le permet, isoler certaines parties des syst\u00e8mes tout en maintenant l\u2019activit\u00e9 peut \u00eatre une solution id\u00e9ale. Cela n\u00e9cessite, cependant, une planification pr\u00e9alable rigoureuse.<\/p>\n<p>La gestion de la communication est \u00e9galement cruciale. Il faut informer les parties prenantes en interne et, le cas \u00e9ch\u00e9ant, alerter les autorit\u00e9s comp\u00e9tentes. Une communication transparente peut limiter les impacts sur la r\u00e9putation.<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h2 style=\"text-align: center;\"><strong>Se relever et restaurer<\/strong><\/h2>\n<p>Apr\u00e8s une cyberattaque, la priorit\u00e9 est de restaurer les activit\u00e9s tout en \u00e9vitant les erreurs qui pourraient prolonger ou aggraver la crise. Cela implique de :<\/p>\n<ul>\n<li><strong>Mettre en place un Plan de Reprise d\u2019Activit\u00e9 (PRA) ou un Plan de Continuit\u00e9 d\u2019Activit\u00e9 (PCA)<\/strong>, avec une priorisation claire des actions et une quantification des ressources n\u00e9cessaires.<\/li>\n<li><strong>Disposer de sauvegardes \u00e0 jour et test\u00e9es r\u00e9guli\u00e8rement<\/strong> est indispensable. Elles doivent \u00eatre accessibles, fiables, et prot\u00e9g\u00e9es contre d\u2019\u00e9ventuelles attaques.<\/li>\n<li><strong>Accompagnement<\/strong> : Des structures comme l\u2019ANSSI, les cercles r\u00e9gionaux de cybers\u00e9curit\u00e9, et des prestataires priv\u00e9s peuvent offrir un soutien pr\u00e9cieux.<\/li>\n<\/ul>\n<p>Les modes de red\u00e9marrage varient selon les strat\u00e9gies planifi\u00e9es : certains optent pour une reprise progressive, d&#8217;autres pour un retour imm\u00e9diat. Dans tous les cas, ces choix doivent \u00eatre faits avant l\u2019attaque pour limiter les improvisations.<\/p>\n<p>Enfin, il est essentiel de former et d\u2019\u00e9lever le niveau de comp\u00e9tence des \u00e9quipes. La cybers\u00e9curit\u00e9 est un domaine en constante \u00e9volution, et l\u2019apprentissage continu est une n\u00e9cessit\u00e9.<\/p>\n<p>Les experts ont insist\u00e9 sur une r\u00e8gle d\u2019or simple mais fondamentale : <strong>anticiper, anticiper et\u2026 anticiper<\/strong>.<\/p>\n<p>Nous vous laissons enfin d\u00e9couvrir en fin de programme la session de questions\/r\u00e9ponses avec nos internautes et aussi le public sur place.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;150px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h2 style=\"text-align: center;\"><strong><span>Pour continuer sur la th\u00e9matique de la cybers\u00e9curit\u00e9<\/span><\/strong><\/h2>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-ecole.fr\/formations\/systeme-et-reseau\/bac-5-expert-en-securite-digitale\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;\u27a1\ufe0f D\u00e9couvrez la formation Expert en S\u00e9curit\u00e9 Digitale (ESD) par ENI \u00c9cole Informatique &#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;17px&#8221; button_text_color=&#8221;#3BB6D5&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_font=&#8221;|700|||||||&#8221; button_use_icon=&#8221;off&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_color=&#8221;rgba(0,0,0,0.1)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;150px&#8221; custom_padding=&#8221;||14px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h3 style=\"text-align: center;\"><strong>\u27a1\ufe0f Retrouvez \u00e9galement nos contenus consacr\u00e9s \u00e0 cette th\u00e9matique \naux Editions ENI :<\/strong><\/h3>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/07\/la-menace-cyber-mieux-la-connaitre-pour-mieux-s-en-proteger-9782409043857_XL.webp&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/la-menace-cyber-mieux-la-connaitre-pour-mieux-s-en-proteger-9782409043857&#8243; url_new_window=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;30%&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/guide-juridique-de-la-cybersecurite-mettre-en-place-un-bouclier-legal-pour-se-proteger-se-defendre-et-reagir-9782409047107_XL.webp&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/guide-juridique-de-la-cybersecurite-mettre-en-place-un-bouclier-legal-pour-se-proteger-se-defendre-et-reagir-9782409047107&#8243; url_new_window=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;30%&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_button button_url=&#8221;https:\/\/www.editions-eni.fr\/systeme-et-reseau\/securite-informatique&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Nos autres ouvrages sur la s\u00e9curit\u00e9 informatique&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;17px&#8221; button_text_color=&#8221;#3BB6D5&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_font=&#8221;|700|||||||&#8221; button_use_icon=&#8221;off&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_color=&#8221;rgba(0,0,0,0.1)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/www.eni-elearning.com\/fr\/cybersecurite-contenus-formation\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Sur notre plateforme elearning pour les professionnels&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;17px&#8221; button_text_color=&#8221;#3BB6D5&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_font=&#8221;|700|||||||&#8221; button_use_icon=&#8221;off&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_color=&#8221;rgba(0,0,0,0.1)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;150px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h3 