{"id":7993,"date":"2023-12-07T20:17:53","date_gmt":"2023-12-08T01:17:53","guid":{"rendered":"https:\/\/www.calian.com\/digital-cyber\/simulation-de-breche-et-dattaque\/"},"modified":"2025-05-28T11:47:06","modified_gmt":"2025-05-28T15:47:06","slug":"breach-and-attack-simulation","status":"publish","type":"page","link":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/","title":{"rendered":"Simulations de cyberattaques"},"content":{"rendered":"\n<div class=\"tbk-hydrate-component\" data-cid=\"8a56e640-509d-476b-a4b5-c1eaef41b276\" data-component=\"MainHeroVideo\"><div class=\"calian-main-hero wp-block-calian-com-components-calian-main-hero-video inverted\"><div class=\"main-hero-video position-relative\"><div class=\"main-hero-video__overlay-top\"><\/div><div class=\"main-hero-video__overlay-left\"><\/div><div class=\"main-hero-video__overlay-general\"><\/div><div class=\"main-hero-video__content container-fluid mw-1195px\"><div class=\"row px-3\"><div class=\"col-12 mw-641px p-0\"><p class=\"main-hero-video__pre-heading text-white fs-4 mb-4\">Renforcez vos d\u00e9fenses en utilisant les<\/p><h1 class=\"main-hero-video__heading text-white mb-4\">Simulations de cyberattaques<\/h1><p class=\"main-hero-video__description text-white subheading mb-5\">Les simulations de cyberattaques sont un \u00e9l\u00e9ment essentiel d&#8217;une strat\u00e9gie de cybers\u00e9curit\u00e9 solide, car elles offrent aux organisations un moyen proactif de tester et de renforcer leurs d\u00e9fenses num\u00e9riques et humaines. En simulant une s\u00e9rie de sc\u00e9narios de cyberattaques, les organisations identifient les vuln\u00e9rabilit\u00e9s, testent l&#8217;efficacit\u00e9 de leurs mesures de s\u00e9curit\u00e9 et forment leur personnel \u00e0 reconna\u00eetre les menaces et \u00e0 y r\u00e9pondre. <\/p><div class=\"main-hero-software__cta-buttons d-flex flex-column flex-sm-row justify-content-start pt-2\"><a href=\"#contact-form\" class=\"btn btn-secondary\">Contacter un expert<\/a><\/div><\/div><\/div><\/div><video src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/iStock-928088128.mp4\" class=\"hero-banner__bg-video\" autoplay=\"\" muted=\"\" playsinline=\"\" loop=\"\"><\/video><button class=\"hero-banner__bg-video-btn btn link-white position-absolute z-3 bottom-0 left-0 d-flex justify-content-center align-items-center fs-9 ms-3 ms-lg-5 mb-3 mb-lg-5 p-1\"><span class=\"icon icon-pause fs-8px me-2\"><\/span>Pause<\/button><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"22358a37-ac38-4200-8717-6903ea244737\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"e8d7c0d5-81f5-448d-8842-c723b3cdaf42\" data-component=\"LocationIntroContent\"><div class=\"calian-location-intro-content wp-block-calian-com-components-calian-location-intro-content\"><div class=\"calian-location-intro-content__container container-fluid\"><div class=\"row\"><div class=\"calian-location-intro-content__top col-12\"><h2 class=\"calian-location-intro-content__heading\">Prot\u00e9gez les donn\u00e9es de votre organisation<\/h2><p class=\"calian-location-intro-content__intro-text\">Notre \u00e9quipe d&#8217;experts en cybers\u00e9curit\u00e9 a r\u00e9alis\u00e9 plus de 900 projets au cours des trois derni\u00e8res ann\u00e9es pour r\u00e9pondre \u00e0 un large \u00e9ventail de d\u00e9fis en mati\u00e8re de cybers\u00e9curit\u00e9. Nous avons des dizaines d&#8217;ann\u00e9es d&#8217;exp\u00e9rience et des dizaines d&#8217;experts en r\u00e9ponse aux incidents de criminalistique num\u00e9rique (DFIR) qui comprennent les tactiques, les techniques et les proc\u00e9dures (TTP) d&#8217;un attaquant.