{"id":10217,"date":"2022-05-09T06:58:40","date_gmt":"2022-05-09T04:58:40","guid":{"rendered":"https:\/\/www.auditsi.eu\/?p=10217"},"modified":"2022-04-16T21:05:14","modified_gmt":"2022-04-16T19:05:14","slug":"les-cles-dune-gestion-operationnelle-et-strategique-dune-crise-dorigine-cyber","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=10217","title":{"rendered":"Les cl\u00e9s d&#8217;une gestion op\u00e9rationnelle et strat\u00e9gique d&#8217;une crise d&#8217;origine cyber"},"content":{"rendered":"<p style=\"text-align: justify;\">Pour aider \u00e0 la mont\u00e9e en capacit\u00e9 des entreprises face \u00e0 la <strong>menace des crises d\u2019origine cyber<\/strong>, l\u2019ANSSI publie, en partenariat avec le Club des directeurs de s\u00e9curit\u00e9 et de s\u00fbret\u00e9 des entreprises (CDSE), un guide portant sur la gestion de crise cyber. En compl\u00e9ment des <strong>bonnes pratiques<\/strong> sugg\u00e9r\u00e9es aux acteurs strat\u00e9giques et op\u00e9rationnels participant au dispositif de crise cyber, plusieurs organisations ayant exp\u00e9riment\u00e9 un incident majeur offrent leurs t\u00e9moignages et les fa\u00e7ons dont elles ont pu y r\u00e9pondre.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10218\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/04\/ANSSI-Guide-crises-origine-cyber.png\" alt=\"ANSSI Guide crises origine cyber\" width=\"563\" height=\"855\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/04\/ANSSI-Guide-crises-origine-cyber.png 563w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/04\/ANSSI-Guide-crises-origine-cyber-198x300.png 198w\" sizes=\"auto, (max-width: 563px) 100vw, 563px\" \/><\/p>\n<p style=\"text-align: justify;\">Adressant \u00e0 la fois la pr\u00e9paration et la r\u00e9ponse aux crises, ce guide, constitu\u00e9 de 18 fiches pratiques, propose des objectifs \u00e0 atteindre pour chaque phase de la pr\u00e9paration et de la r\u00e9ponse aux crises et s\u2019adresse \u00e0 chacun des acteurs du niveau strat\u00e9gique et op\u00e9rationnel.<\/p>\n<p style=\"text-align: justify;\">Les conseils et les bonnes pratiques qu\u2019il pr\u00e9sente sont agr\u00e9ment\u00e9s de plusieurs <strong>retours d\u2019exp\u00e9rience d\u2019organisations victimes de cyberattaques<\/strong> \u2013 qui compl\u00e9mentent avec des exemples concrets le d\u00e9roul\u00e9 d\u2019une crise et les enseignements qu\u2019elles ont pu en tirer.<\/p>\n<p style=\"text-align: justify;\">Ce guide fait partie de la collection \u00ab Gestion de crise cyber \u00bb, destin\u00e9e \u00e0 accompagner les organisations dans la pr\u00e9paration et la gestion de crise cyber. Cette collection se compose de trois tomes : Organiser un exercice de gestion de crise cyber, Crise d\u2019origine cyber, les cl\u00e9s d\u2019une gestion op\u00e9rationnelle et strat\u00e9gique et Anticiper et g\u00e9rer sa communication de crise cyber. Cette collection vise \u00e0 <strong>apporter une expertise transverse<\/strong> sur l\u2019ensemble des aspects de la gestion de crise cyber.<\/p>\n<p style=\"text-align: justify;\">Le guide est t\u00e9l\u00e9chargeable sur le <a href=\"https:\/\/www.ssi.gouv.fr\/particulier\/guide\/crise-dorigine-cyber-les-cles-dune-gestion-operationnelle-et-strategique\/\" target=\"_blank\" rel=\"noopener\">site de l&#8217;ANSSI<\/a> et ci-apr\u00e8s.<\/p>\n<p style=\"text-align: justify;\">___<\/p>\n<p style=\"text-align: justify;\">A lire \u00e9galement : <a href=\"https:\/\/www.auditsi.eu\/?p=10054\">mesures cyber pr\u00e9ventives de l\u2019ANSSI<\/a> \/ <a href=\"https:\/\/www.auditsi.eu\/?p=10106\">Panorama de la menace informatique 2021<\/a>&nbsp;\/ <a href=\"https:\/\/www.auditsi.eu\/?p=10054\">Conflit en Ukraine et mesures de cyber protection<\/a> \/ <a href=\"https:\/\/www.cert.ssi.gouv.fr\/alerte\/\" target=\"_blank\" rel=\"noopener\">Alertes de s\u00e9curit\u00e9<\/a> \/ <a href=\"https:\/\/www.cert.ssi.gouv.fr\/cti\/\" target=\"_blank\" rel=\"noopener\">Rapports menaces et incidents<\/a> \/ <a href=\"https:\/\/www.auditsi.eu\/?p=8754\">Recommandations t\u00e9l\u00e9travail<\/a><\/p>\n<div id=\"sconnect-is-installed\" style=\"display: none; text-align: justify;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Les%20cl%C3%A9s%20d%27une%20gestion%20op%C3%A9rationnelle%20et%20strat%C3%A9gique%20d%27une%20crise%20d%27origine%20cyber\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Pour aider \u00e0 la mont\u00e9e en capacit\u00e9 des entreprises face \u00e0 la menace des crises d\u2019origine cyber, l\u2019ANSSI publie, en partenariat avec le Club des directeurs de s\u00e9curit\u00e9 et de s\u00fbret\u00e9 des entreprises (CDSE), un guide portant sur la gestion de crise cyber. En compl\u00e9ment des bonnes pratiques sugg\u00e9r\u00e9es aux acteurs strat\u00e9giques et op\u00e9rationnels participant &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=10217\" class=\"more-link\">Continue reading &lsquo;Les cl\u00e9s d&#8217;une gestion op\u00e9rationnelle et strat\u00e9gique d&#8217;une crise d&#8217;origine cyber&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Les%20cl%C3%A9s%20d%27une%20gestion%20op%C3%A9rationnelle%20et%20strat%C3%A9gique%20d%27une%20crise%20d%27origine%20cyber\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[35,33],"tags":[1076,2667,2668,737,92,1628,1074],"class_list":["post-10217","post","type-post","status-publish","format-standard","hentry","category-securite-informatique","category-systeme-informatique","tag-anssi","tag-cdse","tag-crise-cyber","tag-cyber-attaque","tag-plan-de-crise","tag-securite-informatique","tag-vulnerabilites"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10217"}],"version-history":[{"count":3,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10217\/revisions"}],"predecessor-version":[{"id":10221,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10217\/revisions\/10221"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}