{"id":3257,"date":"2024-06-11T14:32:01","date_gmt":"2024-06-11T12:32:01","guid":{"rendered":"https:\/\/reciproc-it.com\/?p=3257"},"modified":"2024-12-15T16:22:11","modified_gmt":"2024-12-15T15:22:11","slug":"la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience","status":"publish","type":"post","link":"https:\/\/reciproc-it.com\/en\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/","title":{"rendered":"La R\u00e9glementation, CRA, DORA, NIS2&#8230;.au service de la cyber-r\u00e9silience"},"content":{"rendered":"<p><!-- \/wp:post-content --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n\n<!-- wp:paragraph -->\n<p>La conformit\u00e9 r\u00e9glementaire est d\u00e9sormais un \u00e9l\u00e9ment indispensable pour s\u00e9curiser nos activit\u00e9s face aux menaces li\u00e9es au cyber espace et \u00e0 l\u2019hyper connexion des syst\u00e8mes d\u2019informations.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\"} -->\n<p class=\"has-text-align-left\">En exemple et pour rappel, la r\u00e9glementation RGPD, dont l\u2019application s\u2019impose depuis 2018, a favoris\u00e9 la prise de conscience quant \u00e0 la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019informations.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\"} -->\n<p class=\"has-text-align-left\">Cette r\u00e9glementation, qui concerne la protection des donn\u00e9es personnelles et de la vie priv\u00e9e, a implicitement contraint nos entreprises \u00e0 cartographier les donn\u00e9es personnelles, \u00e0 v\u00e9rifier leur s\u00e9curisation dans des syst\u00e8mes d\u2019information de plus en plus globaux, ouverts et complexes.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\"} -->\n<p class=\"has-text-align-left\">Cette d\u00e9marche a consid\u00e9rablement contribu\u00e9 \u00e0 \u00e9lever le niveau de maturit\u00e9 des entreprises, afin de mieux comprendre et appr\u00e9hender la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019informations dans leur globalit\u00e9. Tout naturellement, prot\u00e9ger les donn\u00e9es personnelles revenait \u00e0 s\u00e9curiser tous les processus m\u00e9tiers d\u2019une organisation donn\u00e9e ainsi que l\u2019ensemble des supports de stockage des donn\u00e9es sensibles. Une r\u00e9glementation qui aura \u00e9t\u00e9 b\u00e9n\u00e9fique pour l\u2019ensemble des \u00e9cosyst\u00e8mes h\u00e9bergeant les donn\u00e9es personnelles et qui a catalys\u00e9 les pr\u00e9mices d\u2019une prise de conscience plus g\u00e9n\u00e9rale.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\"} -->\n<p class=\"has-text-align-left\">NIS2 (<em><strong>Network and Information Security<\/strong>)<\/em>, <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=CELEX%3A32022L2555\">https:\/\/eur-lex.europa.eu\/legal-content\/FR\/TXT\/?uri=CELEX%3A32022L2555<\/a> et DORA (<em><strong>Digital Operational Resilience Act)<\/strong><\/em><strong>,<\/strong><a href=\"https:\/\/www.eiopa.europa.eu\/digital-operational-resilience-act-dora_en\">https:\/\/www.eiopa.europa.eu\/digital-operational-resilience-act-dora_en<\/a>, aujourd\u2019hui, viennent renforcer plus encore ce travail de maturit\u00e9, et garantiront une r\u00e9silience collective accrue en s\u00e9curit\u00e9 num\u00e9rique.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\"} -->\n<p class=\"has-text-align-left\">Elles pr\u00e9sentent d\u2019ailleurs un point commun&nbsp;: la syst\u00e9matisation de l\u2019analyse de risques comme point de d\u00e9part \u00e0 la construction d\u2019une politique de s\u00e9curit\u00e9 conforme.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\"} -->\n<p class=\"has-text-align-left\">Pour DORA comme pour NIS2, les r\u00e9sultats des analyses de risques et l\u2019application des mesures issues de cet exercice d\u2019analyse structure la d\u00e9marche \u00e0 suivre en vue d\u2019une r\u00e9silience op\u00e9rationnelle efficace.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\"} -->\n<p class=\"has-text-align-left\">L\u2019analyse de risques et la gouvernance de la s\u00e9curit\u00e9 de nos syst\u00e8mes d\u2019informations constituent les piliers auxquels adosser d\u00e9sormais nos travaux de protection contre les menaces cyber.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\"} -->\n<p class=\"has-text-align-left\">Soyons bien conscients que le r\u00e9glementaire est le levier qui dynamise la prise de conscience des acteurs \u00e9conomiques, de toutes les parties prenantes au sein des organisations et en particulier des dirigeants d\u2019entreprise, quant \u00e0 l\u2019importance de la cybers\u00e9curit\u00e9 dans le monde actuel.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}},\"typography\":{\"fontStyle\":\"normal\",\"fontWeight\":\"400\"}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\" style=\"font-style:normal;font-weight:400\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-palette-color-4-color\">Et enfin, se conformer \u00e0 <strong>DORA<\/strong> et <strong>NIS2<\/strong> n\u00e9cessite des investissements dans la gestion des risques, la cybers\u00e9curit\u00e9 et la gouvernance. L&rsquo;analyse des risques est un pr\u00e9requis pour identifier les vuln\u00e9rabilit\u00e9s, anticiper les menaces, et garantir une conformit\u00e9 durable.