{"id":22946,"date":"2026-04-07T14:43:11","date_gmt":"2026-04-07T12:43:11","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?page_id=22946"},"modified":"2026-04-08T17:06:48","modified_gmt":"2026-04-08T15:06:48","slug":"cybersecurite-au-dela-de-la-conformite","status":"publish","type":"page","link":"https:\/\/acgcyberacademy.fr\/en\/cybersecurite-au-dela-de-la-conformite\/","title":{"rendered":"D\u00e9pendances num\u00e9riques : et si le d\u00e9ficit invisible \u00e9tait avant tout humain ?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"22946\" class=\"elementor elementor-22946\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb97c54 e-con-full e-flex e-con e-parent\" data-id=\"bb97c54\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9061665 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"9061665\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">D\u00e9pendances num\u00e9riques : <br>  et si le d\u00e9ficit invisible \u00e9tait avant tout humain ?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6561f8 elementor-widget elementor-widget-spacer\" data-id=\"d6561f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca22dbb elementor-widget elementor-widget-image\" data-id=\"ca22dbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/elementor\/thumbs\/image_2026-04-08_115434576-rlp7sva174cgofy9rpfbck9tavpn5jt59ui0xk371s.jpg\" title=\"image_2026-04-08_115434576\" alt=\"image_2026-04-08_115434576\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8318a5c elementor-widget elementor-widget-text-editor\" data-id=\"8318a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bechir Sebai (ACG Cybersecurity) et Nicolas Herz (Global Knowledge) lors de leur Talk au Forum InCyber 2026, Lille &#8211; 31 mars 2026<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e1bd56 e-con-full e-flex e-con e-parent\" data-id=\"9e1bd56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27f3206 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"27f3206\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">C&rsquo;est la question que nous avons pos\u00e9e sur sc\u00e8ne au Forum InCyber 2026, avec nos partenaires de <strong><a href=\"https:\/\/www.globalknowledge.com\/fr-fr\/\" target=\"_blank\" rel=\"noopener\">Global Knowledge<\/a>.<\/strong> Une question qui r\u00e9sonne au-del\u00e0 du titre : les entreprises fran\u00e7aises investissent massivement en cybers\u00e9curit\u00e9, elles progressent sur la conformit\u00e9, elles d\u00e9ploient les bons outils. Mais face \u00e0 une menace qui ne s&rsquo;arr\u00eate pas, une r\u00e9alit\u00e9 s&rsquo;impose sur le terrain, aux c\u00f4t\u00e9s de nos clients : <strong>les dispositifs sont l\u00e0, les \u00e9quipes form\u00e9es pour les piloter, d\u00e9cider et r\u00e9agir, pas toujours.\u00a0<\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14e7739 e-con-full e-flex e-con e-child\" data-id=\"14e7739\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a795cf3 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a795cf3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"talk-label\"><span style=\"color: #00ccff;\"><strong>Forum InCyber 2026 \u00b7 Lille<\/strong><\/span><\/div><div class=\"talk-title\"><strong>\u00ab\u00a0<span data-teams=\"true\"><i>D\u00e9pendances num\u00e9riques : et si le d\u00e9ficit invisible \u00e9tait avant tout humain ? <\/i><\/span>\u00ab\u00a0<\/strong><\/div><div class=\"talk-meta\">Talk du 31 mars 2026 \u00b7 15h40 \u00b7 Bechir Sebai (ACG Cybersecurity) \u00d7 Nicolas Herz (Global Knowledge \/ Skillsoft)<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49a9011 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"49a9011\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #333333;\">15 000 postes vacants. Six \u00e9quipes sur dix en sous-capacit\u00e9.<\/span><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6279fcd e-grid e-con-full e-con e-parent\" data-id=\"6279fcd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c632c7d e-flex e-con-boxed e-con e-child\" data-id=\"c632c7d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd0124d elementor-widget elementor-widget-text-editor\" data-id=\"fd0124d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>69%<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2edb61f elementor-widget elementor-widget-text-editor\" data-id=\"2edb61f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>des entreprises fran\u00e7aises manquent de ressources cyber<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b003c2d elementor-widget elementor-widget-text-editor\" data-id=\"b003c2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Barom\u00e8tre CESIN 2025<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8de448d e-flex e-con-boxed e-con e-child\" data-id=\"8de448d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec679d5 