[{"data":1,"prerenderedAt":843},["ShallowReactive",2],{"globals":3,"report-recommandations-pour-piloter-un-tpcrm":465},{"de":4,"en":194,"fr":348},{"id":5,"documentId":6,"titleSeparator":7,"title":8,"createdAt":9,"updatedAt":10,"publishedAt":11,"locale":12,"logo":13,"favicon":27,"seo":40,"navigation":48,"header":128,"footer":138,"videoPoster":161,"localizations":182},64,"nxlpiutyi22j347lzjvtcmt9","|","Cybervadis","2025-03-26T10:37:37.549Z","2026-01-21T15:16:59.044Z","2025-10-22T12:44:06.951Z","de",{"id":14,"documentId":15,"name":16,"alternativeText":17,"caption":17,"width":18,"height":19,"formats":17,"hash":20,"ext":21,"mime":22,"size":23,"url":24,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":26,"updatedAt":26,"publishedAt":26},276,"ns1dycmcy8eby82nudaixp17","logo.svg",null,303,57,"logo_9f7aa692ba",".svg","image/svg+xml",4.05,"https://assets.cybervadis.com/strapi/assets/logo_9f7aa692ba.svg","strapi-provider-upload-azure-storage","2025-04-10T15:46:43.920Z",{"id":28,"documentId":29,"name":30,"alternativeText":17,"caption":17,"width":31,"height":31,"formats":32,"hash":33,"ext":34,"mime":35,"size":36,"url":37,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":38,"updatedAt":39,"publishedAt":38},122,"ngfzwjibdex3knh7ftwqfvjx","favicon.png",32,{},"favicon_032a9b11b1",".png","image/png",0.5,"https://assets.cybervadis.com/strapi/assets/favicon_032a9b11b1.png","2025-02-25T09:03:35.564Z","2025-02-25T11:54:37.400Z",{"id":41,"metaDescription":17,"metaImage":17,"metaTags":42,"scripts":43},1191,[],[44,46],{"id":45,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},103,{"id":47,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},104,{"id":5,"links":49},[50,75,98,103],{"id":51,"label":52,"to":53,"external":17,"target":17,"icon":17,"children":54},287,"Third-Party Risiken reduzieren","/third-party-risiken-reduzieren",[55,59,63,67,71],{"id":56,"label":57,"to":58,"external":17,"target":17,"icon":17},6139,"Automatisierte Risikoanalysen","/third-party-risiken-reduzieren/automatisierte-risikoanalysen",{"id":60,"label":61,"to":62,"external":17,"target":17,"icon":17},6140,"Evidenzbasierte Risikobewertung","/third-party-risiken-reduzieren/evidenzbasierte-risikobewertung",{"id":64,"label":65,"to":66,"external":17,"target":17,"icon":17},6141,"Gemeinsame Risikoreduzierung","/third-party-risiken-reduzieren/gemeinsame-risikoreduzierung",{"id":68,"label":69,"to":70,"external":17,"target":17,"icon":17},6142,"Framework-basierte Methodik","/third-party-risiken-reduzieren/framework-basierte-methodik",{"id":72,"label":73,"to":74,"external":17,"target":17,"icon":17},6143,"Preise","/third-party-risiken-reduzieren/preise",{"id":76,"label":77,"to":78,"external":17,"target":17,"icon":17,"children":79},288,"Jetzt bewertet werden","/jetzt-bewertet-werden",[80,84,88,92],{"id":81,"label":82,"to":83,"external":17,"target":17,"icon":17},6144,"So funktioniert es","/jetzt-bewertet-werden/so-funktioniert-es",{"id":85,"label":86,"to":87,"external":17,"target":17,"icon":17},6145,"Individuelle Bewertungen","/jetzt-bewertet-werden/individuelle-bewertungen",{"id":89,"label":90,"to":91,"external":17,"target":17,"icon":17},6146,"CyberVadis Badges","/jetzt-bewertet-werden/cybervadis-badges",{"id":93,"label":94,"to":95,"external":96,"target":97,"icon":17},6147,"Help center (EN)","https://help.cybervadis.com/en/",true,"_blank",{"id":99,"label":100,"to":101,"external":17,"target":17,"icon":17,"children":102},286,"Ressourcen","/ressourcen",[],{"id":104,"label":105,"to":106,"external":17,"target":17,"icon":17,"children":107},289,"Über uns","/uber-uns",[108,112,116,120,124],{"id":109,"label":110,"to":111,"external":17,"target":17,"icon":17},6148,"Warum CyberVadis","/warum-cybervadis",{"id":113,"label":114,"to":115,"external":17,"target":17,"icon":17},6149,"Trust Center (EN)","/uber-uns/trust-center",{"id":117,"label":118,"to":119,"external":96,"target":97,"icon":17},6150,"Careers (EN)","https://careers.cybervadis.com/",{"id":121,"label":122,"to":123,"external":17,"target":17,"icon":17},6151,"Aktuelles","/de/aktuelles",{"id":125,"label":126,"to":127,"external":17,"target":17,"icon":17},6152,"Kontakt","/uber-uns/kontakt",{"id":5,"info":17,"login":129,"button":134},{"id":130,"label":131,"to":132,"external":133,"target":17,"icon":17},6153,"Lieferanten bewerten","/de/third-party-risiken-reduzieren",false,{"id":135,"icon":17,"label":136,"form":137},1080,"Demo buchen","demo",{"id":5,"newsletterTitle":139,"copyright":140,"legalLinks":141,"socialLinks":150},"Newsletter abonnieren","Urheberrecht © 2025. Alle Rechte vorbehalten.",[142,146],{"id":143,"label":144,"to":145,"external":17,"target":17,"icon":17},6154,"Rechtliche Hinweise (EN)","/de/legal",{"id":147,"label":148,"to":149,"external":17,"target":17,"icon":17},6155,"Datenschutzerklärung (EN)","/de/legal-notice",[151,156],{"id":152,"label":153,"to":154,"external":96,"target":97,"icon":155},6156,"X","https://x.com/cybervadis","fa6-brands:x-twitter",{"id":157,"label":158,"to":159,"external":96,"target":97,"icon":160},6157,"LinkedIn","https://www.linkedin.com/company/cybervadis/","fa6-brands:linkedin",{"id":162,"documentId":163,"name":164,"alternativeText":17,"caption":17,"width":165,"height":166,"formats":167,"hash":176,"ext":34,"mime":35,"size":177,"url":178,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":179,"updatedAt":180,"publishedAt":181},242,"vrv61ssc0oc744hr7dgkqznu","Video Preview",1028,690,{"thumbnail":168},{"ext":34,"url":169,"hash":170,"mime":35,"name":171,"path":17,"size":172,"width":173,"height":174,"sizeInBytes":175},"https://assets.cybervadis.com/strapi/assets/thumbnail_Design_sans_titre_6_f21ca94567.png","thumbnail_Design_sans_titre_6_f21ca94567","thumbnail_Design sans titre (6).png",14.9,232,156,14897,"Design_sans_titre_6_f21ca94567",18.5,"https://assets.cybervadis.com/strapi/assets/Design_sans_titre_6_f21ca94567.png","2025-03-12T09:54:21.008Z","2025-03-12T09:54:35.444Z","2025-03-12T09:54:21.009Z",[183,189],{"id":184,"documentId":6,"titleSeparator":7,"title":8,"createdAt":185,"updatedAt":186,"publishedAt":187,"locale":188},66,"2025-02-19T11:28:33.351Z","2026-01-21T15:16:58.561Z","2026-01-21T15:16:58.826Z","en",{"id":190,"documentId":6,"titleSeparator":7,"title":8,"createdAt":191,"updatedAt":10,"publishedAt":192,"locale":193},63,"2025-06-17T20:29:42.853Z","2025-10-22T12:40:51.539Z","fr",{"id":184,"documentId":6,"titleSeparator":7,"title":8,"createdAt":185,"updatedAt":186,"publishedAt":187,"locale":188,"logo":195,"favicon":196,"seo":198,"navigation":227,"header":303,"footer":325,"videoPoster":342,"localizations":345},{"id":14,"documentId":15,"name":16,"alternativeText":17,"caption":17,"width":18,"height":19,"formats":17,"hash":20,"ext":21,"mime":22,"size":23,"url":24,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":26,"updatedAt":26,"publishedAt":26},{"id":28,"documentId":29,"name":30,"alternativeText":17,"caption":17,"width":31,"height":31,"formats":197,"hash":33,"ext":34,"mime":35,"size":36,"url":37,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":38,"updatedAt":39,"publishedAt":38},{},{"id":199,"metaDescription":17,"metaImage":200,"metaTags":219,"scripts":220},1281,{"id":201,"documentId":202,"name":203,"alternativeText":17,"caption":17,"width":204,"height":205,"formats":206,"hash":215,"ext":34,"mime":35,"size":216,"url":217,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":218,"updatedAt":218,"publishedAt":218},284,"ntditjqus6ubg59uwiew5zqu","meta image by default.png",1200,630,{"thumbnail":207},{"ext":34,"url":208,"hash":209,"mime":35,"name":210,"path":17,"size":211,"width":212,"height":213,"sizeInBytes":214},"https://assets.cybervadis.com/strapi/assets/thumbnail_meta_image_by_default_5c51d0a0d5.png","thumbnail_meta_image_by_default_5c51d0a0d5","thumbnail_meta image by default.png",64.36,245,129,64355,"meta_image_by_default_5c51d0a0d5",210.02,"https://assets.cybervadis.com/strapi/assets/meta_image_by_default_5c51d0a0d5.png","2025-04-17T14:53:22.089Z",[],[221,223,225],{"id":222,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},108,{"id":224,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},109,{"id":226,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},110,{"id":184,"links":228},[229,254,274,279],{"id":230,"label":231,"to":232,"external":17,"target":17,"icon":17,"children":233},295,"Mitigate