{"id":3604,"date":"2025-04-28T09:00:43","date_gmt":"2025-04-28T07:00:43","guid":{"rendered":"https:\/\/tdfcyber.fr\/rcyberara2025\/?page_id=3604"},"modified":"2025-06-09T19:05:37","modified_gmt":"2025-06-09T17:05:37","slug":"workshops_rcyberara","status":"publish","type":"page","link":"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/","title":{"rendered":"Les Workshops"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><div class=\"fusion-text fusion-text-3\">\n<h3><strong>11 workshops r\u00e9partis en 2 sessions horaires : de 11h00 \u00e0 11h40 \u2013 de 11h50 \u00e0 12h30\u00a0<\/strong><\/h3>\n<\/div>\n<div class=\"fusion-text fusion-text-4\">\n<p>Ces workshops repr\u00e9sentent une opportunit\u00e9 de s\u2019informer de fa\u00e7on privil\u00e9gi\u00e9e sur une th\u00e9matique d\u00e9finie, de mieux conna\u00eetre les solutions pour y r\u00e9pondre et d\u2019\u00e9changer avec des experts. Les deux sessions horaires permettaient de faire deux choix.<\/p>\n<\/div>\n<\/div><div class=\"fusion-text fusion-text-2\"><div class=\"fusion-text fusion-text-3\">\n<h3><strong>De 11h00 \u00e0 11h40 :<\/strong><\/h3>\n<\/div>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ab113e;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><strong>Comment sensibiliser au plus pr\u00e8s vos utilisateurs aux risques cyber ? La sensibilisation en temps r\u00e9el est-elle possible ? <\/strong><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-3\"><p>Un workshop<strong> AVANT DE CLIQUER <\/strong>par <strong>Jean GEELHAND DE MERXEM, <\/strong>Directeur commercial adjoint, Responsable Vishing<strong>,\u00a0<\/strong><\/p>\n<p><em>Venez d\u00e9couvrir et partager la r\u00e9flexion d&rsquo;Avant de Cliquer sur la sensibilisation des utilisateurs aux bonnes pratiques cyber en g\u00e9n\u00e9ral.<\/em><br \/>\n<em>Nous \u00e9changeons avec vous notre approche offrant instantan\u00e9it\u00e9 et interactivit\u00e9.<\/em><br \/>\n<em>Notre objectif : vous accompagner \u00e0 convertir vos utilisateurs \u00e0 une adh\u00e9sion concr\u00e8te de votre vision de la cybers\u00e9curit\u00e9.<\/em><br \/>\n<em>Notre proposition : une solution tout-en-un, personnalisable, regroupant diff\u00e9rentes sources d&rsquo;\u00e9v\u00e9nements \u00e0 diff\u00e9rents niveaux d&rsquo;interaction, c&rsquo;est avec cette volont\u00e9 que nous proposons le Real Time Situational Awareness.<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ab113e;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><strong>Exposition externe : le talon d\u2019Achille de votre politique cyber ?<\/strong><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-4\"><p>Un workshop de <strong>SEMKEL <\/strong>par<strong> Julien LOPIZZO, <\/strong>Pr\u00e9sident fondateur.<\/p>\n<p><em>Aujourd\u2019hui, les entreprises investissent massivement dans la s\u00e9curisation de leurs infrastructures : segmentation r\u00e9seau, durcissement des syst\u00e8mes, d\u00e9ploiement de SOC. Pourtant, une surface d\u2019attaque externe mal ma\u00eetris\u00e9e suffit \u00e0 r\u00e9duire \u00e0 n\u00e9ant tous ces efforts.<\/em><\/p>\n<p><em>Ce workshop vous propose d\u2019explorer une approche strat\u00e9gique et op\u00e9rationnelle de l\u2019exposition externe : cartographie des actifs invisibles, identification des vuln\u00e9rabilit\u00e9s, fuite de donn\u00e9es, analyse des signaux faibles provenant du darkweb, etc. Nous verrons comment ces \u00e9l\u00e9ments, souvent n\u00e9glig\u00e9s, constituent le <strong>point d\u2019entr\u00e9e privil\u00e9gi\u00e9 des cybermenaces modernes<\/strong>.<\/em><\/p>\n<p><em>\u00c0 travers des cas concrets et des outils d\u2019analyse, vous comprendrez :<\/em><\/p>\n<ul>\n<li><em>Pourquoi votre exposition externe est aussi critique que vos d\u00e9fenses internes ;<\/em><\/li>\n<li><em>Comment articuler cette veille avec votre politique cyber globale ;<\/em><\/li>\n<li><em>Quelles actions correctives simples peuvent renforcer votre posture de s\u00e9curit\u00e9.<\/em><\/li>\n<\/ul>\n<p><em>L\u2019objectif ? Ne plus laisser l\u2019ennemi choisir le terrain de l\u2019attaque.