<\/p><\/div><\/div><div class=\"row\"><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"59795961-0142-4095-9dde-0120d23162e1\" data-component=\"StatsBar\"><div class=\"calian-stats-bar theme-dark wp-block-calian-com-components-calian-stats-bar\"><div class=\"container-fluid layout-simple\"><div class=\"row mw-1830px mx-auto\"><div class=\"col-12 col-sm-6 col-lg\"><div><div class=\"d-flex justify-content-center p-1\"><div class=\"spinner-border text-primary \" role=\"status\" style=\"width:3rem;height:3rem\"><span class=\"visually-hidden\">Chargement&#8230;<\/span><\/div><\/div><\/div><\/div><div class=\"col-12 col-sm-6 col-lg\"><div><div class=\"d-flex justify-content-center p-1\"><div class=\"spinner-border text-primary \" role=\"status\" style=\"width:3rem;height:3rem\"><span class=\"visually-hidden\">Chargement&#8230;<\/span><\/div><\/div><\/div><\/div><div class=\"col-12 col-sm-6 col-lg\"><div><div class=\"d-flex justify-content-center p-1\"><div class=\"spinner-border text-primary \" role=\"status\" style=\"width:3rem;height:3rem\"><span class=\"visually-hidden\">Chargement&#8230;<\/span><\/div><\/div><\/div><\/div><div class=\"col-12 col-sm-6 col-lg\"><div><div class=\"d-flex justify-content-center p-1\"><div class=\"spinner-border text-primary \" role=\"status\" style=\"width:3rem;height:3rem\"><span class=\"visually-hidden\">Chargement&#8230;<\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"46af6999-9a09-4e80-b1af-8f0c7cf899c7\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"40ec5712-076c-460f-8260-98ea87921c5d\" data-component=\"AlternatingTextAndImages\"><div class=\"calian-alternating-text-and-images overflow-hidden wp-block-calian-com-components-calian-alternating-text-and-images\"><div class=\"calian-alternating-text-and-images__container container-fluid\"><div class=\"\"><div class=\"row gx-md-6 justify-content-lg-start justify-content-lg-start mb-3 mb-md-9\"><div class=\"col-12 col-md mb-3\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/iStock-1363276415-1024x576.jpg\" alt=\"\" width=\"1024\" height=\"576\" class=\"rounded-5 img-fluid w-100 h-250px h-md-373px object-fit-cover\"\/><\/div><div class=\"col-12 col-md\"><h3>Services de soutien \u00e0 la simulation<\/h3><div class=\"calian-alternating-text-and-images__text mb-3\">Calian soutient les organisations par le biais de simulations de cyberattaques et de services connexes :\n<ul>\n  <li>Exercices sur table<\/li>\n  <li>D\u00e9veloppement de la r\u00e9ponse aux br\u00e8ches cybern\u00e9tiques et aux incidents<\/li>\n  <li>\u00c9quipe rouge et tests de p\u00e9n\u00e9tration \u00e9thiques<\/li>\n  <li>Plans BCP et DRP<\/li>\n  <li>Mod\u00e9lisation des menaces<\/li>\n  <li>Conception de la s\u00e9curit\u00e9 de l&#8217;informatique en nuage<\/li>\n<\/ul><\/div><div class=\"calian-alternating-text-and-images__ctas mb-3 d-flex flex-wrap gap-3\"><a href=\"#contact-form\" class=\"btn btn-primary\">Commencer<\/a><\/div><\/div><\/div><div class=\"row gx-md-6 flex-row-reverse justify-content-lg-between justify-content-lg-start\"><div class=\"col-12 col-md mb-3\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/iStock-1080277602-1024x683.jpeg\" alt=\"\" width=\"1024\" height=\"683\" class=\"rounded-5 img-fluid w-100 h-250px h-md-373px object-fit-cover\"\/><\/div><div class=\"col-12 col-md\"><h3>Simulation de ran\u00e7ongiciel <\/h3><div class=\"calian-alternating-text-and-images__text mb-3\">L&#8217;\u00e9quipe d&#8217;experts en cybers\u00e9curit\u00e9 de Calian a des dizaines d&#8217;ann\u00e9es d&#8217;exp\u00e9rience dans la conduite de simulations de ran\u00e7ongiciels qui renforcent les profils de s\u00e9curit\u00e9 des organisations dans un large \u00e9ventail de march\u00e9s, des soins de sant\u00e9 et de l&#8217;\u00e9ducation \u00e0 la finance et \u00e0 l&#8217;industrie. \n<p>Les simulations de ran\u00e7ongiciels de Calian permettent d&#8217;identifier les vuln\u00e9rabilit\u00e9s et de s&#8217;assurer que votre organisation est pr\u00eate \u00e0 faire face \u00e0 une attaque. Nos experts d\u00e9ploient une bo\u00eete \u00e0 outils de simulation de ran\u00e7on non intrusive sur des \u00e9chantillons d&#8217;actifs cl\u00e9s et notre conseiller en s\u00e9curit\u00e9 collabore avec l&#8217;\u00e9quipe informatique pour observer comment