{"id":270732,"date":"2022-04-05T07:45:38","date_gmt":"2022-04-05T06:45:38","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=270732"},"modified":"2023-07-18T08:18:19","modified_gmt":"2023-07-18T07:18:19","slug":"cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/","title":{"rendered":"Cybers\u00e9curit\u00e9 des syst\u00e8mes industriels&nbsp;: le d\u00e9fi du d\u00e9ploiement"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-270733\" title=\"Contributeur : 300 librarians. Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-1024x669.jpg\" alt=\"Le d\u00e9ploiement des solutions cyber dans les sites industriels | Stormshield\" width=\"800\" height=\"523\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-1024x669.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-300x196.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-768x502.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-1536x1003.jpg 1536w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-2048x1338.jpg 2048w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-1396x912.jpg 1396w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-700x457.jpg 700w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><strong>Cyber-s\u00e9curiser un syst\u00e8me industriel est essentiel\u2026 mais complexe. Entre continuit\u00e9 de services, implication des \u00e9quipes et mod\u00e9lisation, \u00e9change de bonnes pratiques.<\/strong><\/p>\n<p>\u00c0 l\u2019occasion de <a href=\"https:\/\/www.stormshield.com\/fr\/ressourcescenter\/livre-blanc-cybersecurite-et-reseaux-operationnels-prise-en-compte-du-risque-industrie-du-futur\/\" target=\"_blank\" rel=\"noopener\"><u>notre barom\u00e8tre 2021 sur la cybers\u00e9curit\u00e9 industrielle<\/u><\/a>, plus de la moiti\u00e9 de sond\u00e9s (51%) d\u00e9claraient avoir subi au moins une cyberattaque contre leur r\u00e9seau op\u00e9rationnel. Et pour plus d\u2019un quart d\u2019entre eux (27%), ces cyberattaques avaient entra\u00een\u00e9 un arr\u00eat ou une perturbation de la production. De quoi renforcer la n\u00e9cessite d\u2019investir dans la cybers\u00e9curit\u00e9 pour r\u00e9duire au maximum les surfaces d\u2019attaque industrielles. Pour autant, d\u00e9ployer des solutions de cybers\u00e9curit\u00e9 dans un site industriel n\u2019a rien d\u2019un long fleuve tranquille. Latence, indisponibilit\u00e9, ruptures de conformit\u00e9 : <strong>comment \u00e9viter ces risques afin que ces op\u00e9rations cruciales se d\u00e9roulent au mieux ?<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Un d\u00e9ploiement dans l\u2019industrie essentiel, mais complexe<\/h2>\n<p>La production quoi qu\u2019il en co\u00fbte. Pour les industriels, l\u2019un des d\u00e9fis principaux est d\u2019assurer la continuit\u00e9 de service, explique <strong>Vincent Nicaise<\/strong>, Responsable des partenaires et de l'\u00e9cosyst\u00e8me industriels chez Stormshield. \u00ab <em>Si on intervient dans une usine qui tourne 24h sur 24, 7\u00a0jours sur 7, tout arr\u00eater pour int\u00e9grer de nouveaux \u00e9quipements est compliqu\u00e9<\/em>\u00a0\u00bb. Compliqu\u00e9, mais \u00ab\u00a0<em>largement r\u00e9alisable<\/em>\u00a0\u00bb pour des \u00e9quipes exp\u00e9riment\u00e9es, rassure l\u2019expert en industrie. \u00ab\u00a0<em>Avant tout, il faut le planifier, parfois quelques mois en avance. Surtout, il faut avoir l\u2019adh\u00e9sion et l\u2019implication des \u00e9quipes m\u00e9tier, des responsables d\u2019usine ou des chefs d\u2019op\u00e9rations par exemple, pour assurer la mise en \u0153uvre<\/em>.\u00a0\u00bb<\/p>\n<blockquote><p><em>Il faut planifier le d\u00e9ploiement d\u2019une solution de s\u00e9curit\u00e9, parfois quelques mois en avance. Surtout, il faut avoir l\u2019adh\u00e9sion et l\u2019implication des \u00e9quipes m\u00e9tier, des responsables d\u2019usine ou des chefs d\u2019op\u00e9rations par exemple, pour assurer la mise en \u0153uvre<\/em>.