{"id":43198,"date":"2024-09-11T15:19:20","date_gmt":"2024-09-11T15:19:20","guid":{"rendered":"https:\/\/expleo.com\/global\/en\/?post_type=insights&#038;p=87391"},"modified":"2024-10-15T13:21:48","modified_gmt":"2024-10-15T13:21:48","slug":"ia-cybersecurite","status":"publish","type":"insights","link":"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/","title":{"rendered":"Expleo appelle les entreprises \u00e0 anticiper l&#8217;impact r\u00e9volutionnaire de l&#8217;IA sur la cybers\u00e9curit\u00e9\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"43198\" class=\"elementor elementor-43198\" data-elementor-post-type=\"insights\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1d1a0f1 gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1d1a0f1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-415c0999\" data-id=\"415c0999\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69403be4 elementor-widget elementor-widget-text-editor\" data-id=\"69403be4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Expleo, Royaume-Uni, 15 octobre 2024.<\/strong><span data-contrast=\"none\"> Expleo, <\/span><span data-contrast=\"auto\">acteur mondial de l\u2019ing\u00e9nierie, de la technologie et du conseil<\/span><span data-contrast=\"none\">, appelle les entreprises \u00e0 se pr\u00e9parer aux fortes transformations induites par l\u2019Intelligence Artificielle (IA) sur la cybers\u00e9curit\u00e9. Investir dans une protection bas\u00e9e sur l&#8217;IA permet de r\u00e9pondre aux menaces croissantes et de plus en plus sophistiqu\u00e9es des cyberattaques elles-m\u00eames pilot\u00e9es par l\u2019IA.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"> <span class=\"TextRun SCXW247803527 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW247803527 BCX8\">Dans un nouveau <\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">rapport<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\"> intitul\u00e9 <\/span><\/span><strong><span class=\"TextRun SCXW247803527 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW247803527 BCX8\">\u00ab <\/span><span class=\"NormalTextRun CommentStart CommentHighlightPipeRestV2 CommentHighlightRest SCXW247803527 BCX8\">AI in <\/span><span class=\"NormalTextRun SpellingErrorV2Themed CommentHighlightRest SCXW247803527 BCX8\">cybersecurity<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW247803527 BCX8\">:<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed CommentHighlightRest SCXW247803527 BCX8\">between<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed CommentHighlightRest SCXW247803527 BCX8\">shield<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW247803527 BCX8\"> and <\/span><span class=\"NormalTextRun SpellingErrorV2Themed CommentHighlightRest SCXW247803527 BCX8\">shadow<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW247803527 BCX8\"> \u00bb<\/span><\/span><\/strong><span class=\"TextRun SCXW247803527 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"none\"><span class=\"NormalTextRun CommentHighlightRest SCXW247803527 BCX8\"> (<strong>L&#8217;IA <\/strong><\/span><strong><span class=\"NormalTextRun CommentHighlightRest SCXW247803527 BCX8\">en<\/span> <span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed CommentHighlightRest SCXW247803527 BCX8\">cybers\u00e9curit\u00e9:<\/span> <span class=\"NormalTextRun CommentHighlightRest SCXW247803527 BCX8\">une arme <\/span><span class=\"NormalTextRun CommentHighlightRest SCXW247803527 BCX8\">\u00e0<\/span><span class=\"NormalTextRun CommentHighlightRest SCXW247803527 BCX8\"> double tranchant<\/span><\/strong><span class=\"NormalTextRun CommentHighlightRest SCXW247803527 BCX8\">)<\/span><span class=\"NormalTextRun CommentHighlightPipeRestV2 SCXW247803527 BCX8\">, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW247803527 BCX8\">Expleo<\/span> <span class=\"NormalTextRun SCXW247803527 BCX8\">analyse<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\"> l&#8217;<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">impact<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\"> que les technologies bas\u00e9es sur l&#8217;IA<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\"> \u2013<\/span> <span class=\"NormalTextRun SCXW247803527 BCX8\">en plein d\u00e9veloppement \u2013<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\"> aur<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">ont<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\"> sur plusieurs