{"id":26316,"date":"2022-10-11T14:21:11","date_gmt":"2022-10-11T13:21:11","guid":{"rendered":"https:\/\/ihedn.fr\/?p=26316"},"modified":"2023-06-30T13:06:20","modified_gmt":"2023-06-30T12:06:20","slug":"marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite","status":"publish","type":"post","link":"https:\/\/ihedn.fr\/en\/notre-selection\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/","title":{"rendered":"Marc Watin-Augouard :<br>\"cyber-security will increase in quantity and quality\"."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"26316\" class=\"elementor elementor-26316\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-996e535 elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"996e535\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6d85f63\" data-id=\"6d85f63\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a2b2759 elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"a2b2759\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #034b7b;\"><strong>October is European Cyber Security Month. For the past ten years, the institutions of the European Union have been taking advantage of this dedicated period to run awareness-raising campaigns designed to promote and strengthen cybersecurity. Army General (2S) Marc Watin-Augouard, head of the \"Digital Sovereignty and Cybersecurity\" major at the IHEDN, deciphers current developments in this common space in a deteriorating strategic context.<\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2985762 elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"2985762\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is your definition of cyber security? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-685aa4d elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"685aa4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62135b8 elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"62135b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Cybersecurity is the result of the actions of individuals, businesses and local and regional authorities who apply IT hygiene rules through information systems security. It is also the result of the action of services that fight cybercrime. And finally, there is the action taken by all those involved in cyber defence, which is not simply military in nature, but which makes it possible to protect all the digital infrastructures that are essential to the life of the nation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f46395 elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"0f46395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What are the cybersecurity issues involved in protecting our national sovereignty?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28a04fd elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"28a04fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-742dc7d elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"742dc7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Sovereignty is at the heart of cybersecurity, so it's only natural that we should have a national strategy. We cannot rely on others to take action on what is essential for us. On the other hand, France's actions must be part of a more sovereign Europe. If I take the image of the Roman tortoise, where each State protects itself and at the same time protects all the other Member States. Europe must be the sum of skills, knowledge and abilities. This is the major challenge for the years to come: how can we ensure that Europe enables all the Member States to improve their skills and be better protected in terms of cybersecurity?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08d7821 elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"08d7821\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How can Europe contribute to making cyberspace safer at international level?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf474e5 elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf474e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd454f5 elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"fd454f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Europe must reach out to all states that share the same vision of the digital space. Some countries, such as totalitarian states, do not have the same vision as us and do not want to put the citizen at the heart of cybersecurity. With these countries, we cannot talk. On the other hand, with all the others, we can further expand our cooperation to strengthen global cybersecurity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f78f5a4 elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"f78f5a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">To what extent does the deterioration in the strategic context threaten the security of cyberspace? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4772c00 elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4772c00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0ad614 elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"d0ad614\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Let's face it: cyber-security, cyber-crime and cyber-attacks are going to increase in quantity and quality. Quite simply because predators have realised that they need to move into the digital space to produce effects with less risk and more results. We know that this trend will continue to accelerate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4033076 elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"4033076\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What does this mean in practical terms? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f2a9f7 elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7f2a9f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b126ed2 elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"b126ed2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">It's an increase in attacks on systems and an increase in attacks on an extraordinary system, the most sophisticated data processing system in the world, which is also the least protected: our brains. On the one hand, we are going to see more cyber attacks on businesses, local authorities and hospitals. On the other, we will be the victims of cyber attacks, information manipulation and complete distortions of our thinking. This is one of the major challenges of the years to come: how to build a cyber security system that protects each and every one of us, with us, by us and sometimes in spite of us, because individuals are not always aware of what is at stake.