<\/p>\n<pre><strong>Vincent Nicaise<\/strong>, charg\u00e9 des partenariats et de l'\u00e9cosyst\u00e8me industriels Stormshield<\/pre>\n<\/blockquote>\n<p>Autre difficult\u00e9 inh\u00e9rente \u00e0 l\u2019OT\u00a0: il s\u2019agit de syst\u00e8mes qui ont parfois plusieurs d\u00e9cennies d\u2019existence et sur lesquels plusieurs soci\u00e9t\u00e9s de maintenance sont intervenues. \u00ab\u00a0<em>On n\u2019a pas forc\u00e9ment d\u2019historique pr\u00e9cis des modifications, ce qui veut dire que nous n\u2019avons pas une ma\u00eetrise compl\u00e8te et sereine du syst\u00e8me<\/em>\u00a0\u00bb, pr\u00e9vient Vincent Nicaise. L\u00e0 encore, il est imp\u00e9ratif de \u00ab\u00a0<em>planifier largement l\u2019intervention en amont<\/em>\u00a0\u00bb, souligne l\u2019expert, et surtout <strong>d\u2019int\u00e9grer les \u00e9quipes m\u00e9tiers au processus pour ma\u00eetriser le d\u00e9ploiement<\/strong>\u00a0: \u00e9quipe RSSI, int\u00e9grateurs, qui \u00ab <em>connaissent les enjeux et le r\u00e9seau<\/em>\u00a0\u00bb. \u00ab\u00a0<em>Les difficult\u00e9s se posent plus sur la modification de l\u2019infrastructure que sur la solution en elle-m\u00eame<\/em>, confirme <strong>Pierre Vidard, <\/strong>chef de projet pour l\u2019entreprise de solutions industrielles <a href=\"https:\/\/www.actemium.fr\/entreprise\/actemium-maisons-laffitte\/\" target=\"_blank\" rel=\"noopener\"><u>Actemium<\/u><\/a> Maisons-Laffitte. <em>Que ce soit un firewall, un r\u00e9seau ou encore de la supervision d\u2019automates, l\u2019enjeu est de ne pas avoir d\u2019impact sur les syst\u00e8mes et installations existants. En fonction des infrastructures, une mauvaise ex\u00e9cution peut entra\u00eener une perte de visibilit\u00e9 ou de production temporaire<\/em>.\u00a0\u00bb D\u00e9ployer des solutions de cybers\u00e9curit\u00e9 dans l\u2019industrie est donc un vrai d\u00e9fi, qui demande une vraie ma\u00eetrise des diff\u00e9rentes \u00e9tapes.<\/p>\n<p>&nbsp;<\/p>\n<h2>L\u2019\u00e9tape essentielle de la cartographie du r\u00e9seau OT<\/h2>\n<p>Avant d\u2019intervenir, le prestataire en charge du d\u00e9ploiement devra d\u2019abord effectuer un audit. Il s\u2019agit d\u2019une \u00e9tape essentielle, qui va <strong>permettre d\u2019identifier l\u00e0 o\u00f9 il y a un manque de protection sur le site ainsi que l\u2019ampleur que ce risque peut avoir sur la s\u00fbret\u00e9 du r\u00e9seau<\/strong>. \u00ab\u00a0<em>Cela implique de faire des analyses de configuration de PC, de v\u00e9rifier les OS utilis\u00e9s, de chercher des probl\u00e8mes de configuration ou des fichiers accessibles qui comportent des mots de passe, de surveiller tout particuli\u00e8rement les postes avec des droits d\u2019administrateurs, etc.<\/em>\u00a0\u00bb, d\u00e9taille Pierre Vidard. Un temps d\u2019\u00e9tude essentiel, qui passe \u00e9galement, selon le chef de projet, <strong>par la cartographie du r\u00e9seau<\/strong>. \u00ab\u00a0<em>On utilise des outils pour capturer les r\u00e9seaux et cartographier les flux entre les \u00e9quipements, les identifier et analyser s\u2019ils sont l\u00e9gitimes et, pour la France, conformes aux recommandations de l\u2019ANSSI<\/em>.\u00a0\u00bb<\/p>\n<p>Pour s\u2019assurer du meilleur d\u00e9ploiement terrain, les experts ont ensuite recours au test en pr\u00e9-production. Il s\u2019agit d\u2019une sorte de maquette aussi proche que possible de la r\u00e9alit\u00e9 et sur laquelle diff\u00e9rents tests sont effectu\u00e9s pour valider les fonctionnalit\u00e9s. Une maquette physique, pr\u00e9cise Pierre Vidard, puisque \u00ab\u00a0<em>pour la majorit\u00e9 des switchs industriels, on ne peut pas les ouvrir dans une interface virtuelle gr\u00e2ce \u00e0 un fichier de configuration. Il faut avoir le mat\u00e9riel<\/em>.