[{"data":1,"prerenderedAt":673},["ShallowReactive",2],{"globals":3,"replay-webinaire-panorama-cybervadis-cesin-latest-articles-en":465,"article-replay-webinaire-panorama-cybervadis-cesin":490},{"de":4,"en":194,"fr":348},{"id":5,"documentId":6,"titleSeparator":7,"title":8,"createdAt":9,"updatedAt":10,"publishedAt":11,"locale":12,"logo":13,"favicon":27,"seo":40,"navigation":48,"header":128,"footer":138,"videoPoster":161,"localizations":182},64,"nxlpiutyi22j347lzjvtcmt9","|","Cybervadis","2025-03-26T10:37:37.549Z","2026-01-21T15:16:59.044Z","2025-10-22T12:44:06.951Z","de",{"id":14,"documentId":15,"name":16,"alternativeText":17,"caption":17,"width":18,"height":19,"formats":17,"hash":20,"ext":21,"mime":22,"size":23,"url":24,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":26,"updatedAt":26,"publishedAt":26},276,"ns1dycmcy8eby82nudaixp17","logo.svg",null,303,57,"logo_9f7aa692ba",".svg","image/svg+xml",4.05,"https://assets.cybervadis.com/strapi/assets/logo_9f7aa692ba.svg","strapi-provider-upload-azure-storage","2025-04-10T15:46:43.920Z",{"id":28,"documentId":29,"name":30,"alternativeText":17,"caption":17,"width":31,"height":31,"formats":32,"hash":33,"ext":34,"mime":35,"size":36,"url":37,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":38,"updatedAt":39,"publishedAt":38},122,"ngfzwjibdex3knh7ftwqfvjx","favicon.png",32,{},"favicon_032a9b11b1",".png","image/png",0.5,"https://assets.cybervadis.com/strapi/assets/favicon_032a9b11b1.png","2025-02-25T09:03:35.564Z","2025-02-25T11:54:37.400Z",{"id":41,"metaDescription":17,"metaImage":17,"metaTags":42,"scripts":43},1191,[],[44,46],{"id":45,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},103,{"id":47,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},104,{"id":5,"links":49},[50,75,98,103],{"id":51,"label":52,"to":53,"external":17,"target":17,"icon":17,"children":54},287,"Third-Party Risiken reduzieren","/third-party-risiken-reduzieren",[55,59,63,67,71],{"id":56,"label":57,"to":58,"external":17,"target":17,"icon":17},6139,"Automatisierte Risikoanalysen","/third-party-risiken-reduzieren/automatisierte-risikoanalysen",{"id":60,"label":61,"to":62,"external":17,"target":17,"icon":17},6140,"Evidenzbasierte Risikobewertung","/third-party-risiken-reduzieren/evidenzbasierte-risikobewertung",{"id":64,"label":65,"to":66,"external":17,"target":17,"icon":17},6141,"Gemeinsame Risikoreduzierung","/third-party-risiken-reduzieren/gemeinsame-risikoreduzierung",{"id":68,"label":69,"to":70,"external":17,"target":17,"icon":17},6142,"Framework-basierte Methodik","/third-party-risiken-reduzieren/framework-basierte-methodik",{"id":72,"label":73,"to":74,"external":17,"target":17,"icon":17},6143,"Preise","/third-party-risiken-reduzieren/preise",{"id":76,"label":77,"to":78,"external":17,"target":17,"icon":17,"children":79},288,"Jetzt bewertet werden","/jetzt-bewertet-werden",[80,84,88,92],{"id":81,"label":82,"to":83,"external":17,"target":17,"icon":17},6144,"So funktioniert es","/jetzt-bewertet-werden/so-funktioniert-es",{"id":85,"label":86,"to":87,"external":17,"target":17,"icon":17},6145,"Individuelle Bewertungen","/jetzt-bewertet-werden/individuelle-bewertungen",{"id":89,"label":90,"to":91,"external":17,"target":17,"icon":17},6146,"CyberVadis Badges","/jetzt-bewertet-werden/cybervadis-badges",{"id":93,"label":94,"to":95,"external":96,"target":97,"icon":17},6147,"Help center (EN)","https://help.cybervadis.com/en/",true,"_blank",{"id":99,"label":100,"to":101,"external":17,"target":17,"icon":17,"children":102},286,"Ressourcen","/ressourcen",[],{"id":104,"label":105,"to":106,"external":17,"target":17,"icon":17,"children":107},289,"Über