{"id":11455,"date":"2020-01-27T16:48:42","date_gmt":"2020-01-27T15:48:42","guid":{"rendered":"https:\/\/www.tessi.eu\/?p=11455\/"},"modified":"2020-01-27T16:49:22","modified_gmt":"2020-01-27T15:49:22","slug":"2020-the-industrialization-of-security","status":"publish","type":"post","link":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/","title":{"rendered":"2020: the industrialization of security"},"content":{"rendered":"<p>More than ever, information system security is a strategic priority for companies of all sizes. These companies are increasingly exposed to cyber attacks and now consider IT security as a strategic issue, changing their governance to limit their exposure to risks.<\/p>\n<p>The observation is a simple one: security incidents increase exponentially every year. Publications by specialized institutes and insurers demonstrate the extent of the phenomenon and its increasing cost; this is true for all types of organizations, whether private, public or associative. The increasing hyper-connectivity imposed by justified business needs overexposes companies to ever more numerous, complex and varied attacks.<\/p>\n<p>In this context, we will discuss the pillar of cybersecurity from the point of view of electronic exchanges: digital trust, through three strategic topics that concern all organizations.<\/p>\n<h3>Digital identity: everyone known and recognized<\/h3>\n<p>Whether personal or legal, the purpose of digital identity is to guarantee your correspondent\u2019s identity. Whether the sender of an e-mail or a website is involved, the notion of trust must only exist via a guarantor. By using SSL certificates, a proven organization for managing these identities and a reliable method of communication, this guarantor reduces the risk of identity theft.<\/p>\n<h3>The electronic signature: a pragmatic vehicle for authentication<\/h3>\n<p>Electronic signatures make the contract signing process more reliable and ensure that the messages and operations carried out are actually performed by the persons concerned. With electronic signatures, customer, supplier and employee pathways are optimized. In addition, they help reduce costs and improve efficiency, while increasing the security of signed documents. An e-signature is legally valid and simplifies the life of professionals.<\/p>\n<h3>Time stamping: the seal of the 21st century<\/h3>\n<p>Time stamping a digital document consists of affixing a date to a file and guaranteeing its integrity. In addition to dating the file, it also guarantees that the document has not been modified and is used, for example, to affix a date of issue to an electronic invoice. This is therefore an evolution of the traditional seal which has taken on board the specific requirements of digital exchanges.<\/p>\n<p>&nbsp;<\/p>\n<p>These three pillars are effective only if strict rules are respected. Among other things, these must impose systematic encryption of all exchanges and a security cockpit closely monitoring the company&#8217;s activities in order to identify the faint signals of potential digital fraud.<\/p>\n<p>The various certifications impose a security regulatory framework on any activity that deals with dematerialized data. It is therefore important to make sure of the commitments and professionalism of suppliers, service providers and customers through this type of certification, in order to line up a good level of security throughout the chain of communication of activities.<\/p>\n<p>This is because hyper-connectivity and speed of processing requirements mean that companies are opening up and this may seem to go against the dogmas of cybersecurity. However, information security must move with the business and adapt continuously, just as cyber threats adapt far more effectively than any organization.<\/p>\n<p>Only then can the risk of cyber-threats to companies be gradually reduced.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #005faa;\"><em>J\u00e9r\u00f4me Farrouil, Group Information Systems Security Director<\/em><\/span><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than ever, information system security is a strategic priority for companies of all sizes. These companies are increasingly exposed to cyber attacks and now consider IT security as a strategic issue, changing their governance to limit their exposure to risks. The observation is a simple one: security incidents increase exponentially every year. Publications by [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":11460,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[105],"tags":[],"class_list":["post-11455","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>2020: the industrialization of security - Tessi International<\/title>\n<meta name=\"description\" content=\"More than ever, information system security is a strategic priority for companies of all sizes. These companies are increasingly exposed to cyber attacks and now consider IT security as a strategic issue, changing their governance to limit their exposure to risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2020: the industrialization of security\" \/>\n<meta property=\"og:description\" content=\"More than ever, information system security is a strategic priority for companies of all sizes. These companies are increasingly exposed to cyber attacks and now consider IT security as a strategic issue, changing their governance to limit their exposure to risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Tessi International\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-27T15:48:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-27T15:49:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tessi.on-web.fr\/wp-content\/uploads\/2020\/01\/farrouil-250x200-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cbonnet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cbonnet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/\"},\"author\":{\"name\":\"cbonnet\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791\"},\"headline\":\"2020: the industrialization of security\",\"datePublished\":\"2020-01-27T15:48:42+00:00\",\"dateModified\":\"2020-01-27T15:49:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/\"},\"wordCount\":516,\"image\":{\"@id\":\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tessi.eu\/wp-content\/uploads\/2020\/01\/farrouil-250x200-1.