{"id":1688,"date":"2023-10-09T15:09:52","date_gmt":"2023-10-09T13:09:52","guid":{"rendered":"https:\/\/teicee-wp6.dev.teicee.fr\/?p=1688"},"modified":"2026-04-29T15:02:16","modified_gmt":"2026-04-29T13:02:16","slug":"cybersecurite-colloque","status":"publish","type":"post","link":"https:\/\/www.teicee.com\/en\/cybersecurite-colloque\/","title":{"rendered":"How to innovate in cybersecurity\" conference"},"content":{"rendered":"<h2 class=\"wp-block-heading\">te\u00efc\u00e9e to meet cybersecurity players<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Cybersecurity: an essential mechanism!<\/h3>\n\n\n\n<p>Cybersecurity is a constantly evolving field, where digital threats are changing as fast as the solutions to counter them. We recently had the opportunity to take part in a conference on the theme of \"How to innovate in cybersecurity? \"organised by the Campus Cyber Caen Normandie and held at the Moho in Caen. Now that we're in the cyber world, it's time to be more responsible, bearing in mind that since the COVID-19 health crisis, cyberthreats in France have increased by 400%.<sup data-fn=\"b96484fc-cecf-4b19-8e63-d424ae2d3486\" class=\"fn\"><a href=\"#b96484fc-cecf-4b19-8e63-d424ae2d3486\" id=\"b96484fc-cecf-4b19-8e63-d424ae2d3486-link\">1<\/a><\/sup>This is a figure that should not be overlooked, and one that concerns us even more.<\/p>\n\n\n<!-- <div class=\"col-12 col-lg-6 img-carre\"> -->\n<div class=\"img-carre\">\n    <div class=\"element-svg cercle\">\n        <svg id=\"uuid-1e458e34-9818-49d8-a91d-fc9aaed89cde\" data-name=\"Calque 1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 205.488 205.473\">\n          <path id=\"uuid-ae0319f0-bcee-4843-b7a5-1f780fa0ce92\" data-name=\"Intersection 6\" d=\"M95.584,204.059l108.49-108.49-108.49,108.49Zm107.871-87.871l-87.252,87.253,87.252-87.253Zm-125.146,85.144l123.037-123.037-123.037,123.037Zm-15-5L196.348,63.294,63.309,196.333h0Zm132.3-52.301l-51.564,51.564,51.564-51.564ZM50.087,189.553L189.567,50.074,50.088,189.553h0Zm-11.691-8.308L181.258,38.383,38.396,181.245Zm-10.278-9.722L171.537,28.106,28.119,171.523Zm-8.882-11.119L160.418,19.223,19.238,160.404h0Zm-7.408-12.59L147.829,11.814,11.829,147.814Zm-5.753-14.247L133.589,6.054,6.076,133.567Zm-3.719-16.28L117.309,2.336,2.356,117.287Zm-.922-19.079L98.229,1.414,1.429,98.214l.006-.006Zm3.977-23.977L74.252,5.39,5.412,74.231Z\" style=\"fill: #fff; isolation: isolate; opacity: .296; stroke: #b5dc17; stroke-width: 4px;\"\/>\n        <\/svg>\n    <\/div>\n    <figure class=\"img-shadow\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"300\" src=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-2-225x300.jpg\" class=\"attachment-medium size-medium\" alt=\"cybers\u00e9curit\u00e9\" srcset=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-2-225x300.jpg 225w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-2-768x1024.jpg 768w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-2-1152x1536.jpg 1152w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-2-1536x2048.jpg 1536w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-2-scaled.jpg 1920w\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" \/>    <\/figure>\n<\/div>\n\n\n\n<p>Cyber attacks are plentiful, and unfortunately we often protect ourselves against them too late. Equipping yourself with robust solutions is important for the long-term survival of your business and your personal data. Cybersecurity is not a subject to be avoided, and in 2022 the hospital world was hit hard: the Corbeil-Essones hospital centre saw its situation deteriorate following a cyber attack.<sup data-fn=\"8a88aa02-35b5-4182-b6d9-153e3ff9bd7e\" class=\"fn\"><a href=\"#8a88aa02-35b5-4182-b6d9-153e3ff9bd7e\" id=\"8a88aa02-35b5-4182-b6d9-153e3ff9bd7e-link\">2<\/a><\/sup> and it is far from being the only victim; many other sectors are affected.