{"id":7676,"date":"2024-08-02T14:17:28","date_gmt":"2024-08-02T14:17:28","guid":{"rendered":"https:\/\/trustpair.com\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/"},"modified":"2024-08-26T13:08:29","modified_gmt":"2024-08-26T13:08:29","slug":"cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite","status":"publish","type":"post","link":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/","title":{"rendered":"Cybersecurity Act : la loi europ\u00e9enne sur la cybers\u00e9curit\u00e9"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">La cybers\u00e9curit\u00e9 est un enjeu prioritaire de l\u2019Union Europ\u00e9enne et des Etats membres, d\u2019autant que la cybercriminalit\u00e9 a massivement augment\u00e9 avec l\u2019\u00e9pid\u00e9mie de covid-19 et le recours aux interm\u00e9diaires num\u00e9riques dans le cadre du t\u00e9l\u00e9travail. Face \u00e0 la flamb\u00e9e du cybercrime, les autorit\u00e9s europ\u00e9ennes ont tenu \u00e0 se doter d\u2019un arsenal l\u00e9gislatif et op\u00e9rationnel : le <\/span><b>Cybersecurity Act<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>Qu\u2019est-ce que le Cybersecurity Act ?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Le Cybersecurity Act \u00e9tablit un <\/span><b>cadre l\u00e9gislatif et des standards uniques de cybers\u00e9curit\u00e9 pour l\u2019espace europ\u00e9en<\/b><span style=\"font-weight: 400;\">. Il est pr\u00e9par\u00e9 par l\u2019Union Europ\u00e9enne et conjointement avec les agences nationales de cybers\u00e9curit\u00e9, comme<\/span> <a href=\"https:\/\/www.ssi.gouv.fr\/actualite\/adoption-definitive-du-cybersecurity-act-un-succes-pour-lautonomie-strategique-europeenne\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">l\u2019ANSSI<\/span><\/a><span style=\"font-weight: 400;\"> (Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information) pour la France.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Entr\u00e9 en vigueur le 27 juin 2019, ce r\u00e8glement est obligatoire dans ses dispositions et s\u2019applique donc \u00e0 l\u2019ensemble de l\u2019Union Europ\u00e9enne.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La premi\u00e8re partie du Cybersecurity Act officialise un <\/span><b>mandat renforc\u00e9 pour ENISA<\/b><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">l\u2019European Union Agency for Cybersecurity<\/span><\/i><span style=\"font-weight: 400;\">. Cette agence de l\u2019Union Europ\u00e9enne pour la cybers\u00e9curit\u00e9 dispose donc de pouvoirs et moyens renforc\u00e9s, notamment en mati\u00e8re de :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Coh\u00e9sion<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Capacit\u00e9s op\u00e9rationnelles<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sensibilisation<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">ENISA, la r\u00e9f\u00e9rence cybers\u00e9curit\u00e9 de l\u2019Union Europ\u00e9enne<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cette institution officielle de l\u2019Union Europ\u00e9enne est cr\u00e9\u00e9e en 2014 et constitue le point de r\u00e9f\u00e9rence des capacit\u00e9s de cyberd\u00e9fense et cyber-r\u00e9silience de l\u2019Union et des pays membres.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cette agence a 4 missions : d\u2019expertise, d\u2019accompagnement dans l\u2019\u00e9laboration de politiques publiques, de d\u00e9veloppement des capacit\u00e9s et de renforcement de la coop\u00e9ration entre les Etats. Elle fournit donc un cadre impactant de nombreuses normes, comme les <\/span><a href=\"https:\/\/trustpair.fr\/blog\/normes-comptables\/\"><b>normes comptables<\/b><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Un cadre europ\u00e9en unique de certification<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">La seconde partie du Cybersecurity Act introduit un <\/span><b>cadre europ\u00e9en de certification de cybers\u00e9curit\u00e9<\/b><span style=\"font-weight: 400;\"> pour les produits, services et processus TIC (technologies de l\u2019information et des communications). Cette certification vise \u00e0 assurer leur r\u00e9sistance face aux risques cyber et est accord\u00e9e apr\u00e8s une \u00e9valuation men\u00e9e par un tiers reconnu.