{"id":51644,"date":"2024-12-04T10:49:57","date_gmt":"2024-12-04T09:49:57","guid":{"rendered":"https:\/\/ihedn.fr\/?page_id=51644"},"modified":"2026-03-17T09:16:51","modified_gmt":"2026-03-17T08:16:51","slug":"majeure-souverainete-numerique-cybersecurite-snc","status":"publish","type":"page","link":"https:\/\/ihedn.fr\/en\/se-former\/session-nationale\/majeure-souverainete-numerique-cybersecurite-snc\/","title":{"rendered":"Digital Sovereignty &amp; Cybersecurity Major (SNC)"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"51644\" class=\"elementor elementor-51644\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-d874ec5 e-con-full e-flex e-con e-child\" data-id=\"d874ec5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b521aa2 elementor-widget__width-inherit elementor-widget-tablet__width-initial elementor-widget elementor-widget-heading\" data-id=\"b521aa2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Digital sovereignty &amp; cybersecurity major<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e916770 elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"e916770\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-6ed5d5c e-flex e-con-boxed e-con e-child\" data-id=\"6ed5d5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b330b29 elementor-align-left elementor-widget elementor-widget-breadcrumbs\" data-id=\"b330b29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/ihedn.fr\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-a1b9485 e-con-full e-flex e-con e-parent\" data-id=\"a1b9485\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64f2b8b elementor-widget elementor-widget-text-editor\" data-id=\"64f2b8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #000091;\">Aimed at high-level managers wishing to enhance their skills in the fields of digital sovereignty and cybersecurity.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-2883fcf e-flex e-con-boxed e-con e-parent\" data-id=\"2883fcf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-19b17af elementor-widget elementor-widget-heading\" data-id=\"19b17af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Issues<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba3ef9e elementor-widget elementor-widget-text-editor\" data-id=\"ba3ef9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Digital transformation is the result of the convergence of new technologies that exploit data that is often sensitive for individuals, businesses and governments.<\/p><p style=\"text-align: left;\">Civilian and military organisations, both public and private, must adapt to deal with the growing number of threats, as predators migrate to the digital space that offers them the best risk\/advantage ratio.<\/p><p style=\"text-align: left;\">The digital field is thus widely used or instrumentalised by States and political entities for the purposes of sabotage, espionage or subversion; as such, it is becoming increasingly important in defence policies.<\/p><p style=\"text-align: left;\">Cybercrime is \"the crime of the 21st century<sup>e\u00a0<\/sup>century\". In its paroxysmal forms, it is akin to cyber-conflictuality, which is currently imperfectly regulated by international law.<\/p><p style=\"text-align: left;\">Collective and collaborative cybersecurity calls for greater public\/private cooperation and more international cooperation; the traditional concept of sovereignty is being called into question in favour of a quest for strategic autonomy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-cdd01b4 e-flex e-con-boxed e-con e-parent\" data-id=\"cdd01b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be06a8e elementor-widget elementor-widget-heading\" data-id=\"be06a8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Objectives<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dad0599 elementor-widget elementor-widget-text-editor\" data-id=\"dad0599\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">The 'Digital Sovereignty and Cybersecurity' major offers excellent training that responds to the current concerns of high-level managers. By combining theory and practice, through meetings with public and private players in cybersecurity, students will be able to :<\/p><ul><li style=\"text-align: left;\">develop a strategic approach to the challenges of cyber defence and cyber security;<\/li><li style=\"text-align: left;\">Understand the role and importance of cyber defence in national defence and how the State has adapted to this new challenge;<\/li><li style=\"text-align: left;\">Understand the nature and scope of the digital transformation and assess its consequences in terms of threats;<\/li><li style=\"text-align: left;\">understand the diversity of interactions between players operating in specific political, legal, ethical or technical fields;<\/li><li style=\"text-align: left;\">examine the driving forces and workings of public decision-making and State action at national, European and international level;<\/li><li style=\"text-align: left;\">take part in a collective reflection, based on the diversity of skills, in the service of the interests of citizens, companies, administrations and, more generally, the nation.