{"id":217,"date":"2021-11-17T19:53:56","date_gmt":"2021-11-17T19:53:56","guid":{"rendered":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/?p=217"},"modified":"2021-12-02T16:01:38","modified_gmt":"2021-12-02T16:01:38","slug":"atelier-1-1-comment-adresser-la-cybersecurite-dans-le-monde-municipal-par-un-profil-de-competences-proportionnel","status":"publish","type":"post","link":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/2021\/11\/17\/atelier-1-1-comment-adresser-la-cybersecurite-dans-le-monde-municipal-par-un-profil-de-competences-proportionnel\/","title":{"rendered":"Atelier 1-1 Comment adresser la cybers\u00e9curit\u00e9 dans le monde municipal par un profil de comp\u00e9tences proportionnel"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb admin_label=\u00a0\u00bbHero\u00a0\u00bb _builder_version=\u00a0\u00bb3.22&Prime; use_background_color_gradient=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_start=\u00a0\u00bb#ffffff\u00a0\u00bb background_color_gradient_end=\u00a0\u00bb#e7edf9&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb100px||100px|\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb130px||130px|\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_2,1_4,1_4&Prime; admin_label=\u00a0\u00bbtitle and illustration\u00a0\u00bb _builder_version=\u00a0\u00bb3.25&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; header_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_font_size=\u00a0\u00bb46px\u00a0\u00bb header_line_height=\u00a0\u00bb1.3em\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_direction=\u00a0\u00bbtop\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1>Atelier 1-1<\/h1>\n<p>[\/et_pb_text][et_pb_divider color=\u00a0\u00bb#4646c4&Prime; divider_position=\u00a0\u00bbcenter\u00a0\u00bb divider_weight=\u00a0\u00bb2px\u00a0\u00bb _builder_version=\u00a0\u00bb3.2&Prime; max_width=\u00a0\u00bb90px\u00a0\u00bb max_width_tablet=\u00a0\u00bb12%\u00a0\u00bb max_width_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_delay=\u00a0\u00bb50ms\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; header_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_font_size=\u00a0\u00bb46px\u00a0\u00bb header_line_height=\u00a0\u00bb1.3em\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_direction=\u00a0\u00bbtop\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1 style=\"text-align: left;\">Comment adresser la cybers\u00e9curit\u00e9 dans le monde municipal par un profil de comp\u00e9tences proportionnel<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/11\/Pierre-Martin-Tardif2.jpg\u00a0\u00bb title_text=\u00a0\u00bbPierre-Martin Tardif2&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb90px|||\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb always_center_on_mobile=\u00a0\u00bboff\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#7e7f93&Prime; text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#4646c4&Prime; header_3_font_size=\u00a0\u00bb36px\u00a0\u00bb header_3_line_height=\u00a0\u00bb1.4em\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3><strong>Pierre-Martin Tardif<\/strong><\/h3>\n<p>Professeur, Universit\u00e9 de Sherbrooke<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/11\/Manon-Ghislaine-Guillemette2.jpg\u00a0\u00bb title_text=\u00a0\u00bbManon Ghislaine Guillemette2&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb90px|||\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb always_center_on_mobile=\u00a0\u00bboff\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#7e7f93&Prime; text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#4646c4&Prime; header_3_font_size=\u00a0\u00bb36px\u00a0\u00bb header_3_line_height=\u00a0\u00bb1.4em\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3><strong>Manon Ghislaine Guillemette<\/strong><\/h3>\n<p>Professeure,\u00a0Universit\u00e9 de Sherbrooke<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\"><strong>Contexte<\/strong><br \/>Que ce soit par l&rsquo;omnipr\u00e9sence des menaces \u00e0 la cybers\u00e9curit\u00e9, tels les ran\u00e7ongiciels, que par la conformit\u00e9 au projet de loi 64 qui s\u2019\u00e9talera dans les trois prochaines ann\u00e9es, il appert que les municipalit\u00e9s qu\u00e9b\u00e9coises devront am\u00e9liorer leur maturit\u00e9 au niveau de la gestion de la s\u00e9curit\u00e9 de l&rsquo;information. Or, en pleine p\u00e9riode de p\u00e9nurie de la main-d\u2019oeuvre, il existe des contraintes importantes au niveau de la disponibilit\u00e9 des ressources expertes et ce, m\u00eame si l\u2019expertise en cybers\u00e9curit\u00e9 de la ville d\u00e9pende enti\u00e8rement de ressources externes. Dans le cas de ressources externes, son vis-\u00e0-vis interne doit poss\u00e9der les connaissances qui lui permettent d\u2019\u00e9valuer les propositions qui lui sont faites, de surveiller la qualit\u00e9 des services rendus et de s\u2019assurer que les orientations sont ad\u00e9quatement communiqu\u00e9es.<\/p>\n<p style=\"text-align: justify;\"><strong>Contenu<\/strong><br \/>Cette pr\u00e9sentation se veut un regard pragmatique et vulgaris\u00e9 sur les comp\u00e9tences n\u00e9cessaires \u00e0 la bonne gouvernance des efforts en cybers\u00e9curit\u00e9 d\u2019une municipalit\u00e9. Elle proposera le parcours d\u2019une personne qui d\u00e9sire d\u00e9velopper ses connaissances en cybers\u00e9curit\u00e9, qu\u2019elle ait ou non un profil en technologie. Il est important, de fa\u00e7on \u00e0 pallier le manque criant de ressources en technologie, d\u2019\u00e9largir les horizons du recrutement pour des m\u00e9tiers \u00ab non traditionnels \u00bb en cybers\u00e9curit\u00e9. La pr\u00e9sentatrice et le pr\u00e9sentateur fourniront des exemples concrets de personnes qui ont \u00e9largi leur parcours professionnel afin d\u2019inclure la cybers\u00e9curit\u00e9.<\/p>\n<p style=\"text-align: justify;\">De fa\u00e7on \u00e0 faciliter son adaptation \u00e0 la r\u00e9alit\u00e9 de chaque organisation li\u00e9e au monde municipal, ce parcours sera segment\u00e9 par niveaux de maturit\u00e9. Ainsi, la perspective adopt\u00e9e pourra s\u2019appliquer autant dans une petite ou une grande municipalit\u00e9, MRC et autre. De plus, des principes directeurs expliqueront comment adapter le parcours selon les besoins et contraintes de son organisation.