{"id":3410,"date":"2021-06-28T19:39:32","date_gmt":"2021-06-28T17:39:32","guid":{"rendered":"http:\/\/observatoire-asap.org\/?p=3410"},"modified":"2021-09-28T14:08:53","modified_gmt":"2021-09-28T12:08:53","slug":"de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite","status":"publish","type":"post","link":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/","title":{"rendered":"De l\u2019importance d\u2019une strat\u00e9gie collective en mati\u00e8re de cybers\u00e9curit\u00e9"},"content":{"rendered":"<p style=\"text-align: justify;\">En 2020, en pleine crise sanitaire, le nombre de cyberattaques contre les collectivit\u00e9s locales a augment\u00e9 de 50%. La m\u00e9tropole Aix-Marseille-Provence, la r\u00e9gion Grand Est, le Conseil d\u00e9partemental d\u2019Eure-et-Loire, les villes de Marseille, Vincennes, Angers, la Rochelle, Annecy, Alfortville entre autres ont toutes \u00e9t\u00e9 victimes de cyberattaques organis\u00e9es.&nbsp; En mars 2020, l\u2019AP-HP a fait face \u00e0 une attaque par d\u00e9ni de service (DDoS), les salari\u00e9s en t\u00e9l\u00e9travail \u00e9tant coup\u00e9s de leurs acc\u00e8s \u00e0 distance. En d\u00e9cembre 2020, le Centre hospitalier d\u2019Albertville-Mo\u00fbtiers a \u00e9t\u00e9 lourdement impact\u00e9&nbsp;: nombre d\u2019\u00e9quipements, logiciels, serveurs ont \u00e9t\u00e9 paralys\u00e9s, ainsi que les syst\u00e8mes de deux EHPAD et Unit\u00e9s de soins. En f\u00e9vrier 2021, le Centre hospitalier de Dax (Landes) et l\u2019h\u00f4pital de Villefranche-sur-Sa\u00f4ne ont aussi \u00e9t\u00e9 cibl\u00e9s et leurs services impact\u00e9s.<\/p>\n<p style=\"text-align: justify;\">La gravit\u00e9 du sujet n\u2019est pas \u00e0 d\u00e9montrer, en particulier lorsque les cyberattaques visent des secteurs essentiels \u00e0 l\u2019\u00e9conomie du pays et que peuvent \u00eatre en jeu la vie de milliers de personnes.<\/p>\n<p style=\"text-align: justify;\">L\u2019attaque informatique peut consister \u00e0 rendre les donn\u00e9es indisponibles (atteinte \u00e0 la disponibilit\u00e9 des donn\u00e9es), \u00e0 voler les donn\u00e9es (atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es), voire \u00e0 s\u2019introduire dans un syst\u00e8me d\u2019information de mani\u00e8re frauduleuse pour les modifier (atteinte \u00e0 l\u2019int\u00e9grit\u00e9 des donn\u00e9es). <a href=\"https:\/\/www.lesechos.fr\/tech-medias\/hightech\/flambee-dattaques-informatiques-contre-les-mairies-en-france-1284537\">Le chiffrement des donn\u00e9es suivi d&rsquo;une tentative d&rsquo;extorsion de fonds est la technique employ\u00e9e la plus courante<\/a> (ran\u00e7ongiciel).<\/p>\n<p style=\"text-align: justify;\"><strong>Quel cadre normatif en mati\u00e8re de cybers\u00e9curit\u00e9&nbsp;?<\/strong><\/p>\n<p style=\"text-align: justify;\">Un cadre normatif vise \u00e0 renforcer la cybers\u00e9curit\u00e9 dans le secteur public et le secteur priv\u00e9 pour les activit\u00e9s les plus sensibles, avec notamment&nbsp;:<\/p>\n<ul style=\"text-align: justify;\">\n<li><a href=\"https:\/\/www.defense.gouv.fr\/dgris\/politique-de-defense\/la-loi-de-programmation-militaire-2014-2019-et-son-actualisation\/la-lpm-2014-2019-et-son-actualisation#:~:text=La%20loi%20de%20programmation%20militaire%20est%20la%20premi%C3%A8re%20d%C3%A9clinaison%20concr%C3%A8te,sur%20la%20p%C3%A9riode%202014%2D2019.\">La loi de programmation militaire de 2013<\/a>: elle a impos\u00e9 aux op\u00e9rateurs d\u2019importance vitale (<a href=\"http:\/\/www.sgdsn.gouv.fr\/uploads\/2016\/10\/plaquette-saiv.pdf\">OIV<\/a>) le renforcement de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information critiques qu\u2019ils exploitent ;<\/li>\n<li>La directive sur la s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes d&rsquo;information de 2016 (dite aussi directive <a href=\"https:\/\/www.legifrance.gouv.fr\/jorf\/id\/JORFTEXT000033122937#:~:text=des%20mesures%20...