<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Archives des automobile - Catalyst Blue Phenix</title>
	<atom:link href="https://beta.catalystbluephenix.com/tag/automobile/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Tue, 25 Feb 2025 15:29:13 +0000</lastBuildDate>
	<language>fr-FR</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://beta.catalystbluephenix.com/wp-content/uploads/2023/11/IMG_20241014_123254-1-150x150.png</url>
	<title>Archives des automobile - Catalyst Blue Phenix</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Retour d&#8217;expérience : constructeur de véhicules autonomes &#8211; 3/3</title>
		<link>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/</link>
					<comments>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/#respond</comments>
		
		<dc:creator><![CDATA[Ian Revault D'Allonnes]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 17:20:18 +0000</pubDate>
				<category><![CDATA[Cyberdéfense]]></category>
		<category><![CDATA[Intelligence Artificielle]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[IT Pro]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[automobile]]></category>
		<category><![CDATA[certification cybersécurité]]></category>
		<category><![CDATA[conformité réglementaire]]></category>
		<category><![CDATA[formation cybersécurité]]></category>
		<category><![CDATA[gestion des risques]]></category>
		<category><![CDATA[homologation]]></category>
		<category><![CDATA[infrastructures critiques]]></category>
		<category><![CDATA[SOC automobile]]></category>
		<category><![CDATA[UNR ECE 155]]></category>
		<category><![CDATA[UNR ECE 156]]></category>
		<category><![CDATA[véhicules autonomes]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://beta.catalystbluephenix.com/?p=2835</guid>

					<description><![CDATA[<p>Written by Ian Revault D&#8217;Allonnes Cyberdéfense Intelligence Artificielle IOT IT Pro Services Tech Retour d’expérience : Sécuriser les véhicules autonomes &#8211; Partie 3 Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, la cybersécurité est devenue un prérequis incontournable pour l’homologation des véhicules autonomes. Ces normes imposent aux constructeurs automobiles une gestion rigoureuse [&#8230;]</p>
<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2835" class="elementor elementor-2835">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-0a3cd5e elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="0a3cd5e" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4404a66" data-id="4404a66" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-aae5cd0 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="aae5cd0" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ba34d6a" data-id="ba34d6a" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-46ded0a elementor-widget elementor-widget-wdt-post-author" data-id="46ded0a" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-author.default">
				<div class="elementor-widget-container">
					<div class="entry-author-wrapper meta-elements-filled-round ">
<!-- Entry Author -->
<div class="single-entry-author">
	<div class="meta-author-img">
		<img alt='' src='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=40&#038;d=mm&#038;r=g' srcset='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' />	</div>
	<div class="meta-author-info">
		<span>Written by</span>
		<a href="https://beta.catalystbluephenix.com/author/irevault/" title="View all posts by Ian Revault D'Allonnes">Ian Revault D'Allonnes</a>
    </div>
</div><!-- Entry Author --></div>				</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fb04380" data-id="fb04380" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-9bc0ee4 elementor-widget elementor-widget-wdt-post-categories" data-id="9bc0ee4" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-categories.default">
				<div class="elementor-widget-container">
					<div class="entry-categories-wrapper meta-elements-boxed-round ">
<!-- Entry Categories -->
<div class="single-entry-categories"><a href="https://beta.catalystbluephenix.com/category/cyberdefense/" rel="category tag">Cyberdéfense</a> <a href="https://beta.catalystbluephenix.com/category/ai/" rel="category tag">Intelligence Artificielle</a> <a href="https://beta.catalystbluephenix.com/category/iot/" rel="category tag">IOT</a> <a href="https://beta.catalystbluephenix.com/category/itpro/" rel="category tag">IT Pro</a> <a href="https://beta.catalystbluephenix.com/category/services/" rel="category tag">Services</a> <a href="https://beta.catalystbluephenix.com/category/tech/" rel="category tag">Tech</a></div><!-- Entry Categories --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<div class="elementor-element elementor-element-ea492b4 elementor-widget elementor-widget-heading" data-id="ea492b4" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Retour d’expérience : Sécuriser les véhicules autonomes - Partie 3</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-d69370f elementor-widget elementor-widget-wdt-heading" data-id="d69370f" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-d69370f"><div class="wdt-heading-content-wrapper">Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, la cybersécurité est devenue un prérequis incontournable pour l’homologation des véhicules autonomes. Ces normes imposent aux constructeurs automobiles une gestion rigoureuse des risques cybernétiques, couvrant aussi bien la détection des menaces que la résilience des systèmes embarqués et des infrastructures connexes.
<br/><br/>
Dans ce cadre, nous avons été missionnés pour concevoir et déployer un pôle cyberdéfense au sein d’un constructeur de véhicules autonomes. L’objectif était double : établir une architecture de sécurité robuste et garantir la conformité réglementaire tout en intégrant des principes d’approche Zero Trust et de Security by Design dans l’ensemble du cycle de vie du véhicule.
<br/><br/>Nous avons posé des bases solides, structuré nos efforts et planifié chaque étape avec minutie. Mais tout projet d’envergure comporte des risques. Plutôt que de les subir, nous avons choisi de les anticiper et de les gérer de manière proactive. Cette approche nous a permis d’éviter des blocages majeurs et de garantir une exécution fluide du projet.<br/><br/>

