{"id":5496,"date":"2022-06-20T15:50:25","date_gmt":"2022-06-20T13:50:25","guid":{"rendered":"https:\/\/www.protect.airbus.com\/cybersecurite\/cyber-governance-risk-and-compliance\/"},"modified":"2026-02-13T17:27:43","modified_gmt":"2026-02-13T16:27:43","slug":"gouvernance-risque-conformite","status":"publish","type":"page","link":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/","title":{"rendered":"Gouvernance, risque et conformit\u00e9"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text css=\u00a0\u00bb.vc_custom_1682672274135{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb h2_style=\u00a0\u00bbh2Big\u00a0\u00bb]<\/p>\n<h2><strong>Conna\u00eetre les risques et vous tenir pr\u00eat \u00e0 agir<\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpBig\u00a0\u00bb]<span style=\"font-weight: 400;\">Alors que les entreprises r\u00e9coltent les fruits de la digitalisation et de l\u2019hyperconnectivit\u00e9, elles doivent aussi faire face \u00e0 un paysage de cybermenaces de plus en plus complexe et \u00e9voluant rapidement. Cela n\u00e9cessite une \u00e9quipe de cybers\u00e9curit\u00e9 d\u00e9di\u00e9e ainsi que la mise en place d&rsquo;une strat\u00e9gie globale de cybers\u00e9curit\u00e9, avec une gouvernance sp\u00e9cifique.<\/span>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1682672297254{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb h2_style=\u00a0\u00bbh2Big\u00a0\u00bb]<\/p>\n<h3><b>Ouvrir la voie<\/b><\/h3>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]Combinant des d\u00e9cennies d&rsquo;exp\u00e9rience et un \u00e9tat d\u2019esprit novateur, Airbus\u00a0Protect propose toute une gamme de services pour vous aider \u00e0 comprendre le paysage actuel des menaces, \u00e0 anticiper les risques avant qu\u2019ils ne se concr\u00e9tisent et \u00e0 rester en phase avec les r\u00e9glementations actuelles.<\/p>\n<p>Nous souhaitons en premier lieu accro\u00eetre la cyberr\u00e9silience de votre organisation et assurer votre conformit\u00e9 m\u00eame face aux menaces les plus complexes. Nous vous accompagnons dans la mise en place de votre strat\u00e9gie de gouvernance en mati\u00e8re de cybers\u00e9curit\u00e9, et vous aidons \u00e0 poursuivre vos activit\u00e9s en cas de crise.[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1682672355334{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb h2_style=\u00a0\u00bbh2Big\u00a0\u00bb]<\/p>\n<h3><b>Pourquoi choisir Airbus\u00a0Protect\u00a0?<\/b><\/h3>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]<span style=\"font-weight: 400;\">Nous pouvons vous aider \u00e0 instaurer la gouvernance et la gestion de la cybers\u00e9curit\u00e9 dans l&rsquo;ensemble de votre organisation en prenant en charge les \u00e9l\u00e9ments suivants\u00a0:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Avant que votre organisation ne mette en place une strat\u00e9gie de gouvernance de la cybers\u00e9curit\u00e9 ou une conception de produit sp\u00e9cifique, nos \u00e9quipes d&rsquo;experts \u00e9valueront int\u00e9gralement vos syst\u00e8mes industriels, votre infrastructure critique ou la conception de votre produit<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Notre grande exp\u00e9rience nous permet d&rsquo;aider nos clients \u00e0 respecter la r\u00e9glementation internationale et sectorielle en mati\u00e8re de cybers\u00e9curit\u00e9, qu&rsquo;il s&rsquo;agisse du RGPD, de la norme ISO\u00a027001, de la directive\u00a0NIS2 ou de toute autre loi<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Nos consultants principaux peuvent vous fournir des \u00e9valuations d&rsquo;impact relatives \u00e0 la protection des donn\u00e9es \u00e0 caract\u00e8re personnel ou organiser des audits sur la conformit\u00e9 en mati\u00e8re de s\u00e9curit\u00e9. Cela inclut la d\u00e9tection des actifs, l&rsquo;\u00e9valuation des risques, l&rsquo;analyse des \u00e9carts ainsi que la mise en \u0153uvre de mesures de rem\u00e9diation<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text css=\u00a0\u00bb.vc_custom_1682672421077{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb h2_style=\u00a0\u00bbh2Big\u00a0\u00bb]<\/p>\n<h3><b>Notre offre<\/b><\/h3>\n<p>[\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpHighlight\u00a0\u00bb]<span style=\"font-weight: 400;\">Une gouvernance efficace de la cybers\u00e9curit\u00e9 implique de comprendre vos besoins et vuln\u00e9rabilit\u00e9s uniques en profondeur. Pour ce faire, nos experts commenceront par \u00e9tablir une liste de recommandations strat\u00e9giques hi\u00e9rarchis\u00e9es d\u2019apr\u00e8s les \u00e9l\u00e9ments suivants\u00a0:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">\u00c9valuations de l&rsquo;audit de s\u00e9curit\u00e9 sur la cha\u00eene