{"id":2578,"date":"2025-07-07T10:49:32","date_gmt":"2025-07-07T08:49:32","guid":{"rendered":"https:\/\/www.teicee.com\/?p=2578"},"modified":"2025-09-26T15:39:56","modified_gmt":"2025-09-26T13:39:56","slug":"teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin","status":"publish","type":"post","link":"https:\/\/www.teicee.com\/en\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/","title":{"rendered":"Phishing : enjeux, d\u00e9fis et perspectives"},"content":{"rendered":"<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7f86acfc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<p>Teams of <a href=\"https:\/\/www.teicee.com\/en\/\">t\u00e9\u00efc\u00e9e<\/a> ont particip\u00e9 \u00e0 la journ\u00e9e d\u00e9di\u00e9e \u00e0 la lutte contre de phishing de l\u2019<a href=\"https:\/\/appelcyberjuin.sciencesconf.org\/?lang=fr\">Appel du Cyber Juin 2025<\/a> le 3 juillet dernier. La seconde \u00e9dition de cet \u00e9v\u00e9nement incontournable r\u00e9unit les principaux acteurs normands de la cybers\u00e9curit\u00e9, de la recherche et du num\u00e9rique.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">t\u00e9\u00efc\u00e9e engag\u00e9e dans l\u2019Appel du Cyber Juin\u202f: une mobilisation collective contre la menace cyber !<\/h2>\n\n\n\n<p>Inspir\u00e9e de l&rsquo;<a href=\"https:\/\/www.info.gouv.fr\/actualite\/lappel-du-18-juin-du-general-de-gaulle\">appel du 18 juin<\/a>, \u00ab l&rsquo;Appel du Cyber Juin \u00bb s&rsquo;inscrit dans le contexte des comm\u00e9morations du 81\u1d49 anniversaire du D\u00e9barquement. Cette initiative r\u00e9pond \u00e0 une urgence majeure: le niveau de la menace informatique ne cesse de cro\u00eetre; les tensions g\u00e9opolitiques s&rsquo;\u00e9l\u00e8vent constamment et les <a href=\"https:\/\/cyber.gouv.fr\/le-panorama-de-la-cybermenace\">cyberattaques<\/a> gagnent en sophistication.<\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-09995e43\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>L\u2019 Appel du Cyber Juin mobilise la soci\u00e9t\u00e9 \u2014 grand public, professionnels, \u00e9tudiants et collectivit\u00e9s \u2014 autour d\u2019objectifs communs : <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Sensibiliser <\/strong>aux risques d\u2019origine cyber<\/li>\n\n\n\n<li><strong>Valoriser <\/strong>l\u2019\u00e9cosyst\u00e8me normand et les m\u00e9tiers de la cybers\u00e9curit\u00e9<\/li>\n\n\n\n<li><strong>Partager <\/strong>innovations, id\u00e9es et retours d\u2019exp\u00e9rience<\/li>\n\n\n\n<li><strong>Attirer <\/strong>de nouveaux talents vers ce secteur d\u2019avenir<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"336\" height=\"464\" src=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/LogoAppelCyberJuin.png\" alt=\"Logo de l'Appel du Cyber Juin\" class=\"wp-image-2610\" style=\"width:158px;height:auto\" srcset=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/LogoAppelCyberJuin.png 336w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/LogoAppelCyberJuin-217x300.png 217w\" sizes=\"auto, (max-width: 336px) 100vw, 336px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Cet \u00e9v\u00e9nement, d\u00e9clin\u00e9 dans toute la Normandie du 10 juin au 4 juillet 2025, propose sensibilisations, conf\u00e9rences, d\u00e9monstrations d\u2019innovations, exercices de s\u00e9curit\u00e9, universit\u00e9 d\u2019\u00e9t\u00e9, et bien plus encore&nbsp;!<\/p>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Un focus sur la lutte contre le phishing\u202f<\/strong><\/h2>\n\n\n\n<p>Cette journ\u00e9e \u00e9tait port\u00e9e par plusieurs laboratoires de recherche en informatique associ\u00e9s \u00e0 des entreprises sp\u00e9cialis\u00e9es dans la protection contre le phishing. L&rsquo;objectif est ambitieux : f\u00e9d\u00e9rer tous les acteurs du secteur : entreprises, institutionnels, start-ups et universitaires sont tous concern\u00e9s. Cette mobilisation a permis de partager travaux de recherche, expertise et bonnes pratiques. Ainsi, elle d\u00e9veloppe des solutions contre la mont\u00e9e du phishing et d\u2019autres menaces num\u00e9riques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conf\u00e9rences d\u00e9di\u00e9es \u00e0 la cybers\u00e9curit\u00e9<\/h3>\n\n\n\n<p>Cet \u00e9v\u00e9nement fut marqu\u00e9 par diff\u00e9rentes conf\u00e9rences d\u00e9di\u00e9es \u00e0 la cybers\u00e9curit\u00e9. Les experts du domaine y ont pr\u00e9sent\u00e9 les derni\u00e8res avanc\u00e9es techniques. Ces \u00e9changes ont port\u00e9 sur la d\u00e9tection, la protection et la sensibilisation aux cybermenaces, et t\u00e9\u00efc\u00e9e a eu l\u2019honneur d\u2019y contribuer.