{"id":9910,"date":"2023-04-25T09:49:00","date_gmt":"2023-04-25T15:49:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/the-3-scariest-breach-consequences-for-cios\/"},"modified":"2025-01-10T10:36:04","modified_gmt":"2025-01-10T17:36:04","slug":"les-3-consequences-les-plus-effrayantes-dune-violation-de-donnees-pour-les-cio","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/blog\/the-3-scariest-breach-consequences-for-cios\/","title":{"rendered":"Les trois cons\u00e9quences les plus terrifiantes d&#039;une violation de donn\u00e9es pour les RSSI"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Les trois cons\u00e9quences les plus effrayantes d&#039;une violation de donn\u00e9es pour les RSSI\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2023-04-25T09:49:00-06:00\">25 avril 2023<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Les trois cons\u00e9quences les plus terrifiantes d&#039;une violation de donn\u00e9es pour les RSSI<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/fr\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de l&#039;utilisateur\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Lecture en une minute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/fr\/blog\/the-3-scariest-breach-consequences-for-cios\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/fr\/blog\/the-3-scariest-breach-consequences-for-cios\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20Three%20Scariest%20Breach%20Consequences%20for%20CISOs').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fthe-3-scariest-breach-consequences-for-cios%2F', '_blank')\" title=\"E-mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gazouillement\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20Three%20Scariest%20Breach%20Consequences%20for%20CISOs&url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fthe-3-scariest-breach-consequences-for-cios%2F\" title=\"Gazouillement\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fthe-3-scariest-breach-consequences-for-cios%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fthe-3-scariest-breach-consequences-for-cios%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<p>Dans le monde num\u00e9rique actuel, les cybermenaces \u00e9voluent sans cesse, ce qui complique la t\u00e2che des entreprises pour s\u00e9curiser leurs donn\u00e9es sensibles. Les cons\u00e9quences d&#039;une fuite de donn\u00e9es peuvent \u00eatre catastrophiques, et il incombe aux responsables de la s\u00e9curit\u00e9 de garantir la protection des donn\u00e9es de l&#039;entreprise et des donn\u00e9es clients. Les responsables de la s\u00e9curit\u00e9 des syst\u00e8mes d&#039;information (RSSI) jouent un r\u00f4le crucial dans la protection des actifs num\u00e9riques de l&#039;entreprise et de sa r\u00e9putation. Toutefois, tout manquement \u00e0 la protection des donn\u00e9es sensibles peut avoir de graves cons\u00e9quences, tant pour l&#039;organisation que pour le responsable de la s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Malgr\u00e9 la r\u00e9cente vague de <a href=\"https:\/\/swimlane.com\/fr\/blog\/principales-violations-de-donnees-en-2022\/\">fuites de donn\u00e9es tr\u00e8s m\u00e9diatis\u00e9es<\/a>, Des recherches montrent que de nombreux RSSI tardent encore \u00e0 am\u00e9liorer les outils et les bonnes pratiques de s\u00e9curit\u00e9 de leur organisation. Une \u00e9tude r\u00e9cente, par exemple, a r\u00e9v\u00e9l\u00e9 que <a href=\"https:\/\/www.scmagazine.com\/news\/security-awareness\/a-third-of-companies-dont-offer-cybersecurity-training-to-remote-workers\">une organisation sur trois<\/a> ne dispensent pas de formation de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 aux employ\u00e9s travaillant \u00e0 distance \u2013 une t\u00e2che qui, traditionnellement, incombe au RSSI.<\/p>\n\n\n\n<p>Mais les RSSI qui adoptent une philosophie du \u201c \u00e7a n&#039;arrive qu&#039;aux autres \u201d prennent peut-\u00eatre des risques encore plus importants qu&#039;ils ne le pensent. Voici quelques-unes des cons\u00e9quences les plus graves auxquelles ces dirigeants pourraient \u00eatre confront\u00e9s apr\u00e8s une violation de donn\u00e9es\u00a0:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Perte d&#039;emploi<\/h2>\n\n\n\n<p>Ce n&#039;est peut-\u00eatre pas juste, mais dans bien des cas, le RSSI est tenu pour principal responsable d&#039;un piratage. C&#039;est particuli\u00e8rement vrai pour les entreprises cot\u00e9es en bourse, o\u00f9 la direction doit rendre des comptes \u00e0 un conseil d&#039;administration. Souvent, lorsqu&#039;une telle organisation est confront\u00e9e \u00e0 une crise, le conseil exige des licenciements, ne serait-ce que pour apaiser les actionnaires et \u00e9viter l&#039;effondrement du cours de l&#039;action.