{"id":17473,"date":"2025-05-30T10:49:09","date_gmt":"2025-05-30T08:49:09","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?post_type=mec-events&#038;p=17473"},"modified":"2025-11-18T14:27:23","modified_gmt":"2025-11-18T13:27:23","slug":"pecb-certified-iso-iec-27005-avec-mehari","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-iso-iec-27005-avec-mehari\/","title":{"rendered":"PECB CERTIFIED ISO\/IEC 27005 WITH MEHARI"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"17473\" class=\"elementor elementor-17473\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-322b389 e-flex e-con-boxed e-con e-child\" data-id=\"322b389\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5261bc4 e-flex e-con-boxed e-con e-child\" data-id=\"5261bc4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7127562 e-con-full e-flex e-con e-child\" data-id=\"7127562\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a958331 elementor-widget elementor-widget-image\" data-id=\"a958331\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"203\" height=\"248\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/04\/images-removebg-preview-1.png\" class=\"attachment-medium size-medium wp-image-14850\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19386d8 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"19386d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e819159 elementor-widget elementor-widget-image\" data-id=\"e819159\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"200\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb.png\" class=\"attachment-large size-large wp-image-6392\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb.png 500w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb-300x120.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e85162 elementor-widget elementor-widget-spacer\" data-id=\"8e85162\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66b4040 e-flex e-con-boxed e-con e-child\" data-id=\"66b4040\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab26308 elementor-widget elementor-widget-text-editor\" data-id=\"ab26308\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MA\u00ceTRISEZ L\u2019APPR\u00c9CIATION ET LA GESTION OPTIMALE DU RISQUE DE LA S\u00c9CURIT\u00c9 DE L\u2019INFORMATION, CONFORME \u00c0 LA NORME ISO\/IEC 27005 AVEC LA M\u00c9THODE MEHARI<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d6daf6 elementor-widget elementor-widget-heading\" data-id=\"7d6daf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">L' audience cibl\u00e9e par la formation\n\n\n\n\n\n\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3489ddc elementor-widget elementor-widget-text-editor\" data-id=\"3489ddc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Les managers des risques<\/li>\n<li>Les personnes responsables de la s\u00e9curit\u00e9 de l\u2019information ou de la conformit\u00e9 dans une organisation<\/li>\n<li>Les membres d\u2019une \u00e9quipe charg\u00e9e de la s\u00e9curit\u00e9 de l\u2019information\u00a0<\/li>\n<li>Les consultants des TI<\/li>\n<li>Le personnel charg\u00e9 de la mise en \u0153uvre ou souhaitant se conformer \u00e0 la norme ISO\/IEC 27001 ou impliqu\u00e9 dans un\u00a0programme de gestion des risques, conforme \u00e0 la m\u00e9thode MEHARI<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d811ef2 e-flex e-con-boxed e-con e-child\" data-id=\"d811ef2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9960e0 elementor-widget elementor-widget-heading\" data-id=\"e9960e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ce que vous allez apprendre<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3a6ffe elementor-widget elementor-widget-text-editor\" data-id=\"c3a6ffe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pendant cette formation intensive cinq jours les participants d\u00e9velopperont des comp\u00e9tences pour ma\u00eetriser les \u00e9l\u00e9ments fondamentaux pour la gestion des risques li\u00e9s \u00e0 tous les actifs pertinents de la s\u00e9curit\u00e9 de l\u2019information, en utilisant la norme ISO\/IEC 27005:2011 comme cadre de r\u00e9f\u00e9rence et la m\u00e9thode MEHARI. La m\u00e9thode MEHARI a \u00e9t\u00e9 d\u00e9velopp\u00e9e par le \u201cClub de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information Fran\u00e7ais\u201d (CLUSIF) en France. Gr\u00e2ce aux exercices pratiques et \u00e9tudes de cas, les participants acquerront les connaissances et comp\u00e9tences n\u00e9cessaires pour la r\u00e9alisation d\u2019une appr\u00e9ciation optimale du risque de la s\u00e9curit\u00e9 de l\u2019information et pour la gestion des risques dans les d\u00e9lais, en se familiarisant avec leur cycle de vie.