elementor-widget elementor-widget-text-editor\" data-id=\"ec679d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>15 000<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5644aaf elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5644aaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>postes vacants en cybers\u00e9curit\u00e9 en France<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e823365 elementor-widget elementor-widget-text-editor\" data-id=\"e823365\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>OPIIEC \/ ANSSI<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-caf1b70 e-flex e-con-boxed e-con e-child\" data-id=\"caf1b70\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c6be429 elementor-widget elementor-widget-text-editor\" data-id=\"c6be429\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>6\/10<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffe2935 elementor-widget elementor-widget-text-editor\" data-id=\"ffe2935\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00e9quipes avec des lacunes critiques en comp\u00e9tences<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-157cab2 elementor-widget elementor-widget-text-editor\" data-id=\"157cab2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ISC2, 2025<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52981df e-con-full e-flex e-con e-parent\" data-id=\"52981df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a90e70d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a90e70d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ce d\u00e9ficit n&rsquo;est pas nouveau. Mais avec l&rsquo;entr\u00e9e en vigueur progressive de NIS2 et DORA, il prend une dimension in\u00e9dite : les organisations ne doivent plus seulement \u00eatre conformes, elles doivent\u00a0<strong>d\u00e9montrer leur capacit\u00e9 \u00e0 r\u00e9agir<\/strong>. L&rsquo;ANSSI l&rsquo;a rappel\u00e9 en publiant le ReCyF en mars 2026 : 20 objectifs de s\u00e9curit\u00e9 concrets, et un message sans ambigu\u00eft\u00e9 de son directeur g\u00e9n\u00e9ral Vincent Strubel :\u00a0<em>\u00ab\u00a0la menace n&rsquo;attend pas\u00a0\u00bb<\/em>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-92cf7fb e-con-full e-flex e-con e-parent\" data-id=\"92cf7fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d1a8e89 elementor-widget elementor-widget-image\" data-id=\"d1a8e89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/elementor\/thumbs\/image_2026-04-08_115501914-rlp7t3q9c0ar6xhyb9mqwnpm2bd6n70ghlhv1vob2g.jpg\" title=\"image_2026-04-08_115501914\" alt=\"image_2026-04-08_115501914\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Une audience attentive et engag\u00e9e lors des InCyber Talks \u2014 Forum InCyber 2026, Lille Grand Palais<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bb1c5e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7bb1c5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #333333;\">La conformit\u00e9 fixe le cap. La r\u00e9silience, elle, se construit.<\/span><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ab3fa1 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7ab3fa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>C&rsquo;est la distinction fondamentale que nous portons au quotidien chez ACG CyberAcademy.<\/p><p>Une certification atteste d&rsquo;un niveau de connaissance \u00e0 un instant T. Elle est indispensable. Mais elle ne r\u00e9pond pas \u00e0 cette question simple : que sera capable de faire votre \u00e9quipe \u00e0 2h du matin, quand un incident se d\u00e9clare, quand les d\u00e9cisions doivent \u00eatre prises en quelques minutes, sous pression ?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67dace9 e-con-full e-flex e-con e-parent\" data-id=\"67dace9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d40d5c9 e-con-full e-flex e-con e-child\" data-id=\"d40d5c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6938209 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6938209\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"talk-label\">La r\u00e9silience op\u00e9rationnelle se construit autrement : par la pratique, la mise en situation, la confrontation aux cas r\u00e9els. C&rsquo;est ce que nous appelons le\u00a0<strong>\u00ab\u00a0Learning by doing\u00a0\u00bb<\/strong>, et c&rsquo;est le fil conducteur de toutes nos formations.