<\/p>\n\n\n\n<p>Un exemple parfait en est la tristement c\u00e9l\u00e8bre fuite de donn\u00e9es d&#039;Equifax, qui a entra\u00een\u00e9 la perte des donn\u00e9es personnelles de plus de 143 millions de clients. La responsable de la s\u00e9curit\u00e9 d&#039;Equifax, Susan Mauldin, et le directeur des syst\u00e8mes d&#039;information, David Webb, ont \u00e9t\u00e9 contraints de d\u00e9missionner \u00e0 la suite de cette fuite. <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/2017-data-breach-will-cost-equifax-at-least-1-38-billion\">cela a co\u00fbt\u00e9 \u00e0 l&#039;entreprise plus de 1 400 000 milliards de dollars.<\/a>. M\u00eame si toutes les violations de donn\u00e9es n&#039;entra\u00eenent pas des cons\u00e9quences aussi graves, la menace de perte d&#039;emploi est une pr\u00e9occupation majeure pour les RSSI, ce qui rend imp\u00e9ratif de donner la priorit\u00e9 aux mesures de cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<p>L&#039;id\u00e9e de perdre son emploi est angoissante, mais c&#039;est une r\u00e9elle possibilit\u00e9 pour les RSSI \u00e0 la suite d&#039;une fuite de donn\u00e9es. En fait, <a href=\"https:\/\/media.nominetcyber.com\/wp-content\/uploads\/2020\/02\/Nominet_The-CISO-Stress-Report_2020_V10.pdf\">29% des RSSI<\/a> Je pense que la personne responsable serait licenci\u00e9e en cas de violation. Cela montre bien la pression qui p\u00e8se sur les RSSI pour prot\u00e9ger \u00e0 tout prix les donn\u00e9es sensibles de leur organisation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Atteinte \u00e0 la r\u00e9putation<\/h2>\n\n\n\n<p>En tant que RSSI, votre r\u00e9putation est primordiale. Vous avez travaill\u00e9 sans rel\u00e2che pour instaurer la confiance et vous imposer comme expert dans votre domaine. Mais une fuite de donn\u00e9es peut an\u00e9antir tous ces efforts en un instant. M\u00eame si un RSSI n&#039;est pas licenci\u00e9 apr\u00e8s une telle fuite, sa r\u00e9putation au sein de l&#039;organisation peut \u00eatre gravement compromise. Le coup port\u00e9 \u00e0 l&#039;ego, li\u00e9 \u00e0 la perte de statut, est d\u00e9j\u00e0 difficile \u00e0 encaisser, mais cela peut \u00e9galement nuire \u00e0 sa capacit\u00e9 \u00e0 obtenir l&#039;approbation de projets budg\u00e9taires essentiels \u00e0 l&#039;avenir.<\/p>\n\n\n\n<p>Une violation de donn\u00e9es peut entra\u00eener une couverture m\u00e9diatique n\u00e9gative, une perte de confiance des clients et une atteinte \u00e0 l&#039;image de marque. Rien d&#039;\u00e9tonnant.<a href=\"https:\/\/www.csoonline.com\/article\/3019283\/does-a-data-breach-really-affect-your-firm-s-reputation.html\"> 46% d&#039;organisations<\/a> Les entreprises victimes d&#039;une fuite de donn\u00e9es signalent des dommages \u00e0 leur r\u00e9putation. Les RSSI sont en partie responsables de la protection de la r\u00e9putation de l&#039;organisation, et une fuite peut an\u00e9antir des ann\u00e9es d&#039;efforts.<\/p>\n\n\n\n<p>Par exemple, la fuite de donn\u00e9es chez Target, qui a entra\u00een\u00e9 la perte de plus de 40 millions de dossiers clients, a provoqu\u00e9 une importante perte de confiance de la client\u00e8le et une grave atteinte \u00e0 l&#039;image de marque. La DSI de l&#039;\u00e9poque, Beth Jacob, a d\u00e9missionn\u00e9 suite \u00e0 cet incident. Les dommages caus\u00e9s \u00e0 la r\u00e9putation par une fuite de donn\u00e9es peuvent \u00eatre difficiles \u00e0 r\u00e9parer, et les RSSI doivent s&#039;efforcer de pr\u00e9venir de telles fuites afin d&#039;\u00e9viter de telles cons\u00e9quences.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Poursuites judiciaires<\/h2>\n\n\n\n<p>Personne n&#039;appr\u00e9cie d&#039;\u00eatre poursuivi en justice, et les RSSI ne font pas exception. En cas de violation de donn\u00e9es, les clients ou employ\u00e9s concern\u00e9s peuvent intenter une action en justice contre l&#039;organisation et ses dirigeants. Les RSSI peuvent \u00e9galement \u00eatre tenus personnellement responsables s&#039;il est \u00e9tabli qu&#039;ils n&#039;ont pas pris les mesures de cybers\u00e9curit\u00e9 ad\u00e9quates.&nbsp;<\/p>\n\n\n\n<p>Par exemple, lors de la fuite de donn\u00e9es chez Yahoo qui a touch\u00e9 plus de 3 milliards de comptes utilisateurs, le responsable de la s\u00e9curit\u00e9 des syst\u00e8mes d&#039;information (RSSI) de l&#039;entreprise a \u00e9t\u00e9 mis en cause dans une action collective intent\u00e9e par des actionnaires. Et pr\u00e8s de deux ans apr\u00e8s la fuite de donn\u00e9es chez SolarWinds, son RSSI (entre autres) a \u00e9t\u00e9 cit\u00e9 dans <a href=\"https:\/\/www.csoonline.com\/article\/3657874\/solarwinds-breach-lawsuits-6-takeaways-for-cisos.html\">une action collective d&#039;actionnaires<\/a>.