﻿{"id":43351,"date":"2025-03-13T13:38:54","date_gmt":"2025-03-13T12:38:54","guid":{"rendered":"https:\/\/shortways.com\/?p=43351"},"modified":"2025-03-14T09:38:26","modified_gmt":"2025-03-14T08:38:26","slug":"cybersecurite","status":"publish","type":"post","link":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/","title":{"rendered":"La cybers\u00e9curit\u00e9 chez Shortways : enjeux, bonnes pratiques et perspectives d&#8217;avenir"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/shortways.com\/wp-content\/uploads\/2025\/03\/Banniere-interview-cybersecurite-Olivier-Piedfroid.png&#8221; title_text=&#8221;Banni\u00e8re interview cybers\u00e9curit\u00e9 Olivier Piedfroid&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Dans un contexte o\u00f9 les cyberattaques se multiplient et o\u00f9 l&#8217;IA bouleverse les pratiques, la cybers\u00e9curit\u00e9 est devenue un enjeu majeur pour toutes les entreprises, quelle que soit leur taille. Olivier Piedfroid, CTO de Shortways, partage sa vision des principaux risques et d\u00e9taille les mesures mises en place pour garantir la s\u00e9curit\u00e9 des donn\u00e9es de nos clients.<\/p>\n<p><span style=\"font-family: 'Metropolis Extra Bold'; font-weight: normal;\"><span style=\"text-decoration: underline;\">Au programme<\/span> :<\/span><\/p>\n<ul>\n<li><a href=\"#menaces\">Un paysage de menaces en constante \u00e9volution<\/a><\/li>\n<li><a href=\"#approche\">Une approche structur\u00e9e de la cybers\u00e9curit\u00e9 chez Shortways<\/a><\/li>\n<li><a href=\"#clients\">La cybers\u00e9curit\u00e9, une exigence croissante des clients<\/a><\/li>\n<li><a href=\"#defis\">IA et souverainet\u00e9 des donn\u00e9es : les d\u00e9fis \u00e0 venir<\/a><\/li>\n<li><a href=\"#innovation\">Cybers\u00e9curit\u00e9 et innovation : un \u00e9quilibre essentiel<\/a><\/li>\n<li><a href=\"#vigilance\">Conclusion : une vigilance constante<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;menaces&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #38abdd; font-size: large;\">Un paysage de menaces en constante \u00e9volution<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Les entreprises sont confront\u00e9es \u00e0 une multitude de cybermenaces, dont la principale reste la demande de ran\u00e7on*. Les hackers cherchent souvent \u00e0 bloquer des syst\u00e8mes critiques et \u00e0 exiger un paiement en \u00e9change du d\u00e9blocage des donn\u00e9es.<\/p>\n<p>D&#8217;autres types d&#8217;attaques exploitent les fournisseurs tiers comme porte d&#8217;entr\u00e9e dans les syst\u00e8mes des grandes entreprises. Par exemple, le vol d&#8217;identifiants peut permettre d&#8217;envoyer des e-mails frauduleux contenant des logiciels malveillants.<\/p>\n<p>Les cyberattaques ne sont plus seulement le fait d&#8217;individus isol\u00e9s ; elles peuvent \u00eatre le r\u00e9sultat d&#8217;actions coordonn\u00e9es, automatis\u00e9es, multi-dimensionnelles, touchant potentiellement n&#8217;importe quelle entreprise. <span style=\"color: #38abdd;\">&#8220;Une entreprise se fera hacker au moins une fois dans sa vie&#8221;<\/span><strong>**<\/strong>, pr\u00e9vient Olivier Piedfroid.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;approche&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #38abdd; font-size: large;\">Une approche structur\u00e9e de la cybers\u00e9curit\u00e9 chez Shortways<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Chez Shortways, la s\u00e9curit\u00e9 repose sur un cadre strict et une organisation rigoureuse :<\/p>\n<ul>\n<li>Un <strong>comit\u00e9 de s\u00e9curit\u00e9<\/strong>, dirig\u00e9 par le CTO, veille \u00e0 la mise en place et au suivi des bonnes pratiques.<\/li>\n<li>Une strat\u00e9gie fond\u00e9e sur <strong>quatre piliers<\/strong> : identification et \u00e9valuation des menaces, protection des syst\u00e8mes, d\u00e9tection des intrusions et r\u00e9action rapide en cas d&#8217;incident.