{"id":26967,"date":"2022-10-26T09:37:43","date_gmt":"2022-10-26T08:37:43","guid":{"rendered":"https:\/\/ihedn.fr\/?p=26967"},"modified":"2023-06-30T13:13:19","modified_gmt":"2023-06-30T12:13:19","slug":"jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif","status":"publish","type":"post","link":"https:\/\/ihedn.fr\/en\/notre-selection\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/","title":{"rendered":"Jean Peeters :<br>\"cybersecurity, far from being a given, must remain an objective\"."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"26967\" class=\"elementor elementor-26967\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-996e535 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"996e535\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6d85f63\" data-id=\"6d85f63\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a2b2759 elementor-widget elementor-widget-text-editor\" data-id=\"a2b2759\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #034b7b;\"><strong>For many users, digital technology may seem like a virtual world, but the fact remains that it is based on a material layer, with infrastructures that are often cross-border. Jean Peeters, holder of the Cyber and Digital Sovereignty Chair at the IHEDN, deciphers the European Commission's regulatory and legislative recommendations for strengthening cybersecurity in the Member States.<\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2985762 elementor-widget elementor-widget-heading\" data-id=\"2985762\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Today, how can the European Union (EU)<br \/> acting in the field of cyber security?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-685aa4d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"685aa4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62135b8 elementor-widget elementor-widget-text-editor\" data-id=\"62135b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">On 18 October last, the European Commission (EC) proposed<em> strengthen the resilience of critical infrastructures (<\/em><a href=\"https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/fr\/ip_22_6238\"><em>press release<\/em><\/a><em>).<\/em> This proposal is a reminder that cyber security, far from being a given, must remain an objective.  As defined by the<a href=\"https:\/\/www.ssi.gouv.fr\/\">ANSSI<\/a>cybersecurity must be a \"\u00a0<em>the state sought for an information system, enabling it to withstand events originating in cyberspace, likely to compromise the availability, integrity or confidentiality of the data stored, processed or transmitted and the related services that these systems offer or make accessible.<\/em>\u00a0\". It takes note of the evolution of a threat that has become hybrid and sophisticated, as we are seeing with the war in Ukraine and the apparent sabotage of the Nord Stream gas pipelines, as well as other recent incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f46395 elementor-widget elementor-widget-heading\" data-id=\"0f46395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What does this proposal for a recommendation contain?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28a04fd elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"28a04fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-742dc7d elementor-widget elementor-widget-text-editor\" data-id=\"742dc7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">The Commission's proposal for a recommendation is based on a five-point plan for resilient critical infrastructures. It stresses the cross-border nature of digital infrastructures and the interdependence of States, as well as the links between cybersecurity and the physical security of operators. The Recommendation calls on member countries to act as quickly as possible and in a coordinated manner. As it states in its various publications: \"\u00a0<em>society is heavily dependent on both physical and digital infrastructures, and the disruption of essential services, whether as a result of conventional physical attacks, cyber attacks or a combination of the two, can have serious consequences for the well-being of citizens, our economies and the trust placed in our democratic systems<\/em>\u00a0\".<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08d7821 elementor-widget elementor-widget-heading\" data-id=\"08d7821\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">In concrete terms, what are the States being asked to do? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf474e5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf474e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd454f5 elementor-widget elementor-widget-text-editor\" data-id=\"fd454f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Among the 34 recommendations, States are invited to \"carry out or update their risk assessment concerning the resilience of entities operating critical infrastructures in the transport and energy sectors\". They should also \"subject entities operating critical infrastructures to stress tests\". Finally, they must exploit \"the funding opportunities that may exist at EU level\" and \"develop the use of Galileo and\/or Copernicus for surveillance purposes\".