{"id":518,"date":"2024-04-12T17:48:52","date_gmt":"2024-04-12T21:48:52","guid":{"rendered":"https:\/\/bedrock4.com\/?page_id=518"},"modified":"2024-05-11T19:35:28","modified_gmt":"2024-05-11T23:35:28","slug":"comment-nous-aidons","status":"publish","type":"page","link":"https:\/\/bedrock4.com\/fr\/comment-nous-aidons\/","title":{"rendered":"Comment nous aidons"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbHeader\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; use_background_color_gradient=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_type=\u00a0\u00bbcircular\u00a0\u00bb background_color_gradient_direction_radial=\u00a0\u00bbtop right\u00a0\u00bb background_color_gradient_stops=\u00a0\u00bb#00ffd8 0%|#0029e2 100%\u00a0\u00bb background_color_gradient_start=\u00a0\u00bb#00ffd8&Prime; background_color_gradient_end=\u00a0\u00bb#0029e2&Prime; background_image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-18.png\u00a0\u00bb parallax=\u00a0\u00bbon\u00a0\u00bb custom_padding=\u00a0\u00bb10vw||\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; z_index=\u00a0\u00bb1&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.16&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_font_size=\u00a0\u00bb84px\u00a0\u00bb background_layout=\u00a0\u00bbdark\u00a0\u00bb header_font_size_tablet=\u00a0\u00bb54px\u00a0\u00bb header_font_size_phone=\u00a0\u00bb32px\u00a0\u00bb header_font_size_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1>Solutions de s\u00e9curit\u00e9<\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=\u00a0\u00bbhttps:\/\/cs.bedrock4.com\/#\/rencontre-intro\u00a0\u00bb button_text=\u00a0\u00bbParlez avec un expert\u00a0\u00bb button_alignment=\u00a0\u00bbleft\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb button_bg_color=\u00a0\u00bb#47d7ff\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb100px\u00a0\u00bb button_font=\u00a0\u00bbOverpass|900||on|||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb|||62px|false|false\u00a0\u00bb custom_padding=\u00a0\u00bb20px|30px|20px|30px|true|true\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; box_shadow_style=\u00a0\u00bbpreset3&Prime; box_shadow_vertical=\u00a0\u00bb20px\u00a0\u00bb box_shadow_blur=\u00a0\u00bb40px\u00a0\u00bb box_shadow_spread=\u00a0\u00bb-10px\u00a0\u00bb box_shadow_color=\u00a0\u00bbrgba(23,102,193,0.46)\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb box_shadow_color__hover=\u00a0\u00bb#2585b2&Prime; box_shadow_blur__hover_enabled=\u00a0\u00bbon\u00a0\u00bb box_shadow_blur__hover=\u00a0\u00bb20px\u00a0\u00bb box_shadow_vertical__hover_enabled=\u00a0\u00bbon\u00a0\u00bb box_shadow_vertical__hover=\u00a0\u00bb10px\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-06-1.png\u00a0\u00bb align=\u00a0\u00bbright\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; max_width_tablet=\u00a0\u00bb400px\u00a0\u00bb max_width_phone=\u00a0\u00bb\u00a0\u00bb max_width_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_margin=\u00a0\u00bb-10vw|0vw||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb-2vw|0vw||\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb animation_style=\u00a0\u00bbzoom\u00a0\u00bb animation_intensity_zoom=\u00a0\u00bb5%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.25.0&Prime; z_index=\u00a0\u00bb0&Prime; width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bbnone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-13.png\u00a0\u00bb show_bottom_space=\u00a0\u00bboff\u00a0\u00bb force_fullwidth=\u00a0\u00bbon\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbCybersecurity Framework\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb z_index=\u00a0\u00bb10&Prime; width=\u00a0\u00bb90%\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb bottom_divider_height=\u00a0\u00bb26vw\u00a0\u00bb bottom_divider_flip=\u00a0\u00bbhorizontal\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row admin_label=\u00a0\u00bbEnt\u00eate Gouverner\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_heading title=\u00a0\u00bbGOUVERNER\u00a0\u00bb admin_label=\u00a0\u00bbGovern\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_font=\u00a0\u00bb|800|||||||\u00a0\u00bb title_text_align=\u00a0\u00bbcenter\u00a0\u00bb