<\/p>\n\n\n\n<p>Pour \u00e9viter tout litige, les RSSI doivent s&#039;engager \u00e0 former les utilisateurs finaux, d\u00e9finir une strat\u00e9gie claire et adopter des outils performants de gestion des incidents de cybers\u00e9curit\u00e9. Ces mesures r\u00e9duiront consid\u00e9rablement le risque de violation de donn\u00e9es et t\u00e9moigneront de leur bonne foi, limitant ainsi leur responsabilit\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Il est temps d&#039;att\u00e9nuer le risque<\/h3>\n\n\n\n<p>Les cons\u00e9quences d&#039;une fuite de donn\u00e9es peuvent \u00eatre graves pour les RSSI, notamment la perte de leur emploi, l&#039;atteinte \u00e0 leur r\u00e9putation et m\u00eame des poursuites judiciaires. La menace de ces cons\u00e9quences souligne l&#039;importance de prioriser les mesures de cybers\u00e9curit\u00e9 afin de pr\u00e9venir les violations. Les RSSI doivent s&#039;assurer que leurs organisations disposent de mesures de s\u00e9curit\u00e9 robustes et que leurs <a href=\"https:\/\/swimlane.com\/fr\/blog\/quest-ce-quun-centre-doperations-de-securite-soc\/\">Centre des op\u00e9rations de s\u00e9curit\u00e9 (SOC)<\/a> L&#039;\u00e9quipe est \u00e9quip\u00e9e pour trier rapidement les alertes et les menaces.<\/p>\n\n\n\n<p>\u00catre RSSI, c&#039;est loin d&#039;\u00eatre une sin\u00e9cure. C&#039;est un poste \u00e0 haute responsabilit\u00e9 qui exige une vigilance constante et une ma\u00eetrise parfaite des dossiers. Mais avec une strat\u00e9gie de cybers\u00e9curit\u00e9 adapt\u00e9e, les RSSI peuvent att\u00e9nuer les risques li\u00e9s \u00e0 une violation de donn\u00e9es et prot\u00e9ger les donn\u00e9es sensibles de leur organisation. Alors, restez vigilants, gardez une longueur d&#039;avance et n&#039;oubliez pas de respirer.<\/p>\n\n\n\n<div class=\"bs-div bs-div-780013b491a36519dcd320dac1e8bf00a159c881 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-780013b491a36519dcd320dac1e8bf00a159c881 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap\"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/incomm_msthead.webp' class='img-fluid'   alt='Int\u00e9rieur du si\u00e8ge social d&#039;InComm Payments illustrant l&#039;automatisation de la s\u00e9curit\u00e9 pour le leader mondial de la fintech.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\">\u00c9tude de cas\u00a0: InComm Payments unifie ses outils de s\u00e9curit\u00e9 cloisonn\u00e9s gr\u00e2ce \u00e0 Swimlane<\/h2>\n\n\n\n<p>D\u00e9couvrez comment l&#039;\u00e9quipe SOC d&#039;InComm Payments a pu unifier des outils de s\u00e9curit\u00e9 cloisonn\u00e9s gr\u00e2ce \u00e0 l&#039;automatisation de s\u00e9curit\u00e9 low-code de Swimlane.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-720ea6be28eebf8fc03421136e5c5ed7d2d54f6d\"><style>.bs-pro-button-p-btn-720ea6be28eebf8fc03421136e5c5ed7d2d54f6d .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/fr\/ressources\/etudes-de-cas\/paiements-de-revenus\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">En savoir plus<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">\u00c9tiquettes<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Articles similaires<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f2183c8ee0c bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/3-major-security-operations-mistakes\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>16 janvier 2016<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Trois erreurs majeures dans les op\u00e9rations de s\u00e9curit\u00e9<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f2183c901c1 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/next-great-resignation-security-leaders-ciso\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>17 mars 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>La prochaine grande d\u00e9mission\u00a0? Celle des responsables de la s\u00e9curit\u00e9 et des RSSI.<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69f2183c9114b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/three-crucial-questions-to-ask-before-adopting-cyber-security-solutions\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12 mars 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Trois questions cruciales \u00e0 se poser avant d&#039;adopter une solution de cybers\u00e9curit\u00e9<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Vous souhaitez en savoir plus ?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnez-vous d\u00e8s aujourd&#039;hui pour rester inform\u00e9 et recevoir r\u00e9guli\u00e8rement des mises \u00e0 jour de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Contexte moderne de la s\u00e9curit\u00e9 op\u00e9rationnelle\u00a0: un graphique g\u00e9om\u00e9trique en d\u00e9grad\u00e9 repr\u00e9sentant un flux de donn\u00e9es fluide et l\u2019agilit\u00e9 native du cloud.