third-party risks","/mitigate-third-party-risks",[234,238,242,246,250],{"id":235,"label":236,"to":237,"external":17,"target":17,"icon":17},6289,"Automated Risk Insights","/mitigate-third-party-risks/automated-risk-insights",{"id":239,"label":240,"to":241,"external":17,"target":17,"icon":17},6290,"Evidence-based risk assessment","/mitigate-third-party-risks/evidence-based-risk-assessment",{"id":243,"label":244,"to":245,"external":17,"target":17,"icon":17},6291,"Collaborative Risk Reduction","/mitigate-third-party-risks/risk-reduction",{"id":247,"label":248,"to":249,"external":17,"target":17,"icon":17},6292,"Framework-based methodology","/mitigate-third-party-risks/framework-based-methodology",{"id":251,"label":252,"to":253,"external":17,"target":17,"icon":17},6293,"Pricing","/mitigate-third-party-risks/pricing",{"id":255,"label":256,"to":257,"external":17,"target":17,"icon":17,"children":258},296,"Get assessed ","/get-assessed",[259,263,267,271],{"id":260,"label":261,"to":262,"external":17,"target":17,"icon":17},6294,"How it works","/get-assessed/how-it-works",{"id":264,"label":265,"to":266,"external":17,"target":17,"icon":17},6295,"Standardized Assessments","/get-assessed/tailored-and-standardized-assessment",{"id":268,"label":269,"to":270,"external":17,"target":17,"icon":17},6296,"CyberVadis Medals","/get-assessed/medals",{"id":272,"label":273,"to":95,"external":96,"target":97,"icon":17},6297,"Help center",{"id":275,"label":276,"to":277,"external":17,"target":17,"icon":17,"children":278},294,"Resources","/resources",[],{"id":280,"label":281,"to":282,"external":17,"target":17,"icon":17,"children":283},297,"About us ","/about-us",[284,288,292,295,299],{"id":285,"label":286,"to":287,"external":17,"target":17,"icon":17},6298,"Why CyberVadis","/why-cybervadis",{"id":289,"label":290,"to":291,"external":17,"target":17,"icon":17},6299,"Trust center","/about-us/trust-center",{"id":293,"label":294,"to":119,"external":96,"target":97,"icon":17},6300,"Careers",{"id":296,"label":297,"to":298,"external":17,"target":17,"icon":17},6301,"In the news","/in-the-news",{"id":300,"label":301,"to":302,"external":17,"target":17,"icon":17},6302,"Contact","/about-us/contact",{"id":184,"info":304,"login":319,"button":322},[305],{"type":306,"children":307},"paragraph",[308,311,317],{"text":309,"type":310},"Already a CyberVadis client ? ","text",{"url":312,"type":313,"children":314},"https://app.cybervadis.com/","link",[315],{"text":316,"type":310},"You can access your account here",{"text":318,"type":310},"",{"id":320,"label":321,"to":232,"external":133,"target":17,"icon":17},6303,"Assess Vendors",{"id":323,"icon":17,"label":324,"form":137},1109,"Book a demo",{"id":184,"newsletterTitle":326,"copyright":327,"legalLinks":328,"socialLinks":337},"Subscribe to newsletter","Copyright © 2025. All rights reserved.",[329,333],{"id":330,"label":331,"to":332,"external":17,"target":17,"icon":17},6304,"Legal mentions","/legal",{"id":334,"label":335,"to":336,"external":17,"target":17,"icon":17},6305,"Data privacy","/legal-notice",[338,340],{"id":339,"label":153,"to":154,"external":96,"target":97,"icon":155},6306,{"id":341,"label":158,"to":159,"external":96,"target":97,"icon":160},6307,{"id":162,"documentId":163,"name":164,"alternativeText":17,"caption":17,"width":165,"height":166,"formats":343,"hash":176,"ext":34,"mime":35,"size":177,"url":178,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":179,"updatedAt":180,"publishedAt":181},{"thumbnail":344},{"ext":34,"url":169,"hash":170,"mime":35,"name":171,"path":17,"size":172,"width":173,"height":174,"sizeInBytes":175},[346,347],{"id":5,"documentId":6,"titleSeparator":7,"title":8,"createdAt":9,"updatedAt":10,"publishedAt":11,"locale":12},{"id":190,"documentId":6,"titleSeparator":7,"title":8,"createdAt":