<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Archives des gestion des risques - Catalyst Blue Phenix</title>
	<atom:link href="https://beta.catalystbluephenix.com/tag/gestion-des-risques/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Tue, 25 Feb 2025 15:29:13 +0000</lastBuildDate>
	<language>fr-FR</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://beta.catalystbluephenix.com/wp-content/uploads/2023/11/IMG_20241014_123254-1-150x150.png</url>
	<title>Archives des gestion des risques - Catalyst Blue Phenix</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Retour d&#8217;expérience : constructeur de véhicules autonomes &#8211; 3/3</title>
		<link>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/</link>
					<comments>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/#respond</comments>
		
		<dc:creator><![CDATA[Ian Revault D'Allonnes]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 17:20:18 +0000</pubDate>
				<category><![CDATA[Cyberdéfense]]></category>
		<category><![CDATA[Intelligence Artificielle]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[IT Pro]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[automobile]]></category>
		<category><![CDATA[certification cybersécurité]]></category>
		<category><![CDATA[conformité réglementaire]]></category>
		<category><![CDATA[formation cybersécurité]]></category>
		<category><![CDATA[gestion des risques]]></category>
		<category><![CDATA[homologation]]></category>
		<category><![CDATA[infrastructures critiques]]></category>
		<category><![CDATA[SOC automobile]]></category>
		<category><![CDATA[UNR ECE 155]]></category>
		<category><![CDATA[UNR ECE 156]]></category>
		<category><![CDATA[véhicules autonomes]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://beta.catalystbluephenix.com/?p=2835</guid>

					<description><![CDATA[<p>Written by Ian Revault D&#8217;Allonnes Cyberdéfense Intelligence Artificielle IOT IT Pro Services Tech Retour d’expérience : Sécuriser les véhicules autonomes &#8211; Partie 3 Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, la cybersécurité est devenue un prérequis incontournable pour l’homologation des véhicules autonomes. Ces normes imposent aux constructeurs automobiles une gestion rigoureuse [&#8230;]</p>
<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2835" class="elementor elementor-2835">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-0a3cd5e elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="0a3cd5e" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4404a66" data-id="4404a66" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-aae5cd0 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="aae5cd0" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ba34d6a" data-id="ba34d6a" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-46ded0a elementor-widget elementor-widget-wdt-post-author" data-id="46ded0a" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-author.default">
				<div class="elementor-widget-container">
					<div class="entry-author-wrapper meta-elements-filled-round ">
<!-- Entry Author -->
<div class="single-entry-author">
	<div class="meta-author-img">
		<img alt='' src='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=40&#038;d=mm&#038;r=g' srcset='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' />	</div>
	<div class="meta-author-info">
		<span>Written by</span>
		<a href="https://beta.catalystbluephenix.com/author/irevault/" title="View all posts by Ian Revault D'Allonnes">Ian Revault D'Allonnes</a>
    </div>
</div><!-- Entry Author --></div>				</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fb04380" data-id="fb04380" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-9bc0ee4 elementor-widget elementor-widget-wdt-post-categories" data-id="9bc0ee4" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-categories.default">
				<div class="elementor-widget-container">
					<div class="entry-categories-wrapper meta-elements-boxed-round ">
<!-- Entry Categories -->
<div class="single-entry-categories"><a href="https://beta.catalystbluephenix.com/category/cyberdefense/" rel="category tag">Cyberdéfense</a> <a href="https://beta.catalystbluephenix.com/category/ai/" rel="category tag">Intelligence Artificielle</a> <a href="https://beta.catalystbluephenix.com/category/iot/" rel="category tag">IOT</a> <a href="https://beta.catalystbluephenix.com/category/itpro/" rel="category tag">IT Pro</a> <a href="https://beta.catalystbluephenix.com/category/services/" rel="category tag">Services</a> <a href="https://beta.catalystbluephenix.com/category/tech/" rel="category tag">Tech</a></div><!-- Entry Categories --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<div class="elementor-element elementor-element-ea492b4 elementor-widget elementor-widget-heading" data-id="ea492b4" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Retour d’expérience : Sécuriser les véhicules autonomes - Partie 3</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-d69370f elementor-widget elementor-widget-wdt-heading" data-id="d69370f" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-d69370f"><div class="wdt-heading-content-wrapper">Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, la cybersécurité est devenue un prérequis incontournable pour l’homologation des véhicules autonomes. Ces normes imposent aux constructeurs automobiles une gestion rigoureuse des risques cybernétiques, couvrant aussi bien la détection des menaces que la résilience des systèmes embarqués et des infrastructures connexes.
<br/><br/>
Dans ce cadre, nous avons été missionnés pour concevoir et déployer un pôle cyberdéfense au sein d’un constructeur de véhicules autonomes. L’objectif était double : établir une architecture de sécurité robuste et garantir la conformité réglementaire tout en intégrant des principes d’approche Zero Trust et de Security by Design dans l’ensemble du cycle de vie du véhicule.
<br/><br/>Nous avons posé des bases solides, structuré nos efforts et planifié chaque étape avec minutie. Mais tout projet d’envergure comporte des risques. Plutôt que de les subir, nous avons choisi de les anticiper et de les gérer de manière proactive. Cette approche nous a permis d’éviter des blocages majeurs et de garantir une exécution fluide du projet.<br/><br/>

Ce dernier article d’une série de trois explore les défis rencontrés, notre méthodologie d’implémentation et les solutions techniques adoptées pour répondre aux exigences de sécurité et de résilience imposées par l’UNR ECE 155 et 156.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-f632f34 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="f632f34" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-f632f34"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Cinquième étape : <span class="wdt-heading-colored-elements">Anticiper</span><span class="wdt-heading-colored-elements">les</span>risques et avancer avec détermination</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-9e8e5c7 elementor-widget elementor-widget-wdt-heading" data-id="9e8e5c7" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-9e8e5c7"><div class="wdt-heading-content-wrapper">Dans un projet aussi ambitieux, les imprévus sont inévitables. Ce qui fait la différence, c’est la capacité à les anticiper et à s’adapter rapidement. Nous avons donc mis en place une stratégie de gestion des risques ciblant les menaces les plus critiques.
<br/> <br/> 
Parmi les risques critiques, nous avons particulièrement travaillé sur :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-65278ba elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="65278ba" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-65278ba"><h6 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Indisponibilité de ressources <span class="wdt-heading-colored-elements">clés</span></span></h6></div>				</div>
				</div>
				<div class="elementor-element elementor-element-01b28fa elementor-widget elementor-widget-wdt-heading" data-id="01b28fa" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-01b28fa"><div class="wdt-heading-content-wrapper">Le succès d’un projet dépend avant tout des compétences et de l’implication des équipes. Mais que se passe-t-il si une expertise cruciale vient à manquer ? Une ressource indisponible, un départ imprévu ou une surcharge de travail peuvent vite compromettre les délais et la qualité des livrables.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-0b7136d common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="0b7136d" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Un plan de continuité avec identification des compétences critiques et des doublons</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Une documentation exhaustive permettant le transfert de connaissance</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Des formations croisées pour développer la polyvalence de l'équipe</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Un réseau de partenaires pouvant fournir des ressources supplémentaires en cas de besoin</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-8f000b4 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="8f000b4" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-8f000b4"><h6 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Délai des organismes <span class="wdt-heading-colored-elements">d'homologation</span></span></h6></div>				</div>
				</div>
				<div class="elementor-element elementor-element-e182f11 elementor-widget elementor-widget-wdt-heading" data-id="e182f11" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-e182f11"><div class="wdt-heading-content-wrapper">L’homologation est une étape clé pour la mise en circulation des véhicules autonomes. Mais ces processus sont souvent longs et imprévisibles, avec des délais pouvant impacter tout le planning du projet.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-1ee4c4b common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="1ee4c4b" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text"> Prise de contact précoce avec les organismes certificateurs pour établir une relation de confiance</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Organiser des revues préliminaires pour identifier les points bloquants potentiels</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Préparer des dossiers d'homologation particulièrement rigoureux pour limiter les allers-retours</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Intégrer des marges de sécurité temporelles dans le planning pour absorber les délais imprévus</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-c8bc353 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="c8bc353" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-c8bc353"><h6 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Difficulté d'approvisionnement en <span class="wdt-heading-colored-elements">matériel</span></span></h6></div>				</div>
				</div>
				<div class="elementor-element elementor-element-e57a241 elementor-widget elementor-widget-wdt-heading" data-id="e57a241" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-e57a241"><div class="wdt-heading-content-wrapper">L’industrie automobile fait face à une pression croissante sur les chaînes d’approvisionnement : pénuries de composants électroniques, délais allongés, volatilité des prix… Un manque de matériel critique pourrait freiner voire stopper notre déploiement.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-5864aa7 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5864aa7" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Collaborer étroitement avec les fournisseurs pour sécuriser les approvisionnements critiques</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Identifier des alternatives pour les composants à risque</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Établir des stocks tampons pour les éléments essentiels</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Concevoir certaines solutions avec flexibilité pour s'adapter aux composants disponibles</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-de51bb7 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="de51bb7" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-de51bb7"><p class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Cette gestion proactive <span class="wdt-heading-colored-elements">des</span><span class="wdt-heading-colored-elements">risques</span>nous permet de maintenir le cap malgré les obstacles inévitables dans un projet de cette envergure.</span></p></div>				</div>
				</div>
				<div class="elementor-element elementor-element-f67d220 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="f67d220" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-f67d220"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Pour finir</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-87df184 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="87df184" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-87df184"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Ce projet n’était <span class="wdt-heading-colored-elements">pas</span><span class="wdt-heading-colored-elements">seulement</span>une course à la mise en conformité. Il s’agissait avant tout de bâtir un socle de confiance pour l’avenir des véhicules autonomes. <br/><br/> 🚗 La cybersécurité n’est pas une contrainte, c’est un moteur d’innovation.<br/> En intégrant la sécurité dès la conception, nous avons démontré qu’elle pouvait être un facteur de performance, et non un frein. <br/><br/> 🔒 Un pas vers une mobilité autonome de confiance.<br/> Notre travail contribue directement à la fiabilité des technologies autonomes, en assurant leur robustesse face aux menaces numériques. <br/><br/> 🏆 Blue Phénix, un acteur clé de la cybersécurité des systèmes critiques.<br/> À travers ce projet, nous avons affirmé notre expertise technique, notre vision stratégique et notre capacité à mener des projets d’envergure avec une approche pragmatique et agile. <br/><br/> 🌍 L’avenir se construit maintenant.<br/> Nous sommes convaincus que la sécurité sera un pilier essentiel de l’adoption des véhicules autonomes par le grand public. En posant aujourd’hui ces fondations solides, nous contribuons à façonner un futur plus sûr et plus fiable pour la mobilité de demain. <br/><br/> 🔜 Et après ?<br/> Ce projet n’est qu’une étape. L’évolution des menaces et des réglementations nous pousse à innover en permanence. Chez Blue Phénix, nous restons mobilisés pour anticiper les nouveaux défis et continuer à accompagner les acteurs de l’industrie vers l’excellence en cybersécurité.</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-7add03b elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="7add03b" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-7add03b"><h3 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Blue Phénix, à <span class="wdt-heading-colored-elements">travers</span><span class="wdt-heading-colored-elements">ce</span>projet emblématique, confirme sa position d'acteur incontournable dans la cybersécurité des systèmes critiques, alliant expertise technique, méthodologie éprouvée et vision stratégique.</span></h3></div>				</div>
				</div>
				<div class="elementor-element elementor-element-b592b2c elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="b592b2c" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="divider.default">
				<div class="elementor-widget-container">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-fc3854a elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="fc3854a" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-fc3854a"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les autres articles <span class="wdt-heading-colored-elements">de</span><span class="wdt-heading-colored-elements">cette</span>série:</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-07f9624 elementor-widget elementor-widget-wdt-blog-posts" data-id="07f9624" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-blog-posts.default">
				<div class="elementor-widget-container">
					<div class="wdt-posts-list-wrapper   wdt-post-list-carousel-07f9624" ><div class='tpl-blog-holder  apply-equal-height '><div class='grid-sizer  entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry '></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2835" class="post-2835 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3"><img fetchpriority="high" decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="629863" style="--dominant-color: #629863;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2839" class="post-2839 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="77876f" style="--dominant-color: #77876f;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2805" class="post-2805 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="6b8171" style="--dominant-color: #6b8171;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3</a>
	</h4>
</div><!-- Entry Title --></article></div></div><div class="pagination blog-pagination"><div class="newer-posts"></div><div class="older-posts"></div></div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6a1896e elementor-widget elementor-widget-wdt-post-navigation" data-id="6a1896e" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-navigation.default">
				<div class="elementor-widget-container">
					<div class="entry-post-navigation-wrapper "><!-- Entry Navigation -->
<div class="entry-post-navigation type3">
			<div class="post-prev-link">
					<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif) class="prev-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3">Previous Story</a></p>
					<span class="zmdi zmdi-long-arrow-left zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3">Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3</a>
					</h3>
				</div>