secteurs<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\"> industriels<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">. <\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">Ce <\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">rapport<\/span> <span class=\"NormalTextRun SCXW247803527 BCX8\">montre<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\"> en effet<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\"> comment <\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">chaque <\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">industrie<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\"> peut tirer parti de l&#8217;IA <\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">pour<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\"> renforcer s<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">a protection <\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">en<\/span> <span class=\"NormalTextRun SCXW247803527 BCX8\">mati\u00e8re de <\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">cybers\u00e9curit\u00e9<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">, <\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">tout en restant vigilant face \u00e0 <\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">ses potentielles d\u00e9rives<\/span><span class=\"NormalTextRun SCXW247803527 BCX8\">.<\/span><\/span><span class=\"EOP SCXW247803527 BCX8\" data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/span><\/p>\n<p><strong>Jeff Hoyle, EVP A\u00e9ronautique, Spatial &amp; D\u00e9fense, a d\u00e9clar\u00e9 :<\/strong><i><span data-contrast=\"none\"> \u00ab<\/span><\/i> <em>L&#8217;IA est la technologie de rupture de notre \u00e9poque. Elle promet une logistique a\u00e9ronautique et spatiale plus intelligente, une s\u00e9curit\u00e9 accrue des donn\u00e9es automobiles et une d\u00e9tection en temps r\u00e9el des menaces dans la banque et la finance. Elle a donc le pouvoir de renforcer consid\u00e9rablement les programmes de cybers\u00e9curit\u00e9 existants. \u00bb<\/em><\/p>\n<p><em>\u00ab Cependant, elle peut \u00e9galement \u00eatre utilis\u00e9e pour attaquer et perturber. Des acteurs malveillants peuvent manipuler la technologie de l&#8217;IA pour cibler et exploiter les vuln\u00e9rabilit\u00e9s des d\u00e9fenses existantes en mati\u00e8re de cybers\u00e9curit\u00e9.<\/em><i><span data-contrast=\"none\"> \u00bb<\/span><\/i><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u00ab<\/span><\/i><em> Pour se pr\u00e9parer, les dirigeants doivent consid\u00e9rer \u00e0 la fois les avantages et les risques que pr\u00e9sente cette nouvelle technologie et comprendre comment elle peut \u00eatre justement utilis\u00e9e pour am\u00e9liorer leurs op\u00e9rations de cybers\u00e9curit\u00e9, en d\u00e9samor\u00e7ant les attaques potentielles avant qu&#8217;elles ne deviennent un probl\u00e8me co\u00fbteux. <\/em><i><span data-contrast=\"none\">\u00bb<\/span><\/i><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e827f4d elementor-widget elementor-widget-spacer\" data-id=\"e827f4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a3a982 gg-image-with-overalpping-text gg-image-with-overalpping-text-v2 gg-container-large elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a3a982\" data-element_type=\"section\" data-e-type=\"section\" id=\"download\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34b8873\" data-id=\"34b8873\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b87ba18 gg-image-with-overalpping-text__tagline gg-font-v33 elementor-widget elementor-widget-heading\" data-id=\"b87ba18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">T\u00e9l\u00e9charger<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d5d282 gg-image-with-overalpping-text__heading elementor-widget elementor-widget-heading\" data-id=\"9d5d282\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"> AI in cybersecurity : between shield and shadow \u00bb (L'IA en cybers\u00e9curit\u00e9 : une arme \u00e0 double tranchant)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21f9afd elementor-widget elementor-widget-spacer\" data-id=\"21f9afd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b09a4fb gg-button-v6 gg-font-v28 elementor-align-left elementor-mobile-align-center elementor-hidden-mobile elementor-widget elementor-widget-button\" data-id=\"b09a4fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/indd.adobe.com\/view\/ebe1495d-b04e-4d11-b5c2-935c99e6ffa0\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">T\u00e9l\u00e9charger le