{"id":3334,"date":"2025-05-07T16:04:31","date_gmt":"2025-05-07T14:04:31","guid":{"rendered":"https:\/\/reciproc-it.com\/?p=3334"},"modified":"2025-05-07T16:33:32","modified_gmt":"2025-05-07T14:33:32","slug":"cybersecurite-gestion-des-risques","status":"publish","type":"post","link":"https:\/\/reciproc-it.com\/en\/2025\/05\/07\/cybersecurite-gestion-des-risques\/","title":{"rendered":"Why Cybersecurity Is Now a Core Risk Management Tool"},"content":{"rendered":"<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png\" alt=\"\" class=\"wp-image-3338\" style=\"width:256px;height:auto\" srcset=\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png 1024w, https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM-300x300.png 300w, https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM-150x150.png 150w, https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM-768x768.png 768w, https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM-12x12.png 12w, https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM-75x75.png 75w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>For as long as businesses have existed, they've relied on tools to manage risk. From the first accounting ledgers in ancient civilizations to today's ERP and compliance platforms, each generation of business leaders has adopted tools to <strong>gain visibility, control, and protection.<\/strong>.<\/p>\n\n\n\n<p>But the risk landscape has changed dramatically.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Rise of Digital Risk<\/strong><\/h2>\n\n\n\n<p>As companies have gone digital, so have the threats. Cyber risks now dominate the modern business environment. Data, systems, and operations are increasingly exposed to vulnerabilities. <strong>Yet, many organizations still view cybersecurity primarily as a technical or operational issue<\/strong>\u2014something to be handled by IT departments, rather than a strategic pillar of enterprise <strong>risk management.<\/strong>.<\/p>\n\n\n\n<p>So the question becomes:<br><strong>Why did we take so long to treat cybersecurity as a core part of risk management?<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A Brief History of Risk Management Tools<\/strong><\/h2>\n\n\n\n<p>Risk management tools have evolved significantly:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>1494 \u2013 Accounting Origins:<\/strong> Luca Pacioli published <em>Summa de Arithmetica,<\/em>laying the foundation for modern financial risk control. <em>[Source : <\/em><a href=\"https:\/\/www.accaglobal.com\/gb\/en\/study-with-acca\/blog\/how-humans-invented-accounting.html#:~:text=Italian%20roots,%2C%20Geometria%2C%20Proportioni%20et%20Proportionalita\"><em>ACCA<\/em><\/a><em>]<\/em><\/li>\n\n\n\n<li><strong>1960s \u2013 MRP Systems:<\/strong> Material Requirements Planning (MRP) systems helped manage manufacturing risks.<\/li>\n\n\n\n<li><strong>1990s \u2013 ERP Systems:<\/strong> Enterprise Resource Planning tools streamlined business functions, enabling data-driven operational decisions.<em> [Source : <\/em><a href=\"https:\/\/www.evosus.com\/lou\/blog\/the-history-of-erp\"><em>Evosus]<\/em><\/a><\/li>\n\n\n\n<li><strong>Early 20th Century \u2013 Gantt Charts:<\/strong> Visual timelines improved project risk planning and resource allocation.<\/li>\n\n\n\n<li><strong>2000s \u2013 GRC Frameworks:<\/strong> Governance, Risk, and Compliance tools addressed complex regulatory demands. <em>[Source : <\/em><a href=\"https:\/\/grc2020.com\/2019\/10\/29\/from-grc-1-0-to-grc-5-0-a-history-of-technology-for-grc\/\"><em>From GRC 1.0 to 5.0<\/em><\/a><em>]<\/em><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Enter the Digital Era: Risk Has Gone Cyber<\/strong><\/h2>\n\n\n\n<p>With cloud computing, remote work, IoT, and AI tools, organizations now face <strong>complex and evolving cyber threats<\/strong>. Traditional, siloed approaches no longer suffice. <strong>Cybersecurity<\/strong> must be part of the overall <strong>enterprise risk management strategy.