			</div>
						<div class="post-next-link">
					<a href="https://beta.catalystbluephenix.com/ia-cybersecurity/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/03/phenix-IA-NRV.avif) class="next-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/ia-cybersecurity/" title="Echec et mat : L&#039;A en cybersécurité">Next Story</a></p>
					<span class="zmdi zmdi-long-arrow-right zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/ia-cybersecurity/" title="Echec et mat : L&#039;A en cybersécurité">Echec et mat : L&#039;A en cybersécurité</a>
					</h3>
				</div>

			</div>
			</div><!-- Entry Navigation --></div>				</div>
				</div>
				<div class="elementor-element elementor-element-469ce67 elementor-widget elementor-widget-wdt-post-tags" data-id="469ce67" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-tags.default">
				<div class="elementor-widget-container">
					<div class="entry-tags-wrapper  ">
<!-- Entry Tags -->
<div class="single-entry-tags"><a href="https://beta.catalystbluephenix.com/tag/automobile/" rel="tag">automobile</a> <a href="https://beta.catalystbluephenix.com/tag/certification-cybersecurite/" rel="tag">certification cybersécurité</a> <a href="https://beta.catalystbluephenix.com/tag/conformite-reglementaire/" rel="tag">conformité réglementaire</a> <a href="https://beta.catalystbluephenix.com/tag/formation-cybersecurite/" rel="tag">formation cybersécurité</a> <a href="https://beta.catalystbluephenix.com/tag/gestion-des-risques/" rel="tag">gestion des risques</a> <a href="https://beta.catalystbluephenix.com/tag/homologation/" rel="tag">homologation</a> <a href="https://beta.catalystbluephenix.com/tag/infrastructures-critiques/" rel="tag">infrastructures critiques</a> <a href="https://beta.catalystbluephenix.com/tag/soc-automobile/" rel="tag">SOC automobile</a> <a href="https://beta.catalystbluephenix.com/tag/unr-ece-155/" rel="tag">UNR ECE 155</a> <a href="https://beta.catalystbluephenix.com/tag/unr-ece-156/" rel="tag">UNR ECE 156</a> <a href="https://beta.catalystbluephenix.com/tag/vehicules-autonomes/" rel="tag">véhicules autonomes</a> <a href="https://beta.catalystbluephenix.com/tag/zero-trust/" rel="tag">Zero Trust</a></div><!-- Entry Tags --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Retour d&#8217;expérience : constructeur de véhicules autonomes &#8211; 2/3</title>
		<link>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/</link>
					<comments>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/#respond</comments>
		
		<dc:creator><![CDATA[Ian Revault D'Allonnes]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 17:18:17 +0000</pubDate>
				<category><![CDATA[Cyberdéfense]]></category>
		<category><![CDATA[Intelligence Artificielle]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[IT Pro]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[automobile]]></category>
		<category><![CDATA[certification cybersécurité]]></category>
		<category><![CDATA[conformité réglementaire]]></category>
		<category><![CDATA[formation cybersécurité]]></category>
		<category><![CDATA[gestion des risques]]></category>
		<category><![CDATA[homologation]]></category>
		<category><![CDATA[infrastructures critiques]]></category>
		<category><![CDATA[SOC automobile]]></category>
		<category><![CDATA[UNR ECE 155]]></category>
		<category><![CDATA[UNR ECE 156]]></category>
		<category><![CDATA[véhicules autonomes]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://beta.catalystbluephenix.com/?p=2839</guid>