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Le programme&nbsp;:<\/h4>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<ul class=\"wp-block-list\">\n<li>14h00 &#8211; Accueil par Christophe Rosenberger, ENSICAEN &#8211; <a href=\"https:\/\/www.greyc.fr\/\">GREYC<\/a><\/li>\n\n\n\n<li>14h10 &#8211; Introduction sur le phishing par Emmanuel Giguet, <a href=\"https:\/\/www.cnrs.fr\/fr\">CNRS<\/a> &#8211; <a href=\"https:\/\/www.greyc.fr\/\">GREYC<\/a><\/li>\n\n\n\n<li>14h30 &#8211; Impact du phishing pour un RSSI par V\u00e9ronique Gauthier, <a href=\"https:\/\/www.unicaen.fr\/recherche\/\">UNICAEN<\/a><\/li>\n\n\n\n<li>15h00 &#8211; M\u00e9canismes utilis\u00e9s par les attaquants par Antony Dalmiere, <a href=\"https:\/\/www.laas.fr\/fr\/\">LAAS<\/a> (en visioconf\u00e9rence)<\/li>\n\n\n\n<li>15h20 &#8211; Protection par analyse des mails par Armand-Florent Tsafak Puigie, t\u00e9\u00efc\u00e9e &#8211; <a href=\"https:\/\/www.greyc.fr\/\">GREYC<\/a><\/li>\n\n\n\n<li>15h50 &#8211; Protection des emails par analyse contextuelle en mode ZeroTrust par Vincent Regnard, <a href=\"https:\/\/www.blokkus.fr\/\">BLOKKUS<\/a><\/li>\n\n\n\n<li>16h20 &#8211; Protection par sensibilisation des utilisateurs par <a href=\"https:\/\/avantdecliquer.com\/\">AVANT DE CLIQUER<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/phishing-enjeux-defis-perspectives-markus-winkler-1024x683.jpg\" alt=\"Phishing : enjeux, d\u00e9fis et perspectives\" class=\"wp-image-2605\" srcset=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/phishing-enjeux-defis-perspectives-markus-winkler-1024x683.jpg 1024w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/phishing-enjeux-defis-perspectives-markus-winkler-300x200.jpg 300w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/phishing-enjeux-defis-perspectives-markus-winkler-768x512.jpg 768w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/phishing-enjeux-defis-perspectives-markus-winkler-1536x1024.jpg 1536w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/phishing-enjeux-defis-perspectives-markus-winkler-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">                 Cr\u00e9dits : Markus Winkler, Pexel<\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h5 class=\"wp-block-heading\">L&rsquo;expertise de t\u00e9\u00efc\u00e9e en d\u00e9tection de phishing<\/h5>\n\n\n\n<p>L&rsquo;entreprise s&rsquo;appuie sur son exp\u00e9rience reconnue dans les logiciels libres d\u00e9di\u00e9s \u00e0 la cybers\u00e9curit\u00e9. De plus, t\u00e9\u00efc\u00e9e dispose d&rsquo;une expertise unique. Elle a \u00e9t\u00e9 d\u00e9velopp\u00e9e autour d&rsquo;une th\u00e8se de recherche qui porte sur la d\u00e9tection automatique des e-mails de phishing. Elle se concentre sur l&rsquo;int\u00e9gration de ces solutions au sein des outils de messageries \u00e9lectroniques.<\/p>\n\n\n\n<p>Cet enjeu repr\u00e9sente un d\u00e9fi strat\u00e9gique majeur. Il vise \u00e0 renforcer la protection des entreprises et des utilisateurs. Les attaques de phishing devenant toujours plus sophistiqu\u00e9es.<\/p>\n\n\n\n<p>Nos experts\u202fMathieu Valois et Armand-Florent Tsafak Puigie, accompagn\u00e9s de Philippe Chauvat et Albane L\u2019Huissier ont \u00e9t\u00e9 ravis d&rsquo;\u00e9changer avec vous autour d\u2019un moment de convivialit\u00e9.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"766\" height=\"766\" data-id=\"2609\" src=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/mathieu-valois.png\" alt=\"Photo de Mathieu Valois, Responsable du p\u00f4le Syst\u00e8mes, R\u00e9seaux et S\u00e9curit\u00e9\" class=\"wp-image-2609\" srcset=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/mathieu-valois.png 766w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/mathieu-valois-300x300.png 300w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/mathieu-valois-150x150.png 150w\" sizes=\"auto, (max-width: 766px) 100vw, 766px\" \/><\/figure>\n<\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/Armand-Florent-Tsafak-Puigie-1-1024x1024.png\" alt=\"Photo d'Armand-Florent TSAFAK PUIGIE, doctorant chez t\u00e9\u00efc\u00e9e.