Ce dernier article d’une série de trois explore les défis rencontrés, notre méthodologie d’implémentation et les solutions techniques adoptées pour répondre aux exigences de sécurité et de résilience imposées par l’UNR ECE 155 et 156.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-f632f34 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="f632f34" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-f632f34"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Cinquième étape : <span class="wdt-heading-colored-elements">Anticiper</span><span class="wdt-heading-colored-elements">les</span>risques et avancer avec détermination</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-9e8e5c7 elementor-widget elementor-widget-wdt-heading" data-id="9e8e5c7" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-9e8e5c7"><div class="wdt-heading-content-wrapper">Dans un projet aussi ambitieux, les imprévus sont inévitables. Ce qui fait la différence, c’est la capacité à les anticiper et à s’adapter rapidement. Nous avons donc mis en place une stratégie de gestion des risques ciblant les menaces les plus critiques.
<br/> <br/> 
Parmi les risques critiques, nous avons particulièrement travaillé sur :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-65278ba elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="65278ba" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-65278ba"><h6 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Indisponibilité de ressources <span class="wdt-heading-colored-elements">clés</span></span></h6></div>				</div>
				</div>
				<div class="elementor-element elementor-element-01b28fa elementor-widget elementor-widget-wdt-heading" data-id="01b28fa" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-01b28fa"><div class="wdt-heading-content-wrapper">Le succès d’un projet dépend avant tout des compétences et de l’implication des équipes. Mais que se passe-t-il si une expertise cruciale vient à manquer ? Une ressource indisponible, un départ imprévu ou une surcharge de travail peuvent vite compromettre les délais et la qualité des livrables.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-0b7136d common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="0b7136d" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Un plan de continuité avec identification des compétences critiques et des doublons</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Une documentation exhaustive permettant le transfert de connaissance</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Des formations croisées pour développer la polyvalence de l'équipe</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Un réseau de partenaires pouvant fournir des ressources supplémentaires en cas de besoin</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-8f000b4 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="8f000b4" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-8f000b4"><h6 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Délai des organismes <span class="wdt-heading-colored-elements">d'homologation</span></span></h6></div>				</div>
				</div>
				<div class="elementor-element elementor-element-e182f11 elementor-widget elementor-widget-wdt-heading" data-id="e182f11" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-e182f11"><div class="wdt-heading-content-wrapper">L’homologation est une étape clé pour la mise en circulation des véhicules autonomes. Mais ces processus sont souvent longs et imprévisibles, avec des délais pouvant impacter tout le planning du projet.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-1ee4c4b common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="1ee4c4b" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text"> Prise de contact précoce avec les organismes certificateurs pour établir une relation de confiance</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Organiser des revues préliminaires pour identifier les points bloquants potentiels</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Préparer des dossiers d'homologation particulièrement rigoureux pour limiter les allers-retours</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Intégrer des marges de sécurité temporelles dans le planning pour absorber les délais imprévus</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-c8bc353 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="c8bc353" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-c8bc353"><h6 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Difficulté d'approvisionnement en <span class="wdt-heading-colored-elements">matériel</span></span></h6></div>				</div>
				</div>
				<div class="elementor-element elementor-element-e57a241 elementor-widget elementor-widget-wdt-heading" data-id="e57a241" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-e57a241"><div class="wdt-heading-content-wrapper">L’industrie automobile fait face à une pression croissante sur les chaînes d’approvisionnement : pénuries de composants électroniques, délais allongés, volatilité des prix… Un manque de matériel critique pourrait freiner voire stopper notre déploiement.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-5864aa7 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5864aa7" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Collaborer étroitement avec les fournisseurs pour sécuriser les approvisionnements critiques</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Identifier des alternatives pour les composants à risque</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Établir des stocks tampons pour les éléments essentiels</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Concevoir certaines solutions avec flexibilité pour s'adapter aux composants disponibles</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-de51bb7 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="de51bb7" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-de51bb7"><p class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Cette gestion proactive <span class="wdt-heading-colored-elements">des</span><span class="wdt-heading-colored-elements">risques</span>nous permet de maintenir le cap malgré les obstacles inévitables dans un projet de cette envergure.</span></p></div>				</div>
				</div>
				<div class="elementor-element elementor-element-f67d220 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="f67d220" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-f67d220"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Pour finir</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-87df184 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="87df184" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-87df184"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Ce projet n’était <span class="wdt-heading-colored-elements">pas</span><span class="wdt-heading-colored-elements">seulement</span>une course à la mise en conformité. Il s’agissait avant tout de bâtir un socle de confiance pour l’avenir des véhicules autonomes. <br/><br/> 🚗 La cybersécurité n’est pas une contrainte, c’est un moteur d’innovation.<br/> En intégrant la sécurité dès la conception, nous avons démontré qu’elle pouvait être un facteur de performance, et non un frein. <br/><br/> 🔒 Un pas vers une mobilité autonome de confiance.<br/> Notre travail contribue directement à la fiabilité des technologies autonomes, en assurant leur robustesse face aux menaces numériques. <br/><br/> 🏆 Blue Phénix, un acteur clé de la cybersécurité des systèmes critiques.<br/> À travers ce projet, nous avons affirmé notre expertise technique, notre vision stratégique et notre capacité à mener des projets d’envergure avec une approche pragmatique et agile. <br/><br/> 🌍 L’avenir se construit maintenant.<br/> Nous sommes convaincus que la sécurité sera un pilier essentiel de l’adoption des véhicules autonomes par le grand public. En posant aujourd’hui ces fondations solides, nous contribuons à façonner un futur plus sûr et plus fiable pour la mobilité de demain. <br/><br/> 🔜 Et après ?<br/> Ce projet n’est qu’une étape. L’évolution des menaces et des réglementations nous pousse à innover en permanence. Chez Blue Phénix, nous restons mobilisés pour anticiper les nouveaux défis et continuer à accompagner les acteurs de l’industrie vers l’excellence en cybersécurité.</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-7add03b elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="7add03b" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-7add03b"><h3 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Blue Phénix, à <span class="wdt-heading-colored-elements">travers</span><span class="wdt-heading-colored-elements">ce</span>projet emblématique, confirme sa position d'acteur incontournable dans la cybersécurité des systèmes critiques, alliant expertise technique, méthodologie éprouvée et vision stratégique.</span></h3></div>				</div>
				</div>
				<div class="elementor-element elementor-element-b592b2c elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="b592b2c" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="divider.default">
				<div class="elementor-widget-container">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-fc3854a elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="fc3854a" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-fc3854a"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les autres articles <span class="wdt-heading-colored-elements">de</span><span class="wdt-heading-colored-elements">cette</span>série:</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-07f9624 elementor-widget elementor-widget-wdt-blog-posts" data-id="07f9624" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-blog-posts.default">
				<div class="elementor-widget-container">
					<div class="wdt-posts-list-wrapper   wdt-post-list-carousel-07f9624" ><div class='tpl-blog-holder  apply-equal-height '><div class='grid-sizer  entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry '></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2835" class="post-2835 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3"><img fetchpriority="high" decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="629863" style="--dominant-color: #629863;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2839" class="post-2839 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="77876f" style="--dominant-color: #77876f;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2805" class="post-2805 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="6b8171" style="--dominant-color: #6b8171;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3</a>
	</h4>
</div><!-- Entry Title --></article></div></div><div class="pagination blog-pagination"><div class="newer-posts"></div><div class="older-posts"></div></div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6a1896e elementor-widget elementor-widget-wdt-post-navigation" data-id="6a1896e" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-navigation.default">
				<div class="elementor-widget-container">
					<div class="entry-post-navigation-wrapper "><!-- Entry Navigation -->
<div class="entry-post-navigation type3">
			<div class="post-prev-link">
					<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif) class="prev-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3">Previous Story</a></p>
					<span class="zmdi zmdi-long-arrow-left zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3">Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3</a>
					</h3>
				</div>

