{"id":523,"date":"2023-12-06T14:14:31","date_gmt":"2023-12-06T13:14:31","guid":{"rendered":"https:\/\/www.cybi.fr\/?p=523"},"modified":"2023-12-06T14:40:01","modified_gmt":"2023-12-06T13:40:01","slug":"le-reglement-dora","status":"publish","type":"post","link":"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/","title":{"rendered":"Le r\u00e8glement DORA"},"content":{"rendered":"\n<p><strong>Le r\u00e8glement DORA<\/strong> (Digital Operational Resilience Act) vise \u00e0 renforcer la r\u00e9silience op\u00e9rationnelle du secteur financier europ\u00e9en face aux risques num\u00e9riques. Adopt\u00e9 en octobre 2022 par les col\u00e9gislateurs europ\u00e9ens, il <strong>entrera en vigueur \u00e0 partir de 2024<\/strong> et impactera aussi bien les acteurs financiers que les prestataires de services num\u00e9riques qui leur sont critiques.<\/p>\n\n\n\n<p>Selon un rapport de la Banque Centrale Europ\u00e9enne (BCE) publi\u00e9 en mai 2023, le secteur financier dans son ensemble devra investir environ 393 milliards d&rsquo;euros au cours des 5 prochaines ann\u00e9es pour se mettre en conformit\u00e9 avec <strong>DORA<\/strong>. Et ce sur un march\u00e9 europ\u00e9en de la cybers\u00e9curit\u00e9 qui p\u00e8sera 43 milliards d&rsquo;euros en 2023 selon IDC.<\/p>\n\n\n\n<p>Les autorit\u00e9s estiment que ces <strong>investissements<\/strong>, bien que massifs, seront largement inf\u00e9rieurs aux <strong>\u00e9conomies<\/strong> r\u00e9alis\u00e9es gr\u00e2ce \u00e0 une meilleure r\u00e9silience num\u00e9rique du secteur. Rappelons qu&rsquo;en 2021, le co\u00fbt mondial des <strong>cyberattaques<\/strong> a \u00e9t\u00e9 estim\u00e9 \u00e0 6 000 milliards de dollars par Cybersecurity Ventures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les nouvelles obligations cl\u00e9s introduites par DORA<\/h2>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Cartographier les actifs et les d\u00e9pendances num\u00e9riques<\/strong> ainsi que les risques associ\u00e9s<\/li><li><strong>Signaler les incidents graves <\/strong>aux autorit\u00e9s sous 72h maximum<\/li><li><strong>Tester les plans de continuit\u00e9 d&rsquo;activit\u00e9 (PCA)<\/strong><\/li><li><strong>Renforcer les exigences pour les prestataires de services num\u00e9riques<\/strong> externalis\u00e9s qui sont essentiels au fonctionnement des acteurs financiers<\/li><li>Mener r\u00e9guli\u00e8rement des <strong>\u00e9valuations des risques de cybers\u00e9curit\u00e9<\/strong> et de la r\u00e9silience op\u00e9rationnelle des technologies par des tiers ind\u00e9pendants.<\/li><\/ol>\n\n\n\n<p>D&rsquo;apr\u00e8s une \u00e9tude de Deloitte aupr\u00e8s de 100 institutions financi\u00e8res en Europe r\u00e9alis\u00e9e en janvier 2023, 64% des r\u00e9pondants consid\u00e8rent le mapping de leurs \u00e9cosyst\u00e8mes num\u00e9riques comme le plus grand d\u00e9fi pos\u00e9 par DORA. Viennent ensuite la mise \u00e0 niveau des PCA pour 51% d&rsquo;entre eux, ainsi que le renforcement des contr\u00f4les de cybers\u00e9curit\u00e9 pour 46% des sond\u00e9s.<\/p>\n\n\n\n<p>Pour relever ces d\u00e9fis, les RSSI et DSI du secteur financier devront non seulement investir massivement dans de <strong>nouvelles solutions technologiques<\/strong>, mais \u00e9galement recruter des profils cybers\u00e9curit\u00e9 encore plus qualifi\u00e9s. Or la p\u00e9nurie de talents dans ce domaine est d\u00e9j\u00e0 \u00e9valu\u00e9e \u00e0 3,4 millions de postes vacants au niveau mondial sur la p\u00e9riode 2022-2031 par Cybersecurity Ventures.<\/p>\n\n\n\n<p>Face \u00e0 ces enjeux, les \u00e9diteurs de solutions de cybers\u00e9curit\u00e9 comme <strong>Cybi <\/strong>ont un r\u00f4le central \u00e0 jouer pour accompagner les institutions financi\u00e8res dans leur mise en conformit\u00e9 DORA. Notre plateforme <strong>SCUBA<\/strong> est parfaitement positionn\u00e9e pour vous assister sur des probl\u00e9matiques cl\u00e9s : <strong>cartographie des risques IT\/OT<\/strong>, <strong>plans de rem\u00e9diation<\/strong>, <strong>simulations de crise cyber<\/strong>, <strong>\u00e9valuation des vuln\u00e9rabilit\u00e9s<\/strong>.