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-712e603 elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"712e603\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Are cyber attackers becoming more professional? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dcef33 elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7dcef33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-209cd27 elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"209cd27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Exactly! The evolution of threats is linked to the quality of the perpetrators. In the past, we had isolated \"predators\" who acted alone. Today, we are faced with a structured, industrialised organisation, with groups sharing the work: those who prepare the attack, those who carry it out, those who recycle the proceeds of the attack and finally those who launder the financial proceeds of the attack. There is therefore a division of competences that makes the fight against cybercrime much more difficult in the sense that it is complicated to trace the thread of a cyberattack. It's a game of leapfrog. A first company is attacked. It is used as an entry point to attack another company and then many more before hitting the main target. This system complicates the investigation. When you decide to start with the victim and work your way up to the perpetrator, you lose track because there are too many intermediaries in the cyber-attack set-up.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03bb075 elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"03bb075\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Do we have the resources to prevent this deterioration?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4af033 elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b4af033\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a39bce elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"4a39bce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To counteract this worsening, we need human resources, talent and skills. Today, we are not training enough talent and skills to meet the challenges. This is an absolutely essential and fundamental point. If, from the earliest age, we don't prepare people for the digital transformation we are going through and which is going to accelerate even further in the years to come, then we can be sure that the future will be very different. Then we can be sure that we will be able to put all the technologies on one side and all the legal rules on the other. What we won't have is the essential human resource.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-870da29 elementor-widget elementor-widget-video\" data-id=\"870da29\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/v52DJNpLy3Y&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-808fad3 elementor-hidden-desktop elementor-hidden-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"808fad3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-383d275\" data-id=\"383d275\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dca8a31 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-text-editor\" data-id=\"dca8a31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #034b7b;\"><strong>October is European Cyber Security Month. For the past ten years, the institutions of the European Union have been taking advantage of this dedicated period to run awareness-raising campaigns designed to promote and strengthen cybersecurity. Army General (2S) Marc Watin-Augouard, head of the \"Digital Sovereignty and Cybersecurity\" major at the IHEDN, deciphers current developments in this common space in a deteriorating strategic context.<\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-921c9b5 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-heading\" data-id=\"921c9b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is your definition of cyber security? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47ac208 elementor-hidden-desktop elementor-hidden-tablet elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"47ac208\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bd6199 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-text-editor\" data-id=\"2bd6199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Cybersecurity is the result of the actions of individuals, businesses and local and regional authorities who apply IT hygiene rules through information systems security. It is also the result of the action of services that fight cybercrime. And finally, there is the action taken by all those involved in cyber defence, which is not simply military in nature, but which makes it possible to protect all the digital infrastructures that are essential to the life of the nation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26a33db elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-heading\" data-id=\"26a33db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What are the cybersecurity issues involved in protecting our national sovereignty?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af90fc8 elementor-hidden-desktop elementor-hidden-tablet elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"af90fc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dbe625 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-text-editor\" data-id=\"2dbe625\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Sovereignty is at the heart of cybersecurity, so it's only natural that we should have a national strategy. We cannot rely on others to take action on what is essential for us. On the other hand, France's actions must be part of a more sovereign Europe. If I take the image of the Roman tortoise, where each State protects itself and at the same time protects all the other Member States. Europe must be the sum of skills, knowledge and abilities. This is the major challenge for the years to come: how can we ensure that Europe enables all the Member States to improve their skills and be better protected in terms of cybersecurity?