<\/li>\n<li>Une application de ces principes \u00e0 <strong>quatre zones de risques<\/strong> : les <a href=\"https:\/\/shortways.com\/fr\/blog\/actualite\/rgpd-et-dap-compatibles\/\">donn\u00e9es personnelles<\/a>, les donn\u00e9es d&#8217;entreprise, la gestion des tiers et la continuit\u00e9 d&#8217;activit\u00e9.<\/li>\n<\/ul>\n<p>Shortways int\u00e8gre la cybers\u00e9curit\u00e9 \u00e0 toutes les \u00e9tapes du cycle de vie de ses produits :<\/p>\n<ol>\n<li><strong>Pendant le d\u00e9veloppement<\/strong> : d\u00e9veloppement s\u00e9curis\u00e9, gestion des vuln\u00e9rabilit\u00e9s, mise \u00e0 jour des syst\u00e8mes. Shortways applique \u00e9galement les recommandations du <strong>Top 10 OWASP<\/strong>, incluant la protection contre les injections de code et la s\u00e9curisation des API sensibles.<\/li>\n<li><strong>Lors du d\u00e9ploiement<\/strong> : cloisonnement des environnements, chiffrement des donn\u00e9es, protocoles s\u00e9curis\u00e9s.<\/li>\n<li><strong>Durant l&#8217;exploitation<\/strong> : surveillance des activit\u00e9s suspectes, d\u00e9tection des intrusions (IDS\/IPS), tests d&#8217;intrusion annuels.<\/li>\n<\/ol>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;clients&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #38abdd; font-size: large;\">La cybers\u00e9curit\u00e9, une exigence croissante des clients<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Les clients de Shortways, notamment les secteurs bancaire, assurantiel et public, imposent des <span style=\"color: #666666;\">exigences de conformit\u00e9 strictes<\/span>. <span style=\"color: #38abdd;\">&#8220;Chaque projet fait l&#8217;objet d&#8217;une \u00e9valuation cyber&#8221;<\/span>, explique Olivier Piedfroid. Shortways a ainsi obtenu la <span style=\"color: #38abdd;\"><a href=\"https:\/\/shortways.com\/fr\/blog\/shortways\/certification-cybervadis\/\" style=\"color: #38abdd;\">certification <strong>CyberVadis<\/strong><\/a><\/span>, avec un score avanc\u00e9 de 718\/1000, mettant en avant la gestion des tiers et la continuit\u00e9 d&#8217;activit\u00e9.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;defis&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #38abdd; font-size: large;\">IA et souverainet\u00e9 des donn\u00e9es : les d\u00e9fis \u00e0 venir<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>L&#8217;Intelligence Artificielle est un sujet majeur pour la cybers\u00e9curit\u00e9. Shortways anticipe les futures r\u00e9glementations, notamment l\u2019<strong>IA Act<\/strong>. La souverainet\u00e9 des donn\u00e9es est \u00e9galement un enjeu croissant. Si aujourd&#8217;hui la plateforme est h\u00e9berg\u00e9e en Europe, toute \u00e9volution vers des syst\u00e8mes plus sensibles devra int\u00e9grer ces pr\u00e9requis.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;innovation&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #38abdd; font-size: large;\">Cybers\u00e9curit\u00e9 et innovation : un \u00e9quilibre essentiel<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Si certaines mesures de s\u00e9curit\u00e9 peuvent para\u00eetre contraignantes, elles sont indispensables et souvent b\u00e9n\u00e9fiques sur le long terme. <span style=\"color: #38abdd;\">&#8220;On ne fait jamais l&#8217;\u00e9conomie de la s\u00e9curit\u00e9&#8221;<\/span>, insiste Olivier Piedfroid.<\/p>\n<p>Int\u00e9grer la cybers\u00e9curit\u00e9 d\u00e8s la conception d&#8217;un produit permet non seulement d&#8217;<span style=\"color: #666666;\"><strong>anticiper les menaces<\/strong><\/span>, mais aussi d&#8217;assurer un <span style=\"color: #666666;\"><strong>d\u00e9veloppement plus robuste et plus agile<\/strong><\/span>.