{"id":3201856,"date":"2024-02-15T09:42:27","date_gmt":"2024-02-15T09:42:27","guid":{"rendered":"https:\/\/pp2.oodrive.com\/?p=3201856"},"modified":"2024-09-16T13:22:23","modified_gmt":"2024-09-16T13:22:23","slug":"resilience-informatique","status":"publish","type":"post","link":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/","title":{"rendered":"R\u00e9silience informatique\u00a0: une nouvelle approche en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es"},"content":{"rendered":"\n<p>Dans un contexte de digitalisation accrue des \u00e9changes et des activit\u00e9s, les organisations sont contraintes de renforcer la s\u00e9curit\u00e9 de leurs infrastructures informatiques et la s\u00e9curisation de leurs donn\u00e9es, tout en sachant qu\u2019aucun dispositif n\u2019est fiable \u00e0 100&nbsp;%. <\/p>\n\n\n\n<p>Des pannes, perturbations et incidents peuvent malgr\u00e9 tout survenir. Autant accepter les risques en se pr\u00e9parant \u00e0 y faire face. <\/p>\n\n\n\n<p>Le d\u00e9veloppement du concept de r\u00e9silience informatique \u2013 qui fait de la s\u00e9curit\u00e9 des donn\u00e9es une condition indispensable pour assurer la continuit\u00e9 des activit\u00e9s \u2013 t\u00e9moigne justement de ce changement de perspective.<\/p>\n\n\n\n<p>Qu\u2019est-ce que la r\u00e9silience informatique pr\u00e9cis\u00e9ment&nbsp;? Quels sont ses enjeux&nbsp;? Quels sont les liens entre r\u00e9silience informatique et cloud computing&nbsp;?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">R\u00e9silience informatique&nbsp;: un concept, plusieurs enjeux<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Comment d\u00e9finir la r\u00e9silience informatique&nbsp;?<\/h3>\n\n\n\n<p>La r\u00e9silience informatique est un concept d\u00e9signant la capacit\u00e9 d\u2019un syst\u00e8me d\u2019information \u00e0 r\u00e9sister \u00e0 des perturbations, des sinistres techniques ou des incidents de s\u00e9curit\u00e9. <\/p>\n\n\n\n<p>L\u2019objectif de la r\u00e9silience informatique est d\u2019aider les organisations \u00e0 assurer la continuit\u00e9 de leurs op\u00e9rations gr\u00e2ce \u00e0 l\u2019acc\u00e8s en continu \u00e0 leur syst\u00e8me informatique et \u00e0 leurs donn\u00e9es.<\/p>\n\n\n\n<section class=\"product__section\" id=\"snc-banner\"><div class=\"product__section-container\"><p class=\"product__section-title\">SecNumCloud : label de confiance<\/p><p class=\"product__section-description\">Le r\u00e9f\u00e9rentiel qui garantit le plus haut niveau de s\u00e9curit\u00e9 pour la protection de vos donn\u00e9es sensibles.<\/p><img decoding=\"async\" src=\"..\/..\/..\/..\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/bg-banner_work.svg\" class=\"product__section-bg\"\/><\/div><div class=\"product__section-link\"><img decoding=\"async\" src=\"..\/..\/..\/..\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/logo-snc.svg\" class=\"product__section-logo\" alt=\"SecNumCloud - Oodrive\"\/><div class=\"cta\"><a href=\"https:\/\/pp2.oodrive.com\/fr\/secnumcloud\/\">D\u00e9couvrir<\/a><\/div><\/div><\/section>\n\n\n\n<p>La r\u00e9silience informatique implique d\u2019accepter les risques et de se pr\u00e9parer \u00e0 d\u2019\u00e9ventuelles perturbations plut\u00f4t que d\u2019avoir \u00e0 les subir. <\/p>\n\n\n\n<p>Cette posture permet aux organisations de mieux r\u00e9agir face aux pannes et incidents et d\u2019en att\u00e9nuer l\u2019impact en maintenant ou en red\u00e9marrant plus rapidement leur activit\u00e9. <\/p>\n\n\n\n<p>D\u00e9velopper une approche de cyber r\u00e9silience fait partie des pr\u00e9conisations de l\u2019ANSSI.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Quels sont les enjeux de la r\u00e9silience informatique&nbsp;?<\/h3>\n\n\n\n<p>Dans tous les secteurs d\u2019activit\u00e9, garantir le fonctionnement de son syst\u00e8me d\u2019information et la <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/securite-donnees-definition-enjeux\/\">s\u00e9curit\u00e9 de ses donn\u00e9es<\/a> constitue une priorit\u00e9 strat\u00e9gique. <\/p>\n\n\n\n<p>Plusieurs enjeux entrent en compte&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pr\u00e9server les activit\u00e9s de l\u2019organisation et minimiser l\u2019impact sur la productivit\u00e9 en r\u00e9duisant au maximum les temps d\u2019arr\u00eat.<\/li>\n\n\n\n<li>Prot\u00e9ger les donn\u00e9es sensibles (garantir leur confidentialit\u00e9, leur int\u00e9grit\u00e9, leur disponibilit\u00e9).