-,Directive%20(UE)%202016%2F1148%20du%20Parlement%20europ%C3%A9en%20et%20du,d'information%20dans%20l'Union\">Network and Information System Security<\/a> \u00ab&nbsp;NIS&nbsp;\u00bb)&nbsp;: elle a \u00e9t\u00e9 une des premi\u00e8res mesures \u00e0 l&rsquo;\u00e9chelle de l&rsquo;UE pour renforcer la coop\u00e9ration entre les \u00c9tats membres en mati\u00e8re de cybers\u00e9curit\u00e9, en instaurant des obligations pour les Op\u00e9rateurs de services qui sont essentiels au fonctionnement de l\u2019\u00e9conomie et de la soci\u00e9t\u00e9 (<a href=\"anssi.fr\">OSE<\/a>) &#8211; dans des secteurs critiques tels que l&rsquo;\u00e9nergie, les transports, la sant\u00e9 ou la finance &#8211; et des Fournisseurs de service num\u00e9rique (<a href=\"Il%20s\u2019agit%20principalement%20d\u2019entreprises%20de%20cloud%20et%20de%20moteurs%20de%20recherche%20ainsi%20que%20des%20marketplaces%20faisant%20plus%20de%2010%20millions%20de%20CA%20ou%20employant%20au%20moins%2050%20salari\u00e9s\">FSN<\/a>)&nbsp;tels que march\u00e9s en ligne, moteurs de recherche et services dans le cloud&nbsp;;<\/li>\n<li>Une loi de transposition de la directive NIS&nbsp;: la loi n\u00b02018-133 du 26 f\u00e9vrier 2018 portant diverses dispositions d&rsquo;adaptation au droit de l\u2019UE dans le domaine de la s\u00e9curit\u00e9 et le d\u00e9cret n\u00b0 2018-384 du 23 mai 2018 relatif \u00e0 la s\u00e9curit\u00e9 des r\u00e9seaux et syst\u00e8mes d&rsquo;information des op\u00e9rateurs de services essentiels et des fournisseurs de service num\u00e9rique&nbsp;;<\/li>\n<li>Le r\u00e8glement (UE) 2019\/881 du 17 avril 2019 relatif \u00e0 l\u2019ENISA (Agence de l\u2019Union europ\u00e9enne pour la cybers\u00e9curit\u00e9) et \u00e0 la certification de cybers\u00e9curit\u00e9 des technologies de l\u2019information et des communications.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">La&nbsp;directive NIS est en cours de r\u00e9vision&nbsp;(\u00ab&nbsp;NIS&nbsp;2&nbsp;\u00bb) pour tenir compte de l&rsquo;\u00e9volution des menaces et de la mutation num\u00e9rique acc\u00e9l\u00e9r\u00e9e par la crise de la COVID-19, la Commission europ\u00e9enne ayant fait une proposition en ce sens en d\u00e9cembre 2020.<\/p>\n<p style=\"text-align: justify;\">Fin mars 2021, le Conseil de l\u2019Union europ\u00e9enne a adopt\u00e9 des conclusions sur la strat\u00e9gie de cybers\u00e9curit\u00e9 de l&rsquo;UE, avec un plan d\u2019actions pour la d\u00e9cennie \u00e0 venir, consistant notamment \u00e0 acc\u00e9l\u00e9rer l&rsquo;adoption des normes cl\u00e9s de s\u00e9curit\u00e9 internet, le chiffrement fort, la coop\u00e9ration avec les organisations internationales et les pays partenaires, la mise en place d\u2019une unit\u00e9 conjointe de cybers\u00e9curit\u00e9, etc.<\/p>\n<p style=\"text-align: justify;\"><strong>Le facteur humain, facteur cl\u00e9 de la strat\u00e9gie cyber<\/strong><\/p>\n<p style=\"text-align: justify;\">En d\u00e9pit de tous les moyens mat\u00e9riels et techniques consacr\u00e9s \u00e0 renforcer la s\u00e9curit\u00e9, le risque z\u00e9ro n\u2019existe pas. La s\u00e9curit\u00e9 informatique passe avant tout par l\u2019humain, par le biais d\u2019une sensibilisation et d\u2019une vigilance accrue de la part des agents et collaborateurs.