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;vigilance&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #38abdd; font-size: large;\">Conclusion : une vigilance constante<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Chez Shortways, la cybers\u00e9curit\u00e9 est un engagement quotidien. Les menaces \u00e9voluent, mais en anticipant les risques et en adoptant des bonnes pratiques rigoureuses, il est possible de prot\u00e9ger efficacement les donn\u00e9es et de maintenir la confiance des clients.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; inline_fonts=&#8221;Metropolis Extra Bold&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-family: 'Metropolis Extra Bold'; font-size: small;\"><span style=\"text-decoration: underline;\">Sources<\/span> :<\/span><\/p>\n<p><span style=\"font-size: small;\">* <a href=\"https:\/\/www.ninjaone.com\/blog\/smb-cybersecurity-statistics\/\">https:\/\/www.ninjaone.com\/blog\/smb-cybersecurity-statistics\/<\/a><\/span><\/p>\n<p><span style=\"font-size: small;\">** (en 2023, 53% des entreprises ont subi une attaque, en augmentation de 5% en un an. Le nombre d&#8217;entreprises de moins de dix salari\u00e9s ayant subi une cyberattaque a augment\u00e9 de plus de 50% au cours des trois derni\u00e8res ann\u00e9es). <\/span><span style=\"font-size: small;\">Source\u00a0: <a href=\"https:\/\/www.data.gouv.fr\/en\/reuses\/statistiques-et-impacts-des-cyberattaques-sur-les-entreprises-en-france\/\">https:\/\/www.data.gouv.fr\/en\/reuses\/statistiques-et-impacts-des-cyberattaques-sur-les-entreprises-en-france\/<\/a><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<a href=\"https:\/\/shortways.com\/fr\/abonnement-newsletter\/?utm_source=Site&#038;utm_medium=Trafic+direct&#038;utm_content=5ff438b0d59cbc58b22943b7&#038;utm_campaign=Inscription_newsletter\"><img decoding=\"async\" src=\"https:\/\/i1.wp.com\/files.plezi.co\/p\/5f17f2d4f4208726cdaaaa43\/contents\/5ff438b0d59cbc58b22943b7\/ctas\/5ff47428d59cbc58b2294fe1\/banniere-newsletter.png?w=1080&#038;ssl=1\" data-recalc-dims=\"1\" \/><\/a>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enjeux, bonnes pratiques et perspectives d&#8217;avenir : notre CTO revient sur l&#8217;approche cybers\u00e9curit\u00e9 mise en place chez Shortways.<\/p>\n","protected":false},"author":2,"featured_media":43352,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","cybocfi_hide_featured_image":"yes","spay_email":"","footnotes":""},"categories":[500,496,494],"tags":[],"class_list":["post-43351","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-experts","category-shortways","category-shortways-assistant"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>La cybers\u00e9curit\u00e9 chez Shortways : interview de notre CTO Olivier Piedfroid<\/title>\n<meta name=\"description\" content=\"Enjeux, bonnes pratiques et perspectives d&#039;avenir : notre CTO revient sur l&#039;approche cybers\u00e9curit\u00e9 mise en place chez Shortways.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La cybers\u00e9curit\u00e9 chez Shortways : interview de notre CTO Olivier Piedfroid\" \/>\n<meta property=\"og:description\" content=\"Enjeux, bonnes pratiques et perspectives d&#039;avenir : notre CTO revient sur l&#039;approche cybers\u00e9curit\u00e9 mise en place chez Shortways.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Shortways\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-13T12:38:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-14T08:38:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shortways.com\/wp-content\/uploads\/2025\/03\/Banniere-interview-cybersecurite-Olivier-Piedfroid-1920x1080.