votre d\u00e9fense r\u00e9agit. <\/p><\/div><div class=\"calian-alternating-text-and-images__ctas mb-3 d-flex flex-wrap gap-3\"><a href=\"#contact-form\" class=\"btn btn-primary\">Nous contacter<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"63bd5105-7312-4597-a267-6ca887298146\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"acb619da-86da-4579-aa4c-00b9b761086a\" data-component=\"LogoBar\"><div><div class=\"d-flex justify-content-center p-1\"><div class=\"spinner-border text-primary \" role=\"status\" style=\"width:3rem;height:3rem\"><span class=\"visually-hidden\">Chargement&#8230;<\/span><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"9350883b-d1df-48e8-99c1-53fa4f04d1ac\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"3c04d14b-c1bb-4284-ad92-5ff160487567\" data-component=\"TabbedContent\"><div id=\"tabbed-content-props-7b6435c4-7c7e-4506-ad26-071eba998304\" class=\"calian-tabbed-content position-relative pb-7 pb-lg-12 py-7 pt-lg-11 wp-block-calian-com-components-calian-tabbed-content\" style=\"background-color:#f2f4f4\"><div class=\"container-fluid mw-1260px z-1 position-relative\"><div class=\"row mb-md-4 ms-0 ms-xl-3\"><div class=\"col-12 col-lg-7\"><div class=\"d-flex flex-column gap-3\"><h2 class=\"mb-0\">Processus de simulation<\/h2><p class=\"body-lg mb-0\">Les simulations de ran\u00e7ongiciels comprennent cinq types d&#8217;infection par ran\u00e7ongiciel en fonction de deux profils d&#8217;utilisateurs (utilisateur normal et utilisateur administrateur).<\/p><\/div><\/div><\/div><div class=\"mt-5 mt-md-9\"><\/div><div class=\"row position-relative\"><div class=\"calian-tabbed-content__tabs d-flex z-2 calian-tabbed-content__tabs--horizontal flex-row\"><ul class=\"nav nav-tabs\" role=\"tablist\"><li class=\"nav-item\" role=\"presentation\"><button class=\"nav-link active\" id=\"local-file-encryption-regular-user-tab\" data-bs-toggle=\"tab\" data-bs-target=\"#local-file-encryption-regular-user\" type=\"button\" role=\"tab\" aria-controls=\"local-file-encryption-regular-user\">Cryptage des fichiers locaux (utilisateur normal)<\/button><\/li><li class=\"nav-item\" role=\"presentation\"><button class=\"nav-link\" id=\"network-share-file-encryption-regular-user-tab\" data-bs-toggle=\"tab\" data-bs-target=\"#network-share-file-encryption-regular-user\" type=\"button\" role=\"tab\" aria-controls=\"network-share-file-encryption-regular-user\">Cryptage des fichiers partag\u00e9s en r\u00e9seau (utilisateur r\u00e9gulier)<\/button><\/li><li class=\"nav-item\" role=\"presentation\"><button class=\"nav-link\" id=\"local-file-encryption-admin-user-tab\" data-bs-toggle=\"tab\" data-bs-target=\"#local-file-encryption-admin-user\" type=\"button\" role=\"tab\" aria-controls=\"local-file-encryption-admin-user\">Cryptage des fichiers locaux (utilisateur admin)<\/button><\/li><li class=\"nav-item\" role=\"presentation\"><button class=\"nav-link\" id=\"network-share-file-encryption-admin-user-tab\" data-bs-toggle=\"tab\" data-bs-target=\"#network-share-file-encryption-admin-user\" type=\"button\" role=\"tab\" aria-controls=\"network-share-file-encryption-admin-user\">Cryptage des fichiers partag\u00e9s en r\u00e9seau (utilisateur admin)<\/button><\/li><li class=\"nav-item\" role=\"presentation\"><button class=\"nav-link\" id=\"data-exfiltration-tab\" data-bs-toggle=\"tab\" data-bs-target=\"#data-exfiltration\" type=\"button\" role=\"tab\" aria-controls=\"data-exfiltration\">Exfiltration de donn\u00e9es<\/button><\/li><\/ul><div class=\"tab-content\"><div class=\"tab-pane\" data-title=\"Local file encryption (regular user)\" id=\"local-file-encryption-regular-user\" role=\"tabpanel\" aria-labelledby=\"local-file-encryption-regular-user-tab\"><div class=\"calian-tabbed-content__pane d-flex calian-tabbed-content__pane--2-col flex-column gap-5 gap-md-6 mt-5 mt-md-0\"><div class=\"calian-tabbed-content__images d-flex gap-3 