{"id":9953,"date":"2015-04-26T12:18:00","date_gmt":"2015-04-26T18:18:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/managing-security-as-a-business-risk-part-2\/"},"modified":"2025-01-10T10:29:27","modified_gmt":"2025-01-10T17:29:27","slug":"gerer-la-securite-comme-un-risque-dentreprise-partie-2","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/","title":{"rendered":"Pourquoi la gestion de la s\u00e9curit\u00e9 de l&#039;information comme un risque d&#039;entreprise est essentielle, 2e partie\u00a0: Atteinte \u00e0 la r\u00e9putation"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Des professionnels du monde des affaires se r\u00e9unissent pour discuter des risques li\u00e9s \u00e0 la r\u00e9putation de l&#039;entreprise et de la strat\u00e9gie de r\u00e9ponse aux incidents dans un environnement d&#039;entreprise moderne.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-04-26T12:18:00-06:00\">26 avril 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Pourquoi la gestion de la s\u00e9curit\u00e9 de l&#039;information comme un risque d&#039;entreprise est essentielle, 2e partie\u00a0: Atteinte \u00e0 la r\u00e9putation<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/fr\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de l&#039;utilisateur\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Lecture en une minute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%202%3A%20Reputational%20harm').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fmanaging-security-as-a-business-risk-part-2%2F', '_blank')\" title=\"E-mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gazouillement\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%202%3A%20Reputational%20harm&url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fmanaging-security-as-a-business-risk-part-2%2F\" title=\"Gazouillement\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fmanaging-security-as-a-business-risk-part-2%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fmanaging-security-as-a-business-risk-part-2%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2 class=\"wp-block-heading\" id=\"h-nbsp\">&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-part-2-reputational-harm\">Partie 2 : Atteinte \u00e0 la r\u00e9putation<\/h2>\n\n\n\n<p>Dans <a href=\"https:\/\/swimlane.com\/fr\/gerer-la-securite-comme-un-risque-dentreprise\/\">Partie I<\/a> Dans cette s\u00e9rie, nous avons abord\u00e9 l&#039;impact financier direct d&#039;une crise de cybers\u00e9curit\u00e9 sur une entreprise, notamment le vol pur et simple et l&#039;indisponibilit\u00e9 co\u00fbteuse d&#039;un site web pour un site de commerce \u00e9lectronique. Bien que la perte de revenus imm\u00e9diate soit la cons\u00e9quence la plus \u00e9vidente pour une organisation victime d&#039;une attaque, ce n&#039;est pas la seule r\u00e9percussion. Une faille de s\u00e9curit\u00e9 peut gravement nuire \u00e0 la r\u00e9putation d&#039;une organisation aupr\u00e8s du public et compromettre la position du RSSI ou du DSI au sein de sa propre entreprise.<\/p>\n\n\n\n<p>Examinons d&#039;abord comment un incident de s\u00e9curit\u00e9 informatique peut \u00e9roder la confiance des consommateurs envers une marque. Par exemple, la fuite de donn\u00e9es chez Target, d\u00e9couverte pendant les f\u00eates de fin d&#039;ann\u00e9e 2013, a expos\u00e9 les informations personnelles de 110 millions de clients et, dans les semaines qui ont suivi, le g\u00e9ant de la distribution a connu un ralentissement de ses ventes. D\u00e9but 2014, lors de la publication des r\u00e9sultats du quatri\u00e8me trimestre 2013 de Target, l&#039;impact de cette fuite est apparu clairement\u00a0: les b\u00e9n\u00e9fices de l&#039;entreprise avaient chut\u00e9. <a title=\"Le b\u00e9n\u00e9fice de Target chute de 461 TP3T suite \u00e0 une violation de donn\u00e9es de cartes de cr\u00e9dit, et les cons\u00e9quences pourraient se poursuivre.\" href=\"http:\/\/www.forbes.com\/sites\/maggiemcgrath\/2014\/02\/26\/target-profit-falls-46-on-credit-card-breach-and-says-the-hits-could-keep-on-coming\/\" target=\"_blank\" rel=\"noreferrer noopener\">46 pour cent<\/a> d&#039;une ann\u00e9e sur l&#039;autre. Quelques mois plus tard, le PDG de l&#039;entreprise a d\u00e9missionn\u00e9. Target n&#039;est d&#039;ailleurs pas la seule entreprise \u00e0 avoir du mal \u00e0 regagner la confiance du public apr\u00e8s une faille de s\u00e9curit\u00e9\u00a0; <a title=\"Interactions constate que 45 % des consommateurs ne font pas confiance aux d\u00e9taillants pour assurer la s\u00e9curit\u00e9 de leurs informations.\" href=\"http:\/\/www.interactionsmarketing.com\/news\/?p=1076\" target=\"_blank\" rel=\"noreferrer noopener\">36 pour cent<\/a> D&#039;apr\u00e8s une \u00e9tude r\u00e9cente, une majorit\u00e9 de clients d\u00e9clarent qu&#039;ils fr\u00e9quenteront moins souvent un commerce apr\u00e8s une violation de donn\u00e9es.