{"id":9053,"date":"2020-09-30T11:19:59","date_gmt":"2020-09-30T10:19:59","guid":{"rendered":"https:\/\/open-organization.com\/?p=9053"},"modified":"2020-09-30T11:19:59","modified_gmt":"2020-09-30T10:19:59","slug":"francais-pourquoi-un-minimum-de-cyber-paranoia-sied-aux-directeurs-ri","status":"publish","type":"post","link":"https:\/\/open-organization.com\/fr\/2020\/09\/30\/francais-pourquoi-un-minimum-de-cyber-paranoia-sied-aux-directeurs-ri\/","title":{"rendered":"Pourquoi un minimum de cyber-parano\u00efa sied aux Directeurs R&#038;I"},"content":{"rendered":"<p>[et_pb_section bb_built=\u00a0\u00bb1&Prime; inner_width=\u00a0\u00bbauto\u00a0\u00bb inner_max_width=\u00a0\u00bb1080px\u00a0\u00bb][et_pb_row][et_pb_column type=\u00a0\u00bb4_4&Prime; custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.4.8&Prime; text_text_shadow_horizontal_length=\u00a0\u00bbtext_text_shadow_style,%91object Object%93&Prime; text_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb text_text_shadow_vertical_length=\u00a0\u00bbtext_text_shadow_style,%91object Object%93&Prime; text_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb text_text_shadow_blur_strength=\u00a0\u00bbtext_text_shadow_style,%91object Object%93&Prime; text_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb link_text_shadow_horizontal_length=\u00a0\u00bblink_text_shadow_style,%91object Object%93&Prime; link_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb link_text_shadow_vertical_length=\u00a0\u00bblink_text_shadow_style,%91object Object%93&Prime; link_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb link_text_shadow_blur_strength=\u00a0\u00bblink_text_shadow_style,%91object Object%93&Prime; link_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb ul_text_shadow_horizontal_length=\u00a0\u00bbul_text_shadow_style,%91object Object%93&Prime; ul_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb ul_text_shadow_vertical_length=\u00a0\u00bbul_text_shadow_style,%91object Object%93&Prime; ul_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb ul_text_shadow_blur_strength=\u00a0\u00bbul_text_shadow_style,%91object Object%93&Prime; ul_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb ol_text_shadow_horizontal_length=\u00a0\u00bbol_text_shadow_style,%91object Object%93&Prime; ol_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb ol_text_shadow_vertical_length=\u00a0\u00bbol_text_shadow_style,%91object Object%93&Prime; ol_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb ol_text_shadow_blur_strength=\u00a0\u00bbol_text_shadow_style,%91object Object%93&Prime; ol_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb quote_text_shadow_horizontal_length=\u00a0\u00bbquote_text_shadow_style,%91object Object%93&Prime; quote_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb quote_text_shadow_vertical_length=\u00a0\u00bbquote_text_shadow_style,%91object Object%93&Prime; quote_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb quote_text_shadow_blur_strength=\u00a0\u00bbquote_text_shadow_style,%91object Object%93&Prime; quote_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_text_shadow_horizontal_length=\u00a0\u00bbheader_text_shadow_style,%91object Object%93&Prime; header_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_text_shadow_vertical_length=\u00a0\u00bbheader_text_shadow_style,%91object Object%93&Prime; header_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_text_shadow_blur_strength=\u00a0\u00bbheader_text_shadow_style,%91object Object%93&Prime; header_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_2_text_shadow_horizontal_length=\u00a0\u00bbheader_2_text_shadow_style,%91object Object%93&Prime; header_2_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_2_text_shadow_vertical_length=\u00a0\u00bbheader_2_text_shadow_style,%91object Object%93&Prime; header_2_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_2_text_shadow_blur_strength=\u00a0\u00bbheader_2_text_shadow_style,%91object Object%93&Prime; header_2_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_3_text_shadow_horizontal_length=\u00a0\u00bbheader_3_text_shadow_style,%91object Object%93&Prime; header_3_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_3_text_shadow_vertical_length=\u00a0\u00bbheader_3_text_shadow_style,%91object Object%93&Prime; header_3_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_3_text_shadow_blur_strength=\u00a0\u00bbheader_3_text_shadow_style,%91object Object%93&Prime; header_3_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_4_text_shadow_horizontal_length=\u00a0\u00bbheader_4_text_shadow_style,%91object Object%93&Prime; header_4_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_4_text_shadow_vertical_length=\u00a0\u00bbheader_4_text_shadow_style,%91object