style=\"text-align: center;\">\u27a1\ufe0f Vous souhaitez vous former en 1 \u00e0 5 jours, en pr\u00e9sentiel ou \u00e0 distance ? D\u00e9couvrez\u00a0toutes les formations en cybers\u00e9curit\u00e9\u00a0au catalogue ENI Service\u00a0<\/h3>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-service.fr\/formation\/securite-informatique-ethical-hacking-apprendre-lattaque-pour-mieux-se-defendre\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;S\u00e9curit\u00e9 informatique \u2013 Ethical Hacking : Apprendre l\u2019attaque pour mieux se d\u00e9fendre&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;17px&#8221; button_text_color=&#8221;#3BB6D5&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_font=&#8221;|700|||||||&#8221; button_use_icon=&#8221;off&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_color=&#8221;rgba(0,0,0,0.1)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/www.eni-service.fr\/formation\/nis2-fondamentaux-et-implementation\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;NIS2 \u2013 Fondamentaux et Impl\u00e9mentation&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;17px&#8221; button_text_color=&#8221;#3BB6D5&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_font=&#8221;|700|||||||&#8221; button_use_icon=&#8221;off&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_color=&#8221;rgba(0,0,0,0.1)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_button][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<p class=\"x_MsoNormal\"><b><span data-olk-copy-source=\"MessageBody\">\u23f0<\/span><\/b><b><span>\u00a0Et en ce moment, profitez de notre offre \u00e9ph\u00e9m\u00e8re\u00a0<\/span><\/b><span>pour vous former \u00e0 moindre co\u00fbt : en vous inscrivant cette ann\u00e9e sur les sessions inter-entreprises de janvier et f\u00e9vrier, b\u00e9n\u00e9ficiez de\u00a0<b>-20% sur les formations en bureautique et PAO\u00a0<\/b>dispens\u00e9es par\u00a0ENI Service\u00a0et de<b>\u00a0-30% sur celles en technique<\/b>\u00a0!<\/span><\/p>\n<p class=\"x_MsoNormal\"><span>Contactez ENI Service par email (<a title=\"mailto:formation@eni.fr\" href=\"mailto:formation@eni.fr\" data-linkindex=\"24\">formation@eni.fr<\/a>) ou via leur\u00a0<a title=\"https:\/\/www.eni-service.fr\/nous-contacter\/\" data-auth=\"NotApplicable\" href=\"https:\/\/www.eni-service.fr\/nous-contacter\/\" data-linkindex=\"25\" target=\"_blank\" rel=\"noopener\">formulaire en ligne<\/a>.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;6px|||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h2>Nos <span style=\"color: #3bb6d5;\">experts<\/span><\/h2>[\/et_pb_text][et_pb_divider color=&#8221;#3BB6D5&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;90px&#8221; max_width_tablet=&#8221;13%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_testimonial author=&#8221;Christophe GRENIER &#8221; job_title=&#8221;Responsable de l&#8217;offre cybers\u00e9curit\u00e9 Europe Capgemini, PhD&#8221; portrait_url=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/christophe-grenier.jpg&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_testimonial author=&#8221;Fran\u00e7ois KHOURBIGA &#8221; job_title=&#8221;CEO &#038; Co-founder Defants, Expert en investigation de la menace&#8221; portrait_url=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/Francois-Khourbiga.jpg&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_testimonial author=&#8221;Jo\u00ebl GAUCI&#8221; job_title=&#8221;Solution lead engineer Google Cloud Google, Auteur Editions ENI&#8221; portrait_url=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/joel-gauci.jpg&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h2>Vous souhaitez aller <span style=\"color: #3bb6d5;\">plus loin ?<\/span><\/h2>[\/et_pb_text][et_pb_divider color=&#8221;#3BB6D5&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;90px&#8221; max_width_tablet=&#8221;13%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/les-fondamentaux-de-la-cybersecurite-avec-watchguard-9782409043642_L.webp&#8221; alt=&#8221;Livre Passez au DevOps\nVotre nouvelle fa\u00e7on de travailler&#8221; title_text=&#8221;Livre Passez au DevOps Votre nouvelle fa\u00e7on de travailler&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/les-fondamentaux-de-la-cybersecurite-avec-watchguard-9782409043642&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; min_height=&#8221;216px&#8221; min_height_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]Livre[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/livre\/apache-spark-developpez-en-python-pour-le-big-data-9782409033780?utm_source=sendinblue&#038;utm_campaign=2022-03-GROUPE-Webinaire-Machine-Learning&#038;utm_medium=email&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<strong>Les fondamentaux de la cybers\u00e9curit\u00e9 avec WatchGuard<\/strong>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/ethical-hacking-principes-essentiels-et-test-d-intrusion-vt2etha_L.webp&#8221; alt=&#8221;Livre Kubernetes\nMise en \u0153uvre d&#8217;un cluster et d\u00e9ploiement de microservices&#8221; title_text=&#8221;Livre Kubernetes Mise en \u0153uvre d&#8217;un cluster et d\u00e9ploiement de