gap-md-5\"><div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_163294142-1024x683.jpeg\" alt=\"\" width=\"1024\" height=\"683\" class=\"img-fluid rounded-5\"\/><\/div><div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_332764841-1024x576.jpeg\" alt=\"\" width=\"1024\" height=\"576\" class=\"img-fluid rounded-5\"\/><\/div><\/div><div class=\"calian-tabbed-content__content order-2 mb-6 mb-lg-0 calian-tabbed-content__content--one-column-list\"><div>Plusieurs fichiers fictifs sont cr\u00e9\u00e9s sur le syst\u00e8me de fichiers et chiffr\u00e9s \u00e0 l&#8217;aide de diff\u00e9rents algorithmes avec les privil\u00e8ges d&#8217;un utilisateur normal. Divers types de fichiers sont pris en compte dans le cadre de ce test, y compris des documents de bureau. <\/div><\/div><\/div><\/div><div class=\"tab-pane\" data-title=\"Network share file encryption (regular user)\" id=\"network-share-file-encryption-regular-user\" role=\"tabpanel\" aria-labelledby=\"network-share-file-encryption-regular-user-tab\"><div class=\"calian-tabbed-content__pane d-flex flex-column gap-5 gap-md-6 mt-5 mt-md-0\"><div class=\"calian-tabbed-content__images d-flex gap-3 gap-md-5\"><div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_375289532-1024x411.jpeg\" alt=\"\" width=\"1024\" height=\"411\" class=\"img-fluid rounded-5\"\/><\/div><div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/Review-and-analysis-woman-looking-at-see-through-data-1024x576.jpeg\" alt=\"Une femme portant des lunettes regarde un &#xE9;cran d'ordinateur.\" width=\"1024\" height=\"576\" class=\"img-fluid rounded-5\"\/><\/div><\/div><div class=\"calian-tabbed-content__content order-3\"><div class=\"\">Plusieurs fichiers fictifs sont cr\u00e9\u00e9s sur le mappage du partage de r\u00e9seau et sont ensuite crypt\u00e9s \u00e0 l&#8217;aide de diff\u00e9rents algorithmes avec les privil\u00e8ges d&#8217;un utilisateur normal. Divers types de fichiers sont pris en compte dans le cadre de ce test, y compris des documents de bureau.<\/div><\/div><\/div><\/div><div class=\"tab-pane\" data-title=\"Local File encryption (admin user)\" id=\"local-file-encryption-admin-user\" role=\"tabpanel\" aria-labelledby=\"local-file-encryption-admin-user-tab\"><div class=\"calian-tabbed-content__pane d-flex flex-column gap-5 gap-md-6 mt-5 mt-md-0\"><div class=\"calian-tabbed-content__images d-flex gap-3 gap-md-5\"><div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/10\/iStock-1310129244.jpg\" alt=\"\" width=\"806\" height=\"434\" class=\"img-fluid rounded-5\"\/><\/div><div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_469390915-1-1024x570.jpeg\" alt=\"\" width=\"1024\" height=\"570\" class=\"img-fluid rounded-5\"\/><\/div><\/div><div class=\"calian-tabbed-content__content order-3\"><div class=\"\">Plusieurs fichiers fictifs sont cr\u00e9\u00e9s sur le syst\u00e8me de fichiers et chiffr\u00e9s \u00e0 l&#8217;aide de diff\u00e9rents algorithmes avec les privil\u00e8ges d&#8217;un utilisateur administrateur. Diff\u00e9rents types de fichiers seront pris en compte dans le cadre de ce test, y compris des documents de bureau.<\/div><\/div><\/div><\/div><div class=\"tab-pane\" data-title=\"Network share file encryption (admin user)\" id=\"network-share-file-encryption-admin-user\" role=\"tabpanel\" aria-labelledby=\"network-share-file-encryption-admin-user-tab\"><div class=\"calian-tabbed-content__pane d-flex flex-column gap-5 gap-md-6 mt-5 mt-md-0\"><div class=\"calian-tabbed-content__images d-flex gap-3 gap-md-5\"><div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/10\/Cyber-Security-Training-1024x683.jpg\" alt=\"Une personne tapant sur un ordinateur portable, assise &#xE0; un bureau. Une toile num&#xE9;rique de r&#xE9;alit&#xE9; virtuelle est &#xE9;clair&#xE9;e au-dessus du clavier.