{"id":206604,"date":"2025-05-20T20:07:17","date_gmt":"2025-05-20T20:07:17","guid":{"rendered":"https:\/\/emdinfotech.com\/cadre-national-des-exigences-en-matiere-de-cybersecurite-s3\/"},"modified":"2025-05-20T20:07:17","modified_gmt":"2025-05-20T20:07:17","slug":"cadre-national-des-exigences-en-matiere-de-cybersecurite-s3","status":"publish","type":"post","link":"https:\/\/emdinfotech.com\/fr\/cadre-national-des-exigences-en-matiere-de-cybersecurite-s3\/","title":{"rendered":"Cadre national des exigences en mati\u00e8re de cybers\u00e9curit\u00e9 (S3)"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbHeader\u00a0\u00bb _builder_version=\u00a0\u00bb4.21.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/emdinfotech.com\/wp-content\/uploads\/2025\/05\/online-university-18.jpg\u00a0\u00bb custom_padding=\u00a0\u00bb8vw||0px||false|false\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.22.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bbgcid-a9d8e14e-2f78-408a-a83c-506939196b52&Prime; custom_padding=\u00a0\u00bb60px|60px|60px|120px|true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb30px|30px|30px|60px|true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb20px|20px|20px|40px|true|false\u00a0\u00bb border_radii=\u00a0\u00bboff|30px|30px||\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-a9d8e14e-2f78-408a-a83c-506939196b52%22:%91%22background_color%22%93}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.22.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbd343c4fc-656d-4a09-a789-aaac73e94025&Prime; header_font=\u00a0\u00bbRoboto|300|||||||\u00a0\u00bb header_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb header_font_size=\u00a0\u00bb55px\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<h1>NIS2 Cadre national de cybers\u00e9curit\u00e9  <\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbAbout\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1280px\u00a0\u00bb max_width_tablet=\u00a0\u00bb1280px\u00a0\u00bb max_width_phone=\u00a0\u00bb1280px\u00a0\u00bb max_width_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bb640e0153-b982-4bd5-b76d-dc78dcfc5a61&Prime; hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<h2>Cadre national des exigences de cybers\u00e9curit\u00e9 (S3) : une nouvelle \u00e8re pour la s\u00e9curit\u00e9 dans le monde num\u00e9rique<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbeac53637-81be-470b-aa2c-f0a69663910e\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<p data-start=\"424\" data-end=\"511\" class=\"\"><strong data-start=\"424\" data-end=\"511\">Ce que toute entreprise doit savoir en 2025 &#8211; Guide complet par EMD Infotech<\/strong><\/p>\n<h3 data-start=\"513\" data-end=\"573\" class=\"\">Qu&rsquo;est-ce que la S3 et pourquoi est-elle pertinente pour toutes les entreprises modernes ?<\/h3>\n<p data-start=\"575\" data-end=\"1002\" class=\"\">En 2025, la cybers\u00e9curit\u00e9 entre dans une nouvelle \u00e8re avec la mise en \u0153uvre du <strong data-start=\"643\" data-end=\"696\">cadre national d&rsquo;exigences en mati\u00e8re de cybers\u00e9curit\u00e9 (S3)<\/strong>, qui est l&rsquo;outil cl\u00e9 pour la mise en \u0153uvre de la directive europ\u00e9enne <strong data-start=\"768\" data-end=\"776\">NIS2<\/strong> (directive 2022\/2555\/UE). Le S3 d\u00e9finit des obligations et des mesures sp\u00e9cifiques pour les organisations qui sont consid\u00e9r\u00e9es comme des \u00ab\u00a0entit\u00e9s cl\u00e9s\u00a0\u00bb et des \u00ab\u00a0entit\u00e9s importantes\u00a0\u00bb et qui op\u00e8rent dans des secteurs critiques de l&rsquo;\u00e9conomie et de la soci\u00e9t\u00e9 grecques. <\/p>\n<p data-start=\"1004\" data-end=\"1203\" class=\"\">La nouvelle l\u00e9gislation grecque (loi 5160\/2024 et d\u00e9cisions