			</div>
						<div class="post-next-link">
					<a href="https://beta.catalystbluephenix.com/ia-cybersecurity/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/03/phenix-IA-NRV.avif) class="next-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/ia-cybersecurity/" title="Echec et mat : L&#039;A en cybersécurité">Next Story</a></p>
					<span class="zmdi zmdi-long-arrow-right zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/ia-cybersecurity/" title="Echec et mat : L&#039;A en cybersécurité">Echec et mat : L&#039;A en cybersécurité</a>
					</h3>
				</div>

			</div>
			</div><!-- Entry Navigation --></div>				</div>
				</div>
				<div class="elementor-element elementor-element-469ce67 elementor-widget elementor-widget-wdt-post-tags" data-id="469ce67" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-tags.default">
				<div class="elementor-widget-container">
					<div class="entry-tags-wrapper  ">
<!-- Entry Tags -->
<div class="single-entry-tags"><a href="https://beta.catalystbluephenix.com/tag/automobile/" rel="tag">automobile</a> <a href="https://beta.catalystbluephenix.com/tag/certification-cybersecurite/" rel="tag">certification cybersécurité</a> <a href="https://beta.catalystbluephenix.com/tag/conformite-reglementaire/" rel="tag">conformité réglementaire</a> <a href="https://beta.catalystbluephenix.com/tag/formation-cybersecurite/" rel="tag">formation cybersécurité</a> <a href="https://beta.catalystbluephenix.com/tag/gestion-des-risques/" rel="tag">gestion des risques</a> <a href="https://beta.catalystbluephenix.com/tag/homologation/" rel="tag">homologation</a> <a href="https://beta.catalystbluephenix.com/tag/infrastructures-critiques/" rel="tag">infrastructures critiques</a> <a href="https://beta.catalystbluephenix.com/tag/soc-automobile/" rel="tag">SOC automobile</a> <a href="https://beta.catalystbluephenix.com/tag/unr-ece-155/" rel="tag">UNR ECE 155</a> <a href="https://beta.catalystbluephenix.com/tag/unr-ece-156/" rel="tag">UNR ECE 156</a> <a href="https://beta.catalystbluephenix.com/tag/vehicules-autonomes/" rel="tag">véhicules autonomes</a> <a href="https://beta.catalystbluephenix.com/tag/zero-trust/" rel="tag">Zero Trust</a></div><!-- Entry Tags --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Retour d&#8217;expérience : constructeur de véhicules autonomes &#8211; 2/3</title>
		<link>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/</link>
					<comments>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/#respond</comments>
		
		<dc:creator><![CDATA[Ian Revault D'Allonnes]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 17:18:17 +0000</pubDate>
				<category><![CDATA[Cyberdéfense]]></category>
		<category><![CDATA[Intelligence Artificielle]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[IT Pro]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[automobile]]></category>
		<category><![CDATA[certification cybersécurité]]></category>
		<category><![CDATA[conformité réglementaire]]></category>
		<category><![CDATA[formation cybersécurité]]></category>
		<category><![CDATA[gestion des risques]]></category>
		<category><![CDATA[homologation]]></category>
		<category><![CDATA[infrastructures critiques]]></category>
		<category><![CDATA[SOC automobile]]></category>
		<category><![CDATA[UNR ECE 155]]></category>
		<category><![CDATA[UNR ECE 156]]></category>
		<category><![CDATA[véhicules autonomes]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://beta.catalystbluephenix.com/?p=2839</guid>