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En termes de contraintes, il faut distinguer celles applicables aux \u00c9tats de celles applicables aux organisations. La mise en place de la certification est obligatoire pour les Etats, mais demeure<\/span> <a href=\"https:\/\/www.jonesday.com\/en\/insights\/2019\/06\/the-eu-cybersecurity-act-is-now-applicable\" target=\"_blank\" rel=\"noopener\"><b>volontaire pour les entreprises et autres organisations<\/b><\/a><span style=\"font-weight: 400;\">. Cependant, ce volontarisme est limit\u00e9 : les l\u00e9gislations des pays membres peuvent imposer la certification et l\u2019Union Europ\u00e9enne planifie une r\u00e9vision r\u00e9guli\u00e8re du Cybersecurity Act avec, potentiellement, l\u2019obligation de certification.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Au travers de ces deux dispositifs, le Cybersecurity Act vise \u00e0 cr\u00e9er un cadre robuste de cybers\u00e9curit\u00e9 pour l\u2019Union Europ\u00e9enne et \u00e0 standardiser les normes et processus.<\/span><\/p>\n<h2><b>Quels sont les objectifs du Cybersecurity Act ?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Afin de (cyber) s\u00e9curiser l\u2019espace europ\u00e9en,<\/span> <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32019R0881&amp;rid=6\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">l\u2019article 51 du Cybersecurity Act<\/span><\/a><span style=\"font-weight: 400;\"> d\u00e9taille les ambitions du texte :<\/span><\/p>\n<ul>\n<li><b>S\u00e9curiser les produits, services et processus<\/b><span style=\"font-weight: 400;\"> d\u00e8s la conception et tout au long de leur cycle de vie, via des mises \u00e0 jour de s\u00e9curit\u00e9 ;<\/span><\/li>\n<li><b>Construire des processus de s\u00e9curit\u00e9 robustes<\/b><span style=\"font-weight: 400;\"> pour la collecte, le traitement et le stockage des donn\u00e9es ;<\/span><\/li>\n<li><b>Prot\u00e9ger les donn\u00e9es<\/b><span style=\"font-weight: 400;\"> contre la divulgation, la destruction, la perte, l\u2019alt\u00e9ration, l\u2019inaccessibilit\u00e9 ;<\/span><\/li>\n<li><b>V\u00e9rifier l\u2019absence de vuln\u00e9rabilit\u00e9s connues<\/b><span style=\"font-weight: 400;\"> pour les produits, services et processus TIC ;<\/span><\/li>\n<li><b>Garantir l\u2019accessibilit\u00e9 aux acc\u00e8s restreints<\/b><span style=\"font-weight: 400;\"> aux seuls ayants droits ;<\/span><\/li>\n<li><b>\u00c9tablir un historique de la donn\u00e9e<\/b><span style=\"font-weight: 400;\">, avec une chronologie des services, fonctions et donn\u00e9es consult\u00e9s, utilis\u00e9s ou trait\u00e9s, et par qui ;<\/span><\/li>\n<li><b>Assurer une cyber r\u00e9silience<\/b><span style=\"font-weight: 400;\"> en r\u00e9tablissant la disponibilit\u00e9 et l\u2019acc\u00e8s aux donn\u00e9es, services et fonctions en cas d\u2019incident.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Afin d\u2019atteindre ces objectifs, le Cybersecurity Act compte notamment sur la mise en place de son syst\u00e8me de certification.<\/span><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-449a0d0d-8f9b-42d8-89c1-d477cc44f03c\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-449a0d0d-8f9b-42d8-89c1-d477cc44f03c\" class=\"hs-cta-node hs-cta-449a0d0d-8f9b-42d8-89c1-d477cc44f03c\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/449a0d0d-8f9b-42d8-89c1-d477cc44f03c\" target=\"_blank\" rel=\"noopener\"><img fetchpriority=\"high\" decoding=\"async\" id=\"hs-cta-img-449a0d0d-8f9b-42d8-89c1-d477cc44f03c\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/449a0d0d-8f9b-42d8-89c1-d477cc44f03c.png\" alt=\"Data Management - Livre Blanc Trustpair x Altares\" width=\"1040\" height=\"544\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, '449a0d0d-8f9b-42d8-89c1-d477cc44f03c', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2><b>Comment fonctionne le Cybersecurity Act pour les entreprises ?