{"id":9977,"date":"2014-12-23T07:55:00","date_gmt":"2014-12-23T14:55:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/filling-gap-cyber-security\/"},"modified":"2025-01-10T10:20:31","modified_gmt":"2025-01-10T17:20:31","slug":"combler-le-deficit-en-cybersecurite","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/","title":{"rendered":"Combler le d\u00e9ficit en cybers\u00e9curit\u00e9"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2014-12-23T07:55:00-07:00\">23 d\u00e9cembre 2014<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Combler le d\u00e9ficit en cybers\u00e9curit\u00e9<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/fr\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de l&#039;utilisateur\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Lecture en une minute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Filling%20the%20gap%20in%20cybersecurity').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ffilling-gap-cyber-security%2F', '_blank')\" title=\"E-mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gazouillement\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Filling%20the%20gap%20in%20cybersecurity&url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ffilling-gap-cyber-security%2F\" title=\"Gazouillement\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ffilling-gap-cyber-security%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Ffilling-gap-cyber-security%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<p>Depuis cinq ans, Brian Kafenbaum et moi dirigeons une entreprise de conseil en cybers\u00e9curit\u00e9 et, durant cette p\u00e9riode, nous avons constat\u00e9 une transformation incroyable du secteur. L&#039;explosion du nombre et la complexification croissante des attaques ont conduit les entreprises \u00e0 investir des milliards de dollars chaque ann\u00e9e dans des mesures de cybers\u00e9curit\u00e9 afin de faire face \u00e0 l&#039;\u00e9volution des menaces. Cependant, lors de nos missions de conseil aupr\u00e8s de diverses entreprises, nous avons constat\u00e9 que malgr\u00e9 ces investissements, un manque subsistait dans le paysage de la cybers\u00e9curit\u00e9\u00a0; c&#039;est pourquoi nous avons fond\u00e9 Swimlane.<\/p>\n<p>Les organisations ont atteint un point o\u00f9, en mati\u00e8re de cybers\u00e9curit\u00e9, la menace <em>d\u00e9tection<\/em> Ce n&#039;est plus le point faible habituel des d\u00e9faillances, car de nombreuses solutions de d\u00e9tection performantes sont d\u00e9sormais disponibles pour identifier les probl\u00e8mes. En r\u00e9alit\u00e9, les failles de s\u00e9curit\u00e9 \u2013 et les difficult\u00e9s consid\u00e9rables qui en d\u00e9coulent \u2013 surviennent le plus souvent parce que les entreprises n&#039;ont pas eu acc\u00e8s \u00e0 des solutions qui pourraient prendre la rel\u00e8ve des SIEM ou autres solutions de d\u00e9tection dans l&#039;\u00e9cosyst\u00e8me de s\u00e9curit\u00e9. Autrement dit, les organisations peinent encore \u00e0 finaliser leur strat\u00e9gie.<\/p>\n<p>Pour comprendre comment r\u00e9soudre ce probl\u00e8me, il faut d&#039;abord en comprendre la cause. La multitude de solutions de d\u00e9tection permet aux analystes de s\u00e9curit\u00e9 et aux professionnels de l&#039;informatique d&#039;\u00eatre inform\u00e9s d&#039;une attaque potentielle. En clair\u00a0: \u201c\u00a0Il y a un probl\u00e8me. Quelqu&#039;un peut-il le r\u00e9soudre\u00a0?\u00a0\u201d Si votre \u00e9quipe informatique ne recevait que cinq ou dix menaces potentielles par jour, ce ne serait pas un probl\u00e8me.<\/p>\n<p>Mais comme les analystes de s\u00e9curit\u00e9 et les RSSI le savent pertinemment, des centaines, voire des milliers, d&#039;alertes de menaces de complexit\u00e9 variable surviennent quotidiennement. Pour faire face \u00e0 ce volume et \u00e0 cette sophistication, les organisations utilisent une multitude d&#039;outils de s\u00e9curit\u00e9 diff\u00e9rents. Un r\u00e9cent rapport d&#039;IBM cite d&#039;ailleurs l&#039;exemple d&#039;un client qui utilisait 85 outils de s\u00e9curit\u00e9 provenant de 45 fournisseurs diff\u00e9rents.