<\/p>\n\n\n\n<p>Bien que complexe et co\u00fbteuse, cette <strong>transformation num\u00e9rique<\/strong> du secteur financier \u00e9tait devenue indispensable face \u00e0 la recrudescence des <strong>cybermenaces<\/strong> et \u00e0 notre quotidien toujours plus digitalis\u00e9. La mise en \u0153uvre de DORA permettra de faire franchir un palier suppl\u00e9mentaire \u00e0 la r\u00e9silience de ce secteur vital pour l\u2019\u00e9conomie europ\u00e9enne.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le r\u00e8glement DORA (Digital Operational Resilience Act) vise \u00e0 renforcer la r\u00e9silience op\u00e9rationnelle du secteur financier europ\u00e9en face aux risques num\u00e9riques. Adopt\u00e9 en octobre 2022 par les col\u00e9gislateurs europ\u00e9ens, il entrera en vigueur \u00e0 partir de 2024 et impactera aussi bien les acteurs financiers que les prestataires de services num\u00e9riques qui leur sont critiques. Selon [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[35],"tags":[],"class_list":["post-523","post","type-post","status-publish","format-standard","hentry","category-technologies-et-cybersecurite"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le r\u00e8glement DORA - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique<\/title>\n<meta name=\"description\" content=\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le r\u00e8glement DORA - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\" \/>\n<meta property=\"og:description\" content=\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-06T13:14:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-06T13:40:01+00:00\" \/>\n<meta name=\"author\" content=\"Fabian OSMOND\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CYBI_CYBER\" \/>\n<meta name=\"twitter:site\" content=\"@CYBI_CYBER\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fabian OSMOND\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/12\\\/06\\\/le-reglement-dora\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/12\\\/06\\\/le-reglement-dora\\\/\"},\"author\":{\"name\":\"Fabian OSMOND\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/person\\\/3060713e028a83bbb248dba4763b3947\"},\"headline\":\"Le r\u00e8glement DORA\",\"datePublished\":\"2023-12-06T13:14:31+00:00\",\"dateModified\":\"2023-12-06T13:40:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/12\\\/06\\\/le-reglement-dora\\\/\"},\"wordCount\":493,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#organization\"},\"articleSection\":[\"Technologies et Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/12\\\/06\\\/le-reglement-dora\\\/\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/12\\\/06\\\/le-reglement-dora\\\/\",\"name\":\"Le r\u00e8glement DORA - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#website\"},\"datePublished\":\"2023-12-06T13:14:31+00:00\",\"dateModified\":\"2023-12-06T13:40:01+00:00\",\"description\":\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/12\\\/06\\\/le-reglement-dora\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/12\\\/06\\\/le-reglement-dora\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/12\\\/06\\\/le-reglement-dora\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.cybi.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le r\u00e8glement DORA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/\",\"name\":\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\",\"description\":\"Cybi - Cybersecurity Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cybi.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#organization\",\"name\":\"Cybi\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Standard-2.png\",\"contentUrl\":\"https:\\\/\\\/www.cybi.fr\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Standard-2.png\",\"width\":2852,\"height\":1075,\"caption\":\"Cybi\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CYBI_CYBER\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybi\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/person\\\/3060713e028a83bbb248dba4763b3947\",\"name\":\"Fabian OSMOND\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g\",\"caption\":\"Fabian OSMOND\"},\"url\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/author\\\/fosmond\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le r\u00e8glement DORA - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","description":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/","og_locale":"fr_FR","og_type":"article","og_title":"Le