{"id":5543,"date":"2025-09-03T17:36:45","date_gmt":"2025-09-03T15:36:45","guid":{"rendered":"https:\/\/www.commandstrategy.com\/?p=5543"},"modified":"2025-09-03T17:36:45","modified_gmt":"2025-09-03T15:36:45","slug":"dora-regulations-6","status":"publish","type":"post","link":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/","title":{"rendered":"DORA regulations"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1738663599205{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;][vc_column css=&#8221;.vc_custom_1738663616915{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1739177429150{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;]\n<h2>\n<\/h2>\n<h2>\n<\/h2>\n<h2>\n<\/h2>\n<h2 style=\"text-align: justify;\"><span style=\"color: #ed7d31; font-size: 24px;\">Context<\/span><\/h2>\n<p>\n<p><span style=\"font-size: 21px;\"><strong>Increased digitization, growing risk<\/strong><br \/><\/span><\/p>\n<span style=\"font-size: 16px;\">La num\u00e9risation rapide et l&#8217;interconnexion croissante des services financiers en Europe apportent de nombreuses opportunit\u00e9s, mais elles s&#8217;accompagnent \u00e9galement d&#8217;une augmentation significative des cybermenaces. Face \u00e0 cette situation, les acteurs du secteur financier adoptent des strat\u00e9gies de protection souvent h\u00e9t\u00e9rog\u00e8nes et isol\u00e9es. Cette fragmentation des approches expose les consommateurs \u00e0 des risques accrus et fragilise l&#8217;int\u00e9grit\u00e9 des march\u00e9s financiers.\u200b<\/span>&#13;\n<p><\/p><span style=\"font-size: 21px;\"><strong>Une n\u00e9cessit\u00e9 de surveillance et de coordination<\/strong>\u200b<br \/><\/span><span style=\"font-size: 16px;\">Afin de mieux pr\u00e9venir et contrer ces cybermenaces, il devient essentiel de pouvoir cartographier, monitorer et surveiller les \u00e9volutions des risques li\u00e9s aux technologies de l\u2019information et de la communication (TIC). La mise en commun des informations et des retours d\u2019exp\u00e9riences permettra une am\u00e9lioration progressive des strat\u00e9gies de lutte contre les attaques informatiques. Cette approche collaborative renforcera la r\u00e9silience num\u00e9rique de l\u2019ensemble du secteur financier.\u200b<\/span><\/p>\r\n<p><span style=\"font-size: 21px;\"><strong>Objectifs cl\u00e9s de la strat\u00e9gie europ\u00e9enne<\/strong>\u200b<br \/><\/span><span style=\"font-size: 16px;\">Pour r\u00e9pondre \u00e0 ces d\u00e9fis, plusieurs objectifs strat\u00e9giques sont d\u00e9finis :\u200b<\/span>&#13;\n<ul style=\"list-style-type: square;\">&#13;\n<li><span style=\"font-size: 16px;\"><strong>Harmoniser les exigences en mati\u00e8re de gestion des risques TIC dans toute l\u2019Union Europ\u00e9enne<\/strong> : \u00e9tablir des normes communes pour garantir une protection homog\u00e8ne et \u00e9viter les vuln\u00e9rabilit\u00e9s syst\u00e9miques.\u200b<\/span><\/li>&#13;\n<li><span style=\"font-size: 16px;\"><strong>Renforcer la r\u00e9silience num\u00e9rique des institutions financi\u00e8res<\/strong> : assurer que les organismes financiers soient mieux pr\u00e9par\u00e9s face aux cyberattaques et puissent y r\u00e9pondre efficacement.\u200b<\/span><\/li>&#13;\n<li><span style=\"font-size: 16px;\"><strong>Prot\u00e9ger les consommateurs et l\u2019int\u00e9grit\u00e9 des march\u00e9s financiers contre les perturbations num\u00e9riques<\/strong> : garantir un cadre s\u00e9curis\u00e9 et fiable pour les transactions financi\u00e8res, tout en pr\u00e9servant la confiance des utilisateurs.\u200b<\/span><\/li>&#13;\n<\/ul>&#13;\n<h2><\/h2><\/h2>\r\n\r\n<h2><\/h2>\r\n<p><p><span style=\"font-size: 16px;\"><\/p>\n&#13;\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1739381279249{background-color: #f7f7f7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1738664521765{margin-top: 3% !important;}&#8221;][vc_single_image image=&#8221;3761&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1739177407557{margin-top: 10% !important;margin-right: 0% !important;border-right-width: 0% !important;padding-right: 0% !