<\/mark><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\">Les cadres juridiques de ces dispositions l\u00e9gales exigent une \u00e9valuation approfondie et continue des risques, elles ont en commun les points suivants :<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\"><strong>Gestion des risques et obligations de cybers\u00e9curit\u00e9<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\">\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mettre en \u0153uvre des mesures organisationnelles et techniques pour r\u00e9duire les risques cyber.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\">\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Inclut des politiques de contr\u00f4le d&rsquo;acc\u00e8s, cryptographie, gestion des vuln\u00e9rabilit\u00e9s, etc.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\"><strong>Reporting des incidents et r\u00e9ponse rapide<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\">\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Obligation de signaler les incidents significatifs dans un d\u00e9lai strict (24 \u00e0 72 heures).<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\">\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \u00c9tablir des plans pour g\u00e9rer et r\u00e9pondre efficacement aux incidents.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\"><strong>Gouvernance et leadership en cybers\u00e9curit\u00e9<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\">\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D\u00e9signation de responsables au sein de l&rsquo;organisation pour piloter les initiatives de cybers\u00e9curit\u00e9.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\">\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Formation des employ\u00e9s \u00e0 la s\u00e9curit\u00e9 informatique.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\">Assurer la s\u00e9curit\u00e9 de la cha\u00eene d&rsquo;approvisionnement (ex : Gestion des parties prenantes) est une priorit\u00e9 pour \u00e9viter les vuln\u00e9rabilit\u00e9s.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\">Pour retenir l\u2019essentiel&nbsp;:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\"><strong>Focus sur la r\u00e9silience :<\/strong> Les organisations doivent \u00eatre capables de pr\u00e9venir, d\u00e9tecter, r\u00e9pondre et se remettre des incidents cyber.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\",\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|palette-color-3\"}}}},\"textColor\":\"palette-color-3\"} -->\n<p class=\"has-text-align-left has-palette-color-3-color has-text-color has-link-color\"><strong>Obligation de reporting :<\/strong> Signaler rapidement les incidents majeurs est un pilier essentiel des deux cadres.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|black\"}}}},\"textColor\":\"black\"} -->\n<p class=\"has-black-color has-text-color has-link-color\"><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"align\":\"left\"} -->\n<p class=\"has-text-align-left\"><em>Baya Lonqueux<\/em><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>12 d\u00e9ce<em>mbre 2024<\/em><\/p>\n<!-- \/wp:paragraph -->","protected":false},"excerpt":{"rendered":"<p>La conformit\u00e9 r\u00e9glementaire est d\u00e9sormais un \u00e9l\u00e9ment indispensable pour s\u00e9curiser nos activit\u00e9s face aux menaces li\u00e9es au cyber espace et \u00e0 l\u2019hyper connexion des syst\u00e8mes d\u2019informations. En exemple et pour rappel, la r\u00e9glementation RGPD, dont l\u2019application s\u2019impose depuis 2018, a favoris\u00e9 la prise de conscience quant \u00e0 la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019informations. Cette r\u00e9glementation, qui [&hellip;]<\/p>","protected":false},"author":3,"featured_media":3258,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[23,18,15,17,21,16,24],"tags":[36,38,32,31,39,34,33,37],"class_list":["post-3257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites-de-lentreprise","category-cyberdefense","category-cybersecurite","category-datas","category-ransomwares","category-risques","category-tpe-pme","tag-analyse-des-risques","tag-cybersecurite","tag-cybersecurity","tag-dora","tag-ebios","tag-ebios-risk-manager","tag-nis2","tag-oligo-risk-manager"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>La R\u00e9glementation, CRA, DORA, NIS2....au service de la cyber-r\u00e9silience %<\/title>\n<meta name=\"description\" content=\"OLIGO.RISK MANAGER votre outil d&#039;analyse et de management des risques pour vous accompagner dans votre mise en conformit\u00e9\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/reciproc-it.com\/en\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La R\u00e9glementation, CRA, DORA, NIS2....au service de la cyber-r\u00e9silience %\" \/>\n<meta property=\"og:description\" content=\"OLIGO.RISK MANAGER votre outil d&#039;analyse et de management des risques pour vous accompagner dans votre mise en conformit\u00e9\" \/>\n<meta property=\"og:url\" content=\"https:\/\/reciproc-it.com\/en\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"RECIPROC-IT\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-11T12:32:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-15T15:22:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2024\/06\/Capture-decran-2024-06-11-a-14.00.59.