guide<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-062e1d1 gg-button-v6 gg-font-v28 elementor-align-left elementor-mobile-align-center elementor-hidden-desktop elementor-widget elementor-widget-button\" data-id=\"062e1d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/indd.adobe.com\/view\/ebe1495d-b04e-4d11-b5c2-935c99e6ffa0\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">T\u00e9l\u00e9charger le guide<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e101868 gg-button-v6 gg-font-v28 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"e101868\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/expleo.com\/global\/fr\/le-groupe\/media-room\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">media room<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-96158a9 gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"96158a9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f2efc76\" data-id=\"f2efc76\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19051b0 elementor-widget elementor-widget-spacer\" data-id=\"19051b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-810d722 elementor-widget elementor-widget-heading\" data-id=\"810d722\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La cybers\u00e9curit\u00e9 bas\u00e9e sur l'IA <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cb26c9 elementor-widget elementor-widget-text-editor\" data-id=\"6cb26c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW5776837 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW5776837 BCX8\">L&#8217;IA <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">offre des perspectives<\/span> <span class=\"NormalTextRun SCXW5776837 BCX8\">prometteuse<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">s<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\"> dans de nombreux secteurs<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">. Elle<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\"> permet<\/span> <span class=\"NormalTextRun SCXW5776837 BCX8\">d<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">\u2019adopter de <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">nouvelles m\u00e9thodes de travail tout en garantissant l&#8217;int\u00e9grit\u00e9<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\"> et<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\"> en <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">maintenant une supervision <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW5776837 BCX8\">humaine.<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW5776837 BCX8\">.<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\"> Dans son rapport, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW5776837 BCX8\">Expleo<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\"> explore les avantages et les risques <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">de l\u2019IA <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">pour <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">les secteurs de <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">l&#8217;a\u00e9ronautique, <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">du spatial<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">,<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\"> de<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\"> l&#8217;automobile, <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">de <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">la banque<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">, <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">de <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">services financiers<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\"> et de<\/span> <span class=\"NormalTextRun SCXW5776837 BCX8\">l\u2019assurance, <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">de <\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">la d\u00e9fense<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">, de l\u2019\u00e9nergie et utilit\u00e9s<\/span><span class=\"NormalTextRun SCXW5776837 BCX8\">.