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1738601963862{margin-right: 0% !important;border-right-width: 0% !important;padding-right: 0% !important;}&#8221;][vc_column_text]&#13;\n<h2 style=\"text-align: justify;\"><span style=\"color: #ed7d31; font-size: 24px;\">Pour qui?\u00a0<\/span><\/h2>&#13;\n<p style=\"text-align: justify;\">\n<strong>Comp\u00e9tence ACPR : <\/strong>\u200b&#13;\n<p style=\"text-align: justify;\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 16px;\">Soci\u00e9t\u00e9s d&#8217;assurance, de r\u00e9assurance et de retraite professionnelle.\u200b<\/span><br \/><span style=\"font-size: 16px;\">Banques et \u00e9tablissements de cr\u00e9dit\u200b<\/span><br \/><span style=\"font-size: 16px;\">Entreprises d\u2019investissements, Plateforme de n\u00e9gociation\u200b<\/span><br \/><span style=\"font-size: 16px;\">Etablissement de monnaie \u00e9lectronique, de paiement\u200b<\/span><br \/><span style=\"font-size: 16px;\">Prestataire d\u2019informations sur les comptes, prestataires de services sur crypto-actifs, \u00e9metteur de jetons se r\u00e9f\u00e9rant \u00e0 des actifs (ART)<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\"><!-- \/wp:post-content --><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\"><!-- \/wp:paragraph --><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\"><!-- \/wp:paragraph --><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\"><!-- \/wp:paragraph --><\/span><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p style=\"text-align: justify;\"><!-- wp:paragraph --><strong>Comp\u00e9tence AMF \/ Banque de France : <\/strong>\u200b<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p style=\"text-align: justify;\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 16px;\">Contrepartie centrale, D\u00e9positaires centraux de titres, \u200b<\/span><br \/><span style=\"font-size: 16px;\">Soci\u00e9t\u00e9 de Gestion, Gestionnaires de fonds alternatifs, Plateformes de crowfunding. \u200b<\/span><br \/><span style=\"font-size: 16px;\">Fournisseurs de services critiques li\u00e9s aux TIC, tels que les prestataires de cloud computing.<\/span>\u200b<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row thb_row_padding=&#8221;true&#8221; thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1738773277352{margin-bottom: 0% !important;padding-bottom: 0% !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1739373527597{margin-bottom: 0% !important;border-bottom-width: 0% !important;padding-bottom: 0% !important;}&#8221;]\n<h2><span style=\"color: #ed7d31; font-size: 24px;\">A travers 2 textes&#8230;<\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\">R\u00e8glement (UE) 2022\/2554 du 14 d\u00e9cembre 2022 dit r\u00e8glement DORA.<\/span><\/p>\n<p style=\"text-align: justify;\"><span class=\"TextRun SCXP95935335 BCX8\" lang=\"FR-FR\" style=\"font-size: 16px;\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP95935335 BCX8\"><span class=\"TextRun SCXP95935335 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP95935335 BCX8\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3608 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/target-2.png\" alt=\"\" width=\"7\" height=\"7\" \/>\u00a0 \u00a0D\u00e9finit des exigences pour renforcer et harmoniser la gestion des <\/span><\/span><span class=\"TextRun SCXP95935335 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP95935335 BCX8\">risques li\u00e9s aux technologies de l&#8217;information et de la communication <\/span><\/span><span class=\"TextRun SCXP95935335 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP95935335 BCX8\">(TIC) et \u00e0 la s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes d\u2019information au <\/span><\/span><span class=\"TextRun SCXP95935335 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP95935335 BCX8\">niveau de l\u2019UE.