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":29849,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"2023-04-26T21:19:35.305Z","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9910","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The 3 Scariest Breach Consequences for CISOs<\/title>\n<meta name=\"description\" content=\"Despite recent data breaches, research shows CISOs needs all the help they can get to avoid job loss, lawsuits and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/blog\/les-3-consequences-les-plus-effrayantes-dune-violation-de-donnees-pour-les-cio\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Three Scariest Breach Consequences for CISOs\" \/>\n<meta property=\"og:description\" content=\"Despite recent data breaches, research shows CISOs needs all the help they can get to avoid job loss, lawsuits and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/blog\/les-3-consequences-les-plus-effrayantes-dune-violation-de-donnees-pour-les-cio\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:36:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-1.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/\",\"name\":\"The 3 Scariest Breach Consequences for CISOs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/3SCARIEST_BREACH.png\",\"datePublished\":\"2023-04-25T15:49:00+00:00\",\"dateModified\":\"2025-01-10T17:36:04+00:00\",\"description\":\"Despite recent data breaches, research shows CISOs needs all the help they can get to avoid job loss, lawsuits and more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/3SCARIEST_BREACH.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/3SCARIEST_BREACH.png\",\"width\":1120,\"height\":666,\"caption\":\"three scariest breach consequences for CISOs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Three Scariest Breach Consequences for CISOs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les 3 cons\u00e9quences les plus terrifiantes d&#039;une violation de donn\u00e9es pour les RSSI","description":"Malgr\u00e9 les r\u00e9centes violations de donn\u00e9es, les recherches montrent que les RSSI ont besoin de toute l&#039;aide possible pour \u00e9viter les pertes d&#039;emploi, les poursuites judiciaires et autres d\u00e9sagr\u00e9ments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/blog\/les-3-consequences-les-plus-effrayantes-dune-violation-de-donnees-pour-les-cio\/","og_locale":"fr_FR","og_type":"article","og_title":"The Three Scariest Breach Consequences for CISOs","og_description":"Despite recent data breaches, research shows CISOs needs all the help they can get to avoid job loss, lawsuits and more.","og_url":"https:\/\/swimlane.com\/fr\/blog\/les-3-consequences-les-plus-effrayantes-dune-violation-de-donnees-pour-les-cio\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:36:04+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-1.png","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/blog\/the-3-scariest-breach-consequences-for-cios\/","url":"https:\/\/swimlane.com\/fr\/blog\/the-3-scariest-breach-consequences-for-cios\/","name":"Les 3 cons\u00e9quences les plus terrifiantes d&#039;une violation de donn\u00e9es pour les RSSI","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/blog\/the-3-scariest-breach-consequences-for-cios\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/blog\/the-3-scariest-breach-consequences-for-cios\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH.png","datePublished":"2023-04-25T15:49:00+00:00","dateModified":"2025-01-10T17:36:04+00:00","description":"Malgr\u00e9 les r\u00e9centes violations de donn\u00e9es, les recherches montrent que les RSSI ont besoin de toute l&#039;aide possible pour \u00e9viter les pertes d&#039;emploi, les poursuites judiciaires et autres d\u00e9sagr\u00e9ments.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/blog\/the-3-scariest-breach-consequences-for-cios\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/blog\/the-3-scariest-breach-consequences-for-cios\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/blog\/the-3-scariest-breach-consequences-for-cios\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH.png","width":1120,"height":666,"caption":"three scariest breach consequences for CISOs"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/blog\/the-3-scariest-breach-consequences-for-cios\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The Three Scariest Breach Consequences for CISOs"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9910\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/29849"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=9910"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=9910"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=9910"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=9910"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=9910"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=9910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}