{"id":8132,"date":"2023-12-07T20:17:06","date_gmt":"2023-12-08T01:17:06","guid":{"rendered":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/"},"modified":"2025-03-24T16:04:49","modified_gmt":"2025-03-24T20:04:49","slug":"formation-en-cybersecurite","status":"publish","type":"page","link":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/","title":{"rendered":"Formation et sensibilisation \u00e0 la cybers\u00e9curit\u00e9"},"content":{"rendered":"\n<div class=\"tbk-hydrate-component\" data-cid=\"0bf55b43-ffe3-425e-8b3f-67066e443091\" data-component=\"Hero\"><section class=\"calian-hero d-flex h-100 position-relative overflow-hidden nav-indent wp-block-calian-com-components-calian-hero media-position-wallpaper overlay-themed breadcrumbs-hidden\"><div class=\"container\"><div class=\"row\"><div class=\"calian-hero__content d-flex col-lg flex-column pb-3 justify-content-center mx-auto h-100 text-center\"><div class=\"calian-hero__copy-wrapper\"><h1 class=\"calian-hero__heading text-white\">Formation et sensibilisation \u00e0 la cybers\u00e9curit\u00e9<\/h1><div class=\"calian-hero__text text-white mt-2 mb-4\">Les cybermenaces font partie des plus grands risques auxquels les organisations sont confront\u00e9es aujourd&#8217;hui, et elles deviennent de plus en plus sophistiqu\u00e9es. Adoptez une approche proactive de la sensibilisation et de la formation \u00e0 la cybers\u00e9curit\u00e9 en veillant \u00e0 ce que tous les employ\u00e9s soient en mesure de reconna\u00eetre les cyberattaques et d&#8217;y r\u00e9pondre.<\/div><a href=\"#contact-form\" class=\"btn btn-light mb-4 mt-3\">En savoir plus<\/a><\/div><\/div><div class=\"calian-hero__media col-md w-100 h-100 media-style-wallpaper position-absolute opacity-25 top-0 start-0 p-0\"><div class=\"media-wrapper ml-auto mr-0 w-100 h-100\"><div class=\"advanced-image w-100 h-100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg\" alt=\"\" width=\"1024\" height=\"618\" class=\"calian-hero__image\"\/><\/div><\/div><\/div><\/div><\/div><div class=\"calian-hero__overlay overlay-themed position-absolute w-100 h-100 top-0 start-0 has-image\"><\/div><span><\/span><\/section><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"c7dbda95-617b-46f5-ba89-a2b10ab501e4\" data-component=\"Spacer\"><div id=\"intro\" class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"742adc5e-f080-4de9-9d09-7b7b153df1f5\" data-component=\"LocationIntroContent\"><div class=\"calian-location-intro-content wp-block-calian-com-components-calian-location-intro-content\"><div class=\"calian-location-intro-content__container container-fluid\"><div class=\"row\"><div class=\"calian-location-intro-content__top col-12\"><h2 class=\"calian-location-intro-content__heading\">Prot\u00e9gez votre organisation gr\u00e2ce \u00e0 une formation et une sensibilisation compl\u00e8tes \u00e0 la cybers\u00e9curit\u00e9<\/h2><\/div><\/div><div class=\"row\"><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"0b0bbf91-ce9a-4e7f-bf40-e53cd35c109a\" data-component=\"AlternatingTextAndImages\"><div class=\"calian-alternating-text-and-images overflow-hidden wp-block-calian-com-components-calian-alternating-text-and-images\"><div class=\"calian-alternating-text-and-images__container container-fluid\"><div class=\"\"><div class=\"row gx-md-6 justify-content-lg-start justify-content-lg-start mb-3 mb-md-9\"><div class=\"col-12 col-md mb-3\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/iStock-1332176260-1024x608.jpg\" alt=\"\" width=\"1024\" height=\"608\" class=\"rounded-5 img-fluid w-100 h-250px h-md-373px object-fit-cover\"\/><\/div><div class=\"col-12 col-md\"><h3>Pr\u00e9venir les temps d&#8217;arr\u00eat<\/h3><div class=\"calian-alternating-text-and-images__text mb-3\">Gr\u00e2ce \u00e0 des programmes de formation et de sensibilisation, les employ\u00e9s se familiariseront avec les politiques de l&#8217;organisation, les principes de cybers\u00e9curit\u00e9 et les mod\u00e8les de protection\/restauration de l&#8217;activit\u00e9, ce qui renforcera les efforts de mise en conformit\u00e9.