{"id":3758,"date":"2023-03-22T15:32:08","date_gmt":"2023-03-22T15:32:08","guid":{"rendered":"https:\/\/www.eha-consulting.com\/?p=3758"},"modified":"2023-03-22T15:32:11","modified_gmt":"2023-03-22T15:32:11","slug":"anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.eha-consulting.com\/en\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/","title":{"rendered":"Anticiper les impacts, l\u2019alliance gestion de crise et cybers\u00e9curit\u00e9"},"content":{"rendered":"\n<p>Se pr\u00e9parer aux menaces cyber n\u00e9cessite toujours d\u2019investir, ce qui signifie \u00eatre parfois vu comme un centre de co\u00fbts, alors que les r\u00e9percussions positives ne sont pas toujours imm\u00e9diates. Autrement dit, investir dans la cybers\u00e9curit\u00e9, comme dans la s\u00fbret\u00e9 d\u2019une mani\u00e8re g\u00e9n\u00e9rale, n\u2019apporte pas de b\u00e9n\u00e9fice imm\u00e9diat. Ce qui n\u2019aide pas toujours \u00e0 ce que les mesures d\u00e9cid\u00e9es soient suivies d\u2019effet.<\/p>\n\n\n\n<p>Cependant, le risque est bien r\u00e9el. Lors d\u2019une attaque, les impacts, notamment r\u00e9putationnels et financiers, sont directs et d\u00e9vastateurs. Face \u00e0 une menace informatique croissante et en mutation, l\u2019anticipation et la pr\u00e9vention sont primordiales. Qui veut la paix pr\u00e9pare la guerre. Rechercher \u00e0 am\u00e9liorer sa r\u00e9silience devient plus qu\u2019une n\u00e9cessit\u00e9. La menace est en hausse continue : l\u2019ANSSI a eu connaissance de 1082 intrusions av\u00e9r\u00e9es dans les Syst\u00e8mes d\u2019Information en 2021, contre 786 en 2020. Il est, de fait, n\u00e9cessaire de pr\u00e9voir des m\u00e9canismes de gestion de crise en amont pour se pr\u00e9parer \u00e0 toutes les \u00e9ventualit\u00e9s. Toutes les entreprises seront, un jour ou l\u2019autre, confront\u00e9es \u00e0 une crise cyber.<\/p>\n\n\n\n<p>Nous faisons face, h\u00e9las, \u00e0 une am\u00e9lioration constante des capacit\u00e9s des acteurs malveillants, \u00e0 une professionnalisation de plus en plus pouss\u00e9e. Le ciblage reste quant \u00e0 lui assez large, et touche autant le secteur public que priv\u00e9, avec les PME comme premi\u00e8res expos\u00e9es. Les objectifs vis\u00e9s \u00e9tant tr\u00e8s diff\u00e9rents. Cependant, pour qu\u2019une menace cyber soit r\u00e9elle, il faut d\u2019une part qu\u2019une vuln\u00e9rabilit\u00e9 soit exploitable et d\u2019autre part que l\u2019attaquant ait un int\u00e9r\u00eat \u00e0 attaquer. Les motivations sont souvent multiples : elles peuvent \u00eatre fond\u00e9s sur la curiosit\u00e9 (le but in fine n\u2019est pas de voler mais de tester les mesures de s\u00e9curit\u00e9 d\u2019un organisme), sur le prestige, sur l\u2019espionnage, sur la nuisance (la vengeance), pour la propagation d\u2019une id\u00e9ologie (initi\u00e9 par un groupe de personnes, comme les Anonymous) ou encore l\u2019extorsion de fonds.<\/p>\n\n\n\n<p>Les attaques \u00e0 finalit\u00e9 lucrative et crapuleuse sont les plus r\u00e9currentes. Cependant, il ne faut pas pour autant omettre l\u2019espionnage industriel et \u00e9conomique qui reste la premi\u00e8re motivation des attaques. Certaines puissances \u00e9tatiques sont parfois \u00e0 la man\u0153uvre. Entre Ransomware (cybermenace la plus r\u00e9pandue o\u00f9 les donn\u00e9es sont prises en otage et les pirates demandent une ran\u00e7on), Phishing (l\u2019envoi de courriels usurpant l\u2019identit\u00e9 d\u2019acteurs priv\u00e9s ou publics pour obtenir des informations), fuite de donn\u00e9es et attaques DDOS (Distributed Denial Of Service Attack \u2013 il s\u2019agit de l\u2019envoi de milliers de donn\u00e9es en m\u00eame temps vers une cible pour rendre son serveur inaccessible), les attaques se multiplient.<\/p>\n\n\n\n<p>De grandes cyberattaques ont marqu\u00e9 des tournants dans le domaine du cyberspace et dans la soci\u00e9t\u00e9 en g\u00e9n\u00e9ral.<\/p>\n\n\n\n<p>La d\u00e9couverte du Ver Stuxnet en 2010 au sein d\u2019installations nucl\u00e9aires iraniennes qui avait pour but d\u2019espionner au profit des Etats-Unis et d\u2019Isra\u00ebl et de saboter les syst\u00e8mes industriels. Cette attaque a d\u00e9montr\u00e9 le pouvoir d\u2019un logiciel malveillant de potentiellement d\u00e9clencher un conflit mondial.<\/p>\n\n\n\n<p>En 2017, le tristement c\u00e9l\u00e8bre \u00bb logiciel Wannacry a impact\u00e9 plus de 300 000 appareils dans plus de 150 pays, et a dur\u00e9 plus de 4 jours. Des infrastructures indispensables ont m\u00eame \u00e9t\u00e9 infect\u00e9es. Ce fut l\u2019un des ransomware les plus d\u00e9vastateurs, les pr\u00e9judices s\u2019\u00e9l\u00e8vent \u00e0 plusieurs milliards de dollars de d\u00e9g\u00e2ts selon les estimations d&#8217;Europol.