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1812\" \/>\n\t<meta property=\"og:image:height\" content=\"1226\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Baya Lonqueux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Baya Lonqueux\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/\"},\"author\":{\"name\":\"Baya Lonqueux\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/person\/0259b19591cb4f7a0c409a4d61d48f24\"},\"headline\":\"La R\u00e9glementation, CRA, DORA, NIS2&#8230;.au service de la cyber-r\u00e9silience\",\"datePublished\":\"2024-06-11T12:32:01+00:00\",\"dateModified\":\"2024-12-15T15:22:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/\"},\"wordCount\":720,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/reciproc-it.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2024\/06\/Capture-decran-2024-06-11-a-14.00.59.png\",\"keywords\":[\"Analyse des risques\",\"Cybers\u00e9curit\u00e9\",\"cybersecurity\",\"DORA\",\"EBIOS\",\"Ebios Risk Manager\",\"NIS2\",\"OLIGO.RISK MANAGER\"],\"articleSection\":[\"Actualit\u00e9s de l'entreprise\",\"Cyberd\u00e9fense\",\"Cybers\u00e9curit\u00e9\",\"Datas\",\"Ransomwares\",\"Risques\",\"TPE\/PME\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/\",\"url\":\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/\",\"name\":\"La R\u00e9glementation, CRA, DORA, NIS2....au service de la cyber-r\u00e9silience %\",\"isPartOf\":{\"@id\":\"https:\/\/reciproc-it.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2024\/06\/Capture-decran-2024-06-11-a-14.00.59.png\",\"datePublished\":\"2024-06-11T12:32:01+00:00\",\"dateModified\":\"2024-12-15T15:22:11+00:00\",\"description\":\"OLIGO.RISK MANAGER votre outil d'analyse et de management des risques pour vous accompagner dans votre mise en conformit\u00e9\",\"breadcrumb\":{\"@id\":\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#primaryimage\",\"url\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2024\/06\/Capture-decran-2024-06-11-a-14.00.59.png\",\"contentUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2024\/06\/Capture-decran-2024-06-11-a-14.00.59.png\",\"width\":1812,\"height\":1226},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/reciproc-it.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La R\u00e9glementation, CRA, DORA, NIS2&#8230;.au service de la cyber-r\u00e9silience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/reciproc-it.com\/#website\",\"url\":\"https:\/\/reciproc-it.com\/\",\"name\":\"RECIPROC-IT\",\"description\":\"\u00c9vang\u00e9liser nos clients en les outillant\",\"publisher\":{\"@id\":\"https:\/\/reciproc-it.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/reciproc-it.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/reciproc-it.com\/#organization\",\"name\":\"RECIPROC-IT\",\"url\":\"https:\/\/reciproc-it.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png\",\"contentUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png\",\"width\":1065,\"height\":234,\"caption\":\"RECIPROC-IT\"},\"image\":{\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/person\/0259b19591cb4f7a0c409a4d61d48f24\",\"name\":\"Baya Lonqueux\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1c07e327b79ff4d45c28a2cd7955c0fe5b977ac48ea178cef93e711a4fc83936?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1c07e327b79ff4d45c28a2cd7955c0fe5b977ac48ea178cef93e711a4fc83936?s=96&d=mm&r=g\",\"caption\":\"Baya Lonqueux\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/bayalonqueux\/\"],\"url\":\"https:\/\/reciproc-it.com\/en\/author\/baya_lonqueux\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La R\u00e9glementation, CRA, DORA, NIS2....au service de la cyber-r\u00e9silience %","description":"OLIGO.RISK MANAGER votre outil d'analyse et de management des risques pour vous accompagner dans votre mise en conformit\u00e9","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/reciproc-it.com\/en\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/","og_locale":"en_GB","og_type":"article","og_title":"La R\u00e9glementation, CRA, DORA, NIS2....au service de la cyber-r\u00e9silience %","og_description":"OLIGO.RISK MANAGER votre outil d'analyse et de management des risques pour vous