<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ab113e;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><b><strong>RETEX &#8211; Mise en \u0153uvre d\u2019un projet PCRA cybers\u00e9curit\u00e9 au sein d\u2019un \u00e9tablissement de sant\u00e9\u00a0<\/strong><\/b><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-5\"><p>Un workshop<b> ATOS (ex EVIDEN) <\/b>avec <b>Rodolphe BACA, <\/b>Cybersecurity Manager<\/p>\n<p><em>Les nombreux exercices de crises dans le secteur sanitaire ont mis en lumi\u00e8re les manques actuels des plans blancs et modes d\u00e9grad\u00e9s au sein des services, en cas de cyberattaque.<\/em><\/p>\n<p><em>PC de secours sur le m\u00eame r\u00e9seau que la production, modes d\u00e9grad\u00e9s inadapt\u00e9s aux impacts cyber, absence de solution d\u00e9grad\u00e9e pour la st\u00e9rilisation, l\u2019imagerie, la surveillance des constantes en r\u00e9animation, le pilotage manuel des girostockeurs en pharmacie \u2026<\/em><\/p>\n<p><em>L\u2019ANS a publi\u00e9 un Kit PCRA pour aider les structures \u00e0 ouvrir le sujet, c\u2019est un d\u00e9but mais ce tableau excel ne permet pas de r\u00e9pondre \u00e0 l\u2019organisation n\u00e9cessaire d\u2019une gestion de projet impliquant les services de l\u2019\u00e9tablissement. Nous verrons ainsi :<\/em><\/p>\n<ul>\n<li><em>Comment identifier le p\u00e9rim\u00e8tre de son projet<\/em><\/li>\n<li><em>Comment piloter son projet dans le temps avec les \u00e9tapes \u00e0 respecter et la priorisation des sujets<\/em><\/li>\n<li><em>Des exemples r\u00e9els de mode d\u00e9grad\u00e9s dans des services (sanitaire, bio-m\u00e9dical, support) et de<\/em><\/li>\n<li><em>Echanges ouverts avec l\u2019auditoire<\/em><\/li>\n<\/ul>\n<p><!-- notionvc: af93e0aa-06cb-43be-9dc4-8feacc809a3d --><\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ab113e;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><strong>Open source \/ libres, \u00ab\u00a0root\u00a0\u00bb vers la souverainet\u00e9 ?<\/strong><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-6\"><p>Un workshop <strong>ELYSIUM \/ ROOT ME PRO <\/strong>par, <strong>Yoan ISSARTEL<\/strong>, <span class=\"notion-enable-hover\" data-token-index=\"0\">CTO Elysium Security<\/span><!-- notionvc: 586a7c02-0cad-4893-a506-37b7dd64efd9 --><\/p>\n<p><em>Dans un contexte o\u00f9 la ma\u00eetrise des infrastructures et des technologies est un enjeu de plus en plus strat\u00e9gique, les solutions open source \/ libres se distinguent comme une alternative cr\u00e9dible pour renforcer la souverainet\u00e9 num\u00e9rique, favoriser l\u2019ind\u00e9pendance technologique et garantir une meilleure ma\u00eetrise des solutions d\u00e9ploy\u00e9es. Lors de cet atelier, nous explorerons les opportunit\u00e9s et d\u00e9fis li\u00e9s \u00e0 l\u2019utilisation de solutions open source, en particulier dans le domaine de la cybers\u00e9curit\u00e9 :<\/em><\/p>\n<ul>\n<li><em>Quels sont les avantages en mati\u00e8re de souverainet\u00e9 et d\u2019adaptabilit\u00e9 ?<\/em><\/li>\n<li><em>Quels sont les d\u00e9fis \u00e0 relever en termes d\u2019int\u00e9gration, de comp\u00e9tences et d\u2019industrialisation ?<\/em><\/li>\n<\/ul>\n<p><em>La seconde partie du workshop sera consacr\u00e9e \u00e0 un focus sur la supervision de s\u00e9curit\u00e9 et la n\u00e9cessit\u00e9 d\u2019une r\u00e9action rapide face aux menaces. Nous pr\u00e9senterons au travers d\u2019exemples concrets, les strat\u00e9gies et outils permettant de r\u00e9pondre \u00e0 cet enjeu.<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-5 fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ab113e;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><strong><span class=\"notion-enable-hover\" data-token-index=\"2\">IA et Cybers\u00e9curit\u00e9<\/span><!-- notionvc: 00ce7a59-70fe-4f83-9cd9-70b372ba00da --><\/strong><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-7\"><p>Un workshop <strong>GROUPE LA POSTE\u00a0<\/strong>par le <strong>Dr Michel DUBOIS<\/strong>, Directeur Scientifique et Technique \u00e0 la Direction Cybers\u00e9curit\u00e9\u00a0<!