\u00a0\u00bb Une contrainte qui rend certaines mod\u00e9lisations compliqu\u00e9es, reconna\u00eet Pierre Vidard car \u00ab\u00a0<em>on ne peut pas n\u00e9cessairement faire l\u2019acquisition du m\u00eame mat\u00e9riel que le client<\/em>\u00a0\u00bb. Mais la technique n\u2019en reste pas moins efficace. \u00ab\u00a0<em>Il peut toujours y avoir des surprises lors de la mise en service, mais cela supprime au moins 90% des probl\u00e8mes qu\u2019il peut y avoir<\/em>\u00a0\u00bb, estime le chef de projet.<\/p>\n<p>Le d\u00e9ploiement devra enfin \u00eatre progressif. \u00ab\u00a0<em>Lorsqu\u2019il y a plusieurs usines, on peut choisir la plus repr\u00e9sentative, celle o\u00f9 il y a le plus d\u2019adh\u00e9sion pour qu\u2019elle serve de Proof of Concept<\/em>, sugg\u00e8re Vincent Nicaise.<em> On peut ainsi travailler sur un projet de s\u00e9curit\u00e9 et d\u00e9terminer un mod\u00e8le que l\u2019on peut dupliquer sur l\u2019ensemble des usines<\/em>.\u00a0\u00bb Dit comme cela, le d\u00e9ploiement d\u2019une solution de cybers\u00e9curit\u00e9 est tout \u00e0 fait possible \u2013 <strong>mais l\u2019industrie est-elle pr\u00eate\u00a0?<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Cybers\u00e9curit\u00e9 et enjeux de l\u2019industrie 4.0<\/h2>\n<p>Cela d\u00e9pend surtout de la maturit\u00e9 du secteur. En France, les <a href=\"https:\/\/www.stormshield.com\/fr\/solutions-stormshield-pour-les-oiv\/\">Op\u00e9rateurs d\u2019importance vitale<\/a> \u2013 issus des secteurs de l\u2019eau, l\u2019\u00e9nergie, le p\u00e9trole et le gaz, le nucl\u00e9aire\u2026 \u2013, sont \u00e0 la fois bien au fait des risques et ont une obligation l\u00e9gale \u00e0 mettre en place des protections. L\u2019industrie manufacturi\u00e8re est de son c\u00f4t\u00e9 <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-risques-cyber-industriels\/\">encore en retard<\/a>. \u00ab\u00a0<em>Ils consid\u00e8rent les risques IT mais pas OT<\/em>\u00a0\u00bb, analyse Vincent Nicaise.<\/p>\n<p>Un constat que partage Pierre Vidard. \u00ab\u00a0<em>L\u2019un des plus gros d\u00e9fis est de convaincre les clients de l\u2019int\u00e9r\u00eat de la mise en place des solutions dans leur environnement industriel. Beaucoup parlent de cyber en r\u00e9action \u00e0 une attaque, mais sans savoir ce que \u00e7a implique. Et puis, ils laissent tomber, car ils ont re\u00e7u un devis trop haut ou que leurs priorit\u00e9s ont chang\u00e9. Pour un patron d\u2019usine, il est compliqu\u00e9 de d\u00e9gager du budget sans gain de production. Mais il faut qu\u2019ils se rendent comptent de la perte de production et donc de l\u2019impact financier engendr\u00e9 par une attaque.<\/em>\u00a0\u00bb<\/p>\n<blockquote><p><em>L\u2019un des plus gros d\u00e9fis est de convaincre les clients de l\u2019int\u00e9r\u00eat de la mise en place des solutions dans leur environnement industriel. Beaucoup parlent de cyber en r\u00e9action \u00e0 une attaque, mais sans savoir ce que \u00e7a implique. Et puis, ils laissent tomber, car ils ont re\u00e7u un devis trop haut ou que leurs priorit\u00e9s ont chang\u00e9.<\/em><\/p>\n<pre><strong>Pierre Vidard, <\/strong>chef de projet pour l\u2019entreprise de solutions industrielles Actemium<\/pre>\n<\/blockquote>\n<p><strong>L\u2019industrie 4.0 pourrait changer la perception de l\u2019importance de la cybers\u00e9curit\u00e9 sur l\u2019OT<\/strong> avec l\u2019implantation d\u2019objets connect\u00e9s tout au long de la cha\u00eene de production. \u00ab\u00a0<em>L\u2019objectif est d\u2019optimiser l\u2019outil de production et anticiper la maintenance mais cela introduit \u00e9galement une plus grande surface d\u2018attaque avec une multitude de composants suppl\u00e9mentaires<\/em>, reconna\u00eet Vincent Nicaise.<em> Il y a de plus en plus de failles potentielles<\/em>.