<\/li>\n\n\n\n<li>Limiter les risques juridiques inh\u00e9rents aux pannes et incidents informatiques.<\/li>\n\n\n\n<li>Pr\u00e9server la r\u00e9putation de la structure.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">De la cybers\u00e9curit\u00e9 \u00e0 la r\u00e9silience informatique&nbsp;: un changement de perspective<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Cybers\u00e9curit\u00e9, r\u00e9silience informatique&nbsp;: quelles diff\u00e9rences&nbsp;?<\/h3>\n\n\n\n<p>Souvent confondues, la cybers\u00e9curit\u00e9 et la r\u00e9silience d\u2019un syst\u00e8me informatique ne sont pourtant pas interchangeables. <\/p>\n\n\n\n<p>La <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/cybersecurite-dans-le-secteur-energie-la-donnee-strategique\/\">cybers\u00e9curit\u00e9<\/a> parfaite n\u2019existe pas et mettre en place des mesures de protection solides n\u2019est pas toujours suffisant pour pr\u00e9venir d\u2019\u00e9ventuels incidents.<\/p>\n\n\n\n<p>La r\u00e9silience informatique a int\u00e9gr\u00e9 ce constat pour \u00e9laborer une approche plus globale d\u2019acceptation des risques et d\u2019anticipation. <\/p>\n\n\n\n<p>Dans ce sens, elle renforce la cybers\u00e9curit\u00e9 des organisations en les aidant \u00e0 passer d\u2019une approche r\u00e9active \u00e0 une approche proactive.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Comment renforcer la r\u00e9silience de son syst\u00e8me informatique&nbsp;?<\/h3>\n\n\n\n<p>D\u00e9velopper sa r\u00e9silience informatique est une d\u00e9marche au long cours qui n\u00e9cessite de mettre en place une organisation, des mesures et des moyens d\u00e9di\u00e9s, et d\u2019int\u00e9grer la s\u00e9curit\u00e9 des donn\u00e9es dans l\u2019ensemble des projets et des processus.<\/p>\n\n\n\n<p>La s\u00e9curisation des donn\u00e9es informatiques constitue un \u00e9l\u00e9ment central dans toute d\u00e9marche de r\u00e9silience informatique. <\/p>\n\n\n\n<p>Les organisations qui adoptent cette posture ont d\u2019ailleurs bien compris que d\u2019\u00e9ventuelles pertes ou alt\u00e9rations de donn\u00e9es pouvaient avoir d\u2019importantes r\u00e9percussions sur leur fonctionnement (depuis la perturbation de l\u2019activit\u00e9 jusqu\u2019\u00e0, dans certains cas graves, la cessation d\u2019activit\u00e9). <\/p>\n\n\n\n<p>Le cloud computing tient justement un r\u00f4le cl\u00e9 dans ce processus de s\u00e9curisation des donn\u00e9es.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cloud computing et r\u00e9silience informatique&nbsp;: un m\u00eame combat<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">La s\u00e9curisation des donn\u00e9es informatiques, une d\u00e9marche simplifi\u00e9e par le cloud computing<\/h3>\n\n\n\n<p>Flexible et \u00e9conomique, le <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/innovation\/cloud-computing-iaas-paas-saas-quelles-differences\/\">cloud computing<\/a> a connu ces derni\u00e8res ann\u00e9es un essor massif et a transform\u00e9 la mani\u00e8re dont s\u2019effectuent le stockage, la sauvegarde et la s\u00e9curisation des donn\u00e9es. <\/p>\n\n\n\n<p>Les organisations qui choisissent le cloud computing n\u2019ayant plus \u00e0 assurer d\u2019op\u00e9rations de maintenance sur leurs infrastructures, peuvent se concentrer sur leur activit\u00e9. <\/p>\n\n\n\n<p>De son c\u00f4t\u00e9, le fournisseur cloud doit donner des garanties \u00e0 ses clients en mati\u00e8re de confidentialit\u00e9 et de s\u00e9curit\u00e9 des donn\u00e9es (localisation des serveurs en Europe, chiffrement des donn\u00e9es, s\u00e9curisation des datacenters, etc.).<\/p>\n\n\n\n<p>La r\u00e9silience informatique et l\u2019essor du cloud computing sont deux d\u00e9marches qui entretiennent des synergies et dont les exigences se nourrissent mutuellement. <\/p>\n\n\n\n<p>La mont\u00e9e en puissance des cyberattaques a d\u2019ailleurs fait \u00e9merger de nouvelles exigences en mati\u00e8re de protection des contenus sensibles sur le cloud. <\/p>\n\n\n\n<p class=\"has-blue-work-background-color has-background\">Le <a href=\"https:\/\/pp2.oodrive.com\/fr\/secnumcloud\/\">r\u00e9f\u00e9rentiel SecNumCloud<\/a> \u2013 un visa de s\u00e9curit\u00e9 d\u00e9livr\u00e9 par l\u2019ANSSI \u2013 en est un bon exemple. Il permet aux organisations de mieux identifier les fournisseurs et \u00e9diteurs de solutions cloud susceptibles de leur offrir les avantages du cloud tout en assurant la s\u00e9curit\u00e9 de leurs donn\u00e9es. <\/p>\n\n\n\n<p>Oodrive est d\u2019ailleurs le premier et le seul \u00e9diteur de logiciels cloud \u00e0 avoir obtenu cette qualification.