


{"id":6520,"date":"2025-06-27T11:11:24","date_gmt":"2025-06-27T09:11:24","guid":{"rendered":"https:\/\/www.editions-eni.fr\/blog\/?p=6520"},"modified":"2025-06-27T11:11:25","modified_gmt":"2025-06-27T09:11:25","slug":"ia-cybersecurite-et-legislation-numerique-conform","status":"publish","type":"post","link":"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/","title":{"rendered":"IA, cybers\u00e9curit\u00e9 et l\u00e9gislation num\u00e9rique\u00a0: adaptation constante"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<p><strong>Au c\u0153ur des transformations num\u00e9riques actuelles, l\u2019intelligence artificielle (IA) et la cybers\u00e9curit\u00e9 jouent un r\u00f4le central. Si elles offrent des perspectives d\u2019innovations in\u00e9gal\u00e9es, elles posent \u00e9galement de nouveaux d\u00e9fis en mati\u00e8re de protection des donn\u00e9es et de gestion des risques num\u00e9riques. <\/strong><\/p>\n<p><strong>L\u2019Europe a tent\u00e9 de poser un cadre qui, n\u00e9cessairement, doit \u00eatre en constante \u00e9volution. Emmanuelle Houdet, DPO Externe, Associ\u00e9e du cabinet PiaLab et <a href=\"https:\/\/www.editions-eni.fr\/emmanuelle-houdet\" target=\"_blank\" rel=\"noopener\">autrice aux Editions ENI<\/a><\/strong><strong>, revient dans deux de ses articles disponibles dans la Biblioth\u00e8que ENI elearning sur ces d\u00e9fis li\u00e9s \u00e0 l\u2019IA et \u00e0 la cybers\u00e9curit\u00e9, ainsi que sur les efforts l\u00e9gislatifs europ\u00e9ens pour y faire face. On vous en donne un aper\u00e7u\u2026<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<p><strong>Dans son article \u00ab\u00a0Protection des donn\u00e9es et intelligence artificielle\u00a0\u00bb, <\/strong>Emmanuelle Houdet aborde tr\u00e8s rapidement la menace potentielle que repr\u00e9sente l\u2019intelligence artificielle pour la s\u00e9curit\u00e9 informatique. Mais elle rappelle\u00a0:<\/p>\n<p>[\/et_pb_text][et_pb_testimonial _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<p><strong><em>\u00ab\u00a0Face \u00e0 ces pr\u00e9occupations et avant de tomber dans le catastrophisme, il est int\u00e9ressant de consid\u00e9rer que l\u2019IA contribue directement \u00e0 la r\u00e9silience de nos syst\u00e8mes d\u2019information. En effet, les applications dans le domaine de la cybers\u00e9curit\u00e9 sont nombreuses et continueront vraisemblablement de se multiplier.\u00a0\u00bb<\/em><\/strong><\/p>\n<p>[\/et_pb_testimonial][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><strong>L\u2019IA pour renforcer la cybers\u00e9curit\u00e9<\/strong><\/h2>\n<p>Gr\u00e2ce \u00e0 des algorithmes de machine learning et de deep learning, l\u2019IA est capable d\u2019analyser d\u2019\u00e9normes volumes de donn\u00e9es pour d\u00e9tecter des anomalies ou des comportements suspects dans les r\u00e9seaux en temps r\u00e9el. Ces technologies permettent ainsi de pr\u00e9venir des cyberattaques avant qu\u2019elles ne se produisent, en identifiant des patterns de comportements malveillants que les syst\u00e8mes traditionnels peinent \u00e0 d\u00e9tecter.<\/p>\n<p>Emmanuelle Houdet insiste \u00e9galement sur l\u2019<strong>importance de la rapidit\u00e9 dans la r\u00e9ponse aux incidents<\/strong>, affirmant que <strong>l\u2019IA permet non seulement de d\u00e9tecter des menaces en temps r\u00e9el, mais \u00e9galement de r\u00e9pondre instantan\u00e9ment<\/strong> en isolant un syst\u00e8me infect\u00e9 ou en appliquant des r\u00e8gles de s\u00e9curit\u00e9. Cette capacit\u00e9 \u00e0 automatiser la r\u00e9ponse \u00e0 des attaques permet de renforcer la r\u00e9silience des infrastructures.