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Le <\/span><b>Cybersecurity Act promeut un march\u00e9 de la cybers\u00e9curit\u00e9 plus lisible<\/b><span style=\"font-weight: 400;\">. Celui-ci est en effet en plein essor, car des normes de cybers\u00e9curit\u00e9 certifi\u00e9es rassurent les r\u00e9gulateurs, les potentiels clients et toutes autres parties prenantes. Les solutions sont florissantes et il est possible d\u2019adh\u00e9rer \u00e0 des <\/span><b>syst\u00e8mes de certification<\/b><span style=\"font-weight: 400;\"> nationaux et internationaux, \u00e0 l\u2019instar de la norme <\/span><a href=\"https:\/\/trustpair.fr\/blog\/norme-iso-27001-comment-se-mettre-en-conformite\/\" target=\"_blank\" rel=\"noopener\"><b>ISO 27001<\/b><\/a><span style=\"font-weight: 400;\">. Toutefois, la profusion de solutions et de prestataires brouille la lisibilit\u00e9 des r\u00e8gles et des valeurs respectives des diff\u00e9rentes certifications. Dans cette perspective, le Cybersecurity Act permet aux consommateurs de prendre des d\u00e9cisions plus \u00e9clair\u00e9es et de contribuer \u00e0 l\u2019\u00e9mergence d\u2019un march\u00e9 num\u00e9rique unique.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Cybersecurity Act : un r\u00e8glement en trois dimensions<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Selon les donn\u00e9es, les produits et les services, la certification du Cybersecurity Act d\u00e9finit 3 niveaux d\u2019assurance :<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">\u00ab <\/span><b>El\u00e9mentaire<\/b><span style=\"font-weight: 400;\"> \u00bb (par exemple les technologies de l\u2019information) : l\u2019\u00e9valuation doit comprendre au minimum une analyse de la documentation technique<\/span><\/li>\n<li><span style=\"font-weight: 400;\">\u00ab <\/span><b>Substantiel<\/b><span style=\"font-weight: 400;\"> \u00bb (par ex. le cloud) : il faut \u00e9tablir l\u2019absence de vuln\u00e9rabilit\u00e9s connues et mener des tests de s\u00e9curit\u00e9<\/span><\/li>\n<li><span style=\"font-weight: 400;\">\u00ab <\/span><b>Elev\u00e9<\/b><span style=\"font-weight: 400;\"> \u00bb (par ex. les voitures connect\u00e9es) : en plus des actions pr\u00e9c\u00e9dentes, il faut mener des simulations d\u2019attaque pour tester la robustesse du syst\u00e8me<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Le Cybersecurity Act int\u00e8gre donc un <\/span><b>dispositif complet et lisible<\/b><span style=\"font-weight: 400;\">, mais qui demeure volontaire pour les organisations. La certification est-elle, d\u00e8s lors, dans leur int\u00e9r\u00eat ? Certes, elle est non-obligatoire, mais rappelons que la Commission europ\u00e9enne peut \u00eatre amen\u00e9e \u00e0 r\u00e9viser cette clause ; il peut ainsi s\u2019agir pour l\u2019entreprise d\u2019anticiper les \u00e9volutions l\u00e9gislatives. C\u2019est, de plus, une question de s\u00e9curit\u00e9, puisque l\u2019organisation re\u00e7oit une certification pertinente pour les produits et \/ ou services vendus.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Plus largement, la cybers\u00e9curit\u00e9 est un enjeu majeur pour les entreprises, qui doivent l\u2019envisager \u00e0 la fois sur le plan des <\/span><b>menaces technologiques et des tentatives de fraude<\/b><span style=\"font-weight: 400;\">. Arnaque au FOVI, fraude au faux fournisseur, fraude interne : autant de dangers dont l\u2019entreprise peut cependant se prot\u00e9ger. Elle peut ainsi adopter une <\/span><b>solution anti fraude comme<\/b> <a href=\"https:\/\/d.docs.live.net\/815fad183632b530\/Documents\/trustpair.fr\" target=\"_blank\" rel=\"noopener\"><b>Trustpair<\/b><\/a><span style=\"font-weight: 400;\">. Ce SaaS contr\u00f4le automatiquement et en continu la base tiers et alerte en cas de d\u00e9tection d\u2019anomalies ou d\u2019erreurs. L\u2019entreprise peut ainsi se pr\u00e9munir du risque de fraude.