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-5e46d98 e-flex e-con-boxed e-con e-parent\" data-id=\"5e46d98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-228d9cd elementor-widget elementor-widget-heading\" data-id=\"228d9cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Course duration<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cc97c7 elementor-widget elementor-widget-text-editor\" data-id=\"3cc97c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">43 days<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-b4ea511 e-flex e-con-boxed e-con e-parent\" data-id=\"b4ea511\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5219fab elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5219fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc90b23 elementor-widget elementor-widget-heading\" data-id=\"cc90b23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contact<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-2987e6a e-flex e-con-boxed e-con e-parent\" data-id=\"2987e6a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-707201b e-con-full e-flex e-con e-child\" data-id=\"707201b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5804032 elementor-widget elementor-widget-text-editor\" data-id=\"5804032\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">If you have any questions about rates or the recruitment process:<\/p><p style=\"text-align: center;\"><a href=\"mailto:recrutement.auditeurs@ihedn.fr\"><strong>recrutement.auditeurs@ihedn.fr<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-173bf0a e-con-full e-flex e-con e-child\" data-id=\"173bf0a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0ee129 elementor-widget elementor-widget-text-editor\" data-id=\"d0ee129\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">For all questions relating to the organisation and content of the major :<\/p><p style=\"text-align: center;\"><a href=\"mailto:sncyber@ihedn.fr\"><strong>sncyber@ihedn.fr<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-298e17a elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"298e17a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e70aa76 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"e70aa76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/demarche.numerique.gouv.fr\/commencer\/candidature-pour-la-session-nationale-de-l-ihedn-2027\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">I would like to apply<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-28bd2d6 e-con-full e-flex e-con e-child\" data-id=\"28bd2d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-280192f elementor-widget elementor-widget-text-editor\" data-id=\"280192f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Last modified on :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f375b1e elementor-widget elementor-widget-text-editor\" data-id=\"f375b1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t17 March 2026\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Majeure souverainet\u00e9 num\u00e9rique &amp; cybers\u00e9curit\u00e9 S&rsquo;adresse \u00e0 des responsables de haut niveau souhaitant enrichir leurs comp\u00e9tences dans les domaines de la souverainet\u00e9 num\u00e9rique et de la cybers\u00e9curit\u00e9. Enjeux La transformation num\u00e9rique r\u00e9sulte de la convergence de nouvelles technologies qui exploitent des donn\u00e9es souvent sensibles pour les individus, les entreprises et les \u00c9tats. Les organisations civiles [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"parent":50295,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-51644","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Majeure souverainet\u00e9 num\u00e9rique &amp; cybers\u00e9curit\u00e9 (SNC) - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale<\/title>\n<meta name=\"description\" content=\"Souverainet\u00e9 num\u00e9rique &amp; cybers\u00e9curit\u00e9 (SNC) est une des 5 majeures de la session nationale de l&#039;IHEDN. Elle s&#039;adresse \u00e0 des responsables de haut niveau souhaitant enrichir leurs comp\u00e9tences dans les domaines de la souverainet\u00e9 num\u00e9rique et de la cybers\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ihedn.fr\/en\/se-former\/session-nationale\/majeure-souverainete-numerique-cybersecurite-snc\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Majeure souverainet\u00e9 num\u00e9rique &amp; cybers\u00e9curit\u00e9 (SNC) - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\" \/>\n<meta property=\"og:description\" content=\"Souverainet\u00e9 num\u00e9rique &amp; cybers\u00e9curit\u00e9 (SNC) est une des 5 majeures de la session nationale de l&#039;IHEDN. Elle s&#039;adresse \u00e0 des responsables de haut niveau souhaitant enrichir leurs comp\u00e9tences dans les domaines de la souverainet\u00e9 num\u00e9rique et de la cybers\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ihedn.fr\/en\/se-former\/session-nationale\/majeure-souverainete-numerique-cybersecurite-snc\/\" \/>\n<meta property=\"og:site_name\" content=\"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ihedn\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T08:16:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@IHEDN\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/se-former\\\/session-nationale\\\/majeure-souverainete-numerique-cybersecurite-snc\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/se-former\\\/session-nationale\\\/majeure-souverainete-numerique-cybersecurite-snc\\\/\",\"name\":\"Majeure souverainet\u00e9 num\u00e9rique & cybers\u00e9curit\u00e9 (SNC) - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\"},\"datePublished\":\"2024-12-04T09:49:57+00:00\",\"dateModified\":\"2026-03-17T08:16:51+00:00\",\"description\":\"Souverainet\u00e9 num\u00e9rique & cybers\u00e9curit\u00e9 (SNC) est une des 5 majeures de la session nationale de l'IHEDN. Elle s'adresse \u00e0 des responsables de haut niveau souhaitant enrichir leurs comp\u00e9tences dans les domaines de la souverainet\u00e9 num\u00e9rique et de la cybers\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/se-former\\\/session-nationale\\\/majeure-souverainete-numerique-cybersecurite-snc\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ihedn.fr\\\/se-former\\\/session-nationale\\\/majeure-souverainete-numerique-cybersecurite-snc\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/se-former\\\/session-nationale\\\/majeure-souverainete-numerique-cybersecurite-snc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/ihedn.