{"id":14032,"date":"2021-04-02T10:25:48","date_gmt":"2021-04-02T08:25:48","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=14032"},"modified":"2021-04-01T16:06:40","modified_gmt":"2021-04-01T14:06:40","slug":"demasquer-les-menaces-internes","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/fr\/insider-bedrohungen-entlarven\/","title":{"rendered":"Exposer les menaces internes"},"content":{"rendered":"<figure id=\"attachment_14033\" aria-describedby=\"caption-attachment-14033\" style=\"width: 1000px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14033 size-full\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\" alt=\"Menaces de l&#039;int\u00e9rieur\" width=\"1000\" height=\"750\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg 1000w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-768x576.jpg 768w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-16x12.jpg 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-233x175.jpg 233w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-467x350.jpg 467w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-920x690.jpg 920w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-300x225.jpg 300w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-14033\" class=\"wp-caption-text\">\u00a9 Depositphotos, Andreus<\/figcaption><\/figure>\n<p>Les menaces provenant des \"initi\u00e9s\" donnent des sueurs froides \u00e0 de nombreux d\u00e9partements de s\u00e9curit\u00e9 informatique. Et \u00e0 juste titre, car ils sont d\u00e9j\u00e0 solidement ancr\u00e9s dans l'informatique des entreprises. Ils pr\u00e9sentent donc un risque particuli\u00e8rement \u00e9lev\u00e9 apr\u00e8s une compromission, car ils peuvent difficilement \u00eatre d\u00e9tect\u00e9s par les m\u00e9canismes de s\u00e9curit\u00e9 normaux qui sont dirig\u00e9s vers l'ext\u00e9rieur. Il est donc difficile de se prot\u00e9ger pleinement contre les menaces internes en utilisant les moyens traditionnels. Pour se pr\u00e9munir contre les menaces internes et d\u00e9couvrir ce qui se passe \u00e0 l'int\u00e9rieur de l'entreprise, les organisations ont besoin de strat\u00e9gies et de solutions techniques adapt\u00e9es qui vont au-del\u00e0 des m\u00e9thodes de s\u00e9curit\u00e9 informatique traditionnelles.<\/p>\n<p><strong>Menaces de l'int\u00e9rieur : 50-70% de toutes les violations de la s\u00e9curit\u00e9<\/strong><\/p>\n<p>Si l'on consid\u00e8re les menaces qui ont finalement r\u00e9ussi \u00e0 p\u00e9n\u00e9trer dans le syst\u00e8me informatique d'une organisation, les menaces internes sont loin d'\u00eatre un risque n\u00e9gligeable. Selon l'\u00e9quipe Information Risk Research de Gartner, les menaces internes sont en fait responsables de 50 \u00e0 70 % de tous les incidents de s\u00e9curit\u00e9, et pour ce qui est des violations de s\u00e9curit\u00e9 en particulier, les initi\u00e9s sont responsables des trois quarts d'entre elles.<\/p>\n<p>Les cons\u00e9quences peuvent \u00eatre graves : Le Ponemon Institute estime que les menaces internes co\u00fbtent 8,76 millions de dollars par an et par entreprise affect\u00e9e. Cela est d\u00fb en grande partie au fait qu'il faut en moyenne 280 jours pour identifier et contenir chaque violation - un sc\u00e9nario effrayant pour toute entreprise.<\/p>\n<p><strong>Les trois principaux types de menaces internes<\/strong><\/p>\n<p>L'exemple le plus c\u00e9l\u00e8bre de menace de l'int\u00e9rieur est certainement Edward Snowden.<br \/>\nMais ses activit\u00e9s, bien que les plus connues, sont loin d'\u00eatre typiques des sc\u00e9narios auxquels la plupart des organisations sont confront\u00e9es, surtout dans un contexte commercial. Dans la majorit\u00e9 des cas, les menaces d'initi\u00e9s prennent trois formes principales : initi\u00e9s \"accidentels\", \"compromis\" ou \"malveillants\".<\/p>\n<p>1. Comme son nom l'indique, l'initi\u00e9 \"malveillant\" est g\u00e9n\u00e9ralement un employ\u00e9 ou un contractant qui vole des informations. Edward Snowden en est probablement l'exemple le plus c\u00e9l\u00e8bre, bien que de nombreux autres initi\u00e9s malveillants s'emparent d'informations non pas en tant que d\u00e9nonciateurs mais pour en tirer un b\u00e9n\u00e9fice financier, comme les voleurs de donn\u00e9es bancaires suisses il y a quelques ann\u00e9es.