{"id":7692,"date":"2019-02-27T10:31:11","date_gmt":"2019-02-27T09:31:11","guid":{"rendered":"https:\/\/news.save.ch\/?p=7692"},"modified":"2023-03-14T08:56:49","modified_gmt":"2023-03-14T07:56:49","slug":"leitfaden-zur-technischen-umsetzung-von-iot-security","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/leitfaden-zur-technischen-umsetzung-von-iot-security\/","title":{"rendered":"Guide pour la mise en \u0153uvre technique de la s\u00e9curit\u00e9 de l'IdO"},"content":{"rendered":"<figure id=\"attachment_7693\" aria-describedby=\"caption-attachment-7693\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7693 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg\" alt=\"S\u00e9curit\u00e9 de l&#039;IdO\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos-375x250.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-7693\" class=\"wp-caption-text\">\u00a9 depositphotos, Jirsak<\/figcaption><\/figure>\n<p>Le nouveau guide \"<a href=\"https:\/\/www.iiconsortium.org\/pdf\/IoT_SMM_Practitioner_Guide_2019-02-25.pdf\">Guide du praticien du mod\u00e8le de maturit\u00e9 de la s\u00e9curit\u00e9 (SMM)<\/a>\"Les experts de Kaspersky Lab, en collaboration avec d'autres membres de l'Industrial Internet Consortium (IIC), ont mis au point un syst\u00e8me de s\u00e9curit\u00e9 qui s'appuie sur les concepts d\u00e9finis en 2016 en tant qu'outil de s\u00e9curit\u00e9. <a href=\"https:\/\/www.iiconsortium.org\/pdf\/IIC_PUB_G4_V1.00_PB-3.pdf\">Cadre de s\u00e9curit\u00e9 Internet industriel IIC<\/a>\u00a0ont \u00e9t\u00e9 d\u00e9finis. Le mod\u00e8le est le premier de son genre \u00e0 aborder l'approche nouvellement \u00e9tablie de la maturit\u00e9 de la s\u00e9curit\u00e9 pour l'Internet des objets, souligne Kaspersky. Il identifie un cadre de s\u00e9curit\u00e9 pour les parties prenantes de l'IdO en fonction de leur niveau de s\u00e9curit\u00e9 et \u00e9value le niveau de maturit\u00e9 de la s\u00e9curit\u00e9 des syst\u00e8mes IdO d'une entreprise en fonction de la gouvernance, de la technologie et de la gestion du syst\u00e8me. Le guide SMM couvre tous ces aspects et met en \u00e9vidence les \u00e9l\u00e9ments pertinents des mod\u00e8les existants afin de reconna\u00eetre les travaux existants sur le sujet et d'\u00e9viter les doublons, selon l'entreprise de cybers\u00e9curit\u00e9.<\/p>\n<p>Les lignes directrices ont \u00e9t\u00e9 \u00e9labor\u00e9es en tenant compte des diff\u00e9rents groupes d'int\u00e9r\u00eat de l'IdO. La raison en est que la s\u00e9curit\u00e9 de l'infrastructure qui relie les syst\u00e8mes d'information aux objets physiques est essentielle \u00e0 l'\u00e8re de la num\u00e9risation pour les exploitants d'installations industrielles, les d\u00e9veloppeurs de logiciels sp\u00e9cialis\u00e9s, les propri\u00e9taires d'entreprises concern\u00e9es et les autorit\u00e9s de surveillance. L'IoT-SMM prend en compte les \u00e9l\u00e9ments suivants<\/p>\n<p>Par cons\u00e9quent, contrairement aux normes et aux exigences r\u00e9glementaires habituelles, l'IdO prend en compte les int\u00e9r\u00eats et les exigences de s\u00e9curit\u00e9 de toutes les organisations et de tous les individus impliqu\u00e9s dans les op\u00e9rations IdO et qui les g\u00e8rent.<\/p>\n<p><strong>Le guide contient trois \u00e9tudes de cas<\/strong><\/p>\n<p>En outre, le guide contient trois \u00e9tudes de cas qui aident \u00e0 appliquer le Security Maturity Model. Il s'agit notamment de<\/p>\n<ul>\n<li>un syst\u00e8me de remplissage intelligent, pilot\u00e9 par les donn\u00e9es<\/li>\n<li>une passerelle automobile qui supporte les mises \u00e0 jour OTA<\/li>\n<li>Cam\u00e9ras de s\u00e9curit\u00e9 utilis\u00e9es dans les zones r\u00e9sidentielles<\/li>\n<\/ul>\n<p>La hi\u00e9rarchisation des mesures de s\u00e9curit\u00e9, la d\u00e9finition des objectifs et le d\u00e9veloppement d'une strat\u00e9gie pour rendre un syst\u00e8me \"suffisamment s\u00fbr\" ont un impact sur la planification \u00e9conomique \u00e0 long terme des organisations\", explique Ekaterina Rudina de Kaspersky. Une approche moderne et appropri\u00e9e consiste \u00e0 utiliser un \"coup de pouce\", c'est-\u00e0-dire \u00e0 cr\u00e9er une architecture choisie qui soutient une prise de d\u00e9cision efficace dans le domaine de l'IdO. L'IoT-SMM constitue un cadre pour une telle architecture de choix. Elle permet aux acteurs de l'IdO de faire le premier pas - puis le deuxi\u00e8me, le troisi\u00e8me et ainsi de suite - vers un syst\u00e8me s\u00e9curis\u00e9, qu'il s'agisse d'une grande installation de production industrielle ou du fabricant d'un bracelet de fitness\".<\/p>\n<p><em>Le \"SMM Practitioner's Guide\" est un document d'accompagnement du ,<a href=\"https:\/\/www.iiconsortium.org\/pdf\/SMM_Description_and_Intended_Use_FINAL_Updated_V1.1.pdf\">IoT SMM : Description et utilisation pr\u00e9vue Livre blanc<\/a>qui a d\u00e9j\u00e0 \u00e9t\u00e9 publi\u00e9 en 2018.