<sup data-fn=\"116cba5c-eef0-4751-81f5-06677f4ef613\" class=\"fn\"><a href=\"#116cba5c-eef0-4751-81f5-06677f4ef613\" id=\"116cba5c-eef0-4751-81f5-06677f4ef613-link\">3<\/a><\/sup>. Normandy is home to many committed players who are keen to find effective solutions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Presentation pitch - tic'nVault<\/h3>\n\n\n\n<p>The conference brought together cybersecurity experts, researchers, industry professionals and businesses to discuss the latest advances in the field. Each speaker presented their innovation in cybersecurity, offering valuable insight into the future of digital protection. We had the opportunity to present our innovative product, which provides maximum security for our personal data and therefore reduces cyber attacks: <a href=\"https:\/\/teicee-wp6.dev.teicee.fr\/solution\/gestionnaire-mots-de-passe\/\" data-type=\"solution\" data-id=\"1428\">tic\u2019nVault<\/a> is a password manager that lets you remember all your passwords with just one!<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Discussing for better progress<\/h3>\n\n\n\n<p>One of the highlights of the conference was the opportunity to engage in direct discussions with the speakers to explain how these innovations could be implemented to strengthen the security of our information systems. This direct interaction created an environment conducive to exchange and listening.<\/p>\n\n\n\n<div class=\"img-rectangle rectangle-2-colonnes\">\n  <div class=\"element-svg rectangle\">\n    <svg id=\"uuid-18c57c74-5712-4e21-bdc2-866cd835dd7a\" data-name=\"Calque 1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 138.831 271.829\">\n     <path id=\"uuid-22adef3b-2358-40ce-a71a-8c6d33fa9701\" data-name=\"Intersection 5\" d=\"M128.394,270.415l9.023-9.023-9.023,9.023Zm-22.515,0l31.538-31.538-31.538,31.538Zm-22.514,0l54.052-54.052-54.052,54.052Zm-22.514,0l76.565-76.565-76.565,76.565Zm-22.514,0l99.079-99.079-99.079,99.079Zm-22.514,0l121.595-121.592L15.822,270.415Zm-14.408-8.105L137.414,126.31,1.414,262.31Zm0-22.515L137.414,103.795,1.414,239.795Zm0-22.512L137.414,81.283,1.414,217.283Zm0-22.514L137.414,58.769,1.414,194.769Zm0-22.514L137.414,36.255,1.414,172.255Zm0-22.515L137.414,13.74,1.414,149.74Zm0-22.512L127.228,1.415,1.414,127.228Zm0-22.514L104.714,1.414,1.414,104.714Zm0-22.514L82.199,1.415,1.414,82.2Zm0-22.514L59.685,1.414,1.414,59.686Zm0-22.515L37.171,1.414,1.414,37.171ZM1.414,14.657L14.657,1.414,1.414,14.657Z\" style=\"fill: #fff; isolation: isolate; opacity: .336; stroke: #b5dc17; stroke-width: 4px;\"\/>\n    <\/svg>\n  <\/div>\n  <figure>\n    <img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"300\" src=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho4-225x300.jpg\" class=\"attachment-medium size-medium\" alt=\"cybers\u00e9curit\u00e9 salon moho\" srcset=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho4-225x300.jpg 225w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho4-768x1024.jpg 768w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho4-1152x1536.jpg 1152w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho4-1536x2048.jpg 1536w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho4-scaled.jpg 1920w\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" \/>  <\/figure>\n<\/div>\n\n\n\n<p>Proposing innovative solutions is an integral part of our work. Cyber-attacks are multiplying by the day, which is why it's important to discuss current cyber-security issues and, above all, to find solutions!<\/p>\n\n\n\n<div class=\"img-rectangle rectangle-2-colonnes\">\n  <div class=\"element-svg rectangle\">\n    <svg id=\"uuid-18c57c74-5712-4e21-bdc2-866cd835dd7a\" data-name=\"Calque 1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 138.831 271.829\">\n     <path id=\"uuid-22adef3b-2358-40ce-a71a-8c6d33fa9701\" data-name=\"Intersection 