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9acd154 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-heading\" data-id=\"9acd154\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How can Europe contribute to making cyberspace safer at international level?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98266f5 elementor-hidden-desktop elementor-hidden-tablet elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"98266f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9af8f08 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-text-editor\" data-id=\"9af8f08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Europe must reach out to all states that share the same vision of the digital space. Some countries, such as totalitarian states, do not have the same vision as us and do not want to put the citizen at the heart of cybersecurity. With these countries, we cannot talk. On the other hand, with all the others, we can further expand our cooperation to strengthen global cybersecurity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9df52a5 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-heading\" data-id=\"9df52a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">To what extent does the deterioration in the strategic context threaten the security of cyberspace? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f5717f elementor-hidden-desktop elementor-hidden-tablet elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3f5717f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79421e6 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-text-editor\" data-id=\"79421e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Let's face it: cyber-security, cyber-crime and cyber-attacks are going to increase in quantity and quality. Quite simply because predators have realised that they need to move into the digital space to produce effects with less risk and more results. We know that this trend will continue to accelerate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d2fe8d elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-heading\" data-id=\"3d2fe8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What does this mean in practical terms? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb4af11 elementor-hidden-desktop elementor-hidden-tablet elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fb4af11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50c8dbf elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-text-editor\" data-id=\"50c8dbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">It's an increase in attacks on systems and an increase in attacks on an extraordinary system, the most sophisticated data processing system in the world, which is also the least protected: our brains. On the one hand, we are going to see more cyber attacks on businesses, local authorities and hospitals. On the other, we will be the victims of cyber attacks, information manipulation and complete distortions of our thinking. This is one of the major challenges of the years to come: how to build a cyber security system that protects each and every one of us, with us, by us and sometimes in spite of us, because individuals are not always aware of what is at stake.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6ef99e elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-heading\" data-id=\"e6ef99e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Are cyber attackers becoming more professional? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91b36f7 elementor-hidden-desktop elementor-hidden-tablet elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"91b36f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9802138 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-text-editor\" data-id=\"9802138\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Exactly! The evolution of threats is linked to the quality of the perpetrators. In the past, we had isolated \"predators\" who acted alone. Today, we are faced with a structured, industrialised organisation, with groups sharing the work: those who prepare the attack, those who carry it out, those who recycle the proceeds of the attack and finally those who launder the financial proceeds of the attack. There is therefore a division of competences that makes the fight against cybercrime much more difficult in the sense that it is complicated to trace the thread of a cyberattack. It's a game of leapfrog. A first company is attacked. It is used as an entry point to attack another company and then many more before hitting the main target. This system complicates the investigation. When you decide to start with the victim and work your way up to the perpetrator, you lose track because there are too many intermediaries in the cyber-attack set-up.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b43b03 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-heading\" data-id=\"5b43b03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Do we have the resources to prevent this deterioration?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8897ecd elementor-hidden-desktop elementor-hidden-tablet elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8897ecd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0029a7a elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-text-editor\" data-id=\"0029a7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To counteract this worsening, we need human resources, talent and skills. Today, we are not training enough talent and skills to meet the challenges. This is an absolutely essential and fundamental point. If, from the earliest age, we don't prepare people for the digital transformation we are going through and which is going to accelerate even further in the years to come, then we can be sure that the future will be very different. Then we can be sure that we will be able to put all the technologies on one side and all the legal rules on the other. What we won't have is the essential human resource.