r\u00e8glement DORA - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","og_description":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion","og_url":"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/","og_site_name":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","article_published_time":"2023-12-06T13:14:31+00:00","article_modified_time":"2023-12-06T13:40:01+00:00","author":"Fabian OSMOND","twitter_card":"summary_large_image","twitter_creator":"@CYBI_CYBER","twitter_site":"@CYBI_CYBER","twitter_misc":{"\u00c9crit par":"Fabian OSMOND","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/#article","isPartOf":{"@id":"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/"},"author":{"name":"Fabian OSMOND","@id":"https:\/\/www.cybi.fr\/#\/schema\/person\/3060713e028a83bbb248dba4763b3947"},"headline":"Le r\u00e8glement DORA","datePublished":"2023-12-06T13:14:31+00:00","dateModified":"2023-12-06T13:40:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/"},"wordCount":493,"publisher":{"@id":"https:\/\/www.cybi.fr\/#organization"},"articleSection":["Technologies et Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/","url":"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/","name":"Le r\u00e8glement DORA - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","isPartOf":{"@id":"https:\/\/www.cybi.fr\/#website"},"datePublished":"2023-12-06T13:14:31+00:00","dateModified":"2023-12-06T13:40:01+00:00","description":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion","breadcrumb":{"@id":"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cybi.fr\/index.php\/2023\/12\/06\/le-reglement-dora\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.cybi.fr\/"},{"@type":"ListItem","position":2,"name":"Le r\u00e8glement DORA"}]},{"@type":"WebSite","@id":"https:\/\/www.cybi.fr\/#website","url":"https:\/\/www.cybi.fr\/","name":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","description":"Cybi - Cybersecurity Intelligence","publisher":{"@id":"https:\/\/www.cybi.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cybi.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cybi.fr\/#organization","name":"Cybi","url":"https:\/\/www.cybi.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cybi.fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cybi.fr\/wp-content\/uploads\/2022\/05\/Standard-2.png","contentUrl":"https:\/\/www.cybi.fr\/wp-content\/uploads\/2022\/05\/Standard-2.png","width":2852,"height":1075,"caption":"Cybi"},"image":{"@id":"https:\/\/www.cybi.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CYBI_CYBER","https:\/\/www.linkedin.com\/company\/cybi\/"]},{"@type":"Person","@id":"https:\/\/www.cybi.fr\/#\/schema\/person\/3060713e028a83bbb248dba4763b3947","name":"Fabian OSMOND","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g","caption":"Fabian OSMOND"},"url":"https:\/\/www.cybi.fr\/index.php\/author\/fosmond\/"}]}},"jetpack_featured_media_url":"","uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Fabian OSMOND","author_link":"https:\/\/www.cybi.fr\/index.php\/author\/fosmond\/"},"uagb_comment_info":0,"uagb_excerpt":"Le r\u00e8glement DORA (Digital Operational Resilience Act) vise \u00e0 renforcer la r\u00e9silience op\u00e9rationnelle du secteur financier europ\u00e9en face aux risques num\u00e9riques. Adopt\u00e9 en octobre 2022 par les col\u00e9gislateurs europ\u00e9ens, il entrera en vigueur \u00e0 partir de 2024 et impactera aussi bien les acteurs financiers que les prestataires de services num\u00e9riques qui leur sont critiques. Selon\u2026","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts\/523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/comments?post=523"}],"version-history":[{"count":2,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts\/523\/revisions"}],"predecessor-version":[{"id":526,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts\/523\/revisions\/526"}],"wp:attachment":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/media?parent=523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/categories?post=523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/tags?post=523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}