{"id":42524,"date":"2025-02-09T15:59:42","date_gmt":"2025-02-09T15:59:42","guid":{"rendered":"https:\/\/www.cyberguru.it\/?page_id=42524"},"modified":"2025-08-25T14:48:52","modified_gmt":"2025-08-25T14:48:52","slug":"formation-du-conseil-nis2-niveau-1","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-1\/","title":{"rendered":"Formation du conseil NIS2 Niveau 1"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/03\/background-2-scaled-1.webp\u00a0\u00bb custom_margin=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb bottom_divider_color=\u00a0\u00bb#0C71C3&Prime; locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb2560px\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb24vh||10vh|10%|false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|||10%|false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|5%||5%|false|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb header_font_size=\u00a0\u00bb60px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||||false|false\u00a0\u00bb header_font_size_tablet=\u00a0\u00bb60px\u00a0\u00bb header_font_size_phone=\u00a0\u00bb42px\u00a0\u00bb header_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1>Formation du conseil NIS2<br \/>Niveau 1<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Formation du conseil NIS2 \/ <span style=\"color: #f18a00;\">Niveau 1<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_color=\u00a0\u00bboff\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-02-2.webp\u00a0\u00bb custom_margin=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb|0px|||false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_padding=\u00a0\u00bb||8px|0px|false|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb1&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb100%\u00a0\u00bb custom_margin=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb|10%||0px|false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|5%||5%|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|5%||5%|false|true\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_css_main_element=\u00a0\u00bbalign-self:center;\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/Lesson_NIS2_FR_2x-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbLesson_NIS2_FR\u00a0\u00bb title_text=\u00a0\u00bbLesson_NIS2_FR\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb|||120px|true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px|||0px|false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|10px||10px|true|true\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_css_main_element=\u00a0\u00bbalign-self:center;\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbCyber Guru NIS2&Prime; alt=\u00a0\u00bbSensibilisation\u00a0\u00bb icon_placement=\u00a0\u00bbleft\u00a0\u00bb image_icon_width=\u00a0\u00bb100%\u00a0\u00bb content_max_width=\u00a0\u00bb60px\u00a0\u00bb image_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_level=\u00a0\u00bbh2&Prime; header_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; header_font_size=\u00a0\u00bb48px\u00a0\u00bb module_alignment=\u00a0\u00bbleft\u00a0\u00bb min_height=\u00a0\u00bb11.4px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|-18px|false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb25px||0px||false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_padding=\u00a0\u00bb||0px|0px|false|false\u00a0\u00bb header_font_size_tablet=\u00a0\u00bb48px\u00a0\u00bb header_font_size_phone=\u00a0\u00bb36px\u00a0\u00bb header_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_css_blurb_image=\u00a0\u00bbwidth:15%;||\u00a0\u00bb custom_css_blurb_content=\u00a0\u00bbmax-width: none !important;||\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22header_text_color%22,%22header_text_color%22%93}\u00a0\u00bb][\/et_pb_blurb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb text_font_size=\u00a0\u00bb16px\u00a0\u00bb custom_margin=\u00a0\u00bb10px||20px||false|false\u00a0\u00bb custom_css_main_element=\u00a0\u00bbfont-weight:400;\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<p><span><span style=\"color: #000000;\">Le cours sur la Directive UE NIS2 aborde le risque cyber, un probl\u00e8me syst\u00e9mique qui menace la stabilit\u00e9 des infrastructures num\u00e9riques. Il vise \u00e0 fournir des connaissances et des comp\u00e9tences manag\u00e9riales pour att\u00e9nuer les risques, en se concentrant sur la r\u00e9glementation, la gestion des risques, la pr\u00e9vention des attaques et les impacts des technologies \u00e9mergentes comme le Cloud et l&rsquo;IA. Le cours s&rsquo;adresse aux entreprises dans le p\u00e9rim\u00e8tre NIS2 et \u00e0 la cha\u00eene d&rsquo;approvisionnement des grands groupes industriels.