{"id":10522,"date":"2022-12-19T06:15:25","date_gmt":"2022-12-19T05:15:25","guid":{"rendered":"https:\/\/www.auditsi.eu\/?p=10522"},"modified":"2022-11-19T19:19:43","modified_gmt":"2022-11-19T18:19:43","slug":"panorama-de-la-cybersecurite-2022","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=10522","title":{"rendered":"Panorama de la cybers\u00e9curit\u00e9 2022"},"content":{"rendered":"<p style=\"text-align: justify;\">La conf\u00e9rence &#8220;Panorama de la cybers\u00e9curi\u00e9 2022&#8221; anim\u00e9e par Thierry BERTHIER (pilote du groupe &#8220;S\u00e9curit\u00e9 Intelligence Artificielle Robotique&#8221; chez <a href=\"http:\/\/www.hub-franceia.fr\/\" target=\"_blank\" rel=\"noopener\">Hub France<\/a>) le 16 novembre dernier \u00e0 l&#8217;IAE de Limoges dresse un \u00e9tat des lieux de la cybermenace.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10525\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE.png\" alt=\"PANORAMA 2022 CYBERSECURITE\" width=\"1100\" height=\"590\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE.png 1100w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-300x161.png 300w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-1024x549.png 1024w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-768x412.png 768w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-730x392.png 730w\" sizes=\"auto, (max-width: 1100px) 100vw, 1100px\" \/><\/p>\n<p style=\"text-align: justify;\">Toutes les facettes de la menace sont \u00e9tudi\u00e9es. Au sommaire :<\/p>\n<ul>\n<li style=\"text-align: justify;\">Panorama des cybermenaces en 2022 &#8211; Historique &#8211; Typologie des principales attaques, chiffres et tendances<\/li>\n<li style=\"text-align: justify;\">Robotique et nouveaux risques cyber associ\u00e9s aux douze r\u00e9volutions sectorielles de la robotique<\/li>\n<li style=\"text-align: justify;\">Intelligence Artificielle et S\u00e9curit\u00e9 num\u00e9rique : nouvelle puissance, nouvelles menaces. L\u2019IA en d\u00e9fense &#8211; L\u2019IA attaqu\u00e9e &#8211; L\u2019IA attaquante<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Les attaques informatiques ne datent pas d&#8217;aujourd&#8217;hui. D\u00e9j\u00e0 dans les ann\u00e9es 70, les virus informatiques infectaient les ordinateurs et dans les <a href=\"https:\/\/www.auditsi.eu\/?page_id=2119\">ann\u00e9es 80<\/a>, <a href=\"https:\/\/www.auditsi.eu\/?page_id=2587\">les hackers s\u00e9vissaient<\/a> sur les <a href=\"https:\/\/www.auditsi.eu\/?page_id=3756\">r\u00e9seaux informatiques<\/a>, \u00e0 l&#8217;\u00e9poque, tr\u00e8s peu s\u00e9curis\u00e9s.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10526\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Historique-cyberattaques.png\" alt=\"PANORAMA 2022 CYBERSECURITE Historique cyberattaques\" width=\"1523\" height=\"853\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Historique-cyberattaques.png 1523w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Historique-cyberattaques-300x168.png 300w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Historique-cyberattaques-1024x574.png 1024w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Historique-cyberattaques-768x430.png 768w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Historique-cyberattaques-730x409.png 730w\" sizes=\"auto, (max-width: 1523px) 100vw, 1523px\" \/><\/p>\n<p style=\"text-align: justify;\">La cybermenace s&#8217;intensifie au fil du temps. Les acteurs, \u00e9tatiques \u00e0 l&#8217;origine, sont de plus en plus souvent des groupes criminels priv\u00e9s, affili\u00e9s ou non \u00e0 des \u00e9tats.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10527\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cybermenaces.png\" alt=\"PANORAMA 2022 CYBERSECURITE Cybermenaces\" width=\"1443\" height=\"808\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cybermenaces.png 1443w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cybermenaces-300x168.png 300w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cybermenaces-1024x573.png 1024w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cybermenaces-768x430.png 768w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cybermenaces-730x409.png 730w\" sizes=\"auto, (max-width: 1443px) 100vw, 1443px\" \/><\/p>\n<p style=\"text-align: justify;\">On observera que les \u00e9tats les plus fr\u00e9quemment suspect\u00e9s d&#8217;\u00eatre \u00e0 l&#8217;origine d&#8217;attaques informatiques ces quinze derni\u00e8res ann\u00e9es sont la Russie et la Cor\u00e9e du Nord. Depuis 2015 et la guerre en Crim\u00e9e, l&#8217;Ukraine est la cible de choix de la Russie. La cybercriminalit\u00e9 et les attaques informatiques sont des armes de plus en plus utilis\u00e9es dans la guerre hybride.