-- notionvc: 586a7c02-0cad-4893-a506-37b7dd64efd9 --><\/p>\n<p><em>Entre promesse de d\u00e9fense renforc\u00e9e et nouveaux risques, l\u2019IA est un levier strat\u00e9gique \u00e0 ma\u00eetriser. Venez mieux comprendre les interactions crois\u00e9es entre IA et cybers\u00e9curit\u00e9 pour optimiser votre d\u00e9marche de s\u00e9curit\u00e9 num\u00e9rique et de recours \u00e0 l&rsquo;IA dans vos projets.<\/em><\/p>\n<\/div><div class=\"fusion-text fusion-text-8\"><div class=\"fusion-text fusion-text-3\">\n<h3><strong>De 11h50 \u00e0 12h30 :<\/strong><\/h3>\n<\/div>\n<\/div><div class=\"fusion-title title fusion-title-6 fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ab113e;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><strong>Sensibilisation interne : strat\u00e9gie et outillage.<\/strong><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-9\"><p>Un workshop<strong> ENEDIS <\/strong>anim\u00e9 par <strong>Cyprien GUEYRAUD, <\/strong>Pilote de la sensibilisation Cyber au sein de la Cyber School, \u00a0<strong>Jordan BABEL, <\/strong>R\u00e9f\u00e9rent Cyber DR SIRHO et DR Alpes et <strong>Charles Edouard OUKRAT, <\/strong>Cyber Animation Fili\u00e8re cyber.<\/p>\n<p><!-- notionvc: c02bf965-4388-4d3c-b9ff-ca470de4b93c --><\/p>\n<p><em>Au sein d\u2019Enedis la CyberSchool est le service du P\u00f4le Cyber en charge de la sensibilisation cyber. <\/em><br \/>\n<em>Depuis 2020 ce service a mis en place un catalogue de services innovants pour sensibiliser nos 40 000 collaborateurs. <\/em><br \/>\n<em>Ce Workshop pr\u00e9sentera un exemple de strat\u00e9gie et les outils permettant de maintenir l\u2019effort de sensibilisation dans le temps long.<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-7 fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ab113e;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><strong>L<\/strong><strong>a cybers\u00e9curit\u00e9, ce n&rsquo;est pas qu&rsquo;une affaire de technologie complexe !<\/strong><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-10\"><p>Un workshop <strong>BLUEFILES<\/strong><strong>\u00a0<\/strong>par <strong>Philippe<\/strong> <strong>LOUDENOT, <\/strong>Directeur Strat\u00e9gie Cybers\u00e9curit\u00e9.<!-- notionvc: 586a7c02-0cad-4893-a506-37b7dd64efd9 --><\/p>\n<p><em>Lorsque l&rsquo;on pense cybers\u00e9curit\u00e9, on imagine souvent des solutions techniques pointues. Pourtant, la s\u00e9curit\u00e9 des informations repose en grande partie sur l&rsquo;utilisation d&rsquo;outils simples et accessibles par les utilisateurs eux-m\u00eames. L&rsquo;important, est de fournir aux \u00e9quipes les moyens d\u2019appliquer des mesures de s\u00e9curit\u00e9 au quotidien. Avec une culture de s\u00e9curit\u00e9 partag\u00e9e : En sensibilisant et formant les \u00e9quipes, on renforce une culture de cybers\u00e9curit\u00e9 o\u00f9 chacun comprend son r\u00f4le et l&rsquo;importance de rester vigilant. La cybers\u00e9curit\u00e9, ce n\u2019est pas qu\u2019une question de technologie, c\u2019est aussi une question de responsabilit\u00e9 collective !<\/em><\/p>\n<p><em>Comment offrir \u00e0 chacun les moyens de contribuer activement \u00e0 la protection des informations ?<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-8 fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ab113e;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><strong><span class=\"notion-enable-hover\" data-token-index=\"0\">Souverainet\u00e9 num\u00e9rique, arr\u00eatez de jouer avec le (<\/span><span class=\"notion-enable-hover\" data-token-index=\"1\">pare<\/span><span class=\"notion-enable-hover\" data-token-index=\"2\">) feu.<\/span><!-- notionvc: 00ce7a59-70fe-4f83-9cd9-70b372ba00da --><\/strong><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-11\"><p>Un workshop <strong>STORMSHIELD\u00a0<\/strong>par <strong>Olivier DEGARNE,<\/strong> Ing\u00e9nieur Avant-Vente<!-- notionvc: 586a7c02-0cad-4893-a506-37b7dd64efd9 --><\/p>\n<p><em>D\u00e9couvrez ou red\u00e9couvrez plus pr\u00e9cis\u00e9ment comment renforcer la s\u00e9curit\u00e9 de votre structure.