{"id":17895,"date":"2021-04-26T13:47:34","date_gmt":"2021-04-26T13:47:34","guid":{"rendered":"https:\/\/www.cyberguru.it\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/"},"modified":"2023-02-14T21:56:08","modified_gmt":"2023-02-14T21:56:08","slug":"cyber-security-awareness-redifined-storytelling-et-formation-inductive","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/","title":{"rendered":"Cyber Security Awareness Redifined&nbsp;: storytelling et formation inductive"},"content":{"rendered":"\n<p>On sait d\u00e9sormais que 90&nbsp;% des cyberattaques sont li\u00e9es \u00e0 des erreurs humaines, et que le \u00ab&nbsp;facteur humain&nbsp;\u00bb repr\u00e9sente encore aujourd\u2019hui le maillon faible de la cha\u00eene d\u00e9fensive de toute entreprise. Les plateformes de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 ont pour objectif principal de transformer les comportements humains afin de les adapter aux sophistications continues des cyberattaques. Un objectif incontestablement difficile.<\/p>\n\n\n\n<p>Pour atteindre cet objectif, il est n\u00e9cessaire d\u2019agir efficacement sur les processus d\u2019apprentissage, aussi bien sur ceux de caract\u00e8re plus strictement cognitif que, surtout, sur ceux comportementaux. Former les utilisateurs \u00e0 la cybers\u00e9curit\u00e9, encore trop souvent per\u00e7ue comme un sujet qui n\u2019est pas directement li\u00e9 \u00e0 la vie quotidienne, signifie modifier concr\u00e8tement leur capacit\u00e9 \u00e0 percevoir les risques et \u00e0 savoir agir en connaissance de cause.<\/p>\n\n\n\n<p><em>Qu\u2019est-ce qu\u2019un programme de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 doit pr\u00e9voir pour \u00eatre efficace&nbsp;?<\/em><\/p>\n\n\n\n<p>Un programme efficace de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 ne peut donc pas se limiter \u00e0 fournir uniquement des \u00e9l\u00e9ments conceptuels. Pour \u00eatre efficace, il doit \u00e9galement pr\u00e9voir des \u00e9l\u00e9ments d\u2019apprentissage exp\u00e9rientiel, de type \u00ab&nbsp;learning by doing&nbsp;\u00bb, et de type inductif, de type \u00ab&nbsp;learning by example&nbsp;\u00bb. Avec l\u2019apprentissage exp\u00e9rientiel, l\u2019utilisateur exp\u00e9rimente directement des situations typiques d\u2019attaque par hame\u00e7onnage, devenant la cible de simulations qui reproduisent l\u2019exp\u00e9rience r\u00e9elle. Gr\u00e2ce \u00e0 cette exp\u00e9rience directe, vous am\u00e9liorez votre capacit\u00e9 \u00e0 percevoir le danger, votre capacit\u00e9 \u00e0 agir correctement et votre connaissance de la menace.<\/p>\n\n\n\n<p>L\u2019apprentissage inductif est tout aussi important. Dans ce cas, l\u2019apprentissage est bas\u00e9 sur la narration de situations r\u00e9elles, qui g\u00e9n\u00e8rent une implication pratique et \u00e9motionnelle \u00ab&nbsp;difficile \u00e0 oublier&nbsp;\u00bb. <\/p>\n\n\n\n<p>La narration d\u2019histoires vraies joue un r\u00f4le fondamental dans la formation de Cyber Security Awareness. Le storytelling peut devenir l\u2019un des meilleurs moyens d\u2019obtenir un engagement maximal de l\u2019ensemble de l\u2019entreprise et de s\u2019assurer que tous les messages cl\u00e9s sont correctement assimil\u00e9s. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">L\u2019efficacit\u00e9 du storytelling dans les processus d\u2019apprentissage<\/h3>\n\n\n\n<p>Le storytelling est certainement l\u2019un des moyens les plus efficaces et les plus connus d\u2019impliquer les gens, \u00e0 travers le processus narratif. La narration est un \u00e9l\u00e9ment fondamental dans le processus d\u2019apprentissage de tout le monde&nbsp;; les histoires, contrairement \u00e0 ce qui est simplement enseign\u00e9, aident \u00e0 construire une r\u00e9ponse \u00e9motionnelle qui les rend plus faciles \u00e0 retenir. <\/p>\n\n\n\n<p>La d\u00e9couverte que les histoires passionnantes entra\u00eenent la lib\u00e9ration d\u2019ocytocine dans le cerveau, une hormone qui affecte nos attitudes, nos convictions et nos comportements, n\u2019est pas r\u00e9cente. L\u2019ocytocine est une hormone qui est produite par notre cerveau lorsque nous percevons un climat de confiance. Mais c\u2019est aussi l\u2019hormone responsable de notre volont\u00e9 de coop\u00e9rer avec les autres. Il le fait en am\u00e9liorant l\u2019empathie, c\u2019est-\u00e0-dire notre capacit\u00e9 \u00e0 ressentir les \u00e9motions des autres. C\u2019est ce sentiment d\u2019empathie qui pousse les gens \u00e0 s\u2019identifier \u00e0 une histoire captivante et \u00e0 construire dans leur m\u00e9moire un souvenir clair et durable de ce qui s\u2019est pass\u00e9.