uns","/uber-uns",[108,112,116,120,124],{"id":109,"label":110,"to":111,"external":17,"target":17,"icon":17},6148,"Warum CyberVadis","/warum-cybervadis",{"id":113,"label":114,"to":115,"external":17,"target":17,"icon":17},6149,"Trust Center (EN)","/uber-uns/trust-center",{"id":117,"label":118,"to":119,"external":96,"target":97,"icon":17},6150,"Careers (EN)","https://careers.cybervadis.com/",{"id":121,"label":122,"to":123,"external":17,"target":17,"icon":17},6151,"Aktuelles","/de/aktuelles",{"id":125,"label":126,"to":127,"external":17,"target":17,"icon":17},6152,"Kontakt","/uber-uns/kontakt",{"id":5,"info":17,"login":129,"button":134},{"id":130,"label":131,"to":132,"external":133,"target":17,"icon":17},6153,"Lieferanten bewerten","/de/third-party-risiken-reduzieren",false,{"id":135,"icon":17,"label":136,"form":137},1080,"Demo buchen","demo",{"id":5,"newsletterTitle":139,"copyright":140,"legalLinks":141,"socialLinks":150},"Newsletter abonnieren","Urheberrecht © 2025. Alle Rechte vorbehalten.",[142,146],{"id":143,"label":144,"to":145,"external":17,"target":17,"icon":17},6154,"Rechtliche Hinweise (EN)","/de/legal",{"id":147,"label":148,"to":149,"external":17,"target":17,"icon":17},6155,"Datenschutzerklärung (EN)","/de/legal-notice",[151,156],{"id":152,"label":153,"to":154,"external":96,"target":97,"icon":155},6156,"X","https://x.com/cybervadis","fa6-brands:x-twitter",{"id":157,"label":158,"to":159,"external":96,"target":97,"icon":160},6157,"LinkedIn","https://www.linkedin.com/company/cybervadis/","fa6-brands:linkedin",{"id":162,"documentId":163,"name":164,"alternativeText":17,"caption":17,"width":165,"height":166,"formats":167,"hash":176,"ext":34,"mime":35,"size":177,"url":178,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":179,"updatedAt":180,"publishedAt":181},242,"vrv61ssc0oc744hr7dgkqznu","Video Preview",1028,690,{"thumbnail":168},{"ext":34,"url":169,"hash":170,"mime":35,"name":171,"path":17,"size":172,"width":173,"height":174,"sizeInBytes":175},"https://assets.cybervadis.com/strapi/assets/thumbnail_Design_sans_titre_6_f21ca94567.png","thumbnail_Design_sans_titre_6_f21ca94567","thumbnail_Design sans titre (6).png",14.9,232,156,14897,"Design_sans_titre_6_f21ca94567",18.5,"https://assets.cybervadis.com/strapi/assets/Design_sans_titre_6_f21ca94567.png","2025-03-12T09:54:21.008Z","2025-03-12T09:54:35.444Z","2025-03-12T09:54:21.009Z",[183,189],{"id":184,"documentId":6,"titleSeparator":7,"title":8,"createdAt":185,"updatedAt":186,"publishedAt":187,"locale":188},66,"2025-02-19T11:28:33.351Z","2026-01-21T15:16:58.561Z","2026-01-21T15:16:58.826Z","en",{"id":190,"documentId":6,"titleSeparator":7,"title":8,"createdAt":191,"updatedAt":10,"publishedAt":192,"locale":193},63,"2025-06-17T20:29:42.853Z","2025-10-22T12:40:51.539Z","fr",{"id":184,"documentId":6,"titleSeparator":7,"title":8,"createdAt":185,"updatedAt":186,"publishedAt":187,"locale":188,"logo":195,"favicon":196,"seo":198,"navigation":227,"header":303,"footer":325,"videoPoster":342,"localizations":345},{"id":14,"documentId":15,"name":16,"alternativeText":17,"caption":17,"width":18,"height":19,"formats":17,"hash":20,"ext":21,"mime":22,"size":23,"url":24,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":26,"updatedAt":26,"publishedAt":26},{"id":28,"documentId":29,"name":30,"alternativeText":17,"caption":17,"width":31,"height":31,"formats":197,"hash":33,"ext":34,"mime":35,"size":36,"url":37,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":38,"updatedAt":39,"publishedAt":38},{},{"id":199,"metaDescription":17,"metaImage":200,"metaTags":219,"scripts":220},1281,{"id":201,"documentId":202,"name":203,"alternativeText":17,"caption":17,"width":204,"height":205,"formats":206,"hash":215,"ext":34,"mime":35,"size":216,"url":217,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":218,"updatedAt":218,"publishedAt":218},284,"ntditjqus6ubg59uwiew5zqu","meta