title_font_size=\u00a0\u00bb44px\u00a0\u00bb title_letter_spacing=\u00a0\u00bb16px\u00a0\u00bb custom_margin=\u00a0\u00bb-16px||-16px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_6,1_6,1_6,1_6,1_6,1_6&Prime; admin_label=\u00a0\u00bbGouverner\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bbrgba(244,244,244,0)\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb1920px\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_6&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbContexte organisationnel\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-34.png\u00a0\u00bb admin_label=\u00a0\u00bbOrganizational Context\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\">Comprenez-vous les attentes r\u00e9glementaires, contractuelles et celles des parties prenantes en mati\u00e8re de gestion des risques li\u00e9s \u00e0 la cybers\u00e9curit\u00e9 ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_6&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbStrat\u00e9gie de gestion des risques\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-2.png\u00a0\u00bb admin_label=\u00a0\u00bbRisk Management Strategy\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\">Votre organisation a-t-elle mis en place des m\u00e9canismes pour d\u00e9finir les priorit\u00e9s, les contraintes, la tol\u00e9rance au risque et les hypoth\u00e8ses, et les communique-t-elle pour \u00e9tayer les d\u00e9cisions ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_6&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbR\u00f4les, Responsabilit\u00e9s et Pouvoirs\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-6.png\u00a0\u00bb admin_label=\u00a0\u00bbRoles, Responsibilities, and Authorities\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Vos r\u00f4les et responsabilit\u00e9s en mati\u00e8re de cybers\u00e9curit\u00e9 sont-ils clairement d\u00e9finis et communiqu\u00e9s ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_6&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbPolitique\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-2.png\u00a0\u00bb admin_label=\u00a0\u00bbPolicy\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Disposez-vous de politiques et de directives document\u00e9es en mati\u00e8re de cybers\u00e9curit\u00e9 ? Sont-ils partag\u00e9s et appliqu\u00e9s ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_6&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbSurveillance\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-37.png\u00a0\u00bb admin_label=\u00a0\u00bbOversight\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Avez-vous mis en place des m\u00e9canismes pour collecter et mesurer les r\u00e9sultats de vos activit\u00e9s de cybers\u00e9curit\u00e9 ? Utilisez-vous les informations pour am\u00e9liorer les performances et adapter la strat\u00e9gie de gestion des risques ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_6&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbCybers\u00e9curit\u00e9 Gestion des risques de la cha\u00eene d&#039;approvisionnement\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-40.png\u00a0\u00bb admin_label=\u00a0\u00bbCybersecurity Supply Chain Risk Management\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Comprenez-vous et surveillez-vous les risques li\u00e9s \u00e0 votre cha\u00eene d&rsquo;approvisionnement ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=\u00a0\u00bbEnt\u00eate Identifier\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_heading title=\u00a0\u00bbIDENTIFIER\u00a0\u00bb admin_label=\u00a0\u00bbIdentify\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_font=\u00a0\u00bb|800|||||||\u00a0\u00bb title_text_align=\u00a0\u00bbcenter\u00a0\u00bb title_font_size=\u00a0\u00bb44px\u00a0\u00bb title_letter_spacing=\u00a0\u00bb16px\u00a0\u00bb custom_margin=\u00a0\u00bb-16px||-16px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_5,1_5,1_5,1_5,1_5&Prime; admin_label=\u00a0\u00bbIdentifier\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb1920px\u00a0\u00bb collapsed=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_5&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_5&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbGestion des actifs\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-10.png\u00a0\u00bb admin_label=\u00a0\u00bbAsset Management\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Savez-vous o\u00f9 se trouvent tous vos actifs? Sont-ils suffisamment prot\u00e9g\u00e9s, compte tenu de leur importance pour les objectifs de votre entreprise ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_5&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bb\u00c9valuation des risques\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-4.png\u00a0\u00bb admin_label=\u00a0\u00bbRisk Assessment\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Comprenez-vous les risques de cybers\u00e9curit\u00e9 auxquels votre entreprise est confront\u00e9e ? En est-il de m\u00eame pour l&rsquo;orientation de votre entreprise ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_5&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbAm\u00e9lioration\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/line-chart-icon.jpeg\u00a0\u00bb admin_label=\u00a0\u00bbImprovement\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Votre gestion de la cybers\u00e9curit\u00e9 s&rsquo;am\u00e9liore-t-elle au fil du temps ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_5&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=\u00a0\u00bbEnt\u00eate Prot\u00e9ger\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_heading title=\u00a0\u00bbPROT\u00c9GER\u00a0\u00bb admin_label=\u00a0\u00bbProtect\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_font=\u00a0\u00bb|800|||||||\u00a0\u00bb title_text_align=\u00a0\u00bbcenter\u00a0\u00bb title_font_size=\u00a0\u00bb44px\u00a0\u00bb title_letter_spacing=\u00a0\u00bb16px\u00a0\u00bb custom_margin=\u00a0\u00bb-16px||-16px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_5,1_5,1_5,1_5,1_5&Prime; admin_label=\u00a0\u00bbProt\u00e9ger\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_5&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbContr\u00f4le d&#039;acc\u00e8s\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-28.png\u00a0\u00bb admin_label=\u00a0\u00bbAccess Control\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Vous devez am\u00e9liorer la gestion des comptes (s\u00e9paration des t\u00e2ches, moindre privil\u00e8ge) ou les proc\u00e9dures d&rsquo;int\u00e9gration et de d\u00e9sintoxication ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_5&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbSensibilisation et Formation\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-13.png\u00a0\u00bb admin_label=\u00a0\u00bbAwareness &#038; Training\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Votre personnel comprend-il les risques auxquels votre organisation est confront\u00e9e ? Comprennent-ils comment g\u00e9rer les menaces potentielles ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_5&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbS\u00e9curit\u00e9 des donn\u00e9es\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-29.png\u00a0\u00bb admin_label=\u00a0\u00bbData Security\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Avez-vous mis en place des m\u00e9canismes pour garantir la confidentialit\u00e9, l&rsquo;int\u00e9grit\u00e9 et la disponibilit\u00e9 de vos donn\u00e9es ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_5&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbS\u00e9curit\u00e9 de la plate-forme\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-16.png\u00a0\u00bb admin_label=\u00a0\u00bbPlatform Security\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Vos actifs (mat\u00e9riel, logiciels, services) sont-ils g\u00e9r\u00e9s de mani\u00e8re coh\u00e9rente ? Effectuez-vous le suivi des activit\u00e9s de maintenance et de gestion ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_5&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbR\u00e9silience de l&#039;infrastructure technologique\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-31.png\u00a0\u00bb admin_label=\u00a0\u00bbTechnology Infrastructure Resilience\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Disposez-vous d&rsquo;une architecture informatique coh\u00e9rente garantissant la protection et la r\u00e9silience des actifs ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=\u00a0\u00bbEnt\u00eate