microservices&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/video\/ethical-hacking-principes-essentiels-et-test-d-intrusion-vt2etha&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; min_height=&#8221;216px&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#EEEEEE&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<p>Vid\u00e9o<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/livre\/gradient-boosting-exploitez-les-arbres-de-decision-pour-le-machine-learning-xgboost-catboost-lightgbm-9782409034022&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<strong>Ethical Hacking<\/strong>\nPrincipes essentiels et test d\u2019intrusion[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/veeam-data-platform-protegez-efficacement-vos-donnees-9782409046964_L.webp&#8221; alt=&#8221;Livre Azure DevOps &#8211; Optimisez la gestion de vos projets informatiques&#8221; title_text=&#8221;Livre Azure DevOps &#8211; Optimisez la gestion de vos projets informatiques&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/veeam-data-platform-protegez-efficacement-vos-donnees-9782409046964&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; min_height=&#8221;216px&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<p>Livre<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/video\/machine-learning-concepts-et-enjeux-vt2ml&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<strong>Veeam Data Platform<\/strong>\nProt\u00e9gez efficacement vos donn\u00e9es[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/securite-informatique-ethical-hacking-apprendre-l-attaque-pour-mieux-se-defendre-6e-edition-9782409033667_XL.webp&#8221; alt=&#8221;Livre R\u00e9ussir avec Scrum &#8211; Des concepts \u00e0 la mise en \u0153uvre de l\u2019agilit\u00e9&#8221; title_text=&#8221;Livre R\u00e9ussir avec Scrum &#8211; Des concepts \u00e0 la mise en \u0153uvre de l\u2019agilit\u00e9&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/securite-informatique-ethical-hacking-apprendre-l-attaque-pour-mieux-se-defendre-6e-edition-9782409033667&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; min_height=&#8221;216px&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#EEEEEE&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<p>Livre<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/video\/machine-learning-concepts-et-enjeux-vt2ml&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<strong>Ethical Hacking<\/strong>\n Apprendre l&#8217;attaque pour mieux se d\u00e9fendre[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||50px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#7ebec5&#8243; custom_margin=&#8221;40px||||false|false&#8221; custom_padding=&#8221;20px||0px|20px|false|false&#8221; border_radii=&#8221;off|20px|20px||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h3><span style=\"color: #333333; font-weight:normal,\">POUR LES ENTREPRISES<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h4><span style=\"color: #666666; font-weight: normal;\">D\u00e9couvrez nos solutions de formation pour vos \u00e9quipes et apprenants :<\/span><\/h4>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#7ebec5&#8243; custom_padding=&#8221;|30px|30px|30px|false|false&#8221; border_radii=&#8221;off|||20px|20px&#8221; border_color_all=&#8221;#3BB6D5&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#3BB6D5&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/reflechir.jpg&#8221; alt=&#8221;R\u00e9fl\u00e9chir en amont&#8221; title_text=&#8221;reflechir&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/10\/iconeElearning.png&#8221; alt=&#8221;elearning&#8221; title_text=&#8221;iconeElearning&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h4 style=\"text-align: center;\"><span style=\"color: #ffffff;\">En e-learning avec notre offre pour les professionnels<\/span><\/h4>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-elearning.com\/fr\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;En savoir plus&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#EEEEEE&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/10\/iconeFormateur.png&#8221; alt=&#8221;formateur&#8221; title_text=&#8221;iconeFormateur&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<h4 style=\"text-align: center;\"><span style=\"color: #ffffff;\">Avec un formateur, en pr\u00e9sentiel ou \u00e0 distance<\/span><\/h4>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-service.fr\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;En savoir plus&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>Le contexte r\u00e8glementaire se renforce avec #NIS2 (Network and Information Security) et DORA (Digital Operational Resilience Act) en janvier, mais les attaques ne ralentissent pas pour autant. Entreprises, collectivit\u00e9s, institutions en tous genres et m\u00eame particuliers, personne n\u2019est \u00e9pargn\u00e9. Mais alors que peut-on faire pour se pr\u00e9munir au mieux de ce danger et comment faire [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":6331,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[5,14],"tags":[],"genre":[36,40],"class_list":["post-6330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-informatique","category-webinaires","genre-securite-informatique","genre-webinaire"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyberattaque : anticiper, r\u00e9agir et s&#039;en relever\u00a0 - Eni Blog<\/title>\n<meta name=\"description\" content=\"Les cyberattaques se multiplient. Comment faire ? Comment s&#039;y pr\u00e9parer, red\u00e9marrer, quels m\u00e9thodes et outils adopter ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattaque : anticiper, r\u00e9agir et s&#039;en relever\u00a0 - Eni Blog\" \/>\n<meta property=\"og:description\" content=\"Les cyberattaques se multiplient. Comment faire ? Comment s&#039;y pr\u00e9parer, red\u00e9marrer, quels m\u00e9thodes et outils adopter ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/\" \/>\n<meta property=\"og:site_name\" content=\"Eni Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-02T08:17:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-04T10:32:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/Banniere_Blog_1080x383.