{"id":15509,"date":"2024-04-08T12:23:19","date_gmt":"2024-04-08T12:23:19","guid":{"rendered":"https:\/\/dpoassociates.eu\/comment-se-conformer-aux-exigences-de-la-loi-dora\/"},"modified":"2024-07-08T09:15:28","modified_gmt":"2024-07-08T09:15:28","slug":"comment-se-conformer-aux-exigences-de-la-loi-dora","status":"publish","type":"post","link":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/","title":{"rendered":"Comment se conformer aux exigences de la loi DORA"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15509\" class=\"elementor elementor-15509 elementor-15494\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5e31a4b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5e31a4b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4977bee\" data-id=\"4977bee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-419d717 elementor-widget elementor-widget-text-editor\" data-id=\"419d717\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Introduction :<\/h3>\n<p>Dans le monde num\u00e9rique actuel, qui \u00e9volue rapidement, la cybers\u00e9curit\u00e9 est devenue une priorit\u00e9 pour les organisations de toutes tailles et de tous secteurs. L&rsquo;un des aspects essentiels d&rsquo;une strat\u00e9gie de cybers\u00e9curit\u00e9 solide est la r\u00e9alisation r\u00e9guli\u00e8re de tests de p\u00e9n\u00e9tration. Ces tests jouent un r\u00f4le essentiel dans l&rsquo;identification des vuln\u00e9rabilit\u00e9s des syst\u00e8mes et des r\u00e9seaux, ce qui permet aux organisations d&rsquo;agir de mani\u00e8re proactive pour corriger les menaces potentielles avant qu&rsquo;elles ne soient exploit\u00e9es par des acteurs malveillants.<\/p>\n<p>En vertu des r\u00e9glementations europ\u00e9ennes, telles que le <span style=\"text-decoration: underline;\"><br \/>\n  <a href=\"https:\/\/www.digital-operational-resilience-act.com\/\">loi sur la r\u00e9silience op\u00e9rationnelle num\u00e9rique (DORA)<\/a><br \/>\n<\/span>les organisations sont cens\u00e9es prendre des mesures sp\u00e9cifiques pour se conformer aux exigences des tests de p\u00e9n\u00e9tration. Examinons quelques aspects cl\u00e9s des tests de p\u00e9n\u00e9tration et la mani\u00e8re dont les organisations peuvent r\u00e9pondre aux exigences de la loi DORA.<\/p>\n<h4><strong>Tests de p\u00e9n\u00e9tration r\u00e9guliers :<\/strong><\/h4>\n<p>Il est essentiel de mener r\u00e9guli\u00e8rement des tests de p\u00e9n\u00e9tration pour identifier de mani\u00e8re proactive les vuln\u00e9rabilit\u00e9s. Ces tests doivent permettre d&rsquo;examiner en profondeur les syst\u00e8mes et les r\u00e9seaux des organisations afin de r\u00e9v\u00e9ler les faiblesses susceptibles d&rsquo;\u00eatre exploit\u00e9es par des pirates.<\/p>\n<h4><strong>Examens approfondis :<\/strong><\/h4>\n<p>Apr\u00e8s avoir effectu\u00e9 des tests de p\u00e9n\u00e9tration, il est n\u00e9cessaire de proc\u00e9der \u00e0 une analyse approfondie des vuln\u00e9rabilit\u00e9s d\u00e9tect\u00e9es. Cela aide \u00e0 comprendre la gravit\u00e9 et la nature des vuln\u00e9rabilit\u00e9s d\u00e9couvertes, ce qui permet aux organisations de prendre des mesures cibl\u00e9es pour y rem\u00e9dier.<\/p>\n<h4><strong>Classement des vuln\u00e9rabilit\u00e9s par ordre de priorit\u00e9 :<\/strong><\/h4>\n<p>Toutes les vuln\u00e9rabilit\u00e9s ne sont pas \u00e9gales. Il est important de classer les vuln\u00e9rabilit\u00e9s par ordre de priorit\u00e9 en fonction de leur impact potentiel sur la r\u00e9silience op\u00e9rationnelle de l&rsquo;organisation. Les organisations peuvent ainsi d\u00e9ployer leurs ressources de mani\u00e8re efficace et se concentrer sur les menaces les plus graves.<\/p>\n<h4><strong>Mesures correctives rapides :<\/strong><\/h4>\n<p>Les vuln\u00e9rabilit\u00e9s critiques identifi\u00e9es lors des tests de p\u00e9n\u00e9tration doivent \u00eatre corrig\u00e9es imm\u00e9diatement. Il s&rsquo;agit notamment de prendre rapidement des mesures correctives pour renforcer les faiblesses expos\u00e9es et minimiser les risques potentiels.<\/p>\n<h4><strong>Plan d&rsquo;am\u00e9lioration \u00e0 long terme :<\/strong><\/h4>\n<p>En plus de rem\u00e9dier aux vuln\u00e9rabilit\u00e9s imm\u00e9diates, les organisations devraient \u00e9galement \u00e9laborer un plan d&rsquo;am\u00e9lioration \u00e0 long terme sur la base des r\u00e9sultats des tests de p\u00e9n\u00e9tration. Il s&rsquo;agit notamment de mettre en \u0153uvre des mesures de s\u00e9curit\u00e9 durables et de continuer \u00e0 surveiller et \u00e0 s&rsquo;adapter \u00e0 l&rsquo;\u00e9volution du paysage des menaces.<\/p>\n<h4><strong>Suivi et \u00e9valuation continus :<\/strong><\/h4>\n<p>La cybers\u00e9curit\u00e9 est un effort permanent. Il est essentiel de mettre en place des syst\u00e8mes de contr\u00f4le continu des mesures de s\u00e9curit\u00e9 et d&rsquo;identifier et de corriger en permanence les vuln\u00e9rabilit\u00e9s au fur et \u00e0 mesure de l&rsquo;apparition de nouvelles menaces.