<\/p>\n<p style=\"text-align: justify;\">Enfin, une ou un gestionnaire d\u2019une municipalit\u00e9 ou d\u2019une MRC comprendra mieux les aptitudes et les comp\u00e9tences qui sont n\u00e9cessaires en cybers\u00e9curit\u00e9, notamment comment les d\u00e9velopper en fonction des ressources qui sont \u00e0 sa disposition.<\/p>\n<p style=\"text-align: justify;\"><strong>R\u00e9f\u00e9rences<\/strong><br \/>La pr\u00e9sentation s\u2019appuie sur le cadre Skills Framework for the Information Age (SFIA). Le SFIA d\u00e9crit les aptitudes et comp\u00e9tences requises par les professionnels occupant des r\u00f4les, entre autres, dans la transformation num\u00e9rique. Il s\u2019agit d\u2019un cadre internationalement reconnu, tenu \u00e0 jour et vulgaris\u00e9.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime;][et_pb_column _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb type=\u00a0\u00bb1_3&Prime;][\/et_pb_column][et_pb_column _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb type=\u00a0\u00bb1_3&Prime;][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/08\/cyber-security-icon-29.png\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb title_text=\u00a0\u00bbcyber-security-icon-29&Prime; hover_enabled=\u00a0\u00bb0&Prime; sticky_enabled=\u00a0\u00bb0&Prime; width=\u00a0\u00bb50%\u00a0\u00bb align=\u00a0\u00bbcenter\u00a0\u00bb][\/et_pb_image][et_pb_button button_text=\u00a0\u00bbINSCRIPTION\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb button_url=\u00a0\u00bbhttps:\/\/www.evenementlepointensante.com\/colloque\/colloque-cybersecurite-secteur-municipal\/\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_bg_color=\u00a0\u00bb#5bd8dd\u00a0\u00bb button_bg_enable_color=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb17px\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb100px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_font=\u00a0\u00bbOverpass|900||on|||||\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; sticky_enabled=\u00a0\u00bb0&Prime; url_new_window=\u00a0\u00bbon\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb type=\u00a0\u00bb1_3&Prime;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbSpeakers\u00a0\u00bb _builder_version=\u00a0\u00bb3.22&Prime; custom_padding=\u00a0\u00bb90px||90px|\u00a0\u00bb animation_style=\u00a0\u00bbzoom\u00a0\u00bb animation_intensity_zoom=\u00a0\u00bb10%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_3,2_3&Prime; disabled_on=\u00a0\u00bbon|on|on\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb40px|0px|40px|0px\u00a0\u00bb disabled=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/11\/portrait-square-05.jpg\u00a0\u00bb _builder_version=\u00a0\u00bb3.23&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb90px|||\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb always_center_on_mobile=\u00a0\u00bboff\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_social_media_follow _builder_version=\u00a0\u00bb3.0.105&Prime; text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_social_media_follow_network social_network=\u00a0\u00bbfacebook\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bbtwitter\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bblinkedin\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bbgoogle-plus\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]google-plus[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_3&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb3.27.4&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#7e7f93&Prime; text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#4646c4&Prime; header_3_font_size=\u00a0\u00bb36px\u00a0\u00bb header_3_line_height=\u00a0\u00bb1.4em\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3>Ionut Zamfir<\/h3>\n<p>Front End Developer, Elegant Themes<br \/>\n[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb3.27.4&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_font_size=\u00a0\u00bb18px\u00a0\u00bb text_line_height=\u00a0\u00bb1.8em\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]Curabitur arcu erat, accumsan id imperdiet et, porttitor at sem. Proin eget tortor risus. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Donec velit neque, auctor sit amet aliquam vel ullamcorper.<\/p>\n<p><strong>Rapid Prototyping Tools:<\/strong> Saturday @ 1:00pm<\/p>\n<p><strong style=\"font-size: 18px;\">Intro to jQuery Workshop:<\/strong><span style=\"font-size: 18px;\"> Sunday @ 9:00am<\/span><br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Atelier 1-1Comment adresser la cybers\u00e9curit\u00e9 dans le monde municipal par un profil de comp\u00e9tences proportionnelPierre-Martin Tardif Professeur, Universit\u00e9 de SherbrookeManon Ghislaine Guillemette Professeure,\u00a0Universit\u00e9 de SherbrookeContexteQue ce soit par l&rsquo;omnipr\u00e9sence des menaces \u00e0 la cybers\u00e9curit\u00e9, tels les ran\u00e7ongiciels, que par la conformit\u00e9 au projet de loi 64 qui s\u2019\u00e9talera dans les trois prochaines ann\u00e9es, il appert [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[22,21],"tags":[],"class_list":["post-217","post","type-post","status-publish","format-standard","hentry","category-ateliers-programmation","category-programmation"],"_links":{"self":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/comments?post=217"}],"version-history":[{"count":10,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/217\/revisions"}],"predecessor-version":[{"id":341,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/217\/revisions\/341"}],"wp:attachment":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/media?parent=217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/categories?post=217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/tags?post=217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}