{"id":5292,"date":"2022-10-12T22:51:15","date_gmt":"2022-10-12T21:51:15","guid":{"rendered":"https:\/\/mouillere.com\/universconvergents\/?p=5292"},"modified":"2022-10-13T19:03:57","modified_gmt":"2022-10-13T18:03:57","slug":"gestion-des-cyber-risques","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2022\/10\/12\/gestion-des-cyber-risques\/","title":{"rendered":"Gestion des Cyber-risques"},"content":{"rendered":"<p>Le rapport 2022 des assurances Hiscox consacr\u00e9 \u00e0 la gestion des cyber-risques aborde l&#8217;\u00e9pineuse question des cyber-menaces et assurances cyber-risques dans un contexte de d\u00e9veloppement des cyber-attaques et fuites de donn\u00e9es prot\u00e9g\u00e9es par la RGPD.<\/p>\n<p><!--more--><\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2022%2F10%2F2022-GestionCyber-risques.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/2022-GestionCyber-risques.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 5.2Mo)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le rapport 2022 des assurances Hiscox consacr\u00e9 \u00e0 la gestion des cyber-risques aborde l&#8217;\u00e9pineuse question des cyber-menaces et assurances cyber-risques dans un contexte de d\u00e9veloppement des cyber-attaques et fuites de&hellip; <\/p>\n","protected":false},"author":1,"featured_media":5294,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,16,74],"tags":[],"class_list":["post-5292","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-donnees-personnelles","category-it"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/2022-GestionCyber-risques.jpg?fit=1932%2C1022&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-1nm","jetpack-related-posts":[{"id":5296,"url":"https:\/\/mouillere.com\/universconvergents\/2022\/10\/12\/european-cyber-resilience-act-apres-le-privacy-by-design-du-rgpd-le-security-by-design\/","url_meta":{"origin":5292,"position":0},"title":"European Cyber Resilience Act : apr\u00e8s le Privacy by design du RGPD, le Security by design","author":"Fred","date":"12 octobre 2022","format":false,"excerpt":"La Commission europ\u00e9enne a pr\u00e9sent\u00e9 une proposition de r\u00e8glementation europ\u00e9enne sur la cybers\u00e9curit\u00e9 des appareils connect\u00e9s qui doit encore \u00eatre approuv\u00e9 par le Parlement et le Conseil. Le European Cyber Resilience Act vise \u00e0 prot\u00e9ger les consommateurs et les entreprises des objets connect\u00e9s non s\u00e9curis\u00e9s gr\u00e2ce \u00e0 de nouvelles normes,\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/European-Cyber-Resilience-Act-scaled.jpg?fit=1200%2C617&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/European-Cyber-Resilience-Act-scaled.jpg?fit=1200%2C617&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/European-Cyber-Resilience-Act-scaled.jpg?fit=1200%2C617&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/European-Cyber-Resilience-Act-scaled.jpg?fit=1200%2C617&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/10\/European-Cyber-Resilience-Act-scaled.jpg?fit=1200%2C617&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":4644,"url":"https:\/\/mouillere.com\/universconvergents\/2020\/06\/03\/rgpd-ne-pas-negliger-le-risque-de-class-action\/","url_meta":{"origin":5292,"position":1},"title":"RGPD: ne pas n\u00e9gliger le risque de class action","author":"Fred","date":"3 juin 2020","format":false,"excerpt":"Le cabinet d'avocats PGMBM a lanc\u00e9 une class action contre EasyJet (en sus de celle intent\u00e9e contre British Airways) en proposant aux 9 millions de victimes de violation des donn\u00e9es personnelles une indemnisation de 2000\u20ac par client. Cela rappelle qu'outre les amendes administratives pouvant \u00eatre prononc\u00e9es par les autorit\u00e9s de\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/03\/rgpd-compressor.jpg?fit=1200%2C702&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/03\/rgpd-compressor.jpg?fit=1200%2C702&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/03\/rgpd-compressor.jpg?fit=1200%2C702&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/03\/rgpd-compressor.jpg?fit=1200%2C702&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/03\/rgpd-compressor.jpg?fit=1200%2C702&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3260,"url":"https:\/\/mouillere.com\/universconvergents\/2019\/11\/02\/cybersecurite-et-vulnerabilite-humaine\/","url_meta":{"origin":5292,"position":2},"title":"Cybers\u00e9curit\u00e9 