<\/p>\n\n\n\n<p>Les histoires avec du contenu \u00e9motionnel, caract\u00e9ris\u00e9es par des personnages r\u00e9els, se traduisent par une meilleure compr\u00e9hension des points cl\u00e9s et une meilleure capacit\u00e9 \u00e0 les m\u00e9moriser plus tard. En termes d\u2019efficacit\u00e9, cela va bien au-del\u00e0 des possibilit\u00e9s d\u2019une formation classique. Quand on nous raconte une histoire, on active non seulement les parties de notre cerveau d\u00e9di\u00e9es au traitement du langage, mais aussi toutes les zones qui seraient utilis\u00e9es en vivant directement cette exp\u00e9rience.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Le pouvoir du storytelling dans la Cyber Security Awareness<\/h3>\n\n\n\n<p>L\u2019un des objectifs d\u2019un parcours de formation de Cyber Security Awareness vraiment efficace est de faire comprendre les cons\u00e9quences r\u00e9elles qu\u2019une cyberattaque pourrait avoir sur soi-m\u00eame et sur son entreprise. La narration d\u2019histoires d\u2019attaques, tir\u00e9es de la vie r\u00e9elle, permet de mesurer \u00e0 quel point il peut \u00eatre facile de se retrouver dans une situation analogue.<\/p>\n\n\n\n<p>Malheureusement, aujourd\u2019hui encore, certaines des violations de donn\u00e9es les plus importantes sont le r\u00e9sultat d\u2019un seul courriel de hame\u00e7onnage et d\u2019un clic inconscient. Gr\u00e2ce \u00e0 un storytelling captivant, vous pouvez construire un souvenir solide de ce que peuvent \u00eatre les comportements \u00e0 risque, quelles informations sont recherch\u00e9es par les pirates, quelles sont les m\u00e9thodes d\u2019attaque les plus courantes et \u00e0 quel point les cons\u00e9quences d\u2019une attaque peuvent \u00eatre d\u00e9vastatrices. <\/p>\n\n\n\n<p>Vivre une situation r\u00e9elle aide \u00e0 acqu\u00e9rir une meilleure conscience et \u00e0 transformer concr\u00e8tement son comportement face aux principaux risques cybern\u00e9tiques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cyber Guru Channel&nbsp;: le storytelling de Cyber Guru<\/h3>\n\n\n\n<p>Bien conscient de l\u2019importance du storytelling, Cyber Guru a cr\u00e9\u00e9 Cyber Guru Channel, une solution innovante de formation inductive. La plateforme Cyber Guru Channel est constitu\u00e9e d\u2019une s\u00e9rie de vid\u00e9os \u00ab&nbsp;Netflix-like&nbsp;\u00bb d\u00e9crivant des faits r\u00e9els, tir\u00e9s de l\u2019actualit\u00e9, li\u00e9s \u00e0 des fraudes ou des attaques par des pirates. <\/p>\n\n\n\n<p>Les \u00e9pisodes sont r\u00e9alis\u00e9s avec des techniques de production avanc\u00e9es et un storytelling particuli\u00e8rement immersif qui permet d\u2019augmenter le niveau de sensibilisation des utilisateurs. <\/p>\n\n\n\n<p>L\u2019implication imm\u00e9diate dans l\u2019histoire les aide \u00e0&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>mesurer les cons\u00e9quences d\u2019un comportement inappropri\u00e9,<\/li>\n\n\n\n<li>reconna\u00eetre les signes qui pourraient indiquer une menace,<\/li>\n\n\n\n<li>m\u00e9moriser l\u2019attitude correcte \u00e0 adopter si l\u2019on ne veut pas \u00eatre victime de situations similaires.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-group has-very-light-gray-background-color has-background is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color\"><strong><a href=\"https:\/\/www.cyberguru.it\/cyber-guru-channel\/\" target=\"_blank\" rel=\"noreferrer noopener\">En savoir plus sur les parcours de formation de Cyber Guru Channel<\/a><\/strong><\/p>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On sait d\u00e9sormais que 90&nbsp;% des cyberattaques sont li\u00e9es \u00e0 des erreurs humaines, et que le \u00ab&nbsp;facteur humain&nbsp;\u00bb repr\u00e9sente encore aujourd\u2019hui le maillon faible de la cha\u00eene d\u00e9fensive de toute entreprise. Les plateformes de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 ont pour objectif principal de transformer les comportements humains afin de les adapter aux sophistications continues des [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":16038,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[116],"tags":[534,503,498,502,535],"class_list":["post-17895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites","tag-cyber-guru-channel-fr-2","tag-cybercrime-fr-2","tag-cybersecurite-2","tag-sensibilisation-a-la-cybersecurite-fr-3","tag-storytelling-fr-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Security Awareness Redifined\u00a0: storytelling et formation inductive<\/title>\n<meta name=\"description\" content=\"Le storytelling bas\u00e9 sur des situations r\u00e9elles joue un r\u00f4le fondamental dans la formation de Cyber Security Awareness...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Awareness Redifined&nbsp;: storytelling et formation inductive\" \/>\n<meta property=\"og:description\" content=\"Le storytelling bas\u00e9 sur des situations r\u00e9elles joue un r\u00f4le fondamental dans la formation de Cyber Security Awareness...