{"id":6257,"date":"2018-04-17T14:34:06","date_gmt":"2018-04-17T12:34:06","guid":{"rendered":"https:\/\/news.save.ch\/?p=6257"},"modified":"2023-03-14T08:56:56","modified_gmt":"2023-03-14T07:56:56","slug":"die-fuehrungsebene-ein-it-sicherheitsrisiko","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/","title":{"rendered":"La direction - un risque pour la s\u00e9curit\u00e9 informatique ?"},"content":{"rendered":"<figure id=\"attachment_6258\" aria-describedby=\"caption-attachment-6258\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6258 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg\" alt=\"&quot;Management Hack&quot;\" width=\"680\" height=\"368\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg 999w, https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos-375x203.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-6258\" class=\"wp-caption-text\">\u00a9 depositphotos, stnazkul<\/figcaption><\/figure>\n<p>Les syst\u00e8mes techniques de s\u00e9curit\u00e9 informatique ne sont jamais aussi forts que leur maillon le plus faible - il ne s'agit pas seulement de nouvelles technologies et de solutions logicielles, mais aussi du \"facteur de risque humain\". La minimisation de ce point faible potentiel par la formation \u00e0 la sensibilisation \u00e0 la s\u00e9curit\u00e9 et la mise en place de solutions techniques de soutien doit toujours \u00eatre un \u00e9l\u00e9ment important d'une strat\u00e9gie de s\u00e9curit\u00e9 pr\u00e9ventive.<\/p>\n<p><strong>V\u00e9rifier l'ensemble du C-Level<\/strong><\/p>\n<p>NTT Security d\u00e9termine dans son nouveau rapport \" Le point faible humain \" ce qu'il en est concr\u00e8tement pour la s\u00e9curit\u00e9 informatique d'une entreprise.<a href=\"https:\/\/www.nttsecurity.com\/de-ch\/management-hack-service\">Hack de gestion<\/a>\". Les dirigeants d'une entreprise, c'est-\u00e0-dire l'ensemble du niveau C comme le CEO, le CFO ou le CIO, sont au centre de l'attention. Le niveau de la direction est une cible attrayante pour tout pirate informatique, car ce groupe de personnes b\u00e9n\u00e9ficie g\u00e9n\u00e9ralement d'un acc\u00e8s illimit\u00e9 aux donn\u00e9es confidentielles de l'entreprise, \u00e9crit le fournisseur de s\u00e9curit\u00e9. Il n'est pas rare non plus que les managers b\u00e9n\u00e9ficient de privil\u00e8ges particuliers : les politiques et normes de s\u00e9curit\u00e9 sont ainsi suspendues ou assouplies afin de simplifier par exemple la connexion - avec des cons\u00e9quences fatales.<\/p>\n<p>Apr\u00e8s une concertation appropri\u00e9e avec le client, des attaques d'ing\u00e9nierie sociale simul\u00e9es et personnalis\u00e9es sont men\u00e9es, dont les personnes vis\u00e9es ne sont id\u00e9alement pas au courant. Selon NTT, le niveau de responsabilit\u00e9 du management en mati\u00e8re de sensibilisation \u00e0 la s\u00e9curit\u00e9 et de s\u00e9curit\u00e9 informatique est analys\u00e9. Les points faibles concrets sont ensuite mis en \u00e9vidence et des mesures sont recommand\u00e9es.<\/p>\n<p><strong>Premi\u00e8res exp\u00e9riences avec \"Management Hack<\/strong><\/p>\n<p>L'entreprise sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9 informatique a men\u00e9 plusieurs projets de \"management hack\" en Scandinavie. \"Les r\u00e9sultats nous ont m\u00eame surpris. Dans de nombreux cas, nous avons pu acc\u00e9der en dix minutes seulement \u00e0 des donn\u00e9es critiques pour l'entreprise, comme des plans d'affaires, des plans de fusion et d'acquisition, des syst\u00e8mes de gestion des marchandises, des contr\u00f4leurs de domaine, des noms d'utilisateur ou des mots de passe. Les donn\u00e9es d'acc\u00e8s administratives ont \u00e9galement souvent \u00e9t\u00e9 trouv\u00e9es\", explique Kai Grunwitz de NTT Security. \"Les dangers qui en d\u00e9coulent pour une entreprise sont \u00e9vidents. Ainsi, un attaquant disposant de droits d'administrateur peut se d\u00e9placer librement dans le r\u00e9seau et souvent acc\u00e9der \u00e0 des informations critiques pendant une longue p\u00e9riode sans \u00eatre remarqu\u00e9\".<\/p>\n<p>Le nouveau service a pour objectif d'accro\u00eetre la sensibilisation \u00e0 la s\u00e9curit\u00e9 au niveau du conseil d'administration et de la direction, mais aussi d'\u00e9tablir une nouvelle strat\u00e9gie et une nouvelle culture de la s\u00e9curit\u00e9 dans toute l'entreprise. \"Nos premiers projets ont montr\u00e9 qu'il est tout \u00e0 fait n\u00e9cessaire d'agir du c\u00f4t\u00e9 de l'entreprise\", explique Grunwitz. \"Le degr\u00e9 de maturit\u00e9 en mati\u00e8re de cybers\u00e9curit\u00e9 est, pour le dire prudemment, encore plut\u00f4t faible au niveau de la direction\".