{"id":9961,"date":"2015-03-17T13:16:00","date_gmt":"2015-03-17T19:16:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/aligning-your-soc-and-c-suite-on-cyber-security\/"},"modified":"2025-01-10T08:36:04","modified_gmt":"2025-01-10T15:36:04","slug":"aligner-votre-soc-et-votre-direction-sur-la-cybersecurite","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/","title":{"rendered":"Pourquoi l&#039;alignement de votre SOC et de votre direction g\u00e9n\u00e9rale sur la cybers\u00e9curit\u00e9 est crucial"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"R\u00e9union d&#039;affaires avec les participants r\u00e9unis autour d&#039;une table\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg 1280w, https:\/\/swimlane.com\/wp-content\/uploads\/board-300x169.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/board-1024x576.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/board-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-03-17T13:16:00-06:00\">17 mars 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Pourquoi l&#039;alignement de votre SOC et de votre direction g\u00e9n\u00e9rale sur la cybers\u00e9curit\u00e9 est crucial<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/fr\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de l&#039;utilisateur\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Lecture en une minute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/fr\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/fr\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Why%20aligning%20your%20SOC%20and%20C-suite%20on%20cybersecurity%20is%20critical').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Faligning-your-soc-and-c-suite-on-cyber-security%2F', '_blank')\" title=\"E-mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gazouillement\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Why%20aligning%20your%20SOC%20and%20C-suite%20on%20cybersecurity%20is%20critical&url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Faligning-your-soc-and-c-suite-on-cyber-security%2F\" title=\"Gazouillement\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Faligning-your-soc-and-c-suite-on-cyber-security%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Faligning-your-soc-and-c-suite-on-cyber-security%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<p>Adopter des solutions de s\u00e9curit\u00e9 de l&#039;information appropri\u00e9es et disposer d&#039;une \u00e9quipe informatique ma\u00eetrisant leur utilisation est essentiel pour prot\u00e9ger votre organisation contre les pirates informatiques et les cyberattaques. Cependant, un ensemble d&#039;outils sophistiqu\u00e9s ne suffit pas, car un manque de communication entre votre SOC et la direction peut gravement entraver les efforts de cybers\u00e9curit\u00e9.<\/p>\n<p>Par exemple, la formation des utilisateurs finaux est un \u00e9l\u00e9ment essentiel de tout plan de s\u00e9curit\u00e9 de l&#039;information complet\u00a0; les employ\u00e9s doivent \u00eatre sensibilis\u00e9s \u00e0 des sujets tels que la protection des informations sensibles de l&#039;entreprise dans un environnement BYOD ou la d\u00e9tection d&#039;une attaque de phishing cibl\u00e9e par e-mail. Pour que les efforts de formation soient couronn\u00e9s de succ\u00e8s, les professionnels de la s\u00e9curit\u00e9 de l&#039;information ont besoin de l&#039;adh\u00e9sion totale de l&#039;organisation, et cela commence par l&#039;adh\u00e9sion collective de la direction afin que la conviction et l&#039;engagement se diffusent \u00e0 tous les niveaux. En effet, si le directeur des op\u00e9rations et le PDG, par exemple, ne font pas de la cybers\u00e9curit\u00e9 une priorit\u00e9, la plupart des employ\u00e9s ne le feront probablement pas non plus.<\/p>\n<p>Malheureusement pour les DSI, les RSSI et autres responsables de la s\u00e9curit\u00e9 de haut niveau, un foss\u00e9 culturel existe entre\u2026 <a href=\"https:\/\/swimlane.com\/fr\/blog\/quest-ce-quun-centre-doperations-de-securite-soc\/\">SOC<\/a> Le probl\u00e8me de la direction g\u00e9n\u00e9rale est malheureusement trop fr\u00e9quent. Par exemple, dans une enqu\u00eate r\u00e9cente command\u00e9e par le groupe de d\u00e9fense Raytheon aupr\u00e8s de 1\u00a0006 DSI, RSSI et autres responsables informatiques, 78\u00a0% ont d\u00e9clar\u00e9 que leur conseil d&#039;administration n&#039;avait pas \u00e9t\u00e9 inform\u00e9 une seule fois de la strat\u00e9gie de cybers\u00e9curit\u00e9 de leur entreprise au cours des 12\u00a0derniers mois. De plus, seuls 42\u00a0% des r\u00e9pondants \u00e0 une enqu\u00eate de PwC ont indiqu\u00e9 que leur conseil d&#039;administration participait activement \u00e0 la strat\u00e9gie globale de s\u00e9curit\u00e9 et seulement 25\u00a0% ont affirm\u00e9 que leur conseil d&#039;administration \u00e9tait impliqu\u00e9 dans l&#039;\u00e9valuation des risques li\u00e9s \u00e0 la protection de la vie priv\u00e9e au sein de leur organisation.