<\/p>\n\n\n\n<p>Not Petya a aussi constitu\u00e9 une des attaques informatiques des plus couteuses de l\u2019histoire. L\u2019impact financier men\u00e9 au niveau mondial contre toutes les entreprises a \u00e9t\u00e9 chiffr\u00e9 par l\u2019entreprise Fran\u00e7aise Saint-Gobain \u00e0 hauteur de 250 millions d\u2019euros. La cyberattaque mondiale a infect\u00e9 majoritairement l\u2019Ukraine puis s\u2019est r\u00e9pandue au sein de milliers d\u2019entreprises europ\u00e9ennes. Ce Ransomware \u00e9tait plut\u00f4t destin\u00e9 \u00e0 effacer les donn\u00e9es et les \u00e9craser qu\u2019\u00e0 r\u00e9clamer une ran\u00e7on.<\/p>\n\n\n\n<p>Ma\u00eetriser le risque num\u00e9rique, pour \u00e9viter une crise cyber de grande envergure susceptible de paralyser tous les syst\u00e8mes informatiques d\u2019une entreprise, appara\u00eet fondamental. Les attaques se multiplient et touchent tousles domaines : autrement dit une attaque cyber est aujourd\u2019hui quasiment in\u00e9vitable. Pr\u00e9parer un plan de gestion de crise \u00e0 froid est d\u00e8s lors essentiel. Demain, l\u2019organisation responsable, r\u00e9siliente et g\u00e9n\u00e9ratrice de confiance pour ses clients sera celle qui capable de ma\u00eetriser, d\u2019affronter et de se relever d\u2019une crise cyber.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Se pr\u00e9parer aux menaces cyber n\u00e9cessite toujours d\u2019investir, ce qui signifie \u00eatre parfois vu comme un centre de co\u00fbts, alors que les r\u00e9percussions positives ne sont pas toujours imm\u00e9diates. Autrement dit, investir dans la cybers\u00e9curit\u00e9, comme dans la s\u00fbret\u00e9 d\u2019une mani\u00e8re g\u00e9n\u00e9rale, n\u2019apporte pas de b\u00e9n\u00e9fice imm\u00e9diat. Ce qui n\u2019aide pas toujours \u00e0 ce que [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-3758","post","type-post","status-publish","format-standard","hentry","category-articles"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anticiper les impacts, l\u2019alliance gestion de crise et cybers\u00e9curit\u00e9 - E&amp;HA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anticiper les impacts, l\u2019alliance gestion de crise et cybers\u00e9curit\u00e9 - E&amp;HA\" \/>\n<meta property=\"og:description\" content=\"Se pr\u00e9parer aux menaces cyber n\u00e9cessite toujours d\u2019investir, ce qui signifie \u00eatre parfois vu comme un centre de co\u00fbts, alors que les r\u00e9percussions positives ne sont pas toujours imm\u00e9diates. Autrement dit, investir dans la cybers\u00e9curit\u00e9, comme dans la s\u00fbret\u00e9 d\u2019une mani\u00e8re g\u00e9n\u00e9rale, n\u2019apporte pas de b\u00e9n\u00e9fice imm\u00e9diat. Ce qui n\u2019aide pas toujours \u00e0 ce que [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"E&amp;HA\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-22T15:32:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T15:32:11+00:00\" \/>\n<meta name=\"author\" content=\"Eliott_Markus_Dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eliott_Markus_Dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/\"},\"author\":{\"name\":\"Eliott_Markus_Dev\",\"@id\":\"https:\/\/www.eha-consulting.com\/#\/schema\/person\/1a8d24fdf97320746d4eefc9c371cb25\"},\"headline\":\"Anticiper les impacts, l\u2019alliance gestion de crise et cybers\u00e9curit\u00e9\",\"datePublished\":\"2023-03-22T15:32:08+00:00\",\"dateModified\":\"2023-03-22T15:32:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/\"},\"wordCount\":795,\"commentCount\":0,\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/\",\"url\":\"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/\",\"name\":\"Anticiper les impacts, l\u2019alliance gestion de crise et cybers\u00e9curit\u00e9 - E&amp;HA\",\"isPartOf\":{\"@id\":\"https:\/\/www.eha-consulting.com\/#website\"},\"datePublished\":\"2023-03-22T15:32:08+00:00\",\"dateModified\":\"2023-03-22T15:32:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.eha-consulting.com\/#\/schema\/person\/1a8d24fdf97320746d4eefc9c371cb25\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.eha-consulting.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anticiper les impacts, l\u2019alliance gestion de crise et cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eha-consulting.com\/#website\",\"url\":\"https:\/\/www.eha-consulting.com\/\",\"name\":\"E&amp;HA\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eha-consulting.