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">PCA, PRA&nbsp;: l\u2019int\u00e9r\u00eat des sauvegardes de donn\u00e9es en ligne<\/h3>\n\n\n\n<p>L\u2019\u00e9laboration d\u2019un <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/pca-pra\/\">PCA (Plan de continuit\u00e9 d\u2019activit\u00e9) ou d\u2019un PRA (Plan de reprise d\u2019activit\u00e9)<\/a> est une brique importante de toute d\u00e9marche de r\u00e9silience informatique.<\/p>\n\n\n\n<p>Alors que le PCA vise \u00e0 assurer la disponibilit\u00e9 en continu du syst\u00e8me informatique, le PRA a quant a lui pour objectif de permettre le red\u00e9marrage d\u2019un syst\u00e8me qui aurait subi une interruption. <\/p>\n\n\n\n<p>Diff\u00e9rentes mesures techniques entrent en compte dans l\u2019\u00e9laboration d\u2019un PCA ou d\u2019un PRA. Si ces deux plans n\u2019ont pas exactement la m\u00eame nature, ils convergent cependant vers un point commun&nbsp;: la s\u00e9curisation des donn\u00e9es informatiques.<\/p>\n\n\n\n<p>L\u2019utilisation d\u2019outils de sauvegarde de donn\u00e9es (back up) est dans les deux cas consid\u00e9r\u00e9e comme une mesure fondamentale.<\/p>\n\n\n\n<p>Les <a href=\"https:\/\/pp2.oodrive.com\/fr\/blog\/productivite\/logiciel-sauvegarde-proteger-donnees-entreprises\/\">sauvegardes de donn\u00e9es<\/a> \u00ab&nbsp;manuelles&nbsp;\u00bb ne permettent pas aux organisations d\u2019assurer la continuit\u00e9 de leurs activit\u00e9s. <\/p>\n\n\n\n<p>La sauvegarde de donn\u00e9es en ligne (back up online), sur des serveurs \u00e0 distance et s\u00e9curis\u00e9s, est beaucoup plus simple et adapt\u00e9e. <\/p>\n\n\n\n<p>Pour les entreprises, il n\u2019est plus n\u00e9cessaire de maintenir une infrastructure sur site. <\/p>\n\n\n\n<p>La gestion des sauvegardes et la restauration des donn\u00e9es peuvent \u00eatre d\u00e9l\u00e9gu\u00e9es \u00e0 un prestataire, sur un cloud s\u00e9curis\u00e9. <\/p>\n\n\n\n<p>La s\u00e9curit\u00e9 des donn\u00e9es est assur\u00e9e via un monitoring et des contr\u00f4les, m\u00eame en cas d\u2019\u00e9v\u00e9nement inattendu. <\/p>\n\n\n\n<p>Les donn\u00e9es peuvent \u00eatre restaur\u00e9es rapidement si besoin. La sauvegarde de donn\u00e9es dans le cloud constitue la premi\u00e8re \u00e9tape dans l\u2019\u00e9laboration d\u2019un PCA ou d\u2019un PRA et participe pleinement au d\u00e9veloppement d\u2019une posture de r\u00e9silience informatique.<\/p>\n\n\n\n<p>Le moindre incident de s\u00e9curit\u00e9 \u00e9tant capable de produire des dommages majeurs, la r\u00e9silience informatique s\u2019impose de plus en plus comme un concept central. <\/p>\n\n\n\n<p>Elle permet aux organisations de prot\u00e9ger leurs donn\u00e9es et de reprendre rapidement leur activit\u00e9 en cas de perturbation. <\/p>\n\n\n\n<p>En simplifiant et en s\u00e9curisant les processus de sauvegarde et de restauration de donn\u00e9es, le cloud computing s\u2019inscrit dans cette d\u00e9marche. <\/p>\n\n\n\n<section class=\"product__section\" id=\"offre-banner\"><div class=\"product__section-container\"><p class=\"product__section-title\">Oodrive : \u00e9diteur de logiciels cloud<\/p><p class=\"product__section-description\">Acteur majeur de la s\u00e9curit\u00e9 des donn\u00e9es, Oodrive permet aux organisations de d\u00e9velopper leur r\u00e9silience informatique en sauvegardant automatiquement leurs donn\u00e9es sensibles et en les restaurant rapidement en cas de besoin.<\/p><\/div><div class=\"product__section-link\"><img decoding=\"async\" src=\"..\/..\/..\/..\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/LOGO-OODRIVE-Noir.svg\" class=\"product__section-logo\" alt=\"Oodrive\"\/><div class=\"cta\"><a href=\"https:\/\/pp2.oodrive.com\/fr\/apercu\/\">D\u00e9couvrir<\/a><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Dans un contexte de digitalisation accrue des \u00e9changes et des activit\u00e9s, les organisations sont contraintes de renforcer la s\u00e9curit\u00e9 de leurs infrastructures informatiques et la s\u00e9curisation de leurs donn\u00e9es, tout en sachant qu\u2019aucun dispositif n\u2019est fiable \u00e0 100&nbsp;%. Des pannes, perturbations et incidents peuvent malgr\u00e9 tout survenir. Autant accepter les risques en se pr\u00e9parant \u00e0 [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":3202213,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[574],"class_list":["post-3201856","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>R\u00e9silience informatique : comment anticiper les risques ? | Oodrive<\/title>\n<meta name=\"description\" content=\"La r\u00e9silience informatique incite les organisations \u00e0 anticiper les risques et \u00e0 prot\u00e9ger leurs donn\u00e9es pour limiter les perturbations sur leurs activit\u00e9s.