{"id":9890,"date":"2016-11-11T18:18:00","date_gmt":"2016-11-12T01:18:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/two-2017-cyber-security-trends\/"},"modified":"2025-01-10T10:38:19","modified_gmt":"2025-01-10T17:38:19","slug":"deux-tendances-en-matiere-de-cybersecurite-en-2017","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/blog\/two-2017-cyber-security-trends\/","title":{"rendered":"Deux tendances de la cybers\u00e9curit\u00e9 de 2017 que tout professionnel des op\u00e9rations de s\u00e9curit\u00e9 devrait conna\u00eetre"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Salle de contr\u00f4le vide, tapiss\u00e9e d&#039;\u00e9crans affichant des flux de donn\u00e9es en direct.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2016-11-11T18:18:00-07:00\">11 novembre 2016<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Deux tendances de la cybers\u00e9curit\u00e9 de 2017 que tout professionnel des op\u00e9rations de s\u00e9curit\u00e9 devrait conna\u00eetre<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/fr\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"avatar de l&#039;utilisateur\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">2 <\/span> Lecture en une minute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/fr\/blog\/two-2017-cyber-security-trends\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/fr\/blog\/two-2017-cyber-security-trends\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Two%202017%20cybersecurity%20trends%20every%20security%20operations%20professional%20should%20know').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ftwo-2017-cyber-security-trends%2F', '_blank')\" title=\"E-mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gazouillement\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Two%202017%20cybersecurity%20trends%20every%20security%20operations%20professional%20should%20know&url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ftwo-2017-cyber-security-trends%2F\" title=\"Gazouillement\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ftwo-2017-cyber-security-trends%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ftwo-2017-cyber-security-trends%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<h2>Principales conclusions de l&#039;\u00e9tude PwC sur l&#039;\u00e9tat mondial de la s\u00e9curit\u00e9 de l&#039;information 2017<\/h2>\n<p>Chaque ann\u00e9e, quelques \u00e9tudes de r\u00e9f\u00e9rence apportent des \u00e9clairages et une compr\u00e9hension pr\u00e9cieux pour une protection plus efficace en mati\u00e8re de cybers\u00e9curit\u00e9. Le rapport 2017 de PwC intitul\u00e9 \u201c\u00a0\u00c9tat mondial de la s\u00e9curit\u00e9 de l\u2019information\u00a0\u201d est l\u2019une de ces \u00e9tudes, bas\u00e9e sur des entretiens avec plus de\u2026 <strong>10,000<\/strong> Dirigeants d&#039;entreprise et responsables informatiques. Bien qu&#039;il s&#039;agisse d&#039;une \u00e9tude exhaustive, deux conclusions cl\u00e9s se distinguent et constituent un apport essentiel pour une \u00e9quipe de cybers\u00e9curit\u00e9.<\/p>\n<h3>Constat cl\u00e9 #1\u00a0: Les processus de cybers\u00e9curit\u00e9 n\u00e9cessitent une int\u00e9gration, une gestion et une am\u00e9lioration continue\u00a0; l\u2019orchestration de la s\u00e9curit\u00e9 et une automatisation accrue sont essentielles.<\/h3>\n<p>Face \u00e0 l&#039;\u00e9mergence de menaces nouvelles et plus virulentes, l&#039;int\u00e9gration efficace et l&#039;utilisation efficiente de tous vos outils de s\u00e9curit\u00e9 sont essentielles. <a href=\"https:\/\/swimlane.com\/fr\/solutions\/orchestration-de-la-securite\/\">Orchestration de la s\u00e9curit\u00e9<\/a> assure la synergie entre les diff\u00e9rents outils de s\u00e9curit\u00e9 pour une meilleure protection.\u00a0<\/p>\n<p>L&#039;automatisation de la cybers\u00e9curit\u00e9 am\u00e9liore en permanence la productivit\u00e9 et le succ\u00e8s de l&#039;\u00e9quipe de cybers\u00e9curit\u00e9 existante. Gr\u00e2ce aux API et aux m\u00e9thodes de s\u00e9curit\u00e9 d\u00e9finies par logiciel (SDSec), <a href=\"https:\/\/swimlane.com\/fr\/blog\/automatisation-de-la-securite\/\">automatisation de la s\u00e9curit\u00e9<\/a> Cela permet aux \u00e9quipes de s\u00e9curit\u00e9 d&#039;op\u00e9rer plus efficacement et d&#039;analyser un plus grand nombre d&#039;alertes, tout en r\u00e9duisant consid\u00e9rablement le temps moyen de r\u00e9ponse. C&#039;est une priorit\u00e9 absolue compte tenu de la p\u00e9nurie de personnel qualifi\u00e9 n\u00e9cessaire pour faire face \u00e0 l&#039;afflux massif de menaces. Or, selon une enqu\u00eate d&#039;AlgoSec, seuls 151 % des r\u00e9pondants disposaient de processus de s\u00e9curit\u00e9 hautement automatis\u00e9s, tandis que 331 % n&#039;en avaient que tr\u00e8s peu, voire pas du tout.