accompagner dans votre mise en conformit\u00e9","og_url":"https:\/\/reciproc-it.com\/en\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/","og_site_name":"RECIPROC-IT","article_published_time":"2024-06-11T12:32:01+00:00","article_modified_time":"2024-12-15T15:22:11+00:00","og_image":[{"width":1812,"height":1226,"url":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2024\/06\/Capture-decran-2024-06-11-a-14.00.59.png","type":"image\/png"}],"author":"Baya Lonqueux","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Baya Lonqueux","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#article","isPartOf":{"@id":"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/"},"author":{"name":"Baya Lonqueux","@id":"https:\/\/reciproc-it.com\/#\/schema\/person\/0259b19591cb4f7a0c409a4d61d48f24"},"headline":"La R\u00e9glementation, CRA, DORA, NIS2&#8230;.au service de la cyber-r\u00e9silience","datePublished":"2024-06-11T12:32:01+00:00","dateModified":"2024-12-15T15:22:11+00:00","mainEntityOfPage":{"@id":"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/"},"wordCount":720,"commentCount":0,"publisher":{"@id":"https:\/\/reciproc-it.com\/#organization"},"image":{"@id":"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2024\/06\/Capture-decran-2024-06-11-a-14.00.59.png","keywords":["Analyse des risques","Cybers\u00e9curit\u00e9","cybersecurity","DORA","EBIOS","Ebios Risk Manager","NIS2","OLIGO.RISK MANAGER"],"articleSection":["Actualit\u00e9s de l'entreprise","Cyberd\u00e9fense","Cybers\u00e9curit\u00e9","Datas","Ransomwares","Risques","TPE\/PME"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/","url":"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/","name":"La R\u00e9glementation, CRA, DORA, NIS2....au service de la cyber-r\u00e9silience %","isPartOf":{"@id":"https:\/\/reciproc-it.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#primaryimage"},"image":{"@id":"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2024\/06\/Capture-decran-2024-06-11-a-14.00.59.png","datePublished":"2024-06-11T12:32:01+00:00","dateModified":"2024-12-15T15:22:11+00:00","description":"OLIGO.RISK MANAGER votre outil d'analyse et de management des risques pour vous accompagner dans votre mise en conformit\u00e9","breadcrumb":{"@id":"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#primaryimage","url":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2024\/06\/Capture-decran-2024-06-11-a-14.00.59.png","contentUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2024\/06\/Capture-decran-2024-06-11-a-14.00.59.png","width":1812,"height":1226},{"@type":"BreadcrumbList","@id":"https:\/\/reciproc-it.com\/2024\/06\/11\/la-reglementation-cra-dora-nis2-au-service-de-la-cyber-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/reciproc-it.com\/"},{"@type":"ListItem","position":2,"name":"La R\u00e9glementation, CRA, DORA, NIS2&#8230;.au service de la cyber-r\u00e9silience"}]},{"@type":"WebSite","@id":"https:\/\/reciproc-it.com\/#website","url":"https:\/\/reciproc-it.com\/","name":"RECIPROC-IT","description":"\u00c9vang\u00e9liser nos clients en les outillant","publisher":{"@id":"https:\/\/reciproc-it.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/reciproc-it.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/reciproc-it.com\/#organization","name":"RECIPROC-IT","url":"https:\/\/reciproc-it.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/","url":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png","contentUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png","width":1065,"height":234,"caption":"RECIPROC-IT"},"image":{"@id":"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/reciproc-it.com\/#\/schema\/person\/0259b19591cb4f7a0c409a4d61d48f24","name":"Baya Lonqueux","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/reciproc-it.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1c07e327b79ff4d45c28a2cd7955c0fe5b977ac48ea178cef93e711a4fc83936?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1c07e327b79ff4d45c28a2cd7955c0fe5b977ac48ea178cef93e711a4fc83936?s=96&d=mm&r=g","caption":"Baya Lonqueux"},"sameAs":["https:\/\/www.linkedin.com\/in\/bayalonqueux\/"],"url":"https:\/\/reciproc-it.com\/en\/author\/baya_lonqueux\/"}]}},"_links":{"self":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts\/3257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/comments?post=3257"}],"version-history":[{"count":16,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts\/3257\/revisions"}],"predecessor-version":[{"id":3288,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts\/3257\/revisions\/3288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/media\/3258"}],"wp:attachment":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/media?parent=3257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/categories?post=3257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/tags?post=3257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}