minist\u00e9rielles pertinentes de mai 2025) est directement contraignante et affecte les entreprises publiques, mais surtout PRIV\u00c9ES, qui op\u00e8rent dans les pays suivants<\/p>\n<ul data-start=\"1204\" data-end=\"1486\">\n<li data-start=\"1204\" data-end=\"1223\" class=\"\">\n<p data-start=\"1206\" data-end=\"1223\" class=\"\">T\u00e9l\u00e9communications<\/p>\n<\/li>\n<li data-start=\"1224\" data-end=\"1236\" class=\"\">\n<p data-start=\"1226\" data-end=\"1236\" class=\"\">L&rsquo;\u00e9nergie<\/p>\n<\/li>\n<li data-start=\"1237\" data-end=\"1246\" class=\"\">\n<p data-start=\"1239\" data-end=\"1246\" class=\"\">Sant\u00e9<\/p>\n<\/li>\n<li data-start=\"1247\" data-end=\"1260\" class=\"\">\n<p data-start=\"1249\" data-end=\"1260\" class=\"\">Transport<\/p>\n<\/li>\n<li data-start=\"1261\" data-end=\"1289\" class=\"\">\n<p data-start=\"1263\" data-end=\"1289\" class=\"\">Technologies de l&rsquo;information<\/p>\n<\/li>\n<li data-start=\"1290\" data-end=\"1322\" class=\"\">\n<p data-start=\"1292\" data-end=\"1322\" class=\"\">Services financiers<\/p>\n<\/li>\n<li data-start=\"1323\" data-end=\"1334\" class=\"\">\n<p data-start=\"1325\" data-end=\"1334\" class=\"\">Alimentation<\/p>\n<\/li>\n<li data-start=\"1335\" data-end=\"1356\" class=\"\">\n<p data-start=\"1337\" data-end=\"1356\" class=\"\">Gestion de l&rsquo;eau<\/p>\n<\/li>\n<li data-start=\"1357\" data-end=\"1391\" class=\"\">\n<p data-start=\"1359\" data-end=\"1391\" class=\"\">Infrastructures industrielles critiques<\/p>\n<\/li>\n<li data-start=\"1392\" data-end=\"1486\" class=\"\">\n<p data-start=\"1394\" data-end=\"1486\" class=\"\">De nombreux autres secteurs, <strong data-start=\"1416\" data-end=\"1486\">y compris l&rsquo;h\u00f4tellerie et le tourisme<\/strong><\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1488\" data-end=\"1533\" class=\"\">Qu&rsquo;est-ce qui change avec la S3 et la nouvelle l\u00e9gislation ?<\/h3>\n<p data-start=\"1535\" data-end=\"1556\" class=\"\"><strong data-start=\"1535\" data-end=\"1556\">Elle est d\u00e9sormais obligatoire :<\/strong><\/p>\n<ul data-start=\"1557\" data-end=\"2721\">\n<li data-start=\"1557\" data-end=\"1710\" class=\"\">\n<p data-start=\"1559\" data-end=\"1710\" class=\"\"><strong data-start=\"1559\" data-end=\"1591\">Gestion holistique des risques<\/strong>: Politiques, proc\u00e9dures et mesures bas\u00e9es sur des normes internationales (ISO, NIST, etc.), avec documentation de toutes les actions.<\/p>\n<\/li>\n<li data-start=\"1711\" data-end=\"1849\" class=\"\">\n<p data-start=\"1713\" data-end=\"1849\" class=\"\"><strong data-start=\"1713\" data-end=\"1738\">Responsabilit\u00e9 explicite de la direction<\/strong>: les organes de direction (conseil d&rsquo;administration, directeur g\u00e9n\u00e9ral, etc.) sont d\u00e9sormais personnellement responsables de la mise en \u0153uvre et de l&rsquo;obligation de rendre compte.<\/p>\n<\/li>\n<li data-start=\"1850\" data-end=\"1975\" class=\"\">\n<p data-start=\"1852\" data-end=\"1975\" class=\"\"><strong data-start=\"1852\" data-end=\"1896\">\u00c9valuation et gestion continues des risques<\/strong>: examen r\u00e9gulier des menaces, des mesures et des plans d&rsquo;intervention en cas d&rsquo;incident.<\/p>\n<\/li>\n<li data-start=\"1976\" data-end=\"2234\" class=\"\">\n<p data-start=\"1978\" data-end=\"2234\" class=\"\"><strong data-start=\"1978\" data-end=\"2015\">Politiques et proc\u00e9dures de s\u00e9curit\u00e9<\/strong>: Existence obligatoire et mise \u00e0 jour r\u00e9guli\u00e8re des politiques d&rsquo;acc\u00e8s, de gestion des comptes, de cryptage, de sauvegarde, de s\u00e9curit\u00e9 physique et environnementale, de partenariat avec les fournisseurs, de d\u00e9veloppement de logiciels, etc.