{"id":2882,"date":"2024-03-20T06:09:03","date_gmt":"2024-03-20T05:09:03","guid":{"rendered":"http:\/\/iypxhnp.cluster029.hosting.ovh.net\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/"},"modified":"2024-03-20T06:09:03","modified_gmt":"2024-03-20T05:09:03","slug":"renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2","status":"publish","type":"post","link":"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/","title":{"rendered":"Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0"},"content":{"rendered":"<p>En 2023, l\u2019Europe a \u00e9t\u00e9 le continent le plus cibl\u00e9 par des cyberattaques. Depuis 2013, l\u2019Union Europ\u00e9enne met en place un v\u00e9ritable bouclier cybern\u00e9tique. L\u2019un de ses outils le renforce cette ann\u00e9e avec le passage de la directive Network and Information Security 1 (NIS 1) \u00e0 NIS 2.\u00a0 Cette nouvelle directive doit \u00eatre impl\u00e9ment\u00e9e par les \u00c9tats membres de l\u2019Union Europ\u00e9enne d\u2019ici le 17 octobre 2024, mais seules 7% des entreprises fran\u00e7aises seraient pr\u00eates \u00e0 son incorporation.\u00a0<br \/>\nL\u2019article Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0 est apparu en premier sur Portail de l&rsquo;IE.\u00a0<a href=\"https:\/\/www.portail-ie.fr\/univers\/risques-et-gouvernance-cyber\/2024\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a>\u00a0Portail de l&rsquo;IE\u00a0<\/p>\n<p>\u200b\u00a0\u00a0<\/p>\n<p>\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>En 2023, l\u2019Europe a \u00e9t\u00e9 le continent le plus cibl\u00e9 par des cyberattaques. Depuis 2013, l\u2019Union Europ\u00e9enne met en place un v\u00e9ritable bouclier cybern\u00e9tique. L\u2019un de ses outils le renforce cette ann\u00e9e avec le passage de la directive Network and Information Security 1 (NIS 1) \u00e0 NIS 2.\u00a0 Cette nouvelle directive doit \u00eatre impl\u00e9ment\u00e9e par&#8230;<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2882","post","type-post","status-publish","format-standard","hentry","category-portail-de-lintelligence-economique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0 - Revue Internationale d&#039;Intelligence Economique<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0 - Revue Internationale d&#039;Intelligence Economique\" \/>\n<meta property=\"og:description\" content=\"En 2023, l\u2019Europe a \u00e9t\u00e9 le continent le plus cibl\u00e9 par des cyberattaques. Depuis 2013, l\u2019Union Europ\u00e9enne met en place un v\u00e9ritable bouclier cybern\u00e9tique. L\u2019un de ses outils le renforce cette ann\u00e9e avec le passage de la directive Network and Information Security 1 (NIS 1) \u00e0 NIS 2.\u00a0 Cette nouvelle directive doit \u00eatre impl\u00e9ment\u00e9e par...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Revue Internationale d&#039;Intelligence Economique\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-20T05:09:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0\",\"datePublished\":\"2024-03-20T05:09:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/\"},\"wordCount\":116,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.r2ie.org\/#organization\"},\"articleSection\":[\"Portail de l'intelligence \u00e9conomique\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/\",\"url\":\"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/\",\"name\":\"Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0 - Revue Internationale d&#039;Intelligence Economique\",\"isPartOf\":{\"@id\":\"https:\/\/www.r2ie.org\/#website\"},\"datePublished\":\"2024-03-20T05:09:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.r2ie.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.r2ie.org\/#website\",\"url\":\"https:\/\/www.r2ie.org\/\",\"name\":\"Revue Internationale d&#039;Intelligence Economique\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.r2ie.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.r2ie.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.r2ie.org\/#organization\",\"name\":\"Revue Internationale d&#039;Intelligence Economique\",\"url\":\"https:\/\/www.r2ie.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp\",\"contentUrl\":\"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp\",\"width\":654,\"height\":251,\"caption\":\"Revue Internationale d&#039;Intelligence Economique\"},\"image\":{\"@id\":\"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0 - Revue Internationale d&#039;Intelligence Economique","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/","og_locale":"fr_FR","og_type":"article","og_title":"Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0 - Revue Internationale d&#039;Intelligence Economique","og_description":"En 2023, l\u2019Europe a \u00e9t\u00e9 le continent le plus cibl\u00e9 par des cyberattaques. Depuis 2013, l\u2019Union Europ\u00e9enne met en place un v\u00e9ritable bouclier cybern\u00e9tique. L\u2019un de ses outils le renforce cette ann\u00e9e avec le passage de la directive Network and Information Security 1 (NIS 1) \u00e0 NIS 2.\u00a0 Cette nouvelle directive doit \u00eatre impl\u00e9ment\u00e9e par...","og_url":"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/","og_site_name":"Revue Internationale d&#039;Intelligence Economique","article_published_time":"2024-03-20T05:09:03+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/#article","isPartOf":{"@id":"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/"},"author":{"name":"","@id":""},"headline":"Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0","datePublished":"2024-03-20T05:09:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/"},"wordCount":116,"commentCount":0,"publisher":{"@id":"https:\/\/www.r2ie.org\/#organization"},"articleSection":["Portail de l'intelligence \u00e9conomique"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/","url":"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/","name":"Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0 - Revue Internationale d&#039;Intelligence Economique","isPartOf":{"@id":"https:\/\/www.r2ie.org\/#website"},"datePublished":"2024-03-20T05:09:03+00:00","breadcrumb":{"@id":"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.r2ie.org\/index.php\/2024\/03\/20\/renforcement-laborieux-du-bouclier-cybernetique-europeen-avec-nis-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.r2ie.org\/"},{"@type":"ListItem","position":2,"name":"Renforcement laborieux du bouclier cybern\u00e9tique europ\u00e9en avec NIS 2\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.r2ie.org\/#website","url":"https:\/\/www.r2ie.org\/","name":"Revue Internationale d&#039;Intelligence Economique","description":"","publisher":{"@id":"https:\/\/www.r2ie.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.r2ie.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.r2ie.org\/#organization","name":"Revue Internationale d&#039;Intelligence Economique","url":"https:\/\/www.r2ie.org\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp","contentUrl":"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp","width":654,"height":251,"caption":"Revue Internationale d&#039;Intelligence Economique"},"image":{"@id":"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts\/2882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/comments?post=2882"}],"version-history":[{"count":0,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts\/2882\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/media?parent=2882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/categories?post=2882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/tags?post=2882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}