Object%93&Prime; header_4_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_4_text_shadow_blur_strength=\u00a0\u00bbheader_4_text_shadow_style,%91object Object%93&Prime; header_4_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_5_text_shadow_horizontal_length=\u00a0\u00bbheader_5_text_shadow_style,%91object Object%93&Prime; header_5_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_5_text_shadow_vertical_length=\u00a0\u00bbheader_5_text_shadow_style,%91object Object%93&Prime; header_5_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_5_text_shadow_blur_strength=\u00a0\u00bbheader_5_text_shadow_style,%91object Object%93&Prime; header_5_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb header_6_text_shadow_horizontal_length=\u00a0\u00bbheader_6_text_shadow_style,%91object Object%93&Prime; header_6_text_shadow_horizontal_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_6_text_shadow_vertical_length=\u00a0\u00bbheader_6_text_shadow_style,%91object Object%93&Prime; header_6_text_shadow_vertical_length_tablet=\u00a0\u00bb0px\u00a0\u00bb header_6_text_shadow_blur_strength=\u00a0\u00bbheader_6_text_shadow_style,%91object Object%93&Prime; header_6_text_shadow_blur_strength_tablet=\u00a0\u00bb1px\u00a0\u00bb box_shadow_horizontal_tablet=\u00a0\u00bb0px\u00a0\u00bb box_shadow_vertical_tablet=\u00a0\u00bb0px\u00a0\u00bb box_shadow_blur_tablet=\u00a0\u00bb40px\u00a0\u00bb box_shadow_spread_tablet=\u00a0\u00bb0px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb0&Prime; horizontal_offset_tablet=\u00a0\u00bb0&Prime; z_index_tablet=\u00a0\u00bb0&Prime;]<\/p>\n<h1><span style=\"font-weight: 400;\">Introduction<\/span><\/h1>\n<p><span style=\"font-weight: 400;\">\u201cParano\u00efa\u201d signifie normalement le fait de s\u2019attribuer une importance d\u00e9mesur\u00e9e et imaginaire, associ\u00e9e typiquement aux actions de pr\u00e9tendus ennemis cach\u00e9s. Mais dans le cas de la fonction R&amp;I, l\u2019importance de la fonction n\u2019est pas imaginaire, et les cyber ennemis cach\u00e9s existent. Cet article indique trois grandes raisons pour les Directions R&amp;I de cultiver une forme saine de cyberparano\u00efa.<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-weight: 400;\">Raison #1 : La fonction de R&amp;I constitue une cible majeure<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Les services de R&amp;I abritent les actifs intellectuels qui contribuent pour beaucoup aux capacit\u00e9s futures de cr\u00e9ation de valeur des entreprises industrielles. Apr\u00e8s s\u2019\u00eatre impr\u00e9gn\u00e9 des <a href=\"https:\/\/open-organization.com\/en\/2020\/09\/28\/francais-cybersecurite-en-ri-cerner-le-defi\/\">notions de base de la cybers\u00e9curit\u00e9<\/a>, le premier r\u00e9flexe cyber d\u2019un Directeur R&amp;I doit \u00eatre de cartographier les actifs informationnels \u00e0 s\u00e9curiser en priorit\u00e9, selon Olivier Kempf, Fellow Presans sp\u00e9cialiste de la cybers\u00e9curit\u00e9 et cyberstrat\u00e9gie. Il n\u2019est pas possible de tout s\u00e9curiser \u00e0 100% , mais il faut durcir les syst\u00e8mes d\u2019information dans lesquels se trouve la valeur ajout\u00e9e future de l\u2019entreprise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sur ce point, il ne faut pas se tromper de cat\u00e9gorie. Ce n\u2019est pas le droit de la propri\u00e9t\u00e9 qui prot\u00e8ge contre les risques d\u2019espionnage. Ce qui prot\u00e8ge et garantit les revenus futur issus de la valorisation des actifs intellectuels, c\u2019est d\u2019abord la performance en mati\u00e8re de cybers\u00e9curit\u00e9. Un point \u00e0 ne pas perdre de vue lorsqu\u2019il s\u2019agit de d\u00e9fendre un budget de cybers\u00e9curit\u00e9 pour la fonction R&amp;I.<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-weight: 400;\">Raison #2 : Les nouvelles technologies vont augmenter les risques de cybers\u00e9curit\u00e9<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Avec la forte croissance des vid\u00e9oconf\u00e9rences induite par le confinement, les risques de cybers\u00e9curit\u00e9 ont r\u00e9cemment explos\u00e9. Mais les surfaces d\u2019attaque sont appel\u00e9es \u00e0 continuer \u00e0 se multiplier \u00e0 l\u2019avenir, en raison de la tendance technologique g\u00e9n\u00e9rale qui va vers plus de connexion et de smartification digitale du monde. Objets connect\u00e9s, 5G, fabrication additive,\u00a0 mat\u00e9riaux intelligents\u00a0: il est possible les actifs industriels non connect\u00e9s apparaissent de plus en plus tels des \u00eeles menac\u00e9es par la mont\u00e9e du niveau de l\u2019eau de l\u2019oc\u00e9an universel des objets connect\u00e9s. Sentez-vous monter aussi un sentiment de cyberparano\u00efa\u00a0?