191,"updatedAt":10,"publishedAt":192,"locale":193},{"id":190,"documentId":6,"titleSeparator":7,"title":8,"createdAt":191,"updatedAt":10,"publishedAt":192,"locale":193,"logo":349,"favicon":350,"seo":352,"navigation":363,"header":435,"footer":442,"videoPoster":459,"localizations":462},{"id":14,"documentId":15,"name":16,"alternativeText":17,"caption":17,"width":18,"height":19,"formats":17,"hash":20,"ext":21,"mime":22,"size":23,"url":24,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":26,"updatedAt":26,"publishedAt":26},{"id":28,"documentId":29,"name":30,"alternativeText":17,"caption":17,"width":31,"height":31,"formats":351,"hash":33,"ext":34,"mime":35,"size":36,"url":37,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":38,"updatedAt":39,"publishedAt":38},{},{"id":353,"metaDescription":17,"metaImage":354,"metaTags":357,"scripts":358},1190,{"id":201,"documentId":202,"name":203,"alternativeText":17,"caption":17,"width":204,"height":205,"formats":355,"hash":215,"ext":34,"mime":35,"size":216,"url":217,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":218,"updatedAt":218,"publishedAt":218},{"thumbnail":356},{"ext":34,"url":208,"hash":209,"mime":35,"name":210,"path":17,"size":211,"width":212,"height":213,"sizeInBytes":214},[],[359,361],{"id":360,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},101,{"id":362,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},102,{"id":190,"links":364},[365,390,409,414],{"id":366,"label":367,"to":368,"external":17,"target":17,"icon":17,"children":369},283,"Atténuer les risques liés aux tiers","/attenuer-les-risques-lies-aux-tiers",[370,374,378,382,386],{"id":371,"label":372,"to":373,"external":17,"target":17,"icon":17},6120,"Analyse automatisée des risques","/attenuer-les-risques-lies-aux-tiers/analyse-automatisee-des-risques",{"id":375,"label":376,"to":377,"external":17,"target":17,"icon":17},6121,"Évaluation basée sur la revue de preuves","/attenuer-les-risques-lies-aux-tiers/evaluation-basee-sur-la-revue-de-preuves",{"id":379,"label":380,"to":381,"external":17,"target":17,"icon":17},6122,"Réduction des riques","/attenuer-les-risques-lies-aux-tiers/reduction-des-risques",{"id":383,"label":384,"to":385,"external":17,"target":17,"icon":17},6123,"Méthodologie basée sur un cadre de références","/attenuer-les-risques-lies-aux-tiers/methodologie-basee-sur-un-cadre-de-references",{"id":387,"label":388,"to":389,"external":17,"target":17,"icon":17},6124,"Tarification","/attenuer-les-risques-lies-aux-tiers/tarification",{"id":201,"label":391,"to":392,"external":17,"target":17,"icon":17,"children":393},"Se faire évaluer","/se-faire-evaluer",[394,398,402,406],{"id":395,"label":396,"to":397,"external":17,"target":17,"icon":17},6125,"Comment ça marche","/se-faire-evaluer/comment-ca-marche",{"id":399,"label":400,"to":401,"external":17,"target":17,"icon":17},6126,"Évaluation standardisée","/se-faire-evaluer/evaluation-adaptee-et-standardisee",{"id":403,"label":404,"to":405,"external":17,"target":17,"icon":17},6127,"Les médailles CyberVadis","/se-faire-evaluer/medailles",{"id":407,"label":408,"to":95,"external":96,"target":97,"icon":17},6128,"Help Center (EN)",{"id":410,"label":411,"to":412,"external":17,"target":17,"icon":17,"children":413},282,"Ressources","/ressources",[],{"id":415,"label":416,"to":417,"external":17,"target":17,"icon":17,"children":418},285,"À propos","/a-propos",[419,423,426,428,432],{"id":420,"label":421,"to":422,"external":17,"target":17,"icon":17},6129,"Pourquoi choisir CyberVadis","/pourquoi-choisir-cybervadis",{"id":424,"label":114,"to":425,"external":17,"target":17,"icon":17},6130,"/a-propos/trust-center",{"id":427,"label":118,"to":119,"external":96,"target":97,"icon":17},6131,{"id":429,"label":430,"to":431,"external":17,"target":17,"icon":17},6132,"Actualités","/actualites",{"id":433,"label":301,"to":434,"external":17,"target":17,"icon":17},6133,"/a-propos/contact",{"id":190,"info":17,"login":436,"button":439},{"id":437,"label":438,"to":368,"external":133,"target":17,"icon":17},6134,"Évaluer ses