{"id":8221,"date":"2020-09-23T21:52:13","date_gmt":"2020-09-23T19:52:13","guid":{"rendered":"https:\/\/www.agilit.law\/?p=8221"},"modified":"2021-10-27T00:22:26","modified_gmt":"2021-10-26T22:22:26","slug":"la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction","status":"publish","type":"post","link":"https:\/\/www.agilit.law\/en\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/","title":{"rendered":"Guide pratique &#8211; La cybercriminalit\u00e9 en 10 d\u00e9lits : analyse, exemples et plan d\u2019action"},"content":{"rendered":"<h2 style=\"text-align: center;\">Premi\u00e8res pages en avant-premi\u00e8re<\/h2>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>La cybercriminalit\u00e9 est une menace pour toutes les entreprises. La bonne mise en \u0153uvre de \u00ab gestes barri\u00e8res \u00bb num\u00e9riques peut permettre de r\u00e9duire grandement le risque pour votre entreprise qu&#8217;elle soit un grand groupe, une ETI, une PME, ou m\u00eame une jeune pousse. C&#8217;est dans ce but et <strong>sur la base de son exp\u00e9rience d&#8217;avocate experte en cybercriminalit\u00e9 que Sylvie Jonas a r\u00e9alis\u00e9 un Guide pratique intitul\u00e9 \u00ab La cybercriminalit\u00e9 en 10 d\u00e9lits : analyse, exemples et plan d\u2019action (bonus : cybersquatting, typosquatting : les proc\u00e9dures extrajudiciaires)\u00bb<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<p>Il s\u2019adresse aux dirigeants d\u2019entreprise, aux directeurs juridiques, aux directeurs des syst\u00e8mes d\u2019information, aux responsables de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information, ainsi qu\u2019aux responsables de la conformit\u00e9.<\/p>\n<p>&nbsp;<\/p>\n<p>Vous pourrez ainsi r\u00e9duire votre risque, ainsi que celui de vos clients, <strong>en d\u00e9ployant en amont, les proc\u00e9dures techniques et juridiques pertinentes, mais \u00e9galement en r\u00e9agissant imm\u00e9diatement en cas d\u2019attaque gr\u00e2ce \u00e0 un plan d\u2019action<\/strong> pr\u00e9\u00e9tabli.<\/p>\n<p>&nbsp;<\/p>\n<p>Afin que vous puissiez l\u2019exploiter facilement, ce Guide est pratique et le propos est illustr\u00e9 par des infographies et des exemples.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-8222 alignleft\" src=\"https:\/\/www.agilit.law\/wp-content\/uploads\/2020\/09\/Image1.jpg\" alt=\"\" width=\"280\" height=\"210\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: center;\"><strong>Le guide va \u00eatre \u00e9dit\u00e9 par les \u00e9ditions<\/strong><\/h3>\n<p style=\"text-align: center;\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-8224\" src=\"https:\/\/www.agilit.law\/wp-content\/uploads\/2020\/09\/Image2.jpg\" alt=\"\" width=\"210\" height=\"43\" \/><\/p>\n<h3 style=\"text-align: center;\"><strong>et sortira en librairie<\/strong><strong><br \/>\nen novembre 2020<\/strong>.<\/h3>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>En avant-premi\u00e8re, vous trouverez ci-apr\u00e8s le premier chapitre consacr\u00e9 \u00e0 l\u2019ESCROQUERIE<\/strong> : fraude au pr\u00e9sident, faux ordres de virement, fausses demandes de changement de RIB, faux ministre, faux support technique\u2026<\/p>\n<p>&nbsp;<\/p>\n<p>N\u2019h\u00e9sitez pas \u00e0 <a href=\"https:\/\/www.agilit.law\/cabinet\/equipe\/sylvie-jonas\/\">nous contacter<\/a> pour \u00e9changer sur l\u2019encadrement de votre risque cyber.<\/p>\n<p>&nbsp;<\/p>\n<p>Bonne lecture !<\/p>\n<p>&nbsp;<\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"text-align: center;\"><a href=\"https:\/\/agilitavocat-my.sharepoint.com\/:b:\/g\/personal\/sylvie_jonas_agilit_law\/EcEpCSYL2wFGoeppVWrrQToBpqDPbZdmTWFFdUX6vrA9tQ?e=t99xpt\"><strong>T\u00e9l\u00e9chargez le premier chapitre<\/strong><\/a><\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Premi\u00e8res pages en avant-premi\u00e8re &nbsp; &nbsp; La cybercriminalit\u00e9 est une menace pour toutes les entreprises. La bonne mise en \u0153uvre de \u00ab gestes barri\u00e8res \u00bb num\u00e9riques peut permettre de r\u00e9duire grandement le risque pour votre entreprise qu&#8217;elle soit un grand groupe, une ETI, une PME, ou m\u00eame une jeune pousse. C&#8217;est dans ce but et&hellip;<\/p>\n","protected":false},"author":13,"featured_media":2832,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[147,73],"tags":[],"coauthors":[99],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Guide pratique - La cybercriminalit\u00e9 en 10 d\u00e9lits : analyse, exemples et plan d\u2019action - AGIL&#039;IT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guide pratique - La cybercriminalit\u00e9 en 10 d\u00e9lits : analyse, exemples et plan d\u2019action - AGIL&#039;IT\" \/>\n<meta property=\"og:description\" content=\"Premi\u00e8res pages en avant-premi\u00e8re &nbsp; &nbsp; La cybercriminalit\u00e9 est une menace pour toutes les entreprises. La bonne mise en \u0153uvre de \u00ab gestes barri\u00e8res \u00bb num\u00e9riques peut permettre de r\u00e9duire grandement le risque pour votre entreprise qu&#8217;elle soit un grand groupe, une ETI, une PME, ou m\u00eame une jeune pousse. C&#8217;est dans ce but et&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/\" \/>\n<meta property=\"og:site_name\" content=\"AGIL&#039;IT\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-23T19:52:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-26T22:22:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/03\/RGPD-Focus-recueil-consentement-e1505207466320.