\u00a0\u00bb Le cloud notamment, <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/et-si-le-cloud-computing-etait-devenu-incontournable\/\">\u00e9l\u00e9ment essentiel de l\u2019industrie 4.0<\/a> puisqu\u2019il permet de stocker de la puissance de calcul et un grand volume de donn\u00e9es, d\u00e9centralise l\u2019information. Pour en assurer la disponibilit\u00e9, \u00ab\u00a0<em>il faut s\u00e9curiser les flux<\/em>\u00a0\u00bb, appuie Vincent Nicaise.<\/p>\n<p>\u00ab\u00a0<em>Le probl\u00e8me est que les questions sur la cybers\u00e9curit\u00e9 viennent souvent une fois que le r\u00e9seau a \u00e9t\u00e9 ouvert<\/em>, souligne Pierre Vidard.<em> Mais cette ouverture intervient sur un syst\u00e8me historiquement autonome et isol\u00e9 donc sans firewalls ou anti-virus, pas cloisonn\u00e9s et op\u00e9rant avec des comptes administrateurs. Une fois ouverts sur l'ext\u00e9rieur, les syst\u00e8mes ne sont pas assez robustes.<\/em>\u00a0\u00bb Malgr\u00e9 tout, <strong>la prise de conscience semble aller dans le bon sens<\/strong>, m\u00eame si les comp\u00e9tences au sein des usines restent disparates, estime Pierre Vidard. \u00ab\u00a0<em>Ces enjeux se d\u00e9mocratisent de plus en plus. Certains clients veulent avoir la ma\u00eetrise de leurs syst\u00e8mes et forment en interne pour monter en comp\u00e9tences. D\u2019autres clients, n\u2019ont pas ces comp\u00e9tences ni vocation \u00e0 les avoir. Ils ont des salari\u00e9s capables de comprendre les principes th\u00e9oriques fondamentaux et font appel \u00e0 des soci\u00e9t\u00e9s ext\u00e9rieures. D\u2019autres encore n\u2019ont quasiment rien de tout \u00e7a.<\/em>\u00a0\u00bb<\/p>\n<p>&nbsp;<\/p>\n<p>Dans tous les cas, les experts cybers\u00e9curit\u00e9 sont capables de faire du cas par cas selon l\u2019exp\u00e9rience et la maturit\u00e9 des \u00e9quipes. Et d\u2019accompagner les structures pour un d\u00e9ploiement technique en douceur.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-s\u00e9curiser un syst\u00e8me industriel est essentiel\u2026 mais complexe. Entre continuit\u00e9 de services, implication des \u00e9quipes et mod\u00e9lisation, \u00e9change de bonnes pratiques. \u00c0 l\u2019occasion de notre barom\u00e8tre 2021 sur la cybers\u00e9curit\u00e9 industrielle, plus de la moiti\u00e9 de sond\u00e9s (51%) d\u00e9claraient avoir subi au moins une cyberattaque&#8230;<\/p>\n","protected":false},"author":48,"featured_media":270733,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1608],"tags":[6564,4368],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[6567,1552,1565,1530],"class_list":["post-270732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-paroles-experts","tag-cybersecurite-industrielle","tag-la-cybersecurite-par-stormshield","listing_product-sni20-fr","listing_product-sni40-fr","listing_product-ses-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>D\u00e9ploiement de solutions cyber sur sites industriels | Stormshield<\/title>\n<meta name=\"description\" content=\"Latence, indisponibilit\u00e9, coupures, ruptures de conformit\u00e9 : quels risques lors du d\u00e9ploiement de solution de cybers\u00e9curit\u00e9 dans l&#039;OT ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D\u00e9ploiement de solutions cyber sur sites industriels | Stormshield\" \/>\n<meta property=\"og:description\" content=\"Latence, indisponibilit\u00e9, coupures, ruptures de conformit\u00e9 : quels risques lors du d\u00e9ploiement de solution de cybers\u00e9curit\u00e9 dans l&#039;OT ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-05T06:45:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-18T07:18:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1672\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Khobeib Ben Boubaker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Khobeib Ben Boubaker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/\"},\"author\":{\"name\":\"Khobeib Ben Boubaker\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/5994c276aef6b25198c1d0863a392be1\"},\"headline\":\"Cybers\u00e9curit\u00e9 des syst\u00e8mes industriels&nbsp;: le d\u00e9fi du d\u00e9ploiement\",\"datePublished\":\"2022-04-05T06:45:38+00:00\",\"dateModified\":\"2023-07-18T07:18:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/\"},\"wordCount\":1558,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-scaled.