5\" d=\"M128.394,270.415l9.023-9.023-9.023,9.023Zm-22.515,0l31.538-31.538-31.538,31.538Zm-22.514,0l54.052-54.052-54.052,54.052Zm-22.514,0l76.565-76.565-76.565,76.565Zm-22.514,0l99.079-99.079-99.079,99.079Zm-22.514,0l121.595-121.592L15.822,270.415Zm-14.408-8.105L137.414,126.31,1.414,262.31Zm0-22.515L137.414,103.795,1.414,239.795Zm0-22.512L137.414,81.283,1.414,217.283Zm0-22.514L137.414,58.769,1.414,194.769Zm0-22.514L137.414,36.255,1.414,172.255Zm0-22.515L137.414,13.74,1.414,149.74Zm0-22.512L127.228,1.415,1.414,127.228Zm0-22.514L104.714,1.414,1.414,104.714Zm0-22.514L82.199,1.415,1.414,82.2Zm0-22.514L59.685,1.414,1.414,59.686Zm0-22.515L37.171,1.414,1.414,37.171ZM1.414,14.657L14.657,1.414,1.414,14.657Z\" style=\"fill: #fff; isolation: isolate; opacity: .336; stroke: #b5dc17; stroke-width: 4px;\"\/>\n    <\/svg>\n  <\/div>\n  <figure>\n    <img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"171\" src=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1-300x171.jpg\" class=\"attachment-medium size-medium\" alt=\"Speech produit innovant cybers\u00e9curit\u00e9 - Moho\" srcset=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1-300x171.jpg 300w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1-1024x585.jpg 1024w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1-768x439.jpg 768w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1-1536x878.jpg 1536w, https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1.jpg 2047w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>  <\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n<ol class=\"wp-block-footnotes\"><li id=\"b96484fc-cecf-4b19-8e63-d424ae2d3486\">Increasing cyber threats: <a href=\"https:\/\/www.ndnm.fr\/statistiques-cybersecurite-2022\">https:\/\/www.ndnm.fr\/statistiques-cybersecurite-2022<\/a> <a href=\"#b96484fc-cecf-4b19-8e63-d424ae2d3486-link\" aria-label=\"Jump to footnote reference 1\">\u21a9\ufe0e<\/a><\/li><li id=\"8a88aa02-35b5-4182-b6d9-153e3ff9bd7e\">Cyberattaques h\u00f4pital de Corbeil-Essones : <a href=\"https:\/\/www.numerama.com\/cyberguerre\/1219264-cyberattaque-la-liste-des-hopitaux-touches-en-2022.html\">https:\/\/www.numerama.com\/cyberguerre\/1219264-cyberattaque-la-liste-des-hopitaux-touches-en-2022.html<\/a> <a href=\"#8a88aa02-35b5-4182-b6d9-153e3ff9bd7e-link\" aria-label=\"Jump to footnote reference 2\">\u21a9\ufe0e<\/a><\/li><li id=\"116cba5c-eef0-4751-81f5-06677f4ef613\">les autres secteurs touch\u00e9s <a href=\"https:\/\/www.ouest-france.fr\/societe\/cyberattaque\/\">https:\/\/www.ouest-france.fr\/societe\/cyberattaque\/<\/a> <a href=\"#116cba5c-eef0-4751-81f5-06677f4ef613-link\" aria-label=\"Jump to footnote reference 3\">\u21a9\ufe0e<\/a><\/li><\/ol>","protected":false},"excerpt":{"rendered":"<p>t\u00e9\u00efc\u00e9e \u00e0 la rencontre des acteurs de la cybers\u00e9curit\u00e9 La cybers\u00e9curit\u00e9 : un m\u00e9canisme indispensable ! La cybers\u00e9curit\u00e9 est un domaine en constante \u00e9volution, o\u00f9 les menaces num\u00e9riques \u00e9voluent aussi rapidement que les solutions pour les contrer. R\u00e9cemment, nous avons eu l\u2019occasion de participer \u00e0 un colloque sur le th\u00e8me \u201c&nbsp;comment innover en cybers\u00e9curit\u00e9&nbsp;?&nbsp;\u201d du [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2079,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":"[{\"content\":\"Augmentation des cybermenaces : <a href=\\\"https:\/\/www.ndnm.fr\/statistiques-cybersecurite-2022\\\">https:\/\/www.ndnm.fr\/statistiques-cybersecurite-2022<\/a>\",\"id\":\"b96484fc-cecf-4b19-8e63-d424ae2d3486\"},{\"content\":\"Cyberattaques h\u00f4pital de Corbeil-Essones : <a href=\\\"https:\/\/www.numerama.com\/cyberguerre\/1219264-cyberattaque-la-liste-des-hopitaux-touches-en-2022.html\\\">https:\/\/www.numerama.com\/cyberguerre\/1219264-cyberattaque-la-liste-des-hopitaux-touches-en-2022.html<\/a>\",\"id\":\"8a88aa02-35b5-4182-b6d9-153e3ff9bd7e\"},{\"content\":\"les autres secteurs touch\u00e9s <a href=\\\"https:\/\/www.ouest-france.fr\/societe\/cyberattaque\/\\\">https:\/\/www.ouest-france.fr\/societe\/cyberattaque\/<\/a>\",\"id\":\"116cba5c-eef0-4751-81f5-06677f4ef613\"}]"},"categories":[1],"tags":[39,40,6],"class_list":["post-1688","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-developpement","tag-cyber-securite","tag-mots-de-passe","tag-systemes-securite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Colloque &quot;comment innover en cybers\u00e9curit\u00e9 ?