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"R\u00e9silience informatique : comment anticiper les risques ? | Oodrive\" \/>\n<meta property=\"og:description\" content=\"La r\u00e9silience informatique incite les organisations \u00e0 anticiper les risques et \u00e0 prot\u00e9ger leurs donn\u00e9es pour limiter les perturbations sur leurs activit\u00e9s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/\" \/>\n<meta property=\"og:site_name\" content=\"Oodrive\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-15T09:42:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-16T13:22:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/02\/resilience_informatique-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1706\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Maxime Geffray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maxime Geffray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/\"},\"author\":{\"name\":\"Maxime Geffray\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/d6849b6877c5b3cacfd43c5d7fe1479d\"},\"headline\":\"R\u00e9silience informatique\u00a0: une nouvelle approche en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es\",\"datePublished\":\"2024-02-15T09:42:27+00:00\",\"dateModified\":\"2024-09-16T13:22:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/\"},\"wordCount\":1341,\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/02\/resilience_informatique-scaled.jpeg\",\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/\",\"url\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/\",\"name\":\"R\u00e9silience informatique : comment anticiper les risques ? | Oodrive\",\"isPartOf\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/02\/resilience_informatique-scaled.jpeg\",\"datePublished\":\"2024-02-15T09:42:27+00:00\",\"dateModified\":\"2024-09-16T13:22:23+00:00\",\"description\":\"La r\u00e9silience informatique incite les organisations \u00e0 anticiper les risques et \u00e0 prot\u00e9ger leurs donn\u00e9es pour limiter les perturbations sur leurs activit\u00e9s.\",\"breadcrumb\":{\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#primaryimage\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/02\/resilience_informatique-scaled.jpeg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/02\/resilience_informatique-scaled.jpeg\",\"width\":2560,\"height\":1706,\"caption\":\"R\u00e9silience informatique et s\u00e9curit\u00e9 des donn\u00e9es\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/pp2.oodrive.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/securite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"R\u00e9silience informatique\u00a0: une nouvelle approche en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pp2.oodrive.com\/#website\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"name\":\"Oodrive\",\"description\":\"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...\",\"publisher\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pp2.oodrive.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pp2.oodrive.com\/#organization\",\"name\":\"Oodrive\",\"url\":\"https:\/\/pp2.oodrive.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"width\":132,\"height\":27,\"caption\":\"Oodrive\"},\"image\":{\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/d6849b6877c5b3cacfd43c5d7fe1479d\",\"name\":\"Maxime Geffray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg\",\"contentUrl\":\"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg\",\"caption\":\"Maxime Geffray\"},\"description\":\"Communication Manager at Oodrive\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"R\u00e9silience informatique : comment anticiper les risques ? | Oodrive","description":"La r\u00e9silience informatique incite les organisations \u00e0 anticiper les risques et \u00e0 prot\u00e9ger leurs donn\u00e9es pour limiter les perturbations sur leurs activit\u00e9s.