{"id":9108,"date":"2020-11-30T07:31:51","date_gmt":"2020-11-30T06:31:51","guid":{"rendered":"https:\/\/www.auditsi.eu\/?p=9108"},"modified":"2020-10-04T23:52:13","modified_gmt":"2020-10-04T21:52:13","slug":"guide-des-risques-cyber-de-lifaci","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=9108","title":{"rendered":"Guide des risques cyber de l&#8217;IFACI"},"content":{"rendered":"<p style=\"text-align: justify;\">Les risques cyber tiennent une place particuli\u00e8re au sein de la cartographie des risques.<\/p>\n<p style=\"text-align: justify;\">Ann\u00e9e apr\u00e8s ann\u00e9e, ils figurent parmi les toutes premi\u00e8res pr\u00e9occupations des managers et de leurs dirigeants. L\u2019\u00e9dition 2020 de Risk in Focus, le palmar\u00e8s europ\u00e9en des risques les plus importants pour les directeurs d\u2019audit interne, le confirme une fois encore. Cette sp\u00e9cificit\u00e9 du risque cyber tient sans doute \u00e0 son origine, tant humaine et organisationnelle que technique, qui le rend plus transversal et plus diffus que d\u2019autres dont les causes sont plus ais\u00e9ment circonscrites.<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?attachment_id=9109\" rel=\"attachment wp-att-9109\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9109\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2020\/08\/IFACI-Guide-des-risques-cyber.png\" alt=\"IFACI Guide des risques cyber\" width=\"641\" height=\"923\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2020\/08\/IFACI-Guide-des-risques-cyber.png 641w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2020\/08\/IFACI-Guide-des-risques-cyber-208x300.png 208w\" sizes=\"auto, (max-width: 641px) 100vw, 641px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">C\u2019est donc en toute logique que les adh\u00e9rents de l\u2019IFACI souhaitent en permanence am\u00e9liorer leurs connaissances et leurs pratiques dans ce domaine. En 2018, l\u2019IFACI a publi\u00e9 le guide \u00ab cyber-risques: enjeux, approches et gouvernance \u00bb dont l\u2019objectif \u00e9tait, au plan de l\u2019organisation comme de la m\u00e9thode, de d\u00e9finir les fondamentaux du traitement du risque cyber. La deuxi\u00e8me \u00e9tape consistait, pour les auditeurs et les contr\u00f4leurs internes, \u00e0 d\u00e9tailler la m\u00e9thode. C\u2019est ainsi que, supervis\u00e9 par Guy-Philippe Goldstein, les adh\u00e9rents de l\u2019IFACI ont conjointement produit ce guide 2.0. De nombreux apports et soutiens ont contribu\u00e9 \u00e0 augmenter encore sa qualit\u00e9.<\/p>\n<p style=\"text-align: justify;\">Un risque complexe et \u00e9volutif comme celui que nous traitons ici doit faire l\u2019objet d\u2019une surveillance permanente. C\u2019est l\u2019esprit qui guide cette initiative depuis deux ans. Au-del\u00e0, ce projet illustre la capacit\u00e9 des adh\u00e9rents de l\u2019IFACI \u00e0 se mobiliser dans le temps, autour d\u2019une r\u00e9flexion qui sert toute la communaut\u00e9 des auditeurs et des contr\u00f4leurs internes.<\/p>\n<p style=\"text-align: justify;\">Plus d&#8217;informations sur le site de l&#8217;<a href=\"https:\/\/docs.ifaci.com\/category\/cadre-de-reference-international-des-pratiques-professionnelles-de-laudit-interne\/lignes-directrices-complementaires\/processus\/\" target=\"_blank\" rel=\"noopener noreferrer\">IFACI<\/a>.<\/p>\n<p style=\"text-align: justify;\">&nbsp;<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Guide%20des%20risques%20cyber%20de%20l%27IFACI\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Les risques cyber tiennent une place particuli\u00e8re au sein de la cartographie des risques. Ann\u00e9e apr\u00e8s ann\u00e9e, ils figurent parmi les toutes premi\u00e8res pr\u00e9occupations des managers et de leurs dirigeants. L\u2019\u00e9dition 2020 de Risk in Focus, le palmar\u00e8s europ\u00e9en des risques les plus importants pour les directeurs d\u2019audit interne, le confirme une fois encore. Cette &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=9108\" class=\"more-link\">Continue reading &lsquo;Guide des risques cyber de l&#8217;IFACI&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Guide%20des%20risques%20cyber%20de%20l%27IFACI\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[551,36,35,33],"tags":[1893,499,2313],"class_list":["post-9108","post","type-post","status-publish","format-standard","hentry","category-approche-par-les-risques","category-protection-des-donnees","category-securite-informatique","category-systeme-informatique","tag-cartographie-des-risques","tag-cybercriminalite","tag-ifaci"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/9108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9108"}],"version-history":[{"count":1,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/9108\/revisions"}],"predecessor-version":[{"id":9110,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/9108\/revisions\/9110"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}