{"id":21463,"date":"2026-05-15T14:00:16","date_gmt":"2026-05-15T17:00:16","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/?p=21463"},"modified":"2026-05-15T13:06:37","modified_gmt":"2026-05-15T16:06:37","slug":"cybersecurite-des-infrastructures-critiques","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/livros\/cybersecurite-des-infrastructures-critiques\/","title":{"rendered":"Cybers\u00e9curit\u00e9 des Infrastructures Critiques"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-21464\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2026\/05\/cybersecurite-des-infrastructures-critiques.jpg\" alt=\"Cybers\u00e9curit\u00e9 des Infrastructures Critiques\" width=\"145\" height=\"205\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2026\/05\/cybersecurite-des-infrastructures-critiques.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2026\/05\/cybersecurite-des-infrastructures-critiques-106x150.jpg 106w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Etienne de S\u00e9r\u00e9ville<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Publisher Dunod<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Overview:<\/strong><\/span> Les cyberattaques se multiplient contre nos infra-structures vitales : sant\u00e9, \u00e9nergie, transports, distribution d\u2019eau, finance, t\u00e9l\u00e9communications, services publics et autres.<br \/>\nCes menaces li\u00e9es \u00e0 la cybers\u00e9curit\u00e9 sont devenues une pr\u00e9occupation majeure pour les gouvernements europ\u00e9ens. La directive NIS2 impose d\u00e9sormais des obligations de gouvernance, de protection, de d\u00e9fense et de r\u00e9silience de ces syst\u00e8mes num\u00e9riques.<br \/>\nCet ouvrage pr\u00e9sente les points cl\u00e9s de la cybers\u00e9curit\u00e9 applicables aux infrastructures critiques dans la logique d\u2019une d\u00e9marche de gestion des risques num\u00e9riques :<\/p>\n<ul>\n<li>Quels sont les technologies et services num\u00e9riques utilis\u00e9s pour g\u00e9rer et piloter les infrastructures critiques ?<\/li>\n<li>Quelles sont les menaces de cybers\u00e9curit\u00e9 qui peuvent les atteindre ?<\/li>\n<li>Quelles sont leurs vuln\u00e9rabilit\u00e9s exploitables par ces menaces ?<\/li>\n<li>Quels sont les risques de s\u00e9curit\u00e9 num\u00e9rique potentiels ?<\/li>\n<li>Quelles mesures organisationnelles et techniques peuvent contribuer \u00e0 traiter ces risques aujourd\u2019hui et leurs \u00e9volutions pour demain ?<\/li>\n<\/ul>\n<p>Les professionnels et les d\u00e9cideurs y trouveront des recommandations pragmatiques et une feuille de route pour renforcer la r\u00e9silience de leurs infrastructures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Etienne de S\u00e9r\u00e9ville Publisher Dunod Overview: Les cyberattaques se multiplient contre nos infra-structures vitales : sant\u00e9, \u00e9nergie, transports, distribution d\u2019eau, finance, t\u00e9l\u00e9communications, services publics et autres. Ces menaces li\u00e9es \u00e0 la cybers\u00e9curit\u00e9 sont devenues une pr\u00e9occupation majeure pour les gouvernements europ\u00e9ens. La directive NIS2 impose d\u00e9sormais des obligations de gouvernance, de protection, de d\u00e9fense et de r\u00e9silience de ces syst\u00e8mes num\u00e9riques. Cet ouvrage pr\u00e9sente les points cl\u00e9s de la cybers\u00e9curit\u00e9&hellip; <\/p>\n","protected":false},"author":3,"featured_media":21464,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,109,20],"tags":[],"class_list":["post-21463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-livros","category-francais","category-seguranca-da-informacao"],"views":21,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/21463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/comments?post=21463"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/21463\/revisions"}],"predecessor-version":[{"id":21465,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/21463\/revisions\/21465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media\/21464"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media?parent=21463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/categories?post=21463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/tags?post=21463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}