<\/p>\n<p>Face \u00e0 la multiplication des menaces et \u00e0 la quantit\u00e9 d&#039;outils n\u00e9cessaires pour les d\u00e9tecter, il est devenu quasiment impossible pour les \u00e9quipes de s\u00e9curit\u00e9 de traiter manuellement chaque incident de mani\u00e8re exhaustive. Et lorsque des incidents restent non r\u00e9solus, in\u00e9vitablement, certaines menaces passent entre les mailles du filet. Autrement dit, le syst\u00e8me actuel est tout simplement intenable. Ce qu&#039;il faut d\u00e9sormais pour compl\u00e9ter les solutions de d\u00e9tection des menaces, c&#039;est\u2026 <a href=\"https:\/\/swimlane.com\/fr\/incident-response-automation\/\"><strong>r\u00e9ponse automatis\u00e9e aux incidents<\/strong><\/a> que:<\/p>\n<ul>\n<li>Centralise toutes les alertes et tous les probl\u00e8mes de s\u00e9curit\u00e9 provenant d&#039;autres outils de s\u00e9curit\u00e9.<\/li>\n<li>Fournit des informations suppl\u00e9mentaires sur les \u00e9v\u00e9nements d\u00e9tect\u00e9s \u00e0 l&#039;aide de tous vos outils et sources de donn\u00e9es existants.<\/li>\n<li>\u00c9tablit des corr\u00e9lations entre les cas et les renseignements sur les menaces<\/li>\n<li>Rapidement et <em>automatiquement<\/em> r\u00e9sout les t\u00e2ches les moins complexes, r\u00e9p\u00e9titives et n\u00e9cessitant une main-d&#039;\u0153uvre importante \u2014 comme l&#039;envoi de notifications par courriel aux coll\u00e8gues, la g\u00e9n\u00e9ration de rapports, l&#039;ouverture de tickets d&#039;assistance, etc. \u2014 qui absorbent la majeure partie du temps du personnel de s\u00e9curit\u00e9.<\/li>\n<\/ul>\n<p>Ce ne sont l\u00e0 que quelques-unes des fonctions essentielles que <a href=\"https:\/\/swimlane.com\/fr\/turbine-de-couloir-de-nage\/\">Turbine de couloir de nage<\/a> Une plateforme d&#039;automatisation de la s\u00e9curit\u00e9 am\u00e9lior\u00e9e par l&#039;IA offre aux organisations des fonctionnalit\u00e9s telles que\u00a0: <a href=\"https:\/\/swimlane.com\/fr\/security-orchestration-platform\/\">orchestration de la s\u00e9curit\u00e9<\/a> et <a href=\"https:\/\/swimlane.com\/fr\/blog\/automatisation-de-la-securite\/\">automatisation de la s\u00e9curit\u00e9<\/a> Ces conseils peuvent \u00eatre appliqu\u00e9s. Nous partagerons \u00e9galement des astuces et des conseils pratiques pour les analystes de s\u00e9curit\u00e9\u00a0; nous proposerons aux entreprises des suggestions pour optimiser leurs budgets de cybers\u00e9curit\u00e9\u00a0; nous passerons en revue les tendances du secteur et l\u2019actualit\u00e9 pertinente\u00a0; et nous expliquerons comment les organisations peuvent relever des d\u00e9fis complexes, comme la pr\u00e9servation du savoir-faire institutionnel lorsqu\u2019un membre de l\u2019\u00e9quipe de s\u00e9curit\u00e9 quitte l\u2019entreprise. Je suis impatient d\u2019\u00e9changer avec vous sur ces sujets et bien d\u2019autres dans les mois \u00e0 venir.<\/p>\n<p>Veuillez visiter notre site web pour en savoir plus sur nous et <a href=\"https:\/\/swimlane.com\/fr\/contact\/\">Contactez-nous<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">\u00c9tiquettes<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Articles similaires<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e632815ea7d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/swimlane-partner-cybersecurity-malaysia-skills-gap\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>31 mars 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Swimlane s&#039;associe \u00e0 CyberSecurity Malaysia pour combler le d\u00e9ficit mondial de comp\u00e9tences en cybers\u00e9curit\u00e9<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e632815fe9c bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/cyber-security-talent-gap-extends-to-state-governments\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>25 juillet 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Un nouveau rapport r\u00e9v\u00e8le que la grave p\u00e9nurie de talents en cybers\u00e9curit\u00e9 s&#039;\u00e9tend aux gouvernements des \u00c9tats.<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69e6328160eef bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/cyber-security-drivers-part-one-the-internet-of-things\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>28 janvier 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Facteurs de cybers\u00e9curit\u00e9, partie 1\u00a0: L\u2019Internet des objets<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Vous souhaitez en savoir plus ?