<\/p>\n<p>Cette formation s\u2019aligne parfaitement au processus de mise en \u0153uvre du cadre de la norme ISO\/IEC 27001:2005.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e82462 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3e82462\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4688ff7 elementor-widget elementor-widget-heading\" data-id=\"4688ff7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Programme de la formation\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15aa12d elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"15aa12d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Dur\u00e9e : 5 jours<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbb6a7d elementor-widget elementor-widget-n-accordion\" data-id=\"bbb6a7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1960\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1960\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 1 : Introduction, programme de gestion du risque selon la norme ISO\/IEC 27005 <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1960\" class=\"elementor-element elementor-element-b9f2ff9 e-con-full e-flex e-con e-child\" data-id=\"b9f2ff9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1960\" class=\"elementor-element elementor-element-e4eae23 e-con-full e-flex e-con e-child\" data-id=\"e4eae23\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1960\" class=\"elementor-element elementor-element-6567827 e-con-full e-flex e-con e-child\" data-id=\"6567827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-943e322 elementor-widget elementor-widget-text-editor\" data-id=\"943e322\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Concepts et d\u00e9finitions relatives \u00e0 la gestion du risque<\/li>\n<li>Normes, cadres et m\u00e9thodologies du management du risque<\/li>\n<li>Mise en \u0153uvre d\u2019un programme de management du risque de la s\u00e9curit\u00e9 de l\u2019information<\/li>\n<li>Compr\u00e9hension de l\u2019organisme et de son contexte<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1961\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1961\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 2 : Identification, appr\u00e9ciation, \u00e9valuation, traitement, acceptation, communication et surveillance  relatives au risque selon l\u2019ISO\/IEC 27005 <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1961\" class=\"elementor-element elementor-element-bbd7171 e-flex e-con-boxed e-con e-child\" data-id=\"bbd7171\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7bb59f1 elementor-widget elementor-widget-text-editor\" data-id=\"7bb59f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Identification du risque\u00a0<\/li>\n<li>Analyse et \u00e9valuation du risque<\/li>\n<li>Appr\u00e9ciation du risque avec une m\u00e9thode quantitative\u00a0Traitement du risque<\/li>\n<li>Acceptation du risque et management des risques r\u00e9siduels<\/li>\n<li>Communication et consultation relatives au risque de la s\u00e9curit\u00e9 de l\u2019information<\/li>\n<li>Surveillance du risque et revue<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1962\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1962\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 3 : Examen et d\u00e9clenchement de l\u2019appr\u00e9ciation du risque avec MEHARI <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1962\" class=\"elementor-element elementor-element-69114f8 e-flex e-con-boxed e-con e-child\" data-id=\"69114f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d99ef2 elementor-widget elementor-widget-text-editor\" data-id=\"7d99ef2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Examen Certified ISO\/IEC 27005 Risk Manager (2 heures)<\/li>\n<li>Pr\u00e9sentation de la m\u00e9thode MEHARI<\/li>\n<li>Appr\u00e9ciation et classification des probl\u00e8mes<\/li>\n<li>Aper\u00e7u g\u00e9n\u00e9ral du processus<\/li>\n<li>La cha\u00eene de valeur pour les d\u00e9faillances<\/li><li>La classification des ressources<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1963\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1963\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 4 : Appr\u00e9ciation des vuln\u00e9rabilit\u00e9s et du risque, selon MEHARI <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1963\" class=\"elementor-element elementor-element-eb53661 e-flex e-con-boxed e-con e-child\" data-id=\"eb53661\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2153ea2 elementor-widget elementor-widget-text-editor\" data-id=\"2153ea2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Appr\u00e9ciation des vuln\u00e9rabilit\u00e9s<\/li>\n<li>Qualit\u00e9s