<\/p>\n<h4><strong>Documentation et rapports :<\/strong><\/h4>\n<p>Toutes les activit\u00e9s li\u00e9es aux tests de p\u00e9n\u00e9tration, y compris les r\u00e9sultats et les mesures prises, doivent \u00eatre soigneusement document\u00e9es et communiqu\u00e9es aux parties prenantes et aux organismes de r\u00e9glementation concern\u00e9s, comme le prescrit le DORA.<\/p>\n<p>\u00c0 une \u00e9poque o\u00f9 les cybermenaces sont en constante \u00e9volution, les tests de p\u00e9n\u00e9tration sont devenus un \u00e9l\u00e9ment essentiel d&rsquo;une strat\u00e9gie de cybers\u00e9curit\u00e9 efficace. En se conformant aux exigences du DORA en mati\u00e8re de tests de p\u00e9n\u00e9tration, les organisations peuvent renforcer leur r\u00e9silience op\u00e9rationnelle et r\u00e9pondre de mani\u00e8re proactive aux menaces potentielles, ce qui les prot\u00e8ge mieux contre les cyberattaques.<\/p>\n<p>Mettre en place un<strong><span style=\"text-decoration: underline;\"> <a href=\"https:\/\/dpoassociates.eu\/fr\/contact\/\">DPD<\/a><\/span> <\/strong>nommer !<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Introduction : Dans le monde num\u00e9rique actuel, qui \u00e9volue rapidement, la cybers\u00e9curit\u00e9 est devenue une priorit\u00e9 pour les organisations de toutes tailles [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":15505,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","footnotes":""},"categories":[60],"tags":[],"class_list":["post-15509","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classifiee"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Comment se conformer aux exigences de la loi DORA<\/title>\n<meta name=\"description\" content=\"Apprenez tout sur DORA et l&#039;importance des tests d&#039;intrusion pour d\u00e9tecter et pr\u00e9venir les cybermenaces.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment se conformer aux exigences de la loi DORA\" \/>\n<meta property=\"og:description\" content=\"Apprenez tout sur DORA et l&#039;importance des tests d&#039;intrusion pour d\u00e9tecter et pr\u00e9venir les cybermenaces.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/\" \/>\n<meta property=\"og:site_name\" content=\"DPO Associates\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100083400514207\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-08T12:23:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-08T09:15:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/04\/Ontwerp-zonder-titel-15.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#\/schema\/person\/302a15bf9c51c524d89cb526c22ab649\"},\"headline\":\"Comment se conformer aux exigences de la loi DORA\",\"datePublished\":\"2024-04-08T12:23:19+00:00\",\"dateModified\":\"2024-07-08T09:15:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/\"},\"wordCount\":657,\"publisher\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/04\/Ontwerp-zonder-titel-15.png\",\"articleSection\":[\"Non classifi\u00e9(e)\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/\",\"url\":\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/\",\"name\":\"Comment se conformer aux exigences de la loi DORA\",\"isPartOf\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/04\/Ontwerp-zonder-titel-15.png\",\"datePublished\":\"2024-04-08T12:23:19+00:00\",\"dateModified\":\"2024-07-08T09:15:28+00:00\",\"description\":\"Apprenez tout sur DORA et l'importance des tests d'intrusion pour d\u00e9tecter et pr\u00e9venir les cybermenaces.\",\"breadcrumb\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#primaryimage\",\"url\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/04\/Ontwerp-zonder-titel-15.png\",\"contentUrl\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/04\/Ontwerp-zonder-titel-15.png\",\"width\":1080,\"height\":1080,\"caption\":\"DORA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dpoassociates.eu\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment se conformer aux exigences de la loi DORA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#website\",\"url\":\"https:\/\/dpoassociates.eu\/fr\/\",\"name\":\"DPO Associates\",\"description\":\"Protect, Detect, Respond\",\"publisher\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dpoassociates.eu\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#organization\",\"name\":\"DPO Associates\",\"url\":\"https:\/\/dpoassociates.eu\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png\",\"contentUrl\":\"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png\",\"width\":651,\"height\":651,\"caption\":\"DPO Associates\"},\"image\":{\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=100083400514207\",\"https:\/\/www.linkedin.com\/company\/dpo-associates-da\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dpoassociates.eu\/fr\/#\/schema\/person\/302a15bf9c51c524d89cb526c22ab649\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/dpoassociates.eu\"],\"url\":\"https:\/\/dpoassociates.eu\/fr\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Comment se conformer aux exigences de la loi DORA","description":"Apprenez tout sur DORA et l'importance des tests d'intrusion pour d\u00e9tecter et pr\u00e9venir les cybermenaces.