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-d41b341 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d41b341\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34fe86f\" data-id=\"34fe86f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a1df7f2 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-video\" data-id=\"a1df7f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/v52DJNpLy3Y&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Octobre est le mois europ\u00e9en de la cybers\u00e9curit\u00e9. Depuis dix ans, les institutions de l\u2019Union europ\u00e9enne profitent de cette p\u00e9riode consacr\u00e9e, pour mener des actions de sensibilisation destin\u00e9es \u00e0 promouvoir et renforcer la cybers\u00e9curit\u00e9. Le g\u00e9n\u00e9ral d\u2019arm\u00e9e (2S) Marc Watin-Augouard, chef de la majeure \u00ab\u00a0souverainet\u00e9 num\u00e9rique et cybers\u00e9curit\u00e9\u00a0\u00bb \u00e0 l\u2019IHEDN, d\u00e9crypte les \u00e9volutions actuelles de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":26377,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[208,41,171],"tags":[],"class_list":["post-26316","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defense-nationale","category-lundis-de-lihedn","category-notre-selection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Marc Watin-Augouard :\u00ab la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9 \u00bb - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale<\/title>\n<meta name=\"description\" content=\"la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9. Depuis dix ans, les institutions de l\u2019Union europ\u00e9enne profitent de cette p\u00e9riode consacr\u00e9e, pour mener des actions de sensibilisation destin\u00e9es \u00e0 promouvoir et renforcer la cybers\u00e9curit\u00e9. Le g\u00e9n\u00e9ral d\u2019arm\u00e9e (2S) Marc Watin-Augouard, chef de la majeure \u00ab souverainet\u00e9 num\u00e9rique et cybers\u00e9curit\u00e9 \u00bb \u00e0 l\u2019IHEDN, d\u00e9crypte les \u00e9volutions actuelles de cet espace commun dans un contexte strat\u00e9gique d\u00e9grad\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Marc Watin-Augouard :\u00ab la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9 \u00bb - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\" \/>\n<meta property=\"og:description\" content=\"la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9. Depuis dix ans, les institutions de l\u2019Union europ\u00e9enne profitent de cette p\u00e9riode consacr\u00e9e, pour mener des actions de sensibilisation destin\u00e9es \u00e0 promouvoir et renforcer la cybers\u00e9curit\u00e9. Le g\u00e9n\u00e9ral d\u2019arm\u00e9e (2S) Marc Watin-Augouard, chef de la majeure \u00ab souverainet\u00e9 num\u00e9rique et cybers\u00e9curit\u00e9 \u00bb \u00e0 l\u2019IHEDN, d\u00e9crypte les \u00e9volutions actuelles de cet espace commun dans un contexte strat\u00e9gique d\u00e9grad\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/\" \/>\n<meta property=\"og:site_name\" content=\"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ihedn\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-11T13:21:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-30T12:06:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IHEDN\" \/>\n<meta name=\"twitter:site\" content=\"@IHEDN\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/\"},\"author\":{\"name\":\"dev\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/person\\\/7a40155595e4efb35323447cb8c8c5a4\"},\"headline\":\"Marc Watin-Augouard : \u00ab la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9 \u00bb\",\"datePublished\":\"2022-10-11T13:21:11+00:00\",\"dateModified\":\"2023-06-30T12:06:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/\"},\"wordCount\":1939,\"publisher\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CYBER_Slider-00-2.jpg\",\"articleSection\":[\"d\u00e9fense nationale\",\"Lundis de l'IHEDN\",\"Notre s\u00e9lection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/\",\"name\":\"Marc Watin-Augouard : \u00ab la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9 \u00bb - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CYBER_Slider-00-2.jpg\",\"datePublished\":\"2022-10-11T13:21:11+00:00\",\"dateModified\":\"2023-06-30T12:06:20+00:00\",\"description\":\"la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9. Depuis dix ans, les institutions de l\u2019Union europ\u00e9enne profitent de cette p\u00e9riode consacr\u00e9e, pour mener des actions de sensibilisation destin\u00e9es \u00e0 promouvoir et renforcer la cybers\u00e9curit\u00e9. Le g\u00e9n\u00e9ral d\u2019arm\u00e9e (2S) Marc Watin-Augouard, chef de la majeure \u00ab souverainet\u00e9 num\u00e9rique et cybers\u00e9curit\u00e9 \u00bb \u00e0 l\u2019IHEDN, d\u00e9crypte les \u00e9volutions actuelles de cet espace commun dans un contexte strat\u00e9gique d\u00e9grad\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CYBER_Slider-00-2.jpg\",\"contentUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CYBER_Slider-00-2.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/ihedn.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Marc Watin-Augouard :\u00ab la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9 \u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"name\":\"IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale |\",\"description\":\"Site officiel de l&#039;IHEDN plac\u00e9 sous la tutelle du Premier ministre.\",\"publisher\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ihedn.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\",\"name\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"contentUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"width\":500,\"height\":237,\"caption\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ihedn\\\/\",\"https:\\\/\\\/x.com\\\/IHEDN\",\"https:\\\/\\\/www.instagram.com\\\/ihedn\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/school\\\/ihedn\\\/\",\"https:\\\/\\\/fr.wikipedia.org\\\/wiki\\\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/person\\\/7a40155595e4efb35323447cb8c8c5a4\",\"name\":\"dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g\",\"caption\":\"dev\"},\"sameAs\":[\"https:\\\/\\\/ihedn.concilium.click\"],\"url\":\"https:\\\/\\\/ihedn.fr\\\/en\\\/author\\\/dev\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Marc Watin-Augouard: \"Cyber-security will increase in quantity and quality\" - L'IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","description":"cyber-security will increase in quantity and quality. For the past ten years, the institutions of the European Union have been taking advantage of this dedicated period to conduct awareness-raising campaigns designed to promote and strengthen cyber security. Army General (2S) Marc Watin-Augouard, head of the \"digital sovereignty and cybersecurity\" major at the IHEDN, deciphers current developments in this common space in a deteriorating strategic context.