{"id":50024,"date":"2018-08-22T08:00:37","date_gmt":"2018-08-22T06:00:37","guid":{"rendered":"http:\/\/e3mag.com\/?p=50024"},"modified":"2022-05-01T10:16:08","modified_gmt":"2022-05-01T08:16:08","slug":"reseautage-sans-facteur-aleatoire","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/reseautage-sans-facteur-aleatoire\/","title":{"rendered":"R\u00e9seautage sans facteur al\u00e9atoire"},"content":{"rendered":"<p>Les r\u00e9ponses \u00e0 ces questions et \u00e0 bien d'autres seront donn\u00e9es lors des conf\u00e9rences et des tables rondes du sommet strat\u00e9gique IT et Information Security. L'\u00e9v\u00e9nement offre la possibilit\u00e9 d'\u00e9changer pr\u00e9cis\u00e9ment sur ces th\u00e8mes avec des coll\u00e8gues sp\u00e9cialis\u00e9s sur un pied d'\u00e9galit\u00e9.<\/p>\n<p>En outre, des entreprises pr\u00e9senteront leurs strat\u00e9gies qui, combin\u00e9es \u00e0 des ateliers, fourniront l'input ad\u00e9quat pour d\u00e9velopper de nouvelles id\u00e9es et approches de solutions. Parmi les th\u00e8mes abord\u00e9s figurent le cryptage des donn\u00e9es de cybers\u00e9curit\u00e9 dans le cloud et la cybers\u00e9curit\u00e9 en tant qu'\u00e9l\u00e9ment essentiel de la r\u00e9silience des entreprises et dans les syst\u00e8mes de contr\u00f4le industriels.<\/p>\n<p>Lors de la table ronde, la question sera de savoir comment les C(I)SO doivent r\u00e9agir aux exigences de la num\u00e9risation et aux menaces externes.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sommet strat\u00e9gique IT &amp; Information Security, 4 et 5 juillet 2018, Berlin.<br \/>\nComment g\u00e9rer des situations de menaces complexes ? Comment d\u00e9terminer qui peut acc\u00e9der \u00e0 quoi ? O\u00f9 sont les points faibles ? Pourquoi le cloud repr\u00e9sente-t-il un risque et pourquoi justement ne le repr\u00e9sente-t-il pas ?<\/p>","protected":false},"author":38,"featured_media":50025,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,23656],"tags":[39,4780,601],"coauthors":[19920],"class_list":["post-50024","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-1807","tag-cloud","tag-cyber-security","tag-digitalisierung","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Strategiegipfel IT &#038; Information Security, 4. und 5. Juli 2018, Berlin.<br \/>\nWie geht man mit komplexen Bedrohungssituationen um? Wie bestimmt man, wem man Zugriff auf was gestattet? Wo die eigenen Schwachstellen? Warum stellt Cloud ein Risiko dar und warum gerade nicht?<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/categorie\/sap-nouvelles\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/mag-1807\/\" rel=\"category tag\">MAG 18-07<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/50024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=50024"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/50024\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/50025"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=50024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=50024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=50024"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=50024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}