d\u00e9tection\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_heading title=\u00a0\u00bbD\u00c9TECTER\u00a0\u00bb admin_label=\u00a0\u00bbDetect\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_font=\u00a0\u00bb|800|||||||\u00a0\u00bb title_text_align=\u00a0\u00bbcenter\u00a0\u00bb title_font_size=\u00a0\u00bb44px\u00a0\u00bb title_letter_spacing=\u00a0\u00bb16px\u00a0\u00bb custom_margin=\u00a0\u00bb-16px||-16px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_4,1_4,1_4,1_4&Prime; admin_label=\u00a0\u00bbD\u00e9tecter\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbContr\u00f4le continu\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-36.png\u00a0\u00bb admin_label=\u00a0\u00bbContinuous Monitoring\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Surveillez-vous vos actifs pour d\u00e9tecter les anomalies, les indicateurs de compromission et les menaces ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbAnalyse des \u00e9v\u00e9nements ind\u00e9sirables\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-14.png\u00a0\u00bb admin_label=\u00a0\u00bbAdverse Event Analysis\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Disposez-vous de l&rsquo;expertise et des capacit\u00e9s n\u00e9cessaires pour tirer parti des renseignements sur les menaces afin d&rsquo;am\u00e9liorer la d\u00e9tection ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=\u00a0\u00bbEnt\u00eate R\u00e9pondre\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_heading title=\u00a0\u00bbR\u00c9PONDRE\u00a0\u00bb admin_label=\u00a0\u00bbRespond\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_font=\u00a0\u00bb|800|||||||\u00a0\u00bb title_text_align=\u00a0\u00bbcenter\u00a0\u00bb title_font_size=\u00a0\u00bb44px\u00a0\u00bb title_letter_spacing=\u00a0\u00bb16px\u00a0\u00bb custom_margin=\u00a0\u00bb-16px||-16px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_4,1_4,1_4,1_4&Prime; admin_label=\u00a0\u00bbR\u00e9pondre\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbGestion des incidents\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-21.png\u00a0\u00bb admin_label=\u00a0\u00bbIncident Management\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>\u00cates-vous pr\u00eat \u00e0 r\u00e9agir aux incidents de s\u00e9curit\u00e9 ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbAnalyse des incidents\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-6.png\u00a0\u00bb admin_label=\u00a0\u00bbIncident Analysis\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Vous avez besoin d&rsquo;aide pour comprendre les causes profondes des incidents ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbRapport et communication sur la r\u00e9ponse aux incidents\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-35.png\u00a0\u00bb admin_label=\u00a0\u00bbIncident Response Reporting &#038; Communication\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Avez-vous \u00e9tabli un plan de communication impliquant les parties prenantes internes et externes ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbAtt\u00e9nuation des incidents\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-20.png\u00a0\u00bb admin_label=\u00a0\u00bbIncident Mitigation\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>\u00cates-vous s\u00fbr de disposer des capacit\u00e9s n\u00e9cessaires pour \u00e9viter qu&rsquo;un incident ne s&rsquo;\u00e9tende au sein de votre organisation ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=\u00a0\u00bbEnt\u00eate R\u00e9cup\u00e9rer\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_heading title=\u00a0\u00bbR\u00c9CUP\u00c9RER\u00a0\u00bb admin_label=\u00a0\u00bbRecover\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_font=\u00a0\u00bb|800|||||||\u00a0\u00bb title_text_align=\u00a0\u00bbcenter\u00a0\u00bb title_font_size=\u00a0\u00bb44px\u00a0\u00bb title_letter_spacing=\u00a0\u00bb16px\u00a0\u00bb custom_margin=\u00a0\u00bb-16px||-16px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_4,1_4,1_4,1_4&Prime; admin_label=\u00a0\u00bbR\u00e9cup\u00e9rer\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbEx\u00e9cution du plan de reprise apr\u00e8s incident\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-41.png\u00a0\u00bb