					<description><![CDATA[<p>Written by Ian Revault D&#8217;Allonnes Cyberdéfense Intelligence Artificielle IOT IT Pro Services Tech Retour d’expérience : Sécuriser les véhicules autonomes &#8211; Partie 2 Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, la cybersécurité est devenue un prérequis incontournable pour l’homologation des véhicules autonomes. Ces normes imposent aux constructeurs automobiles une gestion rigoureuse [&#8230;]</p>
<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2839" class="elementor elementor-2839">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-38664c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="38664c1" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-302505e" data-id="302505e" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-3155a51 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="3155a51" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0675d79" data-id="0675d79" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-51abccc elementor-widget elementor-widget-wdt-post-author" data-id="51abccc" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-author.default">
				<div class="elementor-widget-container">
					<div class="entry-author-wrapper meta-elements-filled-round ">
<!-- Entry Author -->
<div class="single-entry-author">
	<div class="meta-author-img">
		<img alt='' src='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=40&#038;d=mm&#038;r=g' srcset='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' />	</div>
	<div class="meta-author-info">
		<span>Written by</span>
		<a href="https://beta.catalystbluephenix.com/author/irevault/" title="View all posts by Ian Revault D'Allonnes">Ian Revault D'Allonnes</a>
    </div>
</div><!-- Entry Author --></div>				</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c96a413" data-id="c96a413" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-2670757 elementor-widget elementor-widget-wdt-post-categories" data-id="2670757" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-categories.default">
				<div class="elementor-widget-container">
					<div class="entry-categories-wrapper meta-elements-boxed-round ">
<!-- Entry Categories -->
<div class="single-entry-categories"><a href="https://beta.catalystbluephenix.com/category/cyberdefense/" rel="category tag">Cyberdéfense</a> <a href="https://beta.catalystbluephenix.com/category/ai/" rel="category tag">Intelligence Artificielle</a> <a href="https://beta.catalystbluephenix.com/category/iot/" rel="category tag">IOT</a> <a href="https://beta.catalystbluephenix.com/category/itpro/" rel="category tag">IT Pro</a> <a href="https://beta.catalystbluephenix.com/category/services/" rel="category tag">Services</a> <a href="https://beta.catalystbluephenix.com/category/tech/" rel="category tag">Tech</a></div><!-- Entry Categories --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<div class="elementor-element elementor-element-ed3001c elementor-widget elementor-widget-heading" data-id="ed3001c" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Retour d’expérience : Sécuriser les véhicules autonomes - Partie 2</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-f5e4725 elementor-widget elementor-widget-wdt-heading" data-id="f5e4725" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-f5e4725"><div class="wdt-heading-content-wrapper">Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, la cybersécurité est devenue un prérequis incontournable pour l’homologation des véhicules autonomes. Ces normes imposent aux constructeurs automobiles une gestion rigoureuse des risques cybernétiques, couvrant aussi bien la détection des menaces que la résilience des systèmes embarqués et des infrastructures connexes.
<br/><br/>
Dans ce cadre, nous avons été missionnés pour concevoir et déployer un pôle cyberdéfense au sein d’un constructeur de véhicules autonomes. L’objectif était double : établir une architecture de sécurité robuste et garantir la conformité réglementaire tout en intégrant des principes d’approche Zero Trust et de Security by Design dans l’ensemble du cycle de vie du véhicule.
<br/><br/>
Ce deuxième article d’une série de trois explore les défis rencontrés, notre méthodologie d’implémentation et les solutions techniques adoptées pour répondre aux exigences de sécurité et de résilience imposées par l’UNR ECE 155 et 156.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-fdeb371 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="fdeb371" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-fdeb371"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Après avoir posé <span class="wdt-heading-colored-elements">les</span><span class="wdt-heading-colored-elements">bases</span>d’une cybersécurité robuste, il était temps de structurer l’effort collectif et d’organiser le déploiement de nos initiatives. Un projet de cette ampleur ne peut réussir sans une approche méthodique et une équipe parfaitement coordonnée. Voici comment nous avons relevé ce défi.</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-e8280e4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="e8280e4" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="divider.default">
				<div class="elementor-widget-container">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-c6e7af2 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="c6e7af2" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-c6e7af2"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Troisième étape : <span class="wdt-heading-colored-elements">Organiser</span><span class="wdt-heading-colored-elements">l'effort</span>collectif</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-241ec31 elementor-widget elementor-widget-wdt-heading" data-id="241ec31" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-241ec31"><div class="wdt-heading-content-wrapper">La complexité du projet nécessitait une organisation rigoureuse mais adaptable. Dans un domaine où les technologies et les menaces évoluent en permanence, la flexibilité est clé. Nous avons donc opté pour une méthodologie Agile, qui nous permettait d’adapter nos priorités en temps réel et de réagir rapidement aux imprévus..
<br/><br/>
Avec des sprints de 3 semaines, nous avons prévu un rythme soutenu, favorisant l'itération rapide et l'amélioration continue. Cette cadence permet de livrer rapidement de la valeur tout en s'adaptant aux retours d'expérience et aux évolutions réglementaires.
<br/><br/>
Notre équipe pluridisciplinaire était composée de profils stratégiques soigneusement sélectionnés :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-7df5243 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="7df5243" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Account Manager : Assurant l'interface stratégique avec le client et veillant à l'alignement des objectifs</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Product Owner : Priorisant le backlog et maximisant la valeur métier des fonctionnalités développées</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Scrum Master : Facilitant le processus Agile et éliminant les obstacles</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Architecte Cyber et Infrastructure : Concevant les solutions techniques sécurisées et évolutives</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">DevSecOps : Intégrant la sécurité dans les pipelines de développement et de déploiement</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Ingénieur Sécurité Réseau : Implémentant les contrôles de sécurité réseau et surveillant les anomalies</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-0536201 elementor-widget elementor-widget-wdt-heading" data-id="0536201" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-0536201"><div class="wdt-heading-content-wrapper">Cette équipe pluridisciplinaire travaille main dans la main, avec un seul objectif : garantir la réussite du projet. Des réunions quotidiennes permettaient de synchroniser les efforts et d'identifier rapidement les blocages, tandis que des revues de sprint bimensuelles offrent l'occasion d'ajuster la stratégie.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-3060aa1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="3060aa1" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="divider.default">
				<div class="elementor-widget-container">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-e8666f7 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="e8666f7" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-e8666f7"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Quatrième étape : <span class="wdt-heading-colored-elements">Planifier</span><span class="wdt-heading-colored-elements">et</span>budgétiser avec précision</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-5728c13 elementor-widget elementor-widget-wdt-heading" data-id="5728c13" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-5728c13"><div class="wdt-heading-content-wrapper">Un projet d’une telle ampleur ne s’improvise pas. Il nous fallait une vision claire des ressources nécessaires, une feuille de route réaliste et surtout, une stratégie budgétaire bien maîtrisée.
Pour évaluer l'ampleur de l'effort, nous avons utilisé une approche de chiffrage « Top Down », en décomposant le projet en étapes clés. Cette méthodologie nous a permis d'établir des estimations réalistes basées sur l'expérience de projets similaires, tout en tenant compte des spécificités du contexte.
<br/><br/>
</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-5094cfb elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="5094cfb" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-5094cfb"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Cette méthode nous <span class="wdt-heading-colored-elements">a</span><span class="wdt-heading-colored-elements">permis</span>de :  <br/><br/>Éviter les sous-estimations en nous basant sur l’expérience de projets similaires <br/><br/>Prendre en compte les spécificités du contexte et des exigences réglementaires <br/><br/>Allouer les ressources de manière optimale, en hiérarchisant les priorités</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-21542db elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="21542db" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-21542db"><h4 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Un Roadmap pensé <span class="wdt-heading-colored-elements">pour</span><span class="wdt-heading-colored-elements">maximiser</span>l’impact</span></h4></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6d82a71 elementor-widget elementor-widget-wdt-heading" data-id="6d82a71" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-6d82a71"><div class="wdt-heading-content-wrapper">Le roadmap 2024-2025 a été conçu comme une suite d'itérations continues, démarrant en septembre 2024 avec un Sprint 0 pour structurer le backlog. Cette phase initiale, souvent négligée, a été cruciale pour :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-c8671b1 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="c8671b1" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Affiner la compréhension des besoins en consilidant</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Prioriser les initiatives selon leur impact sur la sécurité</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Établir les métriques de suivi</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Préparer l'environnement technique</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-737351b elementor-widget elementor-widget-wdt-heading" data-id="737351b" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-737351b"><div class="wdt-heading-content-wrapper">Suite à ce Sprint 0, nous avons planifié 12 sprints où chaque initiative est déployée, testée et optimisée. Le séquencement des initiatives a été pensé pour maximiser la valeur apportée rapidement, tout en posant les fondations nécessaires aux développements ultérieurs. Par exemple, la mise en place du SDLC sécurisé et la sensibilisation des équipes ont été priorisées car elles conditionnaient l'efficacité des autres initiatives.
<br/><br/>
Le plus grand défi était de tenir les délais imposés par les processus d’homologation, sans compromettre la qualité ni la sécurité. Grâce à notre approche itérative et à notre capacité d’adaptation, nous avons su réagir aux ajustements réglementaires tout en respectant notre planning initial.