<\/span><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-c9e9ae3c-db20-450d-a00d-62d229269d5f\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-c9e9ae3c-db20-450d-a00d-62d229269d5f\" class=\"hs-cta-node hs-cta-c9e9ae3c-db20-450d-a00d-62d229269d5f\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/c9e9ae3c-db20-450d-a00d-62d229269d5f\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" id=\"hs-cta-img-c9e9ae3c-db20-450d-a00d-62d229269d5f\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/c9e9ae3c-db20-450d-a00d-62d229269d5f.png\" alt=\"Nouveau call-to-action\" width=\"900\" height=\"305\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'c9e9ae3c-db20-450d-a00d-62d229269d5f', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<hr \/>\n<p>POINTS \u00c0 RETENIR:<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Le Cybersecurity Act \u00e9tablit un <\/span><b>cadre l\u00e9gislatif et des standards uniques de cybers\u00e9curit\u00e9 pour l\u2019espace europ\u00e9en<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li>Ses objectifs principaux sont: la protection des donn\u00e9es et la s\u00e9curisation des produits\/services\/processus.<\/li>\n<li>Il est d\u00e9finit sous 3 niveaux d&rsquo;assurance.<\/li>\n<li><span style=\"font-weight: 400;\">Il vise \u00e0 <strong>standardiser les normes et processus<\/strong> \u00e0 l&rsquo;\u00e9chelle europ\u00e9enne.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>La cybers\u00e9curit\u00e9 est un enjeu prioritaire de l\u2019Union Europ\u00e9enne et des Etats membres, d\u2019autant que la cybercriminalit\u00e9 a massivement augment\u00e9 avec l\u2019\u00e9pid\u00e9mie de covid-19 et le recours aux interm\u00e9diaires num\u00e9riques dans le cadre du t\u00e9l\u00e9travail. Face \u00e0 la flamb\u00e9e du cybercrime, les autorit\u00e9s europ\u00e9ennes ont tenu \u00e0 se doter d\u2019un arsenal l\u00e9gislatif et op\u00e9rationnel : [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7677,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81],"tags":[],"class_list":["post-7676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-conformite_finance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Act : la loi europ\u00e9enne sur la cybers\u00e9curit\u00e9 - Trustpair<\/title>\n<meta name=\"description\" content=\"D\u00e9finissant un cadre l\u00e9gislatif et des standards de cybers\u00e9curit\u00e9 \u00e0 l&#039;\u00e9chelle europ\u00e9enne, voici l&#039;essentiel sur le Cybersecurity Act. Lire.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Act : la loi europ\u00e9enne sur la cybers\u00e9curit\u00e9 - Trustpair\" \/>\n<meta property=\"og:description\" content=\"D\u00e9finissant un cadre l\u00e9gislatif et des standards de cybers\u00e9curit\u00e9 \u00e0 l&#039;\u00e9chelle europ\u00e9enne, voici l&#039;essentiel sur le Cybersecurity Act. Lire.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T14:17:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-26T13:08:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/cybersec.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1040\" \/>\n\t<meta property=\"og:image:height\" content=\"544\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"Cybersecurity Act : la loi europ\u00e9enne sur la cybers\u00e9curit\u00e9\",\"datePublished\":\"2024-08-02T14:17:28+00:00\",\"dateModified\":\"2024-08-26T13:08:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/\"},\"wordCount\":1115,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/cybersec.png\",\"articleSection\":[\"Conformit\u00e9 finance\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/\",\"url\":\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/\",\"name\":\"Cybersecurity Act : la loi europ\u00e9enne sur la cybers\u00e9curit\u00e9 - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/cybersec.png\",\"datePublished\":\"2024-08-02T14:17:28+00:00\",\"dateModified\":\"2024-08-26T13:08:29+00:00\",\"description\":\"D\u00e9finissant un cadre l\u00e9gislatif et des standards de cybers\u00e9curit\u00e9 \u00e0 l'\u00e9chelle europ\u00e9enne, voici l'essentiel sur le Cybersecurity Act. Lire.