<\/p>\n<p style=\"text-align: justify;\">A cet effet, l\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information (ANSSI) ne cesse de sensibiliser les acteurs priv\u00e9s comme publics aux mesures de s\u00e9curit\u00e9 et \u00e0 l\u2019hygi\u00e8ne num\u00e9rique. A titre individuel, le dispositif gouvernemental Cybermalveillance.gouv.fr offre une assistance \u00e0 toute victime d\u2019actes de cybermalveillance. En mars 2020, suite \u00e0 plusieurs attaques ciblant des collectivit\u00e9s, l\u2019ANSSI a publi\u00e9 des <a href=\"https:\/\/www.ssi.gouv.fr\/actualite\/lanssi-sensibilise-et-transmet-des-recommandations-de-securite-a-destination-des-collectivites-territoriales\/\">recommandations de s\u00e9curit\u00e9 \u00e0 destination des collectivit\u00e9s territoriales<\/a>. En f\u00e9vrier 2021, l\u2019ANSSI a pr\u00e9sent\u00e9 la strat\u00e9gie fran\u00e7aise pour la cybers\u00e9curit\u00e9 dans le cadre de <a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2021\/02\/anssi-dossier_presse-strategie_nationale_cyber.pdf\">France Relance<\/a>, laquelle pr\u00e9voit de mobiliser un milliard d\u2019euros pour notamment d\u00e9velopper des solutions souveraines de cybers\u00e9curit\u00e9, former aux m\u00e9tiers de la cybers\u00e9curit\u00e9 ou encore soutenir l\u2019adoption de solutions cyber par les entreprises, les collectivit\u00e9s et l\u2019Etat.<\/p>\n<p style=\"text-align: right;\"><a href=\"http:\/\/observatoire-asap.org\/index.php\/2020\/10\/23\/marie-helene-gostiaux\/\">Marie-H\u00e9l\u00e8ne Gostiaux<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En 2020, en pleine crise sanitaire, le nombre de cyberattaques contre les collectivit\u00e9s locales a augment\u00e9 de 50%. La m\u00e9tropole Aix-Marseille-Provence, la r\u00e9gion Grand Est, le Conseil d\u00e9partemental d\u2019Eure-et-Loire, les villes de Marseille, Vincennes, Angers, la Rochelle, Annecy, Alfortville entre autres ont toutes \u00e9t\u00e9 victimes de cyberattaques organis\u00e9es.&nbsp; En mars 2020, l\u2019AP-HP a fait face &hellip; <\/p>\n","protected":false},"author":1,"featured_media":3411,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[10],"tags":[76,81,80,78,83,77,88,53,79,82,74,84],"class_list":["post-3410","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","tag-anssi","tag-cyberattaques","tag-cybersecurite","tag-cybersecurity","tag-ddos","tag-gdpr","tag-juridique","tag-lettre","tag-nis","tag-rancongiciel","tag-rgpd","tag-teletravail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>De l\u2019importance d\u2019une strat\u00e9gie collective en mati\u00e8re de cybers\u00e9curit\u00e9 -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"De l\u2019importance d\u2019une strat\u00e9gie collective en mati\u00e8re de cybers\u00e9curit\u00e9 -\" \/>\n<meta property=\"og:description\" content=\"En 2020, en pleine crise sanitaire, le nombre de cyberattaques contre les collectivit\u00e9s locales a augment\u00e9 de 50%. La m\u00e9tropole Aix-Marseille-Provence, la r\u00e9gion Grand Est, le Conseil d\u00e9partemental d\u2019Eure-et-Loire, les villes de Marseille, Vincennes, Angers, la Rochelle, Annecy, Alfortville entre autres ont toutes \u00e9t\u00e9 victimes de cyberattaques organis\u00e9es.&nbsp; En mars 2020, l\u2019AP-HP a fait face &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/fabrice.hamelin.1\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-28T17:39:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-28T12:08:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/06\/hacking-3112539_1920.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin1337\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin1337\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/\"},\"author\":{\"name\":\"admin1337\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa\"},\"headline\":\"De l\u2019importance d\u2019une strat\u00e9gie collective en mati\u00e8re de cybers\u00e9curit\u00e9\",\"datePublished\":\"2021-06-28T17:39:32+00:00\",\"dateModified\":\"2021-09-28T12:08:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/\"},\"wordCount\":882,\"publisher\":{\"@id\":\"http:\/\/observatoire-asap.