					<description><![CDATA[<p>Written by Ian Revault D&#8217;Allonnes Cyberdéfense Intelligence Artificielle IOT IT Pro Services Tech Retour d’expérience : Sécuriser les véhicules autonomes &#8211; Partie 2 Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, la cybersécurité est devenue un prérequis incontournable pour l’homologation des véhicules autonomes. Ces normes imposent aux constructeurs automobiles une gestion rigoureuse [&#8230;]</p>
<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2839" class="elementor elementor-2839">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-38664c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="38664c1" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-302505e" data-id="302505e" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-3155a51 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="3155a51" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0675d79" data-id="0675d79" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-51abccc elementor-widget elementor-widget-wdt-post-author" data-id="51abccc" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-author.default">
				<div class="elementor-widget-container">
					<div class="entry-author-wrapper meta-elements-filled-round ">
<!-- Entry Author -->
<div class="single-entry-author">
	<div class="meta-author-img">
		<img alt='' src='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=40&#038;d=mm&#038;r=g' srcset='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' />	</div>
	<div class="meta-author-info">
		<span>Written by</span>
		<a href="https://beta.catalystbluephenix.com/author/irevault/" title="View all posts by Ian Revault D'Allonnes">Ian Revault D'Allonnes</a>
    </div>
</div><!-- Entry Author --></div>				</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c96a413" data-id="c96a413" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-2670757 elementor-widget elementor-widget-wdt-post-categories" data-id="2670757" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-categories.default">
				<div class="elementor-widget-container">
					<div class="entry-categories-wrapper meta-elements-boxed-round ">
<!-- Entry Categories -->
<div class="single-entry-categories"><a href="https://beta.catalystbluephenix.com/category/cyberdefense/" rel="category tag">Cyberdéfense</a> <a href="https://beta.catalystbluephenix.com/category/ai/" rel="category tag">Intelligence Artificielle</a> <a href="https://beta.catalystbluephenix.com/category/iot/" rel="category tag">IOT</a> <a href="https://beta.catalystbluephenix.com/category/itpro/" rel="category tag">IT Pro</a> <a href="https://beta.catalystbluephenix.com/category/services/" rel="category tag">Services</a> <a href="https://beta.catalystbluephenix.com/category/tech/" rel="category tag">Tech</a></div><!-- Entry Categories --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<div class="elementor-element elementor-element-ed3001c elementor-widget elementor-widget-heading" data-id="ed3001c" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Retour d’expérience : Sécuriser les véhicules autonomes - Partie 2</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-f5e4725 elementor-widget elementor-widget-wdt-heading" data-id="f5e4725" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-f5e4725"><div class="wdt-heading-content-wrapper">Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, la cybersécurité est devenue un prérequis incontournable pour l’homologation des véhicules autonomes. Ces normes imposent aux constructeurs automobiles une gestion rigoureuse des risques cybernétiques, couvrant aussi bien la détection des menaces que la résilience des systèmes embarqués et des infrastructures connexes.
<br/><br/>
Dans ce cadre, nous avons été missionnés pour concevoir et déployer un pôle cyberdéfense au sein d’un constructeur de véhicules autonomes. L’objectif était double : établir une architecture de sécurité robuste et garantir la conformité réglementaire tout en intégrant des principes d’approche Zero Trust et de Security by Design dans l’ensemble du cycle de vie du véhicule.
<br/><br/>
Ce deuxième article d’une série de trois explore les défis rencontrés, notre méthodologie d’implémentation et les solutions techniques adoptées pour répondre aux exigences de sécurité et de résilience imposées par l’UNR ECE 155 et 156.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-fdeb371 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="fdeb371" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-fdeb371"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Après avoir posé <span class="wdt-heading-colored-elements">les</span><span class="wdt-heading-colored-elements">bases</span>d’une cybersécurité robuste, il était temps de structurer l’effort collectif et d’organiser le déploiement de nos initiatives. Un projet de cette ampleur ne peut réussir sans une approche méthodique et une équipe parfaitement coordonnée. Voici comment nous avons relevé ce défi.</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-e8280e4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="e8280e4" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="divider.default">
				<div class="elementor-widget-container">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-c6e7af2 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="c6e7af2" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-c6e7af2"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Troisième étape : <span class="wdt-heading-colored-elements">Organiser</span><span class="wdt-heading-colored-elements">l'effort</span>collectif</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-241ec31 elementor-widget elementor-widget-wdt-heading" data-id="241ec31" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-241ec31"><div class="wdt-heading-content-wrapper">La complexité du projet nécessitait une organisation rigoureuse mais adaptable. Dans un domaine où les technologies et les menaces évoluent en permanence, la flexibilité est clé. Nous avons donc opté pour une méthodologie Agile, qui nous permettait d’adapter nos priorités en temps réel et de réagir rapidement aux imprévus..
<br/><br/>
Avec des sprints de 3 semaines, nous avons prévu un rythme soutenu, favorisant l'itération rapide et l'amélioration continue. Cette cadence permet de livrer rapidement de la valeur tout en s'adaptant aux retours d'expérience et aux évolutions réglementaires.
<br/><br/>
Notre équipe pluridisciplinaire était composée de profils stratégiques soigneusement sélectionnés :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-7df5243 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="7df5243" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Account Manager : Assurant l'interface stratégique avec le client et veillant à l'alignement des objectifs</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Product Owner : Priorisant le backlog et maximisant la valeur métier des fonctionnalités développées</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Scrum Master : Facilitant le processus Agile et éliminant les obstacles</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Architecte Cyber et Infrastructure : Concevant les solutions techniques sécurisées et évolutives</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">DevSecOps : Intégrant la sécurité dans les pipelines de développement et de déploiement</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Ingénieur Sécurité Réseau : Implémentant les contrôles de sécurité réseau et surveillant les anomalies</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-0536201 elementor-widget elementor-widget-wdt-heading" data-id="0536201" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-0536201"><div class="wdt-heading-content-wrapper">Cette équipe pluridisciplinaire travaille main dans la main, avec un seul objectif : garantir la réussite du projet. Des réunions quotidiennes permettaient de synchroniser les efforts et d'identifier rapidement les blocages, tandis que des revues de sprint bimensuelles offrent l'occasion d'ajuster la stratégie.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-3060aa1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="3060aa1" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="divider.default">
				<div class="elementor-widget-container">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-e8666f7 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="e8666f7" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-e8666f7"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Quatrième étape : <span class="wdt-heading-colored-elements">Planifier</span><span class="wdt-heading-colored-elements">et</span>budgétiser avec précision</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-5728c13 elementor-widget elementor-widget-wdt-heading" data-id="5728c13" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-5728c13"><div class="wdt-heading-content-wrapper">Un projet d’une telle ampleur ne s’improvise pas. Il nous fallait une vision claire des ressources nécessaires, une feuille de route réaliste et surtout, une stratégie budgétaire bien maîtrisée.
Pour évaluer l'ampleur de l'effort, nous avons utilisé une approche de chiffrage « Top Down », en décomposant le projet en étapes clés. Cette méthodologie nous a permis d'établir des estimations réalistes basées sur l'expérience de projets similaires, tout en tenant compte des spécificités du contexte.
<br/><br/>
</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-5094cfb elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="5094cfb" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-5094cfb"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Cette méthode nous <span class="wdt-heading-colored-elements">a</span><span class="wdt-heading-colored-elements">permis</span>de :  <br/><br/>Éviter les sous-estimations en nous basant sur l’expérience de projets similaires <br/><br/>Prendre en compte les spécificités du contexte et des exigences réglementaires <br/><br/>Allouer les ressources de manière optimale, en hiérarchisant les priorités</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-21542db elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="21542db" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-21542db"><h4 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Un Roadmap pensé <span class="wdt-heading-colored-elements">pour</span><span class="wdt-heading-colored-elements">maximiser</span>l’impact</span></h4></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6d82a71 elementor-widget elementor-widget-wdt-heading" data-id="6d82a71" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-6d82a71"><div class="wdt-heading-content-wrapper">Le roadmap 2024-2025 a été conçu comme une suite d'itérations continues, démarrant en septembre 2024 avec un Sprint 0 pour structurer le backlog. Cette phase initiale, souvent négligée, a été cruciale pour :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-c8671b1 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="c8671b1" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Affiner la compréhension des besoins en consilidant</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Prioriser les initiatives selon leur impact sur la sécurité</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Établir les métriques de suivi</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Préparer l'environnement technique</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-737351b elementor-widget elementor-widget-wdt-heading" data-id="737351b" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-737351b"><div class="wdt-heading-content-wrapper">Suite à ce Sprint 0, nous avons planifié 12 sprints où chaque initiative est déployée, testée et optimisée. Le séquencement des initiatives a été pensé pour maximiser la valeur apportée rapidement, tout en posant les fondations nécessaires aux développements ultérieurs. Par exemple, la mise en place du SDLC sécurisé et la sensibilisation des équipes ont été priorisées car elles conditionnaient l'efficacité des autres initiatives.
<br/><br/>
Le plus grand défi était de tenir les délais imposés par les processus d’homologation, sans compromettre la qualité ni la sécurité. Grâce à notre approche itérative et à notre capacité d’adaptation, nous avons su réagir aux ajustements réglementaires tout en respectant notre planning initial.


Cette planification minutieuse nous a permis de respecter les délais critiques liés aux processus d'homologation, tout en maintenant la flexibilité nécessaire pour s'adapter aux imprévus.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-473a8c5 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="473a8c5" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-473a8c5"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">En combinant agilité, <span class="wdt-heading-colored-elements">rigueur</span><span class="wdt-heading-colored-elements">et</span>expertise, nous avons su structurer un projet ambitieux mais réaliste.<br/><br/> Notre équipe s’est organisée autour d’un cadre clair et collaboratif, tout en intégrant une flexibilité essentielle pour naviguer dans un environnement en perpétuelle évolution.<br/><br/> <br> Dans la dernière partie de cet article, nous reviendrons sur les défis concrets rencontrés lors de la mise en œuvre des solutions, ainsi que les enseignements tirés de cette expérience.</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6a2dc74 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="6a2dc74" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="divider.default">
				<div class="elementor-widget-container">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-0164959 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="0164959" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-0164959"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les autres articles <span class="wdt-heading-colored-elements">de</span><span class="wdt-heading-colored-elements">cette</span>série:</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-49f8ca7 elementor-widget elementor-widget-wdt-blog-posts" data-id="49f8ca7" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-blog-posts.default">
				<div class="elementor-widget-container">
					<div class="wdt-posts-list-wrapper   wdt-post-list-carousel-49f8ca7" ><div class='tpl-blog-holder  apply-equal-height '><div class='grid-sizer  entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry '></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2835" class="post-2835 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3"><img fetchpriority="high" decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="629863" style="--dominant-color: #629863;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2839" class="post-2839 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="77876f" style="--dominant-color: #77876f;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2805" class="post-2805 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="6b8171" style="--dominant-color: #6b8171;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3</a>
	</h4>
</div><!-- Entry Title --></article></div></div><div class="pagination blog-pagination"><div class="newer-posts"></div><div class="older-posts"></div></div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-cd6cbf0 elementor-widget elementor-widget-wdt-post-navigation" data-id="cd6cbf0" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-navigation.default">
				<div class="elementor-widget-container">
					<div class="entry-post-navigation-wrapper "><!-- Entry Navigation -->
<div class="entry-post-navigation type3">
			<div class="post-prev-link">
					<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif) class="prev-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 1/3">Previous Story</a></p>
					<span class="zmdi zmdi-long-arrow-left zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 1/3">Retour d&#039;expérience : constructeur de véhicules autonomes - 1/3</a>
					</h3>
				</div>

			</div>
						<div class="post-next-link">
					<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif) class="next-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 3/3">Next Story</a></p>
					<span class="zmdi zmdi-long-arrow-right zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 3/3">Retour d&#039;expérience : constructeur de véhicules autonomes - 3/3</a>
					</h3>
				</div>