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><strong>Les risques li\u00e9s \u00e0 l\u2019utilisation de l\u2019IA<\/strong><\/h2>\n<p>Cependant, <strong>l\u2019utilisation de l\u2019IA dans la cybers\u00e9curit\u00e9 comporte \u00e9videmment des risques<\/strong>. Les m\u00eames algorithmes qui permettent de renforcer la s\u00e9curit\u00e9 des syst\u00e8mes peuvent \u00e9galement \u00eatre d\u00e9tourn\u00e9s \u00e0 des fins malveillantes\u00a0! Emmanuelle Houdet \u00e9voque cette r\u00e9alit\u00e9, notant que l\u2019IA, tout comme elle peut renforcer la s\u00e9curit\u00e9, peut aussi \u00eatre utilis\u00e9e \u00e0 des fins frauduleuses, telles que la cr\u00e9ation de deepfakes ou le d\u00e9veloppement de logiciels malveillants.<\/p>\n<p><strong>En outre, les mod\u00e8les d\u2019IA eux-m\u00eames peuvent devenir des cibles privil\u00e9gi\u00e9es pour les cybercriminels.<\/strong> Des attaques visant \u00e0 manipuler les donn\u00e9es utilis\u00e9es pour entra\u00eener les algorithmes, ou m\u00eame \u00e0 alt\u00e9rer les r\u00e9sultats fournis par ces syst\u00e8mes, sont d\u00e9sormais des menaces concr\u00e8tes. Ce type d\u2019attaque, souvent qualifi\u00e9 de &#8220;poisoning&#8221;, peut compromettre la fiabilit\u00e9 et l&#8217;int\u00e9grit\u00e9 des d\u00e9cisions prises par les IA. Les attaques par manipulation des donn\u00e9es d\u2019IA repr\u00e9sentent un risque important, mais souvent sous-estim\u00e9.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><strong>Les d\u00e9fis l\u00e9gislatifs europ\u00e9ens : Une r\u00e9ponse coh\u00e9rente et progressive<\/strong><\/h2>\n<p>Face \u00e0 ces d\u00e9fis, l\u2019Union Europ\u00e9enne a pris des mesures significatives pour encadrer l\u2019utilisation de l\u2019IA et assurer une cybers\u00e9curit\u00e9 renforc\u00e9e \u00e0 l\u2019\u00e9chelle europ\u00e9enne. Plusieurs textes l\u00e9gislatifs ont \u00e9t\u00e9 adopt\u00e9s ou sont en cours de pr\u00e9paration pour \u00e9tablir un cadre r\u00e9glementaire solide, \u00e9quilibrant innovation et s\u00e9curit\u00e9.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><strong>Le RGPD : une premi\u00e8re pierre angulaire<\/strong><\/h2>\n<p>Le R\u00e8glement G\u00e9n\u00e9ral sur la Protection des Donn\u00e9es (RGPD), adopt\u00e9 en 2018, a marqu\u00e9 un tournant en mati\u00e8re de protection des donn\u00e9es personnelles en Europe. Bien qu\u2019il ne s\u2019applique pas sp\u00e9cifiquement \u00e0 l\u2019IA, il a pos\u00e9 des bases essentielles en mati\u00e8re de transparence et de consentement pour le traitement des donn\u00e9es.<\/p>\n<p>Comme le rappelle Emmanuelle Houdet dans son article, \u00ab\u00a0<em>L\u2019\u00e9volution de la l\u00e9gislation num\u00e9rique en Europe : un cadre en constante adaptation\u00a0<\/em>\u00bb, le RGPD a jet\u00e9 les bases d&#8217;une prise de conscience europ\u00e9enne sur la n\u00e9cessit\u00e9 de prot\u00e9ger les donn\u00e9es personnelles.<\/p>\n<p><strong>Le RGPD a \u00e9galement introduit le droit \u00e0 l\u2019explication, ce qui est particuli\u00e8rement pertinent pour l\u2019IA.<\/strong> En effet, pour de nombreux syst\u00e8mes d\u2019IA, il est essentiel de comprendre comment et pourquoi une d\u00e9cision a \u00e9t\u00e9 prise par la machine. Cette exigence de transparence se retrouve \u00e9galement dans le cadre de l\u2019IA Act, qui impose des obligations similaires aux entreprises d\u00e9ployant des syst\u00e8mes d\u2019intelligence artificielle.x\u00b2<\/p>\n<p>Notre sp\u00e9cialiste revient \u00e9galement sur la liste des principaux textes\u00a0europ\u00e9ens en mati\u00e8re de l\u00e9gislation num\u00e9rique :<\/p>\n<ul>\n<li>Directive 95\/46\/CE et RGPD<\/li>\n<li>Directive 2013\/40\/UE \u2013 Cybercriminalit\u00e9<\/li>\n<li>Directive 2016\/1148 (Directive NIS)<\/li>\n<li>Cybersecurity Act (2019)<\/li>\n<li>Directive (UE) 2022\/2555 (NIS2 Directive, 2022)<\/li>\n<li>Digital Markets Act (DMA) et Digital Services Act (DSA), 2022<\/li>\n<li>Digital Operational Resilience Act (DORA), r\u00e8glement (UE) 2022\/2554 et directive (UE) 2022\/2556<\/li>\n<li>Le r\u00e8glement sur l\u2019intelligence artificielle de l\u2019Union europ\u00e9enne, IA Act<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><strong>L\u2019IA Act : encadrer l\u2019innovation responsable<\/strong><\/h2>\n<p>Le <strong>R\u00e8glement sur l\u2019intelligence artificielle<\/strong>, ou <strong>IA Act<\/strong>, adopt\u00e9 par le Parlement europ\u00e9en en mars 2024, est l\u2019un des textes les plus attendus pour encadrer l\u2019utilisation de l\u2019IA en Europe.