tiers",{"id":440,"icon":17,"label":441,"form":137},1079,"Réserver une démonstration",{"id":190,"newsletterTitle":443,"copyright":444,"legalLinks":445,"socialLinks":454},"S'inscrire à la newsletter","Copyright © 2025. Tous droits réservés. ",[446,450],{"id":447,"label":448,"to":449,"external":17,"target":17,"icon":17},6135,"Mentions légales (EN)","/fr/legal",{"id":451,"label":452,"to":453,"external":17,"target":17,"icon":17},6136,"Confidentialité des données","/fr/legal-notice",[455,457],{"id":456,"label":153,"to":154,"external":96,"target":97,"icon":155},6137,{"id":458,"label":158,"to":159,"external":96,"target":97,"icon":160},6138,{"id":162,"documentId":163,"name":164,"alternativeText":17,"caption":17,"width":165,"height":166,"formats":460,"hash":176,"ext":34,"mime":35,"size":177,"url":178,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":179,"updatedAt":180,"publishedAt":181},{"thumbnail":461},{"ext":34,"url":169,"hash":170,"mime":35,"name":171,"path":17,"size":172,"width":173,"height":174,"sizeInBytes":175},[463,464],{"id":5,"documentId":6,"titleSeparator":7,"title":8,"createdAt":9,"updatedAt":10,"publishedAt":11,"locale":12},{"id":184,"documentId":6,"titleSeparator":7,"title":8,"createdAt":185,"updatedAt":186,"publishedAt":187,"locale":188},{"id":466,"documentId":467,"language":193,"date":468,"title":469,"description":470,"slug":512,"createdAt":513,"updatedAt":514,"publishedAt":515,"formUrl":516,"formHeight":517,"image":17,"preview":518,"seo":540,"blocks":545},107,"s6mp1dec0j04aq744qcaz4sp","2026-02-02","Bâtissez un programme TPCRM performant : 10 clés pour réussir en 2026",[471,477,488,496,504],{"type":472,"level":473,"children":474},"heading",3,[475],{"text":476,"type":310},"Découvrez comment structurer une gestion des risques tiers fiable, scalable et orientée vers l'action pour sécuriser durablement votre supply chain.",{"type":478,"format":479,"children":480},"list","unordered",[481],{"type":482,"children":483},"list-item",[484,486],{"bold":96,"text":485,"type":310},"La certitude par la preuve : ",{"text":487,"type":310},"Comment valider la maturité réelle de vos tiers au-delà du déclaratif.",{"type":478,"format":479,"children":489},[490],{"type":482,"children":491},[492,494],{"bold":96,"text":493,"type":310},"Priorisation stratégique :",{"text":495,"type":310}," Allouer vos ressources sur les tiers les plus critiques pour votre activité.",{"type":478,"format":479,"children":497},[498],{"type":482,"children":499},[500,502],{"bold":96,"text":501,"type":310},"Passage à l'échelle : ",{"text":503,"type":310},"Les clés pour évaluer l'ensemble de votre écosystème sans alourdir vos processus.",{"type":478,"format":479,"children":505},[506],{"type":482,"children":507},[508,510],{"bold":96,"text":509,"type":310},"Conformité simplifiée :",{"text":511,"type":310}," Anticiper sereinement les exigences de NIS2 et DORA.","recommandations-pour-piloter-un-tpcrm","2026-01-27T14:23:33.732Z","2026-03-03T16:40:20.925Z","2026-03-03T16:40:21.231Z","https://www1.cybervadis.com/l/418762/2026-02-11/ft3c9n",30,{"id":519,"description":520,"image":521},341,"Transformez votre gestion des risques cyber liés aux tiers grâce à une approche fondée sur la preuve et l'action. Ce guide vous donne les outils pour sécuriser efficacement votre écosystème.",{"id":522,"documentId":523,"name":524,"alternativeText":17,"caption":17,"width":525,"height":526,"formats":527,"hash":535,"ext":34,"mime":35,"size":536,"url":537,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":538,"updatedAt":538,"publishedAt":539},318,"mec36xom8yjia60ysfchjzru","Ebook TPCRM cover FR.png",1600,898,{"thumbnail":528},{"ext":34,"url":529,"hash":530,"mime":35,"name":531,"path":17,"size":532,"width":212,"height":533,"sizeInBytes":534},"https://assets.cybervadis.com/strapi/assets/thumbnail_Ebook_TPCRM_cover_FR_129153a946.png","thumbnail_Ebook_TPCRM_cover_FR_129153a946","thumbnail_Ebook TPCRM cover