du service de s\u00e9curit\u00e9<\/li>\n<li>Mesure de la qualit\u00e9 d\u2019un service de la s\u00e9curit\u00e9<\/li>\n<li>Processus d\u2019\u00e9valuation<\/li>\n<li>Appr\u00e9ciation du risque<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1964\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1964\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Jour 5 :  Planification de la s\u00e9curit\u00e9 selon MEHARI et examen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1964\" class=\"elementor-element elementor-element-bfee908 e-flex e-con-boxed e-con e-child\" data-id=\"bfee908\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c91c45b elementor-widget elementor-widget-text-editor\" data-id=\"c91c45b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Plan et proc\u00e9dures de la s\u00e9curit\u00e9<\/li>\n<li>Outils pour soutenir la mise en \u0153uvre de la m\u00e9thode MEHARI<\/li>\n<li>Examen \u00ab MEHARI advanced \u00bb (2 heures)<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1965\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1965\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Examen de formation <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1965\" class=\"elementor-element elementor-element-09a77ef e-flex e-con-boxed e-con e-child\" data-id=\"09a77ef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8d1bd0 elementor-widget elementor-widget-text-editor\" data-id=\"a8d1bd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"has-show-more-inner-content\">\n<div class=\"td td-prerequisites\">\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words text-start [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"c21a304d-2894-4ba9-9cdc-91ee2c13b305\" data-message-model-slug=\"gpt-4o\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p data-start=\"0\" data-end=\"162\" data-is-last-node=\"\" data-is-only-node=\"\">PECB (Examination and Certification Program (ECP)). Les examens couvrent les domaines de comp\u00e9tence suivants :<\/p>\n<ul>\n<li data-start=\"0\" data-end=\"162\"><strong>\u00a0Domaine 1 :<\/strong> Concepts, approches, m\u00e9thodes et techniques fondamentales du management du risque de la s\u00e9curit\u00e9 de <br \/>l\u2019information<\/li>\n<li data-start=\"0\" data-end=\"162\"><strong>Domaine 2<\/strong> : Mise en \u0153uvre d\u2019un programme de gestion du risque de la s\u00e9curit\u00e9 de l\u2019information<\/li>\n<li data-start=\"0\" data-end=\"162\"><strong>Domaine 3 :<\/strong> Appr\u00e9ciation du risque de la s\u00e9curit\u00e9 de l\u2019information conforme \u00e0 la norme ISO\/IEC 27005<\/li>\n<li data-start=\"0\" data-end=\"162\"><strong>Domaine 4 :<\/strong> Traitement des risques de la s\u00e9curit\u00e9 de l\u2019information conform\u00e9ment \u00e0 MEHARI.<\/li>\n<li data-start=\"0\" data-end=\"162\"><strong>Domaine 5 :<\/strong> Communication du risque en s\u00e9curit\u00e9 de l\u2019information, surveillance et am\u00e9lioration conform\u00e9ment \u00e0 MEHARI<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>Les examens <strong>\u201cPECB Certified ISO\/IEC 27005 Risk Manager\u201d<\/strong> et \u201cMEHARI\u201d sont disponibles en plusieurs langues (Pour plus<br \/>d&rsquo;informations concernant les langues de l\u2019examen, veuillez contacter examination@pecb.com)<\/p>\n<p>Dur\u00e9e : Les examens ISO\/IEC 27005 Risk Manager et MEHARI durent<strong> 2 heures<\/strong><br \/><br \/><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c7b59d e-flex e-con-boxed e-con e-child\" data-id=\"1c7b59d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b2b2b27 e-flex e-con-boxed e-con e-child\" data-id=\"b2b2b27\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55da9ff elementor-widget elementor-widget-heading\" data-id=\"55da9ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les Objectifs de la formation<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0306fbc elementor-widget elementor-widget-text-editor\" data-id=\"0306fbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Comprendre les concepts, les approches, les m\u00e9thodes et les techniques permettant une gestion efficace du risque selon\u00a0la norme ISO\/IEC 27005<\/li>\n<li>Interpr\u00e9ter les exigences de la norme ISO\/IEC 27001 pour le management de la s\u00e9curit\u00e9 de l\u2019information<\/li>\n<li>Acqu\u00e9rir les comp\u00e9tences n\u00e9cessaires pour conduire une appr\u00e9ciation du risque avec la m\u00e9thode MEHARI<\/li>\n<li>Ma\u00eetriser les d\u00e9marches pour conduire une appr\u00e9ciation du risque avec la m\u00e9thode MEHARI<\/li>\n<li>Comprendre la relation entre le management du risque de la s\u00e9curit\u00e9 de