{"id":42865,"date":"2025-02-19T14:47:16","date_gmt":"2025-02-19T14:47:16","guid":{"rendered":"https:\/\/www.cyberguru.it\/?page_id=42865"},"modified":"2025-08-25T15:17:46","modified_gmt":"2025-08-25T15:17:46","slug":"formation-du-conseil-nis2-niveau-2","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-2\/","title":{"rendered":"Formation du conseil NIS2 Niveau 2"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/03\/background-2-scaled-1.webp\u00a0\u00bb custom_margin=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb bottom_divider_color=\u00a0\u00bb#0C71C3&Prime; locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb2560px\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb24vh||10vh|10%|false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|||10%|false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|5%||5%|false|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb header_font_size=\u00a0\u00bb60px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||||false|false\u00a0\u00bb header_font_size_tablet=\u00a0\u00bb60px\u00a0\u00bb header_font_size_phone=\u00a0\u00bb42px\u00a0\u00bb header_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1>Formation du conseil NIS2<br \/>Niveau 2<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Formation du conseil NIS2 \/ <span style=\"color: #f18a00;\">Niveau 2<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_color=\u00a0\u00bboff\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-02-2.webp\u00a0\u00bb custom_margin=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb|0px|||false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_padding=\u00a0\u00bb||8px|0px|false|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb1&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb100%\u00a0\u00bb custom_margin=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb|10%||0px|false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|5%||5%|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|5%||5%|false|true\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_css_main_element=\u00a0\u00bbalign-self:center;\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/NIS2_Login_FR_2x-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbNIS2_Login_FR\u00a0\u00bb title_text=\u00a0\u00bbNIS2_Login_FR\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb|||120px|true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px|||0px|false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|10px||10px|true|true\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_css_main_element=\u00a0\u00bbalign-self:center;\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbCyber Guru NIS2&Prime; alt=\u00a0\u00bbSensibilisation\u00a0\u00bb icon_placement=\u00a0\u00bbleft\u00a0\u00bb image_icon_width=\u00a0\u00bb100%\u00a0\u00bb content_max_width=\u00a0\u00bb60px\u00a0\u00bb image_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_level=\u00a0\u00bbh2&Prime; header_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; header_font_size=\u00a0\u00bb48px\u00a0\u00bb module_alignment=\u00a0\u00bbleft\u00a0\u00bb min_height=\u00a0\u00bb11.4px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|-18px|false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb25px||0px||false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_padding=\u00a0\u00bb||0px|0px|false|false\u00a0\u00bb header_font_size_tablet=\u00a0\u00bb48px\u00a0\u00bb header_font_size_phone=\u00a0\u00bb36px\u00a0\u00bb header_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_css_blurb_image=\u00a0\u00bbwidth:15%;||\u00a0\u00bb custom_css_blurb_content=\u00a0\u00bbmax-width: none !important;||\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22header_text_color%22,%22header_text_color%22%93}\u00a0\u00bb][\/et_pb_blurb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb text_font_size=\u00a0\u00bb16px\u00a0\u00bb custom_margin=\u00a0\u00bb10px||20px||false|false\u00a0\u00bb custom_css_main_element=\u00a0\u00bbfont-weight:400;\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}\u00a0\u00bb]<\/p>\n<p><span style=\"color: #000000;\">Le niveau II du cours NIS2 aborde les d\u00e9fis de la