{"id":253,"date":"2021-11-18T15:45:15","date_gmt":"2021-11-18T15:45:15","guid":{"rendered":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/?p=253"},"modified":"2021-12-02T16:04:14","modified_gmt":"2021-12-02T16:04:14","slug":"atelier-1-3-pourquoi-utiliser-un-cadre-de-conformite-dans-le-milieu-municipal","status":"publish","type":"post","link":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/2021\/11\/18\/atelier-1-3-pourquoi-utiliser-un-cadre-de-conformite-dans-le-milieu-municipal\/","title":{"rendered":"Atelier 1-3 Pourquoi utiliser un cadre de conformit\u00e9 dans le milieu municipal"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb admin_label=\u00a0\u00bbHero\u00a0\u00bb _builder_version=\u00a0\u00bb3.22&Prime; use_background_color_gradient=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_start=\u00a0\u00bb#ffffff\u00a0\u00bb background_color_gradient_end=\u00a0\u00bb#e7edf9&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb100px||100px|\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb130px||130px|\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb3_4,1_4&Prime; admin_label=\u00a0\u00bbtitle and illustration\u00a0\u00bb _builder_version=\u00a0\u00bb3.25&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_4&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; header_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_font_size=\u00a0\u00bb46px\u00a0\u00bb header_line_height=\u00a0\u00bb1.3em\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_direction=\u00a0\u00bbtop\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1>Atelier 1-3<\/h1>\n<p>[\/et_pb_text][et_pb_divider color=\u00a0\u00bb#4646c4&Prime; divider_position=\u00a0\u00bbcenter\u00a0\u00bb divider_weight=\u00a0\u00bb2px\u00a0\u00bb _builder_version=\u00a0\u00bb3.2&Prime; max_width=\u00a0\u00bb90px\u00a0\u00bb max_width_tablet=\u00a0\u00bb12%\u00a0\u00bb max_width_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_delay=\u00a0\u00bb50ms\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; header_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_font_size=\u00a0\u00bb46px\u00a0\u00bb header_line_height=\u00a0\u00bb1.3em\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_direction=\u00a0\u00bbtop\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1 style=\"text-align: left;\">Pourquoi utiliser un cadre de conformit\u00e9 dans le milieu municipal<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/11\/Steve-Lavoie2.jpg\u00a0\u00bb title_text=\u00a0\u00bbSteve Lavoie2&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb90px|||\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb always_center_on_mobile=\u00a0\u00bboff\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#7e7f93&Prime; text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#4646c4&Prime; header_3_font_size=\u00a0\u00bb36px\u00a0\u00bb header_3_line_height=\u00a0\u00bb1.4em\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3><strong>Steve Lavoie<\/strong><\/h3>\n<p><span class=\"JsGRdQ\">Directeur solutions TI, CISSP,\u00a0 <\/span><span class=\"JsGRdQ\">Micromedica<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\">Bien souvent, les approches en s\u00e9curit\u00e9 des TI semblent r\u00e9alistes seulement pour les grandes villes et municipalit\u00e9s, alors que la tr\u00e8s grande majorit\u00e9 municipalit\u00e9s sont de petite taille. Ces municipalit\u00e9s de petite taille sont souvent oubli\u00e9es par l\u2019industrie alors qu\u2019elles sont souvent tr\u00e8s vuln\u00e9rables \u00e0 de multiples attaques. De plus, la grande majorit\u00e9 d\u2019entre elles ne se sent pas concern\u00e9e, car leur \u00e9quipe de gestion estime qu\u2019elles ne sont d&rsquo;aucun int\u00e9r\u00eat pour un \u00ab pirate \u00bb. Aussi, pour plusieurs de ces dirigeants, la s\u00e9curit\u00e9 des TI \u00e9quivaut trop souvent \u00e0 ne pas \u00eatre la cible d\u2019un \u00ab ransomware \u00bb, alors que les nouvelles l\u00e9gislations comme le PL64 s\u2019attarde plus \u00e0 la protection des donn\u00e9es et \u00e0 assurer la s\u00e9curit\u00e9 de leur infrastructure est la pr\u00e9misse de base pour prot\u00e9ger les donn\u00e9es qu\u2019ils h\u00e9bergent.<\/p>\n<p style=\"text-align: justify;\">Donc avec la recrudescence des cyberattaques et les nouvelles l\u00e9gislations comme le PL64, de nombreuses municipalit\u00e9s sont consid\u00e9rablement d\u00e9sempar\u00e9es devant la mise en place des mesures appropri\u00e9es.<\/p>\n<p style=\"text-align: justify;\">La grande majorit\u00e9 des municipalit\u00e9s qu\u00e9b\u00e9coises n&rsquo;a pas d&rsquo;\u00e9quipe TI et encore moins d&rsquo; \u00e9quipe de s\u00e9curit\u00e9 en TI, alors leurs dirigeants sont dans le n\u00e9ant pour avoir une vue d&rsquo;ensemble de leurs TI (autant op\u00e9rationnellement que s\u00e9curitairement). Ils sont bien souvent \u00e0 la merci de l&rsquo;ensemble des consultants qui se sont succ\u00e9d\u00e9 dans leur entreprise avec une exp\u00e9rience et une pr\u00e9occupation pour la s\u00e9curit\u00e9 tr\u00e8s variable. Le conf\u00e9rencier sugg\u00e8re une approche par l&rsquo;usage d&rsquo;un cadre de conformit\u00e9, comme pr\u00e9misse \u00e0 une politique de s\u00e9curit\u00e9 de l&rsquo; information et comme moyen pour avoir une vision holistique de leur infrastructure.