<\/em><br \/>\n<em>Par des concepts-cl\u00e9s comme la d\u00e9fense en profondeur, la double-barri\u00e8re, la segmentation s\u00e9curis\u00e9e, vous constaterez qu\u2019il y a bien des mani\u00e8res de combattre les attaques informatiques de mani\u00e8re efficace.<\/em><br \/>\n<em>Vous n\u2019avez plus \u00e0 \u00ab jouer avec le feu \u00bb, venez d\u00e9couvrir les bonnes cl\u00e9s pour une s\u00e9curit\u00e9 num\u00e9rique renforc\u00e9e et souveraine !<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-9 fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ab113e;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><strong>La cybers\u00e9curit\u00e9 dans la s\u00e9curit\u00e9 routi\u00e8re.<\/strong><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-12\"><p>Un workshop <strong>SECUROAD<\/strong><strong>\u00a0<\/strong>par <strong>Ma\u00ebl VERY<\/strong>, Pr\u00e9sident<!-- notionvc: 586a7c02-0cad-4893-a506-37b7dd64efd9 --><\/p>\n<p><em>A l\u2019heure des v\u00e9hicules connect\u00e9s et des radars intelligents, la cybers\u00e9curit\u00e9 est devenue un enjeu cl\u00e9 pour la s\u00e9curit\u00e9 routi\u00e8re. Un workshop pour en poser les enjeux.<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-10 fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ab113e;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><strong>Comment acc\u00e9l\u00e9rer sa rem\u00e9diation ?<\/strong><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-13\"><p>Un wokshop<b> MGM Solutions <\/b>avec <b>Flavien RIEHL, <\/b>responsable P\u00f4le Renfort S\u00e9curit\u00e9<\/p>\n<p><em>Olivier Kim, commandant de la gendarmerie du Grand Est a d\u00e9clar\u00e9 : \u00ab Une entreprise sur deux ferme apr\u00e8s une cyberattaque \u00bb Les cyberattaques ne frappent pas que les autres. Et si cela vous arrivait demain, seriez-vous pr\u00eat ? En anticipant certains aspects cl\u00e9s, vous pouvez limiter les impacts et retrouver une activit\u00e9 normale plus rapidement. Lors de cet atelier, nous partagerons avec vous des cas concrets, des retours d&rsquo;exp\u00e9rience et des bonnes pratiques essentielles pour pr\u00e9parer efficacement votre organisation \u00e0 faire face\u2026 et \u00e0 rebondir vite.<\/em><\/p>\n<\/div><div class=\"fusion-title title fusion-title-11 fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#ab113e;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><strong><span class=\"notion-enable-hover\" data-token-index=\"2\">L\u2019IA cette \u00e9volution technologique d\u00e9rangeante, vers un Humanisme cyber ?<\/span><!-- notionvc: 00ce7a59-70fe-4f83-9cd9-70b372ba00da --><\/strong><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#0b3e75;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-14\"><p>Un workshop<b> STRAAD.A <\/b>avec <b>El Yamani HAMEDI,\u00a0 <\/b>Directeur g\u00e9n\u00e9ral associ\u00e9<\/p>\n<p><em>L\u2019IA suscite toutes les passions et toutes les controverses, pourtant l\u2019humain n\u2019est pas \u00e0 son premier coup d\u2019essai \u00e0 vouloir chercher des r\u00e9ponses ou du perfectionnement dans autre chose qui ne serait pas g\u00e9n\u00e9tiquement humain ! Quel sens donner aux motivations de l\u2019Homme qui le poussent a toujours vouloir se r\u00e9cr\u00e9er, se r\u00e9inventer dans des moments cl\u00e9s de son histoire, pourquoi l\u2019Homme recherche-t-il, cycliquement, la perfection dans ce qui ne serait pas intrins\u00e8quement humain ?<\/em><\/p>\n<p><em>Paul Ricoeur d\u00e9finit la notion de \u201cMal\u201d dans la revue Esprit en 1988 : \u201c c\u2019est ce contre quoi on lutte quand on a renonc\u00e9 \u00e0 l\u2019expliquer. Le Mal c\u2019est le prix \u00e0 payer pour une pens\u00e9e qui aurait renonc\u00e9 \u00e0 la question pourquoi ?\u201d D\u00e8s lors, il revient \u00e0 l\u2019humain de donner le cap pour un usage raisonnable et raisonn\u00e9 de l\u2019IA en son \u00e2me et conscience, comme il a pu le faire pour tout autre mutation technologique. A moins que l\u2019Homme ne perde la foi dans l\u2019humain et qu\u2019il d\u00e9cide en toute conscience de doter, cette intelligence artificielle, de capacit\u00e9s cognitives qui le d\u00e9passent. Et l\u00e0, il agira de sa propre volont\u00e9.