\" class=\"wp-image-2607\" srcset=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/Armand-Florent-Tsafak-Puigie-1-1024x1024.png 1024w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/Armand-Florent-Tsafak-Puigie-1-300x300.png 300w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/Armand-Florent-Tsafak-Puigie-1-150x150.png 150w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/Armand-Florent-Tsafak-Puigie-1-768x769.png 768w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/Armand-Florent-Tsafak-Puigie-1-1536x1536.png 1536w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/Armand-Florent-Tsafak-Puigie-1-2048x2048.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"521\" height=\"529\" src=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/08\/PORTRAIT-DETOURE-PhilippeChauvat-3.png\" alt=\"\" class=\"wp-image-2654\" srcset=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/08\/PORTRAIT-DETOURE-PhilippeChauvat-3.png 521w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/08\/PORTRAIT-DETOURE-PhilippeChauvat-3-295x300.png 295w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/08\/PORTRAIT-DETOURE-PhilippeChauvat-3-12x12.png 12w\" sizes=\"auto, (max-width: 521px) 100vw, 521px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"766\" height=\"766\" src=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/albane-l-huissier.png\" alt=\"Photo d'Albane L'Huissier, en charge du commerce,  du marketing et de la communication\" class=\"wp-image-2606\" srcset=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/albane-l-huissier.png 766w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/albane-l-huissier-300x300.png 300w, https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/albane-l-huissier-150x150.png 150w\" sizes=\"auto, (max-width: 766px) 100vw, 766px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading\">t\u00e9\u00efc\u00e9e au c\u0153ur de l\u2019\u00e9cosyst\u00e8me Open Source et <em>cyber<\/em><\/h4>\n\n\n\n<p>En tant qu\u2019entreprise de services num\u00e9riques (ESN) sp\u00e9cialis\u00e9e dans l\u2019int\u00e9gration et le d\u00e9veloppement de solutions libres et Open Source, t\u00e9\u00efc\u00e9e s\u2019engage depuis ses d\u00e9buts pour un num\u00e9rique s\u00fbr, \u00e9thique et ma\u00eetris\u00e9. Prot\u00e9ger nos clients contre le phishing, c\u2019est respecter nos valeurs fondamentales et proposer des alternatives num\u00e9riques souveraines et transparentes face aux cyber-risques d&rsquo;aujourd&rsquo;hui et de demain.<\/p>\n\n\n\n<p>L\u2019engagement de t\u00e9\u00efc\u00e9e dans l\u2019\u00e9cosyst\u00e8me cybers\u00e9curit\u00e9 s\u2019illustre par des actions concr\u00e8tes. Nous pla\u00e7ons la s\u00e9curit\u00e9 au c\u0153ur de notre mission, en unissant avanc\u00e9es technologiques, expertise humaine et p\u00e9dagogie, pour r\u00e9pondre aux d\u00e9fis actuels des organisations.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Un investissement fort dans la recherche appliqu\u00e9e<\/strong> <\/li>\n<\/ul>\n\n\n\n<p>Notre soutien \u00e0 une th\u00e8se CIFRE men\u00e9e par notre doctorant illustre notre volont\u00e9 d\u2019avancer sur des enjeux majeurs. Ses travaux explorent le potentiel de l\u2019intelligence artificielle pour d\u00e9tecter les tentatives de phishing. De plus, ils permettent d\u2019automatiser l\u2019analyse des courriels et d\u2019am\u00e9liorer la d\u00e9tection des menaces. Cet engagement contribue \u00e0 faire progresser les connaissances scientifiques et \u00e0 renforcer concr\u00e8tement la s\u00e9curit\u00e9 de nos solutions.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>La p\u00e9dagogie par l\u2019exp\u00e9rimentation\u202f: le serious game \u00ab\u00a0Drakkey Tale<\/strong>\u00ab\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Le facteur humain restant au c\u0153ur de la cybers\u00e9curit\u00e9, nous avons d\u00e9velopp\u00e9 un serious game d\u00e9di\u00e9 \u00e0 la sensibilisation des utilisateurs&nbsp;: Drakkey Tale. Ce jeu interactif, pens\u00e9 pour tous les publics, permet de s\u2019initier de fa\u00e7on ludique et efficace aux bons r\u00e9flexes face aux attaques num\u00e9riques. Il illustre parfaitement notre approche\u202f: combiner innovation technologique et actions concr\u00e8tes pour une protection globale.