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shortways Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/shortways.com\/fr\/#organization\",\"name\":\"Shortways\",\"url\":\"https:\/\/shortways.com\/fr\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/shortways.com\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i2.wp.com\/shortways.com\/wp-content\/uploads\/2021\/12\/Logo-Shortways-uni.png?fit=760%2C285&ssl=1\",\"contentUrl\":\"https:\/\/i2.wp.com\/shortways.com\/wp-content\/uploads\/2021\/12\/Logo-Shortways-uni.png?fit=760%2C285&ssl=1\",\"width\":760,\"height\":285,\"caption\":\"Shortways\"},\"image\":{\"@id\":\"https:\/\/shortways.com\/fr\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/shortways.com\/fr\/#website\",\"url\":\"https:\/\/shortways.com\/fr\/\",\"name\":\"Shortways\",\"description\":\"La plateforme d&#039;adoption digitale pour tous vos utilisateurs\",\"publisher\":{\"@id\":\"https:\/\/shortways.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/shortways.com\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#webpage\",\"url\":\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/\",\"name\":\"La cybers\\u00e9curit\\u00e9 chez Shortways : interview de notre CTO Olivier Piedfroid\",\"isPartOf\":{\"@id\":\"https:\/\/shortways.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#primaryimage\"},\"datePublished\":\"2025-03-13T12:38:54+00:00\",\"dateModified\":\"2025-03-14T08:38:26+00:00\",\"description\":\"Enjeux, bonnes pratiques et perspectives d'avenir : notre CTO revient sur l'approche cybers\\u00e9curit\\u00e9 mise en place chez Shortways.\",\"breadcrumb\":{\"@id\":\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/shortways.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La cybers\\u00e9curit\\u00e9 chez Shortways : enjeux, bonnes pratiques et perspectives d&#8217;avenir\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#webpage\"},\"author\":{\"@id\":\"https:\/\/shortways.com\/fr\/#\/schema\/person\/a8a21f74b8f0616e256f39de210b735f\"},\"headline\":\"La cybers\\u00e9curit\\u00e9 chez Shortways : enjeux, bonnes pratiques et perspectives d&#8217;avenir\",\"datePublished\":\"2025-03-13T12:38:54+00:00\",\"dateModified\":\"2025-03-14T08:38:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#webpage\"},\"wordCount\":1145,\"publisher\":{\"@id\":\"https:\/\/shortways.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i2.wp.com\/shortways.com\/wp-content\/uploads\/2025\/03\/Banniere-interview-cybersecurite-Olivier-Piedfroid.png?fit=2240%2C1260&ssl=1\",\"articleSection\":[\"Paroles d'experts\",\"Shortways\",\"Shortways Assistant\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/shortways.com\/fr\/#\/schema\/person\/a8a21f74b8f0616e256f39de210b735f\",\"name\":\"Shortways Marketing\",\"url\":\"https:\/\/shortways.com\/fr\/blog\/author\/shortwaysteam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La cybers\u00e9curit\u00e9 chez Shortways : interview de notre CTO Olivier Piedfroid","description":"Enjeux, bonnes pratiques et perspectives d'avenir : notre CTO revient sur l'approche cybers\u00e9curit\u00e9 mise en place chez Shortways.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"La cybers\u00e9curit\u00e9 chez Shortways : interview de notre CTO Olivier Piedfroid","og_description":"Enjeux, bonnes pratiques et perspectives d'avenir : notre CTO revient sur l'approche cybers\u00e9curit\u00e9 mise en place chez Shortways.","og_url":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/","og_site_name":"Shortways","article_published_time":"2025-03-13T12:38:54+00:00","article_modified_time":"2025-03-14T08:38:26+00:00","og_image":[{"width":1920,"height":1080,"filesize":1977475,"path":"2025\/03\/Banniere-interview-cybersecurite-Olivier-Piedfroid-1920x1080.png","url":"https:\/\/shortways.com\/wp-content\/uploads\/2025\/03\/Banniere-interview-cybersecurite-Olivier-Piedfroid-1920x1080.png","size":"large","id":43352,"alt":"","pixels":2073600,"type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Shortways Marketing","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/shortways.com\/fr\/#organization","name":"Shortways","url":"https:\/\/shortways.com\/fr\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/shortways.com\/fr\/#logo","inLanguage":"fr-FR","url":"https:\/\/i2.wp.com\/shortways.com\/wp-content\/uploads\/2021\/12\/Logo-Shortways-uni.png?fit=760%2C285&ssl=1","contentUrl":"https:\/\/i2.wp.com\/shortways.com\/wp-content\/uploads\/2021\/12\/Logo-Shortways-uni.png?fit=760%2C285&ssl=1","width":760,"height":285,"caption":"Shortways"},"image":{"@id":"https:\/\/shortways.com\/fr\/#logo"}},{"@type":"WebSite","@id":"https:\/\/shortways.com\/fr\/#website","url":"https:\/\/shortways.com\/fr\/","name":"Shortways","description":"La plateforme d&#039;adoption digitale pour tous vos utilisateurs","publisher":{"@id":"https:\/\/shortways.