<\/em><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:10px;--awb-background-color:#d3144b;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-15\"><h3 style=\"text-align: center;\"><strong><span style=\"color: #ffffff;\">Vous souhaitez plus d\u2019informations ?<br \/>\n<\/span><\/strong><\/h3>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ffffff;--button_accent_hover_color:#ffffff;--button_border_hover_color:#ffffff;--button_gradient_top_color:#0b3e75;--button_gradient_bottom_color:#0b3e75;--button_gradient_top_color_hover:#001f4f;--button_gradient_bottom_color_hover:#001f4f;--button_text_transform:uppercase;\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/tdfcyber.fr\/contacter-le-tdfcyber\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">CONTACTEZ-NOUS<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:right bottom;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-background-image:url(&quot;https:\/\/tdfcyber.fr\/rcybernormandie2020\/wp-content\/uploads\/sites\/5\/2020\/10\/CONNEXION-Fd-3.jpg&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-16\"><h5><strong><span style=\"color: #c91449;\">NOS PARTENAIRES<\/span><\/strong><\/h5>\n<p><strong><\/p>\n<\/div><div class=\"fusion-image-carousel fusion-image-carousel-auto fusion-image-carousel-1\"><div class=\"awb-carousel awb-swiper awb-swiper-carousel awb-carousel--carousel awb-swiper-dots-position-bottom\" data-layout=\"carousel\" data-autoplay=\"yes\" data-autoplayspeed=\"2500\" data-autoplaypause=\"no\" data-columns=\"5\" data-columnsmedium=\"1\" data-columnssmall=\"1\" data-itemmargin=\"10\" data-itemwidth=\"180\" data-touchscroll=\"no\" data-freemode=\"no\" data-imagesize=\"auto\" data-scrollitems=\"0\" data-centeredslides=\"no\" data-rotationangle=\"50\" data-depth=\"100\" data-speed=\"500\" data-shadow=\"no\" data-pagination=\"bullets\" style=\"--awb-column-spacing:10px;\"><div class=\"swiper-wrapper awb-image-carousel-wrapper fusion-flex-align-items-center\"><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/avantdecliquer\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2020\/11\/avant-de-clique-logo.gif\" class=\"attachment-full size-full\" alt=\"AVANT DE CLIQUER partenaire des RCyberARA\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/root-me-pro\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"134\" height=\"134\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/03\/logo_rootmepro.jpg\" class=\"attachment-full size-full\" alt=\"Root-Me Pro, partenaire des RCyberARA\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/stormshield\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2022\/09\/STORMSHIELD-Logo.jpg\" class=\"attachment-full size-full\" alt=\"Stormshield partenaire des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2022\/09\/STORMSHIELD-Logo-200x80.jpg 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2022\/09\/STORMSHIELD-Logo.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/certitude-numerique\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2020\/10\/CERTITUDE-NUMERIQUE.jpg\" class=\"attachment-full size-full\" alt=\"CERTitude numerique partenaire des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2020\/10\/CERTITUDE-NUMERIQUE-200x80.jpg 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2020\/10\/CERTITUDE-NUMERIQUE.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/la-preuve-numerique\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"106\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2025\/03\/logo_lpn-1.png\" class=\"attachment-full size-full\" alt=\"La preuve numerique partenaire des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2025\/03\/logo_lpn-1-200x85.png 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2025\/03\/logo_lpn-1.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/atos\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2025\/05\/Logo_Atos.jpg\" class=\"attachment-full size-full\" alt=\"Atos partenaire des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2025\/05\/Logo_Atos-200x80.jpg 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2025\/05\/Logo_Atos.