&quot; - t\u00e9\u00efc\u00e9e<\/title>\n<meta name=\"description\" content=\"La cybers\u00e9curit\u00e9 est un en constante \u00e9volution, o\u00f9 les menaces num\u00e9riques \u00e9voluent aussi rapidement que les solutions pour les contrer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.teicee.com\/en\/cybersecurite-colloque\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Colloque &quot;comment innover en cybers\u00e9curit\u00e9 ?&quot; - t\u00e9\u00efc\u00e9e\" \/>\n<meta property=\"og:description\" content=\"La cybers\u00e9curit\u00e9 est un en constante \u00e9volution, o\u00f9 les menaces num\u00e9riques \u00e9voluent aussi rapidement que les solutions pour les contrer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.teicee.com\/en\/cybersecurite-colloque\/\" \/>\n<meta property=\"og:site_name\" content=\"t\u00e9\u00efc\u00e9e\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/teicee\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-09T13:09:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T13:02:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1143\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"teicee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"teicee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/\"},\"author\":{\"name\":\"teicee\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#\\\/schema\\\/person\\\/ee830121639f0aa5a359b1b2f06f2ba3\"},\"headline\":\"Colloque \u00ab\u00a0comment innover en cybers\u00e9curit\u00e9 ?\u00a0\u00bb\",\"datePublished\":\"2023-10-09T13:09:52+00:00\",\"dateModified\":\"2026-04-29T13:02:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/\"},\"wordCount\":454,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/salon-moho-1.webp\",\"keywords\":[\"cyber s\u00e9curit\u00e9\",\"mots de passe\",\"Syst\u00e8mes &amp; s\u00e9curit\u00e9\"],\"articleSection\":[\"d\u00e9veloppement\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/\",\"name\":\"Colloque \\\"comment innover en cybers\u00e9curit\u00e9 ?\\\" - t\u00e9\u00efc\u00e9e\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/salon-moho-1.webp\",\"datePublished\":\"2023-10-09T13:09:52+00:00\",\"dateModified\":\"2026-04-29T13:02:16+00:00\",\"description\":\"La cybers\u00e9curit\u00e9 est un en constante \u00e9volution, o\u00f9 les menaces num\u00e9riques \u00e9voluent aussi rapidement que les solutions pour les contrer.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/salon-moho-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/salon-moho-1.webp\",\"width\":2000,\"height\":1143,\"caption\":\"Speech produit innovant sur la cybers\u00e9curit\u00e9 - Moho\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/cybersecurite-colloque\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.teicee.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Colloque \u00ab\u00a0comment innover en cybers\u00e9curit\u00e9 ?\u00a0\u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#website\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/\",\"name\":\"t\u00e9\u00efc\u00e9e\",\"description\":\"La raison de votre confiance\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.teicee.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#organization\",\"name\":\"t\u00e9\u00efc\u00e9e\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/teicee-300dpi-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/teicee-300dpi-scaled.jpg\",\"width\":2560,\"height\":1163,\"caption\":\"t\u00e9\u00efc\u00e9e\"},\"image\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/teicee\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/t-c-e\\\/\",\"https:\\\/\\\/www.instagram.com\\\/teicee_fr\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#\\\/schema\\\/person\\\/ee830121639f0aa5a359b1b2f06f2ba3\",\"name\":\"teicee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ad95dfce14efaaf051de69218d35b91e379e05c857dd9b16b80714107dd81a1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ad95dfce14efaaf051de69218d35b91e379e05c857dd9b16b80714107dd81a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ad95dfce14efaaf051de69218d35b91e379e05c857dd9b16b80714107dd81a1?s=96&d=mm&r=g\",\"caption\":\"teicee\"},\"sameAs\":[\"https:\\\/\\\/www.teicee.com\"],\"url\":\"https:\\\/\\\/www.teicee.com\\\/en\\\/author\\\/teicee\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Colloque \"comment innover en cybers\u00e9curit\u00e9 ?