logistique<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Audits de la gouvernance de la s\u00e9curit\u00e9 informatique<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Contr\u00f4les de la maturit\u00e9 de la s\u00e9curit\u00e9 OT<\/span><\/li>\n<li><span style=\"font-weight: 400;\">\u00c9valuations des risques li\u00e9s \u00e0 la s\u00e9curit\u00e9 OT<\/span><\/li>\n<li><span style=\"font-weight: 400;\">\u00c9valuations des risques li\u00e9s \u00e0 la s\u00e9curit\u00e9 du produit<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Nous vous aiderons ensuite \u00e0 d\u00e9velopper une strat\u00e9gie de cybergouvernance personnalis\u00e9e. Nos \u00e9quipes chevronn\u00e9es conseillent des organisations sur la conception des politiques et des infrastructures, et assurent la coordination des conseils et de la garantie en mati\u00e8re de politique de s\u00e9curit\u00e9. Ces conseils portent sur ce qui suit\u00a0:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Mettre en \u0153uvre des politiques et des infrastructures de s\u00e9curit\u00e9<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Vous aider \u00e0 obtenir la certification accr\u00e9dit\u00e9e<\/span><\/li>\n<li><span style=\"font-weight: 400;\">R\u00e9viser les politiques et organiser des audits en continu pour garantir la pertinence des politiques<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Assurer le suivi du paysage des menaces, avec une Threat\u00a0Intelligence sp\u00e9cifique pour orienter la strat\u00e9gie de gouvernance<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Vous avez besoin d\u2019acc\u00e9l\u00e9rer votre parcours de cybermaturit\u00e9 ? Nous pouvons vous aider \u00e0 \u00e9laborer <\/span><span style=\"font-weight: 400;\">une strat\u00e9gie de cybers\u00e9curit\u00e9 en 6 mois \u00e0 peine par le biais du programme CISO. Sous la direction d&rsquo;un CISO temporaire, une petite \u00e9quipe de consultants Airbus Protect d\u00e9finit un plan de gouvernance en mati\u00e8re de s\u00e9curit\u00e9 de l&rsquo;information et une feuille de route de la cybers\u00e9curit\u00e9.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ces bases solides vous permettront\u00a0:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">D\u2019int\u00e9grer la s\u00e9curit\u00e9 \u00e0 tous les projets<\/span><\/li>\n<li><span style=\"font-weight: 400;\">De former les collaborateurs<\/span><\/li>\n<li><span style=\"font-weight: 400;\">De vous assurer que toutes les politiques de s\u00e9curit\u00e9 sont appliqu\u00e9es par le biais de programmes d&rsquo;audit et de contr\u00f4le<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"conteneurSolutionService conteneurSolutionServiceAuto\">\n<h2>Nos services en mati\u00e8re de normes et de r\u00e9glementation<\/h2><div class=\"listeSolutionService\">\n    <div class=\"headerListeSolutionService\">\n                <p>D\u00e9couvrez les services li\u00e9s \u00e0 la conformit\u00e9 aux normes et r\u00e9glementations cybers\u00e9curit\u00e9<\/p>    <\/div>\n<div class=\"blocsSolutionService\"><div class=\"blocSolutionService blocSolutionServiceURL\">\n    <div>\n                <h4>Part-IS<\/h4>        <p>Nos experts en s\u00fbret\u00e9 et s\u00e9curit\u00e9 travaillent main dans la main avec vous pour mettre en \u0153uvre la partie IS et vous aider \u00e0 passer au niveau sup\u00e9rieur : au-del\u00e0 de la conformit\u00e9.<\/p>    <\/div>\n            <div class=\"overlay\" onclick=\"document.location.href='https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/partie-is\/';\">\n            <span class=\"readMore\"><a href=\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/partie-is\/\" title=\"Part-IS\">Lire la suite &gt;<\/a><\/span>\n        <\/div>\n        <\/div><div class=\"blocSolutionService blocSolutionServiceURL\">\n    <div>\n                <h4>Directive NIS2<\/h4>        <p>Airbus Protect dispose d&#039;une \u00e9quipe d&#039;experts qui peuvent vous aider \u00e0 mettre en \u0153uvre la directive NIS2.<\/p>    <\/div>\n            <div class=\"overlay\" onclick=\"document.location.href='https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/nis2\/';\">\n            <span class=\"readMore\"><a href=\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/nis2\/\" title=\"Directive NIS2\">Lire la suite &gt;<\/a><\/span>\n        <\/div>\n        <\/div><\/div>\n    <\/div><\/div>[\/vc_column][\/vc_row][vc_row][vc_column]    <div class=\"hightlightBracket\">\n        <div class=\"glyphe\"><\/div>\n        <div class=\"highlight\"><p>Contactez-nous pour d\u00e9couvrir comment nous pouvons vous aider<\/p><\/div>\n    <\/div>\n    <div class=\"divBtCTA btAlignCenter\"><a href=\"https:\/\/www.protect.airbus.com\/fr\/contact\/\"  class=\"button btAuto\">Nous contacter<\/a><\/div><div class=\"whatsNew\" id=\"whatsnew_69d311d8a7d31\">\n    <div class=\"lineTitleFilter\">\n        <div id=\"conteneur_h2_WhatsNew\"><h2>Des nouveaut\u00e9s ?