{"id":51638,"date":"2019-04-16T14:09:45","date_gmt":"2019-04-16T18:09:45","guid":{"rendered":"https:\/\/www.cyberark.com\/cisoview-2\/"},"modified":"2024-03-19T06:03:28","modified_gmt":"2024-03-19T10:03:28","slug":"cisoview","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/cisoview\/","title":{"rendered":"CISOView"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text]<\/p>\n<h1>CISO View<\/h1>\n<h2>Des recommandations entre pairs formul\u00e9es par des RSSI de premier plan.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbT\u00e9l\u00e9charger maintenant\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresources%2Fwhite-papers%2Fciso-view-protection-des-acc%25C3%25A8s-%25C3%25A0-privil%25C3%25A8ges-dans-un-mod%25C3%25A8le-zero-trust-synth%25C3%25A8se|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center\u00a0\u00bb][vc_column][vc_column_text]<\/p>\n<h2 class=\"vc_custom_heading\">\u00c0 propos de la s\u00e9rie de rapports CISO View<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-btm text-md-center\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text]<\/p>\n<h5>La s\u00e9rie de rapports CISO\u00a0View est d\u00e9velopp\u00e9e en collaboration avec le cabinet d\u2019\u00e9tude ind\u00e9pendant Robinson\u00a0Insight et r\u00e9unit d\u2019\u00e9minents RSSI qui partagent des informations entre pairs afin d\u2019aider les \u00e9quipes de s\u00e9curit\u00e9 \u00e0 \u00e9laborer des strat\u00e9gies de cybers\u00e9curit\u00e9 efficaces.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 seesaw cybv2-pad-btm\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove wistia_embed\u00a0\u00bb][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_aswr8gsmnr videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Prot\u00e9gez les acc\u00e8s \u00e0 privil\u00e8ges tout en passant au Zero\u00a0Trust<\/h4>\n<p>La transformation num\u00e9rique et la mobilit\u00e9 des entreprises sapent rapidement le mod\u00e8le de s\u00e9curit\u00e9 traditionnel bas\u00e9 sur le p\u00e9rim\u00e8tre. Alors que le p\u00e9rim\u00e8tre se dissout, comment les entreprises peuvent-elles prot\u00e9ger l\u2019acc\u00e8s \u00e0 leurs ressources les plus pr\u00e9cieuses\u00a0\u2013 donn\u00e9es, applications et infrastructures\u00a0\u2013, sur site ou dans le cloud\u00a0?<\/p>\n<p>Nous avons interrog\u00e9 un panel de 12\u00a0RSSI du Global\u00a01000 \u00e0 propos de l\u2019\u00e9volution du paysage des risques, y\u00a0compris l\u2019\u00e9volution des techniques d\u2019attaque ciblant les acc\u00e8s \u00e0 privil\u00e8ges. Les membres du panel ont formul\u00e9 des recommandations sp\u00e9cifiques pour att\u00e9nuer les risques \u00e0 l\u2019aide d\u2019un mod\u00e8le Zero\u00a0Trust. Ce rapport est l\u2019un des premiers \u00e0 fournir des informations concr\u00e8tes et op\u00e9rationnelles aux RSSI et \u00e0 leurs \u00e9quipes pour la mise en \u0153uvre d\u2019un mod\u00e8le Zero\u00a0Trust.<\/p>\n<p>En compl\u00e9ment, nous avons publi\u00e9 l\u2019<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/the-ciso-view-2021-survey-zero-trust-and-privileged-access\">Enqu\u00eate CISO View\u00a02021\u00a0: Zero Trust et acc\u00e8s \u00e0 privil\u00e8ges<\/a>. Apr\u00e8s avoir eu l\u2019avis de notre panel, nous avons voulu savoir si la communaut\u00e9 des professionnels de la s\u00e9curit\u00e9 au sens large partageait leurs perspectives. Pour ce faire, nous avons interrog\u00e9 100\u00a0responsables de la s\u00e9curit\u00e9 de grandes entreprises (r\u00e9alisant plus d\u2019un milliard\u00a0USD de chiffres d\u2019affaires annuel). Tant les participants \u00e0 l\u2019enqu\u00eate que les membres du panel font \u00e9tat d\u2019un large consensus sur la valeur du mod\u00e8le Zero\u00a0Trust, ainsi que d\u2019un sentiment croissant d\u2019urgence par rapport \u00e0 la s\u00e9curisation des acc\u00e8s \u00e0 privil\u00e8ges.[\/vc_column_text][vc_btn title=\u00a0\u00bbLire le rapport\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-a-zero-trust-model|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-btm text-md-center\u00a0\u00bb][vc_column][vc_column_text]<\/p>\n<h2 class=\"vc_custom_heading\">Autres rapports de la s\u00e9rie<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-left\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Prot\u00e9ger les acc\u00e8s \u00e0 privil\u00e8ges dans l\u2019automatisation des processus par la robotique<\/h4>\n<h6 class=\"vc_custom_heading\">S\u00e9curiser les flux de travail RPA<\/h6>\n<p>Les technologies de RPA (automatisation des processus par la robotique) permettent de gagner rapidement en efficacit\u00e9, en productivit\u00e9 et en qualit\u00e9. Du point de vue de la cybers\u00e9curit\u00e9, la RPA offre une nouvelle surface d\u2019attaque attrayante et la prolif\u00e9ration des acc\u00e8s \u00e0 privil\u00e8ges constitue un probl\u00e8me de premier plan.