<\/span><\/span><span class=\"EOP SCXW5776837 BCX8\" data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e68c341 elementor-widget elementor-widget-heading\" data-id=\"e68c341\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A\u00e9ronautique et spatial : l'IA, premier agent de la cybers\u00e9curit\u00e9\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee03ccc elementor-widget elementor-widget-text-editor\" data-id=\"ee03ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">L&#8217;adoption de syst\u00e8mes num\u00e9riques dans les avions modernes fait de ces derniers un centre de donn\u00e9es a\u00e9rien vuln\u00e9rable aux attaques. En int\u00e9grant la cybers\u00e9curit\u00e9 renforc\u00e9e par l&#8217;IA dans les composants standards disponibles sur le march\u00e9 (ie. \u00ab\u202fcommercial off the Shelf\u202f\u00bb) et l&#8217;architecture \u00ab\u202fZero-Trust\u202f\u00bb, les entreprises peuvent se prot\u00e9ger contre les attaques sophistiqu\u00e9es.<\/span><\/p>\n<p><b><span data-contrast=\"none\">Graham Younger, VP Aerospace chez Expleo, commente :<\/span><\/b><i><span data-contrast=\"none\"> \u00ab <\/span><\/i><em>Seule la mise en \u0153uvre d\u2019une approche \u00e0 plusieurs niveaux de la cybers\u00e9curit\u00e9, associ\u00e9e \u00e0 des tests rigoureux, permettra au secteur a\u00e9ronautique et spatial une int\u00e9gration s\u00fbre et s\u00e9curis\u00e9e des technologies de l&#8217;IA. Ces technologies propulseront le secteur vers un nouvel \u00e2ge d&#8217;or de l\u2019aviation, marqu\u00e9 par l&#8217;innovation, une plus grande durabilit\u00e9 et une efficacit\u00e9 accrue. <\/em><i><span data-contrast=\"none\">\u00bb<\/span><\/i><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a0d20a elementor-widget elementor-widget-heading\" data-id=\"5a0d20a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automobile : la technologie aux commandes\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a47c402 elementor-widget elementor-widget-text-editor\" data-id=\"a47c402\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">Pour tirer pleinement parti de l&#8217;IA dans le secteur automobile, l&#8217;avenir pourrait se situer dans la collaboration open source, permettant aux entreprises de rester inform\u00e9es sur les menaces potentielles. De m\u00eame, les constructeurs automobiles doivent garantir la <\/span><a href=\"https:\/\/expleo.com\/global\/en\/insights\/whitepapers\/automotive-cybersecurity-guidebook\/\"><span data-contrast=\"none\">s\u00e9curit\u00e9 d\u00e8s la conception<\/span><\/a><span data-contrast=\"none\"> avec leurs fournisseurs et mettre en \u0153uvre une surveillance continue des menaces.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Steve McEvoy, VP Automotive chez Expleo, d\u00e9clare : <\/span><\/b><i><span data-contrast=\"none\">\u00ab <\/span><\/i><em>Gr\u00e2ce \u00e0 la collaboration de ses diff\u00e9rents acteurs, l\u2019industrie automobile peut montrer la voie en d\u00e9finissant des normes et \u00e9laborant des solutions partag\u00e9es pour relever les d\u00e9fis communs que l\u2019IA pr\u00e9sente, tant aux constructeurs automobiles qu\u2019aux fournisseurs de premier rang<\/em><i><span data-contrast=\"none\">\u202f\u00bb<\/span><\/i><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95c418d elementor-widget elementor-widget-heading\" data-id=\"95c418d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Banque, services financiers et assurance : une fondation construite sur l'innovation\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efd171b elementor-widget elementor-widget-text-editor\" data-id=\"efd171b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">Certains dans ce secteur restent sceptiques quant \u00e0 la capacit\u00e9 de l&#8217;IA \u00e0 apporter de la valeur \u2013 invoquant le co\u00fbt, le manque de transparence et l&#8217;incapacit\u00e9 \u00e0 fonctionner en temps r\u00e9el. Pourtant, trois mod\u00e8les d&#8217;IA font leurs preuves dans la protection contre la fraude en finance : l\u2019apprentissage automatique (Machine Learning), le traitement automatique du langage naturel (natural learning processing) et l&#8217;apprentissage profond (deep learning).<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Angus Panton, <\/span><\/b><b><span data-contrast=\"none\">Head of Banking and Finance Service UK<\/span><\/b><b><span data-contrast=\"none\">, chez Expleo, explique :<\/span><\/b><i><span data-contrast=\"none\"> \u00ab <\/span><\/i><em>Il est g\u00e9n\u00e9ralement admis qu&#8217;une adoption trop rapide de l&#8217;IA cr\u00e9e des risques dans les mod\u00e8les et les outils qui peuvent \u00eatre utilis\u00e9s. C&#8217;est pourquoi il est important de mettre en \u0153uvre une architecture s\u00e9curis\u00e9e au sein de l&#8217;entreprise, renforc\u00e9e par des programmes de test et d&#8217;assurance qualit\u00e9 appropri\u00e9s<\/em><i><span data-contrast=\"none\"> \u00bb.