admin_label=\u00a0\u00bbIncident Recovery Plan Execution\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Votre \u00e9quipe sait-elle comment r\u00e9cup\u00e9rer et reconstruire les syst\u00e8mes apr\u00e8s un incident de cybers\u00e9curit\u00e9 ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_blurb title=\u00a0\u00bbR\u00e9cup\u00e9ration et communication en cas d&#039;incident\u00a0\u00bb image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-icon-2.png\u00a0\u00bb admin_label=\u00a0\u00bbIncident Recovery Communication\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbOverpass|900|||||||\u00a0\u00bb header_line_height=\u00a0\u00bb1.4em\u00a0\u00bb body_font=\u00a0\u00bbOverpass|300|||||||\u00a0\u00bb body_line_height=\u00a0\u00bb1.8em\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Connaissez-vous toutes les personnes qui doivent \u00eatre impliqu\u00e9es dans la restauration de vos donn\u00e9es, syst\u00e8mes et services ?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbFooter\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; use_background_color_gradient=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_type=\u00a0\u00bbcircular\u00a0\u00bb background_color_gradient_direction_radial=\u00a0\u00bbtop right\u00a0\u00bb background_color_gradient_stops=\u00a0\u00bb#3122b2 0%|#00ffd8 100%\u00a0\u00bb background_color_gradient_start=\u00a0\u00bb#3122b2&Prime; background_color_gradient_end=\u00a0\u00bb#00ffd8&Prime; background_image=\u00a0\u00bbhttps:\/\/bedrock4.com\/wp-content\/uploads\/2024\/04\/cyber-security-17.png\u00a0\u00bb z_index=\u00a0\u00bb10&Prime; overflow-x=\u00a0\u00bbvisible\u00a0\u00bb overflow-y=\u00a0\u00bbvisible\u00a0\u00bb custom_padding=\u00a0\u00bb||2vw|||\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.25.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjU5MiJ9fQ==@\u00a0\u00bb button_text=\u00a0\u00bbContactez nous\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.25.0&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#ffffff\u00a0\u00bb button_bg_color=\u00a0\u00bb#47d7ff\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb100px\u00a0\u00bb button_font=\u00a0\u00bbOverpass|900||on|||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_padding=\u00a0\u00bb20px|30px|20px|30px|true|true\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset3&Prime; box_shadow_vertical=\u00a0\u00bb20px\u00a0\u00bb box_shadow_blur=\u00a0\u00bb40px\u00a0\u00bb box_shadow_spread=\u00a0\u00bb-10px\u00a0\u00bb box_shadow_color=\u00a0\u00bbrgba(23,102,193,0.46)\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb box_shadow_color__hover=\u00a0\u00bb#2585b2&Prime; box_shadow_blur__hover_enabled=\u00a0\u00bbon\u00a0\u00bb box_shadow_blur__hover=\u00a0\u00bb20px\u00a0\u00bb box_shadow_vertical__hover_enabled=\u00a0\u00bbon\u00a0\u00bb box_shadow_vertical__hover=\u00a0\u00bb10px\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Solutions de s\u00e9curit\u00e9Comprenez-vous les attentes r\u00e9glementaires, contractuelles et celles des parties prenantes en mati\u00e8re de gestion des risques li\u00e9s \u00e0 la cybers\u00e9curit\u00e9 ?Votre organisation a-t-elle mis en place des m\u00e9canismes pour d\u00e9finir les priorit\u00e9s, les contraintes, la tol\u00e9rance au risque et les hypoth\u00e8ses, et les communique-t-elle pour \u00e9tayer les d\u00e9cisions ?Vos r\u00f4les et responsabilit\u00e9s en [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-518","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/bedrock4.com\/fr\/wp-json\/wp\/v2\/pages\/518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bedrock4.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bedrock4.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bedrock4.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bedrock4.com\/fr\/wp-json\/wp\/v2\/comments?post=518"}],"version-history":[{"count":27,"href":"https:\/\/bedrock4.com\/fr\/wp-json\/wp\/v2\/pages\/518\/revisions"}],"predecessor-version":[{"id":1521,"href":"https:\/\/bedrock4.com\/fr\/wp-json\/wp\/v2\/pages\/518\/revisions\/1521"}],"wp:attachment":[{"href":"https:\/\/bedrock4.com\/fr\/wp-json\/wp\/v2\/media?parent=518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}