protection num\u00e9rique, en combinant gouvernance, technologies avanc\u00e9es et sensibilisation aux risques cyber. Il vise \u00e0 fournir des comp\u00e9tences pour g\u00e9rer les menaces informatiques \u00e0 travers des strat\u00e9gies de gouvernance, l&rsquo;utilisation de l \u00ab Intelligence Artificielle et l&rsquo;analyse de cas r\u00e9els avec un accent sur la r\u00e9glementation, la gestion des risques et les techniques d&rsquo;attaque, pour renforcer la r\u00e9silience de l&rsquo;entreprise. L \u00bb objectif du cours est d&rsquo;accro\u00eetre la sensibilisation \u00e0 la s\u00e9curit\u00e9 et de cr\u00e9er une culture de la s\u00e9curit\u00e9 efficace contre les menaces cyber en constante \u00e9volution.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_4,1_4,1_4,1_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_cta title=\u00a0\u00bbSECTION I\u00a0\u00bb button_url=\u00a0\u00bb#section-1&Prime; button_text=\u00a0\u00bbEn savoir plus\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_level=\u00a0\u00bbh4&Prime; header_font=\u00a0\u00bbInter||||||||\u00a0\u00bb body_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb body_line_height=\u00a0\u00bb0.8em\u00a0\u00bb background_color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_bg_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb5px\u00a0\u00bb button_font=\u00a0\u00bbInter||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb button_custom_padding=\u00a0\u00bb10px|25px|10px|25px|true|true\u00a0\u00bb min_height=\u00a0\u00bb223.4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00a0\u00bb]<\/p>\n<h5><strong>S\u00c9CURIT\u00c9 CYBER INT\u00c9GR\u00c9E<\/strong><\/h5>\n<p><strong>3 Le\u00e7ons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_cta title=\u00a0\u00bbSECTION II\u00a0\u00bb button_url=\u00a0\u00bb#section-2&Prime; button_text=\u00a0\u00bbEn savoir plus\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_level=\u00a0\u00bbh4&Prime; header_font=\u00a0\u00bbInter||||||||\u00a0\u00bb body_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb body_line_height=\u00a0\u00bb0.8em\u00a0\u00bb background_color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_bg_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb5px\u00a0\u00bb button_font=\u00a0\u00bbInter||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb button_custom_padding=\u00a0\u00bb10px|25px|10px|25px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00a0\u00bb]<\/p>\n<h5><strong>DE LA GOUVERNANCE \u00c0 L&rsquo;IA<\/strong><\/h5>\n<p><strong>3 Le\u00e7ons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_cta title=\u00a0\u00bbSECTION III\u00a0\u00bb button_url=\u00a0\u00bb#section-3&Prime; button_text=\u00a0\u00bbEn savoir plus\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_level=\u00a0\u00bbh4&Prime; header_font=\u00a0\u00bbInter||||||||\u00a0\u00bb body_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb body_line_height=\u00a0\u00bb0.8em\u00a0\u00bb background_color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_bg_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb5px\u00a0\u00bb button_font=\u00a0\u00bbInter||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb button_custom_padding=\u00a0\u00bb10px|25px|10px|25px|true|true\u00a0\u00bb min_height=\u00a0\u00bb226.4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00a0\u00bb]<\/p>\n<h5><strong>CAS CYBER<\/strong><\/h5>\n<p><strong>4 Le\u00e7ons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_cta title=\u00a0\u00bbSECTION IV\u00a0\u00bb button_url=\u00a0\u00bb#section-4&Prime; button_text=\u00a0\u00bbEn savoir plus\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_level=\u00a0\u00bbh4&Prime; header_font=\u00a0\u00bbInter||||||||\u00a0\u00bb body_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb body_text_align=\u00a0\u00bbcenter\u00a0\u00bb body_line_height=\u00a0\u00bb0.8em\u00a0\u00bb background_color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb16px\u00a0\u00bb button_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_bg_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb5px\u00a0\u00bb button_font=\u00a0\u00bbInter||||||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb button_custom_padding=\u00a0\u00bb10px|25px|10px|25px|true|true\u00a0\u00bb min_height=\u00a0\u00bb225.4px\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00a0\u00bb]<\/p>\n<h5><strong>SECURITY AWARENESS<\/strong><\/h5>\n<p><strong>6 Le\u00e7ons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb background_enable_image=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb module_id=\u00a0\u00bbsection-1&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb custom_padding=\u00a0\u00bb||0px|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION I &#8211; <span>S\u00c9CURIT\u00c9 CYBER INT\u00c9GR\u00c9E<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 1 &#8211; <span>LA S\u00c9CURIT\u00c9 DE LA SUPPLY CHAIN<\/span><\/span><br \/><span>La s\u00e9curit\u00e9 de la supply chain est cruciale dans le risque cyber, comme le soulignent la NIS2 et les frameworks de s\u00e9curit\u00e9. La gestion de la supply chain n\u00e9cessite l&rsquo;implication de la cybers\u00e9curit\u00e9 d\u00e8s la s\u00e9lection des partenaires et une strat\u00e9gie qui inclut des tests pr\u00e9liminaires, l&rsquo;analyse des vuln\u00e9rabilit\u00e9s et des tests de p\u00e9n\u00e9tration avant l&rsquo;int\u00e9gration. Les contrats et NDA doivent formaliser les exigences de s\u00e9curit\u00e9 et pr\u00e9voir des v\u00e9rifications continues.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION I &#8211; <span>S\u00c9CURIT\u00c9 CYBER INT\u00c9GR\u00c9E<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 2 &#8211; <span>L&rsquo;IDENTIT\u00c9 NUM\u00c9RIQUE<\/span><\/span><br \/><span>L&rsquo;Identit\u00e9 Num\u00e9rique est le nouveau p\u00e9rim\u00e8tre de s\u00e9curit\u00e9 pour les organisations, et l&rsquo;approche Zero Trust garantit des acc\u00e8s s\u00e9curis\u00e9s en authentifiant et autorisant chaque op\u00e9ration selon les principes de moindre privil\u00e8ge et need to know, pr\u00e9venant les risques li\u00e9s aux stratifications technologiques et aux permissions excessives. Les outils cl\u00e9s comme le Directory Service pour la gestion des identit\u00e9s, l&rsquo;IAM pour les permissions applicatives, le PAM pour les acc\u00e8s administratifs et le Conditional Access. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION I &#8211; <span>S\u00c9CURIT\u00c9 CYBER INT\u00c9GR\u00c9E<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 3 &#8211; <span>SECURITY BY DESIGN<\/span><\/span><br \/><span>Le principe de Security by Design pr\u00e9voit que la s\u00e9curit\u00e9 soit int\u00e9gr\u00e9e d\u00e8s la phase de conception de logiciels, d&rsquo;infrastructures et de processus, sauvegardant la confidentialit\u00e9, l&rsquo;int\u00e9grit\u00e9, la disponibilit\u00e9 et la r\u00e9silience des donn\u00e9es. Cette approche rigoureuse et disciplin\u00e9e est essentielle pour r\u00e9duire les risques cyber et les co\u00fbts d&rsquo;interventions ult\u00e9rieures, s&rsquo;appliquant \u00e0 chaque phase, de l&rsquo;id\u00e9ation \u00e0 la livraison, incluant l&rsquo;analyse du contexte et des risques, la d\u00e9finition des exigences de s\u00e9curit\u00e9, le traitement et l&rsquo;acceptation du risque r\u00e9siduel. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb module_id=\u00a0\u00bbsection-2&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION II &#8211; <span>DE LA GOUVERNANCE \u00c0 L&rsquo;IA<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 1 &#8211; <\/span><span style=\"color: #f18a00;\">LES PERSONNES<\/span><br \/><span>La gestion du risque cyber n\u00e9cessite non seulement des solutions technologiques, mais aussi la gouvernance et l&rsquo;implication des personnes. Le Cybersecurity Governance Framework, compos\u00e9 de lignes directrices, de politiques et de proc\u00e9dures, organise les r\u00e8gles pour prot\u00e9ger les donn\u00e9es et les infrastructures. Cependant, des comportements inad\u00e9quats peuvent compromettre les investissements en s\u00e9curit\u00e9.