\" width=\"1024\" height=\"683\" class=\"img-fluid rounded-5\"\/><\/div><div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_321371001-1024x576.jpeg\" alt=\"\" width=\"1024\" height=\"576\" class=\"img-fluid rounded-5\"\/><\/div><\/div><div class=\"calian-tabbed-content__content order-3\"><div class=\"\">Plusieurs fichiers fictifs sont cr\u00e9\u00e9s sur le mappage du partage de r\u00e9seau et sont ensuite crypt\u00e9s \u00e0 l&#8217;aide de diff\u00e9rents algorithmes avec les privil\u00e8ges d&#8217;un utilisateur administrateur. Divers types de fichiers sont pris en compte dans le cadre de ce test, y compris des documents de bureau.<\/div><\/div><\/div><\/div><div class=\"tab-pane\" data-title=\"Data exfiltration\" id=\"data-exfiltration\" role=\"tabpanel\" aria-labelledby=\"data-exfiltration-tab\"><div class=\"calian-tabbed-content__pane d-flex flex-column gap-5 gap-md-6 mt-5 mt-md-0\"><div class=\"calian-tabbed-content__images d-flex gap-3 gap-md-5\"><div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_163290525-1024x683.jpeg\" alt=\"\" width=\"1024\" height=\"683\" class=\"img-fluid rounded-5\"\/><\/div><div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/10\/iStock-1310129244.jpg\" alt=\"\" width=\"806\" height=\"434\" class=\"img-fluid rounded-5\"\/><\/div><\/div><div class=\"calian-tabbed-content__content order-3\"><div class=\"\">Cinq gigaoctets (5 Go) de donn\u00e9es fictives sont exfiltr\u00e9s afin de tester les m\u00e9canismes de surveillance du trafic et de s&#8217;assurer qu&#8217;il existe des contr\u00f4les permettant d&#8217;analyser et d&#8217;identifier les pics de trafic sortant.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"da7ab6ee-86a3-44c9-8532-e3ccdebedef2\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"cf6f0b8f-040f-437c-a063-e63d3f88b999\" data-component=\"CTABar\"><div class=\"calian-cta-bar theme-dark wp-block-calian-com-components-calian-cta-bar\"><div class=\"calian-cta-bar__container container-fluid\"><div class=\"calian-cta-bar__horizontal container-fluid\"><div class=\"row\"><div class=\"calian-cta-bar__horizontal--left col-12 col-lg-3 col-xl-2\"><div class=\"calian-cta-bar__horizontal--logo\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/dist\/CalianCTABar-PlaceholderTwo-SXFFARGP.png\" alt=\"\" width=\"180\" height=\"65\" class=\"w-100 h-auto\"\/><\/div><\/div><div class=\"calian-cta-bar__horizontal--center col-12 col-lg-6 col-xl-7\"><div class=\"calian-cta-bar__horizontal--text\"><p>Les simulations de ransomware de Calian reproduisent des attaques r\u00e9elles afin d&#8217;\u00e9valuer et de renforcer vos d\u00e9fenses contre les menaces de ransomware.<\/p><\/div><\/div><div class=\"calian-cta-bar__horizontal--right col-12 col-lg-3 col-xl-3\"><div class=\"calian-cta-bar__horizontal--button\"><a href=\"https:\/\/www.calian.com\/digital-cyber\/brochures\/ransomware-simulation\/\" class=\"btn\" target=\"_blank\" rel=\"noreferrer noopener\">T\u00e9l\u00e9charger la brochure<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"d7401952-ad89-4d98-abb9-37fe177545a4\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"161842e8-df36-4014-b230-76609aba4c27\" data-component=\"AlternatingTextAndImages\"><div class=\"calian-alternating-text-and-images overflow-hidden wp-block-calian-com-components-calian-alternating-text-and-images\"><div class=\"calian-alternating-text-and-images__container container-fluid\"><div class=\"\"><div class=\"row gx-md-6 justify-content-lg-start justify-content-lg-start mb-3 mb-md-9\"><div class=\"col-12 col-md mb-3\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/ISO-27001-certified-businessman-1024x683.jpeg\" alt=\"\" width=\"1024\" height=\"683\" class=\"rounded-5 img-fluid w-100 h-250px h-md-373px object-fit-cover\"\/><\/div><div class=\"col-12 col-md\"><h3>Nous testons vos d\u00e9fenses en simulant une attaque r\u00e9elle avec des \u00e9l\u00e9ments contr\u00f4lables :<\/h3><div class=\"calian-alternating-text-and-images__text mb-3\"><ul>\n  <li>Commandement et contr\u00f4le <\/li>\n  <li>Cryptage  <\/li>\n  <li>Exfiltration de donn\u00e9es<\/li>\n  <li>TTPS avanc\u00e9<\/li>\n  <li>Indicateurs en temps r\u00e9el<\/li>\n  <li>D\u00e9tection hyper pr\u00e9cise<\/li>\n  <li>Renseignements sur les menaces<\/li>\n  <li>R\u00e9ponse automatis\u00e9e \u00e0 la protection<\/li>\n  <li>Processus d&#8217;assainissement<\/li>\n<\/ul><\/div><div class=\"calian-alternating-text-and-images__ctas mb-3 d-flex flex-wrap gap-3\"><a href=\"#contact-form\" class=\"btn btn-primary\">Parler \u00e0 un expert<\/a><\/div><\/div><\/div><div class=\"row gx-md-6 flex-row-reverse justify-content-lg-between justify-content-lg-start mb-3 mb-md-9\"><div class=\"col-12 col-md mb-3\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/business-woman-using-tablet-683x1024.jpeg\" alt=\"Une jeune femme afro-am&#xE9;ricaine utilisant une tablette &#xE9;lectronique dans son bureau.\" width=\"683\" height=\"1024\" class=\"rounded-5 img-fluid w-100 h-250px h-md-373px object-fit-cover\"\/><\/div><div class=\"col-12 col-md\"><h3>Principales caract\u00e9ristiques des simulations de ran\u00e7ongiciels de Calian<\/h3><div class=\"calian-alternating-text-and-images__text mb-3\"><ul>\n  <li><strong>Contr\u00f4le<\/strong> : Ni le r\u00e9seau ni l&#8217;ordinateur sur lequel il est ex\u00e9cut\u00e9 ne seront affect\u00e9s par le ran\u00e7ongiciel. Tous les artefacts ont \u00e9t\u00e9 d\u00e9velopp\u00e9s par Calian.<\/li>\n  <li><strong>Centr\u00e9 sur la technologie<\/strong> : Un membre de l&#8217;\u00e9quipe du client, l&#8217;administrateur du syst\u00e8me ou le personnel de s\u00e9curit\u00e9 surveillera chaque \u00e9tape de l&#8217;ex\u00e9cution de Calian par le biais d&#8217;une session \u00e0 distance pendant que l&#8217;entreprise effectue les tests.<\/li>\n  <li><strong>Pas de temps d&#8217;arr\u00eat<\/strong> : Crypter uniquement des dossiers sp\u00e9cifiques sur des lecteurs locaux et des partages de r\u00e9seau cr\u00e9\u00e9s sp\u00e9cifiquement pour cet exercice. <\/li>\n<\/ul><\/div><div class=\"calian-alternating-text-and-images__ctas mb-3 d-flex flex-wrap gap-3\"><\/div><\/div><\/div><div class=\"row gx-md-6 justify-content-lg-start justify-content-lg-start\"><div class=\"col-12 col-md mb-3\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/unified-communications-manager-group-of-people-at-work-1024x662.jpeg\" alt=\"\" width=\"1024\" height=\"662\" class=\"rounded-5 img-fluid w-100 h-250px h-md-373px object-fit-cover\"\/><\/div><div class=\"col-12 col-md\"><h3>Formation \u00e0 la cybers\u00e9curit\u00e9 sans risque dans un environnement simul\u00e9<\/h3><div class=\"calian-alternating-text-and-images__text mb-3\">La plateforme Cyber Range offre un apprentissage par l&#8217;exp\u00e9rience pour le d\u00e9veloppement des comp\u00e9tences cybern\u00e9tiques, en am\u00e9liorant la r\u00e9tention, la pr\u00e9paration et en r\u00e9duisant les erreurs. Les utilisateurs s&#8217;entra\u00eenent dans un environnement simul\u00e9 bas\u00e9 sur des cyberattaques r\u00e9elles, ce qui permet aux apprenants d&#8217;\u00eatre form\u00e9s \u00e0 la r\u00e9ponse aux incidents et de fonctionner en \u00e9quipe.<\/div><div class=\"calian-alternating-text-and-images__ctas mb-3 d-flex flex-wrap gap-3\"><a href=\"#contact-form\" class=\"btn btn-primary\">Nous contacter<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n<div class=\"tbk-hydrate-component\" data-cid=\"f87aca20-6f8e-4004-a399-52cd2c947842\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n<!-- wp:block null -->\n<div class=\"tbk-hydrate-component\"><div id=\"anchor-form\" class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n<!-- \/wp:block --><!-- wp:block null -->\n<div class=\"tbk-hydrate-component\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n<!-- \/wp:calian-com-components\/calian-spacer --><!-- wp:block null -->\n<div class=\"tbk-hydrate-component\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n<!-- \/wp:calian-com-components\/calian-spacer --><!-- wp:block null -->\n<div class=\"tbk-hydrate-component\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n<!