l\u2019information, les mesures de s\u00e9curit\u00e9 et la\u00a0conformit\u00e9 avec les autres exigences de diff\u00e9rentes parties prenantes dans une organisation<\/li>\n<li>Acqu\u00e9rir les comp\u00e9tences pour la mise en \u0153uvre, le maintien et la gestion d\u2019un programme de gestion du risque de la\u00a0s\u00e9curit\u00e9 de l\u2019information selon la norme ISO\/IEC 27005<\/li>\n<li>Acqu\u00e9rir les comp\u00e9tences pour conseiller de mani\u00e8re efficace les organisations sur les meilleures pratiques de\u00a0management du risque de la s\u00e9curit\u00e9 de l\u2019information<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c25c2d e-flex e-con-boxed e-con e-child\" data-id=\"3c25c2d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12fbd65 elementor-widget elementor-widget-heading\" data-id=\"12fbd65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Les pr\u00e9requis de la formation\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebb200e elementor-widget elementor-widget-text-editor\" data-id=\"ebb200e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Connaissance des principes fondamentaux de la cybers\u00e9curit\u00e9.<\/li>\n<li>Compr\u00e9hension des concepts de base des syst\u00e8mes d&rsquo;information.<\/li>\n<li>Exp\u00e9rience professionnelle dans le domaine de la s\u00e9curit\u00e9 de l&rsquo;information est un plus, bien que ce ne soit pas obligatoire.<\/li>\n<li>Une familiarit\u00e9 avec les normes ISO\/IEC 27001 et ISO\/IEC 27005 est utile, mais pas indispensable.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-566055d elementor-widget elementor-widget-spacer\" data-id=\"566055d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f823660 elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"f823660\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/iso-iec27005-mehari_4p-fr.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Voir la brochure de cette formation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>MA\u00ceTRISEZ L\u2019APPR\u00c9CIATION ET LA GESTION OPTIMALE DU RISQUE DE LA S\u00c9CURIT\u00c9 DE L\u2019INFORMATION, CONFORME \u00c0 LA NORME ISO\/IEC 27005 AVEC LA M\u00c9THODE MEHARI L&rsquo; audience cibl\u00e9e par la formation Les managers des risques Les personnes responsables de la s\u00e9curit\u00e9 de l\u2019information ou de la conformit\u00e9 dans une organisation Les membres d\u2019une \u00e9quipe charg\u00e9e de la [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":17476,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[153],"examen":[146],"langue":[],"niveau":[90],"formateur":[89],"cpf":[],"organismes":[],"organisme":[],"mec_category":[95],"class_list":["post-17473","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","duree-5-jours","examen-oui","niveau-fondamental","formateur-pecb","mec_category-risque-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PECB CERTIFIED ISO\/IEC 27005 AVEC MEHARI - ACG CyberAcademy %<\/title>\n<meta name=\"description\" content=\"MA\u00ceTRISEZ L\u2019APPR\u00c9CIATION ET LA GESTION OPTIMALE DU RISQUE DE LA S\u00c9CURIT\u00c9 DE L\u2019INFORMATION, CONFORME \u00c0 LA NORME ISO\/IEC 27005 AVEC LA M\u00c9THODE MEHARI\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-iso-iec-27005-avec-mehari\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PECB CERTIFIED ISO\/IEC 27005 AVEC MEHARI - ACG CyberAcademy %\" \/>\n<meta property=\"og:description\" content=\"MA\u00ceTRISEZ L\u2019APPR\u00c9CIATION ET LA GESTION OPTIMALE DU RISQUE DE LA S\u00c9CURIT\u00c9 DE L\u2019INFORMATION, CONFORME \u00c0 LA NORME ISO\/IEC 27005 AVEC LA M\u00c9THODE MEHARI\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-iso-iec-27005-avec-mehari\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T13:27:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/iso-iec27005-mehari_4p-fr-0.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1494\" \/>\n\t<meta property=\"og:image:height\" content=\"1132\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-iso-iec-27005-avec-mehari\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-iso-iec-27005-avec-mehari\\\/\",\"name\":\"PECB CERTIFIED ISO\\\/IEC 27005 AVEC MEHARI - ACG CyberAcademy %\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-iso-iec-27005-avec-mehari\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-iso-iec-27005-avec-mehari\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/iso-iec27005-mehari_4p-fr-0.jpg\",\"datePublished\":\"2025-05-30T08:49:09+00:00\",\"dateModified\":\"2025-11-18T13:27:23+00:00\",\"description\":\"MA\u00ceTRISEZ L\u2019APPR\u00c9CIATION ET LA GESTION OPTIMALE DU RISQUE DE LA S\u00c9CURIT\u00c9 DE L\u2019INFORMATION, CONFORME \u00c0 LA NORME ISO\\\/IEC 27005 AVEC LA M\u00c9THODE MEHARI\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-iso-iec-27005-avec-mehari\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-iso-iec-27005-avec-mehari\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-iso-iec-27005-avec-mehari\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/iso-iec27005-mehari_4p-fr-0.