			</div>
			</div><!-- Entry Navigation --></div>				</div>
				</div>
				<div class="elementor-element elementor-element-a4705af elementor-widget elementor-widget-wdt-post-tags" data-id="a4705af" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-tags.default">
				<div class="elementor-widget-container">
					<div class="entry-tags-wrapper  ">
<!-- Entry Tags -->
<div class="single-entry-tags"><a href="https://beta.catalystbluephenix.com/tag/automobile/" rel="tag">automobile</a> <a href="https://beta.catalystbluephenix.com/tag/certification-cybersecurite/" rel="tag">certification cybersécurité</a> <a href="https://beta.catalystbluephenix.com/tag/conformite-reglementaire/" rel="tag">conformité réglementaire</a> <a href="https://beta.catalystbluephenix.com/tag/formation-cybersecurite/" rel="tag">formation cybersécurité</a> <a href="https://beta.catalystbluephenix.com/tag/gestion-des-risques/" rel="tag">gestion des risques</a> <a href="https://beta.catalystbluephenix.com/tag/homologation/" rel="tag">homologation</a> <a href="https://beta.catalystbluephenix.com/tag/infrastructures-critiques/" rel="tag">infrastructures critiques</a> <a href="https://beta.catalystbluephenix.com/tag/soc-automobile/" rel="tag">SOC automobile</a> <a href="https://beta.catalystbluephenix.com/tag/unr-ece-155/" rel="tag">UNR ECE 155</a> <a href="https://beta.catalystbluephenix.com/tag/unr-ece-156/" rel="tag">UNR ECE 156</a> <a href="https://beta.catalystbluephenix.com/tag/vehicules-autonomes/" rel="tag">véhicules autonomes</a> <a href="https://beta.catalystbluephenix.com/tag/zero-trust/" rel="tag">Zero Trust</a></div><!-- Entry Tags --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Retour d&#8217;expérience : constructeur de véhicules autonomes &#8211; 1/3</title>
		<link>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/</link>
					<comments>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/#respond</comments>
		
		<dc:creator><![CDATA[Ian Revault D'Allonnes]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 10:49:58 +0000</pubDate>
				<category><![CDATA[Cyberdéfense]]></category>
		<category><![CDATA[Intelligence Artificielle]]></category>
		<category><![CDATA[IOT]]></category>
		<category><![CDATA[IT Pro]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[automobile]]></category>
		<category><![CDATA[certification cybersécurité]]></category>
		<category><![CDATA[conformité réglementaire]]></category>
		<category><![CDATA[formation cybersécurité]]></category>
		<category><![CDATA[gestion des risques]]></category>
		<category><![CDATA[homologation]]></category>
		<category><![CDATA[infrastructures critiques]]></category>
		<category><![CDATA[SOC automobile]]></category>
		<category><![CDATA[UNR ECE 155]]></category>
		<category><![CDATA[UNR ECE 156]]></category>
		<category><![CDATA[véhicules autonomes]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://beta.catalystbluephenix.com/?p=2805</guid>

					<description><![CDATA[<p>Written by Ian Revault D&#8217;Allonnes IT Pro Services Retour d&#8217;expérience : projet véhicules autonomes &#8211; Première partie La cybersécurité est devenue un enjeu incontournable pour l’industrie automobile. Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, garantir la sécurité des véhicules autonomes n’est plus une option, mais une obligation absolue. Face à ces [&#8230;]</p>
<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2805" class="elementor elementor-2805">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-5877234 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5877234" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2005812" data-id="2005812" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-f7c171a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="f7c171a" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e31729b" data-id="e31729b" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-999c644 elementor-widget elementor-widget-wdt-post-author" data-id="999c644" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-author.default">
				<div class="elementor-widget-container">
					<div class="entry-author-wrapper meta-elements-filled-round ">
<!-- Entry Author -->
<div class="single-entry-author">
	<div class="meta-author-img">
		<img alt='' src='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=40&#038;d=mm&#038;r=g' srcset='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' />	</div>
	<div class="meta-author-info">
		<span>Written by</span>
		<a href="https://beta.catalystbluephenix.com/author/irevault/" title="View all posts by Ian Revault D'Allonnes">Ian Revault D'Allonnes</a>
    </div>
</div><!-- Entry Author --></div>				</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-224438c" data-id="224438c" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-2a39d45 elementor-widget elementor-widget-wdt-post-categories" data-id="2a39d45" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-categories.default">
				<div class="elementor-widget-container">
					<div class="entry-categories-wrapper meta-elements-boxed-round ">
<!-- Entry Categories -->
<div class="single-entry-categories"><a href="https://beta.catalystbluephenix.com/category/cyberdefense/" rel="category tag">Cyberdéfense</a> <a href="https://beta.catalystbluephenix.com/category/ai/" rel="category tag">Intelligence Artificielle</a> <a href="https://beta.catalystbluephenix.com/category/iot/" rel="category tag">IOT</a> <a href="https://beta.catalystbluephenix.com/category/itpro/" rel="category tag">IT Pro</a> <a href="https://beta.catalystbluephenix.com/category/services/" rel="category tag">Services</a> <a href="https://beta.catalystbluephenix.com/category/tech/" rel="category tag">Tech</a></div><!-- Entry Categories --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<div class="elementor-element elementor-element-f971f2d elementor-widget elementor-widget-heading" data-id="f971f2d" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Retour d'expérience : projet véhicules autonomes - Première partie</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-d68e150 elementor-widget elementor-widget-wdt-heading" data-id="d68e150" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-d68e150"><div class="wdt-heading-content-wrapper">La cybersécurité est devenue un enjeu incontournable pour l’industrie automobile. Avec l’évolution des réglementations UNR ECE 155 et UNR ECE 156, garantir la sécurité des véhicules autonomes n’est plus une option, mais une obligation absolue.

Face à ces défis, un constructeur de véhicules autonomes nous a confié une mission stratégique : concevoir et déployer un pôle cyberdéfense capable d’assurer à la fois conformité réglementaire et protection avancée contre les cybermenaces.

Loin d’être un simple exercice de mise en conformité, ce projet visait à bâtir une architecture de cybersécurité robuste, intégrant dès le départ les principes de Zero Trust et de Security by Design dans tout le cycle de vie du véhicule.

Dans cette étude de cas, nous partageons notre approche, nos défis et les solutions mises en place pour sécuriser une flotte de véhicules autonomes, depuis l’analyse des besoins jusqu’au déploiement des mesures de protection.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-4d4a8b1 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="4d4a8b1" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-4d4a8b1"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Première étape : <span class="wdt-heading-colored-elements">Comprendre</span><span class="wdt-heading-colored-elements">les</span>besoins</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-08a99d4 elementor-widget elementor-widget-wdt-heading" data-id="08a99d4" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-08a99d4"><div class="wdt-heading-content-wrapper">Avant de se lancer dans l’implémentation technique, nous avons pris le temps de comprendre les enjeux spécifiques du projet. Cette phase d’analyse a impliqué des échanges avec toutes les parties prenantes : ingénieurs, direction, équipes de production, experts en réglementation…</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-3962746 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="3962746" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-3962746"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Définition d’un cadre <span class="wdt-heading-colored-elements">de</span><span class="wdt-heading-colored-elements">sécurité</span>global</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-9d16fac elementor-widget elementor-widget-wdt-heading" data-id="9d16fac" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-9d16fac"><div class="wdt-heading-content-wrapper">Rapidement, nous avons identifié deux priorités essentielles :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-4081526 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="4081526" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Mettre en place un Cyber Security Management System (CSMS) conforme à la norme ISO/SAE 21434, garantissant une cybersécurité continue tout au long du cycle de vie des véhicules</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Développer un Software Update Management System (SUMS), basé sur l’ISO 24089, pour sécuriser les mises à jour logicielles et éviter toute faille d’exploitation</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-9ea36eb elementor-widget elementor-widget-wdt-heading" data-id="9ea36eb" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-9ea36eb"><div class="wdt-heading-content-wrapper">Nous avons également aligné notre approche avec les directives de sûreté fonctionnelle ISO 26262 et les exigences du STRMTG (Service Technique des Remontées Mécaniques et des Transports Guidés).