<\/p>\n<p>2. l'initi\u00e9 \"compromis\" est consid\u00e9r\u00e9 par beaucoup comme la forme la plus probl\u00e9matique, car cette personne n'a g\u00e9n\u00e9ralement rien fait de plus que de cliquer innocemment sur un lien ou de saisir un mot de passe. Ce ph\u00e9nom\u00e8ne est souvent d\u00fb \u00e0 des campagnes de phishing, qui consistent \u00e0 pr\u00e9senter aux utilisateurs un lien vers un site web d'apparence authentique afin de les inciter \u00e0 saisir leurs identifiants de connexion ou d'autres informations sensibles.<\/p>\n<p>3. et alternativement, mais non moins dangereux, l'initi\u00e9 \"accidentel\" ou \"n\u00e9gligent\". Exposer ces initi\u00e9s peut s'av\u00e9rer particuli\u00e8rement difficile car, quel que soit le soin apport\u00e9 par les entreprises et les employ\u00e9s \u00e0 la cybers\u00e9curit\u00e9, des erreurs peuvent se produire.<\/p>\n<p><strong>Au-del\u00e0 des formations, il existe des possibilit\u00e9s technologiques de d\u00e9fense<\/strong><\/p>\n<p>Pour \u00e9viter ces erreurs simples mais, dans le pire des cas, tr\u00e8s lourdes de cons\u00e9quences, de nombreuses organisations font d\u00e9j\u00e0 un usage intensif de la formation pour sensibiliser leurs employ\u00e9s dans ce sens. Il ne fait aucun doute que certaines attaques accidentelles et compromises de l'int\u00e9rieur peuvent \u00eatre \u00e9vit\u00e9es simplement en formant les utilisateurs finaux \u00e0 reconna\u00eetre et \u00e0 \u00e9viter les tentatives de hame\u00e7onnage. Mais m\u00eame au-del\u00e0 de la formation, il existe des possibilit\u00e9s technologiques ax\u00e9es sur le comportement des utilisateurs pour mieux se prot\u00e9ger contre les menaces internes.<\/p>\n<p><strong>Analyse du comportement des utilisateurs et des entit\u00e9s (UEBA)<\/strong><\/p>\n<p>L'utilisation de solutions de cybers\u00e9curit\u00e9 traditionnelles qui ne regardent que vers l'ext\u00e9rieur cr\u00e9e un tr\u00e8s grand angle mort. Pour relever les d\u00e9fis \u00e0 plusieurs niveaux que repr\u00e9sentent les menaces internes, les \u00e9quipes de s\u00e9curit\u00e9 ont besoin d'infrastructures et d'outils technologiques leur permettant d'avoir une vue d'ensemble et donc de voir toutes les menaces, y compris celles provenant de l'int\u00e9rieur. C'est l\u00e0 que l'analyse du comportement des utilisateurs et des entit\u00e9s (UEBA) s'av\u00e8re utile. En comprenant les comportements typiques, les \u00e9quipes de s\u00e9curit\u00e9 peuvent plus facilement identifier le moment o\u00f9 un probl\u00e8me se produit. Les solutions bas\u00e9es sur l'IA et l'apprentissage automatique sont d\u00e9j\u00e0 d\u00e9ploy\u00e9es par de nombreuses organisations pour une protection efficace et proactive. <\/p>\n<p><strong>Conclusion : une strat\u00e9gie proactive avec des analyses accro\u00eet la s\u00e9curit\u00e9<\/strong><\/p>\n<p>Les organisations ont besoin de l'infrastructure et des outils technologiques n\u00e9cessaires pour avoir une vue d'ensemble des menaces. Les SOC modernes utilisent donc l'UEBA au sein de leurs syst\u00e8mes SIEM pour se prot\u00e9ger \u00e9galement contre l'erreur humaine, la n\u00e9gligence et les initi\u00e9s malveillants de l'int\u00e9rieur. Combin\u00e9e \u00e0 la formation, une telle strat\u00e9gie proactive peut r\u00e9duire consid\u00e9rablement l'angle mort \u00e0 l'int\u00e9rieur et d\u00e9tecter rapidement de nombreuses menaces internes.<\/p>","protected":false},"excerpt":{"rendered":"<p>Bedrohungen durch \u00abInsider\u00bb treiben vielen IT-Sicherheitsabteilungen den Angstschweiss auf die Stirn. Und dies auch zurecht, denn sie sind bereits fest in der Unternehmens-IT verankert. Sie stellen deswegen nach einer Kompromittierung ein besonders hohes Risiko dar, weil sie von normalen Sicherheitsmechanismen, die sich nach aussen richten, kaum erkannt werden k\u00f6nnen. Es ist also schwierig, sich mit [&hellip;]<\/p>\n","protected":false},"author":35,"featured_media":14033,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[4883,4885,4884],"class_list":["post-14032","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-insider-bedrohung","tag-ueba","tag-user-and-entity-behavior-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Insider-Bedrohungen entlarven - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Insider-Bedrohungen: So k\u00f6nnen sich Organisationen besser gegen menschliches Versagen, Nachl\u00e4ssigkeit und b\u00f6swillige Insider