<\/p>\n<\/li>\n<li data-start=\"2235\" data-end=\"2348\" class=\"\">\n<p data-start=\"2237\" data-end=\"2348\" class=\"\"><strong data-start=\"2237\" data-end=\"2276\">D\u00e9signation d&rsquo;un responsable de la s\u00e9curit\u00e9<\/strong>: un r\u00f4le obligatoire dans chaque entit\u00e9, sous la responsabilit\u00e9 directe de la direction.<\/p>\n<\/li>\n<li data-start=\"2349\" data-end=\"2468\" class=\"\">\n<p data-start=\"2351\" data-end=\"2468\" class=\"\"><strong data-start=\"2351\" data-end=\"2386\">Contr\u00f4les et tests ind\u00e9pendants<\/strong>: Audits annuels internes\/externes et tests de p\u00e9n\u00e9tration.<\/p>\n<\/li>\n<li data-start=\"2469\" data-end=\"2581\" class=\"\">\n<p data-start=\"2471\" data-end=\"2581\" class=\"\"><strong data-start=\"2471\" data-end=\"2504\">Formation continue du personnel<\/strong>: Programmes de sensibilisation et de formation technique pour l&rsquo;ensemble du personnel.<\/p>\n<\/li>\n<li data-start=\"2582\" data-end=\"2721\" class=\"\">\n<p data-start=\"2584\" data-end=\"2721\" class=\"\"><strong data-start=\"2584\" data-end=\"2628\">Gestion et notification des incidents<\/strong>: Enregistrement, analyse et notification obligatoire des incidents de cybers\u00e9curit\u00e9 aux autorit\u00e9s comp\u00e9tentes.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"2723\" data-end=\"2779\" class=\"\">Plus sp\u00e9cifiquement pour les h\u00f4tels et Tourisme<\/h3>\n<p data-start=\"2781\" data-end=\"3075\" class=\"\">Tr\u00e8s souvent, les entreprises h\u00f4teli\u00e8res g\u00e8rent des donn\u00e9es clients critiques, des processus de r\u00e9servation en ligne, des syst\u00e8mes de paiement et des technologies d&rsquo;accueil intelligentes (chambres intelligentes, auto-enregistrement, etc.). La conformit\u00e9 \u00e0 la norme S3 est <strong data-start=\"3011\" data-end=\"3033\">l\u00e9galement obligatoire<\/strong> et fera d\u00e9sormais l&rsquo;objet d&rsquo;audits r\u00e9guliers. <\/p>\n<h3 data-start=\"3077\" data-end=\"3119\" class=\"\">Qui court un risque s&rsquo;il ne se conforme pas \u00e0 la l\u00e9gislation ?<\/h3>\n<ul data-start=\"3121\" data-end=\"3287\">\n<li data-start=\"3121\" data-end=\"3154\" class=\"\">\n<p data-start=\"3123\" data-end=\"3154\" class=\"\">Amendes et sanctions l\u00e9gales<\/p>\n<\/li>\n<li data-start=\"3155\" data-end=\"3189\" class=\"\">\n<p data-start=\"3157\" data-end=\"3189\" class=\"\">Perte de partenariats\/contrats<\/p>\n<\/li>\n<li data-start=\"3190\" data-end=\"3208\" class=\"\">\n<p data-start=\"3192\" data-end=\"3208\" class=\"\">Atteinte \u00e0 la r\u00e9putation<\/p>\n<\/li>\n<li data-start=\"3209\" data-end=\"3287\" class=\"\">\n<p data-start=\"3211\" data-end=\"3287\" class=\"\">Risque op\u00e9rationnel r\u00e9el (temps d&rsquo;arr\u00eat, perte de donn\u00e9es)<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"3289\" data-end=\"3335\" class=\"\">Comment <strong data-start=\"3318\" data-end=\"3334\">EMD Infotech<\/strong> peut-elle vous aider ?<\/h3>\n<p data-start=\"3337\" data-end=\"3456\" class=\"\"><strong data-start=\"3339\" data-end=\"3355\">EMD Infotech<\/strong> propose un ensemble complet de services de gestion et de conformit\u00e9 en mati\u00e8re de cybers\u00e9curit\u00e9 :<\/p>\n<ul data-start=\"3458\" data-end=\"4457\">\n<li data-start=\"3458\" data-end=\"3608\" class=\"\">\n<p data-start=\"3460\" data-end=\"3608\" class=\"\"><strong data-start=\"3460\" data-end=\"3491\">Audit initial &#8211; analyse des lacunes<\/strong>: \u00e9tude de la situation actuelle et des faiblesses de votre entreprise par rapport aux exigences S3\/NIS2.