Cette première étape nous a permis de poser des bases solides, en nous assurant que chaque aspect du projet serait couvert par une stratégie de cybersécurité complète et évolutive.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-556465f elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="556465f" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-556465f"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Deuxième étape : <span class="wdt-heading-colored-elements">Définir</span><span class="wdt-heading-colored-elements">les</span>initiatives clés</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-a02706a elementor-widget elementor-widget-wdt-heading" data-id="a02706a" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-a02706a"><div class="wdt-heading-content-wrapper"> Comprendre les besoins, c’est bien. Transformer cette compréhension en actions concrètes, c’est encore mieux. Pour cela, nous avons défini 10 initiatives clés, véritables piliers de notre stratégie de cybersécurité. 
Ces actions-clés ont servi de feuille de route détaillée, avec des objectifs, des livrables et des indicateurs de performance clairement définis.</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-b2b1741 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="b2b1741" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-b2b1741"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sécurisation de l’architecture <span class="wdt-heading-colored-elements">informatique</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-030c302 elementor-widget elementor-widget-wdt-heading" data-id="030c302" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-030c302"><div class="wdt-heading-content-wrapper">Pour protéger les données sensibles, nous avons conçu une architecture de sécurité à plusieurs niveaux, incluant :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-5e82efb common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5e82efb" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Une segmentation réseau stricte avec des zones de sécurité distinctes</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L’application du principe du moindre privilège pour limiter l’accès aux ressources</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La mise en place de mécanismes de chiffrement bout-en-bout pour les données critiques</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'établissement d'une stratégie de gestion des identités et des accès (IAM) robuste</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-e8b1f1a elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="e8b1f1a" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-e8b1f1a"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Protection du centre <span class="wdt-heading-colored-elements">de</span><span class="wdt-heading-colored-elements">supervision</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-05cf524 elementor-widget elementor-widget-wdt-heading" data-id="05cf524" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-05cf524"><div class="wdt-heading-content-wrapper">Véritable cœur névralgique du système, le centre de supervision ne doit jamais être compromis. Pour cela, nous avons :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-8aff823 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="8aff823" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Installé des pare-feu nouvelle génération avec inspection approfondie des paquets</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Déployé des systèmes de détection et de prévention d'intrusion (IDS/IPS)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Mis en place une solution SIEM (Security Information and Event Management) pour la corrélation des événements de sécurité</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Établi des procédures d'intervention d'urgence et de gestion de crise en cas d'incident majeur</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-699e9b0 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="699e9b0" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-699e9b0"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sécurisation du développement <span class="wdt-heading-colored-elements">logiciel</span><span class="wdt-heading-colored-elements">(SDLC)</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-2bbe8db elementor-widget elementor-widget-wdt-heading" data-id="2bbe8db" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-2bbe8db"><div class="wdt-heading-content-wrapper">Le cycle de développement logiciel sécurisé (Secure Development Life Cycle) est fondamental pour intégrer la sécurité dès la conception. Notre approche a inclus :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-5809745 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5809745" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'intégration de l'analyse de risques dès les phases de spécification</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La formation des développeurs aux bonnes pratiques de codage sécurisé</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'implémentation de revues de code systématiques avec focus sur la sécurité</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'automatisation des tests de sécurité statiques et dynamiques</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-890471b elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="890471b" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-890471b"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sensibilisation des équipes <span class="wdt-heading-colored-elements">à</span><span class="wdt-heading-colored-elements">la</span>cybersécurité</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6438023 elementor-widget elementor-widget-wdt-heading" data-id="6438023" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-6438023"><div class="wdt-heading-content-wrapper">Un système sécurisé ne sert à rien si les équipes ne sont pas formées à l’utiliser correctement. Nous avons donc lancé un programme de sensibilisation incluant :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-f652462 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f652462" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Des formations adaptées aux différents profils (développeurs, opérateurs, management)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Des exercices pratiques de simulation d'attaque (phishing, social engineering)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Des communications régulières sur les menaces émergentes</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La création d'une culture de sécurité où chaque employé se sent responsable</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-a9dc3d7 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="a9dc3d7" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-a9dc3d7"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Renforcement de la <span class="wdt-heading-colored-elements">sécurité</span><span class="wdt-heading-colored-elements">des</span>ordinateurs embarqués/ Durcissement des PC de conduite autonome</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-394b565 elementor-widget elementor-widget-wdt-heading" data-id="394b565" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-394b565"><div class="wdt-heading-content-wrapper">Les ordinateurs embarqués dans les véhicules sont particulièrement vulnérables aux attaques. Nous avons donc mis en œuvre :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-c91a650 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="c91a650" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Le verrouillage des configurations avec une approche basée sur les listes blanches</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La désactivation des services et ports non essentiels</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'implémentation de solutions de protection contre les malwares spécifiquement adaptées aux contraintes embarquées</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La sécurisation du démarrage avec Secure Boot et mesures d'intégrité</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La réduction au minimum vital de la surface d'attaque des systèmes embarqués communiquant</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-0520688 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="0520688" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-0520688"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Protection des communications <span class="wdt-heading-colored-elements">des</span><span class="wdt-heading-colored-elements">véhicules</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-b48fd6f elementor-widget elementor-widget-wdt-heading" data-id="b48fd6f" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-b48fd6f"><div class="wdt-heading-content-wrapper">La protection des véhicules eux-mêmes a nécessité une approche multiniveaux ; Chaque véhicule doit pouvoir communiquer en toute sécurité avec l’infrastructure :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-906e632 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="906e632" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Implémentation de protocoles de chiffrement robustes pour toutes les communications</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Développement de mécanismes d'authentification mutuelle entre le véhicule et l'infrastructure</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Mise en place de solutions de détection d'anomalies basées sur l'apprentissage du comportement normal</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Conception de mécanismes de fail-safe garantissant un comportement sûr même en cas d'attaque</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-aad3b7b elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="aad3b7b" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-aad3b7b"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sécurité du code <span class="wdt-heading-colored-elements">/Intégration</span><span class="wdt-heading-colored-elements">de</span>DevSecOps</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-9ac6321 elementor-widget elementor-widget-wdt-heading" data-id="9ac6321" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-9ac6321"><div class="wdt-heading-content-wrapper">L'intégration de la sécurité dans les processus de développement et d'opérations a été réalisée par :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-f45b736 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f45b736" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La mise en place de pipelines CI/CD intégrant des tests de sécurité automatisés</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'utilisation d'outils d'analyse de composition logicielle pour détecter les vulnérabilités dans les dépendances</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">L'implémentation de scanners de vulnérabilités dans les conteneurs et l'infrastructure</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La définition de gates de qualité bloquant le déploiement en cas de problème de sécurité critique</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-43e75ff elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="43e75ff" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-43e75ff"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sécurité système basée <span class="wdt-heading-colored-elements">sur</span><span class="wdt-heading-colored-elements">les</span>modèles (MBSE)</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6873930 elementor-widget elementor-widget-wdt-heading" data-id="6873930" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-6873930"><div class="wdt-heading-content-wrapper">L'approche Model-Based Systems Engineering a permis d'anticiper les vulnérabilités dès la conception :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-19fd364 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="19fd364" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Création de modèles de menaces détaillés</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Simulation d'attaques sur les modèles avant implémentation</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Vérification formelle des propriétés de sécurité critiques</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Génération automatique de tests basés sur les modèles</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-1ae78cf elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="1ae78cf" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-1ae78cf"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Sécurité de la <span class="wdt-heading-colored-elements">chaîne</span><span class="wdt-heading-colored-elements">d'approvisionnement</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-a153f81 elementor-widget elementor-widget-wdt-heading" data-id="a153f81" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-a153f81"><div class="wdt-heading-content-wrapper">Dans un écosystème où de nombreux composants proviennent de fournisseurs tiers, nous avons :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-43e15a7 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="43e15a7" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Établi un processus rigoureux d'évaluation de la sécurité des fournisseurs</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Implémenté des mécanismes de vérification d'intégrité des composants livrés</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Mis en place des clauses contractuelles exigeant des standards de sécurité spécifiques</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Développé une stratégie de gestion des vulnérabilités impliquant tous les acteurs de la chaîne</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-d8a7687 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="d8a7687" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-d8a7687"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Cadre de gestion <span class="wdt-heading-colored-elements">des</span><span class="wdt-heading-colored-elements">risques</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-71ab7ae elementor-widget elementor-widget-wdt-heading" data-id="71ab7ae" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-71ab7ae"><div class="wdt-heading-content-wrapper">Finalement, nous avons appliqué la méthode EBIOS Risk Manager pour :</div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-435aaac common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="435aaac" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Identifier systématiquement les scénarios de menace pertinents</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Évaluer l'impact potentiel et la probabilité de chaque scénario</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Définir des mesures de sécurité proportionnées aux risques identifiés</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Établir un processus continu de réévaluation des risques</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-762234e elementor-widget elementor-widget-heading" data-id="762234e" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h5 class="elementor-heading-title elementor-size-default">Grâce à cette approche, nous avons posé des fondations solides pour garantir la sécurité des véhicules autonomes. Dans le prochain article, nous plongerons plus en détail dans l’implémentation de ces initiatives et les défis que nous avons dû relever en chemin.

À suivre…</h5>				</div>
				</div>
				<div class="elementor-element elementor-element-28dceb7 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="28dceb7" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-28dceb7"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les autres articles <span class="wdt-heading-colored-elements">de</span><span class="wdt-heading-colored-elements">cette</span>série:</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-2c64cc6 elementor-widget elementor-widget-wdt-blog-posts" data-id="2c64cc6" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-blog-posts.default">
				<div class="elementor-widget-container">
					<div class="wdt-posts-list-wrapper   wdt-post-list-carousel-2c64cc6" ><div class='tpl-blog-holder  apply-equal-height '><div class='grid-sizer  entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry '></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2835" class="post-2835 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3"><img fetchpriority="high" decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/14f6af7c-9ffc-4dda-85ce-7486f255001b-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="629863" style="--dominant-color: #629863;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-3/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 3/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2839" class="post-2839 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="77876f" style="--dominant-color: #77876f;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 2/3</a>
	</h4>
</div><!-- Entry Title --></article></div><div class=" entry-grid-layout wdt-simple-style wdt-scaleout-hover wdt-default-overlay aligncenter column wdt-one-third wdt-post-entry  "><article id="post-2805" class="post-2805 post type-post status-publish format-standard has-post-thumbnail hentry category-cyberdefense category-ai category-iot category-itpro category-services category-tech tag-automobile tag-certification-cybersecurite tag-conformite-reglementaire tag-formation-cybersecurite tag-gestion-des-risques tag-homologation tag-infrastructures-critiques tag-soc-automobile tag-unr-ece-155 tag-unr-ece-156 tag-vehicules-autonomes tag-zero-trust blog-entry">