<\/p>\n<p>Ce rapport CISO\u00a0View examine les probl\u00e8mes suivants\u00a0: Quelles techniques un attaquant peut-il employer pour exploiter l\u2019acc\u00e8s \u00e0 privil\u00e8ges dans les syst\u00e8mes RPA\u00a0? Quels sont les principaux risques\u00a0? Quels sont les contr\u00f4les les plus utiles et les plus faciles \u00e0 mettre en \u0153uvre\u00a0? Quels sont les facteurs cl\u00e9s de la r\u00e9ussite lorsque vous travaillez avec des parties prenantes commerciales\u00a0?[\/vc_column_text][vc_btn title=\u00a0\u00bbLire le rapport\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-robotic-process-automation|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_n1cxswixdq videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_rl2yohwgz5 videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Prot\u00e9ger les acc\u00e8s \u00e0 privil\u00e8ges<\/h4>\n<h6 class=\"vc_custom_heading\">S\u00e9curiser les environnements DevOps et cloud<\/h6>\n<p>Les avantages du d\u00e9veloppement logiciel rapide et de l\u2019automatisation des op\u00e9rations informatiques sont \u00e9vidents\u00a0: ils r\u00e9duisent les d\u00e9lais de commercialisation et les co\u00fbts. Mais qu\u2019en est-il des risques\u00a0? Comment s\u00e9curiser efficacement les environnements DevOps et Cloud\u00a0?<\/p>\n<p>Ce rapport CISO\u00a0View est fond\u00e9 sur l\u2019exp\u00e9rience de RSSI d\u2019entreprises du classement Global\u00a01000, ainsi que sur celle de professionnels de la s\u00e9curit\u00e9 et d\u2019experts techniques qui ont adapt\u00e9 et s\u00e9curis\u00e9 des environnements DevOps.[\/vc_column_text][vc_btn title=\u00a0\u00bbLire le rapport\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresources%2Fwhite-papers%2Fthe-ciso-view-prot%25C3%25A9ger-lacc%25C3%25A8s-privil%25C3%25A9gi%25C3%25A9-dans-les-environnements-devops-et-cloud|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw cyb-reverse\u00a0\u00bb][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-left\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>R\u00e9duction rapide des risques<\/h4>\n<h6 class=\"vc_custom_heading\">Un sprint de 30\u00a0jours pour prot\u00e9ger les identifiants \u00e0 privil\u00e8ges<\/h6>\n<p>Pour \u00e9viter les fuites de donn\u00e9es, vous devez conna\u00eetre les techniques utilis\u00e9es par les attaquants et les contr\u00f4les de s\u00e9curit\u00e9 qui permettent de les neutraliser. Ce rapport CISO\u00a0View donne un aper\u00e7u des le\u00e7ons tir\u00e9es de plusieurs violations de donn\u00e9es tr\u00e8s m\u00e9diatis\u00e9es. Il fournit des recommandations ainsi que le cadre d\u2019un sprint de 30\u00a0jours visant \u00e0 mettre rapidement en place des mesures de contr\u00f4le essentielles.[\/vc_column_text][vc_btn title=\u00a0\u00bbLire le rapport\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Frapid-risk-reduction-a-30-day-sprint-to-protect-privileged-credentials|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131862\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\" alt=\"Rapid Risk Reduction\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 seesaw\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/12&Prime; el_class=\u00a0\u00bbabove\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131870\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1.jpg\" alt=\"The Balancing Act\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb7\/12&Prime; el_class=\u00a0\u00bbbelow-right\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bbdark\u00a0\u00bb]<\/p>\n<h4>Trouver le juste \u00e9quilibre<\/h4>\n<h6 class=\"vc_custom_heading\">Le point de vue des RSSI sur l\u2019am\u00e9lioration des mesures de contr\u00f4le des acc\u00e8s \u00e0 privil\u00e8ges<\/h6>\n<p>Ce rapport fournit aux RSSI des conseils pratiques fond\u00e9s sur l\u2019exp\u00e9rience d\u2019entreprises de premier plan pour am\u00e9liorer les mesures de contr\u00f4le des acc\u00e8s \u00e0 privil\u00e8ges. Il inclut des recommandations sur la fa\u00e7on de trouver le juste \u00e9quilibre entre un niveau d\u2019acc\u00e8s \u00e0 l\u2019information trop \u00e9lev\u00e9 et trop restrictif.