{"id":8068,"date":"2024-01-31T19:04:15","date_gmt":"2024-01-31T19:04:15","guid":{"rendered":"https:\/\/www.calian.com\/digital-cyber\/cybersecurite\/gestion-des-risques-et-conformite\/"},"modified":"2024-03-04T20:12:16","modified_gmt":"2024-03-04T20:12:16","slug":"gestion-des-risques-et-conformite","status":"publish","type":"page","link":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/","title":{"rendered":"Gestion des risques et conformit\u00e9"},"content":{"rendered":"\n<div class=\"tbk-hydrate-component\" data-cid=\"3035b219-0803-495d-bc8f-b21904f3d91e\" data-component=\"Hero\"><section class=\"calian-hero d-flex h-100 position-relative overflow-hidden nav-indent wp-block-calian-com-components-calian-hero media-position-split overlay-solid\"><div class=\"container\"><div class=\"row\"><div class=\"calian-hero__content d-flex col-lg flex-column pb-3 justify-content-center has-breadcrumbs text-left\"><div class=\"calian-hero__copy-wrapper\"><h1 class=\"calian-hero__heading\">Gestion des risques et conformit\u00e9<\/h1><div class=\"calian-hero__text mt-2\">Dolor, elementum metus, nisl ultrices pellentesque arcu suspendisse at nascetur. Turpis gravida nibh risus at auctor eu sed enim, tellus. Mauris ut quam volutpat aliquam.<\/div><\/div><div class=\"calian-hero__breadcrumbs mt-auto mb-0 pt-5\"><nav aria-label=\"breadcrumb\" class=\"breadcrumb-container\"><ol class=\"breadcrumb\"><li class=\"breadcrumb-item\"><a href=\"https:\/\/www.calian.com\/fr\/\" class=\"breadcrumb-item-link\">Accueil<\/a><\/li><li class=\"breadcrumb-item\"><a href=\"https:\/\/www.calian.com\/fr\/\" class=\"breadcrumb-item-link\">Unit\u00e9 d&#8217;affaires<\/a><\/li><li class=\"breadcrumb-item\" aria-current=\"page\">Titre de la page<\/li><\/ol><\/nav><\/div><\/div><\/div><\/div><div class=\"calian-hero__overlay overlay-solid position-absolute w-100 h-100 top-0 start-0\"><\/div><span><\/span><\/section><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Gestion des risques et conformit\u00e9 Dolor, elementum metus, nisl ultrices pellentesque arcu suspendisse at nascetur. Turpis gravida nibh risus at auctor eu sed enim, tellus. Mauris ut quam volutpat aliquam. <\/p>\n<li class=\"breadcrumb-item\"> <a href=\"https:\/\/www.calian.com\/fr\/\" class=\"breadcrumb-item-link\"> Accueil <\/a> <\/li>\n<li class=\"breadcrumb-item\"> <a href=\"https:\/\/www.calian.com\/fr\/\" class=\"breadcrumb-item-link\"> Unit\u00e9 d&#8217;affaires <\/a> <\/li>\n<li class=\"breadcrumb-item\" aria-current=\"page\"> Titre de la page <\/li>\n","protected":false},"author":1,"featured_media":0,"parent":7997,"menu_order":92,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"solution":[],"industry":[],"type_classification":[],"class_list":["post-8068","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Gestion des risques et conformit\u00e9 - Digital &amp; Cyber | Calian<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gestion des risques et conformit\u00e9 - Digital &amp; Cyber | Calian\" \/>\n<meta property=\"og:description\" content=\"Gestion des risques et conformit\u00e9 Dolor, elementum metus, nisl ultrices pellentesque arcu suspendisse at nascetur. Turpis gravida nibh risus at auctor eu sed enim, tellus. Mauris ut quam volutpat aliquam.  Accueil   Unit\u00e9 d&#8217;affaires  Titre de la page\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/\" \/>\n<meta property=\"og:site_name\" content=\"Solutions informatiques et cybern\u00e9tiques\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-04T20:12:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/\",\"url\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/\",\"name\":\"Gestion des risques et conformit\u00e9 - Digital & Cyber | Calian\",\"isPartOf\":{\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#website\"},\"datePublished\":\"2024-01-31T19:04:15+00:00\",\"dateModified\":\"2024-03-04T20:12:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gestion des risques et conformit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#website\",\"url\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/\",\"name\":\"Solutions informatiques et cybern\u00e9tiques\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#organization\",\"name\":\"Calian Group Ltd.\",\"url\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2026\/01\/2026-Logo-Calian-EN-RGB-DIGITAL-1.svg\",\"contentUrl\":\"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2026\/01\/2026-Logo-Calian-EN-RGB-DIGITAL-1.svg\",\"width\":977,\"height\":648,\"caption\":\"Calian Group Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.calian.com\/digital-cyber\/fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gestion des risques et conformit\u00e9 - Digital & Cyber | Calian","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/","og_locale":"fr_CA","og_type":"article","og_title":"Gestion des risques et conformit\u00e9 - Digital & Cyber | Calian","og_description":"Gestion des risques et conformit\u00e9 Dolor, elementum metus, nisl ultrices pellentesque arcu suspendisse at nascetur. Turpis gravida nibh risus at auctor eu sed enim, tellus. Mauris ut quam volutpat aliquam.  Accueil   Unit\u00e9 d&#8217;affaires  Titre de la page","og_url":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/","og_site_name":"Solutions informatiques et cybern\u00e9tiques","article_modified_time":"2024-03-04T20:12:16+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/","url":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/","name":"Gestion des risques et conformit\u00e9 - Digital & Cyber | Calian","isPartOf":{"@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#website"},"datePublished":"2024-01-31T19:04:15+00:00","dateModified":"2024-03-04T20:12:16+00:00","breadcrumb":{"@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/gestion-des-risques-et-conformite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.calian.com\/digital-cyber\/fr\/cybersecurite\/"},{"@type":"ListItem","position":2,"name":"Gestion des risques et conformit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#website","url":"https:\/\/www.calian.com\/digital-cyber\/fr\/","name":"Solutions informatiques et cybern\u00e9tiques","description":"","publisher":{"@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.calian.com\/digital-cyber\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#organization","name":"Calian Group Ltd.","url":"https:\/\/www.calian.com\/digital-cyber\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2026\/01\/2026-Logo-Calian-EN-RGB-DIGITAL-1.svg","contentUrl":"https:\/\/sites.calian.com\/app\/uploads\/sites\/10\/2026\/01\/2026-Logo-Calian-EN-RGB-DIGITAL-1.svg","width":977,"height":648,"caption":"Calian Group Ltd."},"image":{"@id":"https:\/\/www.calian.com\/digital-cyber\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/pages\/8068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/comments?post=8068"}],"version-history":[{"count":8,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/pages\/8068\/revisions"}],"predecessor-version":[{"id":10670,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/pages\/8068\/revisions\/10670"}],"up":[{"embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/pages\/7997"}],"wp:attachment":[{"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/media?parent=8068"}],"wp:term":[{"taxonomy":"solution","embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/solution?post=8068"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/industry?post=8068"},{"taxonomy":"type_classification","embeddable":true,"href":"https:\/\/itcs.calian.com\/fr\/wp-json\/wp\/v2\/type_classification?post=8068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}