	<!-- Featured Image -->
	<div class="entry-thumb">
		
<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3"><img decoding="async" width="1024" height="1024" src="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif" class="attachment-wdt-blog-iii-column size-wdt-blog-iii-column not-transparent wp-post-image" alt="" srcset="https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc.avif 1024w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-300x300.avif 300w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-150x150.avif 150w, https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/24fe70d9-660c-41d7-b89e-96a4d38a66bc-768x768.avif 768w" sizes="(max-width: 1024px) 100vw, 1024px" data-has-transparency="false" data-dominant-color="6b8171" style="--dominant-color: #6b8171;" /></a>
        </div><!-- Featured Image -->
<!-- Entry Title -->
<div class="entry-title">
	<h4>    	<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/" title="Permalink to Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3</a>
	</h4>
</div><!-- Entry Title --></article></div></div><div class="pagination blog-pagination"><div class="newer-posts"></div><div class="older-posts"></div></div></div>				</div>
				</div>
				<div class="elementor-element elementor-element-6b3aa51 elementor-widget elementor-widget-wdt-post-navigation" data-id="6b3aa51" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-navigation.default">
				<div class="elementor-widget-container">
					<div class="entry-post-navigation-wrapper "><!-- Entry Navigation -->
<div class="entry-post-navigation type3">
			<div class="post-prev-link">
					<a href="https://beta.catalystbluephenix.com/observabilite-principe-incertitude-ia/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/observabilite-png.avif) class="prev-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/observabilite-principe-incertitude-ia/" title="L&#039;Observabilité : Du Principe d&#039;Incertitude à l&#039;IA">Previous Story</a></p>
					<span class="zmdi zmdi-long-arrow-left zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/observabilite-principe-incertitude-ia/" title="L&#039;Observabilité : Du Principe d&#039;Incertitude à l&#039;IA">L&#039;Observabilité : Du Principe d&#039;Incertitude à l&#039;IA</a>
					</h3>
				</div>

			</div>
						<div class="post-next-link">
					<a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/52f8e888-b4eb-4118-9bb2-6b51955235c0.avif) class="next-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3">Next Story</a></p>
					<span class="zmdi zmdi-long-arrow-right zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-2-2/" title="Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3">Retour d&#039;expérience : constructeur de véhicules autonomes - 2/3</a>
					</h3>
				</div>

			</div>
			</div><!-- Entry Navigation --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>L’article <a href="https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/">Retour d&rsquo;expérience : constructeur de véhicules autonomes &#8211; 1/3</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://beta.catalystbluephenix.com/retour-experience-constructeur-vehicules-autonomes-1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PEBKAC &#8211; Le problème est entre la chaise et le clavier</title>
		<link>https://beta.catalystbluephenix.com/pebkac-probleme-chaise-clavier/</link>
					<comments>https://beta.catalystbluephenix.com/pebkac-probleme-chaise-clavier/#respond</comments>
		
		<dc:creator><![CDATA[Ian Revault D'Allonnes]]></dc:creator>
		<pubDate>Tue, 11 Feb 2025 13:20:22 +0000</pubDate>
				<category><![CDATA[Cyberdéfense]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[culture cybersécurité]]></category>
		<category><![CDATA[cyberdéfense proactive]]></category>
		<category><![CDATA[erreur humaine]]></category>
		<category><![CDATA[gestion des risques]]></category>
		<category><![CDATA[ingénierie sociale]]></category>
		<category><![CDATA[politique de sécurité]]></category>
		<category><![CDATA[sensibilisation sécurité]]></category>
		<guid isPermaLink="false">https://beta.catalystbluephenix.com/?p=2445</guid>