<\/div><div class=\"calian-alternating-text-and-images__ctas mb-3 d-flex flex-wrap gap-3\"><\/div><\/div><\/div><div class=\"row gx-md-6 flex-row-reverse justify-content-lg-between justify-content-lg-start mb-3 mb-md-9\"><div class=\"col-12 col-md mb-3\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/iStock-1481370371-1024x576.jpg\" alt=\"\" width=\"1024\" height=\"576\" class=\"rounded-5 img-fluid w-100 h-250px h-md-373px object-fit-cover\"\/><\/div><div class=\"col-12 col-md\"><h3>Effectuer des tests d&#8217;hame\u00e7onnage<\/h3><div class=\"calian-alternating-text-and-images__text mb-3\">En organisant des exercices de simulation, Calian sensibilise les employ\u00e9s \u00e0 la cybers\u00e9curit\u00e9 dans un environnement contr\u00f4l\u00e9, en appliquant les meilleures pratiques de s\u00e9curit\u00e9 pour lutter contre les menaces.<\/div><div class=\"calian-alternating-text-and-images__ctas mb-3 d-flex flex-wrap gap-3\"><\/div><\/div><\/div><div class=\"row gx-md-6 justify-content-lg-start justify-content-lg-start\"><div class=\"col-12 col-md mb-3\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/iStock-1363276415-1024x576.jpg\" alt=\"\" width=\"1024\" height=\"576\" class=\"rounded-5 img-fluid w-100 h-250px h-md-373px object-fit-cover\"\/><\/div><div class=\"col-12 col-md\"><h3>Exercices de l&#8217;\u00e9quipe violette<\/h3><div class=\"calian-alternating-text-and-images__text mb-3\">Les exercices de l&#8217;\u00e9quipe violette combinent les comp\u00e9tences traditionnelles de l&#8217;\u00e9quipe rouge et de l&#8217;\u00e9quipe bleue pour tester la force de la cybers\u00e9curit\u00e9 d&#8217;une organisation. Dans ces exercices, l&#8217;\u00e9quipe bleue est expos\u00e9e \u00e0 une attaque au moment o\u00f9 elle se produit. Les \u00e9quipes bleue et rouge travaillent ensemble :  \n<ul>\n  <li>Renseignements sur les cybermenaces  <\/li>\n  <li>\u00c9mulation des adversaires <\/li>\n  <li>Services de s\u00e9curit\u00e9 g\u00e9r\u00e9s<\/li>\n<\/ul>\n<p>Ces exercices comprennent :<\/p>\n<ul>\n  <li>Ex\u00e9cution de contr\u00f4les de s\u00e9curit\u00e9 locaux sur l&#8217;ordinateur portable d&#8217;un client.  <\/li>\n  <li>Utilisation du RPV pour se connecter au r\u00e9seau interne du client afin de tenter une propagation lat\u00e9rale. <\/li>\n  <li>Ex\u00e9cution de contr\u00f4les de s\u00e9curit\u00e9 locaux sur le serveur interne du client.<\/li>\n<\/ul><\/div><div class=\"calian-alternating-text-and-images__ctas mb-3 d-flex flex-wrap gap-3\"><a href=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/www\/itcs\/brochures\/purple-team-exercise\/\" class=\"btn btn-primary\">T\u00e9l\u00e9charger la brochure<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"ce0d4eb6-3a3a-4e7b-a392-c00571d304a6\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"fa15d076-0e5b-44f7-8e6b-57e3aa1d68d1\" data-component=\"LocationIntroContent\"><div class=\"calian-location-intro-content wp-block-calian-com-components-calian-location-intro-content\"><div class=\"calian-location-intro-content__container container-fluid\"><div class=\"row\"><div class=\"calian-location-intro-content__top col-12\"><h2 class=\"calian-location-intro-content__heading\">\u00c9tapes<\/h2><p class=\"calian-location-intro-content__intro-text\">Les exercices de l&#8217;\u00e9quipe pourpre encouragent une discussion ouverte sur les techniques d&#8217;attaque et les attentes en mati\u00e8re de d\u00e9fense, en am\u00e9liorant les personnes, les processus et la technologie.<\/p><\/div><\/div><div class=\"row\"><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"2cd46f37-fbf3-47d8-abb2-d93a021a16e1\" data-component=\"Process\"><div class=\"calian-process theme-light wp-block-calian-com-components-calian-process\"><div class=\"calian-process__container container-fluid mw-1440px py-3 py-lg-5\"><div class=\"calian-process__item-listing pb-lg-4\"><div class=\"glide carousel carousel--items-0 bg-transparent\" id=\"performance-component-f3421f62-971c-43fa-a9ad-53a404c2f7f6\"><div class=\"glide__track\" data-glide-el=\"track\"><ul class=\"glide__slides\"><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\">Le coordinateur de l&#8217;exercice supervise le renseignement sur les cybermenaces. L&#8217;\u00e9quipe rouge pr\u00e9sente l&#8217;adversaire, les tactiques, les techniques et les proc\u00e9dures (TTP), ainsi que les d\u00e9tails techniques en fonction du r\u00e9sultat.