<\/span><\/span><span class=\"EOP SCXP95935335 BCX8\">\u200b<\/span><\/span><\/span><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1738773303951{margin-bottom: 0% !important;border-bottom-width: 0% !important;padding-bottom: 0% !important;}&#8221;]\n<h2>\u00a0<\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-size: 16px;\">Directive (UE) 2022\/2556 du 14 d\u00e9cembre 2022.<\/span><\/p>\n<p><span style=\"font-size: 16px;\"><span class=\"EOP SCXP245211375 BCX8\">\u200b<span class=\"TextRun SCXP95935335 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP95935335 BCX8\"><span class=\"TextRun SCXP95935335 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3608 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/target-2.png\" alt=\"\" width=\"7\" height=\"7\" \/>\u00a0 \u00a0<\/span><\/span><\/span><\/span><span class=\"TextRun SCXP245211375 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP245211375 BCX8\">Modifie les directives existantes telles que les directives CRD <\/span><\/span><span class=\"TextRun SCXP245211375 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP245211375 BCX8\">IV, DSP2, BRRD, Solvabilit\u00e9 2, IORP2, <\/span><\/span><span class=\"TextRun SpellingErrorZoomed SCXP245211375 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"SCXP245211375 BCX8\">MiFID<\/span><\/span><span class=\"TextRun SCXP245211375 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP245211375 BCX8\"> 2, AIFM, \u2026afin de les <\/span><\/span><span class=\"TextRun SCXP245211375 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP245211375 BCX8\">mettre en coh\u00e9rence avec les nouvelles dispositions du <\/span><\/span><span class=\"TextRun SCXP245211375 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP245211375 BCX8\">r\u00e8glement DORA.<\/span><\/span><\/span><\/p>\n<p><span class=\"EOP SCXP245211375 BCX8\"><span class=\"TextRun SCXP95935335 BCX8\" lang=\"FR-FR\" style=\"font-size: 16px;\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP95935335 BCX8\"><span class=\"EOP SCXP95935335 BCX8\">\u200b<\/span><\/span><\/span><\/span><\/p>\n[\/vc_column_text][\/vc_column][vc_column css=&#8221;.vc_custom_1738773366154{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1739380506060{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;]\n<h2><span style=\"color: #ed7d31; font-size: 24px;\">Comment ? 5 pilliers\u00a0<\/span><\/h2>\n<p><!-- \/wp:paragraph --><\/p>\n<p data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"color: #44546a;\"><b><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-3791 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/bouclier-5.png\" alt=\"\" width=\"29\" height=\"29\" data-sizes=\"auto\" data-srcset=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/bouclier-5.png 64w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/bouclier-5-20x20.png 20w\" sizes=\"auto, (max-width: 29px) 100vw, 29px\" \/>Pilier 1 &#8211; Pr\u00e9vention : Etablissement d\u2019un cadre de r\u00e9f\u00e9rence pour la gouvernance et la gestion des <\/b><b>risques<\/b><\/span>\u200b<\/p>\n<p data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 16px;\">\u00c9tablir des politiques et proc\u00e9dures robustes pour identifier, g\u00e9rer et att\u00e9nuer les risques TIC\u200b<br \/><\/span><span style=\"font-size: 16px;\">Mettre en place des cadres de gouvernance qui int\u00e8grent les risques TIC dans la gestion globale des risques.\u200b<br \/><\/span><span style=\"font-size: 16px;\" data-usefontface=\"true\" data-contrast=\"none\">Effectuer des \u00e9valuations r\u00e9guli\u00e8res des vuln\u00e9rabilit\u00e9s et des risques li\u00e9s aux syst\u00e8mes num\u00e9riques.