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"R\u00e9silience informatique : comment anticiper les risques ? | Oodrive","og_description":"La r\u00e9silience informatique incite les organisations \u00e0 anticiper les risques et \u00e0 prot\u00e9ger leurs donn\u00e9es pour limiter les perturbations sur leurs activit\u00e9s.","og_url":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/","og_site_name":"Oodrive","article_published_time":"2024-02-15T09:42:27+00:00","article_modified_time":"2024-09-16T13:22:23+00:00","og_image":[{"width":2560,"height":1706,"url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/02\/resilience_informatique-scaled.jpeg","type":"image\/jpeg"}],"author":"Maxime Geffray","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Maxime Geffray","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#article","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/"},"author":{"name":"Maxime Geffray","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/d6849b6877c5b3cacfd43c5d7fe1479d"},"headline":"R\u00e9silience informatique\u00a0: une nouvelle approche en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es","datePublished":"2024-02-15T09:42:27+00:00","dateModified":"2024-09-16T13:22:23+00:00","mainEntityOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/"},"wordCount":1341,"publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/02\/resilience_informatique-scaled.jpeg","articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/","url":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/","name":"R\u00e9silience informatique : comment anticiper les risques ? | Oodrive","isPartOf":{"@id":"https:\/\/pp2.oodrive.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#primaryimage"},"image":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#primaryimage"},"thumbnailUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/02\/resilience_informatique-scaled.jpeg","datePublished":"2024-02-15T09:42:27+00:00","dateModified":"2024-09-16T13:22:23+00:00","description":"La r\u00e9silience informatique incite les organisations \u00e0 anticiper les risques et \u00e0 prot\u00e9ger leurs donn\u00e9es pour limiter les perturbations sur leurs activit\u00e9s.","breadcrumb":{"@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#primaryimage","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/02\/resilience_informatique-scaled.jpeg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/02\/resilience_informatique-scaled.jpeg","width":2560,"height":1706,"caption":"R\u00e9silience informatique et s\u00e9curit\u00e9 des donn\u00e9es"},{"@type":"BreadcrumbList","@id":"https:\/\/pp2.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/pp2.oodrive.com\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/pp2.oodrive.com\/fr\/blog\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"R\u00e9silience informatique\u00a0: une nouvelle approche en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/pp2.oodrive.com\/#website","url":"https:\/\/pp2.oodrive.com\/","name":"Oodrive","description":"Plateforme de collaboration s\u00e9curis\u00e9e et souveraine, Oodrive propose des solutions pour la gestion de vos donn\u00e9es sensibles : partage de fichier, signature \u00e9lectronique, sauvegarde, ...","publisher":{"@id":"https:\/\/pp2.oodrive.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pp2.oodrive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/pp2.oodrive.com\/#organization","name":"Oodrive","url":"https:\/\/pp2.oodrive.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","width":132,"height":27,"caption":"Oodrive"},"image":{"@id":"https:\/\/pp2.oodrive.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/d6849b6877c5b3cacfd43c5d7fe1479d","name":"Maxime Geffray","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pp2.oodrive.com\/#\/schema\/person\/image\/","url":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg","contentUrl":"https:\/\/pp2.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg","caption":"Maxime Geffray"},"description":"Communication Manager at Oodrive"}]}},"_links":{"self":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/3201856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/comments?post=3201856"}],"version-history":[{"count":0,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/3201856\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media\/3202213"}],"wp:attachment":[{"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/media?parent=3201856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pp2.oodrive.com\/fr\/wp-json\/wp\/v2\/categories?post=3201856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}