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/\",\"url\":\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/\",\"name\":\"2020: the industrialization of security - Tessi International\",\"isPartOf\":{\"@id\":\"https:\/\/www.tessi.eu\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tessi.eu\/wp-content\/uploads\/2020\/01\/farrouil-250x200-1.jpg\",\"datePublished\":\"2020-01-27T15:48:42+00:00\",\"dateModified\":\"2020-01-27T15:49:22+00:00\",\"author\":{\"@id\":\"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791\"},\"description\":\"More than ever, information system security is a strategic priority for companies of all sizes. These companies are increasingly exposed to cyber attacks and now consider IT security as a strategic issue, changing their governance to limit their exposure to risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#primaryimage\",\"url\":\"https:\/\/www.tessi.eu\/wp-content\/uploads\/2020\/01\/farrouil-250x200-1.jpg\",\"contentUrl\":\"https:\/\/www.tessi.eu\/wp-content\/uploads\/2020\/01\/farrouil-250x200-1.jpg\",\"width\":250,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tessi.eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2020: the industrialization of security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/#website\",\"url\":\"https:\/\/www.tessi.eu\/fr\/\",\"name\":\"Tessi International\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tessi.eu\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791\",\"name\":\"cbonnet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0d01ab1b427b196966268d5f1407f20f6367aba1866f9ac86912cfd758c2f669?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0d01ab1b427b196966268d5f1407f20f6367aba1866f9ac86912cfd758c2f669?s=96&d=mm&r=g\",\"caption\":\"cbonnet\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"2020: the industrialization of security - Tessi International","description":"More than ever, information system security is a strategic priority for companies of all sizes. These companies are increasingly exposed to cyber attacks and now consider IT security as a strategic issue, changing their governance to limit their exposure to risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/","og_locale":"en_US","og_type":"article","og_title":"2020: the industrialization of security","og_description":"More than ever, information system security is a strategic priority for companies of all sizes. These companies are increasingly exposed to cyber attacks and now consider IT security as a strategic issue, changing their governance to limit their exposure to risks.","og_url":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/","og_site_name":"Tessi International","article_published_time":"2020-01-27T15:48:42+00:00","article_modified_time":"2020-01-27T15:49:22+00:00","og_image":[{"width":250,"height":200,"url":"https:\/\/tessi.on-web.fr\/wp-content\/uploads\/2020\/01\/farrouil-250x200-1.jpg","type":"image\/jpeg"}],"author":"cbonnet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cbonnet","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#article","isPartOf":{"@id":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/"},"author":{"name":"cbonnet","@id":"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791"},"headline":"2020: the industrialization of security","datePublished":"2020-01-27T15:48:42+00:00","dateModified":"2020-01-27T15:49:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/"},"wordCount":516,"image":{"@id":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tessi.eu\/wp-content\/uploads\/2020\/01\/farrouil-250x200-1.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/","url":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/","name":"2020: the industrialization of security - Tessi International","isPartOf":{"@id":"https:\/\/www.tessi.eu\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#primaryimage"},"image":{"@id":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tessi.eu\/wp-content\/uploads\/2020\/01\/farrouil-250x200-1.jpg","datePublished":"2020-01-27T15:48:42+00:00","dateModified":"2020-01-27T15:49:22+00:00","author":{"@id":"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791"},"description":"More than ever, information system security is a strategic priority for companies of all sizes. These companies are increasingly exposed to cyber attacks and now consider IT security as a strategic issue, changing their governance to limit their exposure to risks.","breadcrumb":{"@id":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#primaryimage","url":"https:\/\/www.tessi.eu\/wp-content\/uploads\/2020\/01\/farrouil-250x200-1.jpg","contentUrl":"https:\/\/www.tessi.eu\/wp-content\/uploads\/2020\/01\/farrouil-250x200-1.jpg","width":250,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.tessi.eu\/en\/2020-the-industrialization-of-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tessi.eu\/en\/"},{"@type":"ListItem","position":2,"name":"2020: the industrialization of security"}]},{"@type":"WebSite","@id":"https:\/\/www.tessi.eu\/fr\/#website","url":"https:\/\/www.tessi.eu\/fr\/","name":"Tessi International","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tessi.eu\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/859d0f8ee0e735b277dee0268b7ad791","name":"cbonnet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tessi.eu\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0d01ab1b427b196966268d5f1407f20f6367aba1866f9ac86912cfd758c2f669?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d01ab1b427b196966268d5f1407f20f6367aba1866f9ac86912cfd758c2f669?s=96&d=mm&r=g","caption":"cbonnet"}}]}},"_links":{"self":[{"href":"https:\/\/www.tessi.eu\/en\/wp-json\/wp\/v2\/posts\/11455\/"}],"collection":[{"href":"https:\/\/www.tessi.eu\/en\/wp-json\/wp\/v2\/posts\/"}],"about":[{"href":"https:\/\/www.tessi.eu\/en\/wp-json\/wp\/v2\/types\/post\/"}],"author":[{"embeddable":true,"href":"https:\/\/www.tessi.eu\/en\/wp-json\/wp\/v2\/users\/11\/"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tessi.eu\/en\/wp-json\/wp\/v2\/comments\/?post=11455"}],"version-history":[{"count":1,"href":"https:\/\/www.tessi.eu\/en\/wp-json\/wp\/v2\/posts\/11455\/revisions\/"}],"predecessor-version":[{"id":11464,"href":"https:\/\/www.tessi.eu\/en\/wp-json\/wp\/v2\/posts\/11455\/revisions\/11464\/"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tessi.eu\/en\/wp-json\/wp\/v2\/media\/11460\/"}],"wp:attachment":[{"href":"https:\/\/www.tessi.eu\/en\/wp-json\/wp\/v2\/media\/?parent=11455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tessi.eu\/en\/wp-json\/wp\/v2\/categories\/?post=11455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tessi.eu\/en\/wp-json\/wp\/v2\/tags\/?post=11455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}