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row thb_row_padding=&#8221;true&#8221; disable_element=&#8221;yes&#8221; thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1739380109131{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1738767659807{margin-top: 0% !important;margin-bottom: 0% !important;border-top-width: 0% !important;border-bottom-width: 0% !important;padding-top: 0% !important;padding-bottom: 0% !important;}&#8221;][vc_tta_accordion c_position=&#8221;right&#8221; active_section=&#8221;&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;A &#8211; Identifier&#8221; tab_id=&#8221;1739371479974-398c5ae9-ffb2&#8243;][vc_column_text css=&#8221;.vc_custom_1739376926589{margin-right: 3% !important;margin-left: 0% !important;border-right-width: 3% !important;border-left-width: 0% !important;padding-right: 3% !important;padding-left: 0% !important;}&#8221; el_class=&#8221;cta&#8221;]\n<ul>\n<li style=\"text-align: justify;\">Identifier classer et documenter les fonctions d\u00e9pendantes des TIC et les actifs des TIC<\/li>\n<li style=\"text-align: justify;\">Identifier toutes les sources de risques li\u00e9s aux TIC\u200b<\/li>\n<li style=\"text-align: justify;\">Evaluer les menaces et les vuln\u00e9rabilit\u00e9s pesant sur les TIC\u200b<\/li>\n<li style=\"text-align: justify;\"><span data-usefontface=\"true\" data-contrast=\"none\">Identifier et documenter tous les processus d\u00e9pendants de services TIC de Tiers<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion c_position=&#8221;right&#8221; active_section=&#8221;nan&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;D &#8211; R\u00e9pondre&#8221; tab_id=&#8221;1739372041090-f649a8ba-5625&#8243;][vc_column_text css=&#8221;.vc_custom_1739372471071{margin-right: 3% !important;margin-left: 0% !important;border-right-width: 3% !important;border-left-width: 0% !important;padding-right: 3% !important;padding-left: 0% !important;}&#8221;]\n<ul>\n<li style=\"text-align: justify;\">Politique de continuit\u00e9 des activit\u00e9s TIC (communication de crise, plan de continuit\u00e9 d\u2019activit\u00e9 et de rem\u00e9diation)\u200b<\/li>\n<li style=\"text-align: justify;\"><span data-usefontface=\"true\" data-contrast=\"none\">Analyse d\u2019impact de l\u2019exposition aux perturbations graves de l\u2019activit\u00e9<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_tta_accordion c_position=&#8221;right&#8221; active_section=&#8221;nan&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;B &#8211; Prot\u00e9ger et anticipier&#8221; tab_id=&#8221;1739372074981-14a49e7a-17f7&#8243;][vc_column_text css=&#8221;.vc_custom_1739372521529{margin-right: 3% !important;margin-left: 0% !important;border-right-width: 3% !important;border-left-width: 0% !important;padding-right: 3% !important;padding-left: 0% !important;}&#8221;]\n<ul>\n<li style=\"text-align: justify;\">Strat\u00e9gies de s\u00e9curit\u00e9, politiques, proc\u00e9dures, protocoles et outils\u200b<\/li>\n<li style=\"text-align: justify;\"><span data-usefontface=\"true\" data-contrast=\"none\">Suivi et contr\u00f4le de la s\u00e9curit\u00e9 et fonctionnement des syst\u00e8mes et outils TIC<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion c_position=&#8221;right&#8221; active_section=&#8221;nan&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;E &#8211; Rem\u00e9dier&#8221; tab_id=&#8221;1739372081089-7ad0ed32-1e7f&#8221;][vc_column_text css=&#8221;.vc_custom_1739372490396{margin-right: 3% !important;margin-left: 0% !important;border-right-width: 3% !important;border-left-width: 0% !important;padding-right: 3% !important;padding-left: 0% !important;}&#8221;]\n<ul>\n<li style=\"text-align: justify;\">Disposer d\u2019au moins 1 site secondaire pour assurer la continuit\u00e9 d\u2019activit\u00e9\u200b<\/li>\n<li style=\"text-align: justify;\">Disposer de syst\u00e8mes de sauvegarde et de m\u00e9thodes de rem\u00e9diation\u200b<\/li>\n<li style=\"text-align: justify;\"><span data-scheme-color=\"@000000,1,\" data-usefontface=\"true\" data-contrast=\"none\">Mettre en place la politique et les proc\u00e9dures relatives aux sauvegardes<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_tta_accordion c_position=&#8221;right&#8221; active_section=&#8221;nan&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;C &#8211; D\u00e9tecter&#8221; tab_id=&#8221;1739372082655-9988cdc0-ce55&#8243;][vc_column_text css=&#8221;.vc_custom_1739372536345{margin-right: 3% !important;margin-left: 0% !important;border-right-width: 3% !important;border-left-width: 