-- \/wp:calian-com-components\/calian-spacer -->","protected":false},"excerpt":{"rendered":"<p class=\"main-hero-video__pre-heading text-white fs-4 mb-4\"> Renforcez vos d\u00e9fenses en utilisant les <\/p>\n<p> Simulations de cyberattaques <\/p>\n<p class=\"main-hero-video__description text-white subheading mb-5\"> Les simulations de cyberattaques sont un \u00e9l\u00e9ment essentiel d&#8217;une strat\u00e9gie de cybers\u00e9curit\u00e9 solide, car elles offrent aux organisations un moyen proactif de tester et de renforcer leurs d\u00e9fenses num\u00e9riques et humaines. En simulant une s\u00e9rie de sc\u00e9narios de cyberattaques, les &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":8068,"menu_order":97,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"solution":[103],"industry":[92,93,94,97,95,96,99],"type_classification":[110],"class_list":["post-7993","page","type-page","status-publish","hentry","solution-cybersecurite","industry-communications-et-medias","industry-defense-et-armee","industry-energie-ressources-et-environnement","industry-fabrication","industry-gouvernement-et-service-public","industry-sante","industry-securite-publique","type_classification-solution-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Simulations de cyberattaques - Digital &amp; Cyber | Calian<\/title>\n<meta name=\"description\" content=\"Pr\u00e9parez-vous \u00e0 l&#039;impr\u00e9visible avec les simulations de cyberattaques de Calian. Nos simulations de br\u00e8ches et d&#039;attaques r\u00e9v\u00e8lent des informations cruciales en mati\u00e8re de s\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Simulations de cyberattaques - Digital &amp; Cyber | Calian\" \/>\n<meta property=\"og:description\" content=\"Pr\u00e9parez-vous \u00e0 l&#039;impr\u00e9visible avec les simulations de cyberattaques de Calian. Nos simulations de br\u00e8ches et d&#039;attaques r\u00e9v\u00e8lent des informations cruciales en mati\u00e8re de s\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/\" \/>\n<meta property=\"og:site_name\" content=\"Solutions informatiques et cybern\u00e9tiques\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T15:47:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/iStock-1363276415-1024x576.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/\",\"url\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/\",\"name\":\"Simulations de cyberattaques - Digital & Cyber | Calian\",\"isPartOf\":{\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/iStock-1363276415-1024x576.jpg\",\"datePublished\":\"2023-12-08T01:17:53+00:00\",\"dateModified\":\"2025-05-28T15:47:06+00:00\",\"description\":\"Pr\u00e9parez-vous \u00e0 l'impr\u00e9visible avec les simulations de cyberattaques de Calian. Nos simulations de br\u00e8ches et d'attaques r\u00e9v\u00e8lent des informations cruciales en mati\u00e8re de s\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/#primaryimage\",\"url\":\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/iStock-1363276415-1024x576.jpg\",\"contentUrl\":\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/iStock-1363276415-1024x576.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gestion des risques et conformit\u00e9\",\"item\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Simulations de cyberattaques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#website\",\"url\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/\",\"name\":\"Solutions informatiques et cybern\u00e9tiques\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#organization\",\"name\":\"Calian Group Ltd.