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1918\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Denis Poillerat\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Denis Poillerat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/\",\"name\":\"Cyberattaque : anticiper, r\u00e9agir et s'en relever\u00a0 - Eni Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/Banniere_Blog_1080x383.webp\",\"datePublished\":\"2024-12-02T08:17:30+00:00\",\"dateModified\":\"2025-02-04T10:32:22+00:00\",\"author\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6\"},\"description\":\"Les cyberattaques se multiplient. Comment faire ? Comment s'y pr\u00e9parer, red\u00e9marrer, quels m\u00e9thodes et outils adopter ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/#primaryimage\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/Banniere_Blog_1080x383.webp\",\"contentUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/Banniere_Blog_1080x383.webp\",\"width\":1918,\"height\":680,\"caption\":\"Illustration webinaire cyberattaque\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editions-eni.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattaque : anticiper, r\u00e9agir et s&#8217;en relever\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/\",\"name\":\"Eni Blog\",\"description\":\"Blog des Editions ENI\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6\",\"name\":\"Denis Poillerat\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/author\/dpoillerat\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattaque : anticiper, r\u00e9agir et s'en relever\u00a0 - Eni Blog","description":"Les cyberattaques se multiplient. Comment faire ? Comment s'y pr\u00e9parer, red\u00e9marrer, quels m\u00e9thodes et outils adopter ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyberattaque : anticiper, r\u00e9agir et s'en relever\u00a0 - Eni Blog","og_description":"Les cyberattaques se multiplient. Comment faire ? Comment s'y pr\u00e9parer, red\u00e9marrer, quels m\u00e9thodes et outils adopter ?","og_url":"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/","og_site_name":"Eni Blog","article_published_time":"2024-12-02T08:17:30+00:00","article_modified_time":"2025-02-04T10:32:22+00:00","og_image":[{"width":1918,"height":680,"url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/Banniere_Blog_1080x383.webp","type":"image\/webp"}],"author":"Denis Poillerat","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Denis Poillerat","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/","url":"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/","name":"Cyberattaque : anticiper, r\u00e9agir et s'en relever\u00a0 - Eni Blog","isPartOf":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/#primaryimage"},"image":{"@id":"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/#primaryimage"},"thumbnailUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/Banniere_Blog_1080x383.webp","datePublished":"2024-12-02T08:17:30+00:00","dateModified":"2025-02-04T10:32:22+00:00","author":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6"},"description":"Les cyberattaques se multiplient. Comment faire ? Comment s'y pr\u00e9parer, red\u00e9marrer, quels m\u00e9thodes et outils adopter ?","breadcrumb":{"@id":"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/#primaryimage","url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/Banniere_Blog_1080x383.webp","contentUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2024\/11\/Banniere_Blog_1080x383.webp","width":1918,"height":680,"caption":"Illustration webinaire cyberattaque"},{"@type":"BreadcrumbList","@id":"https:\/\/www.editions-eni.fr\/blog\/cyberattaque-anticiper-reagir-et-se-relever\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editions-eni.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyberattaque : anticiper, r\u00e9agir et s&#8217;en relever\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.editions-eni.fr\/blog\/#website","url":"https:\/\/www.editions-eni.fr\/blog\/","name":"Eni Blog","description":"Blog des Editions ENI","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6","name":"Denis Poillerat","url":"https:\/\/www.editions-eni.fr\/blog\/author\/dpoillerat\/"}]}},"_links":{"self":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/comments?post=6330"}],"version-history":[{"count":4,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6330\/revisions"}],"predecessor-version":[{"id":6344,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6330\/revisions\/6344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media\/6331"}],"wp:attachment":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media?parent=6330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/categories?post=6330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/tags?post=6330"},{"taxonomy":"genre","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/genre?post=6330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}