0% !important;padding-right: 3% !important;padding-left: 0% !important;}&#8221;]\n<ul>\n<li style=\"text-align: justify;\">Mise en place de m\u00e9canismes de d\u00e9tection des activit\u00e9s anormales<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion c_position=&#8221;right&#8221; active_section=&#8221;nan&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;F &#8211; Apprendre et \u00e9voluer&#8221; tab_id=&#8221;1739372097116-47295d4e-affa&#8221;][vc_column_text css=&#8221;.vc_custom_1739372507853{margin-right: 3% !important;margin-left: 0% !important;border-right-width: 3% !important;border-left-width: 0% !important;padding-right: 3% !important;padding-left: 0% !important;}&#8221;]\n<ul>\n<li style=\"text-align: justify;\">S\u2019assurer d\u2019avoir les capacit\u00e9s et le personnel suffisant pour fournir des connaissances sur les vuln\u00e9rabilit\u00e9s, les menaces et les incidents li\u00e9s aux TIC\u200b<\/li>\n<li style=\"text-align: justify;\"><span data-usefontface=\"true\" data-contrast=\"none\">R\u00e9aliser des examens Post-Mortem des incidents li\u00e9s aux TIC<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1739372591141{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1738678225273{margin-top: 0% !important;margin-bottom: 3% !important;border-top-width: 0% !important;border-bottom-width: 3% !important;padding-top: 0% !important;padding-bottom: 3% !important;background-color: #f4f4f4 !important;}&#8221; el_class=&#8221;tiretbleu&#8221;][vc_column_text css=&#8221;.vc_custom_1738678373043{margin-top: 0% !important;margin-bottom: 0% !important;border-top-width: 0% !important;border-bottom-width: 0% !important;padding-top: 1px !important;}&#8221;]\n<h2 data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><strong><span style=\"font-size: 18px;\">A- Identifier <\/span><\/strong><\/h2>\n<p data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 16px;\">Identifier classer et documenter les fonctions d\u00e9pendantes des TIC et les actifs des TIC\u200b<br \/><\/span><span style=\"font-size: 16px;\">Identifier toutes les sources de risques li\u00e9s aux TIC\u200b<br \/><\/span><span style=\"font-size: 16px;\">Evaluer les menaces et les vuln\u00e9rabilit\u00e9s pesant sur les TIC\u200b<br \/><\/span><span style=\"font-size: 16px;\" data-usefontface=\"true\" data-contrast=\"none\">Identifier et documenter tous les processus d\u00e9pendants de services TIC de Tiers<\/span><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1738678221299{margin-bottom: 3% !important;border-bottom-width: 3% !important;padding-bottom: 3% !important;background-color: #f4f4f4 !important;}&#8221; el_class=&#8221;tiretbleu&#8221;][vc_column_text]\n<h2 data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 18px;\"><span class=\"TextRun BCX8 SCXP130590418\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX8 SCXP130590418\">B &#8211; Prot\u00e9ger et anticiper<\/span><\/span><span class=\"EOP BCX8 SCXP130590418\">\u200b<\/span><\/span><\/h2>\n<p data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 16px;\">Strat\u00e9gies de s\u00e9curit\u00e9, politiques, proc\u00e9dures, protocoles et outils\u200b<br \/><\/span><span style=\"font-size: 16px;\" data-usefontface=\"true\" data-contrast=\"none\">Suivi et contr\u00f4le de la s\u00e9curit\u00e9 et fonctionnement des syst\u00e8mes et outils TIC<\/span><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1738678233027{margin-bottom: 3% !important;border-bottom-width: 3% !important;padding-bottom: 3% !important;background-color: #f4f4f4 !important;}&#8221; el_class=&#8221;tiretbleu&#8221;][vc_column_text]\n<h2 data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 18px;\"><span class=\"TextRun SCXP183922747 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP183922747 BCX8\">C &#8211; D\u00e9tecter<\/span><\/span><span class=\"EOP SCXP183922747 BCX8\">\u200b<\/span><\/span><\/h2>\n<p data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span class=\"TextRun SCXP212405890 BCX8\" lang=\"FR-FR\" style=\"font-size: 16px;\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP212405890 BCX8\">Mise en place de m\u00e9canismes de d\u00e9tection des activit\u00e9s anormales<\/span><\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1739372597864{margin-top: 5% !