<\/p>\n<p>\u00ab\u00a0Il vise principalement \u00e0 \u00e9tablir un cadre r\u00e9glementaire harmonis\u00e9 pour le d\u00e9veloppement et la mise en \u0153uvre de l\u2019IA en Europe. Les objectifs annonc\u00e9s sont multiples :<\/p>\n<ul>\n<li>Assurer la s\u00e9curit\u00e9 et les droits fondamentaux ;<\/li>\n<li>Favoriser l\u2019innovation et la comp\u00e9titivit\u00e9 ;<\/li>\n<li>Instaurer la confiance.\u00a0\u00bb<\/li>\n<\/ul>\n<p>Ce r\u00e8glement \u00e9tablit ainsi un cadre bas\u00e9 sur le risque, classant les applications de l\u2019IA en fonction de leur niveau de dangerosit\u00e9. L\u2019IA act a \u00e9galement fait \u00e9merger l\u2019impl\u00e9mentation de mesures de conformit\u00e9 et la mise en place de m\u00e9canismes de surveillance et de contr\u00f4le.<\/p>\n<p>Les syst\u00e8mes d\u2019IA \u00e0 haut risque, tels que ceux utilis\u00e9s dans les secteurs de la sant\u00e9, de la finance ou de la s\u00e9curit\u00e9 publique, seront soumis \u00e0 des exigences strictes en mati\u00e8re de conformit\u00e9, notamment en ce qui concerne la gestion des donn\u00e9es, la transparence des algorithmes, et la surveillance humaine des d\u00e9cisions. Les entreprises devront \u00e9galement effectuer des \u00e9valuations de risques avant le d\u00e9ploiement de leurs syst\u00e8mes d\u2019IA et mettre en place des m\u00e9canismes de gouvernance adapt\u00e9s.<\/p>\n<h2 style=\"text-align: center;\"><strong>Comment les entreprises doivent-elles se pr\u00e9parer ?<\/strong><\/h2>\n<p>Les entreprises doivent non seulement se conformer \u00e0 ces nouvelles l\u00e9gislations, mais aussi anticiper leur \u00e9volution. Les r\u00e8gles r\u00e9gissant l\u2019IA et la cybers\u00e9curit\u00e9 deviennent de plus en plus strictes, et leur non-respect peut entra\u00eener des <strong>sanctions importantes, pouvant atteindre jusqu\u2019\u00e0 7% du chiffre d\u2019affaires mondial d\u2019une entreprise pour non-conformit\u00e9 \u00e0 l\u2019IA Act<\/strong>.<\/p>\n<p>Cela peut passer par exemple par la mise en place d\u2019une \u00e9quipe d\u00e9di\u00e9e \u00e0 la gestion des risques num\u00e9riques, la cartographie des syst\u00e8mes d\u2019IA utilis\u00e9s, la v\u00e9rification de la qualit\u00e9 des donn\u00e9es et des annotations utilis\u00e9es pour entra\u00eener les mod\u00e8les d\u2019IA\u2026<\/p>\n<p>La conformit\u00e9 au <strong>RGPD<\/strong> et \u00e0 l\u2019<strong>IA Act<\/strong> doit \u00eatre int\u00e9gr\u00e9e dans le c\u0153ur des strat\u00e9gies de gouvernance des donn\u00e9es et de cybers\u00e9curit\u00e9 des entreprises. Emmanuelle Houdet souligne qu\u2019une int\u00e9gration proactive de la conformit\u00e9 dans les processus internes est essentielle pour \u00e9viter des risques juridiques et s\u00e9curitaires importants.<\/p>\n<h2 style=\"text-align: center;\"><strong>Conclusion : Construire l\u2019avenir num\u00e9rique<\/strong><\/h2>\n<p>Alors que l\u2019IA et la cybers\u00e9curit\u00e9 deviennent des piliers incontournables de l\u2019innovation num\u00e9rique, leur r\u00e9gulation est plus essentielle que jamais.<\/p>\n<p>L\u2019Union Europ\u00e9enne a pris des mesures l\u00e9gislatives ambitieuses pour garantir que l\u2019IA soit utilis\u00e9e de mani\u00e8re responsable, tout en favorisant un environnement propice \u00e0 l\u2019innovation. Ce sont sur ces mesures autour de la protection des donn\u00e9es et de l\u2019intelligence artificielle et l\u2019\u00e9volution de la l\u00e9gislation num\u00e9rique en Europe qu\u2019Emmanuelle Houdet apporte un \u00e9clairage indispensable dans ses deux articles.