FR.png",39.64,138,39643,"Ebook_TPCRM_cover_FR_129153a946",187.44,"https://assets.cybervadis.com/strapi/assets/Ebook_TPCRM_cover_FR_129153a946.png","2026-02-11T14:52:35.134Z","2026-02-11T14:52:35.140Z",{"id":541,"metaDescription":542,"metaImage":17,"metaTags":543,"scripts":544},1346,"10 recommandations pour piloter un programme de gestion du risque cyber lié aux tiers (TPCRM)",[],[],[546,745,805,812],{"__component":547,"id":548,"headline":549,"title":17,"speed":550,"startDelay":551,"direction":552,"playOnInit":96,"backgroundColor":553,"logos":554,"link":17},"block.logos-slider",559," Ils pilotent leur risque tiers avec CyberVadis","slow",1000,"forward","gray",[555,572,589,612,629,650,671,689,707,724],{"id":556,"image":557,"link":569},4654,{"id":517,"documentId":558,"name":559,"alternativeText":17,"caption":17,"width":560,"height":561,"formats":562,"hash":563,"ext":21,"mime":22,"size":564,"url":565,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":566,"updatedAt":567,"publishedAt":568},"seoq146jon0ba8u2aqegac1l","sanofi-seeklogo.com.svg",1159,308,{},"sanofi_seeklogo_com_e51b897c18",4.76,"https://assets.cybervadis.com/strapi/assets/sanofi_seeklogo_com_e51b897c18.svg","2025-02-21T00:42:34.675Z","2025-02-25T14:22:25.851Z","2025-02-21T00:42:34.676Z",{"id":570,"label":17,"to":571,"external":96,"target":97,"icon":17},6888,"https://www.sanofi.com/",{"id":573,"image":574,"link":586},4655,{"id":575,"documentId":576,"name":577,"alternativeText":17,"caption":17,"width":204,"height":578,"formats":579,"hash":580,"ext":21,"mime":22,"size":581,"url":582,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":583,"updatedAt":584,"publishedAt":585},31,"bwreeo0vowt7qq7iq6bo0m0n","Kone-Logo.wine.svg",800,{},"Kone_Logo_wine_eef9c5a335",0.8,"https://assets.cybervadis.com/strapi/assets/Kone_Logo_wine_eef9c5a335.svg","2025-02-21T00:42:34.678Z","2025-02-25T14:22:40.761Z","2025-02-21T00:42:34.684Z",{"id":587,"label":17,"to":588,"external":96,"target":97,"icon":17},6889,"https://www.kone.com/en/",{"id":590,"image":591,"link":609},4656,{"id":592,"documentId":593,"name":594,"alternativeText":17,"caption":17,"width":595,"height":596,"formats":597,"hash":605,"ext":34,"mime":35,"size":606,"url":607,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":608,"updatedAt":608,"publishedAt":608},317,"ibyg1hy6uuwahopjl7q18pq3","Evotec.svg.png",1024,378,{"thumbnail":598},{"ext":34,"url":599,"hash":600,"mime":35,"name":601,"path":17,"size":602,"width":212,"height":603,"sizeInBytes":604},"https://assets.cybervadis.com/strapi/assets/thumbnail_Evotec_svg_d8f686d1a5.png","thumbnail_Evotec_svg_d8f686d1a5","thumbnail_Evotec.svg.png",8.48,90,8484,"Evotec_svg_d8f686d1a5",7.15,"https://assets.cybervadis.com/strapi/assets/Evotec_svg_d8f686d1a5.png","2026-01-27T14:36:01.400Z",{"id":610,"label":17,"to":611,"external":96,"target":97,"icon":17},6890,"https://www.evotec.com/",{"id":613,"image":614,"link":626},4657,{"id":615,"documentId":616,"name":617,"alternativeText":17,"caption":17,"width":618,"height":190,"formats":619,"hash":620,"ext":21,"mime":22,"size":621,"url":622,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":623,"updatedAt":624,"publishedAt":625},34,"e734ib10q6pxid79qjeo20i3","Schmitz_Cargobull_Logo.png",151,{},"Schmitz_Cargobull_Logo_bd8df86f0c",8.21,"https://assets.cybervadis.com/strapi/assets/Schmitz_Cargobull_Logo_bd8df86f0c.svg","2025-02-21T00:42:36.541Z","2025-03-05T15:02:36.383Z","2025-02-21T00:42:36.556Z",{"id":627,"label":17,"to":628,"external":96,"target":97,"icon":17},6891,"https://www.cargobull.com/en",{"id":630,"image":631,"link":647},4658,{"id":632,"documentId":633,"name":634,"alternativeText":17,"caption":17,"width":635,"height":635,"formats":636,"hash":643,"ext":34,"mime":35,"size":644,"url":645,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":646,"updatedAt":646,"publishedAt":646},210,"z86obdp0ngm14ybfiggu6p80","5.png",256,{"thumbnail":637},{"ext":34,"url":638,"hash":639,"mime":35,"name":640,"path":17,"size":641,"width":174,"height":174,"sizeInBytes":642},"https://assets.cybervadis.com/strapi/assets/thumbnail_5_65459f2cba.png","thumbnail_5_65459f2cba","thumbnail_5.png",6.39