[\/vc_column_text][vc_btn title=\u00a0\u00bbLire le rapport\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-balancing-act-the-ciso-view-on-improving-privileged-access-controls|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 plp-overview-more-col\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime; el_class=\u00a0\u00bbtext-md-center heading\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-sm-offset-1&Prime;][vc_column_text]<\/p>\n<h3 class=\"vc_custom_heading cyb-ltr-spc-6\">\u00c0 propos de l\u2019approche CISO View et du groupe d\u2019experts<\/h3>\n<p class=\"vc_custom_heading\">Aujourd\u2019hui, les entreprises sont confront\u00e9es \u00e0 des cybermenaces de plus en plus sophistiqu\u00e9es. Chez CyberArk, nous pensons que le partage d\u2019informations et de conseils au sein de la communaut\u00e9 des RSSI contribuera au renforcement des strat\u00e9gies de s\u00e9curit\u00e9 et de la protection des entreprises.<\/p>\n<p class=\"vc_custom_heading\">CyberArk a confi\u00e9 au cabinet d\u2019\u00e9tude ind\u00e9pendant Robinson\u00a0Insight l\u2019initiative CISO\u00a0View, qui consiste \u00e0 examiner divers sujets li\u00e9s \u00e0 l\u2019am\u00e9lioration des mesures de contr\u00f4le des acc\u00e8s \u00e0 privil\u00e8ges. Cette initiative r\u00e9unit des RSSI de grandes entreprises mondiales pour partager leurs points de vue sur les enjeux primordiaux auxquels sont confront\u00e9s les responsables de la s\u00e9curit\u00e9, l\u2019objectif \u00e9tant de fournir de pr\u00e9cieuses recommandations entre pairs et une plateforme de partage d\u2019informations. Les personnes suivantes ont contribu\u00e9 aux rapports actuels et pr\u00e9c\u00e9dents et sont membres du panel CISO\u00a0View.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131879\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah.jpg\" alt=\"Alissa Adbullah\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Alissa (Dr Jay) Abdullah<\/h4>\n<p>SVP and Deputy Chief Security Officer, Mastercard[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131887\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin.jpg\" alt=\"Brad Arkin\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Brad Arkin<\/h4>\n<p>SVP, Chief Security &amp; Trust Officer, Cisco[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131895\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson.jpg\" alt=\"Tim Bengson\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Tim Bengson<\/h4>\n<p class=\"vc_custom_heading\">VP, Global Chief Information Security Officer, Kellogg Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131903\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli.jpg\" alt=\"Dawn Cappelli\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Dawn Cappelli<\/h4>\n<p class=\"vc_custom_heading\">VP, Global Security and Chief Information Security Officer, Rockwell Automation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131911\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho.jpg\" alt=\"Melissa Carvalho\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Melissa Carvalho<\/h4>\n<p>VP, Enterprise and Customer Identity and Access Management,<br \/>\nRoyal Bank of Canada (RBC)[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131919\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick.jpg\" alt=\"Dave Estlick\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Dave Estlick<\/h4>\n<p>Chief Information Security Officer, Chipotle[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131927\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle.jpg\" alt=\"Peter Fizelle\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Peter Fizelle<\/h4>\n<p>Chief Information Security Officer, Asian Development Bank[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131935\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon.jpg\" alt=\"Mike Gordon\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mike Gordon<\/h4>\n<p class=\"vc_custom_heading\">VP and Chief Information Security Officer, Lockheed Martin Corporation (LMC)<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131943\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja.jpg\" alt=\"Omar Khawaja\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Omar Khawaja<\/h4>\n<p>VP &#038; Chief Information Security Officer, Highmark Health[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131951\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault.jpg\" alt=\"Olivier Perrault\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Olivier Perrault<\/h4>\n<p>Cyber Security Officer, Orange Business Services[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131959\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith.jpg\" alt=\"Emma Smith\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Emma Smith<\/h4>\n<p>Global Security