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION II &#8211; <span>DE LA GOUVERNANCE \u00c0 L&rsquo;IA<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 2 &#8211; <\/span><span style=\"color: #f18a00;\">LE CLOUD<\/span><br \/><span>Auparavant, la strat\u00e9gie cloud visait \u00e0 r\u00e9duire les co\u00fbts en fermant les centres de donn\u00e9es, mais la complexit\u00e9 technologique et \u00e9conomique a rendu cette approche obsol\u00e8te. Aujourd&rsquo;hui, avec la transformation num\u00e9rique, le cloud est indispensable pour garantir rapidit\u00e9 et flexibilit\u00e9. Les entreprises adoptent une \u00ab Cloud Economy \u00bb bas\u00e9e sur des composants modulaires et r\u00e9utilisables, s&rsquo;adaptant au time to market et concevant des services agiles et temporaires.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION II &#8211; <span>DE LA GOUVERNANCE \u00c0 L&rsquo;IA<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 3 &#8211; <span>IA ET CYBERS\u00c9CURIT\u00c9<\/span><\/span><br \/><span>L&rsquo;Intelligence Artificielle r\u00e9volutionne la cybers\u00e9curit\u00e9, avec des outils de Machine Learning et des mod\u00e8les de langage (LLM) qui analysent de gros volumes de donn\u00e9es, r\u00e9duisent les faux positifs et soutiennent des activit\u00e9s comme la s\u00e9lection des contr\u00f4les de s\u00e9curit\u00e9, la r\u00e9daction de politiques et la navigation r\u00e9glementaire. Les agents IA peuvent accompagner ou remplacer les \u00e9quipes de premier niveau dans les Security Operation Center, acc\u00e9l\u00e9rant la r\u00e9ponse aux menaces, et am\u00e9liorer la Threat Intelligence pour pr\u00e9venir les attaques.  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb module_id=\u00a0\u00bbsection-3&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION III &#8211; <span>CAS CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 1 &#8211; <span>DEEPFAKE ET MANIPULATION<\/span><\/span><br \/><span>Un deepfake ultra-r\u00e9aliste du PDG appara\u00eet dans une vid\u00e9o, annon\u00e7ant une fausse acquisition. Les actions de l&rsquo;entreprise s&rsquo;effondrent et le Conseil est contraint d&rsquo;intervenir rapidement. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION III &#8211; <span>CAS CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 2 &#8211; <span>ATTAQUE SUR LES APPAREILS PERSONNELS<\/span><\/span><br \/><span>Un membre du Conseil acc\u00e8de au r\u00e9seau de l&rsquo;entreprise depuis sa tablette personnelle non mise \u00e0 jour. Un malware s&rsquo;infiltre dans les syst\u00e8mes, permettant aux pirates d&rsquo;espionner les r\u00e9unions strat\u00e9giques. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION III &#8211; <span>CAS CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 3 &#8211; <span>PHISHING CIBL\u00c9<\/span><\/span><br \/><span>Un membre du Conseil re\u00e7oit un e-mail bien structur\u00e9, apparemment d&rsquo;un partenaire strat\u00e9gique, avec une pi\u00e8ce jointe infect\u00e9e. En ouvrant le fichier, les pirates obtiennent l&rsquo;acc\u00e8s aux documents confidentiels du Conseil. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION III &#8211; <span>CAS CYBER<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 4 &#8211; <span>MENACE INTERNE<\/span><\/span><br \/><span>Un cadre sup\u00e9rieur commence \u00e0 se comporter de mani\u00e8re suspecte. Peu apr\u00e8s, on d\u00e9couvre qu&rsquo;il a exfiltr\u00e9 des donn\u00e9es sensibles sur les strat\u00e9gies de l&rsquo;entreprise et les a vendues \u00e0 un concurrent ou \u00e0 un acteur \u00e9tatique hostile. L&rsquo;entreprise subit un grave pr\u00e9judice concurrentiel et risque des r\u00e9percussions juridiques.  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 1 &#8211; <span>SPEAR PHISHING AVANC\u00c9<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">Le Spear Phishing est une technique avanc\u00e9e d&rsquo;attaque informatique qui cible des personnes sp\u00e9cifiques avec des emails ou messages hautement personnalis\u00e9s. Les hackers collectent des informations sur les victimes depuis les r\u00e9seaux sociaux, sites web ou fuites de donn\u00e9es, rendant les communications extr\u00eamement cr\u00e9dibles. L&rsquo;objectif est d&rsquo;inciter la cible \u00e0 cliquer sur des liens malveillants, t\u00e9l\u00e9charger des malwares ou fournir des identifiants confidentiels.  <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 2 &#8211; <span>IA ET PROTECTION DES DONN\u00c9ES<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">L&rsquo;Intelligence Artificielle transforme la gestion et la protection des donn\u00e9es, mais soul\u00e8ve aussi des d\u00e9fis cruciaux pour la vie priv\u00e9e et la s\u00e9curit\u00e9. Les algorithmes IA analysent d&rsquo;\u00e9normes volumes d&rsquo;informations, optimisant la cybers\u00e9curit\u00e9 avec la d\u00e9tection avanc\u00e9e des menaces, la r\u00e9duction des faux positifs et l&rsquo;automatisation de la r\u00e9ponse aux attaques.  <\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb module_id=\u00a0\u00bbsection-4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 3 &#8211; <span>ING\u00c9NIERIE SOCIALE<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">L&rsquo;ing\u00e9nierie sociale est une technique d&rsquo;attaque qui exploite la manipulation psychologique pour obtenir l&rsquo;acc\u00e8s \u00e0 des informations confidentielles, des syst\u00e8mes d&rsquo;entreprise ou des ressources sensibles. Les pirates n&rsquo;attaquent pas directement la technologie, mais s&rsquo;infiltrent dans les organisations en exploitant la confiance, l&rsquo;inattention ou la pression psychologique des employ\u00e9s. <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 4 &#8211; <span>BRING YOUR OWN DEVICE (BYOD)<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">Le BYOD permet d&rsquo;utiliser des appareils personnels pour acc\u00e9der aux r\u00e9seaux et donn\u00e9es de l&rsquo;entreprise, am\u00e9liorant la flexibilit\u00e9 et la productivit\u00e9. Cependant, cette pratique introduit des risques significatifs pour la cybers\u00e9curit\u00e9, car les ordinateurs portables, smartphones et tablettes personnels ne respectent souvent pas les normes de s\u00e9curit\u00e9 de l&rsquo;entreprise. Sans contr\u00f4les ad\u00e9quats, le BYOD peut exposer l&rsquo;entreprise aux malwares, au vol de donn\u00e9es et aux acc\u00e8s non autoris\u00e9s.   <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 5 &#8211; <span>AUTHENTIFICATION<\/span> <\/span><br \/><span>Les syst\u00e8mes d&rsquo;authentification prot\u00e8gent l&rsquo;acc\u00e8s aux r\u00e9seaux, donn\u00e9es et applications de l&rsquo;entreprise, garantissant que seuls les utilisateurs autoris\u00e9s peuvent op\u00e9rer. Les m\u00e9thodes traditionnelles bas\u00e9es sur les mots de passe sont de plus en plus vuln\u00e9rables au phishing, \u00e0 la force brute et au bourrage d&rsquo;identifiants, rendant n\u00e9cessaire une approche plus s\u00e9curis\u00e9e. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb20px|20px|20px|20px|true|true\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbInter||||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb custom_padding=\u00a0\u00bb||0px|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LE\u00c7ON 6 &#8211; <span>ATTAQUE ADVERSARIALE<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">Les Attaques Adversariales sont des attaques sophistiqu\u00e9es qui manipulent les mod\u00e8les d&rsquo;Intelligence Artificielle (IA) en ins\u00e9rant des donn\u00e9es trompeuses pour alt\u00e9rer leur comportement. Ces attaques exploitent les vuln\u00e9rabilit\u00e9s dans les algorithmes de Machine Learning, induisant des erreurs dans les syst\u00e8mes de reconnaissance faciale, l&rsquo;analyse des menaces ou la cybers\u00e9curit\u00e9 automatis\u00e9e. <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_image=\u00a0\u00bboff\u00a0\u00bb background_position=\u00a0\u00bbbottom_center\u00a0\u00bb custom_padding=\u00a0\u00bb50px||50px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00a0\u00bb alt=\u00a0\u00bbPlus d&apos;informations\u00a0\u00bb title_text=\u00a0\u00bbPlus d&apos;informations\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb positioning=\u00a0\u00bbabsolute\u00a0\u00bb position_origin_a=\u00a0\u00bbbottom_right\u00a0\u00bb vertical_offset=\u00a0\u00bb-200px\u00a0\u00bb horizontal_offset=\u00a0\u00bb85px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb-55px\u00a0\u00bb