\" - t\u00e9\u00efc\u00e9e","description":"La cybers\u00e9curit\u00e9 est un en constante \u00e9volution, o\u00f9 les menaces num\u00e9riques \u00e9voluent aussi rapidement que les solutions pour les contrer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.teicee.com\/en\/cybersecurite-colloque\/","og_locale":"en_GB","og_type":"article","og_title":"Colloque \"comment innover en cybers\u00e9curit\u00e9 ?\" - t\u00e9\u00efc\u00e9e","og_description":"La cybers\u00e9curit\u00e9 est un en constante \u00e9volution, o\u00f9 les menaces num\u00e9riques \u00e9voluent aussi rapidement que les solutions pour les contrer.","og_url":"https:\/\/www.teicee.com\/en\/cybersecurite-colloque\/","og_site_name":"t\u00e9\u00efc\u00e9e","article_publisher":"https:\/\/www.facebook.com\/teicee","article_published_time":"2023-10-09T13:09:52+00:00","article_modified_time":"2026-04-29T13:02:16+00:00","og_image":[{"width":2000,"height":1143,"url":"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1.webp","type":"image\/webp"}],"author":"teicee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"teicee","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.teicee.com\/cybersecurite-colloque\/#article","isPartOf":{"@id":"https:\/\/www.teicee.com\/cybersecurite-colloque\/"},"author":{"name":"teicee","@id":"https:\/\/www.teicee.com\/#\/schema\/person\/ee830121639f0aa5a359b1b2f06f2ba3"},"headline":"Colloque \u00ab\u00a0comment innover en cybers\u00e9curit\u00e9 ?\u00a0\u00bb","datePublished":"2023-10-09T13:09:52+00:00","dateModified":"2026-04-29T13:02:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.teicee.com\/cybersecurite-colloque\/"},"wordCount":454,"commentCount":0,"publisher":{"@id":"https:\/\/www.teicee.com\/#organization"},"image":{"@id":"https:\/\/www.teicee.com\/cybersecurite-colloque\/#primaryimage"},"thumbnailUrl":"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1.webp","keywords":["cyber s\u00e9curit\u00e9","mots de passe","Syst\u00e8mes &amp; s\u00e9curit\u00e9"],"articleSection":["d\u00e9veloppement"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.teicee.com\/cybersecurite-colloque\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.teicee.com\/cybersecurite-colloque\/","url":"https:\/\/www.teicee.com\/cybersecurite-colloque\/","name":"Colloque \"comment innover en cybers\u00e9curit\u00e9 ?\" - t\u00e9\u00efc\u00e9e","isPartOf":{"@id":"https:\/\/www.teicee.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.teicee.com\/cybersecurite-colloque\/#primaryimage"},"image":{"@id":"https:\/\/www.teicee.com\/cybersecurite-colloque\/#primaryimage"},"thumbnailUrl":"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1.webp","datePublished":"2023-10-09T13:09:52+00:00","dateModified":"2026-04-29T13:02:16+00:00","description":"La cybers\u00e9curit\u00e9 est un en constante \u00e9volution, o\u00f9 les menaces num\u00e9riques \u00e9voluent aussi rapidement que les solutions pour les contrer.","breadcrumb":{"@id":"https:\/\/www.teicee.com\/cybersecurite-colloque\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.teicee.com\/cybersecurite-colloque\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.teicee.com\/cybersecurite-colloque\/#primaryimage","url":"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1.webp","contentUrl":"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1.webp","width":2000,"height":1143,"caption":"Speech produit innovant sur la cybers\u00e9curit\u00e9 - Moho"},{"@type":"BreadcrumbList","@id":"https:\/\/www.teicee.com\/cybersecurite-colloque\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.teicee.com\/"},{"@type":"ListItem","position":2,"name":"Colloque \u00ab\u00a0comment innover en cybers\u00e9curit\u00e9 ?