<\/span> <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_4,1_4,1_4,1_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_cta title=\u00a0\u00bbSECTION I\u00a0\u00bb button_url=\u00a0\u00bb#section-1&Prime; button_text=\u00a0\u00bbEn savoir plus\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_level=\u00a0\u00bbh4&Prime; header_font=\u00a0\u00bbInter||||||||\u00a0\u00bb body_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb body_line_height=\u00a0\u00bb0.8em\u00a0\u00bb background_color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_bg_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb5px\u00a0\u00bb button_font=\u00a0\u00bbInter||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb button_custom_padding=\u00a0\u00bb10px|25px|10px|25px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00a0\u00bb]<\/p>\n<h5><strong>CADRE R\u00c9GLEMENTAIRE<\/strong><\/h5>\n<p><strong>6 Le\u00e7ons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_cta title=\u00a0\u00bbSECTION II\u00a0\u00bb button_url=\u00a0\u00bb#section-2&Prime; button_text=\u00a0\u00bbEn savoir plus\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_level=\u00a0\u00bbh4&Prime; header_font=\u00a0\u00bbInter||||||||\u00a0\u00bb body_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb body_line_height=\u00a0\u00bb0.8em\u00a0\u00bb background_color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_bg_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb5px\u00a0\u00bb button_font=\u00a0\u00bbInter||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb button_custom_padding=\u00a0\u00bb10px|25px|10px|25px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00a0\u00bb]<\/p>\n<h5><strong>RISQUES CYBER<\/strong><\/h5>\n<p><strong>5 Le\u00e7ons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_cta title=\u00a0\u00bbSECTION III\u00a0\u00bb button_url=\u00a0\u00bb#section-3&Prime; button_text=\u00a0\u00bbEn savoir plus\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_level=\u00a0\u00bbh4&Prime; header_font=\u00a0\u00bbInter||||||||\u00a0\u00bb body_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb body_line_height=\u00a0\u00bb0.8em\u00a0\u00bb background_color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_bg_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb5px\u00a0\u00bb button_font=\u00a0\u00bbInter||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb button_custom_padding=\u00a0\u00bb10px|25px|10px|25px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00a0\u00bb]<\/p>\n<h5><strong>ATTAQUES CYBER<\/strong><\/h5>\n<p><strong>4 Le\u00e7ons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_cta title=\u00a0\u00bbSECTION IV\u00a0\u00bb button_url=\u00a0\u00bb#section-4&Prime; button_text=\u00a0\u00bbEn savoir plus\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_level=\u00a0\u00bbh4&Prime; header_font=\u00a0\u00bbInter||||||||\u00a0\u00bb body_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb body_line_height=\u00a0\u00bb0.8em\u00a0\u00bb background_color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_bg_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb5px\u00a0\u00bb button_font=\u00a0\u00bbInter||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb button_custom_padding=\u00a0\u00bb10px|25px|10px|25px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00a0\u00bb]<\/p>\n<h5><strong>CAS CYBER<\/strong><\/h5>\n<p><strong>4 Le\u00e7ons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb background_enable_image=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb module_id=\u00a0\u00bbsection-1&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION I &#8211; CADRE R\u00c9GLEMENTAIRE<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 1 &#8211; <span>LE CONTEXTE R\u00c9GLEMENTAIRE<\/span><\/span><br \/>\n<span>Cette le\u00e7on explore l \u00ab &lsquo;\u00e9volution du cadre r\u00e9glementaire sur la cybers\u00e9curit\u00e9, depuis 2010 jusqu&rsquo;\u00e0 la r\u00e9cente Directive NIS2. Elle analyse les phases cl\u00e9s de la r\u00e9glementation en Italie et met en \u00e9vidence le passage de la protection des infrastructures critiques \u00e0 la sauvegarde de l \u00bb ensemble du syst\u00e8me productif europ\u00e9en, en illustrant les principales diff\u00e9rences entre NIS et NIS2 et les nouvelles obligations pour les op\u00e9rateurs critiques du march\u00e9.  