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_testimonial author=&#8221;Emmanuelle HOUDET&#8221; job_title=&#8221;Experte s\u00e9curit\u00e9 de l\u2019information&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||-1px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<p><strong>Emmanuelle HOUDET<\/strong><span>, sp\u00e9cialiste de la s\u00e9curit\u00e9 de l\u2019information, a forg\u00e9 ses armes dans l\u2019arm\u00e9e de terre \u00e0 la suite de sa scolarit\u00e9 \u00e0 l&#8217;Ecole Sp\u00e9ciale Militaire de Saint-Cyr. Apr\u00e8s une exp\u00e9rience au sein de groupes europ\u00e9ens de transport, elle pr\u00e9cise son expertise en se sp\u00e9cialisant dans la conformit\u00e9 RGPD. DPO dipl\u00f4m\u00e9e et certifi\u00e9e ISO 27001 Implementer, elle accompagne quotidiennement les entreprises dans la gestion et la protection de leurs donn\u00e9es \u00e0 caract\u00e8re personnel.<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<h2>Vous souhaitez aller <span style=\"color: #3bb6d5;\">plus loin ?<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#3BB6D5&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; max_width=&#8221;90px&#8221; max_width_tablet=&#8221;13%&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; custom_css_main_element_last_edited=&#8221;on|phone&#8221; custom_css_main_element_tablet=&#8221;display:flex;&#8221; custom_css_main_element_phone=&#8221;display:inherit;&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/rgpd-et-dpo-mettre-en-uvre-la-protection-des-donnees-a-caractere-personnel-vtdpo_L.webp&#8221; alt=&#8221;Livre Passez au DevOps<br \/>\nVotre nouvelle fa\u00e7on de travailler&#8221; title_text=&#8221;Livre Passez au DevOps Votre nouvelle fa\u00e7on de travailler&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/video\/rgpd-et-dpo-mettre-en-uvre-la-protection-des-donnees-a-caractere-personnel-vtdpo&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; min_height=&#8221;216px&#8221; min_height_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<p>Vid\u00e9o<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/livre\/apache-spark-developpez-en-python-pour-le-big-data-9782409033780?utm_source=sendinblue&#038;utm_campaign=2022-03-GROUPE-Webinaire-Machine-Learning&#038;utm_medium=email&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<strong>RGPD et DPO<\/strong><br \/>\nMettre en \u0153uvre la protection des donn\u00e9es \u00e0 caract\u00e8re personnel[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/securite-des-architectures-cloud-integrer-et-securiser-une-plateforme-de-gestion-des-api-9782409050176_XL.webp&#8221; alt=&#8221;Livre Kubernetes<br \/>\nMise en \u0153uvre d&#8217;un cluster et d\u00e9ploiement de microservices&#8221; title_text=&#8221;Livre Kubernetes Mise en \u0153uvre d&#8217;un cluster et d\u00e9ploiement de microservices&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/securite-des-architectures-cloud-integrer-et-securiser-une-plateforme-de-gestion-des-api-9782409050176&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; min_height=&#8221;216px&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#EEEEEE&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<p>Livre<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/livre\/gradient-boosting-exploitez-les-arbres-de-decision-pour-le-machine-learning-xgboost-catboost-lightgbm-9782409034022&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<strong>S\u00e9curit\u00e9 des architectures cloud<\/strong><br \/>\nInt\u00e9grer et s\u00e9curiser une plateforme de gestion des API[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/l-intelligence-artificielle-au-service-des-metiers-de-l-it-comprendre-et-maitriser-la-revolution-ia-9782409049699_XL.webp&#8221; alt=&#8221;Livre Azure DevOps &#8211; Optimisez la gestion de vos projets informatiques&#8221; title_text=&#8221;Livre Azure DevOps &#8211; Optimisez la gestion de vos projets