<\/span><\/i><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68e3da2 elementor-widget elementor-widget-heading\" data-id=\"68e3da2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">D\u00e9fense : quand la cybers\u00e9curit\u00e9 est non n\u00e9gociable\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80a6aa0 elementor-widget elementor-widget-text-editor\" data-id=\"80a6aa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">Le secteur de la d\u00e9fense se concentre sur des solutions bas\u00e9es sur l&#8217;IA qui sont con\u00e7ues, d\u00e9ploy\u00e9es et op\u00e9r\u00e9es avec une supervision humaine \u2013 pour s&#8217;assurer que les normes \u00e9thiques et r\u00e8glementaires soient rigoureusement respect\u00e9es.<\/span><\/p>\n<p><b><span data-contrast=\"none\">Jeff Hoyle, EVP Aero, Space &amp; Defence, chez Expleo : <\/span><\/b><i><span data-contrast=\"none\">\u00ab <\/span><\/i><em>La s\u00e9curit\u00e9 et la s\u00fbret\u00e9 sont non n\u00e9gociables en mati\u00e8re de d\u00e9fense. Il est largement reconnu que l&#8217;IA peut jouer un r\u00f4le important dans la garantie et la conformit\u00e9 des normes de cybers\u00e9curit\u00e9 pour prot\u00e9ger les programmes de d\u00e9fense contre les acteurs malveillants. C\u2019est pourquoi nous devons maintenir la supervision humaine au c\u0153ur de la prise de d\u00e9cision pour garantir une utilisation s\u00fbre, \u00e9thique et pr\u00e9cise. <\/em><i><span data-contrast=\"none\">\u00bb<\/span><\/i><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-646c571 elementor-widget elementor-widget-heading\" data-id=\"646c571\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00c9nergie et utilit\u00e9s : d\u00e9ployer la cybers\u00e9curit\u00e9 \u00e0 grande \u00e9chelle\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6bf4e6 elementor-widget elementor-widget-text-editor\" data-id=\"d6bf4e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">Dans le secteur de l&#8217;\u00e9nergie et utilit\u00e9s, les entreprises devraient se concentrer sur la mise en \u0153uvre de strat\u00e9gies de s\u00e9curit\u00e9 \u00e0 grande \u00e9chelle bas\u00e9es sur l&#8217;IA, prot\u00e9geant tous les niveaux des infrastructures critiques.<\/span><\/p>\n<p><b><span data-contrast=\"none\">Stephen Magennis, Global Head Energy &amp; Utilies chez Expleo, d\u00e9clare :<\/span><\/b> <i><span data-contrast=\"none\">\u00ab<\/span><\/i><em> L&#8217;exposition croissante aux attaques dans le secteur de l&#8217;\u00e9nergie et des utilit\u00e9s exige une protection plus intelligente. L&#8217;IA offre une solution puissante qui peut analyser d&#8217;\u00e9normes quantit\u00e9s de donn\u00e9es en temps r\u00e9el, identifier les anomalies et menaces potentielles beaucoup plus rapidement que les m\u00e9thodes traditionnelles. Cela permet aux fournisseurs de traiter les risques de mani\u00e8re proactive et de prot\u00e9ger les infrastructures critiques, assurant ainsi un avenir plus s\u00e9curis\u00e9 et r\u00e9silient pour notre industrie. <\/em><i><span data-contrast=\"none\">\u00bb<\/span><\/i><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4de2b3f elementor-widget elementor-widget-spacer\" data-id=\"4de2b3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Expleo, Royaume-Uni, 15 octobre 2024. Expleo, acteur mondial de l\u2019ing\u00e9nierie, de la technologie et du conseil, appelle les entreprises \u00e0 se pr\u00e9parer aux fortes transformations induites par l\u2019Intelligence Artificielle (IA) sur la cybers\u00e9curit\u00e9. Investir dans une protection bas\u00e9e sur l&#8217;IA permet de r\u00e9pondre aux menaces croissantes et de plus en plus sophistiqu\u00e9es des cyberattaques elles-m\u00eames [&hellip;]<\/p>\n","protected":false},"author":99,"featured_media":43194,"parent":0,"template":"","meta":{"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","footnotes":""},"topic":[137,184,127,125],"insights-single-templates":[],"industry-taxonomy":[373],"content-type":[20],"country":[116],"service":[530,532,531,529,188],"class_list":["post-43198","insights","type-insights","status-publish","has-post-thumbnail","hentry","topic-artificial-intelligence-and-robotics","topic-data-science-and-cybersecurity","topic-transformation-des-activites","topic-transformation-numerique","industry-taxonomy-all","content-type-actualite","country-global","service-implementation-ia-qualite-logicielle","service-inspection-visuelle-ia","service-analyse-experience-client-ia","service-data-analytics-ia","service-transformation-digitale"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Expleo | L&#039;IA dans la cybers\u00e9curit\u00e9, anticipons l&#039;impact<\/title>\n<meta name=\"description\" content=\"Expleo appelle les entreprises \u00e0 anticiper l&#039;impact r\u00e9volutionnaire de l&#039;IA sur la cybers\u00e9curit\u00e9. A d\u00e9couvrir\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expleo appelle les entreprises \u00e0 anticiper l&#039;impact r\u00e9volutionnaire de l&#039;IA sur la cybers\u00e9curit\u00e9\u00a0\" \/>\n<meta property=\"og:description\" content=\"Expleo appelle les entreprises \u00e0 anticiper l&#039;impact r\u00e9volutionnaire de l&#039;IA sur la cybers\u00e9curit\u00e9. A d\u00e9couvrir\" \/>\n<meta property=\"og:url\" content=\"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Global FR\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-15T13:21:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/expleo.com\/global\/fr\/wp-content\/uploads\/2024\/10\/ai-in-cybersecurity-guide-background_fr.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1700\" \/>\n\t<meta property=\"og:image:height\" content=\"774\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/perspectives\\\/actualite\\\/ia-cybersecurite\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/perspectives\\\/actualite\\\/ia-cybersecurite\\\/\",\"name\":\"Expleo | L'IA dans la cybers\u00e9curit\u00e9, anticipons l'impact\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/perspectives\\\/actualite\\\/ia-cybersecurite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/perspectives\\\/actualite\\\/ia-cybersecurite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/ai-in-cybersecurity-guide-background_fr.jpg\",\"datePublished\":\"2024-09-11T15:19:20+00:00\",\"dateModified\":\"2024-10-15T13:21:48+00:00\",\"description\":\"Expleo appelle les entreprises \u00e0 anticiper l'impact r\u00e9volutionnaire de l'IA sur la cybers\u00e9curit\u00e9. A d\u00e9couvrir\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/perspectives\\\/actualite\\\/ia-cybersecurite\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/perspectives\\\/actualite\\\/ia-cybersecurite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/perspectives\\\/actualite\\\/ia-cybersecurite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/ai-in-cybersecurity-guide-background_fr.jpg\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/ai-in-cybersecurity-guide-background_fr.jpg\",\"width\":1700,\"height\":774,\"caption\":\"A flat lay of several digital pages featuring text and graphics about AI in cybersecurity. The pages have a purple and black theme with images of a shield, circular diagrams, and a person holding a tablet.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/perspectives\\\/actualite\\\/ia-cybersecurite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Perspectives\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/perspectives\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Expleo appelle les entreprises \u00e0 anticiper l&#8217;impact r\u00e9volutionnaire de l&#8217;IA sur la cybers\u00e9curit\u00e9\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/\",\"name\":\"Expleo | FR\",\"description\":\"Expleo\",\"publisher\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/#organization\",\"name\":\"Expleo | FR\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"width\":1600,\"height\":774,\"caption\":\"Expleo | FR\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expleo | L'IA dans la cybers\u00e9curit\u00e9, anticipons l'impact","description":"Expleo appelle les entreprises \u00e0 anticiper l'impact r\u00e9volutionnaire de l'IA sur la cybers\u00e9curit\u00e9. A d\u00e9couvrir","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Expleo appelle les entreprises \u00e0 anticiper l'impact r\u00e9volutionnaire de l'IA sur la cybers\u00e9curit\u00e9\u00a0","og_description":"Expleo appelle les entreprises \u00e0 anticiper l'impact r\u00e9volutionnaire de l'IA sur la cybers\u00e9curit\u00e9. A d\u00e9couvrir","og_url":"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/","og_site_name":"Global FR","article_modified_time":"2024-10-15T13:21:48+00:00","og_image":[{"width":1700,"height":774,"url":"https:\/\/expleo.com\/global\/fr\/wp-content\/uploads\/2024\/10\/ai-in-cybersecurity-guide-background_fr.