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/iso-iec27005-mehari_4p-fr-0.jpg\",\"width\":1494,\"height\":1132,\"caption\":\"Ma\u00eetrisez l\u2019appr\u00e9ciation et la gestion optimale du risque de la s\u00e9curit\u00e9 de l\u2019information, conforme \u00e0 la norme iso\\\/iec 27005 avec la m\u00e9thode mehari\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/pecb-certified-iso-iec-27005-avec-mehari\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PECB CERTIFIED ISO\\\/IEC 27005 AVEC MEHARI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PECB CERTIFIED ISO\/IEC 27005 AVEC MEHARI - ACG CyberAcademy %","description":"MASTER THE ASSESSMENT AND OPTIMUM MANAGEMENT OF INFORMATION SECURITY RISK, IN COMPLIANCE WITH ISO\/IEC 27005, USING THE MEHARI METHOD","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-iso-iec-27005-avec-mehari\/","og_locale":"en_GB","og_type":"article","og_title":"PECB CERTIFIED ISO\/IEC 27005 AVEC MEHARI - ACG CyberAcademy %","og_description":"MA\u00ceTRISEZ L\u2019APPR\u00c9CIATION ET LA GESTION OPTIMALE DU RISQUE DE LA S\u00c9CURIT\u00c9 DE L\u2019INFORMATION, CONFORME \u00c0 LA NORME ISO\/IEC 27005 AVEC LA M\u00c9THODE MEHARI","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/pecb-certified-iso-iec-27005-avec-mehari\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-11-18T13:27:23+00:00","og_image":[{"width":1494,"height":1132,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/iso-iec27005-mehari_4p-fr-0.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-iso-iec-27005-avec-mehari\/","url":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-iso-iec-27005-avec-mehari\/","name":"PECB CERTIFIED ISO\/IEC 27005 AVEC MEHARI - ACG CyberAcademy %","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-iso-iec-27005-avec-mehari\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-iso-iec-27005-avec-mehari\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/iso-iec27005-mehari_4p-fr-0.jpg","datePublished":"2025-05-30T08:49:09+00:00","dateModified":"2025-11-18T13:27:23+00:00","description":"MASTER THE ASSESSMENT AND OPTIMUM MANAGEMENT OF INFORMATION SECURITY RISK, IN COMPLIANCE WITH ISO\/IEC 27005, USING THE MEHARI METHOD","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-iso-iec-27005-avec-mehari\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/pecb-certified-iso-iec-27005-avec-mehari\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-iso-iec-27005-avec-mehari\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/iso-iec27005-mehari_4p-fr-0.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/iso-iec27005-mehari_4p-fr-0.jpg","width":1494,"height":1132,"caption":"Ma\u00eetrisez l\u2019appr\u00e9ciation et la gestion optimale du risque de la s\u00e9curit\u00e9 de l\u2019information, conforme \u00e0 la norme iso\/iec 27005 avec la m\u00e9thode mehari"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/pecb-certified-iso-iec-27005-avec-mehari\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"PECB CERTIFIED ISO\/IEC 27005 AVEC MEHARI"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=17473"}],"version-history":[{"count":13,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17473\/revisions"}],"predecessor-version":[{"id":21756,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17473\/revisions\/21756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/17476"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=17473"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=17473"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=17473"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=17473"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=17473"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=17473"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=17473"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=17473"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=17473"},{"taxonomy":"cpf","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=17473"},{"taxonomy":"organismes","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=17473"},{"taxonomy":"organisme","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=17473"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=17473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}