\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/cybersec.png\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/cybersec.png\",\"width\":1040,\"height\":544},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Act : la loi europ\u00e9enne sur la cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/fr\/#website\",\"url\":\"https:\/\/trustpair.com\/fr\/\",\"name\":\"Trustpair\",\"description\":\"Solution leader de pr\u00e9vention de la fraude au virement et de contr\u00f4le RIB fournisseurs\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Act : la loi europ\u00e9enne sur la cybers\u00e9curit\u00e9 - Trustpair","description":"D\u00e9finissant un cadre l\u00e9gislatif et des standards de cybers\u00e9curit\u00e9 \u00e0 l'\u00e9chelle europ\u00e9enne, voici l'essentiel sur le Cybersecurity Act. Lire.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybersecurity Act : la loi europ\u00e9enne sur la cybers\u00e9curit\u00e9 - Trustpair","og_description":"D\u00e9finissant un cadre l\u00e9gislatif et des standards de cybers\u00e9curit\u00e9 \u00e0 l'\u00e9chelle europ\u00e9enne, voici l'essentiel sur le Cybersecurity Act. Lire.","og_url":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T14:17:28+00:00","article_modified_time":"2024-08-26T13:08:29+00:00","og_image":[{"width":1040,"height":544,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/cybersec.png","type":"image\/png"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"trustpair_2438","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"Cybersecurity Act : la loi europ\u00e9enne sur la cybers\u00e9curit\u00e9","datePublished":"2024-08-02T14:17:28+00:00","dateModified":"2024-08-26T13:08:29+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/"},"wordCount":1115,"commentCount":0,"publisher":{"@id":"https:\/\/trustpair.com\/fr\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/cybersec.png","articleSection":["Conformit\u00e9 finance"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/","url":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/","name":"Cybersecurity Act : la loi europ\u00e9enne sur la cybers\u00e9curit\u00e9 - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/cybersec.png","datePublished":"2024-08-02T14:17:28+00:00","dateModified":"2024-08-26T13:08:29+00:00","description":"D\u00e9finissant un cadre l\u00e9gislatif et des standards de cybers\u00e9curit\u00e9 \u00e0 l'\u00e9chelle europ\u00e9enne, voici l'essentiel sur le Cybersecurity Act. Lire.","breadcrumb":{"@id":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/cybersec.png","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/cybersec.png","width":1040,"height":544},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/fr\/blog\/cybersecurity-act-la-loi-europeenne-sur-la-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Act : la loi europ\u00e9enne sur la cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/fr\/#website","url":"https:\/\/trustpair.com\/fr\/","name":"Trustpair","description":"Solution leader de pr\u00e9vention de la fraude au virement et de contr\u00f4le RIB fournisseurs","publisher":{"@id":"https:\/\/trustpair.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/fr\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts\/7676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/comments?post=7676"}],"version-history":[{"count":0,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts\/7676\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/media\/7677"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/media?parent=7676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/categories?post=7676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/tags?post=7676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}