image by default.png",1200,630,{"thumbnail":207},{"ext":34,"url":208,"hash":209,"mime":35,"name":210,"path":17,"size":211,"width":212,"height":213,"sizeInBytes":214},"https://assets.cybervadis.com/strapi/assets/thumbnail_meta_image_by_default_5c51d0a0d5.png","thumbnail_meta_image_by_default_5c51d0a0d5","thumbnail_meta image by default.png",64.36,245,129,64355,"meta_image_by_default_5c51d0a0d5",210.02,"https://assets.cybervadis.com/strapi/assets/meta_image_by_default_5c51d0a0d5.png","2025-04-17T14:53:22.089Z",[],[221,223,225],{"id":222,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},108,{"id":224,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},109,{"id":226,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},110,{"id":184,"links":228},[229,254,274,279],{"id":230,"label":231,"to":232,"external":17,"target":17,"icon":17,"children":233},295,"Mitigate third-party risks","/mitigate-third-party-risks",[234,238,242,246,250],{"id":235,"label":236,"to":237,"external":17,"target":17,"icon":17},6289,"Automated Risk Insights","/mitigate-third-party-risks/automated-risk-insights",{"id":239,"label":240,"to":241,"external":17,"target":17,"icon":17},6290,"Evidence-based risk assessment","/mitigate-third-party-risks/evidence-based-risk-assessment",{"id":243,"label":244,"to":245,"external":17,"target":17,"icon":17},6291,"Collaborative Risk Reduction","/mitigate-third-party-risks/risk-reduction",{"id":247,"label":248,"to":249,"external":17,"target":17,"icon":17},6292,"Framework-based methodology","/mitigate-third-party-risks/framework-based-methodology",{"id":251,"label":252,"to":253,"external":17,"target":17,"icon":17},6293,"Pricing","/mitigate-third-party-risks/pricing",{"id":255,"label":256,"to":257,"external":17,"target":17,"icon":17,"children":258},296,"Get assessed ","/get-assessed",[259,263,267,271],{"id":260,"label":261,"to":262,"external":17,"target":17,"icon":17},6294,"How it works","/get-assessed/how-it-works",{"id":264,"label":265,"to":266,"external":17,"target":17,"icon":17},6295,"Standardized Assessments","/get-assessed/tailored-and-standardized-assessment",{"id":268,"label":269,"to":270,"external":17,"target":17,"icon":17},6296,"CyberVadis Medals","/get-assessed/medals",{"id":272,"label":273,"to":95,"external":96,"target":97,"icon":17},6297,"Help center",{"id":275,"label":276,"to":277,"external":17,"target":17,"icon":17,"children":278},294,"Resources","/resources",[],{"id":280,"label":281,"to":282,"external":17,"target":17,"icon":17,"children":283},297,"About us ","/about-us",[284,288,292,295,299],{"id":285,"label":286,"to":287,"external":17,"target":17,"icon":17},6298,"Why CyberVadis","/why-cybervadis",{"id":289,"label":290,"to":291,"external":17,"target":17,"icon":17},6299,"Trust center","/about-us/trust-center",{"id":293,"label":294,"to":119,"external":96,"target":97,"icon":17},6300,"Careers",{"id":296,"label":297,"to":298,"external":17,"target":17,"icon":17},6301,"In the news","/in-the-news",{"id":300,"label":301,"to":302,"external":17,"target":17,"icon":17},6302,"Contact","/about-us/contact",{"id":184,"info":304,"login":319,"button":322},[305],{"type":306,"children":307},"paragraph",[308,311,317],{"text":309,"type":310},"Already a CyberVadis client ? ","text",{"url":312,"type":313,"children":314},"https://app.cybervadis.com/","link",[315],{"text":316,"type":310},"You