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/","url":"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/","name":"Expleo | L'IA dans la cybers\u00e9curit\u00e9, anticipons l'impact","isPartOf":{"@id":"https:\/\/expleo.com\/global\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/expleo.com\/global\/fr\/wp-content\/uploads\/2024\/10\/ai-in-cybersecurity-guide-background_fr.jpg","datePublished":"2024-09-11T15:19:20+00:00","dateModified":"2024-10-15T13:21:48+00:00","description":"Expleo appelle les entreprises \u00e0 anticiper l'impact r\u00e9volutionnaire de l'IA sur la cybers\u00e9curit\u00e9. A d\u00e9couvrir","breadcrumb":{"@id":"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/#primaryimage","url":"https:\/\/expleo.com\/global\/fr\/wp-content\/uploads\/2024\/10\/ai-in-cybersecurity-guide-background_fr.jpg","contentUrl":"https:\/\/expleo.com\/global\/fr\/wp-content\/uploads\/2024\/10\/ai-in-cybersecurity-guide-background_fr.jpg","width":1700,"height":774,"caption":"A flat lay of several digital pages featuring text and graphics about AI in cybersecurity. The pages have a purple and black theme with images of a shield, circular diagrams, and a person holding a tablet."},{"@type":"BreadcrumbList","@id":"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/expleo.com\/global\/fr\/"},{"@type":"ListItem","position":2,"name":"Perspectives","item":"https:\/\/expleo.com\/global\/fr\/perspectives\/"},{"@type":"ListItem","position":3,"name":"Expleo appelle les entreprises \u00e0 anticiper l&#8217;impact r\u00e9volutionnaire de l&#8217;IA sur la cybers\u00e9curit\u00e9\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/expleo.com\/global\/fr\/#website","url":"https:\/\/expleo.com\/global\/fr\/","name":"Expleo | FR","description":"Expleo","publisher":{"@id":"https:\/\/expleo.com\/global\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/expleo.com\/global\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/expleo.com\/global\/fr\/#organization","name":"Expleo | FR","url":"https:\/\/expleo.com\/global\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/expleo.com\/global\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/expleo.com\/global\/fr\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","contentUrl":"https:\/\/expleo.com\/global\/fr\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","width":1600,"height":774,"caption":"Expleo | FR"},"image":{"@id":"https:\/\/expleo.com\/global\/fr\/#\/schema\/logo\/image\/"}}]}},"hreflang":{"rendered":"<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/perspectives\/news\/ai-in-cybersecurity\/\" hreflang=\"x-default\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/perspectives\/news\/ai-in-cybersecurity\/\" hreflang=\"en\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/\" hreflang=\"fr\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/de\/perspectives\/neuigkeiten\/ai-in-cybersecurity\/\" hreflang=\"de\"\/>\n","structure":[{"blogId":4,"blogIsHidden":false,"postId":87391,"url":"https:\/\/expleo.com\/global\/en\/perspectives\/news\/ai-in-cybersecurity\/","language":"en","default":true},{"blogId":5,"blogIsHidden":false,"postId":43198,"url":"https:\/\/expleo.com\/global\/fr\/perspectives\/actualite\/ia-cybersecurite\/","language":"fr","default":false},{"blogId":6,"blogIsHidden":false,"postId":36180,"url":"https:\/\/expleo.com\/global\/de\/perspectives\/neuigkeiten\/ai-in-cybersecurity\/","language":"de","default":false}]},"_links":{"self":[{"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/insights\/43198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/types\/insights"}],"author":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/users\/99"}],"version-history":[{"count":0,"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/insights\/43198\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/media\/43194"}],"wp:attachment":[{"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/media?parent=43198"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/topic?post=43198"},{"taxonomy":"insights-single-templates","embeddable":true,"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/insights-single-templates?post=43198"},{"taxonomy":"industry-taxonomy","embeddable":true,"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/industry-taxonomy?post=43198"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/content-type?post=43198"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/country?post=43198"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/expleo.com\/global\/fr\/wp-json\/wp\/v2\/service?post=43198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}