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c875fc elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"9c875fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nos sessions sont con\u00e7ues et anim\u00e9es par des\u00a0<strong>experts-praticiens en activit\u00e9<\/strong>\u00a0: auditeurs PASSI, consultants en gouvernance, sp\u00e9cialistes de la r\u00e9ponse \u00e0 incident. Des professionnels qui affrontent les m\u00eames enjeux que vos \u00e9quipes, et qui transmettent non seulement les r\u00e9f\u00e9rentiels, mais la fa\u00e7on dont on les applique dans des situations concr\u00e8tes, parfois sous tension. Cette proximit\u00e9 avec le terrain, c&rsquo;est ce qui change tout dans une salle de formation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-129f899 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"129f899\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #333333;\">PASI &amp; DTISI : deux parcours n\u00e9s d&rsquo;un partenariat de terrain<\/span><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5217cd1 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5217cd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>C&rsquo;est dans cet esprit, et en partenariat avec\u00a0<strong>Global Knowledge<\/strong>, leader mondial de la formation IT et cybers\u00e9curit\u00e9, qu&rsquo;ACG CyberAcademy a structur\u00e9 deux parcours certifiants pens\u00e9s pour l&rsquo;op\u00e9rationnel.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-051ce67 e-grid e-con-full e-con e-child\" data-id=\"051ce67\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5a22519 e-flex e-con-boxed e-con e-child\" data-id=\"5a22519\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73d7143 elementor-widget elementor-widget-text-editor\" data-id=\"73d7143\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>PARCOURS PASI<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f924404 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f924404\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #333333;\"><strong><em>Piloter et Animer la S\u00e9curit\u00e9 de l&rsquo;Information<\/em><\/strong><\/span><\/p><p>\u00a0<\/p><p>Pour les managers et responsables s\u00e9curit\u00e9 qui pilotent la conformit\u00e9 NIS2, ISO 27001 ou DORA au quotidien.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7972a7b e-grid e-con-full e-con e-child\" data-id=\"7972a7b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-796de6f elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"796de6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<span class=\"tag\">10 jours<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdeb685 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"fdeb685\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>50% pratique<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26ad6db elementor-widget elementor-widget-text-editor\" data-id=\"26ad6db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Labs immersifs<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-990c367 elementor-widget elementor-widget-button\" data-id=\"990c367\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/parcours-certifiant-piloter-et-animer-la-securite-informatique\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">D\u00e9couvrir le programme complet<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff87828 e-flex e-con-boxed e-con e-child\" data-id=\"ff87828\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fff1eee elementor-widget elementor-widget-text-editor\" data-id=\"fff1eee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>PARCOURS DTISI<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e85c902 elementor-widget-mobile__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e85c902\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><em>Diriger et Transformer le SI par la S\u00e9curit\u00e9 de l&rsquo;Information<\/em><\/strong><\/p><p>\u00a0<\/p><p>Pour les RSSI et dirigeants qui souhaitent faire de la cybers\u00e9curit\u00e9 un levier de transformation strat\u00e9gique.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18b1f6c e-grid e-con-full e-con e-child\" data-id=\"18b1f6c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-539cf33 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"539cf33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<span class=\"tag\">10 jours<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f57e21 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"4f57e21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>50% pratique<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6b7639 elementor-widget elementor-widget-text-editor\" data-id=\"d6b7639\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Labs immersifs<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03dbd8f elementor-widget elementor-widget-button\" data-id=\"03dbd8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/parcours-certifiant-detecter-et-traiter-des-incidents-de-securiteinformatiquedents-de-securite\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">D\u00e9couvrir le programme complet<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d79880 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"2d79880\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ce partenariat avec