<\/h2><\/div>\n        <div id=\"conteneur_FiltreWhatsNew\">\n\t\t\t<div class=\"filterWhatsNew\"><span>Filtre<\/span>\n\t\t\t\t<ul>\n\t\t\t\t\t<li><button type=\"button\" class=\"btFilter bfFilterNews\" onclick=\"fctFilterWhatsNew('news','cybersecurity','whatsnew_69d311d8a7d31')\">Actualit\u00e9<\/button><\/li>\n\t\t\t\t\t<li><button type=\"button\" class=\"btFilter bfFilterWhitePaper\" onclick=\"fctFilterWhatsNew('whitepaper','cybersecurity','whatsnew_69d311d8a7d31')\">Livre blanc<\/button><\/li>\n\t\t\t\t\t<li><button type=\"button\" class=\"btFilter bfFilterBlog\" onclick=\"fctFilterWhatsNew('blog','cybersecurity','whatsnew_69d311d8a7d31')\">Blog<\/button><\/li>\n\t\t\t\t\t<li><button type=\"button\" class=\"btFilter bfFilterEvent\" onclick=\"fctFilterWhatsNew('event','cybersecurity','whatsnew_69d311d8a7d31')\">\u00c9v\u00e9nement<\/button><\/li>\n\t\t\t\t<\/ul><\/div>\n\t\t\t<div id=\"whathsnew_glyphe\"><\/div>\n\t\t<\/div>\n    <\/div>\n\t\n    <div class=\"listWhatsNew\">\n        <\/div>\n    <div class=\"conteneurLineMoreInsight\"><div class=\"lineMoreInsight\"><a href=\"\/fr\/informations\/\">d\u00e9couvrir<\/a><\/div><\/div>\n<\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css=\u00a0\u00bb.vc_custom_1682672274135{margin-bottom: 0px !important;padding-bottom: 0px !important;}\u00a0\u00bb h2_style=\u00a0\u00bbh2Big\u00a0\u00bb] Conna\u00eetre les risques et vous tenir pr\u00eat \u00e0 agir [\/vc_column_text][vc_column_text p_style=\u00a0\u00bbpBig\u00a0\u00bb]Alors que les entreprises r\u00e9coltent les fruits de la digitalisation et de l\u2019hyperconnectivit\u00e9, elles doivent aussi faire face \u00e0 un paysage de cybermenaces de plus en plus complexe et \u00e9voluant rapidement. Cela n\u00e9cessite une \u00e9quipe de cybers\u00e9curit\u00e9 d\u00e9di\u00e9e [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":6467,"parent":6938,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"class_list":["post-5496","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity: Gouvernance, risque et conformit\u00e9 | Airbus Protect<\/title>\n<meta name=\"description\" content=\"Airbus Protect s&#039;engage \u00e0 aider ses clients \u00e0 comprendre les risques et \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en mati\u00e8re de cyber-gouvernance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gouvernance, risque et conformit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Airbus Protect s&#039;engage \u00e0 aider ses clients \u00e0 comprendre les risques et \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en mati\u00e8re de cyber-gouvernance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/\" \/>\n<meta property=\"og:site_name\" content=\"Airbus Protect\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-13T16:27:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"582\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Service\",\"name\":\"Gouvernance, risque et conformit\u00e9\",\"url\":\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/\",\"provider\":{\"@id\":\"https:\/\/www.protect.airbus.com\/#organization\"},\"description\":\"\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/\",\"url\":\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/\",\"name\":\"Cybersecurity: Gouvernance, risque et conformit\u00e9 | Airbus Protect\",\"isPartOf\":{\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png\",\"datePublished\":\"2022-06-20T13:50:25+00:00\",\"dateModified\":\"2026-02-13T16:27:43+00:00\",\"description\":\"Airbus Protect s'engage \u00e0 aider ses clients \u00e0 comprendre les risques et \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en mati\u00e8re de cyber-gouvernance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/#primaryimage\",\"url\":\"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png\",\"contentUrl\":\"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png\",\"width\":1920,\"height\":582},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.protect.airbus.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9\",\"item\":\"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Gouvernance, risque et conformit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/#website\",\"url\":\"https:\/\/www.protect.airbus.com\/fr\/\",\"name\":\"Airbus Protect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.protect.airbus.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/#organization\",\"name\":\"Airbus Protect\",\"url\":\"https:\/\/www.protect.airbus.