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION I &#8211; CADRE R\u00c9GLEMENTAIRE<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 2 &#8211; LA DIRECTIVE NIS2 (PARTIE I)<\/span><br \/>\nCette le\u00e7on analyse le contenu de la Directive NIS2, qui introduit de nouvelles obligations pour les entreprises et les organismes publics, en d\u00e9finissant \u00e9galement les raisons qui ont conduit l \u00ab &lsquo;UE \u00e0 intervenir pour surmonter certaines limites de la pr\u00e9c\u00e9dente directive NIS, souvent li\u00e9es \u00e0 l \u00bb extr\u00eame discr\u00e9tion laiss\u00e9e aux \u00c9tats membres. Un aper\u00e7u des entit\u00e9s r\u00e9glement\u00e9es est \u00e9galement fourni, avec la distinction entre entit\u00e9s essentielles et entit\u00e9s importantes.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION I &#8211; CADRE R\u00c9GLEMENTAIRE<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 3 &#8211; LA DIRECTIVE NIS2 (PARTIE II)<\/span><br \/>\nCette le\u00e7on introduit le th\u00e8me de la responsabilit\u00e9 des organes de gestion. Avec les mesures de gestion des risques, de signalement des incidents et de supervision, la r\u00e9glementation montre en effet comment les organes de gestion de l&rsquo;entreprise assument un r\u00f4le cl\u00e9 dans la s\u00e9curit\u00e9 informatique. Cette le\u00e7on traite des mesures de s\u00e9curit\u00e9 sp\u00e9cifiques pour la gestion des risques cyber, en se r\u00e9f\u00e9rant particuli\u00e8rement aux politiques sur les risques, \u00e0 la gestion des incidents, \u00e0 la continuit\u00e9 op\u00e9rationnelle et \u00e0 la s\u00e9curit\u00e9 de la cha\u00eene d&rsquo;approvisionnement.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION I &#8211; CADRE R\u00c9GLEMENTAIRE<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 4 &#8211; LA DIRECTIVE NIS2 (PARTIE III)<\/span><br \/>\nCette le\u00e7on fournit des \u00e9l\u00e9ments pr\u00e9cis concernant l \u00ab &lsquo;approche multi-risques, qui comprend les risques physiques, humains et technologiques. L&rsquo;accent est ensuite mis sur les modalit\u00e9s de notification des incidents. Enfin, une attention particuli\u00e8re est port\u00e9e au cadre des sanctions qui s&rsquo;av\u00e8re particuli\u00e8rement s\u00e9v\u00e8re, et ce tant pour les entit\u00e9s essentielles que pour les entit\u00e9s importantes. \u00bb  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION I &#8211; CADRE R\u00c9GLEMENTAIRE<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 5 &#8211; <\/span><span style=\"color: #f18a00;\">TRANSPOSITION DE LA NIS2<\/span><br \/>\nCette le\u00e7on est consacr\u00e9e \u00e0 l&rsquo;approfondissement des dispositions du D\u00e9cret L\u00e9gislatif 138\/2024, en tant que l\u00e9gislation de transposition de la Directive NIS2. La le\u00e7on analyse les \u00e9l\u00e9ments sp\u00e9cifiques introduits par le l\u00e9gislateur italien, d\u00e9finit les r\u00f4les et responsabilit\u00e9s des acteurs impliqu\u00e9s et illustre les cons\u00e9quences du non-respect des dispositions, y compris les sanctions administratives pr\u00e9vues. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION I &#8211; CADRE R\u00c9GLEMENTAIRE<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 6 &#8211;<\/span><span style=\"color: #f18a00;\">LE MOD\u00c8LE ORGANISATIONNEL NIS2<\/span><br \/>\nCette le\u00e7on aborde les changements organisationnels que les entit\u00e9s dans le p\u00e9rim\u00e8tre NIS2 doivent mettre en \u0153uvre, identifie de nouvelles mesures d&rsquo;organisation et de gestion, clarifie pr\u00e9cis\u00e9ment les r\u00f4les et responsabilit\u00e9s pour tous les acteurs impliqu\u00e9s dans le nouveau mod\u00e8le.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb module_id=\u00a0\u00bbsection-2&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION II &#8211; <span>RISQUES CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 1 &#8211; LE RISQUE CYBER<\/span><br \/>La gestion du risque cyber, partie int\u00e9grante des activit\u00e9s de l&rsquo;entreprise, n\u00e9cessite d&rsquo;\u00e9valuer et d&rsquo;att\u00e9nuer les risques d\u00e9coulant des vuln\u00e9rabilit\u00e9s num\u00e9riques exploit\u00e9es intentionnellement par des malveillants. La r\u00e9duction du risque repose sur deux dimensions : r\u00e9duire la probabilit\u00e9 d&rsquo;une attaque par la pr\u00e9vention et la sensibilisation, et limiter l&rsquo;impact par des actifs r\u00e9silients et des meilleures pratiques technologiques. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION II &#8211; <span>RISQUES CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 2 &#8211; L&rsquo;ANALYSE DU RISQUE CYBER<\/span><br \/>L&rsquo;analyse des risques est fondamentale pour comprendre les menaces, les probabilit\u00e9s et les impacts, et d\u00e9finir les contre-mesures. Suivant des normes comme ISO ou NIST, elle s&rsquo;articule en six phases : identifier le contexte et les risques, les analyser, d\u00e9finir les priorit\u00e9s, pr\u00e9parer les r\u00e9ponses et surveiller en continu. Le principal r\u00e9sultat est le Registre des Risques, qui cartographie les risques cyber et non-cyber, essentiel pour les strat\u00e9gies de s\u00e9curit\u00e9 multi-risques comme l&rsquo;exige la NIS2.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION II &#8211; <span>RISQUES CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 3 &#8211; <\/span><span style=\"color: #f18a00;\">LA MESURE DU RISQUE<\/span><br \/>L&rsquo;\u00e9valuation du risque consiste \u00e0 analyser la probabilit\u00e9 et l \u00ab &lsquo;impact d&rsquo;un \u00e9v\u00e9nement adverse pour prendre des d\u00e9cisions \u00e9clair\u00e9es. Les analyses peuvent \u00eatre qualitatives, plus simples mais subjectives, ou quantitatives, plus complexes mais pr\u00e9cises et utiles pour justifier les investissements en att\u00e9nuation. Mesurer le risque aide \u00e0 choisir les meilleures strat\u00e9gies de traitement, r\u00e9duisant l \u00bb incertitude et surmontant les biais li\u00e9s \u00e0 la perception personnelle.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb module_id=\u00a0\u00bbsection-3&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION II &#8211; <span>RISQUES CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 4 &#8211; LES CONTR\u00d4LES DE S\u00c9CURIT\u00c9<\/span><br \/>La gestion des incidents de s\u00e9curit\u00e9 repose sur l&rsquo;analyse des logs g\u00e9n\u00e9r\u00e9s par les infrastructures num\u00e9riques pour identifier et pr\u00e9venir les situations critiques. Le Security Operations Center (SOC) traite les alertes \u00e0 travers un flux op\u00e9rationnel structur\u00e9 en trois phases : analyse pr\u00e9liminaire, analyse d\u00e9taill\u00e9e et d\u00e9finition des actions de confinement et de rem\u00e9diation. L&rsquo;utilisation de l&rsquo;Intelligence Artificielle (IA) aide \u00e0 r\u00e9duire les faux positifs, am\u00e9liorant l&rsquo;efficacit\u00e9 op\u00e9rationnelle.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION II &#8211; <span>RISQUES CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 5 &#8211; LE DOMMAGE<\/span><br \/><span>L \u00ab &lsquo;impact repr\u00e9sente le dommage caus\u00e9 par un \u00e9v\u00e9nement adverse, classifiable en direct, en responsabilit\u00e9 civile, indirect et cons\u00e9cutif. Dans le risque cyber, les dommages se distinguent en propres (interruption d&rsquo;activit\u00e9, restauration des syst\u00e8mes, gestion de l \u00bb incident) et envers les tiers (contentieux, violations de donn\u00e9es). Alors que les dommages mat\u00e9riels sont plus facilement estimables, les dommages immat\u00e9riels n\u00e9cessitent des \u00e9valuations complexes.  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION III &#8211; <span>ATTAQUES CYBER<\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 1 &#8211; <span>LA DYNAMIQUE D&rsquo;UNE ATTAQUE<\/span><\/span><br \/><span>La dynamique du risque cyber suit un mod\u00e8le o\u00f9 une menace exploite un vecteur et une technique pour frapper une vuln\u00e9rabilit\u00e9, g\u00e9n\u00e9rant un dommage. Comprendre les menaces, les vecteurs et les techniques est crucial : les menaces vont des individus aux organisations complexes ; les vecteurs incluent les emails, les applications malveillantes ou les botnets ; les techniques varient du phishing au malware. L&#8217;email est le vecteur le plus commun, tandis que les botnets, compos\u00e9s d&rsquo;appareils compromis, sont utilis\u00e9s pour des attaques comme le DDoS.