informatiques&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/l-intelligence-artificielle-au-service-des-metiers-de-l-it-comprendre-et-maitriser-la-revolution-ia-9782409049699&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; min_height=&#8221;216px&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<p>Livre<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/video\/machine-learning-concepts-et-enjeux-vt2ml&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<strong>L\u2019Intelligence Artificielle au service des m\u00e9tiers de l&#8217;IT<\/strong><br \/>\nComprendre et ma\u00eetriser la r\u00e9volution IA[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/quand-l-intelligence-artificielle-revolutionne-le-droit-opportunites-et-defis-9782409051449_XL.webp&#8221; alt=&#8221;Livre R\u00e9ussir avec Scrum &#8211; Des concepts \u00e0 la mise en \u0153uvre de l\u2019agilit\u00e9&#8221; title_text=&#8221;Livre R\u00e9ussir avec Scrum &#8211; Des concepts \u00e0 la mise en \u0153uvre de l\u2019agilit\u00e9&#8221; url=&#8221;https:\/\/www.editions-eni.fr\/livre\/quand-l-intelligence-artificielle-revolutionne-le-droit-opportunites-et-defis-9782409051449&#8243; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;85%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|tablet&#8221; min_height=&#8221;216px&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#EEEEEE&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover=&#8221;105%|105%&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#3BB6D5&#8243; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<p>Livre<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;|10px|||false|false&#8221; custom_padding_phone=&#8221;|0px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; link_option_url=&#8221;https:\/\/www.editions-eni.fr\/video\/machine-learning-concepts-et-enjeux-vt2ml&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<strong>Quand l\u2019Intelligence Artificielle r\u00e9volutionne le Droit<\/strong><br \/>\nOpportunit\u00e9s et d\u00e9fis[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||50px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#7ebec5&#8243; custom_margin=&#8221;40px||||false|false&#8221; custom_padding=&#8221;20px||0px|20px|false|false&#8221; border_radii=&#8221;off|20px|20px||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<h3><span style=\"color: #333333; font-weight:normal,\">POUR LES ENTREPRISES<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|300|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_2_line_height=&#8221;1.5em&#8221; header_3_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_all=&#8221;#1a0a38&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<h4><span style=\"color: #666666; font-weight: normal;\">D\u00e9couvrez nos solutions de formation pour vos \u00e9quipes et apprenants :<\/span><\/h4>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#7ebec5&#8243; custom_padding=&#8221;|30px|30px|30px|false|false&#8221; border_radii=&#8221;off|||20px|20px&#8221; border_color_all=&#8221;#3BB6D5&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#3BB6D5&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/06\/reflechir.jpg&#8221; alt=&#8221;R\u00e9fl\u00e9chir en amont&#8221; title_text=&#8221;reflechir&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#000000&#8243; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/10\/iconeElearning.png&#8221; alt=&#8221;elearning&#8221; title_text=&#8221;iconeElearning&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_4_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<h4 style=\"text-align: center;\">En e-learning avec<br \/>notre offre pour les professionnels<\/h4>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-elearning.com\/fr\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;En savoir plus&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#EEEEEE&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_image