{"version":"1.0","provider_name":"L&#039;IHEDN: Institut des hautes \u00e9tudes de d\u00e9fense nationale (Institute for Higher National Defence Studies)","provider_url":"https:\/\/ihedn.fr\/en","title":"Souverainet\u00e9 num\u00e9rique et cybers\u00e9curit\u00e9 - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"xa7tPTcKpq\"><a href=\"https:\/\/ihedn.fr\/en\/formation\/souverainete-numerique-et-cybersecurite\/\">Digital sovereignty and cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ihedn.fr\/en\/formation\/souverainete-numerique-et-cybersecurite\/embed\/#?secret=xa7tPTcKpq\" width=\"600\" height=\"338\" title=\"&quot;Digital Sovereignty and Cybersecurity - IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)\" data-secret=\"xa7tPTcKpq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/ihedn.fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/12\/IHEDN-la-plaquette-de-la-majeure-SNC-de-la-session-nationale-IHEDN-2021-bandeau.jpg","thumbnail_width":1000,"thumbnail_height":400,"description":"LA MAJEURE SOUVERAINET\u00c9 NUM\u00c9RIQUE &amp; CYBERS\u00c9CURIT\u00c9 S\u2019ADRESSE \u00c0 DES RESPONSABLES DE HAUT NIVEAU EN QU\u00caTE DE COMP\u00c9TENCES COMPL\u00c9MENTAIRES DANS LA CONDUITE STRAT\u00c9GIQUE DE LEURS MISSIONS. les inscriptions sont closes ENJEUX La transformation num\u00e9rique r\u00e9sulte de la convergence de nouvelles technologies qui exploitent des donn\u00e9es souvent sensibles pour les individus, les entreprises et les \u00c9tats. Les [&hellip;]"}