<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-weight: 400;\">Raison #3 : Nous vivons de plus en plus dans un monde d\u2019organisations ouvertes<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Un monde de plus en plus connect\u00e9 est un monde o\u00f9 les fronti\u00e8res entre les organisations risquent de devenir floues. Cette question concerne directement les fonctions R&amp;I et doit m\u00eame constituer un axe essentiel pour l\u2019organisation de la R&amp;I du futur. La cyberparano\u00efa ne doit pas conduire \u00e0 remettre en question les avantages apport\u00e9s par <\/span><a href=\"https:\/\/presans.com\/fr\/whitepaper-open-organization\/\"><span style=\"font-weight: 400;\">l\u2019organisation ouverte<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-weight: 400;\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Un peu de cyber-parano\u00efa aujourd\u2019hui ne ferait pas de mal, parce que les probl\u00e8mes de cybers\u00e9curit\u00e9 actuels vont tr\u00e8s probablement devenir encore plus graves \u00e0 l\u2019avenir. Mais la parano\u00efa ne suffit pas pour ensuite construire un syst\u00e8me de cybers\u00e9curit\u00e9. En effet cette derni\u00e8re exige ce que la parano\u00efa tend \u00e0 exclure : la confiance dans les membres de ce syst\u00e8me<\/span><span id='easy-footnote-2-9053' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/open-organization.com\/fr\/2020\/09\/30\/francais-pourquoi-un-minimum-de-cyber-paranoia-sied-aux-directeurs-ri\/#easy-footnote-bottom-2-9053' title='&lt;span style=&quot;font-weight: 400;&quot;&gt;C\u2019est vers cette derni\u00e8re question que se tourne le quatri\u00e8me article de notre dossier cybers\u00e9curit\u00e9 : &lt;\/span&gt;&lt;i&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Quel est votre cercle de cyberconfiance\u00a0&lt;\/span&gt;&lt;\/i&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;?&lt;\/span&gt;'><sup>2<\/sup><\/a><\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p>[\/et_pb_text][et_pb_post_nav _builder_version=\u00a0\u00bb3.14&Prime; prev_text=\u00a0\u00bbPrevious article\u00a0\u00bb next_text=\u00a0\u00bbNext article\u00a0\u00bb in_same_term=\u00a0\u00bbon\u00a0\u00bb background_color=\u00a0\u00bb#3d59a1&Prime; title_font=\u00a0\u00bb|800|||||||\u00a0\u00bb title_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb title_font_size=\u00a0\u00bb15px\u00a0\u00bb custom_padding=\u00a0\u00bb10px|10px|10px|10px\u00a0\u00bb border_radii=\u00a0\u00bbon|5px|5px|5px|5px\u00a0\u00bb border_width_all=\u00a0\u00bb1px\u00a0\u00bb border_color_all=\u00a0\u00bb#3d59a1&Prime; saved_tabs=\u00a0\u00bball\u00a0\u00bb custom_margin=\u00a0\u00bb30px|||\u00a0\u00bb global_module=\u00a0\u00bb8506&Prime; \/][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n<ol class=\"easy-footnotes-wrapper\"><li class=\"easy-footnote-single\"><span id=\"easy-footnote-bottom-1-9053\" class=\"easy-footnote-margin-adjust\"><\/span>It is to this last question that the fourth article in our cybersecurity dossier turns: <em>What is your circle of cyber trust?<\/em><a class=\"easy-footnote-to-top\" href=\"#easy-footnote-1-9053\"><\/a><\/li><li class=\"easy-footnote-single\"><span id=\"easy-footnote-bottom-2-9053\" class=\"easy-footnote-margin-adjust\"><\/span><span style=\"font-weight: 400\">C\u2019est vers cette derni\u00e8re question que se tourne le quatri\u00e8me article de notre dossier cybers\u00e9curit\u00e9 : <\/span><i><span style=\"font-weight: 400\">Quel est votre cercle de cyberconfiance\u00a0<\/span><\/i><span style=\"font-weight: 400\">?<\/span><a class=\"easy-footnote-to-top\" href=\"#easy-footnote-2-9053\"><\/a><\/li><\/ol>","protected":false},"excerpt":{"rendered":"<p>Un peu de cyber-parano\u00efa aujourd\u2019hui ne ferait pas de mal, parce que les probl\u00e8mes de cybers\u00e9curit\u00e9 actuels vont tr\u00e8s probablement devenir encore plus graves \u00e0 l\u2019avenir.<\/p>\n","protected":false},"author":177,"featured_media":9054,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2],"tags":[390,391,392],"_links":{"self":[{"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/posts\/9053"}],"collection":[{"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/comments?post=9053"}],"version-history":[{"count":0,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/posts\/9053\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/media\/9054"}],"wp:attachment":[{"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/media?parent=9053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/categories?post=9053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/open-organization.com\/fr\/wp-json\/wp\/v2\/tags?post=9053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}