<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f78f5a4 elementor-widget elementor-widget-heading\" data-id=\"f78f5a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What are the European Commission's priority areas for action? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4772c00 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4772c00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0ad614 elementor-widget elementor-widget-text-editor\" data-id=\"d0ad614\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">The proposed recommendation gives priority to the key sectors of energy, digital infrastructure, transport and space. It is clear today just how important these sectors would be if they were to be severely impacted by crises of human or environmental origin. To give you an example, it concerns in particular the protection of submarine cables, which criss-cross the globe and carry the bulk of the global internet network. In a hybrid conflict, sabotaging these cables can seriously undermine the operations of several countries.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4033076 elementor-widget elementor-widget-heading\" data-id=\"4033076\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Following this recommendation, what are the next concrete steps? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f2a9f7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7f2a9f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b126ed2 elementor-widget elementor-widget-text-editor\" data-id=\"b126ed2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">The European legal and regulatory framework is expected to be strengthened with the forthcoming adoption of the NIS 2 Directive and the Cyber Resilience Act. However, this regulatory framework is not enough. Today, experience, preparation, anticipation, training, investment and innovation make a massive contribution to the protection of states. France is no slouch in this respect. With the Rugby World Cup coming up in 2023 and the Olympic Games in 2024, we have to be prepared. We will have to face up to numerous risks and attacks, guarantee the safety of goods and people and prove that our place in the top three EU countries in terms of cyber security is well deserved.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Si pour de nombreux utilisateurs le num\u00e9rique ressemble \u00e0 un monde virtuel, il n\u2019en reste pas moins qu\u2019il s\u2019appuie sur une couche mat\u00e9rielle, avec des infrastructures souvent transfrontali\u00e8res. Jean Peeters, titulaire de la Chaire cyber et souverainet\u00e9 num\u00e9rique de l\u2019IHEDN d\u00e9crypte les recommandations de la Commission europ\u00e9enne dans le domaine r\u00e9glementaire et l\u00e9gislatif pour renforcer [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":26377,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[208,41,171],"tags":[],"class_list":["post-26967","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defense-nationale","category-lundis-de-lihedn","category-notre-selection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Jean Peeters :\u00ab la cybers\u00e9curit\u00e9, loin d\u2019\u00eatre un acquis, doit demeurer un objectif \u00bb - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale<\/title>\n<meta name=\"description\" content=\"la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9. Depuis dix ans, les institutions de l\u2019Union europ\u00e9enne profitent de cette p\u00e9riode consacr\u00e9e, pour mener des actions de sensibilisation destin\u00e9es \u00e0 promouvoir et renforcer la cybers\u00e9curit\u00e9. Le g\u00e9n\u00e9ral d\u2019arm\u00e9e (2S) Marc Watin-Augouard, chef de la majeure \u00ab souverainet\u00e9 num\u00e9rique et cybers\u00e9curit\u00e9 \u00bb \u00e0 l\u2019IHEDN, d\u00e9crypte les \u00e9volutions actuelles de cet espace commun dans un contexte strat\u00e9gique d\u00e9grad\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jean Peeters :\u00ab la cybers\u00e9curit\u00e9, loin d\u2019\u00eatre un acquis, doit demeurer un objectif \u00bb - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\" \/>\n<meta property=\"og:description\" content=\"la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9. Depuis dix ans, les institutions de l\u2019Union europ\u00e9enne profitent de cette p\u00e9riode consacr\u00e9e, pour mener des actions de sensibilisation destin\u00e9es \u00e0 promouvoir et renforcer la cybers\u00e9curit\u00e9. Le g\u00e9n\u00e9ral d\u2019arm\u00e9e (2S) Marc Watin-Augouard, chef de la majeure \u00ab souverainet\u00e9 num\u00e9rique et cybers\u00e9curit\u00e9 \u00bb \u00e0 l\u2019IHEDN, d\u00e9crypte les \u00e9volutions actuelles de cet espace commun dans un contexte strat\u00e9gique d\u00e9grad\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/\" \/>\n<meta