et vuln\u00e9rabilit\u00e9 humaine","author":"Fred","date":"2 novembre 2019","format":false,"excerpt":"Maddyness publie un int\u00e9ressant article sur une r\u00e9cente \u00e9tude de l'entreprise de cybers\u00e9curit\u00e9 Proofpoint qui met en avant le facteur humain \u00e0 l\u2019origine des cyber-attaques. Sur les 300 cadres interrog\u00e9s, 86% indiquent avoir subi une cyber-attaque au cours des 3 derni\u00e8res ann\u00e9es. Pour 48% des cadres interrog\u00e9s, les failles humaines\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7037,"url":"https:\/\/mouillere.com\/universconvergents\/2026\/03\/31\/gouvernance-de-la-securite-numerique\/","url_meta":{"origin":5292,"position":3},"title":"Gouvernance de la s\u00e9curit\u00e9 num\u00e9rique","author":"Fred","date":"31 mars 2026","format":false,"excerpt":"La s\u00e9curit\u00e9 num\u00e9rique ne rel\u00e8ve plus de la simple expertise technique ou de la conformit\u00e9 formelle mais est devenue un imp\u00e9ratif strat\u00e9gique conditionnant la p\u00e9rennit\u00e9, la performance et la souverainet\u00e9 des organisations. Face \u00e0 une menace hybride, industrialis\u00e9e et exacerb\u00e9e par les tensions g\u00e9opolitiques mondiales, le Cigref et l'ANSSI ont\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2026\/04\/PSN.jpg?fit=1024%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2026\/04\/PSN.jpg?fit=1024%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2026\/04\/PSN.jpg?fit=1024%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2026\/04\/PSN.jpg?fit=1024%2C768&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2810,"url":"https:\/\/mouillere.com\/universconvergents\/2018\/09\/20\/gdpr-fines-cyber-insurance\/","url_meta":{"origin":5292,"position":4},"title":"GDPR Fines &#038; Cyber Insurance","author":"Fred","date":"20 septembre 2018","format":false,"excerpt":"GDPR fines could reach the greater of 20 million Euro or 4% of your gross annual global revenue. Are GDPR fines insurable ? According to MARSH ANALYSIS, insurability will vary by location, Policy, and Law. Key factors will include: Specifics of insurance contracts: \u00a0Which policies might provide coverage? Do they\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/09\/marsh.jpg?fit=1200%2C810&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/09\/marsh.jpg?fit=1200%2C810&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/09\/marsh.jpg?fit=1200%2C810&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/09\/marsh.jpg?fit=1200%2C810&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/09\/marsh.jpg?fit=1200%2C810&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":164,"url":"https:\/\/mouillere.com\/universconvergents\/2014\/11\/09\/big-data-cyber-securitys-silver-bullet-intel-makes-the-case\/","url_meta":{"origin":5292,"position":5},"title":"Big Data: Cyber Security&#8217;s Silver Bullet? Intel Makes the Case","author":"Fred","date":"9 novembre 2014","format":false,"excerpt":"Cyber security has been a losing game of whac-a-mole for years as the malefactors manage to pop out of new security holes faster than IT and their software suppliers can plug the last batch. The game has also been a costly one for businesses and end users, which have collectively\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/5292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=5292"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/5292\/revisions"}],"predecessor-version":[{"id":5295,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/5292\/revisions\/5295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/5294"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=5292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=5292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=5292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}