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/departement-du-rhone\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"150\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/09\/Logo_Rhone.png\" class=\"attachment-full size-full\" alt=\"D\u00e9partement du Rh\u00f4ne partenaire des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/09\/Logo_Rhone-200x120.png 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/09\/Logo_Rhone.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/actadata\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/logo_ACTADATA-.jpg\" class=\"attachment-full size-full\" alt=\"Actadata partenaire des RCyberARA\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/www.mgmsolutions.fr\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/logo_mgmsolutions.jpg\" class=\"attachment-full size-full\" alt=\"MGM solutions partenaire des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/logo_mgmsolutions-200x80.jpg 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/logo_mgmsolutions.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/bluefiles\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/03\/Logo_BlueFiles.png\" class=\"attachment-full size-full\" alt=\"BlueFiles partenaire des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/03\/Logo_BlueFiles-200x80.png 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/03\/Logo_BlueFiles.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/enedis\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/09\/Logo_Enedis.png\" class=\"attachment-full size-full\" alt=\"ENEDIS partenaire des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/09\/Logo_Enedis-200x80.png 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/09\/Logo_Enedis.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/groupe-la-poste\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"135\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2021\/11\/GROUPE-LA-POSTE.gif\" class=\"attachment-full size-full\" alt=\"Le Groupe la Poste partenaire des RCyberARA\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/straada\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"150\" height=\"149\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_Straada.jpg\" class=\"attachment-full size-full\" alt=\"STRAAD.A partenaire des RCyberARA\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/elysium-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/ELYSIUM-Logo-caroussel.gif\" class=\"attachment-full size-full\" alt=\"Elysium-Security partenaire des RCyberARA\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/tdfcyber.fr\/semkel\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/02\/logo_semkel.png\" class=\"attachment-full size-full\" alt=\"SEMKEL partenaire des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/02\/logo_semkel-200x80.png 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/02\/logo_semkel.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><\/div><div class=\"awb-swiper-button awb-swiper-button-prev\"><i class=\"awb-icon-angle-left\" aria-hidden=\"true\"><\/i><\/div><div class=\"awb-swiper-button awb-swiper-button-next\"><i class=\"awb-icon-angle-right\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-text fusion-text-17\"><p><\/strong><\/p>\n<h5><span style=\"color: #c91449;\"><strong>NOS SOUTIENS<\/strong><\/span><\/h5>\n<\/div><div class=\"fusion-image-carousel fusion-image-carousel-fixed fusion-image-carousel-2\"><div class=\"awb-carousel awb-swiper awb-swiper-carousel awb-carousel--carousel awb-swiper-dots-position-bottom\" data-layout=\"carousel\" data-autoplay=\"yes\" data-autoplayspeed=\"2500\" data-autoplaypause=\"no\" data-columns=\"5\" data-columnsmedium=\"1\" data-columnssmall=\"1\" data-itemmargin=\"10\" data-itemwidth=\"180\" data-touchscroll=\"no\" data-freemode=\"no\" data-imagesize=\"fixed\" data-scrollitems=\"0\" data-centeredslides=\"no\" data-rotationangle=\"50\" data-depth=\"100\" data-speed=\"500\" data-shadow=\"no\" data-pagination=\"bullets\" style=\"--awb-column-spacing:10px;\"><div class=\"swiper-wrapper awb-image-carousel-wrapper