<\/p>\n<p>Si vous avez du mal \u00e0 convaincre les hauts dirigeants de votre entreprise d&#039;accorder \u00e0 la cybers\u00e9curit\u00e9 l&#039;attention qu&#039;elle m\u00e9rite, il est peut-\u00eatre temps d&#039;adopter une approche plus offensive en utilisant des tactiques telles que\u00a0:<\/p>\n<ul>\n<li><strong>Pr\u00e9sentation de donn\u00e9es financi\u00e8res concr\u00e8tes<\/strong>Rien ne capte autant l&#039;attention des dirigeants que des informations financi\u00e8res percutantes. Alors, \u00e0 la prochaine occasion, partagez des donn\u00e9es convaincantes, comme le fait que le co\u00fbt moyen d&#039;une faille de s\u00e9curit\u00e9 pour une entreprise s&#039;\u00e9l\u00e8ve \u00e0 11,6 millions de dollars, selon Brian Krzanich, PDG d&#039;Intel. Ce genre de chiffres impressionnants d\u00e9montre clairement que tous les membres de la direction ont tout int\u00e9r\u00eat \u00e0 mettre en place une strat\u00e9gie de s\u00e9curit\u00e9 informatique robuste.<\/li>\n<\/ul>\n<ul>\n<li><strong>Inscrire les briefings mensuels au calendrier<\/strong>Exigez une r\u00e9union mensuelle avec les dirigeants de votre entreprise afin de leur pr\u00e9senter un aper\u00e7u de la politique de l&#039;entreprise et les points pertinents. <a href=\"https:\/\/swimlane.com\/fr\/blog\/indicateurs-de-securite-de-soar\/\">indicateurs de s\u00e9curit\u00e9 <\/a>et sugg\u00e9rer d&#039;\u00e9ventuels ajustements strat\u00e9giques. Vous pouvez m\u00eame profiter de ce temps pour aborder l&#039;actualit\u00e9 du secteur afin de susciter l&#039;int\u00e9r\u00eat. La communication r\u00e9guli\u00e8re de rapports d&#039;avancement permet de maintenir l&#039;engagement des dirigeants dans le processus de s\u00e9curit\u00e9 de l&#039;information, et cet engagement se r\u00e9percutera sur l&#039;ensemble de l&#039;entreprise.<\/li>\n<\/ul>\n<ul>\n<li><strong>Fournir des mises \u00e0 jour sur les derni\u00e8res tendances et solutions en mati\u00e8re de s\u00e9curit\u00e9<\/strong>Si vous parvenez \u00e0 programmer les r\u00e9unions mentionn\u00e9es ci-dessus, prenez le temps de d\u00e9tailler les derni\u00e8res tactiques employ\u00e9es par les cybercriminels et les mesures de cybers\u00e9curit\u00e9 disponibles \u2013 telles que la r\u00e9ponse automatis\u00e9e aux incidents ou la s\u00e9curit\u00e9 d\u00e9finie par logiciel \u2013 permettant de les contrer. Tenir la direction inform\u00e9e des derni\u00e8res \u00e9volutions en mati\u00e8re de s\u00e9curit\u00e9 de l&#039;information lui permet de contribuer plus efficacement aux discussions sur les politiques et les achats, ce qui facilite le travail du RSSI ou du DSI.<\/li>\n<\/ul>\n<p>Comme pour tout projet d&#039;envergure, obtenir l&#039;adh\u00e9sion de la direction \u00e0 la cybers\u00e9curit\u00e9 exige un investissement en temps consid\u00e9rable en amont. Mais comme pour tout investissement judicieux, le r\u00e9sultat final justifie largement les efforts d\u00e9ploy\u00e9s.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">\u00c9tiquettes<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Articles similaires<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-6a0b96d6cdd47 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9 avril 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Pourquoi la gestion de la s\u00e9curit\u00e9 de l&#039;information comme un risque d&#039;entreprise est essentielle, 1re partie\u00a0: Impact financier<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-6a0b96d6ceecb bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-2\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>26 avril 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Pourquoi la gestion de la s\u00e9curit\u00e9 de l&#039;information comme un risque d&#039;entreprise est essentielle, 2e partie\u00a0: Atteinte \u00e0 la r\u00e9putation<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-6a0b96d6cff10 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/managing-security-as-a-business-risk-part-3\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12 mai 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Pourquoi la gestion de la s\u00e9curit\u00e9 de l&#039;information comme un risque d&#039;entreprise est essentielle, partie 3\u00a0: Propri\u00e9t\u00e9 intellectuelle<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Vous souhaitez en savoir plus ?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnez-vous d\u00e8s aujourd&#039;hui pour rester inform\u00e9 et recevoir r\u00e9guli\u00e8rement des mises \u00e0 jour de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Contexte moderne de la s\u00e9curit\u00e9 op\u00e9rationnelle\u00a0: un graphique g\u00e9om\u00e9trique en d\u00e9grad\u00e9 repr\u00e9sentant un flux de donn\u00e9es fluide et l\u2019agilit\u00e9 native du cloud.