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9 industrielle\",\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Paroles d'experts\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/\",\"url\":\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/\",\"name\":\"D\u00e9ploiement de solutions cyber sur sites industriels | Stormshield\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-scaled.jpg\",\"datePublished\":\"2022-04-05T06:45:38+00:00\",\"dateModified\":\"2023-07-18T07:18:19+00:00\",\"author\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/5994c276aef6b25198c1d0863a392be1\"},\"description\":\"Latence, indisponibilit\u00e9, coupures, ruptures de conformit\u00e9 : quels risques lors du d\u00e9ploiement de solution de cybers\u00e9curit\u00e9 dans l'OT ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#primaryimage\",\"url\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-scaled.jpg\",\"contentUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-scaled.jpg\",\"width\":2560,\"height\":1672},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stormshield.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 des syst\u00e8mes industriels&nbsp;: le d\u00e9fi du d\u00e9ploiement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\",\"url\":\"https:\/\/www.stormshield.com\/fr\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/5994c276aef6b25198c1d0863a392be1\",\"name\":\"Khobeib Ben Boubaker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9320764755f6fe5087f97f8d94a52f55f475795768fd06e5e0695d741066aacf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9320764755f6fe5087f97f8d94a52f55f475795768fd06e5e0695d741066aacf?s=96&d=mm&r=g\",\"caption\":\"Khobeib Ben Boubaker\"},\"description\":\"A graduate of CESI engineering school and holder of an ESCP Europe MBA, Khobeib began his career at Alcatel Lucent in the Submarine Network entity. His first love was the design of fibre optic systems for intercommunication between countries and operators. R&amp;D engineer, international trainer, business engineer, then Business Unit Director: Khobeib wore many technical and business hats for a decade before coming to Stormshield. And following an initial post as Business Developer for the industrial security offering, he is now at Head of DMI (Defence, Ministries, Industry) Business Line to support the company's strategic ambitions for IT\/OT cybersecurity.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/khobeib-benboubaker-14598061\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9ploiement de solutions cyber sur sites industriels | Stormshield","description":"Latence, indisponibilit\u00e9, coupures, ruptures de conformit\u00e9 : quels risques lors du d\u00e9ploiement de solution de cybers\u00e9curit\u00e9 dans l'OT ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/","og_locale":"fr_FR","og_type":"article","og_title":"D\u00e9ploiement de solutions cyber sur sites industriels | Stormshield","og_description":"Latence, indisponibilit\u00e9, coupures, ruptures de conformit\u00e9 : quels risques lors du d\u00e9ploiement de solution de cybers\u00e9curit\u00e9 dans l'OT ?","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/","og_site_name":"Stormshield","article_published_time":"2022-04-05T06:45:38+00:00","article_modified_time":"2023-07-18T07:18:19+00:00","og_image":[{"width":2560,"height":1672,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-scaled.jpg","type":"image\/jpeg"}],"author":"Khobeib Ben Boubaker","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Khobeib Ben Boubaker","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/"},"author":{"name":"Khobeib