<\/p>\n<\/li>\n<li data-start=\"3609\" data-end=\"3805\" class=\"\">\n<p data-start=\"3611\" data-end=\"3805\" class=\"\"><strong data-start=\"3611\" data-end=\"3663\">Pr\u00e9paration et mise \u00e0 jour des politiques de s\u00e9curit\u00e9<\/strong>: Nous \u00e9laborons des politiques et des proc\u00e9dures sur mesure (pour l&rsquo;acc\u00e8s, la gestion des actifs, les incidents, le cryptage, les sauvegardes, la cha\u00eene d&rsquo;approvisionnement, etc.)<\/p>\n<\/li>\n<li data-start=\"3806\" data-end=\"3940\" class=\"\">\n<p data-start=\"3808\" data-end=\"3940\" class=\"\"><strong data-start=\"3808\" data-end=\"3836\">Mise en \u0153uvre technique des mesures<\/strong>: nous installons et configurons des syst\u00e8mes de protection des points finaux, des pare-feux, le MFA, le cryptage des donn\u00e9es, etc.<\/p>\n<\/li>\n<li data-start=\"3941\" data-end=\"4052\" class=\"\">\n<p data-start=\"3943\" data-end=\"4052\" class=\"\"><strong data-start=\"3943\" data-end=\"3982\">Formation du personnel et des cadres<\/strong>: s\u00e9minaires et ateliers en ligne, adapt\u00e9s au r\u00f4le de chaque \u00e9quipe.<\/p>\n<\/li>\n<li data-start=\"4053\" data-end=\"4188\" class=\"\">\n<p data-start=\"4055\" data-end=\"4188\" class=\"\"><strong data-start=\"4055\" data-end=\"4117\">Mener des tests de p\u00e9n\u00e9tration et des \u00e9valuations de la vuln\u00e9rabilit\u00e9<\/strong>: audits annuels ou ad hoc, avec un rapport complet et des suggestions d&rsquo;am\u00e9lioration.<\/p>\n<\/li>\n<li data-start=\"4189\" data-end=\"4300\" class=\"\">\n<p data-start=\"4191\" data-end=\"4300\" class=\"\"><strong data-start=\"4191\" data-end=\"4226\">DPO\/CISO-as-a-Service<\/strong>: conseil permanent ou \u00e0 la demande pour maintenir la conformit\u00e9.<\/p>\n<\/li>\n<li data-start=\"4301\" data-end=\"4457\" class=\"\">\n<p data-start=\"4303\" data-end=\"4457\" class=\"\"><strong data-start=\"4303\" data-end=\"4356\">Soutien \u00e0 la gestion et \u00e0 la notification des incidents<\/strong>: r\u00e9ponse imm\u00e9diate aux incidents et conseils sur la notification obligatoire des incidents.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"4459\" data-end=\"4501\" class=\"\">Les prochaines \u00e9tapes pour chaque entreprise :<\/h3>\n<ol data-start=\"4503\" data-end=\"4907\">\n<li data-start=\"4503\" data-end=\"4606\" class=\"\">\n<p data-start=\"4506\" data-end=\"4606\" class=\"\"><strong data-start=\"4506\" data-end=\"4549\">Contactez directement EMD Infotech<\/strong> pour une premi\u00e8re mise \u00e0 jour et une \u00e9valuation gratuite de la conformit\u00e9.<\/p>\n<\/li>\n<li data-start=\"4607\" data-end=\"4686\" class=\"\">\n<p data-start=\"4610\" data-end=\"4686\" class=\"\"><strong data-start=\"4610\" data-end=\"4685\">Commencez par dresser un inventaire complet de vos actifs, syst\u00e8mes et processus.<\/strong><\/p>\n<\/li>\n<li data-start=\"4687\" data-end=\"4744\" class=\"\">\n<p data-start=\"4690\" data-end=\"4744\" class=\"\"><strong data-start=\"4690\" data-end=\"4743\">Formez et sensibilisez votre personnel<\/strong>.<\/p>\n<\/li>\n<li data-start=\"4745\" data-end=\"4809\" class=\"\">\n<p data-start=\"4748\" data-end=\"4809\" class=\"\"><strong data-start=\"4748\" data-end=\"4808\">Adopter les normes et pratiques internationales en mati\u00e8re de cybers\u00e9curit\u00e9<\/strong>.<\/p>\n<\/li>\n<li data-start=\"4810\" data-end=\"4907\" class=\"\">\n<p data-start=\"4813\" data-end=\"4907\" class=\"\"><strong data-start=\"4813\" data-end=\"4907\">Maintenez un dialogue actif avec les experts, car le paysage des menaces est en constante \u00e9volution.<\/strong><\/p>\n<\/li>\n<\/ol>\n<hr data-start=\"4909\" data-end=\"4912\" class=\"\">\n<p data-start=\"4914\" data-end=\"5048\" class=\"\"><strong data-start=\"4914\" data-end=\"5048\">EMD Infotech est l\u00e0 pour veiller \u00e0 ce que votre entreprise soit prot\u00e9g\u00e9e, conforme et pr\u00eate pour l&rsquo;avenir num\u00e9rique.