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"917\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sylvie JONAS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sylvie JONAS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/\",\"url\":\"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/\",\"name\":\"Guide pratique - La cybercriminalit\u00e9 en 10 d\u00e9lits : analyse, exemples et plan d\u2019action - AGIL&#039;IT\",\"isPartOf\":{\"@id\":\"https:\/\/www.agilit.law\/#website\"},\"datePublished\":\"2020-09-23T19:52:13+00:00\",\"dateModified\":\"2021-10-26T22:22:26+00:00\",\"author\":{\"@id\":\"https:\/\/www.agilit.law\/#\/schema\/person\/3c2aff137e0c93d643fa9ea0a0036f9c\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.agilit.law\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guide pratique &#8211; La cybercriminalit\u00e9 en 10 d\u00e9lits : analyse, exemples et plan d\u2019action\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.agilit.law\/#website\",\"url\":\"https:\/\/www.agilit.law\/\",\"name\":\"AGIL&#039;IT\",\"description\":\"Make things simple\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.agilit.law\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.agilit.law\/#\/schema\/person\/3c2aff137e0c93d643fa9ea0a0036f9c\",\"name\":\"Sylvie JONAS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.agilit.law\/#\/schema\/person\/image\/6bcd277be005faec539f89eb887063dd\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/62864e6853bc3f79a4edd67268d7c87b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/62864e6853bc3f79a4edd67268d7c87b?s=96&d=mm&r=g\",\"caption\":\"Sylvie JONAS\"},\"url\":\"https:\/\/www.agilit.law\/en\/author\/sylvie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guide pratique - La cybercriminalit\u00e9 en 10 d\u00e9lits : analyse, exemples et plan d\u2019action - AGIL&#039;IT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/","og_locale":"en_US","og_type":"article","og_title":"Guide pratique - La cybercriminalit\u00e9 en 10 d\u00e9lits : analyse, exemples et plan d\u2019action - AGIL&#039;IT","og_description":"Premi\u00e8res pages en avant-premi\u00e8re &nbsp; &nbsp; La cybercriminalit\u00e9 est une menace pour toutes les entreprises. La bonne mise en \u0153uvre de \u00ab gestes barri\u00e8res \u00bb num\u00e9riques peut permettre de r\u00e9duire grandement le risque pour votre entreprise qu&#8217;elle soit un grand groupe, une ETI, une PME, ou m\u00eame une jeune pousse. C&#8217;est dans ce but et&hellip;","og_url":"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/","og_site_name":"AGIL&#039;IT","article_published_time":"2020-09-23T19:52:13+00:00","article_modified_time":"2021-10-26T22:22:26+00:00","og_image":[{"width":1500,"height":917,"url":"https:\/\/www.agilit.law\/wp-content\/uploads\/2017\/03\/RGPD-Focus-recueil-consentement-e1505207466320.jpg","type":"image\/jpeg"}],"author":"Sylvie JONAS","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sylvie JONAS","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/","url":"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/","name":"Guide pratique - La cybercriminalit\u00e9 en 10 d\u00e9lits : analyse, exemples et plan d\u2019action - AGIL&#039;IT","isPartOf":{"@id":"https:\/\/www.agilit.law\/#website"},"datePublished":"2020-09-23T19:52:13+00:00","dateModified":"2021-10-26T22:22:26+00:00","author":{"@id":"https:\/\/www.agilit.law\/#\/schema\/person\/3c2aff137e0c93d643fa9ea0a0036f9c"},"breadcrumb":{"@id":"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.agilit.law\/droit-technologie-et-informations-donnees-personnelles\/la-cybercriminalite-en-10-delits-analyse-exemples-et-plan-daction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.agilit.law\/en\/"},{"@type":"ListItem","position":2,"name":"Guide pratique &#8211; La cybercriminalit\u00e9 en 10 d\u00e9lits : analyse, exemples et plan d\u2019action"}]},{"@type":"WebSite","@id":"https:\/\/www.agilit.law\/#website","url":"https:\/\/www.agilit.law\/","name":"AGIL&#039;IT","description":"Make things simple","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.agilit.law\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.agilit.law\/#\/schema\/person\/3c2aff137e0c93d643fa9ea0a0036f9c","name":"Sylvie JONAS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.agilit.law\/#\/schema\/person\/image\/6bcd277be005faec539f89eb887063dd","url":"https:\/\/secure.gravatar.com\/avatar\/62864e6853bc3f79a4edd67268d7c87b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/62864e6853bc3f79a4edd67268d7c87b?s=96&d=mm&r=g","caption":"Sylvie JONAS"},"url":"https:\/\/www.agilit.law\/en\/author\/sylvie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/posts\/8221"}],"collection":[{"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/comments?post=8221"}],"version-history":[{"count":23,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/posts\/8221\/revisions"}],"predecessor-version":[{"id":8253,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/posts\/8221\/revisions\/8253"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/media\/2832"}],"wp:attachment":[{"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/media?parent=8221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/categories?post=8221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/tags?post=8221"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.agilit.law\/en\/wp-json\/wp\/v2\/coauthors?post=8221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}