					<description><![CDATA[<p>Written by Ian Revault D&#8217;Allonnes Cyberdéfense Tech PEBKAC : Le problème est entre la chaise et le clavier Une analyse approfondie du facteur humain dans la cybersécurité moderne La cybersécurité représente aujourd&#8217;hui un enjeu majeur pour les organisations, avec des impacts financiers et réputationnels potentiellement dévastateurs. Tandis que les solutions techniques deviennent de plus en [&#8230;]</p>
<p>L’article <a href="https://beta.catalystbluephenix.com/pebkac-probleme-chaise-clavier/">PEBKAC &#8211; Le problème est entre la chaise et le clavier</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2445" class="elementor elementor-2445">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-49891b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="49891b6" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76a771c" data-id="76a771c" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-b57d376 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="b57d376" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-479ccb2" data-id="479ccb2" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-e7d5582 elementor-widget elementor-widget-wdt-post-author" data-id="e7d5582" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-author.default">
				<div class="elementor-widget-container">
					<div class="entry-author-wrapper meta-elements-filled-round ">
<!-- Entry Author -->
<div class="single-entry-author">
	<div class="meta-author-img">
		<img alt='' src='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=40&#038;d=mm&#038;r=g' srcset='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' />	</div>
	<div class="meta-author-info">
		<span>Written by</span>
		<a href="https://beta.catalystbluephenix.com/author/irevault/" title="View all posts by Ian Revault D'Allonnes">Ian Revault D'Allonnes</a>
    </div>
</div><!-- Entry Author --></div>				</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8048e44" data-id="8048e44" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5c4bc87 elementor-widget elementor-widget-wdt-post-categories" data-id="5c4bc87" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-categories.default">
				<div class="elementor-widget-container">
					<div class="entry-categories-wrapper meta-elements-boxed-round ">
<!-- Entry Categories -->
<div class="single-entry-categories"><a href="https://beta.catalystbluephenix.com/category/cyberdefense/" rel="category tag">Cyberdéfense</a> <a href="https://beta.catalystbluephenix.com/category/tech/" rel="category tag">Tech</a></div><!-- Entry Categories --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<div class="elementor-element elementor-element-333c733 elementor-widget elementor-widget-text-editor" data-id="333c733" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h3 class="text-2xl font-bold mt-1 text-text-200"><strong>PEBKAC : Le problème est entre la chaise et le clavier</strong></h3>
<h4 class="text-xl font-bold text-text-200 mt-1 -mb-0.5"><strong>Une analyse approfondie du facteur humain dans la cybersécurité moderne</strong></h4>
<p class="whitespace-pre-wrap break-words">La cybersécurité représente aujourd&rsquo;hui un enjeu majeur pour les organisations, avec des impacts financiers et réputationnels potentiellement dévastateurs. Tandis que les solutions techniques deviennent de plus en plus sophistiquées, une réalité perdure : l&rsquo;humain demeure le maillon faible de la chaîne de sécurité. L&rsquo;acronyme PEBKAC (Problem Exists Between Keyboard And Chair) illustre avec humour cette vérité fondamentale du domaine. Cette analyse vise à décortiquer les différents aspects de cette problématique et à proposer des solutions concrètes.</p>
<h5 class="text-lg font-bold text-text-200 mt-1 -mb-1.5">L&rsquo;ingénierie sociale : exploitation méthodique des vulnérabilités humaines</h5>
<p class="whitespace-pre-wrap break-words">L&rsquo;ingénierie sociale constitue la méthode privilégiée des cybercriminels pour contourner les défenses techniques. Cette approche exploite systématiquement les biais cognitifs et les comportements prévisibles des utilisateurs. Les études montrent que 98% des cyberattaques reposent sur l&rsquo;ingénierie sociale, le phishing représentant à lui seul 83% des incidents rapportés en 2023.</p>
<h4 class="text-base font-bold text-text-200 mt-1">Mécanismes psychologiques exploités</h4>
<p class="whitespace-pre-wrap break-words"><strong>L&rsquo;urgence</strong> : Les attaquants créent artificiellement un sentiment de pression temporelle poussant à l&rsquo;action irréfléchie. Par exemple, un email prétendant qu&rsquo;un compte bancaire sera bloqué dans les prochaines heures sans action immédiate. Cette urgence court-circuite les mécanismes naturels de prudence et de vérification.</p>
<p class="whitespace-pre-wrap break-words"><strong>L&rsquo;autorité</strong> : L&rsquo;usurpation d&rsquo;identité de figures hiérarchiques permet d&rsquo;obtenir une obéissance quasi-automatique. Un cas classique est le « CEO fraud » où un attaquant se fait passer pour un dirigeant demandant un virement urgent. L&rsquo;effet d&rsquo;autorité est renforcé par la crainte de déplaire à la hiérarchie.</p>
<p class="whitespace-pre-wrap break-words"><strong>La curiosité</strong> : L&rsquo;exploitation de l&rsquo;attrait naturel pour l&rsquo;inhabituel ou l&rsquo;interdit reste remarkablement efficace. Des clés USB « trouvées » dans un parking d&rsquo;entreprise avec des labels intrigants (« Salaires 2024 », « Confidentiel RH ») sont encore régulièrement utilisées pour compromettre des réseaux.</p>
<p class="whitespace-pre-wrap break-words"><strong>L&#8217;empathie</strong> : La manipulation des émotions déclenche des actions imprudentes. Les arnaques au sentiment, où l&rsquo;attaquant prétend être dans une situation désespérée, exploitent notre tendance naturelle à l&rsquo;aide et à la compassion.</p>
<h3 class="text-lg font-bold text-text-200 mt-1 -mb-1.5">Statistiques et impacts concrets</h3>
<p class="whitespace-pre-wrap break-words">Les chiffres révèlent l&rsquo;ampleur préoccupante du problème :</p>
<p class="whitespace-pre-wrap break-words"><strong>Comportements à risque</strong> :</p>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words">82% des incidents de sécurité impliquent une composante humaine directe</li>
<li class="whitespace-normal break-words">34% des employés admettent partager leurs identifiants professionnels avec des collègues</li>
<li class="whitespace-normal break-words">65% des utilisateurs réutilisent le même mot de passe sur plusieurs services</li>
<li class="whitespace-normal break-words">71% des employés contournent régulièrement les politiques de sécurité pour « travailler plus efficacement »</li>
</ul>
<p class="whitespace-pre-wrap break-words"><strong>Impacts financiers</strong> :</p>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words">Le coût moyen d&rsquo;une violation de données causée par l&rsquo;erreur humaine atteint 3.8 millions d&rsquo;euros</li>
<li class="whitespace-normal break-words">Les pertes liées au phishing professionnel ont augmenté de 300% en trois ans</li>
<li class="whitespace-normal break-words">Le temps moyen de détection d&rsquo;une compromission est de 207 jours quand elle implique de l&rsquo;ingénierie sociale</li>
</ul>
<h3 class="text-lg font-bold text-text-200 mt-1 -mb-1.5">La sensibilisation comme bouclier : méthodologie approfondie</h3>
<p class="whitespace-pre-wrap break-words">Face à ces constats, la formation devient cruciale mais doit suivre une méthodologie rigoureuse.</p>
<h4 class="text-base font-bold text-text-200 mt-1">Contextualisation des risques</h4>
<p class="whitespace-pre-wrap break-words">La formation doit s&rsquo;ancrer dans la réalité professionnelle des utilisateurs. Par exemple, pour un service commercial, les scénarios d&rsquo;attaque présentés doivent inclure des cas réalistes de fraude aux commandes ou d&rsquo;usurpation d&rsquo;identité client.</p>
<h4 class="text-base font-bold text-text-200 mt-1">Exercices pratiques</h4>
<p class="whitespace-pre-wrap break-words">La théorie seule ne suffit pas. Des simulations réalistes permettent aux utilisateurs de développer des réflexes :</p>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words">Campagnes de phishing simulé avec feedback immédiat</li>
<li class="whitespace-normal break-words">Jeux de rôle mettant en scène des tentatives d&rsquo;ingénierie sociale par téléphone</li>
<li class="whitespace-normal break-words">Ateliers d&rsquo;analyse de documents suspects</li>
<li class="whitespace-normal break-words">Exercices de gestion de crise cyber en équipe</li>
</ul>
<h5 class="text-base font-bold text-text-200 mt-1">Communication continue</h5>
<p class="whitespace-pre-wrap break-words">La sensibilisation doit s&rsquo;inscrire dans la durée :</p>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words">Newsletter mensuelle sur les menaces émergentes</li>
<li class="whitespace-normal break-words">Rappels visuels dans l&rsquo;environnement de travail</li>
<li class="whitespace-normal break-words">Sessions courtes mais régulières plutôt qu&rsquo;une formation annuelle</li>
<li class="whitespace-normal break-words">Partage transparent des incidents réels (anonymisés) comme cas d&rsquo;étude</li>
</ul>
<h4 class="text-lg font-bold text-text-200 mt-1 -mb-1.5">Vers une approche holistique de la sécurité</h4>
<p class="whitespace-pre-wrap break-words">La réponse au PEBKAC nécessite une stratégie globale intégrant plusieurs dimensions :</p>
<p class="whitespace-pre-wrap break-words"><strong>Formation adaptative</strong> :</p>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words">Parcours différenciés selon les profils de risque</li>
<li class="whitespace-normal break-words">Évaluation régulière des connaissances</li>
<li class="whitespace-normal break-words">Adaptation du contenu selon les retours d&rsquo;expérience</li>
</ul>
<h5 class="whitespace-pre-wrap break-words"><strong>Politiques de sécurité pragmatiques</strong> :</h5>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words">Règles claires et justifiées</li>
<li class="whitespace-normal break-words">Processus de dérogation transparent</li>
<li class="whitespace-normal break-words">Équilibre entre sécurité et productivité</li>
</ul>
<h5 class="whitespace-pre-wrap break-words"><strong>Solutions techniques facilitantes</strong> :</h5>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words">Gestionnaires de mots de passe d&rsquo;entreprise</li>
<li class="whitespace-normal break-words">Authentification forte simplifiée (biométrie, tokens)</li>
<li class="whitespace-normal break-words">Outils de détection et prévention des fuites de données</li>
</ul>
<h5 class="whitespace-pre-wrap break-words"><strong>Contrôles et validation</strong> :</h5>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words">Tests d&rsquo;intrusion incluant le facteur humain</li>
<li class="whitespace-normal break-words">Audits réguliers des pratiques</li>
<li class="whitespace-normal break-words">Métriques de performance sécurité</li>
</ul>
<h5 class="text-lg font-bold text-text-200 mt-1 -mb-1.5">Perspectives d&rsquo;avenir</h5>
<p class="whitespace-pre-wrap break-words">L&rsquo;évolution des menaces nécessite une adaptation constante :</p>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words">Intégration de l&rsquo;intelligence artificielle dans la détection des comportements à risque</li>
<li class="whitespace-normal break-words">Formation en réalité virtuelle pour une immersion réaliste</li>
<li class="whitespace-normal break-words">Développement d&rsquo;une culture de cybersécurité dès l&rsquo;école</li>
</ul>
<h4 class="text-lg font-bold text-text-200 mt-1 -mb-1.5">Conclusion</h4>
<p class="whitespace-pre-wrap break-words">Le facteur humain en cybersécurité ne doit pas être perçu comme une fatalité mais comme un défi à relever par l&rsquo;éducation et l&rsquo;accompagnement. L&rsquo;évolution des menaces requiert une adaptation constante des méthodes de sensibilisation, plaçant l&rsquo;humain au cœur de la stratégie de cyberdéfense.</p>
<p class="whitespace-pre-wrap break-words">La clé réside dans l&rsquo;équilibre entre contrainte et pédagogie : trop de restrictions génère des comportements de contournement, tandis qu&rsquo;une sensibilisation insuffisante expose l&rsquo;organisation. Former des utilisateurs avertis et responsables constitue le meilleur investissement pour la sécurité numérique de demain.</p>
<p class="whitespace-pre-wrap break-words">La cybersécurité doit devenir une seconde nature, intégrée naturellement dans les processus de travail plutôt qu&rsquo;une contrainte externe. C&rsquo;est uniquement en adoptant cette approche holistique, centrée sur l&rsquo;humain tout en étant soutenue par la technique, que les organisations pourront faire face efficacement aux défis de sécurité du monde numérique moderne.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-62a02e4 elementor-widget elementor-widget-wdt-post-navigation" data-id="62a02e4" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-navigation.default">
				<div class="elementor-widget-container">
					<div class="entry-post-navigation-wrapper "><!-- Entry Navigation -->
<div class="entry-post-navigation type3">
			<div class="post-prev-link">
					<a href="https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/pieces-echecs-abstraites-style-artistique-numerique_23-2151476062.jpg) class="prev-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/" title="Les piliers de la cybersécurité">Previous Story</a></p>
					<span class="zmdi zmdi-long-arrow-left zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/" title="Les piliers de la cybersécurité">Les piliers de la cybersécurité</a>
					</h3>
				</div>

			</div>
						<div class="post-next-link">
					<a href="https://beta.catalystbluephenix.com/resilience-objectif-essentiel/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/Designer-36.jpeg) class="next-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/resilience-objectif-essentiel/" title="La Résilience comme objectif essentiel">Next Story</a></p>
					<span class="zmdi zmdi-long-arrow-right zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/resilience-objectif-essentiel/" title="La Résilience comme objectif essentiel">La Résilience comme objectif essentiel</a>
					</h3>
				</div>

			</div>
			</div><!-- Entry Navigation --></div>				</div>
				</div>
				<div class="elementor-element elementor-element-918111f elementor-widget elementor-widget-wdt-post-tags" data-id="918111f" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-tags.default">
				<div class="elementor-widget-container">
					<div class="entry-tags-wrapper  ">
<!-- Entry Tags -->
<div class="single-entry-tags"><a href="https://beta.catalystbluephenix.com/tag/culture-cybersecurite/" rel="tag">culture cybersécurité</a> <a href="https://beta.catalystbluephenix.com/tag/cyberdefense-proactive/" rel="tag">cyberdéfense proactive</a> <a href="https://beta.catalystbluephenix.com/tag/erreur-humaine/" rel="tag">erreur humaine</a> <a href="https://beta.catalystbluephenix.com/tag/gestion-des-risques/" rel="tag">gestion des risques</a> <a href="https://beta.catalystbluephenix.com/tag/ingenierie-sociale/" rel="tag">ingénierie sociale</a> <a href="https://beta.catalystbluephenix.com/tag/politique-de-securite/" rel="tag">politique de sécurité</a> <a href="https://beta.catalystbluephenix.com/tag/sensibilisation-securite/" rel="tag">sensibilisation sécurité</a></div><!-- Entry Tags --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>L’article <a href="https://beta.catalystbluephenix.com/pebkac-probleme-chaise-clavier/">PEBKAC &#8211; Le problème est entre la chaise et le clavier</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://beta.catalystbluephenix.com/pebkac-probleme-chaise-clavier/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Les piliers de la cybersécurité</title>
		<link>https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/</link>
					<comments>https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/#respond</comments>
		