Cette planification minutieuse nous a permis de respecter les délais critiques liés aux processus d'homologation, tout en maintenant la flexibilité nécessaire pour s'adapter aux imprévus.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-473a8c5 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="473a8c5" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-473a8c5"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">En combinant agilité, <span class="wdt-heading-colored-elements">rigueur</span><span class="wdt-heading-colored-elements">et</span>expertise, nous avons su structurer un projet ambitieux mais réaliste.<br/><br/> Notre équipe s’est organisée autour d’un cadre clair et collaboratif, tout en intégrant une flexibilité essentielle pour naviguer dans un environnement en perpétuelle évolution.<br/><br/> <br> Dans la dernière partie de cet article, nous reviendrons sur les défis concrets rencontrés lors de la mise en œuvre des solutions, ainsi que les enseignements tirés de cette expérience.</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6a2dc74 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="6a2dc74" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="divider.default">
				<div class="elementor-widget-container">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-0164959 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="0164959" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-0164959"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les autres articles <span class="wdt-heading-colored-elements">de</span><span class="wdt-heading-colored-elements">cette</span>série:</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-49f8ca7 elementor-widget elementor-widget-wdt-blog-posts" data-id="49f8ca7" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-blog-posts.default">
				<div class="elementor-widget-container">
					<div class="wdt-posts-list-wrapper   wdt-post-list-carousel-49f8ca7" ><div class='tpl-blog-holder  apply-equal-height '><div class='grid-sizer  entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry '></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2835" class="post-2835 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3"><img fetchpriority="high" decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="629863" style="--dominant-color: #629863;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2839" class="post-2839 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="77876f" style="--dominant-color: #77876f;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2805" class="post-2805 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="6b8171" style="--dominant-color: #6b8171;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3</a>
	</h4>
</div><!-- Entry Title --></article></div></div><div class="pagination blog-pagination"><div class="newer-posts"></div><div class="older-posts"></div></div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-cd6cbf0 elementor-widget elementor-widget-wdt-post-navigation" data-id="cd6cbf0" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-navigation.default">
				<div class="elementor-widget-container">
					<div class="entry-post-navigation-wrapper "><!-- Entry Navigation -->
<div class="entry-post-navigation type3">
			<div class="post-prev-link">
					<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif) class="prev-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 1/3">Previous Story</a></p>
					<span class="zmdi zmdi-long-arrow-left zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 1/3">Retour d&#039;expérience : constructeur de véhicules autonomes - 1/3</a>
					</h3>
				</div>

			</div>
						<div class="post-next-link">
					<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif) class="next-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 3/3">Next Story</a></p>
					<span class="zmdi zmdi-long-arrow-right zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 3/3">Retour d&#039;expérience : constructeur de véhicules autonomes - 3/3</a>
					</h3>
				</div>

			</div>
			</div><!-- Entry Navigation --></div>				</div>
				</div>
				<div class="elementor-element elementor-element-a4705af elementor-widget elementor-widget-wdt-post-tags" data-id="a4705af" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-tags.default">
				<div class="elementor-widget-container">
					<div class="entry-tags-wrapper  ">
<!-- Entry Tags -->
<div class="single-entry-tags"><a href="https://beta.catalystbluephenix.com/tag/automobile/" rel="tag">automobile</a> <a href="https://beta.catalystbluephenix.com/tag/certification-cybersecurite/" rel="tag">certification cybersécurité</a> <a href="https://beta.catalystbluephenix.com/tag/conformite-reglementaire/" rel="tag">conformité réglementaire</a> <a href="https://beta.catalystbluephenix.com/tag/formation-cybersecurite/" rel="tag">formation cybersécurité</a> <a href="https://beta.catalystbluephenix.com/tag/gestion-des-risques/" rel="tag">gestion des risques</a> <a href="https://beta.catalystbluephenix.com/tag/homologation/" rel="tag">homologation</a> <a href="https://beta.catalystbluephenix.com/tag/infrastructures-critiques/" rel="tag">infrastructures critiques</a> <a href="https://beta.catalystbluephenix.com/tag/soc-automobile/" rel="tag">SOC automobile</a> <a href="https://beta.catalystbluephenix.com/tag/unr-ece-155/" rel="tag">UNR ECE 155</a> <a href="https://beta.catalystbluephenix.com/tag/unr-ece-156/" rel="tag">UNR ECE 156</a> <a href="https://beta.catalystbluephenix.com/tag/vehicules-autonomes/" rel="tag">véhicules autonomes</a> <a href="https://beta.catalystbluephenix.com/tag/zero-trust/" rel="tag">Zero Trust</a></div><!-- Entry Tags --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Retour d&#8217;expérience : constructeur de véhicules autonomes &#8211; 1/3</title>
		<link>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/</link>
					<comments>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/#respond</comments>
		