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/06\/hacking-3112539_1920.png\",\"keywords\":[\"ANSSI\",\"cyberattaques\",\"cybers\u00e9curit\u00e9\",\"cybersecurity\",\"DDoS\",\"GDPR\",\"juridique\",\"Lettre#\",\"NIS\",\"ran\u00e7ongiciel\",\"RGPD\",\"t\u00e9l\u00e9travail\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/\",\"url\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/\",\"name\":\"De l\u2019importance d\u2019une strat\u00e9gie collective en mati\u00e8re de cybers\u00e9curit\u00e9 -\",\"isPartOf\":{\"@id\":\"http:\/\/observatoire-asap.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/06\/hacking-3112539_1920.png\",\"datePublished\":\"2021-06-28T17:39:32+00:00\",\"dateModified\":\"2021-09-28T12:08:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/06\/hacking-3112539_1920.png\",\"contentUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/06\/hacking-3112539_1920.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/observatoire-asap.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"De l\u2019importance d\u2019une strat\u00e9gie collective en mati\u00e8re de cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/observatoire-asap.org\/#website\",\"url\":\"http:\/\/observatoire-asap.org\/\",\"name\":\"Action Soci\u00e9tale et Action Publique\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\/\/observatoire-asap.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/observatoire-asap.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/observatoire-asap.org\/#organization\",\"name\":\"Laboratoire ASAP\",\"url\":\"http:\/\/observatoire-asap.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png\",\"contentUrl\":\"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png\",\"width\":1345,\"height\":426,\"caption\":\"Laboratoire ASAP\"},\"image\":{\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/fabrice.hamelin.1\"]},{\"@type\":\"Person\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa\",\"name\":\"admin1337\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"http:\/\/observatoire-asap.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g\",\"caption\":\"admin1337\"},\"url\":\"https:\/\/observatoire-asap.org\/index.php\/author\/admin1337\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"De l\u2019importance d\u2019une strat\u00e9gie collective en mati\u00e8re de cybers\u00e9curit\u00e9 -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"De l\u2019importance d\u2019une strat\u00e9gie collective en mati\u00e8re de cybers\u00e9curit\u00e9 -","og_description":"En 2020, en pleine crise sanitaire, le nombre de cyberattaques contre les collectivit\u00e9s locales a augment\u00e9 de 50%. La m\u00e9tropole Aix-Marseille-Provence, la r\u00e9gion Grand Est, le Conseil d\u00e9partemental d\u2019Eure-et-Loire, les villes de Marseille, Vincennes, Angers, la Rochelle, Annecy, Alfortville entre autres ont toutes \u00e9t\u00e9 victimes de cyberattaques organis\u00e9es.&nbsp; En mars 2020, l\u2019AP-HP a fait face &hellip;","og_url":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/","article_publisher":"https:\/\/facebook.com\/fabrice.hamelin.1","article_published_time":"2021-06-28T17:39:32+00:00","article_modified_time":"2021-09-28T12:08:53+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/06\/hacking-3112539_1920.png","type":"image\/png"}],"author":"admin1337","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin1337","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/"},"author":{"name":"admin1337","@id":"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa"},"headline":"De l\u2019importance d\u2019une strat\u00e9gie collective en mati\u00e8re de