<\/p>\n\n\n\n<p>Malheureusement pour les DSI et les RSSI, lorsqu&#039;un probl\u00e8me de s\u00e9curit\u00e9 de l&#039;information survient, ils en portent la plus grande part du bl\u00e2me, que ce soit juste ou non. C&#039;est probablement en partie pour cette raison., <a title=\"Les trois principaux probl\u00e8mes informatiques qui emp\u00eachent les DSI de dormir sur leurs deux oreilles en 2015\" href=\"http:\/\/www.prnewswire.com\/news-releases\/top-three-it-workplace-issues-prevent-cios-from-sleeping-easy-in-2015-300026276.html\" target=\"_blank\" rel=\"noreferrer noopener\">plus de la moiti\u00e9<\/a> De nombreux DSI citent les menaces de s\u00e9curit\u00e9 comme leur principale pr\u00e9occupation aujourd&#039;hui. Par ailleurs, ces responsables informatiques ne sont pas parano\u00efaques\u00a0; <a title=\"4 raisons pour lesquelles les DSI perdent leur emploi\" href=\"http:\/\/learn.sungardas.com\/rs\/sungardavailabilitysvcslp\/images\/business-continuity-plan-why-cios-get-fired-GEN-WPS-078.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">un livre blanc r\u00e9cent<\/a> Le cabinet de conseil Silverton Consulting Group a identifi\u00e9 les failles de s\u00e9curit\u00e9 comme la principale raison pour laquelle les DSI perdent leur emploi.<\/p>\n\n\n\n<p>M\u00eame si les RSSI ou les DSI ne sont pas licenci\u00e9s apr\u00e8s une violation de donn\u00e9es, il leur sera probablement difficile de regagner la confiance que leurs pairs leur accordaient auparavant. Par cons\u00e9quent, il peut \u00eatre difficile pour les professionnels de la s\u00e9curit\u00e9 informatique de\u00a0:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ayez des dialogues constructifs et productifs avec les autres membres de la direction sur la cybers\u00e9curit\u00e9.<\/li>\n\n\n\n<li>Avoir une influence sur les d\u00e9cisions budg\u00e9taires et d&#039;embauche<\/li>\n\n\n\n<li>Pr\u00e9venir les futures attaques<\/li>\n<\/ul>\n\n\n\n<p>L&#039;une des cl\u00e9s pour \u00e9viter d&#039;atteinte \u00e0 la r\u00e9putation d&#039;un professionnel ou d&#039;une entreprise en mati\u00e8re de s\u00e9curit\u00e9 est que les DSI et les RSSI <a href=\"https:\/\/swimlane.com\/fr\/aligner-votre-soc-et-votre-direction-sur-la-cybersecurite\/\">commencer \u00e0 avoir des conversations<\/a> sur la mani\u00e8re d&#039;att\u00e9nuer les risques <em>avant <\/em>Une faille de s\u00e9curit\u00e9 importante survient. De la m\u00eame mani\u00e8re que les parties prenantes \u00e9laborent une strat\u00e9gie avant de prendre des d\u00e9cisions d&#039;embauche majeures ou d&#039;allouer des ressources importantes \u00e0 un projet, les responsables de la gestion des op\u00e9rations de s\u00e9curit\u00e9 et les autres dirigeants d&#039;entreprise hors du service informatique devraient mener des \u00e9valuations des risques li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l&#039;information. Ces \u00e9changes permettront aux entreprises d&#039;identifier les informations et les fonctionnalit\u00e9s les plus critiques pour elles et de cr\u00e9er un plan multicouche, incluant notamment\u00a0: <a href=\"https:\/\/swimlane.com\/fr\/solution\/\">solutions de s\u00e9curit\u00e9 avanc\u00e9es<\/a>, la formation des utilisateurs finaux et les protocoles de r\u00e9ponse aux incidents \u2014 pour prot\u00e9ger ces actifs.<\/p>\n\n\n\n<p>En r\u00e9alit\u00e9, les dirigeants de haut niveau sont souvent extr\u00eamement occup\u00e9s. Il incombe donc au DSI ou au RSSI d&#039;adopter une approche proactive pour mettre l&#039;accent sur la s\u00e9curit\u00e9 de l&#039;information au sein de l&#039;organisation. Cette strat\u00e9gie peut \u00eatre contagieuse, incitant les autres parties prenantes de l&#039;entreprise \u00e0 se concentrer davantage sur la s\u00e9curit\u00e9 et cr\u00e9ant ainsi un environnement o\u00f9 elle est une priorit\u00e9 et o\u00f9 les professionnels de la s\u00e9curit\u00e9 informatique sont consid\u00e9r\u00e9s comme des leaders au sein de l&#039;entreprise. Une fois cet \u00e9tat de fait \u00e9tabli, il devient beaucoup plus facile d&#039;obtenir l&#039;adh\u00e9sion de tous les services de l&#039;entreprise. En effet, une approche proactive de la s\u00e9curit\u00e9 de l&#039;information est cruciale, car la rapidit\u00e9 et la complexit\u00e9 des attaques actuelles signifient que votre entreprise est en grande difficult\u00e9 si elle ne met pas en \u0153uvre des outils ou des protocoles de s\u00e9curit\u00e9 \u00e0 jour avant qu&#039;une violation de donn\u00e9es ne survienne.<\/p>\n\n\n\n<p>Revenez bient\u00f4t pour le troisi\u00e8me et dernier volet de cette s\u00e9rie, dans lequel nous aborderons la mani\u00e8re dont le traitement de la s\u00e9curit\u00e9 de l&#039;information comme un risque commercial contribue \u00e0 prot\u00e9ger contre les pertes de propri\u00e9t\u00e9 intellectuelle.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">\u00c9tiquettes<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Articles similaires<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f8b50fdd5ff bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-3\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12 mai 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Pourquoi la gestion de la s\u00e9curit\u00e9 de l&#039;information comme un risque d&#039;entreprise est essentielle, partie 3\u00a0: Propri\u00e9t\u00e9 intellectuelle<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f8b50fde726 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9 avril 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Pourquoi la gestion de la s\u00e9curit\u00e9 de l&#039;information comme un risque d&#039;entreprise est essentielle, 1re partie\u00a0: Impact financier<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69f8b50fdf5df bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/cyber-security-drivers-security-information-overload\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>10 mars 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Facteurs de cybers\u00e9curit\u00e9, partie 4\u00a0: Surcharge d\u2019informations de s\u00e9curit\u00e9<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Vous souhaitez en savoir plus ?