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shortways.com\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#webpage","url":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/","name":"La cybers\u00e9curit\u00e9 chez Shortways : interview de notre CTO Olivier Piedfroid","isPartOf":{"@id":"https:\/\/shortways.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#primaryimage"},"datePublished":"2025-03-13T12:38:54+00:00","dateModified":"2025-03-14T08:38:26+00:00","description":"Enjeux, bonnes pratiques et perspectives d'avenir : notre CTO revient sur l'approche cybers\u00e9curit\u00e9 mise en place chez Shortways.","breadcrumb":{"@id":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/shortways.com\/fr\/"},{"@type":"ListItem","position":2,"name":"La cybers\u00e9curit\u00e9 chez Shortways : enjeux, bonnes pratiques et perspectives d&#8217;avenir"}]},{"@type":"Article","@id":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#article","isPartOf":{"@id":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#webpage"},"author":{"@id":"https:\/\/shortways.com\/fr\/#\/schema\/person\/a8a21f74b8f0616e256f39de210b735f"},"headline":"La cybers\u00e9curit\u00e9 chez Shortways : enjeux, bonnes pratiques et perspectives d&#8217;avenir","datePublished":"2025-03-13T12:38:54+00:00","dateModified":"2025-03-14T08:38:26+00:00","mainEntityOfPage":{"@id":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#webpage"},"wordCount":1145,"publisher":{"@id":"https:\/\/shortways.com\/fr\/#organization"},"image":{"@id":"https:\/\/shortways.com\/fr\/blog\/paroles-experts\/cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/i2.wp.com\/shortways.com\/wp-content\/uploads\/2025\/03\/Banniere-interview-cybersecurite-Olivier-Piedfroid.png?fit=2240%2C1260&ssl=1","articleSection":["Paroles d'experts","Shortways","Shortways Assistant"],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/shortways.com\/fr\/#\/schema\/person\/a8a21f74b8f0616e256f39de210b735f","name":"Shortways Marketing","url":"https:\/\/shortways.com\/fr\/blog\/author\/shortwaysteam\/"}]}},"jetpack_featured_media_url":"https:\/\/i2.wp.com\/shortways.com\/wp-content\/uploads\/2025\/03\/Banniere-interview-cybersecurite-Olivier-Piedfroid.png?fit=2240%2C1260&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/shortways.com\/fr\/wp-json\/wp\/v2\/posts\/43351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shortways.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shortways.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shortways.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/shortways.com\/fr\/wp-json\/wp\/v2\/comments?post=43351"}],"version-history":[{"count":7,"href":"https:\/\/shortways.com\/fr\/wp-json\/wp\/v2\/posts\/43351\/revisions"}],"predecessor-version":[{"id":43367,"href":"https:\/\/shortways.com\/fr\/wp-json\/wp\/v2\/posts\/43351\/revisions\/43367"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shortways.com\/fr\/wp-json\/wp\/v2\/media\/43352"}],"wp:attachment":[{"href":"https:\/\/shortways.com\/fr\/wp-json\/wp\/v2\/media?parent=43351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shortways.com\/fr\/wp-json\/wp\/v2\/categories?post=43351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shortways.com\/fr\/wp-json\/wp\/v2\/tags?post=43351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}