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Des solutions Open Source et un accompagnement expert<\/strong><\/li>\n<\/ul>\n\n\n\n<p>De plus, notre p\u00f4le \u00ab\u00a0syst\u00e8mes, r\u00e9seaux et s\u00e9curit\u00e9\u00a0\u00bb propose \u00e0 nos clients des solutions robustes et libres. Notamment, nous proposons Proxmox pour la virtualisation, Vaultwarden pour les mots de passe, Bacula pour la sauvegarde, et Wazuh, PacketFence, OPNsense et WAPT pour la supervision et la s\u00e9curit\u00e9 du parc informatique.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">CONTACT<\/h5>\n\n\n\n<p>Un projet en t\u00eate, une question sur nos services ou envie d\u2019\u00e9changer\u202f? <\/p>\n\n\n\n<p>\u00c9crivez-nous \u00e0 <a href=\"mailto:teamcyber@teicee.com\">teamcyber<\/a><a href=\"mailto:contact@teicee.com\">@teicee.com<\/a> ou contactez-nous par t\u00e9l\u00e9phone au 02 72 34 13 20.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Les \u00e9quipes de t\u00e9\u00efc\u00e9e ont particip\u00e9 \u00e0 la journ\u00e9e d\u00e9di\u00e9e \u00e0 la lutte contre de phishing de l\u2019Appel du Cyber Juin 2025 le 3 juillet dernier. La seconde \u00e9dition de cet \u00e9v\u00e9nement incontournable r\u00e9unit les principaux acteurs normands de la cybers\u00e9curit\u00e9, de la recherche et du num\u00e9rique. t\u00e9\u00efc\u00e9e engag\u00e9e dans l\u2019Appel du Cyber Juin\u202f: une [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":2696,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[1],"tags":[39,6],"class_list":["post-2578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-developpement","tag-cyber-securite","tag-systemes-securite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing : enjeux, d\u00e9fis et perspectives - t\u00e9\u00efc\u00e9e<\/title>\n<meta name=\"description\" content=\"Appel du Cyber Juin : t\u00e9\u00efc\u00e9e participe \u00e0 la journ\u00e9e de lutte contre le phishing le 3 juillet et y pr\u00e9sente ses travaux de recherche.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.teicee.com\/en\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing : enjeux, d\u00e9fis et perspectives - t\u00e9\u00efc\u00e9e\" \/>\n<meta property=\"og:description\" content=\"Appel du Cyber Juin : t\u00e9\u00efc\u00e9e participe \u00e0 la journ\u00e9e de lutte contre le phishing le 3 juillet et y pr\u00e9sente ses travaux de recherche.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.teicee.com\/en\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/\" \/>\n<meta property=\"og:site_name\" content=\"t\u00e9\u00efc\u00e9e\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/teicee\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-07T08:49:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-26T13:39:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Albane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Albane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/\"},\"author\":{\"name\":\"Albane\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#\\\/schema\\\/person\\\/971238ab1517ade95c4a6edca6f2977c\"},\"headline\":\"Phishing : enjeux, d\u00e9fis et perspectives\",\"datePublished\":\"2025-07-07T08:49:32+00:00\",\"dateModified\":\"2025-09-26T13:39:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/\"},\"wordCount\":1004,\"publisher\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/iStock-1069718604-scaled.jpg\",\"keywords\":[\"cyber s\u00e9curit\u00e9\",\"Syst\u00e8mes &amp; s\u00e9curit\u00e9\"],\"articleSection\":[\"d\u00e9veloppement\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/\",\"name\":\"Phishing : enjeux, d\u00e9fis et perspectives - t\u00e9\u00efc\u00e9e\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/iStock-1069718604-scaled.jpg\",\"datePublished\":\"2025-07-07T08:49:32+00:00\",\"dateModified\":\"2025-09-26T13:39:56+00:00\",\"description\":\"Appel du Cyber Juin : t\u00e9\u00efc\u00e9e participe \u00e0 la journ\u00e9e de lutte contre le phishing le 3 juillet et y pr\u00e9sente ses travaux de recherche.