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION III &#8211; <span>ATTAQUES CYBER<\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 2 &#8211; <span>LES PRINCIPALES TECHNIQUES D&rsquo;ATTAQUE<\/span><\/span><br \/><span>Les techniques d&rsquo;attaque cyber incluent les malwares, l&rsquo;exploitation des vuln\u00e9rabilit\u00e9s et les attaques par d\u00e9ni de service distribu\u00e9 (DDoS). Les malwares, y compris les zero-day, exploitent des vuln\u00e9rabilit\u00e9s inconnues, tandis que les vuln\u00e9rabilit\u00e9s expos\u00e9es sur Internet permettent de d\u00e9rober des donn\u00e9es et d&rsquo;obtenir des acc\u00e8s privil\u00e9gi\u00e9s, souvent par l&rsquo;ing\u00e9nierie sociale. Les DDoS surchargent les infrastructures ou les applications, les rendant inutilisables.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION III &#8211; <span>ATTAQUES CYBER<\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 3 &#8211; <span>LES VULN\u00c9RABILIT\u00c9S<\/span><\/span><br \/><span>Les vuln\u00e9rabilit\u00e9s ne repr\u00e9sentent un risque que si elles ne sont pas att\u00e9nu\u00e9es par des contr\u00f4les techniques ou proc\u00e9duraux. Leur cycle de vie traverse quatre phases : d\u00e9couverte, divulgation, identification de la contre-mesure et application, les deux premi\u00e8res \u00e9tant particuli\u00e8rement critiques. La gestion efficace des vuln\u00e9rabilit\u00e9s n\u00e9cessite un processus industrialis\u00e9, bas\u00e9 sur des mises \u00e0 jour constantes, des inventaires complets des actifs et une strat\u00e9gie bas\u00e9e sur les priorit\u00e9s.  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION III &#8211; <span>ATTAQUES CYBER<\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 4 &#8211; <span>LES INCIDENTS DE S\u00c9CURIT\u00c9<\/span><\/span><br \/><span>La gestion des incidents de s\u00e9curit\u00e9 repose sur l \u00ab &lsquo;analyse des logs produits par les infrastructures num\u00e9riques, utilis\u00e9s pour identifier et pr\u00e9venir les situations critiques. Le Security Operation Center (SOC) traite les alertes \u00e0 travers un flux op\u00e9rationnel articul\u00e9 en trois phases : analyse pr\u00e9liminaire, analyse d\u00e9taill\u00e9e et d\u00e9finition des actions de confinement et de rem\u00e9diation. L \u00bb utilisation de l \u00ab &lsquo;Intelligence Artificielle r\u00e9duit les faux positifs, am\u00e9liorant l \u00bb efficacit\u00e9.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb module_id=\u00a0\u00bbsection-4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION IV &#8211; <span>CAS CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 1 &#8211; <span>FRAUDE AU PDG<\/span><\/span><br \/><span>Un cybercriminel compromet ou falsifie l&#8217;email du PDG ou d&rsquo;un autre membre du conseil d&rsquo;administration et envoie un email urgent au directeur financier ou \u00e0 un dirigeant financier, ordonnant un virement de millions d&rsquo;euros vers un compte \u00e0 l&rsquo;\u00e9tranger.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION IV &#8211; <span>CAS CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb custom_padding=\u00a0\u00bb||0px|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 2 &#8211; <span>ATTAQUE PAR RAN\u00c7ONGICIEL AVEC CHANTAGE<\/span><\/span><br \/><span>Une entreprise leader dans le secteur \u00e9nerg\u00e9tique subit une attaque par ran\u00e7ongiciel qui bloque les syst\u00e8mes informatiques et paralyse les op\u00e9rations. Les criminels menacent de publier des donn\u00e9es sensibles du conseil d&rsquo;administration si la ran\u00e7on n&rsquo;est pas pay\u00e9e. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION IV &#8211; <span>CAS CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 3 &#8211; <span>ATTAQUE DE LA CHA\u00ceNE D&rsquo;APPROVISIONNEMENT<\/span><\/span><br \/><span>Un fournisseur de services cloud utilis\u00e9 par l&rsquo;entreprise subit une attaque. Les pirates utilisent ses identifiants pour acc\u00e9der aux donn\u00e9es confidentielles du conseil d&rsquo;administration et des clients strat\u00e9giques. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION IV &#8211; <span>CAS CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\"><span>LE\u00c7ON 4 &#8211; VIOLATION DE DONN\u00c9ES<\/span> <\/span><br \/><span>Une attaque cibl\u00e9e d\u00e9robe des donn\u00e9es financi\u00e8res et personnelles des membres du conseil d&rsquo;administration. La presse en prend connaissance et l&rsquo;entreprise subit un pr\u00e9judice r\u00e9putationnel, en plus des risques pour non-conformit\u00e9 \u00e0 la NIS2 et au RGPD. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_image=\u00a0\u00bboff\u00a0\u00bb background_position=\u00a0\u00bbbottom_center\u00a0\u00bb custom_padding=\u00a0\u00bb50px||50px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00a0\u00bb alt=\u00a0\u00bbPlus d&apos;informations\u00a0\u00bb title_text=\u00a0\u00bbPlus d&apos;informations\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb positioning=\u00a0\u00bbabsolute\u00a0\u00bb position_origin_a=\u00a0\u00bbbottom_right\u00a0\u00bb vertical_offset=\u00a0\u00bb-200px\u00a0\u00bb horizontal_offset=\u00a0\u00bb85px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb-55px\u00a0\u00bb vertical_offset_phone=\u00a0\u00bb-90px\u00a0\u00bb vertical_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb horizontal_offset_tablet=\u00a0\u00bb-55px\u00a0\u00bb horizontal_offset_phone=\u00a0\u00bb-50px\u00a0\u00bb horizontal_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_a_tablet=\u00a0\u00bbtop_left\u00a0\u00bb position_origin_a_phone=\u00a0\u00bbtop_left\u00a0\u00bb position_origin_a_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_f_tablet=\u00a0\u00bb\u00a0\u00bb position_origin_f_phone=\u00a0\u00bb\u00a0\u00bb position_origin_f_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_r_tablet=\u00a0\u00bb\u00a0\u00bb position_origin_r_phone=\u00a0\u00bb\u00a0\u00bb position_origin_r_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb positioning_tablet=\u00a0\u00bbabsolute\u00a0\u00bb positioning_phone=\u00a0\u00bbabsolute\u00a0\u00bb positioning_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb admin_label=\u00a0\u00bbLigne\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb70px|170px|0px|170px|false|true\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|100px||100px|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb70px|20px|0px|20px|false|true\u00a0\u00bb border_radii=\u00a0\u00bboff|10px|10px||\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset2&Prime; box_shadow_horizontal=\u00a0\u00bb0px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik|300|||||||\u00a0\u00bb text_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; text_font_size=\u00a0\u00bb20px\u00a0\u00bb header_2_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; header_2_font_size=\u00a0\u00bb48px\u00a0\u00bb header_2_line_height=\u00a0\u00bb58px\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||25px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb||0px||false|false\u00a0\u00bb header_2_font_size_tablet=\u00a0\u00bb48px\u00a0\u00bb header_2_font_size_phone=\u00a0\u00bb32px\u00a0\u00bb header_2_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb header_2_line_height_tablet=\u00a0\u00bb58px\u00a0\u00bb header_2_line_height_phone=\u00a0\u00bb35px\u00a0\u00bb header_2_line_height_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">Vous voulez en savoir plus ?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin=\u00a0\u00bb0px||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px|160px|70px|160px|false|true\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb0px|160px|70px|160px|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px|0px|70px|0px|false|true\u00a0\u00bb border_radii=\u00a0\u00bboff|||15px|15px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset2&Prime; box_shadow_horizontal=\u00a0\u00bb1px\u00a0\u00bb box_shadow_vertical=\u00a0\u00bb20px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbCONTACTEZ-NOUS\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#f18a00&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik|||on|||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQ5MzU4In19@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbFICHE DE DONN\u00c9ES\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#f18a00&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik|||on|||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; custom_css_main_element=\u00a0\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQyNzMxIn19@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbDEMANDER UNE D\u00c9MONSTRATION\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik|||on|||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00a0\u00bb alt=\u00a0\u00bbVous voulez savoir\u00a0\u00bb title_text=\u00a0\u00bbVous voulez savoir\u00a0\u00bb align=\u00a0\u00bbright\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb positioning=\u00a0\u00bbabsolute\u00a0\u00bb position_origin_a=\u00a0\u00bbbottom_right\u00a0\u00bb vertical_offset=\u00a0\u00bb-20px\u00a0\u00bb horizontal_offset=\u00a0\u00bb-100px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb-20px\u00a0\u00bb