sch\u00fctzen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/fr\/demasquer-les-menaces-internes\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insider-Bedrohungen entlarven - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"Insider-Bedrohungen: So k\u00f6nnen sich Organisationen besser gegen menschliches Versagen, Nachl\u00e4ssigkeit und b\u00f6swillige Insider sch\u00fctzen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/fr\/demasquer-les-menaces-internes\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-02T08:25:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\"},\"headline\":\"Insider-Bedrohungen entlarven\",\"datePublished\":\"2021-04-02T08:25:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/\"},\"wordCount\":698,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\",\"keywords\":[\"Insider-Bedrohung\",\"UEBA\",\"User and Entity Behavior Analysis\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/\",\"url\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/\",\"name\":\"Insider-Bedrohungen entlarven - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\",\"datePublished\":\"2021-04-02T08:25:48+00:00\",\"description\":\"Insider-Bedrohungen: So k\u00f6nnen sich Organisationen besser gegen menschliches Versagen, Nachl\u00e4ssigkeit und b\u00f6swillige Insider sch\u00fctzen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\",\"width\":1000,\"height\":750,\"caption\":\"\u00a9 Depositphotos, Andreus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insider-Bedrohungen entlarven\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\/\/www.m-q.ch\/fr\/author\/roger-straessle\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exposer les menaces d'initi\u00e9s - MQ Management et Qualit\u00e9","description":"Menaces d'initi\u00e9s : Comment les organisations peuvent mieux se prot\u00e9ger contre l'erreur humaine, la n\u00e9gligence et les initi\u00e9s malveillants.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/fr\/demasquer-les-menaces-internes\/","og_locale":"fr_FR","og_type":"article","og_title":"Insider-Bedrohungen entlarven - MQ Management und Qualit\u00e4t","og_description":"Insider-Bedrohungen: So k\u00f6nnen sich Organisationen besser gegen menschliches Versagen, Nachl\u00e4ssigkeit und b\u00f6swillige Insider sch\u00fctzen.","og_url":"https:\/\/www.m-q.ch\/fr\/demasquer-les-menaces-internes\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2021-04-02T08:25:48+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7"},"headline":"Insider-Bedrohungen entlarven","datePublished":"2021-04-02T08:25:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/"},"wordCount":698,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg","keywords":["Insider-Bedrohung","UEBA","User and Entity Behavior Analysis"],"articleSection":["Risikomanagement"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/","url":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/","name":"Exposer les menaces d'initi\u00e9s - MQ Management et Qualit\u00e9","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg","datePublished":"2021-04-02T08:25:48+00:00","description":"Menaces d'initi\u00e9s : Comment les organisations peuvent mieux se prot\u00e9ger contre l'erreur humaine, la n\u00e9gligence et les initi\u00e9s malveillants.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg","width":1000,"height":750,"caption":"\u00a9 Depositphotos, Andreus"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Insider-Bedrohungen entlarven"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"Gestion et qualit\u00e9 du QM","description":"Plate-forme pour les syst\u00e8mes de gestion int\u00e9gr\u00e9e.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/www.m-q.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/14032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/comments?post=14032"}],"version-history":[{"count":2,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/14032\/revisions"}],"predecessor-version":[{"id":14035,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/14032\/revisions\/14035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/media\/14033"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/media?parent=14032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/categories?post=14032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/tags?post=14032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}