property=\"og:site_name\" content=\"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ihedn\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-26T08:37:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-30T12:13:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IHEDN\" \/>\n<meta name=\"twitter:site\" content=\"@IHEDN\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/\"},\"author\":{\"name\":\"dev\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/person\\\/7a40155595e4efb35323447cb8c8c5a4\"},\"headline\":\"Jean Peeters : \u00ab la cybers\u00e9curit\u00e9, loin d\u2019\u00eatre un acquis, doit demeurer un objectif \u00bb\",\"datePublished\":\"2022-10-26T08:37:43+00:00\",\"dateModified\":\"2023-06-30T12:13:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/\"},\"wordCount\":741,\"publisher\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CYBER_Slider-00-2.jpg\",\"articleSection\":[\"d\u00e9fense nationale\",\"Lundis de l'IHEDN\",\"Notre s\u00e9lection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/\",\"name\":\"Jean Peeters : \u00ab la cybers\u00e9curit\u00e9, loin d\u2019\u00eatre un acquis, doit demeurer un objectif \u00bb - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CYBER_Slider-00-2.jpg\",\"datePublished\":\"2022-10-26T08:37:43+00:00\",\"dateModified\":\"2023-06-30T12:13:19+00:00\",\"description\":\"la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9. Depuis dix ans, les institutions de l\u2019Union europ\u00e9enne profitent de cette p\u00e9riode consacr\u00e9e, pour mener des actions de sensibilisation destin\u00e9es \u00e0 promouvoir et renforcer la cybers\u00e9curit\u00e9. Le g\u00e9n\u00e9ral d\u2019arm\u00e9e (2S) Marc Watin-Augouard, chef de la majeure \u00ab souverainet\u00e9 num\u00e9rique et cybers\u00e9curit\u00e9 \u00bb \u00e0 l\u2019IHEDN, d\u00e9crypte les \u00e9volutions actuelles de cet espace commun dans un contexte strat\u00e9gique d\u00e9grad\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CYBER_Slider-00-2.jpg\",\"contentUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CYBER_Slider-00-2.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/ihedn.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jean Peeters :\u00ab la cybers\u00e9curit\u00e9, loin d\u2019\u00eatre un acquis, doit demeurer un objectif \u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"name\":\"IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale |\",\"description\":\"Site officiel de l&#039;IHEDN plac\u00e9 sous la tutelle du Premier ministre.\",\"publisher\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ihedn.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\",\"name\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"contentUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"width\":500,\"height\":237,\"caption\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ihedn\\\/\",\"https:\\\/\\\/x.com\\\/IHEDN\",\"https:\\\/\\\/www.instagram.com\\\/ihedn\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/school\\\/ihedn\\\/\",\"https:\\\/\\\/fr.wikipedia.org\\\/wiki\\\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/person\\\/7a40155595e4efb35323447cb8c8c5a4\",\"name\":\"dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g\",\"caption\":\"dev\"},\"sameAs\":[\"https:\\\/\\\/ihedn.concilium.click\"],\"url\":\"https:\\\/\\\/ihedn.fr\\\/en\\\/author\\\/dev\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Jean Peeters: \"Cybersecurity, far from being a given, must remain an objective\" - L'IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","description":"cyber-security will increase in quantity and quality. For the past ten years, the institutions of the European Union have been taking advantage of this dedicated period to conduct awareness-raising campaigns designed to promote and strengthen cyber security. Army General (2S) Marc Watin-Augouard, head of the \"digital sovereignty and cybersecurity\" major at the IHEDN, deciphers current developments in this common space in a deteriorating strategic context.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/","og_locale":"en_GB","og_type":"article","og_title":"Jean Peeters :\u00ab la cybers\u00e9curit\u00e9, loin d\u2019\u00eatre un acquis, doit demeurer un objectif \u00bb - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale","og_description":"la cyber-ins\u00e9curit\u00e9 va augmenter en quantit\u00e9, en qualit\u00e9. Depuis dix ans, les institutions de l\u2019Union europ\u00e9enne profitent de cette p\u00e9riode consacr\u00e9e, pour mener des actions de sensibilisation destin\u00e9es \u00e0 promouvoir et renforcer la cybers\u00e9curit\u00e9. Le g\u00e9n\u00e9ral d\u2019arm\u00e9e (2S) Marc Watin-Augouard, chef de la majeure \u00ab souverainet\u00e9 num\u00e9rique et cybers\u00e9curit\u00e9 \u00bb \u00e0 l\u2019IHEDN, d\u00e9crypte les \u00e9volutions actuelles de cet espace commun dans un contexte strat\u00e9gique