Global Knowledge nous permet de combiner l&rsquo;expertise cyber pure player d&rsquo;ACG Cybersecurity avec un catalogue de certifications reconnu mondialement. Les deux parcours sont <strong>finan\u00e7ables OPCO Atlas<\/strong>, en format compact pour s&rsquo;adapter aux contraintes des \u00e9quipes en activit\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b0af69 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"8b0af69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/04\/image_2026-04-08_115525840.jpg\" class=\"attachment-full size-full wp-image-23049\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/04\/image_2026-04-08_115525840.jpg 800w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/04\/image_2026-04-08_115525840-300x169.jpg 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/04\/image_2026-04-08_115525840-768x432.jpg 768w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/04\/image_2026-04-08_115525840-18x10.jpg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Le stand A5-1 ACG Cybersecurity \u00d7 Global Knowledge \u2014 Forum InCyber 2026, Lille Grand Palais<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e95edcc elementor-widget__width-initial elementor-widget elementor-widget-wpforms\" data-id=\"e95edcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpforms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"wpforms-container wpforms-container-full wpforms-render-modern\" id=\"wpforms-22976\"><form id=\"wpforms-form-22976\" class=\"wpforms-validate wpforms-form wpforms-ajax-form\" data-formid=\"22976\" method=\"post\" enctype=\"multipart\/form-data\" action=\"\/en\/wp-json\/wp\/v2\/pages\/22946\" data-token=\"99c712cc07b76dea28d3d4e9e19748aa\" data-token-time=\"1775825215\"><div class=\"wpforms-head-container\"><div class=\"wpforms-title\">T\u00e9l\u00e9chargez la pr\u00e9sentation de notre Talk InCyber 2026<\/div><div class=\"wpforms-description\">\"D\u00e9pendances num\u00e9riques : et si le d\u00e9ficit invisible \u00e9tait humain ?\" -   Acc\u00e9dez aux slides compl\u00e8tes pr\u00e9sent\u00e9es par Bechir Sebai et Nicolas Herz le 31 mars 2026.<\/div><\/div><noscript class=\"wpforms-error-noscript\">Please enable JavaScript in your browser to complete this form.<\/noscript><div id=\"wpforms-error-noscript\" style=\"display: none;\">Please enable JavaScript in your browser to complete this form.<\/div><div class=\"wpforms-field-container\"><div id=\"wpforms-22976-field_3-container\" class=\"wpforms-field wpforms-field-name\" data-field-id=\"3\"><fieldset><legend class=\"wpforms-field-label\">Name <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/legend><div class=\"wpforms-field-row wpforms-field-medium\"><div class=\"wpforms-field-row-block wpforms-first wpforms-one-half\"><input type=\"text\" id=\"wpforms-22976-field_3\" class=\"wpforms-field-name-first wpforms-field-required\" name=\"wpforms[fields][3][first]\" aria-errormessage=\"wpforms-22976-field_3-error\" required><label for=\"wpforms-22976-field_3\" class=\"wpforms-field-sublabel after\">First<\/label><\/div><div class=\"wpforms-field-row-block wpforms-one-half\"><input type=\"text\" id=\"wpforms-22976-field_3-last\" class=\"wpforms-field-name-last wpforms-field-required\" name=\"wpforms[fields][3][last]\" aria-errormessage=\"wpforms-22976-field_3-last-error\" required><label for=\"wpforms-22976-field_3-last\" class=\"wpforms-field-sublabel after\">Last<\/label><\/div><\/div><\/fieldset><\/div><div id=\"wpforms-22976-field_4-container\" class=\"wpforms-field wpforms-field-email\" data-field-id=\"4\"><label class=\"wpforms-field-label\" for=\"wpforms-22976-field_4\">Email <span class=\"wpforms-required-label\" aria-hidden=\"true\">*<\/span><\/label><input type=\"email\" id=\"wpforms-22976-field_4\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][4]\" spellcheck=\"false\" aria-errormessage=\"wpforms-22976-field_4-error\" required><\/div>\t\t<div id=\"wpforms-22976-field_1-container\"\n\t\t\tclass=\"wpforms-field wpforms-field-text\"\n\t\t\tdata-field-type=\"text\"\n\t\t\tdata-field-id=\"1\"\n\t\t\t>\n\t\t\t<label class=\"wpforms-field-label\" for=\"wpforms-22976-field_1\" >Name Soci\u00e9te Email<\/label>\n\t\t\t<input type=\"text\" id=\"wpforms-22976-field_1\" class=\"wpforms-field-medium\" name=\"wpforms[fields][1]\" >\n\t\t<\/div>\n\t\t<div id=\"wpforms-22976-field_5-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"5\"><label class=\"wpforms-field-label\" for=\"wpforms-22976-field_5\">Soci\u00e9te<\/label><input type=\"text\" id=\"wpforms-22976-field_5\" class=\"wpforms-field-medium\" name=\"wpforms[fields][5]\" aria-errormessage=\"wpforms-22976-field_5-error\" ><\/div><div id=\"wpforms-22976-field_10-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"10\"><label class=\"wpforms-field-label\" for=\"wpforms-22976-field_10\">Fonction\/Poste<\/label><input