{"id":116871,"date":"2022-08-12T10:25:00","date_gmt":"2022-08-12T08:25:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=116871"},"modified":"2022-08-04T16:12:34","modified_gmt":"2022-08-04T14:12:34","slug":"entre-illusion-et-realite","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/zwischen-illusion-und-realitaet\/","title":{"rendered":"Entre illusion et r\u00e9alit\u00e9"},"content":{"rendered":"<p>Parall\u00e8lement, la cybers\u00e9curit\u00e9 est consid\u00e9r\u00e9e comme un facteur de cr\u00e9ation de valeur et prend une place plus importante dans le d\u00e9veloppement de nouveaux produits, services et mod\u00e8les commerciaux ainsi que dans la num\u00e9risation en g\u00e9n\u00e9ral. De l'avis de nombreux DSI et RSSI, la tendance \u00e0 l'utilisation du cloud devrait augmenter le niveau de s\u00e9curit\u00e9 informatique, mais elle n\u00e9cessite \u00e9galement une transformation de l'architecture de s\u00e9curit\u00e9 et des investissements plus importants. Les budgets pour la pr\u00e9vention, la d\u00e9tection des attaques et les mesures de r\u00e9cup\u00e9ration augmenteront donc en partie dans les ann\u00e9es \u00e0 venir. La cons\u00e9quence la plus fr\u00e9quente d'une cyberattaque est que 87 % des participants \u00e0 l'\u00e9tude s'attendent \u00e0 des dommages importants en termes d'image et de r\u00e9putation. 75 % craignent \u00e9galement une fuite des donn\u00e9es des clients, 73 % une fuite des donn\u00e9es critiques de l'entreprise. <\/p>\n\n\n\n<p>Le risque de demande de ran\u00e7on est jug\u00e9 \u00e9lev\u00e9 par 58% des entreprises. Malgr\u00e9 ce niveau de menace \u00e9lev\u00e9, 47 % des DSI et des RSSI sont tout \u00e0 fait d'accord avec l'affirmation selon laquelle ils sont en mesure de suivre les \u00e9volutions techniques en mati\u00e8re de cybers\u00e9curit\u00e9 et les m\u00e9thodes des pirates. En revanche, seuls 67 % mesurent la r\u00e9silience de la s\u00e9curit\u00e9 informatique sur la base d'indicateurs cl\u00e9s de performance (KPI) ; 24 % suppl\u00e9mentaires pr\u00e9voient toutefois de mettre en place des processus correspondants. Ce sont les r\u00e9sultats de la nouvelle \u00e9tude L\u00fcnendonk 2022 \"De la cybers\u00e9curit\u00e9 \u00e0 la cyberr\u00e9silience - plus de num\u00e9risation, plus de cybermenaces ?\", r\u00e9alis\u00e9e en collaboration avec KPMG.<\/p>","protected":false},"excerpt":{"rendered":"<p>Les cyber-attaques sont consid\u00e9r\u00e9es comme un danger imminent. Le degr\u00e9 croissant de num\u00e9risation permet de nouvelles portes d'entr\u00e9e.<\/p>","protected":false},"author":38,"featured_media":116872,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,40957],"tags":[8405,20346,26082,38439],"coauthors":[19920],"class_list":["post-116871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-22-07","tag-cyberangriffe","tag-cybersecurity","tag-cybersicherheit","tag-luenendonk-2","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Cyberangriffe werden als akute Gefahr gesehen. Der zunehmende Digitalisierungsgrad erm\u00f6glicht neue Einfallstore.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/category\/mag-22-07\/\" rel=\"category tag\">Mag 22-07<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/116871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=116871"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/116871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/116872"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=116871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=116871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=116871"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=116871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}