fusion-flex-align-items-center\"><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/anpp\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2020\/10\/ANPP.gif\" class=\"attachment-blog-medium size-blog-medium\" alt=\"L&#039;ANPP, soutien des RCyberARA\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/ihedn-region-lyonnaise\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"130\" height=\"133\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2022\/09\/IHEDN-Lyon.gif\" class=\"attachment-blog-medium size-blog-medium\" alt=\"IHEDN Region lyonnaise, soutien des RCyberARA\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/comcyber\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"180\" height=\"180\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/07\/COM-CYBER-Logo2.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"COMCYBER, soutien des RCyberARA\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/jeunes-de-ihedn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/09\/Logo_jeunesihedn_small.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Les jeunes de l&#039;IHEDN, soutien des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/09\/Logo_jeunesihedn_small-200x80.png 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2023\/09\/Logo_jeunesihedn_small.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/trinome-academique\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"251\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_Trinome_academique.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Le trin\u00f4me acad\u00e9mique de Lyon, soutien des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_Trinome_academique-200x80.jpg 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_Trinome_academique.jpg 251w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/tdfcyber.fr\/zone-de-defense-sud-est\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_EMZ_SE.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"La Zone de d\u00e9fense et de s\u00e9curit\u00e9 Sud-Est, soutien des RCyberARA\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/www.amf69.fr\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_AMF69.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"L&#039;association des Maires du Rh\u00f4ne, soutien des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_AMF69-200x80.jpg 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_AMF69.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/www.police-nationale.interieur.gouv.fr\/nous-decouvrir\/notre-organisation\/organisation\/service-national-de-police-scientifique-snps\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_SNPS-1.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Le SNPS soutien des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_SNPS-1-200x80.jpg 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_SNPS-1.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/www.protection-civile.org\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_Protection_civile.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"La Protection Civile soutien des RCyberARA\" srcset=\"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_Protection_civile-200x80.jpg 200w, https:\/\/tdfcyber.fr\/rcyberara2025\/wp-content\/uploads\/sites\/21\/2024\/09\/Logo_Protection_civile.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 922px) 232px, (min-width: 851px) 290px, (min-width: 781px) 387px, (min-width: 710px) 580px, (min-width: 640px) 710px, \" \/><\/a><\/div><\/div><\/div><\/div><div class=\"awb-swiper-button awb-swiper-button-prev\"><i class=\"awb-icon-angle-left\" aria-hidden=\"true\"><\/i><\/div><div class=\"awb-swiper-button awb-swiper-button-next\"><i class=\"awb-icon-angle-right\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-3604","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Les Workshops des RCyberARA2025<\/title>\n<meta name=\"description\" content=\"11 opportunit\u00e9s de s\u2019informer de fa\u00e7on privil\u00e9gi\u00e9e sur une th\u00e9matique d\u00e9finie, de mieux conna\u00eetre les solutions pour y r\u00e9pondre et d\u2019\u00e9changer avec des experts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les