vertical_offset_phone=\u00a0\u00bb-80px\u00a0\u00bb vertical_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb horizontal_offset_tablet=\u00a0\u00bb-100px\u00a0\u00bb horizontal_offset_phone=\u00a0\u00bb-130px\u00a0\u00bb horizontal_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb width=\u00a0\u00bb25%\u00a0\u00bb width_tablet=\u00a0\u00bb25%\u00a0\u00bb width_phone=\u00a0\u00bb25%\u00a0\u00bb width_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Formation du conseil NIS2Niveau 1Formation du conseil NIS2 \/ Niveau 1Le cours sur la Directive UE NIS2 aborde le risque cyber, un probl\u00e8me syst\u00e9mique qui menace la stabilit\u00e9 des infrastructures num\u00e9riques. Il vise \u00e0 fournir des connaissances et des comp\u00e9tences manag\u00e9riales pour att\u00e9nuer les risques, en se concentrant sur la r\u00e9glementation, la gestion des risques, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-42524","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Formation du conseil NIS2 Niveau 1 - Cyber Guru<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les le\u00e7ons de Formation du conseil NIS2 pour relever les d\u00e9fis num\u00e9riques et am\u00e9liorer la r\u00e9silience de l&#039;entreprise face aux menaces cyber\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-1\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Formation du conseil NIS2 Niveau 1\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les le\u00e7ons de Formation du conseil NIS2 pour relever les d\u00e9fis num\u00e9riques et am\u00e9liorer la r\u00e9silience de l&#039;entreprise face aux menaces cyber\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-25T14:48:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/formation-du-conseil-nis2-niveau-1\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/formation-du-conseil-nis2-niveau-1\\\/\",\"name\":\"Formation du conseil NIS2 Niveau 1 - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"datePublished\":\"2025-02-09T15:59:42+00:00\",\"dateModified\":\"2025-08-25T14:48:52+00:00\",\"description\":\"D\u00e9couvrez les le\u00e7ons de Formation du conseil NIS2 pour relever les d\u00e9fis num\u00e9riques et am\u00e9liorer la r\u00e9silience de l'entreprise face aux menaces cyber\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/formation-du-conseil-nis2-niveau-1\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/formation-du-conseil-nis2-niveau-1\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/formation-du-conseil-nis2-niveau-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formation du conseil NIS2 Niveau 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Formation du conseil NIS2 Niveau 1 - Cyber Guru","description":"D\u00e9couvrez les le\u00e7ons de Formation du conseil NIS2 pour relever les d\u00e9fis num\u00e9riques et am\u00e9liorer la r\u00e9silience de l'entreprise face aux menaces cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-1\/","og_locale":"fr_FR","og_type":"article","og_title":"Formation du conseil NIS2 Niveau 1","og_description":"D\u00e9couvrez les le\u00e7ons de Formation du conseil NIS2 pour relever les d\u00e9fis num\u00e9riques et am\u00e9liorer la r\u00e9silience de l'entreprise face aux menaces cyber","og_url":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-1\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-08-25T14:48:52+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-1\/","url":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-1\/","name":"Formation du conseil NIS2 Niveau 1 - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"datePublished":"2025-02-09T15:59:42+00:00","dateModified":"2025-08-25T14:48:52+00:00","description":"D\u00e9couvrez les le\u00e7ons de Formation du conseil NIS2 pour relever les d\u00e9fis num\u00e9riques et am\u00e9liorer la r\u00e9silience de l'entreprise face aux menaces cyber","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-1\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Formation du conseil NIS2 Niveau 1"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/42524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=42524"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/42524\/revisions"}],"predecessor-version":[{"id":49371,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/42524\/revisions\/49371"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=42524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}