<\/p>\n<h3>Constat principal #2\u00a0: Utilisation croissante de l\u2019analyse de donn\u00e9es et du renseignement sur les menaces<\/h3>\n<p>L&#039;\u00e9tude de PwC souligne \u00e9galement la n\u00e9cessit\u00e9 d&#039;utiliser l&#039;analyse avanc\u00e9e des donn\u00e9es et le renseignement sur les menaces en temps r\u00e9el pour contextualiser la compr\u00e9hension des risques. L&#039;\u00e9dition 2016 de ce m\u00eame rapport indiquait que 591 millions de r\u00e9pondants utilisaient d\u00e9j\u00e0 l&#039;analyse du Big Data pour mod\u00e9liser les menaces de s\u00e9curit\u00e9, ce qui d\u00e9montre que les op\u00e9rations de s\u00e9curit\u00e9 s&#039;orientent dans cette direction. Ce contexte est essentiel pour r\u00e9pondre efficacement aux menaces gr\u00e2ce \u00e0 une s\u00e9curit\u00e9 automatis\u00e9e. Par ailleurs, la combinaison de l&#039;historique des incidents et d&#039;une connaissance situationnelle en temps r\u00e9el des cybermenaces nouvelles ou in\u00e9dites permet de d\u00e9terminer si des \u00e9v\u00e9nements isol\u00e9s font partie d&#039;une cyberattaque de plus grande envergure et contribue \u00e0 orchestrer une r\u00e9ponse plus rapide aux incidents.<\/p>\n<p>Ces deux constats cl\u00e9s ne font que renforcer la n\u00e9cessit\u00e9 pour les \u00e9quipes de cybers\u00e9curit\u00e9 d&#039;\u00e9voluer constamment afin de se pr\u00e9munir contre les menaces les plus r\u00e9centes. L&#039;orchestration et l&#039;utilisation efficace du renseignement sur les menaces sont d\u00e9sormais des tactiques incontournables pour prot\u00e9ger votre organisation. Vous trouverez plus d&#039;informations sur la mise en \u0153uvre efficace de l&#039;orchestration de la s\u00e9curit\u00e9 dans ce guide. <a href=\"https:\/\/swimlane.com\/fr\/solutions\/cas-dutilisation\/\">cas d&#039;utilisation<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">\u00c9tiquettes<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/fr\/tag\/research\/'><span class='tag-content'>Recherche<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Articles similaires<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e9200d959fb bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/10-facts-every-cyber-security-professional-should-know\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>19 avril 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Dix faits que tout professionnel de la cybers\u00e9curit\u00e9 devrait conna\u00eetre<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e9200d97065 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/cybersecurity-statistics-2017\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>30 ao\u00fbt 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Statistiques de cybers\u00e9curit\u00e9 2017\u00a0: Analyse approfondie des faits et perspectives d\u2019avenir<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e9200d98237 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/black-hat-keynote-2019\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>1er ao\u00fbt 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Aujourd&#039;hui, toute \u00e9quipe de s\u00e9curit\u00e9 est une \u00e9quipe logicielle\u00a0: pourquoi assister \u00e0 la conf\u00e9rence Black Hat\u00a0?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Vous souhaitez en savoir plus ?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnez-vous d\u00e8s aujourd&#039;hui pour rester inform\u00e9 et recevoir r\u00e9guli\u00e8rement des mises \u00e0 jour de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Contexte moderne de la s\u00e9curit\u00e9 op\u00e9rationnelle\u00a0: un graphique g\u00e9om\u00e9trique en d\u00e9grad\u00e9 repr\u00e9sentant un flux de donn\u00e9es fluide et l\u2019agilit\u00e9 native du cloud.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9891,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[86],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9890","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-research","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>2017 Cybersecurity Trends for SOC Professionals | Swimlane<\/title>\n<meta name=\"description\" content=\"The 2017 PwC \u201cGlobal State of Information Security\u201d report helps provide insight and understanding to enable more effective cyber security protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/blog\/deux-tendances-en-matiere-de-cybersecurite-en-2017\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Two 2017 cybersecurity trends every security operations professional should know\" \/>\n<meta property=\"og:description\" content=\"The 2017 PwC \u201cGlobal State of Information Security\u201d report helps provide insight and understanding to enable more effective cyber security protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/blog\/deux-tendances-en-matiere-de-cybersecurite-en-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:38:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/two-2017-cyber-security-trends\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/two-2017-cyber-security-trends\\\/\",\"name\":\"2017 Cybersecurity Trends for SOC Professionals | Swimlane\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/two-2017-cyber-security-trends\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/two-2017-cyber-security-trends\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/08.07.18-Benefits-of-Automation-2.png\",\"datePublished\":\"2016-11-12T01:18:00+00:00\",\"dateModified\":\"2025-01-10T17:38:19+00:00\",\"description\":\"The 2017 PwC \u201cGlobal State of Information Security\u201d report helps provide insight and understanding to enable more effective cyber security protection.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/two-2017-cyber-security-trends\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/two-2017-cyber-security-trends\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/two-2017-cyber-security-trends\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/08.07.18-Benefits-of-Automation-2.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/08.07.18-Benefits-of-Automation-2.png\",\"width\":1120,\"height\":696,\"caption\":\"Empty control room lined with monitors displaying live data feeds\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/two-2017-cyber-security-trends\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Two 2017 cybersecurity trends every security operations professional should know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tendances 2017 en cybers\u00e9curit\u00e9 pour les professionnels des SOC | Swimlane","description":"Le rapport 2017 de PwC intitul\u00e9 \u201c \u00c9tat mondial de la s\u00e9curit\u00e9 de l&#039;information \u201d contribue \u00e0 fournir des informations et une compr\u00e9hension permettant une protection plus efficace en mati\u00e8re de cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/blog\/deux-tendances-en-matiere-de-cybersecurite-en-2017\/","og_locale":"fr_FR","og_type":"article","og_title":"Two 2017 cybersecurity trends every security operations professional should know","og_description":"The 2017 PwC \u201cGlobal State of Information Security\u201d report helps provide insight and understanding to enable more effective cyber security protection.","og_url":"https:\/\/swimlane.com\/fr\/blog\/deux-tendances-en-matiere-de-cybersecurite-en-2017\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:38:19+00:00","og_image":[{"width":1120,"height":696,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/blog\/two-2017-cyber-security-trends\/","url":"https:\/\/swimlane.com\/fr\/blog\/two-2017-cyber-security-trends\/","name":"Tendances 2017 en cybers\u00e9curit\u00e9 pour les professionnels des SOC | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/blog\/two-2017-cyber-security-trends\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/blog\/two-2017-cyber-security-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png","datePublished":"2016-11-12T01:18:00+00:00","dateModified":"2025-01-10T17:38:19+00:00","description":"Le rapport 2017 de PwC intitul\u00e9 \u201c \u00c9tat mondial de la s\u00e9curit\u00e9 de l&#039;information \u201d contribue \u00e0 fournir des informations et une compr\u00e9hension permettant une protection plus efficace en mati\u00e8re de cybers\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/blog\/two-2017-cyber-security-trends\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/blog\/two-2017-cyber-security-trends\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/blog\/two-2017-cyber-security-trends\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/08.07.18-Benefits-of-Automation-2.png","width":1120,"height":696,"caption":"Empty control room lined with monitors displaying live data feeds"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/blog\/two-2017-cyber-security-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Two 2017 cybersecurity trends every security operations professional should know"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9890\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/9891"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=9890"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=9890"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=9890"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=9890"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=9890"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=9890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}