		<dc:creator><![CDATA[Ian Revault D'Allonnes]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 10:49:58 +0000</pubDate>
				<category><![CDATA[Cyberdéfense]]></category>
		<category><![CDATA[Intelligence Artificielle]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[IT Pro]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[automobile]]></category>
		<category><![CDATA[certification cybersécurité]]></category>
		<category><![CDATA[conformité réglementaire]]></category>
		<category><![CDATA[formation cybersécurité]]></category>
		<category><![CDATA[gestion des risques]]></category>
		<category><![CDATA[homologation]]></category>
		<category><![CDATA[infrastructures critiques]]></category>
		<category><![CDATA[SOC automobile]]></category>
		<category><![CDATA[UNR ECE 155]]></category>
		<category><![CDATA[UNR ECE 156]]></category>
		<category><![CDATA[véhicules autonomes]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://beta.catalystbluephenix.com/?p=2805</guid>

					<description><![CDATA[<p>Written by Ian Revault D&#8217;Allonnes IT Pro Services Retour d&#8217;expérience : projet véhicules autonomes &#8211; Première partie La cybersécurité est devenue un enjeu incontournable pour l’industrie automobile. Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, garantir la sécurité des véhicules autonomes n’est plus une option, mais une obligation absolue. Face à ces [&#8230;]</p>
<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2805" class="elementor elementor-2805">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-5877234 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5877234" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2005812" data-id="2005812" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-f7c171a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="f7c171a" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e31729b" data-id="e31729b" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-999c644 elementor-widget elementor-widget-wdt-post-author" data-id="999c644" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-author.default">
				<div class="elementor-widget-container">
					<div class="entry-author-wrapper meta-elements-filled-round ">
<!-- Entry Author -->
<div class="single-entry-author">
	<div class="meta-author-img">
		<img alt='' src='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=40&#038;d=mm&#038;r=g' srcset='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' />	</div>
	<div class="meta-author-info">
		<span>Written by</span>
		<a href="https://beta.catalystbluephenix.com/author/irevault/" title="View all posts by Ian Revault D'Allonnes">Ian Revault D'Allonnes</a>
    </div>
</div><!-- Entry Author --></div>				</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-224438c" data-id="224438c" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-2a39d45 elementor-widget elementor-widget-wdt-post-categories" data-id="2a39d45" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-categories.default">
				<div class="elementor-widget-container">
					<div class="entry-categories-wrapper meta-elements-boxed-round ">
<!-- Entry Categories -->
<div class="single-entry-categories"><a href="https://beta.catalystbluephenix.com/category/cyberdefense/" rel="category tag">Cyberdéfense</a> <a href="https://beta.catalystbluephenix.com/category/ai/" rel="category tag">Intelligence Artificielle</a> <a href="https://beta.catalystbluephenix.com/category/iot/" rel="category tag">IOT</a> <a href="https://beta.catalystbluephenix.com/category/itpro/" rel="category tag">IT Pro</a> <a href="https://beta.catalystbluephenix.com/category/services/" rel="category tag">Services</a> <a href="https://beta.catalystbluephenix.com/category/tech/" rel="category tag">Tech</a></div><!-- Entry Categories --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<div class="elementor-element elementor-element-f971f2d elementor-widget elementor-widget-heading" data-id="f971f2d" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Retour d'expérience : projet véhicules autonomes - Première partie</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-d68e150 elementor-widget elementor-widget-wdt-heading" data-id="d68e150" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-d68e150"><div class="wdt-heading-content-wrapper">La cybersécurité est devenue un enjeu incontournable pour l’industrie automobile. Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, garantir la sécurité des véhicules autonomes n’est plus une option, mais une obligation absolue.

Face à ces défis, un constructeur de véhicules autonomes nous a confié une mission stratégique : concevoir et déployer un pôle cyberdéfense capable d’assurer à la fois conformité réglementaire et protection avancée contre les cybermenaces.

Loin d’être un simple exercice de mise en conformité, ce projet visait à bâtir une architecture de cybersécurité robuste, intégrant dès le départ les principes de Zero Trust et de Security by Design dans tout le cycle de vie du véhicule.

Dans cette étude de cas, nous partageons notre approche, nos défis et les solutions mises en place pour sécuriser une flotte de véhicules autonomes, depuis l’analyse des besoins jusqu’au déploiement des mesures de protection.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-4d4a8b1 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="4d4a8b1" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-4d4a8b1"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Première étape : <span class="wdt-heading-colored-elements">Comprendre</span><span class="wdt-heading-colored-elements">les</span>besoins</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-08a99d4 elementor-widget elementor-widget-wdt-heading" data-id="08a99d4" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-08a99d4"><div class="wdt-heading-content-wrapper">Avant de se lancer dans l’implémentation technique, nous avons pris le temps de comprendre les enjeux spécifiques du projet. Cette phase d’analyse a impliqué des échanges avec toutes les parties prenantes : ingénieurs, direction, équipes de production, experts en réglementation…</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-3962746 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="3962746" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-3962746"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Définition d’un cadre <span class="wdt-heading-colored-elements">de</span><span class="wdt-heading-colored-elements">sécurité</span>global</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-9d16fac elementor-widget elementor-widget-wdt-heading" data-id="9d16fac" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-9d16fac"><div class="wdt-heading-content-wrapper">Rapidement, nous avons identifié deux priorités essentielles :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-4081526 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="4081526" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Mettre en place un Cyber Security Management System (CSMS) conforme à la norme ISO/SAE 21434, garantissant une cybersécurité continue tout au long du cycle de vie des véhicules</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Développer un Software Update Management System (SUMS), basé sur l’ISO 24089, pour sécuriser les mises à jour logicielles et éviter toute faille d’exploitation</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-9ea36eb elementor-widget elementor-widget-wdt-heading" data-id="9ea36eb" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-9ea36eb"><div class="wdt-heading-content-wrapper">Nous avons également aligné notre approche avec les directives de sûreté fonctionnelle ISO 26262 et les exigences du STRMTG (Service Technique des Remontées Mécaniques et des Transports Guidés).