type=\"text\" id=\"wpforms-22976-field_10\" class=\"wpforms-field-medium\" name=\"wpforms[fields][10]\" aria-errormessage=\"wpforms-22976-field_10-error\" ><\/div><script>\n\t\t\t\t( function() {\n\t\t\t\t\tconst style = document.createElement( 'style' );\n\t\t\t\t\tstyle.appendChild( document.createTextNode( '#wpforms-22976-field_1-container { position: absolute !important; overflow: hidden !important; display: inline !important; height: 1px !important; width: 1px !important; z-index: -1000 !important; padding: 0 !important; } #wpforms-22976-field_1-container input { visibility: hidden; } #wpforms-conversational-form-page #wpforms-22976-field_1-container label { counter-increment: none; }' ) );\n\t\t\t\t\tdocument.head.appendChild( style );\n\t\t\t\t\tdocument.currentScript?.remove();\n\t\t\t\t} )();\n\t\t\t<\/script><\/div><!-- .wpforms-field-container --><div class=\"wpforms-submit-container\" ><input type=\"hidden\" name=\"wpforms[id]\" value=\"22976\"><input type=\"hidden\" name=\"page_title\" value=\"\"><input type=\"hidden\" name=\"page_url\" value=\"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/22946\"><input type=\"hidden\" name=\"url_referer\" value=\"\"><button type=\"submit\" name=\"wpforms[submit]\" id=\"wpforms-submit-22976\" class=\"wpforms-submit\" data-alt-text=\"Vos donn\u00e9es sont utilis\u00e9es uniquement pour vous envoyer la pr\u00e9sentation et des informations sur nos formations. Aucun spam.\" data-submit-text=\"T\u00e9l\u00e9chargez la pr\u00e9sentation\" aria-live=\"assertive\" value=\"wpforms-submit\">T\u00e9l\u00e9chargez la pr\u00e9sentation<\/button><img decoding=\"async\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/plugins\/wpforms-lite\/assets\/images\/submit-spin.svg\" class=\"wpforms-submit-spinner\" style=\"display: none;\" width=\"26\" height=\"26\" alt=\"Loading\"><\/div><\/form><\/div>  <!-- .wpforms-container -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b85c21 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"4b85c21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #333333;\">Former aujourd&rsquo;hui, pour r\u00e9pondre demain<\/span><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7bb4a8 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c7bb4a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La transposition fran\u00e7aise de NIS2 est attendue pour juillet 2026. Le calendrier se resserre. Mais au-del\u00e0 de la conformit\u00e9, la vraie question reste humaine :\u00a0<strong>vos \u00e9quipes sont-elles r\u00e9ellement pr\u00eates \u00e0 d\u00e9tecter, d\u00e9cider et agir quand \u00e7a compte ?<\/strong><\/p><p>Nous posons cette question \u00e0 chaque entreprise que nous accompagnons. Et nous y r\u00e9pondons avec eux, pas \u00e0 leur place.<\/p><p>Chez ACG CyberAcademy, nous ne formons pas des certifi\u00e9s. Nous formons des professionnels cyber qui savent quoi faire le jour o\u00f9 \u00e7a arrive. C&rsquo;est notre contribution concr\u00e8te au d\u00e9fi que traverse aujourd&rsquo;hui la cybers\u00e9curit\u00e9 fran\u00e7aise.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01e8e17 e-flex e-con-boxed e-con e-child\" data-id=\"01e8e17\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23ae6c7 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"23ae6c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>ACG CyberAcademy est le centre de formation d&rsquo;ACG Cybersecurity, pure player cyber qualifi\u00e9 PASSI ANSSI, r\u00e9sident du Campus Cyber et membre Hexatrust. En partenariat avec Global Knowledge \/ Skillsoft.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>D\u00e9pendances num\u00e9riques : et si le d\u00e9ficit invisible \u00e9tait avant tout humain ? Bechir Sebai (ACG Cybersecurity) et Nicolas Herz (Global Knowledge) lors de leur Talk au Forum InCyber 2026, Lille &#8211; 31 mars 2026 C&rsquo;est la question que nous avons pos\u00e9e sur sc\u00e8ne au Forum InCyber 2026, avec nos partenaires de Global Knowledge. Une [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":23005,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_glsr_average":0,"_glsr_ranking":0,"_glsr_reviews":0,"footnotes":""},"class_list":["post-22946","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 : au-del\u00e0 de la conformit\u00e9 | ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Cybers\u00e9curit\u00e9 : quand la conformit\u00e9 ne suffit plus, la comp\u00e9tence prend le relais\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/cybersecurite-au-dela-de-la-conformite\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 : au-del\u00e0 de la conformit\u00e9 | ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Cybers\u00e9curit\u00e9 : quand la conformit\u00e9 ne suffit plus, la comp\u00e9tence prend le relais\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/cybersecurite-au-dela-de-la-conformite\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T15:06:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/04\/IMG_1017-e1775573110695.