<\/p><\/div><\/li><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\">Les participants discutent des contr\u00f4les de s\u00e9curit\u00e9 et des attentes en mati\u00e8re de TTP lors d&#8217;une r\u00e9union de lancement.<\/p><\/div><\/li><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\">L&#8217;\u00e9quipe rouge imite les attaquants en lan\u00e7ant des attaques multicouches et en exploitant simultan\u00e9ment les tests de p\u00e9n\u00e9tration des acc\u00e8s privil\u00e9gi\u00e9s.<\/p><\/div><\/li><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\">  Les analystes de l&#8217;\u00e9quipe bleue (SOC, \u00e9quipe de chasse, services de criminalistique num\u00e9rique et de r\u00e9ponse aux incidents) sont form\u00e9s \u00e0 la d\u00e9tection et \u00e0 la r\u00e9ponse aux actes de TTP.<\/p><\/div><\/li><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\">Une fois que la TTP a \u00e9t\u00e9 identifi\u00e9e, qu&#8217;un journal a \u00e9t\u00e9 re\u00e7u ou que des preuves m\u00e9dico-l\u00e9gales ont \u00e9t\u00e9 obtenues, les r\u00e9sultats sont document\u00e9s et partag\u00e9s.<\/p><\/div><\/li><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\">Les contr\u00f4les de s\u00e9curit\u00e9 sont ajust\u00e9s ou mis au point afin d&#8217;accro\u00eetre la visibilit\u00e9 et de r\u00e9p\u00e9ter la TTP.<\/p><\/div><\/li><\/ul><\/div><div class=\"glide__arrows\" data-glide-el=\"controls\"><button class=\"\" btn=\"\" btn-default=\"\" glide__arrow=\"\" glide__arrow--left=\"\" data-glide-dir=\"\"><\/button><button class=\"btn btn-default glide__arrow glide__arrow--right\">&#8221; aria-label=&#8221;Next&#8221;&gt;<i class=\"icon icon-chevron-right\"><\/i><\/button><\/div><div class=\"glide__bullets\" data-glide-el=\"controls[nav]\"><\/div><\/div><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"8075fa92-5d22-41f7-881e-6fc1da652bc4\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"a47bd303-12dc-40b6-8e4d-7d03934e3c1f\" data-component=\"CTABar\"><div class=\"calian-cta-bar theme-dark wp-block-calian-com-components-calian-cta-bar\"><div class=\"calian-cta-bar__container container-fluid\"><div class=\"calian-cta-bar__vertical container-fluid position-relative\"><div class=\"row\"><div class=\"calian-cta-bar__vertical--content col-12\"><h2 class=\"calian-cta-bar__vertical--heading\">Avec Cyber Range, l&#8217;usage rend ma\u00eetre<\/h2><div class=\"calian-cta-bar__vertical--description\">Cyber Range est une plateforme de formation exp\u00e9rientielle \u00e0 la cybers\u00e9curit\u00e9 qui donne acc\u00e8s \u00e0 des environnements virtuels riches et \u00e0 des cours bas\u00e9s sur des attaques r\u00e9elles. Les professionnels de la cybers\u00e9curit\u00e9 et les stagiaires peuvent simuler, tester et ex\u00e9cuter des sc\u00e9narios de cyberattaque dans un environnement contr\u00f4l\u00e9. Ce champ de bataille virtuel leur permet de mettre en pratique des strat\u00e9gies d\u00e9fensives, de comprendre les tactiques des attaquants et de rester \u00e0 l&#8217;aff\u00fbt des derni\u00e8res menaces sans risquer de mettre en p\u00e9ril les syst\u00e8mes r\u00e9els.<\/div><div class=\"calian-cta-bar__vertical--buttons\"><a href=\"#contact-form\" class=\"btn btn-light\">R\u00e9server une d\u00e9monstration<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"6a17a765-0b13-4fbe-a464-1d3a30203011\" data-component=\"LogoBar\"><div><div class=\"d-flex justify-content-center p-1\"><div class=\"spinner-border text-primary \" role=\"status\" style=\"width:3rem;height:3rem\"><span class=\"visually-hidden\">Chargement&#8230;<\/span><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"d44b606e-2c0a-421d-9e06-a42e84403d45\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"bac863ed-14c0-4bc4-b26d-8ee4440b3ebc\" data-component=\"ContactCTAHubSpot\"><div id=\"contact-form\" class=\"calian-contact-cta overflow-hidden position-relative default wp-block-calian-com-components-calian-contact-cta-hub-spot\"><div class=\"calian-contact-cta__overlay position-absolute z-2\"><\/div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/iStock-1350722246-1024x576.jpeg\" alt=\"\" width=\"1024\" height=\"576\" class=\"calian-contact-cta__background-image position-absolute z-1\"\/><div class=\"calian-contact-cta__container mx-auto py-5 py-md-10 position-relative z-3\"><div class=\"d-flex\"><div class=\"calian-contact-cta__form mx-auto px-3\"><h2>Moderniser et s\u00e9curiser votre infrastructure informatique <\/h2><p>Adressez-vous \u00e0 un expert pour favoriser la r\u00e9ussite de votre organisation dans le domaine num\u00e9rique.