Cette première étape nous a permis de poser des bases solides, en nous assurant que chaque aspect du projet serait couvert par une stratégie de cybersécurité complète et évolutive.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-556465f elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="556465f" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-556465f"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Deuxième étape : <span class="wdt-heading-colored-elements">Définir</span><span class="wdt-heading-colored-elements">les</span>initiatives clés</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-a02706a elementor-widget elementor-widget-wdt-heading" data-id="a02706a" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-a02706a"><div class="wdt-heading-content-wrapper"> Comprendre les besoins, c’est bien. Transformer cette compréhension en actions concrètes, c’est encore mieux. Pour cela, nous avons défini 10 initiatives clés, véritables piliers de notre stratégie de cybersécurité. 
Ces actions-clés ont servi de feuille de route détaillée, avec des objectifs, des livrables et des indicateurs de performance clairement définis.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-b2b1741 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="b2b1741" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-b2b1741"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sécurisation de l’architecture <span class="wdt-heading-colored-elements">informatique</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-030c302 elementor-widget elementor-widget-wdt-heading" data-id="030c302" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-030c302"><div class="wdt-heading-content-wrapper">Pour protéger les données sensibles, nous avons conçu une architecture de sécurité à plusieurs niveaux, incluant :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-5e82efb common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5e82efb" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Une segmentation réseau stricte avec des zones de sécurité distinctes</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L’application du principe du moindre privilège pour limiter l’accès aux ressources</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La mise en place de mécanismes de chiffrement bout-en-bout pour les données critiques</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'établissement d'une stratégie de gestion des identités et des accès (IAM) robuste</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-e8b1f1a elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="e8b1f1a" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-e8b1f1a"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Protection du centre <span class="wdt-heading-colored-elements">de</span><span class="wdt-heading-colored-elements">supervision</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-05cf524 elementor-widget elementor-widget-wdt-heading" data-id="05cf524" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-05cf524"><div class="wdt-heading-content-wrapper">Véritable cœur névralgique du système, le centre de supervision ne doit jamais être compromis. Pour cela, nous avons :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-8aff823 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="8aff823" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Installé des pare-feu nouvelle génération avec inspection approfondie des paquets</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Déployé des systèmes de détection et de prévention d'intrusion (IDS/IPS)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Mis en place une solution SIEM (Security Information and Event Management) pour la corrélation des événements de sécurité</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Établi des procédures d'intervention d'urgence et de gestion de crise en cas d'incident majeur</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-699e9b0 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="699e9b0" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-699e9b0"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sécurisation du développement <span class="wdt-heading-colored-elements">logiciel</span><span class="wdt-heading-colored-elements">(SDLC)</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-2bbe8db elementor-widget elementor-widget-wdt-heading" data-id="2bbe8db" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-2bbe8db"><div class="wdt-heading-content-wrapper">Le cycle de développement logiciel sécurisé (Secure Development Life Cycle) est fondamental pour intégrer la sécurité dès la conception. Notre approche a inclus :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-5809745 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5809745" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'intégration de l'analyse de risques dès les phases de spécification</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La formation des développeurs aux bonnes pratiques de codage sécurisé</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'implémentation de revues de code systématiques avec focus sur la sécurité</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'automatisation des tests de sécurité statiques et dynamiques</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-890471b elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="890471b" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-890471b"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sensibilisation des équipes <span class="wdt-heading-colored-elements">à</span><span class="wdt-heading-colored-elements">la</span>cybersécurité</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6438023 elementor-widget elementor-widget-wdt-heading" data-id="6438023" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-6438023"><div class="wdt-heading-content-wrapper">Un système sécurisé ne sert à rien si les équipes ne sont pas formées à l’utiliser correctement. Nous avons donc lancé un programme de sensibilisation incluant :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-f652462 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f652462" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Des formations adaptées aux différents profils (développeurs, opérateurs, management)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Des exercices pratiques de simulation d'attaque (phishing, social engineering)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Des communications régulières sur les menaces émergentes</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La création d'une culture de sécurité où chaque employé se sent responsable</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-a9dc3d7 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="a9dc3d7" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-a9dc3d7"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Renforcement de la <span class="wdt-heading-colored-elements">sécurité</span><span class="wdt-heading-colored-elements">des</span>ordinateurs embarqués/ Durcissement des PC de conduite autonome</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-394b565 elementor-widget elementor-widget-wdt-heading" data-id="394b565" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-394b565"><div class="wdt-heading-content-wrapper">Les ordinateurs embarqués dans les véhicules sont particulièrement vulnérables aux attaques. Nous avons donc mis en œuvre :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-c91a650 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="c91a650" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Le verrouillage des configurations avec une approche basée sur les listes blanches</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La désactivation des services et ports non essentiels</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'implémentation de solutions de protection contre les malwares spécifiquement adaptées aux contraintes embarquées</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La sécurisation du démarrage avec Secure Boot et mesures d'intégrité</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La réduction au minimum vital de la surface d'attaque des systèmes embarqués communiquant</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-0520688 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="0520688" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-0520688"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Protection des communications <span class="wdt-heading-colored-elements">des</span><span class="wdt-heading-colored-elements">véhicules</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-b48fd6f elementor-widget elementor-widget-wdt-heading" data-id="b48fd6f" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-b48fd6f"><div class="wdt-heading-content-wrapper">La protection des véhicules eux-mêmes a nécessité une approche multiniveaux ; Chaque véhicule doit pouvoir communiquer en toute sécurité avec l’infrastructure :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-906e632 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="906e632" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Implémentation de protocoles de chiffrement robustes pour toutes les communications</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Développement de mécanismes d'authentification mutuelle entre le véhicule et l'infrastructure</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Mise en place de solutions de détection d'anomalies basées sur l'apprentissage du comportement normal</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Conception de mécanismes de fail-safe garantissant un comportement sûr même en cas d'attaque</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-aad3b7b elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="aad3b7b" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-aad3b7b"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sécurité du code <span class="wdt-heading-colored-elements">/Intégration</span><span class="wdt-heading-colored-elements">de</span>DevSecOps</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-9ac6321 elementor-widget elementor-widget-wdt-heading" data-id="9ac6321" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-9ac6321"><div class="wdt-heading-content-wrapper">L'intégration de la sécurité dans les processus de développement et d'opérations a été réalisée par :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-f45b736 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f45b736" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La mise en place de pipelines CI/CD intégrant des tests de sécurité automatisés</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'utilisation d'outils d'analyse de composition logicielle pour détecter les vulnérabilités dans les dépendances</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'implémentation de scanners de vulnérabilités dans les conteneurs et l'infrastructure</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La définition de gates de qualité bloquant le déploiement en cas de problème de sécurité critique</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-43e75ff elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="43e75ff" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-43e75ff"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sécurité système basée <span class="wdt-heading-colored-elements">sur</span><span class="wdt-heading-colored-elements">les</span>modèles (MBSE)</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6873930 elementor-widget elementor-widget-wdt-heading" data-id="6873930" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-6873930"><div class="wdt-heading-content-wrapper">L'approche Model-Based Systems Engineering a permis d'anticiper les vulnérabilités dès la conception :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-19fd364 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="19fd364" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Création de modèles de menaces détaillés</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Simulation d'attaques sur les modèles avant implémentation</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Vérification formelle des propriétés de sécurité critiques</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Génération automatique de tests basés sur les modèles</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-1ae78cf elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="1ae78cf" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-1ae78cf"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sécurité de la <span class="wdt-heading-colored-elements">chaîne</span><span class="wdt-heading-colored-elements">d'approvisionnement</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-a153f81 elementor-widget elementor-widget-wdt-heading" data-id="a153f81" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-a153f81"><div class="wdt-heading-content-wrapper">Dans un écosystème où de nombreux composants proviennent de fournisseurs tiers, nous avons :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-43e15a7 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="43e15a7" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Établi un processus rigoureux d'évaluation de la sécurité des fournisseurs</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Implémenté des mécanismes de vérification d'intégrité des composants livrés</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Mis en place des clauses contractuelles exigeant des standards de sécurité spécifiques</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Développé une stratégie de gestion des vulnérabilités impliquant tous les acteurs de la chaîne</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-d8a7687 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="d8a7687" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-d8a7687"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Cadre de gestion <span class="wdt-heading-colored-elements">des</span><span class="wdt-heading-colored-elements">risques</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-71ab7ae elementor-widget elementor-widget-wdt-heading" data-id="71ab7ae" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-71ab7ae"><div class="wdt-heading-content-wrapper">Finalement, nous avons appliqué la méthode EBIOS Risk Manager pour :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-435aaac common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="435aaac" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Identifier systématiquement les scénarios de menace pertinents</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Évaluer l'impact potentiel et la probabilité de chaque scénario</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Définir des mesures de sécurité proportionnées aux risques identifiés</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Établir un processus continu de réévaluation des risques</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-762234e elementor-widget elementor-widget-heading" data-id="762234e" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">Grâce à cette approche, nous avons posé des fondations solides pour garantir la sécurité des véhicules autonomes. Dans le prochain article, nous plongerons plus en détail dans l’implémentation de ces initiatives et les défis que nous avons dû relever en chemin.