<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why Businesses Lag Behind on Cybersecurity Integration<\/strong><\/h2>\n\n\n\n<p>Despite rising awareness, many organizations still fall behind due to :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Overreliance on outdated tools like Excel and Word<\/li>\n\n\n\n<li>Fragmented, operational responses instead of strategic frameworks<\/li>\n\n\n\n<li>Misconceptions about the cost and complexity of cybersecurity platforms<\/li>\n\n\n\n<li>An IT-centric view of cybersecurity instead of a risk-based mindset<br><\/li>\n<\/ul>\n\n\n\n<p><em>Fun fact: Over 90% of spreadsheets contain errors<\/em>, leading to major cybersecurity blind spots.<em> [Source : <\/em><a href=\"https:\/\/www.wired.com\/story\/spreadsheet-excel-errors\/\"><em>WIRED<\/em><\/a><em>]<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why Cybersecurity Is a Business-Critical Priority Today<\/strong><\/h2>\n\n\n\n<p>The <strong>Cyberattacks<\/strong> are more frequent\u2014and more costly\u2014than ever. As we noted in our previous post, <a href=\"https:\/\/reciproc-it.com\/en\/2025\/04\/14\/ia-contre-ia-se-defendre-contre-la-nouvelle-generation-de-cyberattaques\/\">AI vs. AI: Defending Against the Next Generation of Cyber Attacks<\/a>, some breaches can cripple operations entirely.<\/p>\n\n\n\n<p>Organizations must adopt <strong>risk-based cybersecurity tools<\/strong> to<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Prevent, detect, and respond to threats<\/strong> efficiently<\/li>\n\n\n\n<li><strong>Ensure compliance and control<\/strong><\/li>\n\n\n\n<li><strong>Enable data-driven decisions<\/strong> securely<br><\/li>\n<\/ul>\n\n\n\n<p>A concrete example? <strong>Oligo Risk Manager<\/strong>.<\/p>\n\n\n\n<p>Designed to support organizations across all sectors, <strong>Oligo.RM<\/strong> enables comprehensive risk simulation, whether cyber-related or not. It provides a clear, real-time view of persistent and critical risks that require immediate attention and mitigation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Final Thoughts: Cybersecurity Is Risk Management<\/strong><\/h2>\n\n\n\n<p>The <strong>risk-based approach to cybersecurity<\/strong> is no longer optional\u2014it\u2019s essential. In an environment where threats evolve faster than ever, cybersecurity is not just about protection\u2014it\u2019s about smart, strategic risk management <strong>to lower your costs, save time, and make more relevant, informed decisions.<\/strong>.<\/p>\n\n\n<div class=\"wp-block-post-author-name\">Inssaf Senihji<\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-05-07T16:04:31+02:00\">7 May 2025<\/time><\/div>\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Depuis toujours, les entreprises utilisent des outils pour g\u00e9rer les risques. Des premiers registres comptables dans les civilisations antiques aux plateformes ERP et de conformit\u00e9 modernes, chaque g\u00e9n\u00e9ration de dirigeants a adopt\u00e9 des outils pour gagner en visibilit\u00e9, en contr\u00f4le et en protection. Mais le paysage des risques a radicalement chang\u00e9. L\u2019\u00e8re num\u00e9rique a transform\u00e9 [&hellip;]<\/p>","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[23,15,16,24],"tags":[],"class_list":["post-3334","post","type-post","status-publish","format-standard","hentry","category-actualites-de-lentreprise","category-cybersecurite","category-risques","category-tpe-pme"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pourquoi la cybers\u00e9curit\u00e9 est d\u00e9sormais un pilier de la gestion des risques - RECIPROC-IT<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment la cybers\u00e9curit\u00e9 est devenue un levier strat\u00e9gique de gestion des risques et pourquoi votre entreprise ne peut plus se contenter d\u2019approches purement techniques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/reciproc-it.com\/en\/2025\/05\/07\/cybersecurite-gestion-des-risques\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pourquoi la cybers\u00e9curit\u00e9 est d\u00e9sormais un pilier de la gestion des risques - RECIPROC-IT\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment la cybers\u00e9curit\u00e9 est devenue un levier strat\u00e9gique de gestion des risques et pourquoi votre entreprise ne peut plus se contenter d\u2019approches purement techniques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/reciproc-it.com\/en\/2025\/05\/07\/cybersecurite-gestion-des-risques\/\" \/>\n<meta