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment se conformer aux exigences de la loi DORA","og_description":"Apprenez tout sur DORA et l'importance des tests d'intrusion pour d\u00e9tecter et pr\u00e9venir les cybermenaces.","og_url":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/","og_site_name":"DPO Associates","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100083400514207","article_published_time":"2024-04-08T12:23:19+00:00","article_modified_time":"2024-07-08T09:15:28+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/04\/Ontwerp-zonder-titel-15.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#article","isPartOf":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/"},"author":{"name":"admin","@id":"https:\/\/dpoassociates.eu\/fr\/#\/schema\/person\/302a15bf9c51c524d89cb526c22ab649"},"headline":"Comment se conformer aux exigences de la loi DORA","datePublished":"2024-04-08T12:23:19+00:00","dateModified":"2024-07-08T09:15:28+00:00","mainEntityOfPage":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/"},"wordCount":657,"publisher":{"@id":"https:\/\/dpoassociates.eu\/fr\/#organization"},"image":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#primaryimage"},"thumbnailUrl":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/04\/Ontwerp-zonder-titel-15.png","articleSection":["Non classifi\u00e9(e)"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/","url":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/","name":"Comment se conformer aux exigences de la loi DORA","isPartOf":{"@id":"https:\/\/dpoassociates.eu\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#primaryimage"},"image":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#primaryimage"},"thumbnailUrl":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/04\/Ontwerp-zonder-titel-15.png","datePublished":"2024-04-08T12:23:19+00:00","dateModified":"2024-07-08T09:15:28+00:00","description":"Apprenez tout sur DORA et l'importance des tests d'intrusion pour d\u00e9tecter et pr\u00e9venir les cybermenaces.","breadcrumb":{"@id":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#primaryimage","url":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/04\/Ontwerp-zonder-titel-15.png","contentUrl":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2024\/04\/Ontwerp-zonder-titel-15.png","width":1080,"height":1080,"caption":"DORA"},{"@type":"BreadcrumbList","@id":"https:\/\/dpoassociates.eu\/fr\/comment-se-conformer-aux-exigences-de-la-loi-dora\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dpoassociates.eu\/fr\/"},{"@type":"ListItem","position":2,"name":"Comment se conformer aux exigences de la loi DORA"}]},{"@type":"WebSite","@id":"https:\/\/dpoassociates.eu\/fr\/#website","url":"https:\/\/dpoassociates.eu\/fr\/","name":"DPO Associates","description":"Protect, Detect, Respond","publisher":{"@id":"https:\/\/dpoassociates.eu\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dpoassociates.eu\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/dpoassociates.eu\/fr\/#organization","name":"DPO Associates","url":"https:\/\/dpoassociates.eu\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dpoassociates.eu\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png","contentUrl":"https:\/\/dpoassociates.eu\/wp-content\/uploads\/2022\/09\/thumbnail_Logo-DPO-Associates-negatief-zwart-negatief-002.png","width":651,"height":651,"caption":"DPO Associates"},"image":{"@id":"https:\/\/dpoassociates.eu\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=100083400514207","https:\/\/www.linkedin.com\/company\/dpo-associates-da\/"]},{"@type":"Person","@id":"https:\/\/dpoassociates.eu\/fr\/#\/schema\/person\/302a15bf9c51c524d89cb526c22ab649","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b13c3c7ec36f7f3c24ceeed82ac5a11ac7dd5c84b337f0a962c2cf227bd86d3?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/dpoassociates.eu"],"url":"https:\/\/dpoassociates.eu\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/posts\/15509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/comments?post=15509"}],"version-history":[{"count":0,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/posts\/15509\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/media\/15505"}],"wp:attachment":[{"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/media?parent=15509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/categories?post=15509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dpoassociates.eu\/fr\/wp-json\/wp\/v2\/tags?post=15509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}