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;tiretbleu&#8221; css=&#8221;.vc_custom_1738662572511{background-color: #f4f4f4 !important;}&#8221;][vc_column_text]\n<h2 data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span class=\"TextRun BCX8 SCXP11529296\" lang=\"FR-FR\" style=\"font-size: 18px;\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun BCX8 SCXP11529296\">D &#8211; R\u00e9pondre<\/span><\/span><\/h2>\n<p data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 16px;\">Politique de continuit\u00e9 des activit\u00e9s TIC (communication de crise, plan de continuit\u00e9 d\u2019activit\u00e9 et de rem\u00e9diation)\u200b<br \/><\/span><span style=\"font-size: 16px;\" data-usefontface=\"true\" data-contrast=\"none\">Analyse d\u2019impact de l\u2019exposition aux perturbations graves de l\u2019activit\u00e9<\/span><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1738662587445{background-color: #f4f4f4 !important;}&#8221; el_class=&#8221;tiretbleu&#8221;][vc_column_text]\n<h2 data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 18px;\"><span class=\"TextRun SCXP171484044 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP171484044 BCX8\">E &#8211; Rem\u00e9dier<\/span><\/span><span class=\"EOP SCXP171484044 BCX8\">\u200b<\/span><\/span><\/h2>\n<p data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 16px;\">Disposer d\u2019au moins 1 site secondaire pour assurer la continuit\u00e9 d\u2019activit\u00e9\u200b<br \/><\/span><span style=\"font-size: 16px;\">Disposer de syst\u00e8mes de sauvegarde et de m\u00e9thodes de rem\u00e9diation\u200b<br \/><\/span><span style=\"font-size: 16px;\" data-scheme-color=\"@000000,1,\" data-usefontface=\"true\" data-contrast=\"none\">Mettre en place la politique et les proc\u00e9dures relatives aux sauvegardes<\/span><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;tiretbleu&#8221; css=&#8221;.vc_custom_1738662552857{background-color: #f4f4f4 !important;}&#8221;][vc_column_text]\n<h2 data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><strong><span style=\"font-size: 18px;\"><span class=\"TextRun SCXP144808017 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP144808017 BCX8\">F &#8211; Apprendre et \u00e9voluer<\/span><\/span><span class=\"EOP SCXP144808017 BCX8\">\u200b<\/span><\/span><\/strong><\/h2>\n<p data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 16px;\">S\u2019assurer d\u2019avoir les capacit\u00e9s et le personnel suffisant pour fournir des connaissances sur les vuln\u00e9rabilit\u00e9s, les menaces et les incidents li\u00e9s aux TIC\u200b<br \/><\/span><span style=\"font-size: 16px;\" data-usefontface=\"true\" data-contrast=\"none\">R\u00e9aliser des examens Post-Mortem des incidents li\u00e9s aux TIC<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row thb_divider_position=&#8221;bottom&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_tta_accordion title_tag=&#8221;h5&#8243; section_title_tag=&#8221;h5&#8243; shape=&#8221;square&#8221; c_position=&#8221;right&#8221; active_section=&#8221;nan&#8221; collapsible_all=&#8221;true&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;A &#8211; Identifier&#8221; tab_id=&#8221;1739379273027-5f051539-489d&#8221;][vc_column_text el_class=&#8221;cta&#8221; css=&#8221;.vc_custom_1739379470695{margin-right: 3% !important;border-right-width: 3% !important;padding-right: 3% !important;}&#8221;]\n<ul>\n<li style=\"text-align: justify;\">Identifier classer et documenter les fonctions d\u00e9pendantes des TIC et les actifs des TIC<\/li>\n<li style=\"text-align: justify;\">Identifier toutes les sources de risques li\u00e9s aux TIC\u200b<\/li>\n<li style=\"text-align: justify;\">Evaluer les menaces et les vuln\u00e9rabilit\u00e9s pesant sur les TIC\u200b<\/li>\n<li