{"id":387,"date":"2021-12-13T20:40:26","date_gmt":"2021-12-13T20:40:26","guid":{"rendered":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/?p=387"},"modified":"2022-02-09T14:36:42","modified_gmt":"2022-02-09T14:36:42","slug":"atelier-1-4-bien-preparer-son-voyage-dans-linfonuagique-quelle-strategie-adopter-pour-assurer-la-securite-des-donnees","status":"publish","type":"post","link":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/2021\/12\/13\/atelier-1-4-bien-preparer-son-voyage-dans-linfonuagique-quelle-strategie-adopter-pour-assurer-la-securite-des-donnees\/","title":{"rendered":"Atelier 1-4 Bien pr\u00e9parer son voyage dans l\u2019infonuagique : quelle strat\u00e9gie adopter pour assurer la s\u00e9curit\u00e9 des donn\u00e9es ?"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb admin_label=\u00a0\u00bbHero\u00a0\u00bb _builder_version=\u00a0\u00bb3.22&Prime; use_background_color_gradient=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_start=\u00a0\u00bb#ffffff\u00a0\u00bb background_color_gradient_end=\u00a0\u00bb#e7edf9&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb100px||100px|\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb130px||130px|\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb3_4,1_4&Prime; admin_label=\u00a0\u00bbtitle and illustration\u00a0\u00bb _builder_version=\u00a0\u00bb3.25&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_4&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; header_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_font_size=\u00a0\u00bb46px\u00a0\u00bb header_line_height=\u00a0\u00bb1.3em\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_direction=\u00a0\u00bbtop\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1>Atelier 1-4<\/h1>\n<p>[\/et_pb_text][et_pb_divider color=\u00a0\u00bb#4646c4&Prime; divider_position=\u00a0\u00bbcenter\u00a0\u00bb divider_weight=\u00a0\u00bb2px\u00a0\u00bb _builder_version=\u00a0\u00bb3.2&Prime; max_width=\u00a0\u00bb90px\u00a0\u00bb max_width_tablet=\u00a0\u00bb12%\u00a0\u00bb max_width_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_delay=\u00a0\u00bb50ms\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; header_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_font_size=\u00a0\u00bb46px\u00a0\u00bb header_line_height=\u00a0\u00bb1.3em\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_direction=\u00a0\u00bbtop\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1 style=\"text-align: left;\">Bien pr\u00e9parer son voyage dans l\u2019infonuagique : quelle strat\u00e9gie adopter pour assurer la s\u00e9curit\u00e9 des donn\u00e9es ?<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/12\/Simon-Drapeau2.jpg\u00a0\u00bb title_text=\u00a0\u00bbSimon Drapeau2&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb90px|||\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb always_center_on_mobile=\u00a0\u00bboff\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#7e7f93&Prime; text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#4646c4&Prime; header_3_font_size=\u00a0\u00bb36px\u00a0\u00bb header_3_line_height=\u00a0\u00bb1.4em\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3><strong>Simon Drapeau<\/strong><\/h3>\n<p>Gestionnaire ing\u00e9nierie s\u00e9curit\u00e9 \u2013 Est du Canada, Check Point Software Technologies<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<p style=\"text-align: justify;\"><span>Au cours des 30 derni\u00e8res ann\u00e9es, Check Point Software Technologies Ltd. s&rsquo;est impos\u00e9 comme r\u00e9f\u00e9rence en mati\u00e8re de cybers\u00e9curit\u00e9. Notre mission : s\u00e9curiser tout votre environnement. Dans un monde num\u00e9rique en constante mutation \u2014 qu&rsquo;il s&rsquo;agisse de la transformation infonuagique, de la s\u00e9curisation des collaborateurs en t\u00e9l\u00e9travail ou encore de la d\u00e9fense des infrastructures critiques \u2014, nous prot\u00e9geons les entreprises contre les cybermenaces les plus r\u00e9centes.<\/span><\/p>\n<p style=\"text-align: justify;\"><span>Le courriel est le principal vecteur d&rsquo;attaque associ\u00e9 aux entreprises, mais aussi le plus efficace, principalement parce qu&rsquo;il repose sur le facteur humain pour r\u00e9ussir. Le t\u00e9l\u00e9travail aggrave encore le probl\u00e8me. En effet, les collaborateurs sont moins prudents et plus susceptibles de se laisser abuser par des attaques courriel et de communiquer leurs identifiants de connexion, par exemple. C&rsquo;est la raison pour laquelle les cybercriminels ciblent les comptes des suites de productivit\u00e9 et de messagerie infonuagique. La plupart des solutions de s\u00e9curit\u00e9 traditionnelles et int\u00e9gr\u00e9es \u00e0 ces suites sont incapables de prot\u00e9ger les utilisateurs contre ces attaques avanc\u00e9es. Vous devez sans doute vous demander si vos utilisateurs, leurs comptes et les donn\u00e9es sont r\u00e9ellement en s\u00e9curit\u00e9, surtout \u00e0 la lumi\u00e8re d&rsquo;\u00e9tudes r\u00e9centes r\u00e9v\u00e9lant que 77 % des compromissions infonuagiques impliquent des identifiants vol\u00e9s et compromis. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/08\/cyber-security-icon-29.png\u00a0\u00bb title_text=\u00a0\u00bbcyber-security-icon-29&Prime; align=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb50%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_button button_url=\u00a0\u00bbhttps:\/\/www.evenementlepointensante.com\/colloque\/colloque-cybersecurite-secteur-municipal\/\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbINSCRIPTION\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb17px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#5bd8dd\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb100px\u00a0\u00bb button_font=\u00a0\u00bbOverpass|900||on|||||\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbSpeakers\u00a0\u00bb _builder_version=\u00a0\u00bb3.22&Prime; custom_padding=\u00a0\u00bb90px||90px|\u00a0\u00bb animation_style=\u00a0\u00bbzoom\u00a0\u00bb animation_intensity_zoom=\u00a0\u00bb10%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_3,2_3&Prime; disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb40px|0px|40px|0px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/12\/Simon-Drapeau1.jpg\u00a0\u00bb title_text=\u00a0\u00bbSimon Drapeau1&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb90px|||\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb always_center_on_mobile=\u00a0\u00bboff\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_social_media_follow _builder_version=\u00a0\u00bb4.11.1&Prime; text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_social_media_follow_network social_network=\u00a0\u00bblinkedin\u00a0\u00bb url=\u00a0\u00bbhttps:\/\/ca.linkedin.com\/in\/simondrapeau\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]linkedin[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_3&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#7e7f93&Prime; text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#4646c4&Prime; header_3_font_size=\u00a0\u00bb36px\u00a0\u00bb header_3_line_height=\u00a0\u00bb1.4em\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3><strong>Simon Drapeau<\/strong><\/h3>\n<p>Gestionnaire ing\u00e9nierie s\u00e9curit\u00e9 \u2013 Est du Canada, Check Point Software Technologies<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_font_size=\u00a0\u00bb18px\u00a0\u00bb text_line_height=\u00a0\u00bb1.8em\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\">Simon Drapeau est actuellement gestionnaire ing\u00e9nierie s\u00e9curit\u00e9 \u2013 Est du Canada &#8211; chez Check Point Software Technologies Ltd. (<a href=\"http:\/\/www.checkpoint.com\">www.checkpoint.com<\/a>) qui est l\u2019un des principaux fournisseurs mondiaux de solutions de cybers\u00e9curit\u00e9. Simon a plus de 25 ans d&rsquo;exp\u00e9rience dans des projets d&rsquo;architecture, de conception et de d\u00e9ploiement de s\u00e9curit\u00e9 \u00e0 grande \u00e9chelle pour des organisations gouvernementales et priv\u00e9es de la province de Qu\u00e9bec. L\u2019\u00e9quipe d\u2019ing\u00e9nierie de s\u00e9curit\u00e9 aide les organisations \u00e0 mieux comprendre et g\u00e9rer leurs risques de s\u00e9curit\u00e9 li\u00e9s aux cybermenaces. L\u2019\u00e9quipe d\u2019ing\u00e9nierie de s\u00e9curit\u00e9 informe, guide et agit en tant que conseiller de confiance et est \u00e0 l\u2019affut des d\u00e9fis techniques et op\u00e9rationnels auxquels sont confront\u00e9s de nombreuses organisations et sur la mani\u00e8re dont les solutions Check Point peuvent les aider. Expert dans son domaine en cybers\u00e9curit\u00e9, la premi\u00e8re exp\u00e9rience de Simon avec les solutions Check Point remonte \u00e0 1997. Son exp\u00e9rience sur le terrain avec les solutions Check Point s\u2019av\u00e8re son principal atout.<span style=\"font-size: 18px;\"><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Atelier 1-4Bien pr\u00e9parer son voyage dans l\u2019infonuagique : quelle strat\u00e9gie adopter pour assurer la s\u00e9curit\u00e9 des donn\u00e9es ?Simon Drapeau Gestionnaire ing\u00e9nierie s\u00e9curit\u00e9 \u2013 Est du Canada, Check Point Software TechnologiesAu cours des 30 derni\u00e8res ann\u00e9es, Check Point Software Technologies Ltd. s&rsquo;est impos\u00e9 comme r\u00e9f\u00e9rence en mati\u00e8re de cybers\u00e9curit\u00e9. Notre mission : s\u00e9curiser tout votre environnement. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[22,21],"tags":[],"class_list":["post-387","post","type-post","status-publish","format-standard","hentry","category-ateliers-programmation","category-programmation"],"_links":{"self":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":3,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/387\/revisions"}],"predecessor-version":[{"id":487,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/387\/revisions\/487"}],"wp:attachment":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/media?parent=387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/categories?post=387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/tags?post=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}