d\u00e9grad\u00e9.","og_url":"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/","og_site_name":"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale","article_publisher":"https:\/\/www.facebook.com\/ihedn\/","article_published_time":"2022-10-26T08:37:43+00:00","article_modified_time":"2023-06-30T12:13:19+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg","type":"image\/jpeg"}],"author":"dev","twitter_card":"summary_large_image","twitter_creator":"@IHEDN","twitter_site":"@IHEDN","twitter_misc":{"Written by":"dev","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/#article","isPartOf":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/"},"author":{"name":"dev","@id":"https:\/\/ihedn.fr\/#\/schema\/person\/7a40155595e4efb35323447cb8c8c5a4"},"headline":"Jean Peeters : \u00ab la cybers\u00e9curit\u00e9, loin d\u2019\u00eatre un acquis, doit demeurer un objectif \u00bb","datePublished":"2022-10-26T08:37:43+00:00","dateModified":"2023-06-30T12:13:19+00:00","mainEntityOfPage":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/"},"wordCount":741,"publisher":{"@id":"https:\/\/ihedn.fr\/#organization"},"image":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/#primaryimage"},"thumbnailUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg","articleSection":["d\u00e9fense nationale","Lundis de l'IHEDN","Notre s\u00e9lection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/","url":"https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/","name":"Jean Peeters: \"Cybersecurity, far from being a given, must remain an objective\" - L'IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","isPartOf":{"@id":"https:\/\/ihedn.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/#primaryimage"},"image":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/#primaryimage"},"thumbnailUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg","datePublished":"2022-10-26T08:37:43+00:00","dateModified":"2023-06-30T12:13:19+00:00","description":"cyber-security will increase in quantity and quality. For the past ten years, the institutions of the European Union have been taking advantage of this dedicated period to conduct awareness-raising campaigns designed to promote and strengthen cyber security. Army General (2S) Marc Watin-Augouard, head of the \"digital sovereignty and cybersecurity\" major at the IHEDN, deciphers current developments in this common space in a deteriorating strategic context.","breadcrumb":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/#primaryimage","url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg","contentUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2022\/10\/CYBER_Slider-00-2.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/jean-peeters-la-cybersecurite-loin-detre-un-acquis-doit-demeurer-un-objectif\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ihedn.fr\/"},{"@type":"ListItem","position":2,"name":"Jean Peeters :\u00ab la cybers\u00e9curit\u00e9, loin d\u2019\u00eatre un acquis, doit demeurer un objectif \u00bb"}]},{"@type":"WebSite","@id":"https:\/\/ihedn.fr\/#website","url":"https:\/\/ihedn.fr\/","name":"IHEDN: Institut des hautes \u00e9tudes de d\u00e9fense nationale (Institute for Higher National Defence Studies)","description":"Official website of the IHEDN under the supervision of the Prime Minister.","publisher":{"@id":"https:\/\/ihedn.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ihedn.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ihedn.fr\/#organization","name":"IHEDN - Institute for Higher National Defence Studies","url":"https:\/\/ihedn.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/","url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","contentUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","width":500,"height":237,"caption":"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale"},"image":{"@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ihedn\/","https:\/\/x.com\/IHEDN","https:\/\/www.instagram.com\/ihedn\/","https:\/\/www.linkedin.com\/school\/ihedn\/","https:\/\/fr.wikipedia.org\/wiki\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale"]},{"@type":"Person","@id":"https:\/\/ihedn.fr\/#\/schema\/person\/7a40155595e4efb35323447cb8c8c5a4","name":"dev","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g","caption":"dev"},"sameAs":["https:\/\/ihedn.concilium.click"],"url":"https:\/\/ihedn.fr\/en\/author\/dev\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-06 17:21:01","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/26967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/comments?post=26967"}],"version-history":[{"count":65,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/26967\/revisions"}],"predecessor-version":[{"id":32868,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/26967\/revisions\/32868"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/media\/26377"}],"wp:attachment":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/media?parent=26967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/categories?post=26967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/tags?post=26967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}