Ben Boubaker","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/5994c276aef6b25198c1d0863a392be1"},"headline":"Cybers\u00e9curit\u00e9 des syst\u00e8mes industriels&nbsp;: le d\u00e9fi du d\u00e9ploiement","datePublished":"2022-04-05T06:45:38+00:00","dateModified":"2023-07-18T07:18:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/"},"wordCount":1558,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-scaled.jpg","keywords":["Cybers\u00e9curit\u00e9 industrielle","La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Paroles d'experts"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/","name":"D\u00e9ploiement de solutions cyber sur sites industriels | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-scaled.jpg","datePublished":"2022-04-05T06:45:38+00:00","dateModified":"2023-07-18T07:18:19+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/5994c276aef6b25198c1d0863a392be1"},"description":"Latence, indisponibilit\u00e9, coupures, ruptures de conformit\u00e9 : quels risques lors du d\u00e9ploiement de solution de cybers\u00e9curit\u00e9 dans l'OT ?","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-scaled.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-725631577-scaled.jpg","width":2560,"height":1672},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-ot-systemes-industriels-defi-du-deploiement-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 des syst\u00e8mes industriels&nbsp;: le d\u00e9fi du d\u00e9ploiement"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/5994c276aef6b25198c1d0863a392be1","name":"Khobeib Ben Boubaker","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9320764755f6fe5087f97f8d94a52f55f475795768fd06e5e0695d741066aacf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9320764755f6fe5087f97f8d94a52f55f475795768fd06e5e0695d741066aacf?s=96&d=mm&r=g","caption":"Khobeib Ben Boubaker"},"description":"A graduate of CESI engineering school and holder of an ESCP Europe MBA, Khobeib began his career at Alcatel Lucent in the Submarine Network entity. His first love was the design of fibre optic systems for intercommunication between countries and operators. R&amp;D engineer, international trainer, business engineer, then Business Unit Director: Khobeib wore many technical and business hats for a decade before coming to Stormshield. And following an initial post as Business Developer for the industrial security offering, he is now at Head of DMI (Defence, Ministries, Industry) Business Line to support the company's strategic ambitions for IT\/OT cybersecurity.","sameAs":["https:\/\/www.linkedin.com\/in\/khobeib-benboubaker-14598061\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/270732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=270732"}],"version-history":[{"count":11,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/270732\/revisions"}],"predecessor-version":[{"id":447402,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/270732\/revisions\/447402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/270733"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=270732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=270732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=270732"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=270732"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=270732"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=270732"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=270732"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=270732"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=270732"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=270732"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=270732"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=270732"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=270732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}