cybers\u00e9curit\u00e9","datePublished":"2021-06-28T17:39:32+00:00","dateModified":"2021-09-28T12:08:53+00:00","mainEntityOfPage":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/"},"wordCount":882,"publisher":{"@id":"http:\/\/observatoire-asap.org\/#organization"},"image":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/06\/hacking-3112539_1920.png","keywords":["ANSSI","cyberattaques","cybers\u00e9curit\u00e9","cybersecurity","DDoS","GDPR","juridique","Lettre#","NIS","ran\u00e7ongiciel","RGPD","t\u00e9l\u00e9travail"],"articleSection":["Articles"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/","url":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/","name":"De l\u2019importance d\u2019une strat\u00e9gie collective en mati\u00e8re de cybers\u00e9curit\u00e9 -","isPartOf":{"@id":"http:\/\/observatoire-asap.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/06\/hacking-3112539_1920.png","datePublished":"2021-06-28T17:39:32+00:00","dateModified":"2021-09-28T12:08:53+00:00","breadcrumb":{"@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#primaryimage","url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/06\/hacking-3112539_1920.png","contentUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/06\/hacking-3112539_1920.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/observatoire-asap.org\/index.php\/2021\/06\/28\/de-limportance-dune-strategie-collective-en-matiere-de-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/observatoire-asap.org\/"},{"@type":"ListItem","position":2,"name":"De l\u2019importance d\u2019une strat\u00e9gie collective en mati\u00e8re de cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"http:\/\/observatoire-asap.org\/#website","url":"http:\/\/observatoire-asap.org\/","name":"Action Soci\u00e9tale et Action Publique","description":"","publisher":{"@id":"http:\/\/observatoire-asap.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/observatoire-asap.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"http:\/\/observatoire-asap.org\/#organization","name":"Laboratoire ASAP","url":"http:\/\/observatoire-asap.org\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/","url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png","contentUrl":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2022\/01\/cropped-cropped-ASAP_Plan-de-travail-1.png","width":1345,"height":426,"caption":"Laboratoire ASAP"},"image":{"@id":"http:\/\/observatoire-asap.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/fabrice.hamelin.1"]},{"@type":"Person","@id":"http:\/\/observatoire-asap.org\/#\/schema\/person\/fa918dad212f26e33e6b911a2553fafa","name":"admin1337","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"http:\/\/observatoire-asap.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a82292198583820f63704df9cf531b1ab53b8418711096a9618d7584cfd7764?s=96&d=mm&r=g","caption":"admin1337"},"url":"https:\/\/observatoire-asap.org\/index.php\/author\/admin1337\/"}]}},"jetpack_featured_media_url":"https:\/\/observatoire-asap.org\/wp-content\/uploads\/2021\/06\/hacking-3112539_1920.png","_links":{"self":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts\/3410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/comments?post=3410"}],"version-history":[{"count":2,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts\/3410\/revisions"}],"predecessor-version":[{"id":3663,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/posts\/3410\/revisions\/3663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/media\/3411"}],"wp:attachment":[{"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/media?parent=3410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/categories?post=3410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/observatoire-asap.org\/index.php\/wp-json\/wp\/v2\/tags?post=3410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}