<\/strong><\/p>\n<p data-start=\"5050\" data-end=\"5121\" class=\"\"><em data-start=\"5050\" data-end=\"5121\">Pour toute question ou demande d&rsquo;assistance, veuillez contacter notre \u00e9quipe.<\/p>\n<p><a href=\"https:\/\/emdinfotech.com\/contact\/\" title=\"Contactez nous\">Pour nous contacter, cliquez ici<\/a> <br \/><\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb3_4,1_4&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb700px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_4&Prime; _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/emdinfotech.com\/wp-content\/uploads\/2025\/05\/cybersecurity-1.jpg\u00a0\u00bb title_text=\u00a0\u00bbcybersecurity\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; border_radii=\u00a0\u00bbon|30px|30px|30px|30px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb4.19.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/emdinfotech.com\/wp-content\/uploads\/2025\/05\/cybersecurity-2.jpg\u00a0\u00bb title_text=\u00a0\u00bbcybersecurity-2&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb position_origin_a_tablet=\u00a0\u00bbbottom_left\u00a0\u00bb position_origin_a_phone=\u00a0\u00bbbottom_left\u00a0\u00bb position_origin_a_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb position_origin_f_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb position_origin_r_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb custom_margin=\u00a0\u00bb|-20vw|||false|false\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb|0vw|||false|false\u00a0\u00bb custom_margin_phone=\u00a0\u00bb|0vw|||false|false\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; positioning_tablet=\u00a0\u00bbnone\u00a0\u00bb positioning_phone=\u00a0\u00bbnone\u00a0\u00bb positioning_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb border_radii=\u00a0\u00bbon|30px|30px|30px|30px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRoboto|300|||||||\u00a0\u00bb header_font=\u00a0\u00bbRoboto|300|||||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1>Plus d&rsquo;informations<\/h1>\n<p>[\/et_pb_text][et_pb_blog fullwidth=\u00a0\u00bboff\u00a0\u00bb include_categories=\u00a0\u00bball,43,42,40,41,1,39,current\u00a0\u00bb show_more=\u00a0\u00bbon\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NIS2 Cadre national de cybers\u00e9curit\u00e9 Cadre national des exigences de cybers\u00e9curit\u00e9 (S3) : une nouvelle \u00e8re pour la s\u00e9curit\u00e9 dans le monde num\u00e9rique Ce que toute entreprise doit savoir en 2025 &#8211; Guide complet par EMD Infotech Qu&rsquo;est-ce que la S3 et pourquoi est-elle pertinente pour toutes les entreprises modernes ? En 2025, la cybers\u00e9curit\u00e9 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[52,51],"tags":[],"class_list":["post-206604","post","type-post","status-publish","format-standard","hentry","category-cybersecurite","category-e-e-instructions-fr"],"_links":{"self":[{"href":"https:\/\/emdinfotech.com\/fr\/wp-json\/wp\/v2\/posts\/206604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/emdinfotech.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/emdinfotech.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/emdinfotech.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/emdinfotech.com\/fr\/wp-json\/wp\/v2\/comments?post=206604"}],"version-history":[{"count":0,"href":"https:\/\/emdinfotech.com\/fr\/wp-json\/wp\/v2\/posts\/206604\/revisions"}],"wp:attachment":[{"href":"https:\/\/emdinfotech.com\/fr\/wp-json\/wp\/v2\/media?parent=206604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/emdinfotech.com\/fr\/wp-json\/wp\/v2\/categories?post=206604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/emdinfotech.com\/fr\/wp-json\/wp\/v2\/tags?post=206604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}