\",\"url\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2026\/01\/2026-Logo-Calian-EN-RGB-DIGITAL-1.svg\",\"contentUrl\":\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2026\/01\/2026-Logo-Calian-EN-RGB-DIGITAL-1.svg\",\"width\":977,\"height\":648,\"caption\":\"Calian Group Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Simulations de cyberattaques - Digital & Cyber | Calian","description":"Pr\u00e9parez-vous \u00e0 l'impr\u00e9visible avec les simulations de cyberattaques de Calian. Nos simulations de br\u00e8ches et d'attaques r\u00e9v\u00e8lent des informations cruciales en mati\u00e8re de s\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/","og_locale":"fr_CA","og_type":"article","og_title":"Simulations de cyberattaques - Digital & Cyber | Calian","og_description":"Pr\u00e9parez-vous \u00e0 l'impr\u00e9visible avec les simulations de cyberattaques de Calian. Nos simulations de br\u00e8ches et d'attaques r\u00e9v\u00e8lent des informations cruciales en mati\u00e8re de s\u00e9curit\u00e9.","og_url":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/","og_site_name":"Solutions informatiques et cybern\u00e9tiques","article_modified_time":"2025-05-28T15:47:06+00:00","og_image":[{"url":"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/iStock-1363276415-1024x576.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/","url":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/","name":"Simulations de cyberattaques - Digital & Cyber | Calian","isPartOf":{"@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/#primaryimage"},"image":{"@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/#primaryimage"},"thumbnailUrl":"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/iStock-1363276415-1024x576.jpg","datePublished":"2023-12-08T01:17:53+00:00","dateModified":"2025-05-28T15:47:06+00:00","description":"Pr\u00e9parez-vous \u00e0 l'impr\u00e9visible avec les simulations de cyberattaques de Calian. Nos simulations de br\u00e8ches et d'attaques r\u00e9v\u00e8lent des informations cruciales en mati\u00e8re de s\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/#primaryimage","url":"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/iStock-1363276415-1024x576.jpg","contentUrl":"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2023\/12\/iStock-1363276415-1024x576.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/breach-and-attack-simulation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/"},{"@type":"ListItem","position":2,"name":"Gestion des risques et conformit\u00e9","item":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/"},{"@type":"ListItem","position":3,"name":"Simulations de cyberattaques"}]},{"@type":"WebSite","@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#website","url":"https:\/\/www.calian.com\/digital-cyber\/fr\/","name":"Solutions informatiques et cybern\u00e9tiques","description":"","publisher":{"@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.calian.com\/digital-cyber\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#organization","name":"Calian Group Ltd.","url":"https:\/\/www.calian.com\/digital-cyber\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2026\/01\/2026-Logo-Calian-EN-RGB-DIGITAL-1.svg","contentUrl":"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2026\/01\/2026-Logo-Calian-EN-RGB-DIGITAL-1.svg","width":977,"height":648,"caption":"Calian Group Ltd."},"image":{"@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/pages\/7993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/comments?post=7993"}],"version-history":[{"count":18,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/pages\/7993\/revisions"}],"predecessor-version":[{"id":17554,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/pages\/7993\/revisions\/17554"}],"up":[{"embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/pages\/8068"}],"wp:attachment":[{"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/media?parent=7993"}],"wp:term":[{"taxonomy":"solution","embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/solution?post=7993"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/industry?post=7993"},{"taxonomy":"type_classification","embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/type_classification?post=7993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}