Director, Vodafone[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/4&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131967\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse.jpg\" alt=\"Daniel Tse\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Daniel Tse<\/h4>\n<p>Head, Cyber Security, Information &amp; Technology Risk, GIC Private Limited[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00a0\u00bbyes\u00a0\u00bb el_class=\u00a0\u00bbcybv2 plp-overview-more-col\u00a0\u00bb][vc_column width=\u00a0\u00bb5\/6&Prime; el_class=\u00a0\u00bbtext-md-center heading\u00a0\u00bb offset=\u00a0\u00bbvc_col-md-offset-1 vc_col-sm-offset-1&Prime;][vc_column_text]<\/p>\n<h3>Les personnes suivantes ont contribu\u00e9 aux rapports pr\u00e9c\u00e9dents<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Rob Bening<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer Emeritus, ING Bank<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">David Bruyea<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President &amp; Chief Information Security Officer, CIBC<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Jim Connelly<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, Lockheed Martin<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Khadir Fayaz<\/h4>\n<p class=\"vc_custom_heading\">Vice President, Global Security Strategy, Engineering &amp; Architecture, Pearson<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">John Gelinne<\/h4>\n<p class=\"vc_custom_heading\">Managing Director, Advisory Cyber Risk Services, Deloitte &#038; Touche<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Fred Gibbins<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President &amp; Chief Information Security Officer, American Express Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Charles Gillman<\/h4>\n<p class=\"vc_custom_heading\">Chief Security Officer, NTT Communications\u00a0\u2013 Cloud Infrastructure Services<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Steve Glynn<\/h4>\n<p class=\"vc_custom_heading\">Global Head of Information Security, ANZ<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mark Grant<\/h4>\n<p class=\"vc_custom_heading\">PhD, CIPP Chief Information Security Officer, CSX Corporation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Gary Harbison<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer, Monsanto Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Jim Motes<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, Rockwell Automation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Kathy Orner<\/h4>\n<p class=\"vc_custom_heading\">Chief Risk Officer, CWT<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mike Wilson<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, McKesson<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">JD Rogers<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer, American Financial Group<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">John Schramm<\/h4>\n<p class=\"vc_custom_heading\">CISA, CISSP, VP Global Information Risk Management &#038; CIRO, Manulife<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Chun Meng Tee<\/h4>\n<p class=\"vc_custom_heading\">Vice President and Head of Information Security, Singapore Exchange<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Thomas Tschersich<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President, Internal Security &amp; Cyber Defense, T-Systems International<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/6&Prime; el_class=\u00a0\u00bbcta-box\u00a0\u00bb][vc_column_text el_class=\u00a0\u00bblink-arrow-right\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Munawar Valiji<\/h4>\n<p class=\"vc_custom_heading\">Head of Information Security, News UK<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-btm text-center\u00a0\u00bb][vc_column][vc_column_text]*Fonction exerc\u00e9e au moment de la contribution.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_talk_to_an_expert\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608677118624{background-color: #061b2b !important;}\u00a0\u00bb][vc_column][vc_column_text el_class=\u00a0\u00bbextra-space\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">D\u00e9marrer<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=\u00a0\u00bbnew_hpstyle_section9_text\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\">Tirez parti de l\u2019expertise des RSSI les plus innovants du secteur pour vous aider \u00e0 \u00e9laborer d\u00e8s aujourd\u2019hui un programme de cybers\u00e9curit\u00e9 efficace.