vertical_offset_phone=\u00a0\u00bb-90px\u00a0\u00bb vertical_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb horizontal_offset_tablet=\u00a0\u00bb-55px\u00a0\u00bb horizontal_offset_phone=\u00a0\u00bb-50px\u00a0\u00bb horizontal_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_a_tablet=\u00a0\u00bbtop_left\u00a0\u00bb position_origin_a_phone=\u00a0\u00bbtop_left\u00a0\u00bb position_origin_a_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_f_tablet=\u00a0\u00bb\u00a0\u00bb position_origin_f_phone=\u00a0\u00bb\u00a0\u00bb position_origin_f_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_r_tablet=\u00a0\u00bb\u00a0\u00bb position_origin_r_phone=\u00a0\u00bb\u00a0\u00bb position_origin_r_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb positioning_tablet=\u00a0\u00bbabsolute\u00a0\u00bb positioning_phone=\u00a0\u00bbabsolute\u00a0\u00bb positioning_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb admin_label=\u00a0\u00bbLigne\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb70px|170px|0px|170px|false|true\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|100px||100px|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb70px|20px|0px|20px|false|true\u00a0\u00bb border_radii=\u00a0\u00bboff|10px|10px||\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset2&Prime; box_shadow_horizontal=\u00a0\u00bb0px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik|300|||||||\u00a0\u00bb text_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; text_font_size=\u00a0\u00bb20px\u00a0\u00bb header_2_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; header_2_font_size=\u00a0\u00bb48px\u00a0\u00bb header_2_line_height=\u00a0\u00bb58px\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||25px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb||0px||false|false\u00a0\u00bb header_2_font_size_tablet=\u00a0\u00bb48px\u00a0\u00bb header_2_font_size_phone=\u00a0\u00bb32px\u00a0\u00bb header_2_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb header_2_line_height_tablet=\u00a0\u00bb58px\u00a0\u00bb header_2_line_height_phone=\u00a0\u00bb35px\u00a0\u00bb header_2_line_height_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">Vous voulez en savoir plus ?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin=\u00a0\u00bb0px||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px|160px|70px|160px|false|true\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb0px|160px|70px|160px|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px|0px|70px|0px|false|true\u00a0\u00bb border_radii=\u00a0\u00bboff|||15px|15px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset2&Prime; box_shadow_horizontal=\u00a0\u00bb1px\u00a0\u00bb box_shadow_vertical=\u00a0\u00bb20px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbCONTACTEZ-NOUS\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#f18a00&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik|||on|||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQ5MzYwIn19@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbFICHE DE DONN\u00c9ES\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#f18a00&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik|||on|||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; custom_css_main_element=\u00a0\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQyNzMxIn19@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbDEMANDER UNE D\u00c9MONSTRATION\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik|||on|||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00a0\u00bb saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00a0\u00bb alt=\u00a0\u00bbVous voulez savoir\u00a0\u00bb title_text=\u00a0\u00bbVous voulez savoir\u00a0\u00bb align=\u00a0\u00bbright\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb positioning=\u00a0\u00bbabsolute\u00a0\u00bb position_origin_a=\u00a0\u00bbbottom_right\u00a0\u00bb vertical_offset=\u00a0\u00bb-20px\u00a0\u00bb horizontal_offset=\u00a0\u00bb-100px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb-20px\u00a0\u00bb vertical_offset_phone=\u00a0\u00bb-80px\u00a0\u00bb vertical_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb horizontal_offset_tablet=\u00a0\u00bb-100px\u00a0\u00bb