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1424\" \/>\n\t<meta property=\"og:image:height\" content=\"1197\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/cybersecurite-au-dela-de-la-conformite\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/cybersecurite-au-dela-de-la-conformite\\\/\",\"name\":\"Cybers\u00e9curit\u00e9 : au-del\u00e0 de la conformit\u00e9 | ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/cybersecurite-au-dela-de-la-conformite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/cybersecurite-au-dela-de-la-conformite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/IMG_1017-e1775573110695.jpeg\",\"datePublished\":\"2026-04-07T12:43:11+00:00\",\"dateModified\":\"2026-04-08T15:06:48+00:00\",\"description\":\"Cybers\u00e9curit\u00e9 : quand la conformit\u00e9 ne suffit plus, la comp\u00e9tence prend le relais\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/cybersecurite-au-dela-de-la-conformite\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/cybersecurite-au-dela-de-la-conformite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/cybersecurite-au-dela-de-la-conformite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/IMG_1017-e1775573110695.jpeg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/IMG_1017-e1775573110695.jpeg\",\"width\":1424,\"height\":1197,\"caption\":\"Cybers\u00e9curit\u00e9 : quand la conformit\u00e9 ne suffit plus, la comp\u00e9tence prend le relais\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/cybersecurite-au-dela-de-la-conformite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D\u00e9pendances num\u00e9riques : et si le d\u00e9ficit invisible \u00e9tait avant tout humain ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 : au-del\u00e0 de la conformit\u00e9 | ACG CyberAcademy","description":"Cybers\u00e9curit\u00e9 : quand la conformit\u00e9 ne suffit plus, la comp\u00e9tence prend le relais","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/cybersecurite-au-dela-de-la-conformite\/","og_locale":"en_GB","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 : au-del\u00e0 de la conformit\u00e9 | ACG CyberAcademy","og_description":"Cybers\u00e9curit\u00e9 : quand la conformit\u00e9 ne suffit plus, la comp\u00e9tence prend le relais","og_url":"https:\/\/acgcyberacademy.fr\/en\/cybersecurite-au-dela-de-la-conformite\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-04-08T15:06:48+00:00","og_image":[{"width":1424,"height":1197,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/04\/IMG_1017-e1775573110695.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/cybersecurite-au-dela-de-la-conformite\/","url":"https:\/\/acgcyberacademy.fr\/cybersecurite-au-dela-de-la-conformite\/","name":"Cybers\u00e9curit\u00e9 : au-del\u00e0 de la conformit\u00e9 | ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/cybersecurite-au-dela-de-la-conformite\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/cybersecurite-au-dela-de-la-conformite\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/04\/IMG_1017-e1775573110695.jpeg","datePublished":"2026-04-07T12:43:11+00:00","dateModified":"2026-04-08T15:06:48+00:00","description":"Cybers\u00e9curit\u00e9 : quand la conformit\u00e9 ne suffit plus, la comp\u00e9tence prend le relais","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/cybersecurite-au-dela-de-la-conformite\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/cybersecurite-au-dela-de-la-conformite\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/cybersecurite-au-dela-de-la-conformite\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/04\/IMG_1017-e1775573110695.jpeg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/04\/IMG_1017-e1775573110695.jpeg","width":1424,"height":1197,"caption":"Cybers\u00e9curit\u00e9 : quand la conformit\u00e9 ne suffit plus, la comp\u00e9tence prend le relais"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/cybersecurite-au-dela-de-la-conformite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"D\u00e9pendances num\u00e9riques : et si le d\u00e9ficit invisible \u00e9tait avant tout humain ?"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/22946","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=22946"}],"version-history":[{"count":92,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/22946\/revisions"}],"predecessor-version":[{"id":23079,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/22946\/revisions\/23079"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/23005"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=22946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}