src=&#8221;https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2021\/10\/iconeFormateur.png&#8221; alt=&#8221;formateur&#8221; title_text=&#8221;iconeFormateur&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;10px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_4_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<\/p>\n<h4 style=\"text-align: center;\">Avec un formateur, <br \/>en pr\u00e9sentiel ou \u00e0 distance<\/h4>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.eni-service.fr\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;En savoir plus&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Au c\u0153ur des transformations num\u00e9riques actuelles, l\u2019intelligence artificielle (IA) et la cybers\u00e9curit\u00e9 jouent un r\u00f4le central. Si elles offrent des perspectives d\u2019innovations in\u00e9gal\u00e9es, elles posent \u00e9galement de nouveaux d\u00e9fis en mati\u00e8re de protection des donn\u00e9es et de gestion des risques num\u00e9riques. L\u2019Europe a tent\u00e9 de poser un cadre qui, n\u00e9cessairement, doit \u00eatre en constante \u00e9volution. [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":6521,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[5,10],"tags":[],"genre":[36,37],"class_list":["post-6520","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-informatique","category-societe-tendances","genre-securite-informatique","genre-societe-tendances"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IA et cybers\u00e9curit\u00e9 : ma\u00eetriser les risques et la conformit\u00e9<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment IA et cybers\u00e9curit\u00e9 transforment le num\u00e9rique et comment l\u2019Europe adapte sa l\u00e9gislation \u00e0 ces nouveaux d\u00e9fis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IA et cybers\u00e9curit\u00e9 : ma\u00eetriser les risques et la conformit\u00e9\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment IA et cybers\u00e9curit\u00e9 transforment le num\u00e9rique et comment l\u2019Europe adapte sa l\u00e9gislation \u00e0 ces nouveaux d\u00e9fis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/\" \/>\n<meta property=\"og:site_name\" content=\"Eni Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-27T09:11:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-27T09:11:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/IA_cybersecurite_blog.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1312\" \/>\n\t<meta property=\"og:image:height\" content=\"465\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Denis Poillerat\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Denis Poillerat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/\",\"name\":\"IA et cybers\u00e9curit\u00e9 : ma\u00eetriser les risques et la conformit\u00e9\",\"isPartOf\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/IA_cybersecurite_blog.webp\",\"datePublished\":\"2025-06-27T09:11:24+00:00\",\"dateModified\":\"2025-06-27T09:11:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6\"},\"description\":\"D\u00e9couvrez comment IA et cybers\u00e9curit\u00e9 transforment le num\u00e9rique et comment l\u2019Europe adapte sa l\u00e9gislation \u00e0 ces nouveaux d\u00e9fis.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/#primaryimage\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/IA_cybersecurite_blog.webp\",\"contentUrl\":\"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/IA_cybersecurite_blog.webp\",\"width\":1312,\"height\":465,\"caption\":\"Illustration IA et cybersecurite\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editions-eni.