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/","og_locale":"en_GB","og_type":"article","og_title":"Marc Watin-Augouard :\u00ab la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9 \u00bb - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale","og_description":"la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9. Depuis dix ans, les institutions de l\u2019Union europ\u00e9enne profitent de cette p\u00e9riode consacr\u00e9e, pour mener des actions de sensibilisation destin\u00e9es \u00e0 promouvoir et renforcer la cybers\u00e9curit\u00e9. Le g\u00e9n\u00e9ral d\u2019arm\u00e9e (2S) Marc Watin-Augouard, chef de la majeure \u00ab souverainet\u00e9 num\u00e9rique et cybers\u00e9curit\u00e9 \u00bb \u00e0 l\u2019IHEDN, d\u00e9crypte les \u00e9volutions actuelles de cet espace commun dans un contexte strat\u00e9gique d\u00e9grad\u00e9.","og_url":"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/","og_site_name":"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale","article_publisher":"https:\/\/www.facebook.com\/ihedn\/","article_published_time":"2022-10-11T13:21:11+00:00","article_modified_time":"2023-06-30T12:06:20+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg","type":"image\/jpeg"}],"author":"dev","twitter_card":"summary_large_image","twitter_creator":"@IHEDN","twitter_site":"@IHEDN","twitter_misc":{"Written by":"dev","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/#article","isPartOf":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/"},"author":{"name":"dev","@id":"https:\/\/ihedn.fr\/#\/schema\/person\/7a40155595e4efb35323447cb8c8c5a4"},"headline":"Marc Watin-Augouard : \u00ab la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9 \u00bb","datePublished":"2022-10-11T13:21:11+00:00","dateModified":"2023-06-30T12:06:20+00:00","mainEntityOfPage":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/"},"wordCount":1939,"publisher":{"@id":"https:\/\/ihedn.fr\/#organization"},"image":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/#primaryimage"},"thumbnailUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg","articleSection":["d\u00e9fense nationale","Lundis de l'IHEDN","Notre s\u00e9lection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/","url":"https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/","name":"Marc Watin-Augouard: \"Cyber-security will increase in quantity and quality\" - L'IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","isPartOf":{"@id":"https:\/\/ihedn.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/#primaryimage"},"image":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/#primaryimage"},"thumbnailUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg","datePublished":"2022-10-11T13:21:11+00:00","dateModified":"2023-06-30T12:06:20+00:00","description":"cyber-security will increase in quantity and quality. For the past ten years, the institutions of the European Union have been taking advantage of this dedicated period to conduct awareness-raising campaigns designed to promote and strengthen cyber security. Army General (2S) Marc Watin-Augouard, head of the \"digital sovereignty and cybersecurity\" major at the IHEDN, deciphers current developments in this common space in a deteriorating strategic context.","breadcrumb":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/#primaryimage","url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg","contentUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/marc-watin-augouard-la-cyber-insecurite-va-augmenter-en-quantite-en-qualite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ihedn.fr\/"},{"@type":"ListItem","position":2,"name":"Marc Watin-Augouard :\u00ab la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9 \u00bb"}]},{"@type":"WebSite","@id":"https:\/\/ihedn.fr\/#website","url":"https:\/\/ihedn.fr\/","name":"IHEDN: Institut des hautes \u00e9tudes de d\u00e9fense nationale (Institute for Higher National Defence Studies)","description":"Official website of the IHEDN under the supervision of the Prime Minister.","publisher":{"@id":"https:\/\/ihedn.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ihedn.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ihedn.fr\/#organization","name":"IHEDN - Institute for Higher National Defence Studies","url":"https:\/\/ihedn.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/","url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","contentUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","width":500,"height":237,"caption":"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale"},"image":{"@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ihedn\/","https:\/\/x.com\/IHEDN","https:\/\/www.instagram.com\/ihedn\/","https:\/\/www.linkedin.com\/school\/ihedn\/","https:\/\/fr.wikipedia.org\/wiki\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale"]},{"@type":"Person","@id":"https:\/\/ihedn.fr\/#\/schema\/person\/7a40155595e4efb35323447cb8c8c5a4","name":"dev","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g","caption":"dev"},"sameAs":["https:\/\/ihedn.concilium.click"],"url":"https:\/\/ihedn.fr\/en\/author\/dev\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-06 15:59:23","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/26316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/comments?post=26316"}],"version-history":[{"count":35,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/26316\/revisions"}],"predecessor-version":[{"id":32870,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/26316\/revisions\/32870"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/media\/26377"}],"wp:attachment":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/media?parent=26316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/categories?post=26316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/tags?post=26316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}