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnez-vous d\u00e8s aujourd&#039;hui pour rester inform\u00e9 et recevoir r\u00e9guli\u00e8rement des mises \u00e0 jour de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Contexte moderne de la s\u00e9curit\u00e9 op\u00e9rationnelle\u00a0: un graphique g\u00e9om\u00e9trique en d\u00e9grad\u00e9 repr\u00e9sentant un flux de donn\u00e9es fluide et l\u2019agilit\u00e9 native du cloud.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":0,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9977","sw_resource","type-sw_resource","status-publish","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Filling the Cybersecurity Workforce Gap | Swimlane<\/title>\n<meta name=\"description\" content=\"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/blog\/combler-le-deficit-en-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Filling the gap in cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/blog\/combler-le-deficit-en-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:20:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Sitewide-OG.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/\",\"url\":\"https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/\",\"name\":\"Filling the Cybersecurity Workforce Gap | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#website\"},\"datePublished\":\"2014-12-23T14:55:00+00:00\",\"dateModified\":\"2025-01-10T17:20:31+00:00\",\"description\":\"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Filling the gap in cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/fr\/#website\",\"url\":\"https:\/\/swimlane.com\/fr\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/fr\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Combler le d\u00e9ficit de main-d&#039;\u0153uvre en cybers\u00e9curit\u00e9 | Swimlane","description":"L&#039;explosion du nombre et la complexit\u00e9 croissante des attaques ont conduit les entreprises \u00e0 investir chaque ann\u00e9e des milliards de dollars dans la cybers\u00e9curit\u00e9 afin de faire face \u00e0 l&#039;\u00e9volution des menaces. Cependant, lors de nos missions de conseil aupr\u00e8s de diverses entreprises, nous avons constat\u00e9 que malgr\u00e9 ces investissements, une lacune subsistait dans le domaine de la cybers\u00e9curit\u00e9\u00a0; c&#039;est pourquoi nous avons fond\u00e9 Swimlane.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/blog\/combler-le-deficit-en-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Filling the gap in cybersecurity","og_description":"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.","og_url":"https:\/\/swimlane.com\/fr\/blog\/combler-le-deficit-en-cybersecurite\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:20:31+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Sitewide-OG.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/","url":"https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/","name":"Combler le d\u00e9ficit de main-d&#039;\u0153uvre en cybers\u00e9curit\u00e9 | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"datePublished":"2014-12-23T14:55:00+00:00","dateModified":"2025-01-10T17:20:31+00:00","description":"L&#039;explosion du nombre et la complexit\u00e9 croissante des attaques ont conduit les entreprises \u00e0 investir chaque ann\u00e9e des milliards de dollars dans la cybers\u00e9curit\u00e9 afin de faire face \u00e0 l&#039;\u00e9volution des menaces. Cependant, lors de nos missions de conseil aupr\u00e8s de diverses entreprises, nous avons constat\u00e9 que malgr\u00e9 ces investissements, une lacune subsistait dans le domaine de la cybers\u00e9curit\u00e9\u00a0; c&#039;est pourquoi nous avons fond\u00e9 Swimlane.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/blog\/filling-gap-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Filling the gap in cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9977\/revisions"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=9977"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=9977"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=9977"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=9977"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=9977"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=9977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}