,6390,"5_65459f2cba",2.08,"https://assets.cybervadis.com/strapi/assets/5_65459f2cba.png","2025-03-04T15:22:39.190Z",{"id":648,"label":17,"to":649,"external":96,"target":97,"icon":17},6892,"https://www.axaglobalhealthcare.com/en/",{"id":651,"image":652,"link":668},4659,{"id":653,"documentId":654,"name":655,"alternativeText":17,"caption":17,"width":635,"height":635,"formats":656,"hash":663,"ext":34,"mime":35,"size":664,"url":665,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":666,"updatedAt":667,"publishedAt":666},211,"ny2l70nlq0c9svdhqan3fb6t","CNP",{"thumbnail":657},{"ext":34,"url":658,"hash":659,"mime":35,"name":660,"path":17,"size":661,"width":174,"height":174,"sizeInBytes":662},"https://assets.cybervadis.com/strapi/assets/thumbnail_CNP_abbf286d04.png","thumbnail_CNP_abbf286d04","thumbnail_CNP",10.34,10337,"CNP_abbf286d04",4.8,"https://assets.cybervadis.com/strapi/assets/CNP_abbf286d04.png","2025-03-04T15:27:39.516Z","2025-03-04T16:00:00.147Z",{"id":669,"label":17,"to":670,"external":96,"target":97,"icon":17},6893,"https://www.cnp.fr/en/the-cnp-assurances-group",{"id":672,"image":673,"link":686},4660,{"id":674,"documentId":675,"name":676,"alternativeText":17,"caption":17,"width":677,"height":678,"formats":679,"hash":680,"ext":21,"mime":22,"size":681,"url":682,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":683,"updatedAt":684,"publishedAt":685},22,"n6va294azhbs4d2vqvvuj3in","Eramet_logo_2018.svg",320,127,{},"Eramet_logo_2018_07e4849c53",8.53,"https://assets.cybervadis.com/strapi/assets/Eramet_logo_2018_07e4849c53.svg","2025-02-21T00:42:31.762Z","2025-02-25T14:27:08.610Z","2025-02-21T00:42:31.763Z",{"id":687,"label":17,"to":688,"external":96,"target":97,"icon":17},6894,"https://www.eramet.com/en/",{"id":690,"image":691,"link":704},4661,{"id":692,"documentId":693,"name":694,"alternativeText":17,"caption":17,"width":695,"height":696,"formats":697,"hash":698,"ext":21,"mime":22,"size":699,"url":700,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":701,"updatedAt":702,"publishedAt":703},17,"d3dqe26urj7nf5ro1oxsh6oq","Beiersdorf_Logo.svg",851,139,{},"Beiersdorf_Logo_fb8ad1d59e",11.03,"https://assets.cybervadis.com/strapi/assets/Beiersdorf_Logo_fb8ad1d59e.svg","2025-02-21T00:42:30.085Z","2025-02-25T14:27:24.416Z","2025-02-21T00:42:30.086Z",{"id":705,"label":17,"to":706,"external":96,"target":97,"icon":17},6895,"https://www.beiersdorf.com/",{"id":708,"image":709,"link":721},4662,{"id":710,"documentId":711,"name":712,"alternativeText":17,"caption":17,"width":713,"height":31,"formats":714,"hash":715,"ext":21,"mime":22,"size":716,"url":717,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":718,"updatedAt":719,"publishedAt":720},16,"b7pz0kerp2049kio2mkn4t6t","arkema-seeklogo.com.svg",238,{},"arkema_seeklogo_com_4e8105585f",9.82,"https://assets.cybervadis.com/strapi/assets/arkema_seeklogo_com_4e8105585f.svg","2025-02-21T00:42:30.076Z","2025-02-25T14:27:32.987Z","2025-02-21T00:42:30.083Z",{"id":722,"label":17,"to":723,"external":96,"target":97,"icon":17},6896,"https://www.arkema.com/global/en/",{"id":725,"image":726,"link":742},4663,{"id":727,"documentId":728,"name":729,"alternativeText":17,"caption":17,"width":635,"height":635,"formats":730,"hash":737,"ext":34,"mime":35,"size":738,"url":739,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":740,"updatedAt":741,"publishedAt":740},212,"ur3ilh0k4v1ct5v51dimra48","GRDF FINAL",{"thumbnail":731},{"ext":34,"url":732,"hash":733,"mime":35,"name":734,"path":17,"size":735,"width":174,"height":174,"sizeInBytes":736},"https://assets.cybervadis.com/strapi/assets/thumbnail_Design_sans_titre_4_083f68a499.png","thumbnail_Design_sans_titre_4_083f68a499","thumbnail_Design sans titre (4).png",11.04,11044,"Design_sans_titre_4_083f68a499",5.59,"https://assets.cybervadis.com/strapi/assets/Design_sans_titre_4_083f68a499.png","2025-03-04T15:58:44.484Z","2025-03-04T15:58:56.356Z",{"id":743,"label":17,"to":744,"external":96,"target":97,"icon":17},6897,"https://www.grdf.fr/grdf-en",{"__component":746,"id":747,"anchor":17,"badge":17,"title":17,"description":748,"features":804,"link":17},"block.text",1367,[749,754,758,779,783,789,795,801],{"type":472,"level":750,"children":751},2,[752],{"text":753,"type":310},"Les