can access your account here",{"text":318,"type":310},"",{"id":320,"label":321,"to":232,"external":133,"target":17,"icon":17},6303,"Assess Vendors",{"id":323,"icon":17,"label":324,"form":137},1109,"Book a demo",{"id":184,"newsletterTitle":326,"copyright":327,"legalLinks":328,"socialLinks":337},"Subscribe to newsletter","Copyright © 2025. All rights reserved.",[329,333],{"id":330,"label":331,"to":332,"external":17,"target":17,"icon":17},6304,"Legal mentions","/legal",{"id":334,"label":335,"to":336,"external":17,"target":17,"icon":17},6305,"Data privacy","/legal-notice",[338,340],{"id":339,"label":153,"to":154,"external":96,"target":97,"icon":155},6306,{"id":341,"label":158,"to":159,"external":96,"target":97,"icon":160},6307,{"id":162,"documentId":163,"name":164,"alternativeText":17,"caption":17,"width":165,"height":166,"formats":343,"hash":176,"ext":34,"mime":35,"size":177,"url":178,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":179,"updatedAt":180,"publishedAt":181},{"thumbnail":344},{"ext":34,"url":169,"hash":170,"mime":35,"name":171,"path":17,"size":172,"width":173,"height":174,"sizeInBytes":175},[346,347],{"id":5,"documentId":6,"titleSeparator":7,"title":8,"createdAt":9,"updatedAt":10,"publishedAt":11,"locale":12},{"id":190,"documentId":6,"titleSeparator":7,"title":8,"createdAt":191,"updatedAt":10,"publishedAt":192,"locale":193},{"id":190,"documentId":6,"titleSeparator":7,"title":8,"createdAt":191,"updatedAt":10,"publishedAt":192,"locale":193,"logo":349,"favicon":350,"seo":352,"navigation":363,"header":435,"footer":442,"videoPoster":459,"localizations":462},{"id":14,"documentId":15,"name":16,"alternativeText":17,"caption":17,"width":18,"height":19,"formats":17,"hash":20,"ext":21,"mime":22,"size":23,"url":24,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":26,"updatedAt":26,"publishedAt":26},{"id":28,"documentId":29,"name":30,"alternativeText":17,"caption":17,"width":31,"height":31,"formats":351,"hash":33,"ext":34,"mime":35,"size":36,"url":37,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":38,"updatedAt":39,"publishedAt":38},{},{"id":353,"metaDescription":17,"metaImage":354,"metaTags":357,"scripts":358},1190,{"id":201,"documentId":202,"name":203,"alternativeText":17,"caption":17,"width":204,"height":205,"formats":355,"hash":215,"ext":34,"mime":35,"size":216,"url":217,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":218,"updatedAt":218,"publishedAt":218},{"thumbnail":356},{"ext":34,"url":208,"hash":209,"mime":35,"name":210,"path":17,"size":211,"width":212,"height":213,"sizeInBytes":214},[],[359,361],{"id":360,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},101,{"id":362,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},102,{"id":190,"links":364},[365,390,409,414],{"id":366,"label":367,"to":368,"external":17,"target":17,"icon":17,"children":369},283,"Atténuer les risques liés aux tiers","/attenuer-les-risques-lies-aux-tiers",[370,374,378,382,386],{"id":371,"label":372,"to":373,"external":17,"target":17,"icon":17},6120,"Analyse automatisée des risques","/attenuer-les-risques-lies-aux-tiers/analyse-automatisee-des-risques",{"id":375,"label":376,"to":377,"external":17,"target":17,"icon":17},6121,"Évaluation basée sur la revue de preuves","/attenuer-les-risques-lies-aux-tiers/evaluation-basee-sur-la-revue-de-preuves",{"id":379,"label":380,"to":381,"external":17,"target":17,"icon":17},6122,"Réduction des riques","/attenuer-les-risques-lies-aux-tiers/reduction-des-risques",{"id":383,"label":384,"to":385,"external":17,"target":17,"icon":17},6123,"Méthodologie basée sur un cadre de