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2023\/05\/logo-airbus-protect-696-696.png\",\"contentUrl\":\"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2023\/05\/logo-airbus-protect-696-696.png\",\"width\":696,\"height\":696,\"caption\":\"Airbus Protect\"},\"image\":{\"@id\":\"https:\/\/www.protect.airbus.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/airbus-protect\/\",\"https:\/\/www.youtube.com\/@airbusprotect7483\"],\"contactPoint\":{\"@type\":\"ContactPoint\",\"email\":\"protect@airbus.com\",\"contactType\":\"customer service\",\"areaServed\":[\"GB\",\"FR\",\"ES\",\"DE\",\"BE\",\"CH\",\"PT\",\"DK\",\"AT\"],\"availableLanguage\":[\"en\",\"fr\",\"de\"]}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity: Gouvernance, risque et conformit\u00e9 | Airbus Protect","description":"Airbus Protect s'engage \u00e0 aider ses clients \u00e0 comprendre les risques et \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en mati\u00e8re de cyber-gouvernance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/","og_locale":"fr_FR","og_type":"article","og_title":"Gouvernance, risque et conformit\u00e9","og_description":"Airbus Protect s'engage \u00e0 aider ses clients \u00e0 comprendre les risques et \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en mati\u00e8re de cyber-gouvernance.","og_url":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/","og_site_name":"Airbus Protect","article_modified_time":"2026-02-13T16:27:43+00:00","og_image":[{"width":1920,"height":582,"url":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Service","name":"Gouvernance, risque et conformit\u00e9","url":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/","provider":{"@id":"https:\/\/www.protect.airbus.com\/#organization"},"description":""},{"@type":"WebPage","@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/","url":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/","name":"Cybersecurity: Gouvernance, risque et conformit\u00e9 | Airbus Protect","isPartOf":{"@id":"https:\/\/www.protect.airbus.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/#primaryimage"},"image":{"@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png","datePublished":"2022-06-20T13:50:25+00:00","dateModified":"2026-02-13T16:27:43+00:00","description":"Airbus Protect s'engage \u00e0 aider ses clients \u00e0 comprendre les risques et \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en mati\u00e8re de cyber-gouvernance.","breadcrumb":{"@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/#primaryimage","url":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png","contentUrl":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/revslider\/header-cybersecurity-en\/bg-cybersecurity.png","width":1920,"height":582},{"@type":"BreadcrumbList","@id":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/gouvernance-risque-conformite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.protect.airbus.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9","item":"https:\/\/www.protect.airbus.com\/fr\/cybersecurite\/"},{"@type":"ListItem","position":3,"name":"Gouvernance, risque et conformit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.protect.airbus.com\/fr\/#website","url":"https:\/\/www.protect.airbus.com\/fr\/","name":"Airbus Protect","description":"","publisher":{"@id":"https:\/\/www.protect.airbus.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.protect.airbus.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.protect.airbus.com\/fr\/#organization","name":"Airbus Protect","url":"https:\/\/www.protect.airbus.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.protect.airbus.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2023\/05\/logo-airbus-protect-696-696.png","contentUrl":"https:\/\/www.protect.airbus.com\/wp-content\/uploads\/2023\/05\/logo-airbus-protect-696-696.png","width":696,"height":696,"caption":"Airbus Protect"},"image":{"@id":"https:\/\/www.protect.airbus.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/airbus-protect\/","https:\/\/www.youtube.com\/@airbusprotect7483"],"contactPoint":{"@type":"ContactPoint","email":"protect@airbus.com","contactType":"customer service","areaServed":["GB","FR","ES","DE","BE","CH","PT","DK","AT"],"availableLanguage":["en","fr","de"]}}]}},"_links":{"self":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/5496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/comments?post=5496"}],"version-history":[{"count":11,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/5496\/revisions"}],"predecessor-version":[{"id":47691,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/5496\/revisions\/47691"}],"up":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/pages\/6938"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/media\/6467"}],"wp:attachment":[{"href":"https:\/\/www.protect.airbus.com\/fr\/wp-json\/wp\/v2\/media?parent=5496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}