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IA, cybers\u00e9curit\u00e9 et l\u00e9gislation num\u00e9rique\u00a0: adaptation constante\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#website\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/\",\"name\":\"Eni Blog\",\"description\":\"Blog des Editions ENI\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6\",\"name\":\"Denis Poillerat\",\"url\":\"https:\/\/www.editions-eni.fr\/blog\/author\/dpoillerat\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IA et cybers\u00e9curit\u00e9 : ma\u00eetriser les risques et la conformit\u00e9","description":"D\u00e9couvrez comment IA et cybers\u00e9curit\u00e9 transforment le num\u00e9rique et comment l\u2019Europe adapte sa l\u00e9gislation \u00e0 ces nouveaux d\u00e9fis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/","og_locale":"fr_FR","og_type":"article","og_title":"IA et cybers\u00e9curit\u00e9 : ma\u00eetriser les risques et la conformit\u00e9","og_description":"D\u00e9couvrez comment IA et cybers\u00e9curit\u00e9 transforment le num\u00e9rique et comment l\u2019Europe adapte sa l\u00e9gislation \u00e0 ces nouveaux d\u00e9fis.","og_url":"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/","og_site_name":"Eni Blog","article_published_time":"2025-06-27T09:11:24+00:00","article_modified_time":"2025-06-27T09:11:25+00:00","og_image":[{"width":1312,"height":465,"url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/IA_cybersecurite_blog.webp","type":"image\/webp"}],"author":"Denis Poillerat","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Denis Poillerat","Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/","url":"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/","name":"IA et cybers\u00e9curit\u00e9 : ma\u00eetriser les risques et la conformit\u00e9","isPartOf":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/#primaryimage"},"image":{"@id":"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/#primaryimage"},"thumbnailUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/IA_cybersecurite_blog.webp","datePublished":"2025-06-27T09:11:24+00:00","dateModified":"2025-06-27T09:11:25+00:00","author":{"@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6"},"description":"D\u00e9couvrez comment IA et cybers\u00e9curit\u00e9 transforment le num\u00e9rique et comment l\u2019Europe adapte sa l\u00e9gislation \u00e0 ces nouveaux d\u00e9fis.","breadcrumb":{"@id":"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/#primaryimage","url":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/IA_cybersecurite_blog.webp","contentUrl":"https:\/\/www.editions-eni.fr\/blog\/wp-content\/uploads\/2025\/06\/IA_cybersecurite_blog.webp","width":1312,"height":465,"caption":"Illustration IA et cybersecurite"},{"@type":"BreadcrumbList","@id":"https:\/\/www.editions-eni.fr\/blog\/ia-cybersecurite-et-legislation-numerique-conform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editions-eni.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"IA, cybers\u00e9curit\u00e9 et l\u00e9gislation num\u00e9rique\u00a0: adaptation constante"}]},{"@type":"WebSite","@id":"https:\/\/www.editions-eni.fr\/blog\/#website","url":"https:\/\/www.editions-eni.fr\/blog\/","name":"Eni Blog","description":"Blog des Editions ENI","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editions-eni.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.editions-eni.fr\/blog\/#\/schema\/person\/a6d10ff07aa69cb7c10371334bbe60f6","name":"Denis Poillerat","url":"https:\/\/www.editions-eni.fr\/blog\/author\/dpoillerat\/"}]}},"_links":{"self":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/comments?post=6520"}],"version-history":[{"count":3,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6520\/revisions"}],"predecessor-version":[{"id":6527,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/posts\/6520\/revisions\/6527"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media\/6521"}],"wp:attachment":[{"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/media?parent=6520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/categories?post=6520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/tags?post=6520"},{"taxonomy":"genre","embeddable":true,"href":"https:\/\/www.editions-eni.fr\/blog\/wp-json\/wp\/v2\/genre?post=6520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}