À suivre…</h5>				</div>
				</div>
				<div class="elementor-element elementor-element-28dceb7 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="28dceb7" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-28dceb7"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les autres articles <span class="wdt-heading-colored-elements">de</span><span class="wdt-heading-colored-elements">cette</span>série:</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-2c64cc6 elementor-widget elementor-widget-wdt-blog-posts" data-id="2c64cc6" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-blog-posts.default">
				<div class="elementor-widget-container">
					<div class="wdt-posts-list-wrapper   wdt-post-list-carousel-2c64cc6" ><div class='tpl-blog-holder  apply-equal-height '><div class='grid-sizer  entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry '></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2835" class="post-2835 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3"><img fetchpriority="high" decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="629863" style="--dominant-color: #629863;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2839" class="post-2839 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="77876f" style="--dominant-color: #77876f;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2805" class="post-2805 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="6b8171" style="--dominant-color: #6b8171;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3</a>
	</h4>
</div><!-- Entry Title --></article></div></div><div class="pagination blog-pagination"><div class="newer-posts"></div><div class="older-posts"></div></div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6b3aa51 elementor-widget elementor-widget-wdt-post-navigation" data-id="6b3aa51" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-navigation.default">
				<div class="elementor-widget-container">
					<div class="entry-post-navigation-wrapper "><!-- Entry Navigation -->
<div class="entry-post-navigation type3">
			<div class="post-prev-link">
					<a href="https://beta.catalystbluephenix.com/observabilite-principe-incertitude-ia/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/observabilite-png.avif) class="prev-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/observabilite-principe-incertitude-ia/" title="L&#039;Observabilité : Du Principe d&#039;Incertitude à l&#039;IA">Previous Story</a></p>
					<span class="zmdi zmdi-long-arrow-left zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/observabilite-principe-incertitude-ia/" title="L&#039;Observabilité : Du Principe d&#039;Incertitude à l&#039;IA">L&#039;Observabilité : Du Principe d&#039;Incertitude à l&#039;IA</a>
					</h3>
				</div>

			</div>
						<div class="post-next-link">
					<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif) class="next-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3">Next Story</a></p>
					<span class="zmdi zmdi-long-arrow-right zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3">Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3</a>
					</h3>
				</div>

			</div>
			</div><!-- Entry Navigation --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