<\/p>\n<p style=\"text-align: justify;\">Cet atelier pr\u00e9sentera ensuite bri\u00e8vement diff\u00e9rents cadres (ISO27001, CIS, NIST CSF, etc.) et \u00e9tablit des comparatifs entre eux. De plus, il permettra de d\u00e9mystifier un peu le domaine de la \u00ab\u00a0compliance\u00a0\u00bb dans une approche pratico-pratique. Finalement, le conf\u00e9rencier pr\u00e9sentera le cadre Cyber Secure PME du gouvernement f\u00e9d\u00e9ral comme une alternative r\u00e9aliste et appropri\u00e9e pour une petite municipalit\u00e9.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/08\/cyber-security-icon-29.png\u00a0\u00bb title_text=\u00a0\u00bbcyber-security-icon-29&Prime; align=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb50%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_button button_url=\u00a0\u00bbhttps:\/\/www.evenementlepointensante.com\/colloque\/colloque-cybersecurite-secteur-municipal\/\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbINSCRIPTION\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb17px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#5bd8dd\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb100px\u00a0\u00bb button_font=\u00a0\u00bbOverpass|900||on|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbSpeakers\u00a0\u00bb _builder_version=\u00a0\u00bb3.22&Prime; custom_padding=\u00a0\u00bb90px||90px|\u00a0\u00bb animation_style=\u00a0\u00bbzoom\u00a0\u00bb animation_intensity_zoom=\u00a0\u00bb10%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_3,2_3&Prime; disabled_on=\u00a0\u00bbon|on|on\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb40px|0px|40px|0px\u00a0\u00bb disabled=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/11\/portrait-square-05.jpg\u00a0\u00bb _builder_version=\u00a0\u00bb3.23&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb90px|||\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb always_center_on_mobile=\u00a0\u00bboff\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_social_media_follow _builder_version=\u00a0\u00bb3.0.105&Prime; text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_social_media_follow_network social_network=\u00a0\u00bbfacebook\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bbtwitter\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bblinkedin\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bbgoogle-plus\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]google-plus[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_3&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb3.27.4&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#7e7f93&Prime; text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#4646c4&Prime; header_3_font_size=\u00a0\u00bb36px\u00a0\u00bb header_3_line_height=\u00a0\u00bb1.4em\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3>Ionut Zamfir<\/h3>\n<p>Front End Developer, Elegant Themes<br \/>\n[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb3.27.4&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_font_size=\u00a0\u00bb18px\u00a0\u00bb text_line_height=\u00a0\u00bb1.8em\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]Curabitur arcu erat, accumsan id imperdiet et, porttitor at sem. Proin eget tortor risus. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Donec velit neque, auctor sit amet aliquam vel ullamcorper.<\/p>\n<p><strong>Rapid Prototyping Tools:<\/strong> Saturday @ 1:00pm<\/p>\n<p><strong style=\"font-size: 18px;\">Intro to jQuery Workshop:<\/strong><span style=\"font-size: 18px;\"> Sunday @ 9:00am<\/span><br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Atelier 1-3Pourquoi utiliser un cadre de conformit\u00e9 dans le milieu municipalSteve Lavoie Directeur solutions TI, CISSP,\u00a0 MicromedicaBien souvent, les approches en s\u00e9curit\u00e9 des TI semblent r\u00e9alistes seulement pour les grandes villes et municipalit\u00e9s, alors que la tr\u00e8s grande majorit\u00e9 municipalit\u00e9s sont de petite taille. Ces municipalit\u00e9s de petite taille sont souvent oubli\u00e9es par l\u2019industrie alors [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[22,21],"tags":[],"class_list":["post-253","post","type-post","status-publish","format-standard","hentry","category-ateliers-programmation","category-programmation"],"_links":{"self":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/comments?post=253"}],"version-history":[{"count":5,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/253\/revisions"}],"predecessor-version":[{"id":346,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/253\/revisions\/346"}],"wp:attachment":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/media?parent=253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/categories?post=253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/tags?post=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}