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Se former\",\"item\":\"https:\\\/\\\/ihedn.fr\\\/se-former\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Session nationale\",\"item\":\"https:\\\/\\\/ihedn.fr\\\/se-former\\\/session-nationale\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Majeure souverainet\u00e9 num\u00e9rique &#038; cybers\u00e9curit\u00e9 (SNC)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"name\":\"IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale |\",\"description\":\"Site officiel de l&#039;IHEDN plac\u00e9 sous la tutelle du Premier ministre.\",\"publisher\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ihedn.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\",\"name\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"contentUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"width\":500,\"height\":237,\"caption\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ihedn\\\/\",\"https:\\\/\\\/x.com\\\/IHEDN\",\"https:\\\/\\\/www.instagram.com\\\/ihedn\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/school\\\/ihedn\\\/\",\"https:\\\/\\\/fr.wikipedia.org\\\/wiki\\\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Sovereignty &amp; Cybersecurity Major (SNC) - IHEDN: Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","description":"Digital Sovereignty &amp; Cybersecurity (SNC) is one of the 5 majors of the IHEDN national session. It is aimed at high-level officials wishing to enhance their skills in the fields of digital sovereignty and cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ihedn.fr\/en\/se-former\/session-nationale\/majeure-souverainete-numerique-cybersecurite-snc\/","og_locale":"en_GB","og_type":"article","og_title":"Majeure souverainet\u00e9 num\u00e9rique & cybers\u00e9curit\u00e9 (SNC) - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale","og_description":"Souverainet\u00e9 num\u00e9rique & cybers\u00e9curit\u00e9 (SNC) est une des 5 majeures de la session nationale de l'IHEDN. Elle s'adresse \u00e0 des responsables de haut niveau souhaitant enrichir leurs comp\u00e9tences dans les domaines de la souverainet\u00e9 num\u00e9rique et de la cybers\u00e9curit\u00e9.","og_url":"https:\/\/ihedn.fr\/en\/se-former\/session-nationale\/majeure-souverainete-numerique-cybersecurite-snc\/","og_site_name":"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale","article_publisher":"https:\/\/www.facebook.com\/ihedn\/","article_modified_time":"2026-03-17T08:16:51+00:00","twitter_card":"summary_large_image","twitter_site":"@IHEDN","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ihedn.fr\/se-former\/session-nationale\/majeure-souverainete-numerique-cybersecurite-snc\/","url":"https:\/\/ihedn.fr\/se-former\/session-nationale\/majeure-souverainete-numerique-cybersecurite-snc\/","name":"Digital Sovereignty &amp; Cybersecurity Major (SNC) - IHEDN: Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","isPartOf":{"@id":"https:\/\/ihedn.fr\/#website"},"datePublished":"2024-12-04T09:49:57+00:00","dateModified":"2026-03-17T08:16:51+00:00","description":"Digital Sovereignty &amp; Cybersecurity (SNC) is one of the 5 majors of the IHEDN national session. It is aimed at high-level officials wishing to enhance their skills in the fields of digital sovereignty and cybersecurity.","breadcrumb":{"@id":"https:\/\/ihedn.fr\/se-former\/session-nationale\/majeure-souverainete-numerique-cybersecurite-snc\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ihedn.fr\/se-former\/session-nationale\/majeure-souverainete-numerique-cybersecurite-snc\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ihedn.fr\/se-former\/session-nationale\/majeure-souverainete-numerique-cybersecurite-snc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ihedn.fr\/"},{"@type":"ListItem","position":2,"name":"Se former","item":"https:\/\/ihedn.fr\/se-former\/"},{"@type":"ListItem","position":3,"name":"Session nationale","item":"https:\/\/ihedn.fr\/se-former\/session-nationale\/"},{"@type":"ListItem","position":4,"name":"Majeure souverainet\u00e9 num\u00e9rique &#038; cybers\u00e9curit\u00e9 (SNC)"}]},{"@type":"WebSite","@id":"https:\/\/ihedn.fr\/#website","url":"https:\/\/ihedn.fr\/","name":"IHEDN: Institut des hautes \u00e9tudes de d\u00e9fense nationale (Institute for Higher National Defence Studies)","description":"Official website of the IHEDN under the supervision of the Prime Minister.","publisher":{"@id":"https:\/\/ihedn.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ihedn.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ihedn.fr\/#organization","name":"IHEDN - Institute for Higher National Defence Studies","url":"https:\/\/ihedn.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/","url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","contentUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","width":500,"height":237,"caption":"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale"},"image":{"@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ihedn\/","https:\/\/x.com\/IHEDN","https:\/\/www.instagram.com\/ihedn\/","https:\/\/www.linkedin.com\/school\/ihedn\/","https:\/\/fr.wikipedia.org\/wiki\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale"]}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-20 17:37:46","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/pages\/51644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/comments?post=51644"}],"version-history":[{"count":26,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/pages\/51644\/revisions"}],"predecessor-version":[{"id":58896,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/pages\/51644\/revisions\/58896"}],"up":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/pages\/50295"}],"wp:attachment":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/media?parent=51644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}