\u00a0<\/em><\/p>\n<p><em>Source : Kaspersky Lab<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Der neue Leitfaden \u201eSecurity Maturity Model (SMM) Practioner\u2019s Guide\u201c, den Experten von Kaspersky Lab gemeinsam mit weiteren Mitgliedern des Industrial Internet Consortium (IIC) entwickelt haben, baut auf Konzepten auf, die im Jahr 2016 als IIC Industrial Internet Security Framework\u00a0definiert wurden. Das Modell besch\u00e4ftige sich als erstes seiner Art mit dem neu etablierten Security-Maturity-Ansatz (Security-Reifegrad) f\u00fcr [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":7693,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[461,63,100],"class_list":["post-7692","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-iot","tag-it-security","tag-leitfaden"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"","_yoast_wpseo_focuskw_text_input":"IoT-Security","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Leitfaden zur technischen Umsetzung von IoT-Security - Save<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/leitfaden-zur-technischen-umsetzung-von-iot-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leitfaden zur technischen Umsetzung von IoT-Security - Save\" \/>\n<meta property=\"og:description\" content=\"Der neue Leitfaden \u201eSecurity Maturity Model (SMM) Practioner\u2019s Guide\u201c, den Experten von Kaspersky Lab gemeinsam mit weiteren Mitgliedern des Industrial Internet Consortium (IIC) entwickelt haben, baut auf Konzepten auf, die im Jahr 2016 als IIC Industrial Internet Security Framework\u00a0definiert wurden. Das Modell besch\u00e4ftige sich als erstes seiner Art mit dem neu etablierten Security-Maturity-Ansatz (Security-Reifegrad) f\u00fcr [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/leitfaden-zur-technischen-umsetzung-von-iot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-27T09:31:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Leitfaden zur technischen Umsetzung von IoT-Security\",\"datePublished\":\"2019-02-27T09:31:11+00:00\",\"dateModified\":\"2023-03-14T07:56:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/\"},\"wordCount\":387,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/IoT_Depositphotos.jpg\",\"keywords\":[\"IoT\",\"IT-SECURITY\",\"Leitfaden\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/\",\"name\":\"Leitfaden zur technischen Umsetzung von IoT-Security - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/IoT_Depositphotos.jpg\",\"datePublished\":\"2019-02-27T09:31:11+00:00\",\"dateModified\":\"2023-03-14T07:56:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/IoT_Depositphotos.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/IoT_Depositphotos.jpg\",\"width\":1000,\"height\":667,\"caption\":\"\u00a9 depositphotos, Jirsak\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leitfaden zur technischen Umsetzung von IoT-Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guide de mise en \u0153uvre technique de la s\u00e9curit\u00e9 de l'IdO - Save","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/leitfaden-zur-technischen-umsetzung-von-iot-security\/","og_locale":"fr_FR","og_type":"article","og_title":"Leitfaden zur technischen Umsetzung von IoT-Security - Save","og_description":"Der neue Leitfaden \u201eSecurity Maturity Model (SMM) Practioner\u2019s Guide\u201c, den Experten von Kaspersky Lab gemeinsam mit weiteren Mitgliedern des Industrial Internet Consortium (IIC) entwickelt haben, baut auf Konzepten auf, die im Jahr 2016 als IIC Industrial Internet Security Framework\u00a0definiert wurden. Das Modell besch\u00e4ftige sich als erstes seiner Art mit dem neu etablierten Security-Maturity-Ansatz (Security-Reifegrad) f\u00fcr [&hellip;]","og_url":"https:\/\/news.save.ch\/fr\/leitfaden-zur-technischen-umsetzung-von-iot-security\/","og_site_name":"Save","article_published_time":"2019-02-27T09:31:11+00:00","article_modified_time":"2023-03-14T07:56:49+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Leitfaden zur technischen Umsetzung von IoT-Security","datePublished":"2019-02-27T09:31:11+00:00","dateModified":"2023-03-14T07:56:49+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/"},"wordCount":387,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg","keywords":["IoT","IT-SECURITY","Leitfaden"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/","url":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/","name":"Guide de mise en \u0153uvre technique de la s\u00e9curit\u00e9 de l'IdO - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg","datePublished":"2019-02-27T09:31:11+00:00","dateModified":"2023-03-14T07:56:49+00:00","breadcrumb":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg","width":1000,"height":667,"caption":"\u00a9 depositphotos, Jirsak"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Leitfaden zur technischen Umsetzung von IoT-Security"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=7692"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7692\/revisions"}],"predecessor-version":[{"id":17408,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/7692\/revisions\/17408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/7693"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=7692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=7692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=7692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}