<\/p>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbT\u00e9l\u00e9charger maintenant\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb align=\u00a0\u00bbcenter\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-a-zero-trust-model%2F|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid cyb-button-hpstyle_section5&Prime;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] CISO View Des recommandations entre pairs formul\u00e9es par des RSSI de premier plan. [\/vc_column_text][vc_btn title=\u00a0\u00bbT\u00e9l\u00e9charger maintenant\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresources%2Fwhite-papers%2Fciso-view-protection-des-acc%25C3%25A8s-%25C3%25A0-privil%25C3%25A8ges-dans-un-mod%25C3%25A8le-zero-trust-synth%25C3%25A8se|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center\u00a0\u00bb][vc_column][vc_column_text] \u00c0 propos&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-51638","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Rapports RSSI\u00a0: Gestion des acc\u00e8s \u00e0 privil\u00e8ges pour les RSSI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/cisoview\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISOView\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] CISO View Des recommandations entre pairs formul\u00e9es par des RSSI de premier plan. [\/vc_column_text][vc_btn title=\u00a0\u00bbT\u00e9l\u00e9charger maintenant\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresources%2Fwhite-papers%2Fciso-view-protection-des-acc%25C3%25A8s-%25C3%25A0-privil%25C3%25A8ges-dans-un-mod%25C3%25A8le-zero-trust-synth%25C3%25A8se|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center\u00a0\u00bb][vc_column][vc_column_text] \u00c0 propos...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/cisoview\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-19T10:03:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/cisoview\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/cisoview\/\",\"name\":\"Rapports RSSI\u00a0: Gestion des acc\u00e8s \u00e0 privil\u00e8ges pour les RSSI\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/cisoview\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/cisoview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\",\"datePublished\":\"2019-04-16T18:09:45+00:00\",\"dateModified\":\"2024-03-19T10:03:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/cisoview\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/cisoview\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/cisoview\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/cisoview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISOView\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Rapports RSSI\u00a0: Gestion des acc\u00e8s \u00e0 privil\u00e8ges pour les RSSI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/cisoview\/","og_locale":"fr_FR","og_type":"article","og_title":"CISOView","og_description":"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] CISO View Des recommandations entre pairs formul\u00e9es par des RSSI de premier plan. [\/vc_column_text][vc_btn title=\u00a0\u00bbT\u00e9l\u00e9charger maintenant\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Ffr%2Fresources%2Fwhite-papers%2Fciso-view-protection-des-acc%25C3%25A8s-%25C3%25A0-privil%25C3%25A8ges-dans-un-mod%25C3%25A8le-zero-trust-synth%25C3%25A8se|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center\u00a0\u00bb][vc_column][vc_column_text] \u00c0 propos...","og_url":"https:\/\/www.cyberark.com\/fr\/cisoview\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-03-19T10:03:28+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/cisoview\/","url":"https:\/\/www.cyberark.com\/fr\/cisoview\/","name":"Rapports RSSI\u00a0: Gestion des acc\u00e8s \u00e0 privil\u00e8ges pour les RSSI","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/fr\/cisoview\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/cisoview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","datePublished":"2019-04-16T18:09:45+00:00","dateModified":"2024-03-19T10:03:28+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/cisoview\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/cisoview\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/cisoview\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/cisoview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"CISOView"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=51638"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51638\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=51638"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=51638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}