property=\"og:site_name\" content=\"RECIPROC-IT\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-07T14:04:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-07T14:33:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Inssaf Senihji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inssaf Senihji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/\"},\"author\":{\"name\":\"Inssaf Senihji\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/person\/da44edc2bba7d4a977341550f7a0aa6b\"},\"headline\":\"Pourquoi la cybers\u00e9curit\u00e9 est d\u00e9sormais un pilier de la gestion des risques\",\"datePublished\":\"2025-05-07T14:04:31+00:00\",\"dateModified\":\"2025-05-07T14:33:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/\"},\"wordCount\":650,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/reciproc-it.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png\",\"articleSection\":[\"Actualit\u00e9s de l'entreprise\",\"Cybers\u00e9curit\u00e9\",\"Risques\",\"TPE\/PME\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/\",\"url\":\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/\",\"name\":\"Pourquoi la cybers\u00e9curit\u00e9 est d\u00e9sormais un pilier de la gestion des risques - RECIPROC-IT\",\"isPartOf\":{\"@id\":\"https:\/\/reciproc-it.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png\",\"datePublished\":\"2025-05-07T14:04:31+00:00\",\"dateModified\":\"2025-05-07T14:33:32+00:00\",\"description\":\"D\u00e9couvrez comment la cybers\u00e9curit\u00e9 est devenue un levier strat\u00e9gique de gestion des risques et pourquoi votre entreprise ne peut plus se contenter d\u2019approches purement techniques.\",\"breadcrumb\":{\"@id\":\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#primaryimage\",\"url\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png\",\"contentUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/reciproc-it.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pourquoi la cybers\u00e9curit\u00e9 est d\u00e9sormais un pilier de la gestion des risques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/reciproc-it.com\/#website\",\"url\":\"https:\/\/reciproc-it.com\/\",\"name\":\"RECIPROC-IT\",\"description\":\"\u00c9vang\u00e9liser nos clients en les outillant\",\"publisher\":{\"@id\":\"https:\/\/reciproc-it.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/reciproc-it.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/reciproc-it.com\/#organization\",\"name\":\"RECIPROC-IT\",\"url\":\"https:\/\/reciproc-it.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png\",\"contentUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png\",\"width\":1065,\"height\":234,\"caption\":\"RECIPROC-IT\"},\"image\":{\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/person\/da44edc2bba7d4a977341550f7a0aa6b\",\"name\":\"Inssaf Senihji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9deaa4aeab9d97b811ea5f460fe6f360f1bc4a2f9bb51e53d3db24c90d4ed309?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9deaa4aeab9d97b811ea5f460fe6f360f1bc4a2f9bb51e53d3db24c90d4ed309?s=96&d=mm&r=g\",\"caption\":\"Inssaf Senihji\"},\"url\":\"https:\/\/reciproc-it.com\/en\/author\/inssaf\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pourquoi la cybers\u00e9curit\u00e9 est d\u00e9sormais un pilier de la gestion des risques - RECIPROC-IT","description":"D\u00e9couvrez comment la cybers\u00e9curit\u00e9 est devenue un levier strat\u00e9gique de gestion des risques et pourquoi votre entreprise ne peut plus se contenter d\u2019approches purement techniques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/reciproc-it.com\/en\/2025\/05\/07\/cybersecurite-gestion-des-risques\/","og_locale":"en_GB","og_type":"article","og_title":"Pourquoi la cybers\u00e9curit\u00e9 est d\u00e9sormais un pilier de la gestion des risques - RECIPROC-IT","og_description":"D\u00e9couvrez comment la cybers\u00e9curit\u00e9 est devenue un levier strat\u00e9gique de gestion des risques et pourquoi votre entreprise ne peut plus se contenter d\u2019approches purement techniques.","og_url":"https:\/\/reciproc-it.com\/en\/2025\/05\/07\/cybersecurite-gestion-des-risques\/","og_site_name":"RECIPROC-IT","article_published_time":"2025-05-07T14:04:31+00:00","article_modified_time":"2025-05-07T14:33:32+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png","type":"image\/png"}],"author":"Inssaf