style=\"text-align: justify;\"><span data-usefontface=\"true\" data-contrast=\"none\">Identifier et documenter tous les processus d\u00e9pendants de services TIC de Tiers<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion title_tag=&#8221;h1&#8243; shape=&#8221;square&#8221; c_position=&#8221;right&#8221; active_section=&#8221;nan&#8221; collapsible_all=&#8221;true&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;D &#8211; R\u00e9pondre&#8221; tab_id=&#8221;1739379410301-7eeca548-92c6&#8243;][vc_column_text el_class=&#8221;cta&#8221; css=&#8221;.vc_custom_1739379465000{margin-right: 3% !important;border-right-width: 3% !important;padding-right: 3% !important;}&#8221;]\n<ul>\n<li style=\"text-align: justify;\">Politique de continuit\u00e9 des activit\u00e9s TIC (communication de crise, plan de continuit\u00e9 d\u2019activit\u00e9 et de rem\u00e9diation)\u200b<\/li>\n<li style=\"text-align: justify;\"><span data-usefontface=\"true\" data-contrast=\"none\">Analyse d\u2019impact de l\u2019exposition aux perturbations graves de l\u2019activit\u00e9<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_tta_accordion shape=&#8221;square&#8221; c_position=&#8221;right&#8221; active_section=&#8221;nan&#8221; collapsible_all=&#8221;true&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;B &#8211; Prot\u00e9ger et anticipier&#8221; tab_id=&#8221;1739379375537-b0daf7ef-08b4&#8243;][vc_column_text el_class=&#8221;cta&#8221; css=&#8221;.vc_custom_1739379480516{margin-right: 3% !important;border-right-width: 3% !important;padding-right: 3% !important;}&#8221;]\n<ul>\n<li style=\"text-align: justify;\">Strat\u00e9gies de s\u00e9curit\u00e9, politiques, proc\u00e9dures, protocoles et outils\u200b<\/li>\n<li style=\"text-align: justify;\"><span data-usefontface=\"true\" data-contrast=\"none\">Suivi et contr\u00f4le de la s\u00e9curit\u00e9 et fonctionnement des syst\u00e8mes et outils TIC<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion shape=&#8221;square&#8221; c_position=&#8221;right&#8221; active_section=&#8221;nan&#8221; collapsible_all=&#8221;true&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;E &#8211; Rem\u00e9dier&#8221; tab_id=&#8221;1739379489988-47c51ad9-e6ab&#8221;][vc_column_text el_class=&#8221;cta&#8221; css=&#8221;.vc_custom_1739379460394{margin-right: 3% !important;border-right-width: 3% !important;padding-right: 3% !important;}&#8221;]\n<ul>\n<li style=\"text-align: justify;\">Disposer d\u2019au moins 1 site secondaire pour assurer la continuit\u00e9 d\u2019activit\u00e9\u200b<\/li>\n<li style=\"text-align: justify;\">Disposer de syst\u00e8mes de sauvegarde et de m\u00e9thodes de rem\u00e9diation\u200b<\/li>\n<li style=\"text-align: justify;\"><span data-scheme-color=\"@000000,1,\" data-usefontface=\"true\" data-contrast=\"none\">Mettre en place la politique et les proc\u00e9dures relatives aux sauvegardes<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_tta_accordion shape=&#8221;square&#8221; c_position=&#8221;right&#8221; active_section=&#8221;nan&#8221; collapsible_all=&#8221;true&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;C &#8211; D\u00e9tecter&#8221; tab_id=&#8221;1739379413989-9e0a1292-0d01&#8243;][vc_column_text el_class=&#8221;cta&#8221; css=&#8221;.vc_custom_1739379520683{margin-right: 3% !important;border-right-width: 3% !important;padding-right: 3% !important;}&#8221;]\n<ul>\n<li style=\"text-align: justify;\">Mise en place de m\u00e9canismes de d\u00e9tection des activit\u00e9s anormales<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_tta_accordion shape=&#8221;square&#8221; c_position=&#8221;right&#8221; active_section=&#8221;nan&#8221; collapsible_all=&#8221;true&#8221; el_class=&#8221;accobleu3&#8243;][vc_tta_section title=&#8221;F &#8211; Apprendre et \u00e9voluer&#8221; tab_id=&#8221;1739379492789-d4d316d0-d048&#8243;][vc_column_text el_class=&#8221;cta&#8221; css=&#8221;.vc_custom_1739379540748{margin-right: 3% !important;border-right-width: 3% !important;padding-right: 3% !important;}&#8221;]\n<ul>\n<li style=\"text-align: justify;\">S\u2019assurer d\u2019avoir les capacit\u00e9s et le personnel suffisant pour fournir des connaissances sur les vuln\u00e9rabilit\u00e9s, les menaces et les incidents li\u00e9s aux TIC\u200b<\/li>\n<li style=\"text-align: justify;\"><span data-usefontface=\"true\" data-contrast=\"none\">R\u00e9aliser des examens Post-Mortem des incidents li\u00e9s aux TIC<\/span><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1738663665264{margin-top: 5% !