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10528\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cartographie-vulnerabilites-cyberattaques.png\" alt=\"PANORAMA 2022 CYBERSECURITE Cartographie vuln\u00e9rabilit\u00e9s cyberattaques\" width=\"1506\" height=\"826\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cartographie-vulnerabilites-cyberattaques.png 1506w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cartographie-vulnerabilites-cyberattaques-300x165.png 300w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cartographie-vulnerabilites-cyberattaques-1024x562.png 1024w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cartographie-vulnerabilites-cyberattaques-768x421.png 768w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Cartographie-vulnerabilites-cyberattaques-730x400.png 730w\" sizes=\"auto, (max-width: 1506px) 100vw, 1506px\" \/><\/p>\n<p style=\"text-align: justify;\">Les entreprises n&#8217;\u00e9chappent pas \u00e0 la cybermenace aux fraudes. Arnaque au Pr\u00e9sident, faux ordres de virement, faux fournisseurs, changement de RIB&#8230; sont autant de sources de co\u00fbts qui peuvent pr\u00e9cipiter les entreprises victimes vers la faillite. Pour se pr\u00e9munir de ces attaques, il est n\u00e9cessaire de renforcer la sensibilisation des salari\u00e9s et de disposer de processus de d\u00e9cision clairement \u00e9tablis.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10529\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Fraude-Pt-FOVI-RIB.png\" alt=\"PANORAMA 2022 CYBERSECURITE Fraude Pt FOVI RIB\" width=\"1200\" height=\"718\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Fraude-Pt-FOVI-RIB.png 1200w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Fraude-Pt-FOVI-RIB-300x180.png 300w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Fraude-Pt-FOVI-RIB-1024x613.png 1024w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Fraude-Pt-FOVI-RIB-768x460.png 768w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2022\/11\/PANORAMA-2022-CYBERSECURITE-Fraude-Pt-FOVI-RIB-730x437.png 730w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p style=\"text-align: justify;\">Parmi les nouvelles menaces qui ciblent les entreprises, la fraude au Pr\u00e9sident avec l&#8217;usage d&#8217;un logiciel imitant la voix humaine. La voix du Pr\u00e9sident d&#8217;une entreprise est mod\u00e9lis\u00e9e par une intelligence artificielle qui la reproduit \u00e0 loisir.<\/p>\n<p style=\"text-align: justify;\">Le support de la conf\u00e9rence est t\u00e9l\u00e9chargeable ci-apr\u00e8s.<\/p>\n<div id=\"sconnect-is-installed\" style=\"display: none; text-align: justify;\">2.13.0.0<\/div>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Panorama%20de%20la%20cybers%C3%A9curit%C3%A9%202022\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>La conf\u00e9rence &#8220;Panorama de la cybers\u00e9curi\u00e9 2022&#8221; anim\u00e9e par Thierry BERTHIER (pilote du groupe &#8220;S\u00e9curit\u00e9 Intelligence Artificielle Robotique&#8221; chez Hub France) le 16 novembre dernier \u00e0 l&#8217;IAE de Limoges dresse un \u00e9tat des lieux de la cybermenace. Toutes les facettes de la menace sont \u00e9tudi\u00e9es. Au sommaire : Panorama des cybermenaces en 2022 &#8211; Historique &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=10522\" class=\"more-link\">Continue reading &lsquo;Panorama de la cybers\u00e9curit\u00e9 2022&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Panorama%20de%20la%20cybers%C3%A9curit%C3%A9%202022\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[10,4,46,35,33],"tags":[504,94,2791,499,2664,2324,2788,2795,1621,1345,2616,2792,1767,1768,2786,2144,2145,802,1850,2794,2790,1628,317,2785,2787,2789,790,1074,2784,2793],"class_list":["post-10522","post","type-post","status-publish","format-standard","hentry","category-controle-interne","category-fraude","category-integrite-des-donnees-systeme-informatique","category-securite-informatique","category-systeme-informatique","tag-attaque-informatique","tag-backdoor","tag-coree-du-nord","tag-cybercriminalite","tag-cybermenace","tag-cybersecurite","tag-flame","tag-fovi","tag-fraude","tag-fraude-au-president","tag-guerre","tag-guerre-hybride","tag-ia","tag-intelligence-artificielle","tag-malware","tag-rancongiciel","tag-ransomware","tag-rib","tag-robotique","tag-rootkit","tag-russie","tag-securite-informatique","tag-sensibilisation-des-utilisateurs","tag-thierry-berthier","tag-trojan","tag-ukraine","tag-virus","tag-vulnerabilites","tag-www-hub-franceia-fr","tag-zero-day"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10522"}],"version-history":[{"count":2,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10522\/revisions"}],"predecessor-version":[{"id":10531,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10522\/revisions\/10531"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}