références","/attenuer-les-risques-lies-aux-tiers/methodologie-basee-sur-un-cadre-de-references",{"id":387,"label":388,"to":389,"external":17,"target":17,"icon":17},6124,"Tarification","/attenuer-les-risques-lies-aux-tiers/tarification",{"id":201,"label":391,"to":392,"external":17,"target":17,"icon":17,"children":393},"Se faire évaluer","/se-faire-evaluer",[394,398,402,406],{"id":395,"label":396,"to":397,"external":17,"target":17,"icon":17},6125,"Comment ça marche","/se-faire-evaluer/comment-ca-marche",{"id":399,"label":400,"to":401,"external":17,"target":17,"icon":17},6126,"Évaluation standardisée","/se-faire-evaluer/evaluation-adaptee-et-standardisee",{"id":403,"label":404,"to":405,"external":17,"target":17,"icon":17},6127,"Les médailles CyberVadis","/se-faire-evaluer/medailles",{"id":407,"label":408,"to":95,"external":96,"target":97,"icon":17},6128,"Help Center (EN)",{"id":410,"label":411,"to":412,"external":17,"target":17,"icon":17,"children":413},282,"Ressources","/ressources",[],{"id":415,"label":416,"to":417,"external":17,"target":17,"icon":17,"children":418},285,"À propos","/a-propos",[419,423,426,428,432],{"id":420,"label":421,"to":422,"external":17,"target":17,"icon":17},6129,"Pourquoi choisir CyberVadis","/pourquoi-choisir-cybervadis",{"id":424,"label":114,"to":425,"external":17,"target":17,"icon":17},6130,"/a-propos/trust-center",{"id":427,"label":118,"to":119,"external":96,"target":97,"icon":17},6131,{"id":429,"label":430,"to":431,"external":17,"target":17,"icon":17},6132,"Actualités","/actualites",{"id":433,"label":301,"to":434,"external":17,"target":17,"icon":17},6133,"/a-propos/contact",{"id":190,"info":17,"login":436,"button":439},{"id":437,"label":438,"to":368,"external":133,"target":17,"icon":17},6134,"Évaluer ses tiers",{"id":440,"icon":17,"label":441,"form":137},1079,"Réserver une démonstration",{"id":190,"newsletterTitle":443,"copyright":444,"legalLinks":445,"socialLinks":454},"S'inscrire à la newsletter","Copyright © 2025. Tous droits réservés. ",[446,450],{"id":447,"label":448,"to":449,"external":17,"target":17,"icon":17},6135,"Mentions légales (EN)","/fr/legal",{"id":451,"label":452,"to":453,"external":17,"target":17,"icon":17},6136,"Confidentialité des données","/fr/legal-notice",[455,457],{"id":456,"label":153,"to":154,"external":96,"target":97,"icon":155},6137,{"id":458,"label":158,"to":159,"external":96,"target":97,"icon":160},6138,{"id":162,"documentId":163,"name":164,"alternativeText":17,"caption":17,"width":165,"height":166,"formats":460,"hash":176,"ext":34,"mime":35,"size":177,"url":178,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":179,"updatedAt":180,"publishedAt":181},{"thumbnail":461},{"ext":34,"url":169,"hash":170,"mime":35,"name":171,"path":17,"size":172,"width":173,"height":174,"sizeInBytes":175},[463,464],{"id":5,"documentId":6,"titleSeparator":7,"title":8,"createdAt":9,"updatedAt":10,"publishedAt":11,"locale":12},{"id":184,"documentId":6,"titleSeparator":7,"title":8,"createdAt":185,"updatedAt":186,"publishedAt":187,"locale":188},[466,471,476,481,485],{"id":467,"documentId":468,"title":469,"slug":470},92,"i7g1fcl68rkfq3tmeg2lqb0w","CyberVadis achieves ISO 27001 certification","cybervadis-achieves-iso27001certification",{"id":472,"documentId":473,"title":474,"slug":475},70,"ec2tyjm5615mnv64a17mrh67","DORA and Third-Parties Cyber Risks Management : A Structured Approach for Businesses ","dora-and-third-parties-cyber-risks-management",{"id":477,"documentId":478,"title":479,"slug":480},53,"m2rrd4lon01c6p2po0le8qmd","Secure 2024","article-secure-2024",{"id":362,"documentId":482,"title":483,"slug":484},"nbbyc7pkeeqhiz917sv5aik8","5 