		<dc:creator><![CDATA[Ian Revault D'Allonnes]]></dc:creator>
		<pubDate>Tue, 11 Feb 2025 10:26:55 +0000</pubDate>
				<category><![CDATA[Cyberdéfense]]></category>
		<category><![CDATA[IT Pro]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[approche holistique]]></category>
		<category><![CDATA[audits de sécurité]]></category>
		<category><![CDATA[chiffrement]]></category>
		<category><![CDATA[cybersécurité]]></category>
		<category><![CDATA[formation sécurité]]></category>
		<category><![CDATA[gestion des risques]]></category>
		<category><![CDATA[politique de sécurité]]></category>
		<category><![CDATA[réponse aux incidents]]></category>
		<guid isPermaLink="false">https://beta.catalystbluephenix.com/?p=2383</guid>

					<description><![CDATA[<p>Written by Ian Revault D&#8217;Allonnes Cyberdéfense IT Pro Tech Les trois piliers fondamentauxdela cybersécurité sont : Les personnes (le facteurhumain) La formation et la sensibilisation des utilisateurs La création d’une culture de sécurité dans l’organisation Le développement des compétences des équipes de sécurité La responsabilisation de chacun face aux enjeux de sécurité Les processus La [&#8230;]</p>
<p>L’article <a href="https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/">Les piliers de la cybersécurité</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2383" class="elementor elementor-2383">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-e770e77 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e770e77" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f49c25" data-id="9f49c25" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-738ae70 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="738ae70" data-element_type="section" data-settings="{&quot;wdt_bg_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_laptop&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile_extra&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;wdt_bg_position&quot;:&quot;center center&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-25850f3" data-id="25850f3" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-767dd64 elementor-widget elementor-widget-wdt-post-author" data-id="767dd64" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-author.default">
				<div class="elementor-widget-container">
					<div class="entry-author-wrapper meta-elements-filled-round ">
<!-- Entry Author -->
<div class="single-entry-author">
	<div class="meta-author-img">
		<img alt='' src='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=40&#038;d=mm&#038;r=g' srcset='https://secure.gravatar.com/avatar/1e0d40ce0ad0ab6c69f009e62e6b0adaee889c52b983be4890ade370dc9ca87b?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' />	</div>
	<div class="meta-author-info">
		<span>Written by</span>
		<a href="https://beta.catalystbluephenix.com/author/irevault/" title="View all posts by Ian Revault D'Allonnes">Ian Revault D'Allonnes</a>
    </div>
</div><!-- Entry Author --></div>				</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4854803" data-id="4854803" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-49e0a0e elementor-widget elementor-widget-wdt-post-categories" data-id="49e0a0e" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-categories.default">
				<div class="elementor-widget-container">
					<div class="entry-categories-wrapper meta-elements-boxed-round ">
<!-- Entry Categories -->
<div class="single-entry-categories"><a href="https://beta.catalystbluephenix.com/category/cyberdefense/" rel="category tag">Cyberdéfense</a> <a href="https://beta.catalystbluephenix.com/category/itpro/" rel="category tag">IT Pro</a> <a href="https://beta.catalystbluephenix.com/category/services/" rel="category tag">Services</a> <a href="https://beta.catalystbluephenix.com/category/tech/" rel="category tag">Tech</a></div><!-- Entry Categories --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<div class="elementor-element elementor-element-b06f794 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="b06f794" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-b06f794"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les trois piliers <span class="wdt-heading-colored-elements">fondamentaux</span><span class="wdt-heading-colored-elements">de</span>la cybersécurité sont :</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-8e68830 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="8e68830" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-8e68830"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les personnes (le <span class="wdt-heading-colored-elements">facteur</span><span class="wdt-heading-colored-elements">humain)</span></span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-f05dd4f common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f05dd4f" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La formation et la sensibilisation des utilisateurs</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La création d’une culture de sécurité dans l’organisation</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Le développement des compétences des équipes de sécurité</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La responsabilisation de chacun face aux enjeux de sécurité</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-886af55 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="886af55" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-886af55"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Les processus</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-69bcfab common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="69bcfab" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La mise en place de politiques et procédures de sécurité claires</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La gestion des risques et la conformité réglementaire</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Les plans de réponse aux incidents</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Les audits et contrôles réguliers</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La documentation et les mises à jour des procédures</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-01cfa46 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="01cfa46" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-01cfa46"><h5 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">La technologie</span></h5></div>				</div>
				</div>
				<div class="elementor-element elementor-element-59f0840 common-list-style elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="59f0840" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="icon-list.default">
				<div class="elementor-widget-container">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Les solutions techniques de protection (pare-feu, antivirus, etc.)</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La sécurisation des infrastructures et des données</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">La surveillance et la détection des menaces</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Les outils de chiffrement et d’authentification</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"><path d="M97.7,11.18a7.81,7.81,0,0,0-2.37-5.81A8.12,8.12,0,0,0,89.52,3l-79.34.25a8.18,8.18,0,1,0,0,16.35l59.63-.24L7,82.18A8.24,8.24,0,0,0,7,93.79a8.14,8.14,0,0,0,11.53,0L81.34,31l-.25,59.55a8.18,8.18,0,0,0,16.36,0Z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Les sauvegardes et la continuité d’activité</span>
									</li>
						</ul>
						</div>
				</div>
				<div class="elementor-element elementor-element-e3639eb elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-wdt-heading" data-id="e3639eb" data-element_type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;wdt_enable_inview_status&quot;:&quot;true&quot;,&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-heading.default">
				<div class="elementor-widget-container">
					<div class="wdt-heading-holder " id="wdt-heading-e3639eb"><h2 class="wdt-heading-title-wrapper wdt-heading-align- wdt-heading-deco-wrapper"><span class="wdt-heading-title">Ces trois piliers <span class="wdt-heading-colored-elements">sont</span><span class="wdt-heading-colored-elements">interdépendants</span>– une stratégie de cybersécurité efficace nécessite un équilibre entre ces aspects.</span></h2></div>				</div>
				</div>
				<div class="elementor-element elementor-element-3f7fd32 elementor-widget elementor-widget-wdt-post-navigation" data-id="3f7fd32" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-navigation.default">
				<div class="elementor-widget-container">
					<div class="entry-post-navigation-wrapper "><!-- Entry Navigation -->
<div class="entry-post-navigation type3">			<div class="post-prev-link no-post">
                <a href="#" style="background-image:url(https://beta.catalystbluephenix.com/wp-content/themes/themeforest-8K8rD7vY-aiglobe-artificial-intelligence-startup-technology-wordpress-theme/ai-globe/assets/images/no-post.jpg);" class="prev-post-bgimg"></a>
				<div class="nav-title-wrap">
					<span class="zmdi zmdi-long-arrow-left zmdi-hc-fw"></span>
					<h3>Not available to show!</h3>
				</div>
			</div>
						<div class="post-next-link">
					<a href="https://beta.catalystbluephenix.com/pebkac-probleme-chaise-clavier/" style=background-image:url(https://beta.catalystbluephenix.com/wp-content/uploads/2025/02/Designer-39.jpeg) class="next-post-bgimg"></a>
				<div class="nav-title-wrap">
					<p><a href="https://beta.catalystbluephenix.com/pebkac-probleme-chaise-clavier/" title="PEBKAC - Le problème est entre la chaise et le clavier">Next Story</a></p>
					<span class="zmdi zmdi-long-arrow-right zmdi-hc-fw"></span>
					<h3><a href="https://beta.catalystbluephenix.com/pebkac-probleme-chaise-clavier/" title="PEBKAC - Le problème est entre la chaise et le clavier">PEBKAC - Le problème est entre la chaise et le clavier</a>
					</h3>
				</div>

			</div>
			</div><!-- Entry Navigation --></div>				</div>
				</div>
				<div class="elementor-element elementor-element-025cfc8 elementor-widget elementor-widget-wdt-post-tags" data-id="025cfc8" data-element_type="widget" data-settings="{&quot;wdt_animation_effect&quot;:&quot;none&quot;}" data-widget_type="wdt-post-tags.default">
				<div class="elementor-widget-container">
					<div class="entry-tags-wrapper  ">
<!-- Entry Tags -->
<div class="single-entry-tags"><a href="https://beta.catalystbluephenix.com/tag/approche-holistique/" rel="tag">approche holistique</a> <a href="https://beta.catalystbluephenix.com/tag/audits-de-securite/" rel="tag">audits de sécurité</a> <a href="https://beta.catalystbluephenix.com/tag/chiffrement/" rel="tag">chiffrement</a> <a href="https://beta.catalystbluephenix.com/tag/cybersecurite/" rel="tag">cybersécurité</a> <a href="https://beta.catalystbluephenix.com/tag/formation-securite/" rel="tag">formation sécurité</a> <a href="https://beta.catalystbluephenix.com/tag/gestion-des-risques/" rel="tag">gestion des risques</a> <a href="https://beta.catalystbluephenix.com/tag/politique-de-securite/" rel="tag">politique de sécurité</a> <a href="https://beta.catalystbluephenix.com/tag/reponse-aux-incidents/" rel="tag">réponse aux incidents</a></div><!-- Entry Tags --></div>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>L’article <a href="https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/">Les piliers de la cybersécurité</a> est apparu en premier sur <a href="https://beta.catalystbluephenix.com">Catalyst Blue Phenix</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://beta.catalystbluephenix.com/les-piliers-de-la-cybersecurite/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