fondamentaux d'une gestion des risques tiers maîtrisée ",{"type":472,"level":473,"children":755},[756],{"text":757,"type":310},"Un programme TPCRM qui apporte de la valeur repose sur trois piliers essentiels que nous détaillons dans ce guide :",{"type":478,"format":759,"children":760},"ordered",[761,767,773],{"type":482,"children":762},[763,765],{"bold":96,"text":764,"type":310},"La Fiabilité :",{"text":766,"type":310}," Fonder vos décisions sur des preuves vérifiées par des experts, et non sur de simples déclarations. ",{"type":482,"children":768},[769,771],{"bold":96,"text":770,"type":310},"La Scalabilité : ",{"text":772,"type":310},"Adopter des processus mutualisés pour couvrir tous vos tiers, des plus critiques aux plus petits.",{"type":482,"children":774},[775,777],{"bold":96,"text":776,"type":310},"L’Impact : ",{"text":778,"type":310},"Transformer chaque évaluation en un plan de remédiation concret et suivi dans le temps.",{"type":472,"level":750,"children":780},[781],{"text":782,"type":310},"Une méthodologie conçue pour l'action Nous aidons les entreprises à passer d'une vision statique du risque à un pilotage dynamique.",{"type":478,"format":479,"children":784},[785],{"type":482,"children":786},[787],{"text":788,"type":310},"Expertise humaine : Vos preuves sont analysées par des analystes spécialisés (EVS).",{"type":478,"format":479,"children":790},[791],{"type":482,"children":792},[793],{"text":794,"type":310},"Collaboration tiers : Une interface pensée pour faciliter le travail de vos partenaires et maximiser leur engagement.",{"type":478,"format":479,"children":796},[797],{"type":482,"children":798},[799],{"text":800,"type":310},"Standard mondial : Un modèle d'évaluation reconnu, facilitant le partage et la comparaison.",{"type":306,"children":802},[803],{"text":318,"type":310},[],{"__component":806,"id":807,"anchor":17,"fit":808,"image":809},"block.image",191,"object-cover",{"id":522,"documentId":523,"name":524,"alternativeText":17,"caption":17,"width":525,"height":526,"formats":810,"hash":535,"ext":34,"mime":35,"size":536,"url":537,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":538,"updatedAt":538,"publishedAt":539},{"thumbnail":811},{"ext":34,"url":529,"hash":530,"mime":35,"name":531,"path":17,"size":532,"width":212,"height":533,"sizeInBytes":534},{"__component":813,"id":814,"size":815,"title":816,"description":817,"backgroundColor":818,"heading":819,"contactForm":133,"contactFormTitle":17,"form":17,"link":17,"button":820,"image":824},"block.cta",845,"md","Obtenir des conseils d'experts sur la gestion des risques cyber liés aux tiers (TPCRM).","Vous êtes confrontés à des difficultés concernant la gestion des risques cyber liés aux tiers ? À une visibilité limitée sur la sécurité de vos fournisseurs, à des pressions réglementaires ou à des coûts croissants pour atténuer les risques cyber des tiers ? Nos experts en gestion des risques cyber liés aux tiers (TPCRM) peuvent vous aider et vous guider.","blue","h2",{"id":821,"icon":17,"label":822,"form":823},1132,"Parler avec un expert","demo-enterprise",{"id":360,"documentId":825,"name":826,"alternativeText":17,"caption":17,"width":827,"height":828,"formats":829,"hash":837,"ext":34,"mime":35,"size":838,"url":839,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":840,"updatedAt":841,"publishedAt":842},"kmob33tg8jbcaw8n0l09wesp","E4.png",1008,616,{"thumbnail":830},{"ext":34,"url":831,"hash":832,"mime":35,"name":833,"path":17,"size":834,"width":212,"height":835,"sizeInBytes":836},"https://assets.cybervadis.com/strapi/assets/thumbnail_E4_3b6b026869.png","thumbnail_E4_3b6b026869","thumbnail_E4.png",85.55,150,85548,"E4_3b6b026869",250.18,"https://assets.cybervadis.com/strapi/assets/E4_3b6b026869.png","2025-02-24T17:09:26.539Z","2025-02-25T13:27:39.143Z","2025-02-24T17:09:26.540Z",1772606231205]