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/iStock-1069718604-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/iStock-1069718604-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Cybersecurity concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.teicee.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing : enjeux, d\u00e9fis et perspectives\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#website\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/\",\"name\":\"t\u00e9\u00efc\u00e9e\",\"description\":\"La raison de votre confiance\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.teicee.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#organization\",\"name\":\"t\u00e9\u00efc\u00e9e\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/teicee-300dpi-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.teicee.com\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/teicee-300dpi-scaled.jpg\",\"width\":2560,\"height\":1163,\"caption\":\"t\u00e9\u00efc\u00e9e\"},\"image\":{\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/teicee\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/t-c-e\\\/\",\"https:\\\/\\\/www.instagram.com\\\/teicee_fr\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.teicee.com\\\/#\\\/schema\\\/person\\\/971238ab1517ade95c4a6edca6f2977c\",\"name\":\"Albane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/57d6b1974fae93ea54fa49b71e77e3ed19f29aea5222d04e3a719bb0938f0f1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/57d6b1974fae93ea54fa49b71e77e3ed19f29aea5222d04e3a719bb0938f0f1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/57d6b1974fae93ea54fa49b71e77e3ed19f29aea5222d04e3a719bb0938f0f1b?s=96&d=mm&r=g\",\"caption\":\"Albane\"},\"url\":\"https:\\\/\\\/www.teicee.com\\\/en\\\/author\\\/alhuissier\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing : enjeux, d\u00e9fis et perspectives - t\u00e9\u00efc\u00e9e","description":"Appel du Cyber Juin : t\u00e9\u00efc\u00e9e participe \u00e0 la journ\u00e9e de lutte contre le phishing le 3 juillet et y pr\u00e9sente ses travaux de recherche.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.teicee.com\/en\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/","og_locale":"en_GB","og_type":"article","og_title":"Phishing : enjeux, d\u00e9fis et perspectives - t\u00e9\u00efc\u00e9e","og_description":"Appel du Cyber Juin : t\u00e9\u00efc\u00e9e participe \u00e0 la journ\u00e9e de lutte contre le phishing le 3 juillet et y pr\u00e9sente ses travaux de recherche.","og_url":"https:\/\/www.teicee.com\/en\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/","og_site_name":"t\u00e9\u00efc\u00e9e","article_publisher":"https:\/\/www.facebook.com\/teicee","article_published_time":"2025-07-07T08:49:32+00:00","article_modified_time":"2025-09-26T13:39:56+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-scaled.jpg","type":"image\/jpeg"}],"author":"Albane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Albane","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/#article","isPartOf":{"@id":"https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/"},"author":{"name":"Albane","@id":"https:\/\/www.teicee.com\/#\/schema\/person\/971238ab1517ade95c4a6edca6f2977c"},"headline":"Phishing : enjeux, d\u00e9fis et perspectives","datePublished":"2025-07-07T08:49:32+00:00","dateModified":"2025-09-26T13:39:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/"},"wordCount":1004,"publisher":{"@id":"https:\/\/www.teicee.com\/#organization"},"image":{"@id":"https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/#primaryimage"},"thumbnailUrl":"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-scaled.jpg","keywords":["cyber s\u00e9curit\u00e9","Syst\u00e8mes &amp; s\u00e9curit\u00e9"],"articleSection":["d\u00e9veloppement"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/","url":"https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/","name":"Phishing : enjeux, d\u00e9fis et perspectives - t\u00e9\u00efc\u00e9e","isPartOf":{"@id":"https:\/\/www.teicee.