Key Steps to Mitigate Cyber Risks in Your Supply Chain","5-key-steps-to-mitigate-cyber-risks-in-your-supply-chain",{"id":486,"documentId":487,"title":488,"slug":489},100,"bb9sjmiykz7ulcu3vjzt3zck","Ensure NIS2 compliance for third-party management","ensure-nis-2-compliance-for-third-party-management",{"id":491,"documentId":492,"language":193,"title":493,"slug":494,"newsletter":96,"createdAt":495,"updatedAt":496,"publishedAt":497,"date":498,"description":17,"seo":499,"blockTableOfContents":17,"blocks":504,"relatedArticles":672},99,"nh1w8l2l5wdwxk16gf7s29s1","Replay webinaire Panorama CyberVadis CESIN: Quelle maturité par rapport aux attendus NIS 2","replay-webinaire-panorama-cybervadis-cesin","2025-12-10T09:36:31.342Z","2025-12-11T09:44:24.469Z","2025-12-11T09:44:24.669Z","2025-12-09",{"id":500,"metaDescription":501,"metaImage":17,"metaTags":502,"scripts":503},1255,"Replay Webinaire Panorama Cybervadis & CESIN : Quelle maturité par rapport aux attendus NIS 2",[],[],[505,574,599],{"__component":506,"id":507,"anchor":17,"badge":17,"title":17,"description":508,"features":573,"link":17},"block.text",1157,[509,515,527,531,535,538,544,548,559],{"type":510,"level":511,"children":512},"heading",3,[513],{"text":514,"type":310},"A propos de ce webinaire",{"type":306,"children":516},[517,519,521,523,525],{"text":518,"type":310},"Découvrez les résultats inédits de l'",{"bold":96,"text":520,"type":310},"étude conjointe CyberVadis & CESIN",{"text":522,"type":310}," et évaluez concrètement la maturité cyber de votre organisation face aux exigences de la directive NIS2. Visionnez le ",{"bold":96,"text":524,"type":310},"replay de notre webinaire",{"text":526,"type":310}," du 9 décembre. ",{"type":306,"children":528},[529],{"text":530,"type":310},"La nouvelle directive NIS 2 impose une réévaluation complète des stratégies de sécurité. Pourtant, notre étude exclusive, menée auprès de plus de 1 000 entreprises françaises, met en lumière un écart critique entre les politiques de sécurité définies et leur application effective sur le terrain.",{"type":306,"children":532},[533],{"bold":96,"text":534,"type":310},"Votre stratégie cyber est-elle réellement alignée avec cette réalité ?",{"type":306,"children":536},[537],{"text":318,"type":310},{"type":306,"children":539},[540,542],{"text":541,"type":310},"🎤 ",{"bold":96,"text":543,"type":310},"Nos Experts",{"type":306,"children":545},[546],{"text":547,"type":310},"Rejoignez un panel d'experts reconnus pour un décryptage et des échanges essentiels :",{"type":549,"format":550,"children":551},"list","unordered",[552],{"type":553,"children":554},"list-item",[555,557],{"bold":96,"text":556,"type":310},"Alain Bouillé",{"text":558,"type":310}," - Délégué Général, CESIN",{"type":549,"format":550,"children":560},[561,567],{"type":553,"children":562},[563,565],{"bold":96,"text":564,"type":310},"Frank Van Caenegem",{"text":566,"type":310}," - CISO EMEA, Schneider Electric et Vice-Président, CESIN",{"type":553,"children":568},[569,571],{"bold":96,"text":570,"type":310},"Thibault Lapédagne",{"text":572,"type":310}," - VP Research, CyberVadis",[],{"__component":575,"id":576,"headline":17,"title":17,"description":17,"video":577,"link":17,"button":17,"poster":580},"block.video",176,{"id":576,"videoId":578,"hash":579},"1144906226","0a5f69a4d5",{"id":581,"documentId":582,"name":583,"alternativeText":17,"caption":17,"width":584,"height":585,"formats":586,"hash":594,"ext":34,"mime":35,"size":595,"url":596,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":597,"updatedAt":597,"publishedAt":598},313,"oro5u57piq9xuou07f0qi9pc","vignette