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-26T13:47:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-14T21:56:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2021\/04\/storytelling-cyber-guru-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"290\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cyber Security Awareness Redifined&nbsp;: storytelling et formation inductive\",\"datePublished\":\"2021-04-26T13:47:34+00:00\",\"dateModified\":\"2023-02-14T21:56:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/\"},\"wordCount\":956,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/storytelling-cyber-guru-1.webp\",\"keywords\":[\"cyber guru channel\",\"cybercrime\",\"Cybers\u00e9curit\u00e9\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\",\"storytelling\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/\",\"name\":\"Cyber Security Awareness Redifined\u00a0: storytelling et formation inductive\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/storytelling-cyber-guru-1.webp\",\"datePublished\":\"2021-04-26T13:47:34+00:00\",\"dateModified\":\"2023-02-14T21:56:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Le storytelling bas\u00e9 sur des situations r\u00e9elles joue un r\u00f4le fondamental dans la formation de Cyber Security Awareness...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/storytelling-cyber-guru-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/storytelling-cyber-guru-1.webp\",\"width\":500,\"height\":290,\"caption\":\"storytelling-cyber-guru\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/04\\\/26\\\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Awareness Redifined&nbsp;: storytelling et formation inductive\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security Awareness Redifined\u00a0: storytelling et formation inductive","description":"Le storytelling bas\u00e9 sur des situations r\u00e9elles joue un r\u00f4le fondamental dans la formation de Cyber Security Awareness...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyber Security Awareness Redifined&nbsp;: storytelling et formation inductive","og_description":"Le storytelling bas\u00e9 sur des situations r\u00e9elles joue un r\u00f4le fondamental dans la formation de Cyber Security Awareness...","og_url":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2021-04-26T13:47:34+00:00","article_modified_time":"2023-02-14T21:56:08+00:00","og_image":[{"width":500,"height":290,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2021\/04\/storytelling-cyber-guru-1.webp","type":"image\/webp"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"m.baciucco"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cyber Security Awareness Redifined&nbsp;: storytelling et formation inductive","datePublished":"2021-04-26T13:47:34+00:00","dateModified":"2023-02-14T21:56:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/"},"wordCount":956,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2021\/04\/storytelling-cyber-guru-1.webp","keywords":["cyber guru channel","cybercrime","Cybers\u00e9curit\u00e9","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9","storytelling"],"articleSection":["Security Awareness"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/","url":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/","name":"Cyber Security Awareness Redifined\u00a0: storytelling et formation inductive","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2021\/04\/storytelling-cyber-guru-1.webp","datePublished":"2021-04-26T13:47:34+00:00","dateModified":"2023-02-14T21:56:08+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Le storytelling bas\u00e9 sur des situations r\u00e9elles joue un r\u00f4le fondamental dans la formation de Cyber Security Awareness...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2021\/04\/storytelling-cyber-guru-1.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2021\/04\/storytelling-cyber-guru-1.webp","width":500,"height":290,"caption":"storytelling-cyber-guru"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2021\/04\/26\/cyber-security-awareness-redifined-storytelling-et-formation-inductive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Awareness Redifined&nbsp;: storytelling et formation inductive"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/17895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=17895"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/17895\/revisions"}],"predecessor-version":[{"id":25584,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/17895\/revisions\/25584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/16038"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=17895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=17895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=17895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}