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnez-vous d\u00e8s aujourd&#039;hui pour rester inform\u00e9 et recevoir r\u00e9guli\u00e8rement des mises \u00e0 jour de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Contexte moderne de la s\u00e9curit\u00e9 op\u00e9rationnelle\u00a0: un graphique g\u00e9om\u00e9trique en d\u00e9grad\u00e9 repr\u00e9sentant un flux de donn\u00e9es fluide et l\u2019agilit\u00e9 native du cloud.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9954,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9953","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why managing information security as a business risk is critical,\u2026<\/title>\n<meta name=\"description\" content=\"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \/ CIO&#039;s standing within his or her own company.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/blog\/gerer-la-securite-comme-un-risque-dentreprise-partie-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why managing information security as a business risk is critical, part 2: Reputational harm\" \/>\n<meta property=\"og:description\" content=\"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \/ CIO&#039;s standing within his or her own company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/blog\/gerer-la-securite-comme-un-risque-dentreprise-partie-2\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:29:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/\",\"name\":\"Why managing information security as a business risk is critical,\u2026\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-reputation.png\",\"datePublished\":\"2015-04-26T18:18:00+00:00\",\"dateModified\":\"2025-01-10T17:29:27+00:00\",\"description\":\"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \\\/ CIO's standing within his or her own company.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-reputation.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-reputation.png\",\"width\":1120,\"height\":696,\"caption\":\"Business professionals in meeting discussing corporate reputation risk and incident response strategy in modern enterprise environment\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why managing information security as a business risk is critical, part 2: Reputational harm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pourquoi la gestion de la s\u00e9curit\u00e9 de l&#039;information comme un risque commercial est essentielle\u2026","description":"Une faille de s\u00e9curit\u00e9 peut gravement nuire \u00e0 la r\u00e9putation d&#039;une organisation aupr\u00e8s du public et peut \u00e9galement porter atteinte \u00e0 la position du RSSI\/DSI au sein de sa propre entreprise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/blog\/gerer-la-securite-comme-un-risque-dentreprise-partie-2\/","og_locale":"fr_FR","og_type":"article","og_title":"Why managing information security as a business risk is critical, part 2: Reputational harm","og_description":"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \/ CIO's standing within his or her own company.","og_url":"https:\/\/swimlane.com\/fr\/blog\/gerer-la-securite-comme-un-risque-dentreprise-partie-2\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:29:27+00:00","og_image":[{"width":1120,"height":696,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/","url":"https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/","name":"Pourquoi la gestion de la s\u00e9curit\u00e9 de l&#039;information comme un risque commercial est essentielle\u2026","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png","datePublished":"2015-04-26T18:18:00+00:00","dateModified":"2025-01-10T17:29:27+00:00","description":"Une faille de s\u00e9curit\u00e9 peut gravement nuire \u00e0 la r\u00e9putation d&#039;une organisation aupr\u00e8s du public et peut \u00e9galement porter atteinte \u00e0 la position du RSSI\/DSI au sein de sa propre entreprise.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png","width":1120,"height":696,"caption":"Business professionals in meeting discussing corporate reputation risk and incident response strategy in modern enterprise environment"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Why managing information security as a business risk is critical, part 2: Reputational harm"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9953\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/9954"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=9953"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=9953"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=9953"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=9953"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=9953"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=9953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}