replay webinar panorama.png",2816,1580,{"thumbnail":587},{"ext":34,"url":588,"hash":589,"mime":35,"name":590,"path":17,"size":591,"width":212,"height":592,"sizeInBytes":593},"https://assets.cybervadis.com/strapi/assets/thumbnail_vignette_replay_webinar_panorama_57e42fdbfe.png","thumbnail_vignette_replay_webinar_panorama_57e42fdbfe","thumbnail_vignette replay webinar panorama.png",61.09,137,61086,"vignette_replay_webinar_panorama_57e42fdbfe",1020.07,"https://assets.cybervadis.com/strapi/assets/vignette_replay_webinar_panorama_57e42fdbfe.png","2025-12-10T11:34:44.619Z","2025-12-10T11:34:44.620Z",{"__component":506,"id":600,"anchor":17,"badge":17,"title":17,"description":601,"features":671,"link":17},1158,[602,606,614,622,630,638,642,650,654,658,662],{"type":510,"level":511,"children":603},[604],{"text":605,"type":310},"Ce que vous allez apprendre",{"type":549,"format":550,"children":607},[608],{"type":553,"children":609},[610,612],{"bold":96,"text":611,"type":310},"Les tendances générales",{"text":613,"type":310},"\nQuels éléments influencent le plus la maturité cyber des entreprises ? La taille ? NIS 2 ?",{"type":549,"format":550,"children":615},[616],{"type":553,"children":617},[618,620],{"bold":96,"text":619,"type":310},"Le défi de l’implémentation\n",{"text":621,"type":310},"Pourquoi y a-t-il un écart si important entre la formalisation des politiques et leur mise en œuvre effective ?",{"type":549,"format":550,"children":623},[624],{"type":553,"children":625},[626,628],{"bold":96,"text":627,"type":310},"Focus sur objectifs\n",{"text":629,"type":310},"Notamment sur les faiblesses des entreprises (accès distants et appareils mobiles par exemple)",{"type":549,"format":550,"children":631},[632],{"type":553,"children":633},[634,636],{"bold":96,"text":635,"type":310},"Recommandations\n",{"text":637,"type":310},"3 axes d’actions pour évaluer sa maturité cyber et s’aligner efficacement aux exigences NIS 2",{"type":510,"level":511,"children":639},[640],{"text":641,"type":310},"A propos du CESIN",{"type":306,"children":643},[644,646,648],{"text":645,"type":310},"Le ",{"bold":96,"text":647,"type":310},"CESIN (Club des Experts de la Sécurité de l'Information et du Numérique)",{"text":649,"type":310}," est une association loi 1901, créée en juillet 2012, avec des objectifs de professionnalisation et de promotion de la cybersécurité.",{"type":306,"children":651},[652],{"text":653,"type":310}," Lieu d'échange, de partage de connaissances et d'expériences, le CESIN permet la coopération entre experts de la sécurité de l'information et du numérique, et entre ces experts et les pouvoirs publics. Il participe à des démarches nationales et est force de proposition sur des textes réglementaires, guides et autres référentiels.",{"type":306,"children":655},[656],{"text":657,"type":310},"Le CESIN compte parmi ses membres plusieurs organismes et institutions, comme l’Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI), Gendarmerie Nationale, Commandement Cyber, Gendarmerie, Commission Nationale de l’Informatique et des Libertés (CNIL), Gimelec, Préfecture de Police, Police Judiciaire, Cybermalveillance.gouv.fr, Ministère de la Justice, Ministère de l’Intérieur.",{"type":306,"children":659},[660],{"text":661,"type":310},"Le CESIN compte plus de 1 200 membres issus de tous secteurs d’activité, industries, Ministères et entreprises, dont CAC40 et SBF120.",{"type":306,"children":663},[664,665,670],{"text":318,"type":310},{"url":666,"type":313,"children":667},"https://cesin.fr/",[668],{"text":669,"type":310},"www.cesin.fr",{"text":318,"type":310},[],[],1777355796553]