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":38827,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9961","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why aligning your SOC and C-suite on is critical<\/title>\n<meta name=\"description\" content=\"security automation,SOAR,SOC automation,SOAR platform,threat intelligence automation,incident response automation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/blog\/aligner-votre-soc-et-votre-direction-sur-la-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why aligning your SOC and C-suite on cybersecurity is critical\" \/>\n<meta property=\"og:description\" content=\"security automation,SOAR,SOC automation,SOAR platform,threat intelligence automation,incident response automation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/blog\/aligner-votre-soc-et-votre-direction-sur-la-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T15:36:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/aligning-your-soc-and-c-suite-on-cyber-security\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/aligning-your-soc-and-c-suite-on-cyber-security\\\/\",\"name\":\"Why aligning your SOC and C-suite on is critical\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/aligning-your-soc-and-c-suite-on-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/aligning-your-soc-and-c-suite-on-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/board.jpg\",\"datePublished\":\"2015-03-17T19:16:00+00:00\",\"dateModified\":\"2025-01-10T15:36:04+00:00\",\"description\":\"security automation,SOAR,SOC automation,SOAR platform,threat intelligence automation,incident response automation\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/aligning-your-soc-and-c-suite-on-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/aligning-your-soc-and-c-suite-on-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/aligning-your-soc-and-c-suite-on-cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/board.jpg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/board.jpg\",\"width\":1280,\"height\":720,\"caption\":\"People at a round table discuss different issues. Focus on hand\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/aligning-your-soc-and-c-suite-on-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why aligning your SOC and C-suite on cybersecurity is critical\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pourquoi l&#039;alignement de votre SOC et de votre direction est crucial","description":"Automatisation de la s\u00e9curit\u00e9, SOAR, automatisation SOC, plateforme SOAR, automatisation du renseignement sur les menaces, automatisation de la r\u00e9ponse aux incidents","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/blog\/aligner-votre-soc-et-votre-direction-sur-la-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Why aligning your SOC and C-suite on cybersecurity is critical","og_description":"security automation,SOAR,SOC automation,SOAR platform,threat intelligence automation,incident response automation","og_url":"https:\/\/swimlane.com\/fr\/blog\/aligner-votre-soc-et-votre-direction-sur-la-cybersecurite\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T15:36:04+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/","url":"https:\/\/swimlane.com\/fr\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/","name":"Pourquoi l&#039;alignement de votre SOC et de votre direction est crucial","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg","datePublished":"2015-03-17T19:16:00+00:00","dateModified":"2025-01-10T15:36:04+00:00","description":"Automatisation de la s\u00e9curit\u00e9, SOAR, automatisation SOC, plateforme SOAR, automatisation du renseignement sur les menaces, automatisation de la r\u00e9ponse aux incidents","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg","width":1280,"height":720,"caption":"People at a round table discuss different issues. Focus on hand"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Why aligning your SOC and C-suite on cybersecurity is critical"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9961\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/38827"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=9961"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=9961"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=9961"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=9961"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=9961"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=9961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}