Senihji","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inssaf Senihji","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#article","isPartOf":{"@id":"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/"},"author":{"name":"Inssaf Senihji","@id":"https:\/\/reciproc-it.com\/#\/schema\/person\/da44edc2bba7d4a977341550f7a0aa6b"},"headline":"Pourquoi la cybers\u00e9curit\u00e9 est d\u00e9sormais un pilier de la gestion des risques","datePublished":"2025-05-07T14:04:31+00:00","dateModified":"2025-05-07T14:33:32+00:00","mainEntityOfPage":{"@id":"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/"},"wordCount":650,"commentCount":0,"publisher":{"@id":"https:\/\/reciproc-it.com\/#organization"},"image":{"@id":"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#primaryimage"},"thumbnailUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png","articleSection":["Actualit\u00e9s de l'entreprise","Cybers\u00e9curit\u00e9","Risques","TPE\/PME"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/","url":"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/","name":"Pourquoi la cybers\u00e9curit\u00e9 est d\u00e9sormais un pilier de la gestion des risques - RECIPROC-IT","isPartOf":{"@id":"https:\/\/reciproc-it.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#primaryimage"},"image":{"@id":"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#primaryimage"},"thumbnailUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png","datePublished":"2025-05-07T14:04:31+00:00","dateModified":"2025-05-07T14:33:32+00:00","description":"D\u00e9couvrez comment la cybers\u00e9curit\u00e9 est devenue un levier strat\u00e9gique de gestion des risques et pourquoi votre entreprise ne peut plus se contenter d\u2019approches purement techniques.","breadcrumb":{"@id":"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#primaryimage","url":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png","contentUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2025\/05\/ChatGPT-Image-May-7-2025-02_30_06-PM.png"},{"@type":"BreadcrumbList","@id":"https:\/\/reciproc-it.com\/2025\/05\/07\/cybersecurite-gestion-des-risques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/reciproc-it.com\/"},{"@type":"ListItem","position":2,"name":"Pourquoi la cybers\u00e9curit\u00e9 est d\u00e9sormais un pilier de la gestion des risques"}]},{"@type":"WebSite","@id":"https:\/\/reciproc-it.com\/#website","url":"https:\/\/reciproc-it.com\/","name":"RECIPROC-IT","description":"\u00c9vang\u00e9liser nos clients en les outillant","publisher":{"@id":"https:\/\/reciproc-it.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/reciproc-it.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/reciproc-it.com\/#organization","name":"RECIPROC-IT","url":"https:\/\/reciproc-it.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/","url":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png","contentUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png","width":1065,"height":234,"caption":"RECIPROC-IT"},"image":{"@id":"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/reciproc-it.com\/#\/schema\/person\/da44edc2bba7d4a977341550f7a0aa6b","name":"Inssaf Senihji","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/reciproc-it.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9deaa4aeab9d97b811ea5f460fe6f360f1bc4a2f9bb51e53d3db24c90d4ed309?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9deaa4aeab9d97b811ea5f460fe6f360f1bc4a2f9bb51e53d3db24c90d4ed309?s=96&d=mm&r=g","caption":"Inssaf Senihji"},"url":"https:\/\/reciproc-it.com\/en\/author\/inssaf\/"}]}},"_links":{"self":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts\/3334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/comments?post=3334"}],"version-history":[{"count":5,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts\/3334\/revisions"}],"predecessor-version":[{"id":3342,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts\/3334\/revisions\/3342"}],"wp:attachment":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/media?parent=3334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/categories?post=3334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/tags?post=3334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}