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/#primaryimage"},"image":{"@id":"https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/#primaryimage"},"thumbnailUrl":"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-scaled.jpg","datePublished":"2025-07-07T08:49:32+00:00","dateModified":"2025-09-26T13:39:56+00:00","description":"Appel du Cyber Juin : t\u00e9\u00efc\u00e9e participe \u00e0 la journ\u00e9e de lutte contre le phishing le 3 juillet et y pr\u00e9sente ses travaux de recherche.","breadcrumb":{"@id":"https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/#primaryimage","url":"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-scaled.jpg","contentUrl":"https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-scaled.jpg","width":2560,"height":1707,"caption":"Cybersecurity concept"},{"@type":"BreadcrumbList","@id":"https:\/\/www.teicee.com\/teicee-participe-a-la-journee-de-lutte-contre-le-phishing-de-l-appel-du-cyber-juin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.teicee.com\/"},{"@type":"ListItem","position":2,"name":"Phishing : enjeux, d\u00e9fis et perspectives"}]},{"@type":"WebSite","@id":"https:\/\/www.teicee.com\/#website","url":"https:\/\/www.teicee.com\/","name":"t\u00e9\u00efc\u00e9e","description":"La raison de votre confiance","publisher":{"@id":"https:\/\/www.teicee.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.teicee.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.teicee.com\/#organization","name":"t\u00e9\u00efc\u00e9e","url":"https:\/\/www.teicee.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.teicee.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/02\/teicee-300dpi-scaled.jpg","contentUrl":"https:\/\/www.teicee.com\/wp-content\/uploads\/2023\/02\/teicee-300dpi-scaled.jpg","width":2560,"height":1163,"caption":"t\u00e9\u00efc\u00e9e"},"image":{"@id":"https:\/\/www.teicee.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/teicee","https:\/\/www.linkedin.com\/company\/t-c-e\/","https:\/\/www.instagram.com\/teicee_fr\/"]},{"@type":"Person","@id":"https:\/\/www.teicee.com\/#\/schema\/person\/971238ab1517ade95c4a6edca6f2977c","name":"Albane","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/57d6b1974fae93ea54fa49b71e77e3ed19f29aea5222d04e3a719bb0938f0f1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57d6b1974fae93ea54fa49b71e77e3ed19f29aea5222d04e3a719bb0938f0f1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57d6b1974fae93ea54fa49b71e77e3ed19f29aea5222d04e3a719bb0938f0f1b?s=96&d=mm&r=g","caption":"Albane"},"url":"https:\/\/www.teicee.com\/en\/author\/alhuissier\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-scaled.jpg",2560,1707,false],"thumbnail":["https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-150x150.jpg",150,150,true],"medium":["https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-768x512.jpg",768,512,true],"large":["https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-2048x1365.jpg",2048,1365,true],"trp-custom-language-flag":["https:\/\/www.teicee.com\/wp-content\/uploads\/2025\/07\/iStock-1069718604-18x12.jpg",18,12,true]},"uagb_author_info":{"display_name":"Albane","author_link":"https:\/\/www.teicee.com\/en\/author\/alhuissier\/"},"uagb_comment_info":0,"uagb_excerpt":"Les \u00e9quipes de t\u00e9\u00efc\u00e9e ont particip\u00e9 \u00e0 la journ\u00e9e d\u00e9di\u00e9e \u00e0 la lutte contre de phishing de l\u2019Appel du Cyber Juin 2025 le 3 juillet dernier. La seconde \u00e9dition de cet \u00e9v\u00e9nement incontournable r\u00e9unit les principaux acteurs normands de la cybers\u00e9curit\u00e9, de la recherche et du num\u00e9rique. t\u00e9\u00efc\u00e9e engag\u00e9e dans l\u2019Appel du Cyber Juin\u202f: une&hellip;","_links":{"self":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/posts\/2578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/comments?post=2578"}],"version-history":[{"count":25,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/posts\/2578\/revisions"}],"predecessor-version":[{"id":2710,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/posts\/2578\/revisions\/2710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/media\/2696"}],"wp:attachment":[{"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/media?parent=2578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/categories?post=2578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.teicee.com\/en\/wp-json\/wp\/v2\/tags?post=2578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}