\u00a0\u00bb"}]},{"@type":"WebSite","@id":"https:\/\/www.teicee.com\/#website","url":"https:\/\/www.teicee.com\/","name":"t\u00e9\u00efc\u00e9e","description":"La raison de votre confiance","publisher":{"@id":"https:\/\/www.teicee.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.teicee.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.teicee.com\/#organization","name":"t\u00e9\u00efc\u00e9e","url":"https:\/\/www.teicee.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.teicee.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/02\/teicee-300dpi-scaled.jpg","contentUrl":"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/02\/teicee-300dpi-scaled.jpg","width":2560,"height":1163,"caption":"t\u00e9\u00efc\u00e9e"},"image":{"@id":"https:\/\/www.teicee.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/teicee","https:\/\/www.linkedin.com\/company\/t-c-e\/","https:\/\/www.instagram.com\/teicee_fr\/"]},{"@type":"Person","@id":"https:\/\/www.teicee.com\/#\/schema\/person\/ee830121639f0aa5a359b1b2f06f2ba3","name":"teicee","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/0ad95dfce14efaaf051de69218d35b91e379e05c857dd9b16b80714107dd81a1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0ad95dfce14efaaf051de69218d35b91e379e05c857dd9b16b80714107dd81a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0ad95dfce14efaaf051de69218d35b91e379e05c857dd9b16b80714107dd81a1?s=96&d=mm&r=g","caption":"teicee"},"sameAs":["https:\/\/www.teicee.com"],"url":"https:\/\/www.teicee.com\/en\/author\/teicee\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1.webp",2000,1143,false],"thumbnail":["https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1-150x150.webp",150,150,true],"medium":["https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1-300x171.webp",300,171,true],"medium_large":["https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1-768x439.webp",768,439,true],"large":["https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1-1024x585.webp",1024,585,true],"1536x1536":["https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1-1536x878.webp",1536,878,true],"2048x2048":["https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1.webp",2000,1143,false],"trp-custom-language-flag":["https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/10\/salon-moho-1.webp",18,10,false]},"uagb_author_info":{"display_name":"teicee","author_link":"https:\/\/www.teicee.com\/en\/author\/teicee\/"},"uagb_comment_info":0,"uagb_excerpt":"t\u00e9\u00efc\u00e9e \u00e0 la rencontre des acteurs de la cybers\u00e9curit\u00e9 La cybers\u00e9curit\u00e9 : un m\u00e9canisme indispensable ! La cybers\u00e9curit\u00e9 est un domaine en constante \u00e9volution, o\u00f9 les menaces num\u00e9riques \u00e9voluent aussi rapidement que les solutions pour les contrer. R\u00e9cemment, nous avons eu l\u2019occasion de participer \u00e0 un colloque sur le th\u00e8me \u201c&nbsp;comment innover en cybers\u00e9curit\u00e9&nbsp;?&nbsp;\u201d du&hellip;","_links":{"self":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/posts\/1688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/comments?post=1688"}],"version-history":[{"count":90,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/posts\/1688\/revisions"}],"predecessor-version":[{"id":2940,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/posts\/1688\/revisions\/2940"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/media\/2079"}],"wp:attachment":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/media?parent=1688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/categories?post=1688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/tags?post=1688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}