horizontal_offset_phone=\u00a0\u00bb-130px\u00a0\u00bb horizontal_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb width=\u00a0\u00bb25%\u00a0\u00bb width_tablet=\u00a0\u00bb25%\u00a0\u00bb width_phone=\u00a0\u00bb25%\u00a0\u00bb width_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Formation du conseil NIS2Niveau 2Formation du conseil NIS2 \/ Niveau 2Le niveau II du cours NIS2 aborde les d\u00e9fis de la protection num\u00e9rique, en combinant gouvernance, technologies avanc\u00e9es et sensibilisation aux risques cyber. Il vise \u00e0 fournir des comp\u00e9tences pour g\u00e9rer les menaces informatiques \u00e0 travers des strat\u00e9gies de gouvernance, l&rsquo;utilisation de l \u00ab Intelligence [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-42865","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Formation du conseil NIS2 Niveau 2 - Cyber Guru<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez la formation du conseil NIS2 pour relever les d\u00e9fis de la protection num\u00e9rique et am\u00e9liorer la s\u00e9curit\u00e9 de l&#039;entreprise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Formation du conseil NIS2 Niveau 2\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez la formation du conseil NIS2 pour relever les d\u00e9fis de la protection num\u00e9rique et am\u00e9liorer la s\u00e9curit\u00e9 de l&#039;entreprise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-25T15:17:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/formation-du-conseil-nis2-niveau-2\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/formation-du-conseil-nis2-niveau-2\\\/\",\"name\":\"Formation du conseil NIS2 Niveau 2 - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"datePublished\":\"2025-02-19T14:47:16+00:00\",\"dateModified\":\"2025-08-25T15:17:46+00:00\",\"description\":\"D\u00e9couvrez la formation du conseil NIS2 pour relever les d\u00e9fis de la protection num\u00e9rique et am\u00e9liorer la s\u00e9curit\u00e9 de l'entreprise.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/formation-du-conseil-nis2-niveau-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/formation-du-conseil-nis2-niveau-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/formation-du-conseil-nis2-niveau-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formation du conseil NIS2 Niveau 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Formation du conseil NIS2 Niveau 2 - Cyber Guru","description":"D\u00e9couvrez la formation du conseil NIS2 pour relever les d\u00e9fis de la protection num\u00e9rique et am\u00e9liorer la s\u00e9curit\u00e9 de l'entreprise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-2\/","og_locale":"fr_FR","og_type":"article","og_title":"Formation du conseil NIS2 Niveau 2","og_description":"D\u00e9couvrez la formation du conseil NIS2 pour relever les d\u00e9fis de la protection num\u00e9rique et am\u00e9liorer la s\u00e9curit\u00e9 de l'entreprise.","og_url":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-2\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-08-25T15:17:46+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-2\/","url":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-2\/","name":"Formation du conseil NIS2 Niveau 2 - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"datePublished":"2025-02-19T14:47:16+00:00","dateModified":"2025-08-25T15:17:46+00:00","description":"D\u00e9couvrez la formation du conseil NIS2 pour relever les d\u00e9fis de la protection num\u00e9rique et am\u00e9liorer la s\u00e9curit\u00e9 de l'entreprise.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/formation-du-conseil-nis2-niveau-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Formation du conseil NIS2 Niveau 2"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/42865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=42865"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/42865\/revisions"}],"predecessor-version":[{"id":49392,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/42865\/revisions\/49392"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=42865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}