Workshops des RCyberARA2025\" \/>\n<meta property=\"og:description\" content=\"11 opportunit\u00e9s de s\u2019informer de fa\u00e7on privil\u00e9gi\u00e9e sur une th\u00e9matique d\u00e9finie, de mieux conna\u00eetre les solutions pour y r\u00e9pondre et d\u2019\u00e9changer avec des experts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/\" \/>\n<meta property=\"og:site_name\" content=\"RCyberARA2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T17:05:37+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/\",\"url\":\"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/\",\"name\":\"Les Workshops des RCyberARA2025\",\"isPartOf\":{\"@id\":\"https:\/\/tdfcyber.fr\/rcyberara2025\/#website\"},\"datePublished\":\"2025-04-28T07:00:43+00:00\",\"dateModified\":\"2025-06-09T17:05:37+00:00\",\"description\":\"11 opportunit\u00e9s de s\u2019informer de fa\u00e7on privil\u00e9gi\u00e9e sur une th\u00e9matique d\u00e9finie, de mieux conna\u00eetre les solutions pour y r\u00e9pondre et d\u2019\u00e9changer avec des experts.\",\"breadcrumb\":{\"@id\":\"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/tdfcyber.fr\/rcyberara2025\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les Workshops\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tdfcyber.fr\/rcyberara2025\/#website\",\"url\":\"https:\/\/tdfcyber.fr\/rcyberara2025\/\",\"name\":\"RCyberARA2025\",\"description\":\"Rencontres de la Cybers\u00e9curit\u00e9 Auvergne-Rh\u00f4ne-Alpes 2025\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tdfcyber.fr\/rcyberara2025\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les Workshops des RCyberARA2025","description":"11 opportunit\u00e9s de s\u2019informer de fa\u00e7on privil\u00e9gi\u00e9e sur une th\u00e9matique d\u00e9finie, de mieux conna\u00eetre les solutions pour y r\u00e9pondre et d\u2019\u00e9changer avec des experts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/","og_locale":"fr_FR","og_type":"article","og_title":"Les Workshops des RCyberARA2025","og_description":"11 opportunit\u00e9s de s\u2019informer de fa\u00e7on privil\u00e9gi\u00e9e sur une th\u00e9matique d\u00e9finie, de mieux conna\u00eetre les solutions pour y r\u00e9pondre et d\u2019\u00e9changer avec des experts.","og_url":"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/","og_site_name":"RCyberARA2025","article_modified_time":"2025-06-09T17:05:37+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/","url":"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/","name":"Les Workshops des RCyberARA2025","isPartOf":{"@id":"https:\/\/tdfcyber.fr\/rcyberara2025\/#website"},"datePublished":"2025-04-28T07:00:43+00:00","dateModified":"2025-06-09T17:05:37+00:00","description":"11 opportunit\u00e9s de s\u2019informer de fa\u00e7on privil\u00e9gi\u00e9e sur une th\u00e9matique d\u00e9finie, de mieux conna\u00eetre les solutions pour y r\u00e9pondre et d\u2019\u00e9changer avec des experts.","breadcrumb":{"@id":"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/tdfcyber.fr\/rcyberara2025\/workshops_rcyberara\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/tdfcyber.fr\/rcyberara2025\/"},{"@type":"ListItem","position":2,"name":"Les Workshops"}]},{"@type":"WebSite","@id":"https:\/\/tdfcyber.fr\/rcyberara2025\/#website","url":"https:\/\/tdfcyber.fr\/rcyberara2025\/","name":"RCyberARA2025","description":"Rencontres de la Cybers\u00e9curit\u00e9 Auvergne-Rh\u00f4ne-Alpes 2025","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tdfcyber.fr\/rcyberara2025\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-json\/wp\/v2\/pages\/3604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-json\/wp\/v2\/comments?post=3604"}],"version-history":[{"count":8,"href":"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-json\/wp\/v2\/pages\/3604\/revisions"}],"predecessor-version":[{"id":4316,"href":"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-json\/wp\/v2\/pages\/3604\/revisions\/4316"}],"wp:attachment":[{"href":"https:\/\/tdfcyber.fr\/rcyberara2025\/wp-json\/wp\/v2\/media?parent=3604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}