<\/p><div class=\"hs-form__container\"><div class=\"hs-form__container-inner\"><div class=\"d-flex justify-content-center p-1\"><div class=\"spinner-border text-primary \" role=\"status\" style=\"width:3rem;height:3rem\"><span class=\"visually-hidden\">Chargement&#8230;<\/span><\/div><\/div><div class=\"hs-form__target\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"e230efe6-4d23-4d92-8256-72dea9230f8e\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"9a22df44-6dfd-4f66-8390-f2c93c25ff04\" data-component=\"LogoBar\"><div><div class=\"d-flex justify-content-center p-1\"><div class=\"spinner-border text-primary \" role=\"status\" style=\"width:3rem;height:3rem\"><span class=\"visually-hidden\">Chargement&#8230;<\/span><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"97b904cf-2775-45f8-9c8d-538ab7ce5b52\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Formation et sensibilisation \u00e0 la cybers\u00e9curit\u00e9 Les cybermenaces font partie des plus grands risques auxquels les organisations sont confront\u00e9es aujourd&#8217;hui, et elles deviennent de plus en plus sophistiqu\u00e9es. Adoptez une approche proactive de la sensibilisation et de la formation \u00e0 la cybers\u00e9curit\u00e9 en veillant \u00e0 ce que tous les employ\u00e9s soient en mesure de reconna\u00eetre les cyberattaques et d&#8217;y r\u00e9pondre. &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":8068,"menu_order":91,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"solution":[103],"industry":[92,93,94,97,95,96,99],"type_classification":[110],"class_list":["post-8132","page","type-page","status-publish","hentry","solution-cybersecurite","industry-communications-et-medias","industry-defense-et-armee","industry-energie-ressources-et-environnement","industry-fabrication","industry-gouvernement-et-service-public","industry-sante","industry-securite-publique","type_classification-solution-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Formation et sensibilisation \u00e0 la cybers\u00e9curit\u00e9 - ITCS | Calian<\/title>\n<meta name=\"description\" content=\"D\u00e9veloppez une main-d&#039;\u0153uvre avertie gr\u00e2ce aux programmes de formation et de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 de Calian. Favoriser une culture de sensibilisation et de vigilance en mati\u00e8re de s\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Formation et sensibilisation \u00e0 la cybers\u00e9curit\u00e9 - ITCS | Calian\" \/>\n<meta property=\"og:description\" content=\"D\u00e9veloppez une main-d&#039;\u0153uvre avertie gr\u00e2ce aux programmes de formation et de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 de Calian. Favoriser une culture de sensibilisation et de vigilance en mati\u00e8re de s\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Solutions informatiques et cybern\u00e9tiques\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T20:04:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/\",\"url\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/\",\"name\":\"Formation et sensibilisation \u00e0 la cybers\u00e9curit\u00e9 - ITCS | Calian\",\"isPartOf\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg\",\"datePublished\":\"2023-12-08T01:17:06+00:00\",\"dateModified\":\"2025-03-24T20:04:49+00:00\",\"description\":\"D\u00e9veloppez une main-d'\u0153uvre avertie gr\u00e2ce aux programmes de formation et de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 de Calian. Favoriser une culture de sensibilisation et de vigilance en mati\u00e8re de s\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg\",\"contentUrl\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gestion des risques et conformit\u00e9\",\"item\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Formation et sensibilisation \u00e0 la cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#website\",\"url\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/\",\"name\":\"Solutions informatiques et cybern\u00e9tiques\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#organization\",\"name\":\"Calian Group Ltd.