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eha-consulting.com\/#\/schema\/person\/1a8d24fdf97320746d4eefc9c371cb25\",\"name\":\"Eliott_Markus_Dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.eha-consulting.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e82a1c875af1d10692c1bb24d4aa42c9c59dd307bec1ee5f88b9145de9873f1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e82a1c875af1d10692c1bb24d4aa42c9c59dd307bec1ee5f88b9145de9873f1b?s=96&d=mm&r=g\",\"caption\":\"Eliott_Markus_Dev\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anticiper les impacts, l\u2019alliance gestion de crise et cybers\u00e9curit\u00e9 - E&amp;HA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/","og_locale":"en_US","og_type":"article","og_title":"Anticiper les impacts, l\u2019alliance gestion de crise et cybers\u00e9curit\u00e9 - E&amp;HA","og_description":"Se pr\u00e9parer aux menaces cyber n\u00e9cessite toujours d\u2019investir, ce qui signifie \u00eatre parfois vu comme un centre de co\u00fbts, alors que les r\u00e9percussions positives ne sont pas toujours imm\u00e9diates. Autrement dit, investir dans la cybers\u00e9curit\u00e9, comme dans la s\u00fbret\u00e9 d\u2019une mani\u00e8re g\u00e9n\u00e9rale, n\u2019apporte pas de b\u00e9n\u00e9fice imm\u00e9diat. Ce qui n\u2019aide pas toujours \u00e0 ce que [&hellip;]","og_url":"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/","og_site_name":"E&amp;HA","article_published_time":"2023-03-22T15:32:08+00:00","article_modified_time":"2023-03-22T15:32:11+00:00","author":"Eliott_Markus_Dev","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eliott_Markus_Dev","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/"},"author":{"name":"Eliott_Markus_Dev","@id":"https:\/\/www.eha-consulting.com\/#\/schema\/person\/1a8d24fdf97320746d4eefc9c371cb25"},"headline":"Anticiper les impacts, l\u2019alliance gestion de crise et cybers\u00e9curit\u00e9","datePublished":"2023-03-22T15:32:08+00:00","dateModified":"2023-03-22T15:32:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/"},"wordCount":795,"commentCount":0,"articleSection":["Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/","url":"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/","name":"Anticiper les impacts, l\u2019alliance gestion de crise et cybers\u00e9curit\u00e9 - E&amp;HA","isPartOf":{"@id":"https:\/\/www.eha-consulting.com\/#website"},"datePublished":"2023-03-22T15:32:08+00:00","dateModified":"2023-03-22T15:32:11+00:00","author":{"@id":"https:\/\/www.eha-consulting.com\/#\/schema\/person\/1a8d24fdf97320746d4eefc9c371cb25"},"breadcrumb":{"@id":"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.eha-consulting.com\/anticiper-les-impacts-lalliance-gestion-de-crise-et-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.eha-consulting.com\/en\/"},{"@type":"ListItem","position":2,"name":"Anticiper les impacts, l\u2019alliance gestion de crise et cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.eha-consulting.com\/#website","url":"https:\/\/www.eha-consulting.com\/","name":"E&amp;HA","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eha-consulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.eha-consulting.com\/#\/schema\/person\/1a8d24fdf97320746d4eefc9c371cb25","name":"Eliott_Markus_Dev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eha-consulting.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e82a1c875af1d10692c1bb24d4aa42c9c59dd307bec1ee5f88b9145de9873f1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e82a1c875af1d10692c1bb24d4aa42c9c59dd307bec1ee5f88b9145de9873f1b?s=96&d=mm&r=g","caption":"Eliott_Markus_Dev"}}]}},"_links":{"self":[{"href":"https:\/\/www.eha-consulting.com\/en\/wp-json\/wp\/v2\/posts\/3758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eha-consulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eha-consulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eha-consulting.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eha-consulting.com\/en\/wp-json\/wp\/v2\/comments?post=3758"}],"version-history":[{"count":2,"href":"https:\/\/www.eha-consulting.com\/en\/wp-json\/wp\/v2\/posts\/3758\/revisions"}],"predecessor-version":[{"id":3760,"href":"https:\/\/www.eha-consulting.com\/en\/wp-json\/wp\/v2\/posts\/3758\/revisions\/3760"}],"wp:attachment":[{"href":"https:\/\/www.eha-consulting.com\/en\/wp-json\/wp\/v2\/media?parent=3758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eha-consulting.com\/en\/wp-json\/wp\/v2\/categories?post=3758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eha-consulting.com\/en\/wp-json\/wp\/v2\/tags?post=3758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}