<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Technische IT-Sicherheitssysteme sind immer nur so stark wie ihr schw\u00e4chstes Glied \u2013 dabei geht es nicht nur um neue Technologien und Softwarel\u00f6sungen, sondern auch um den \u201eRisikofaktor Mensch\u201c. Die Minimierung dieser potenziellen Schwachstelle durch die Schulung der Security Awareness und Etablierung unterst\u00fctzender technischer L\u00f6sungen muss immer ein wichtiger Baustein einer pr\u00e4ventiven Sicherheitsstrategie sein. Gesamtes C-Level [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":6258,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[],"class_list":["post-6257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"\"Management Hack\"","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko? - Save<\/title>\n<meta name=\"description\" content=\"Mit dem Einsatz spezieller Social-Engineering-Techniken l\u00e4sst sich \u00fcberpr\u00fcfen, inwiefern F\u00fchrungskr\u00e4fte ein Sicherheitsrisiko darstellen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko? - Save\" \/>\n<meta property=\"og:description\" content=\"Mit dem Einsatz spezieller Social-Engineering-Techniken l\u00e4sst sich \u00fcberpr\u00fcfen, inwiefern F\u00fchrungskr\u00e4fte ein Sicherheitsrisiko darstellen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-17T12:34:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"999\" \/>\n\t<meta property=\"og:image:height\" content=\"541\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko?\",\"datePublished\":\"2018-04-17T12:34:06+00:00\",\"dateModified\":\"2023-03-14T07:56:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/\"},\"wordCount\":377,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/Risk-Depositphotos.jpg\",\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/\",\"name\":\"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko? - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/Risk-Depositphotos.jpg\",\"datePublished\":\"2018-04-17T12:34:06+00:00\",\"dateModified\":\"2023-03-14T07:56:56+00:00\",\"description\":\"Mit dem Einsatz spezieller Social-Engineering-Techniken l\u00e4sst sich \u00fcberpr\u00fcfen, inwiefern F\u00fchrungskr\u00e4fte ein Sicherheitsrisiko darstellen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/Risk-Depositphotos.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/Risk-Depositphotos.jpg\",\"width\":999,\"height\":541,\"caption\":\"\u00a9 depositphotos, stnazkul\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La direction - un risque pour la s\u00e9curit\u00e9 informatique ? - Sauver","description":"L'utilisation de techniques sp\u00e9ciales d'ing\u00e9nierie sociale permet de v\u00e9rifier dans quelle mesure les cadres repr\u00e9sentent un risque pour la s\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/","og_locale":"fr_FR","og_type":"article","og_title":"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko? - Save","og_description":"Mit dem Einsatz spezieller Social-Engineering-Techniken l\u00e4sst sich \u00fcberpr\u00fcfen, inwiefern F\u00fchrungskr\u00e4fte ein Sicherheitsrisiko darstellen.","og_url":"https:\/\/news.save.ch\/fr\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/","og_site_name":"Save","article_published_time":"2018-04-17T12:34:06+00:00","article_modified_time":"2023-03-14T07:56:56+00:00","og_image":[{"width":999,"height":541,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko?","datePublished":"2018-04-17T12:34:06+00:00","dateModified":"2023-03-14T07:56:56+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/"},"wordCount":377,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg","articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/","url":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/","name":"La direction - un risque pour la s\u00e9curit\u00e9 informatique ? - Sauver","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg","datePublished":"2018-04-17T12:34:06+00:00","dateModified":"2023-03-14T07:56:56+00:00","description":"L'utilisation de techniques sp\u00e9ciales d'ing\u00e9nierie sociale permet de v\u00e9rifier dans quelle mesure les cadres repr\u00e9sentent un risque pour la s\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg","width":999,"height":541,"caption":"\u00a9 depositphotos, stnazkul"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko?"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/6257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=6257"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/6257\/revisions"}],"predecessor-version":[{"id":17457,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/6257\/revisions\/17457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/6258"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=6257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=6257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=6257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}