\",\"url\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2024\/03\/logo-colour.svg\",\"contentUrl\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2024\/03\/logo-colour.svg\",\"width\":180,\"height\":65,\"caption\":\"Calian Group Ltd.\"},\"image\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Formation et sensibilisation \u00e0 la cybers\u00e9curit\u00e9 - ITCS | Calian","description":"D\u00e9veloppez une main-d'\u0153uvre avertie gr\u00e2ce aux programmes de formation et de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 de Calian. Favoriser une culture de sensibilisation et de vigilance en mati\u00e8re de s\u00e9curit\u00e9.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_CA","og_type":"article","og_title":"Formation et sensibilisation \u00e0 la cybers\u00e9curit\u00e9 - ITCS | Calian","og_description":"D\u00e9veloppez une main-d'\u0153uvre avertie gr\u00e2ce aux programmes de formation et de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 de Calian. Favoriser une culture de sensibilisation et de vigilance en mati\u00e8re de s\u00e9curit\u00e9.","og_url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/","og_site_name":"Solutions informatiques et cybern\u00e9tiques","article_modified_time":"2025-03-24T20:04:49+00:00","og_image":[{"url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/","url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/","name":"Formation et sensibilisation \u00e0 la cybers\u00e9curit\u00e9 - ITCS | Calian","isPartOf":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg","datePublished":"2023-12-08T01:17:06+00:00","dateModified":"2025-03-24T20:04:49+00:00","description":"D\u00e9veloppez une main-d'\u0153uvre avertie gr\u00e2ce aux programmes de formation et de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 de Calian. Favoriser une culture de sensibilisation et de vigilance en mati\u00e8re de s\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/#primaryimage","url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg","contentUrl":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/formation-en-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/"},{"@type":"ListItem","position":2,"name":"Gestion des risques et conformit\u00e9","item":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/"},{"@type":"ListItem","position":3,"name":"Formation et sensibilisation \u00e0 la cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#website","url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/","name":"Solutions informatiques et cybern\u00e9tiques","description":"","publisher":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#organization","name":"Calian Group Ltd.","url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2024\/03\/logo-colour.svg","contentUrl":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2024\/03\/logo-colour.svg","width":180,"height":65,"caption":"Calian Group Ltd."},"image":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/pages\/8132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/comments?post=8132"}],"version-history":[{"count":16,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/pages\/8132\/revisions"}],"predecessor-version":[{"id":16734,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/pages\/8132\/revisions\/16734"}],"up":[{"embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/pages\/8068"}],"wp:attachment":[{"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/media?parent=8132"}],"wp:term":[{"taxonomy":"solution","embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/solution?post=8132"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/industry?post=8132"},{"taxonomy":"type_classification","embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/fr\/wp-json\/wp\/v2\/type_classification?post=8132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}