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_column_text]\n<p style=\"text-align: justify;\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"color: #44546a;\"><b><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-3792 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/balance-de-la-justice.png\" alt=\"\" width=\"32\" height=\"32\" data-sizes=\"auto\" data-srcset=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/balance-de-la-justice.png 64w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/balance-de-la-justice-20x20.png 20w\" sizes=\"auto, (max-width: 32px) 100vw, 32px\" \/>Pilier 2 &#8211; Tests : Afin d\u2019assurer la robustesse des syst\u00e8mes financiers face aux cybermenaces, un programme de tests rigoureux et complet <\/b><b>est mis en place. Il comprend une s\u00e9rie d\u2019\u00e9valuations, de tests, de m\u00e9thodologies, de pratiques et d\u2019outils en adoptant une approche <\/b><b>fond\u00e9e sur le risque.<\/b><\/span>\u200b<\/p>\n<ul style=\"font-weight: 400; list-style-type: disc;\">\n<li style=\"text-align: justify;\" data-charcodes=\"8226\" data-font=\"Arial,Sans-Serif\" data-buautonum=\"8\" data-margin=\"450\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Obligation annuelle de tests de r\u00e9silience op\u00e9rationnelle : Les institutions financi\u00e8res doivent r\u00e9aliser des tests r\u00e9guliers afin d&#8217;\u00e9valuer leur <\/span><span data-usefontface=\"true\" data-contrast=\"none\">capacit\u00e9 \u00e0 r\u00e9sister \u00e0 des cyberattaques sophistiqu\u00e9es (scans, tests d\u2019intrusion, etc.).<\/span>\u200b<\/li>\n<li style=\"text-align: justify;\" data-charcodes=\"8226\" data-font=\"Arial,Sans-Serif\" data-buautonum=\"8\" data-margin=\"450\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">D\u00e9signation d\u2019acteurs syst\u00e9miques pour des tests avanc\u00e9s : Les autorit\u00e9s de r\u00e9gulation comp\u00e9tentes identifient des entit\u00e9s jug\u00e9es critiques <\/span><span data-usefontface=\"true\" data-contrast=\"none\">qui doivent r\u00e9aliser des tests de p\u00e9n\u00e9tration avanc\u00e9s.<\/span>\u200b<\/li>\n<li style=\"text-align: justify;\" data-charcodes=\"8226\" data-font=\"Arial,Sans-Serif\" data-buautonum=\"8\" data-margin=\"450\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Tests de p\u00e9n\u00e9tration fond\u00e9s sur la menace (TLPT \u2013 <\/span><span data-usefontface=\"true\" data-contrast=\"none\">Threat-Led<\/span> <span data-usefontface=\"true\" data-contrast=\"none\">Penetration<\/span> <span data-usefontface=\"true\" data-contrast=\"none\">Testing<\/span><span data-usefontface=\"true\" data-contrast=\"none\">) : Ces tests, obligatoires tous les trois ans pour les acteurs <\/span><span data-usefontface=\"true\" data-contrast=\"none\">syst\u00e9miques, permettent d\u2019\u00e9valuer la capacit\u00e9 des institutions \u00e0 faire face aux cyberattaques les plus complexes<\/span>\u200b<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1738663665264{margin-top: 5% !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_column_text]\n<p style=\"text-align: justify;\"><span style=\"color: #44546a;\"><b><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-3794 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/poignee-de-main.png\" alt=\"\" width=\"34\" height=\"34\" data-sizes=\"auto\" data-srcset=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/poignee-de-main.png 64w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/poignee-de-main-20x20.png 20w\" sizes=\"auto, (max-width: 34px) 100vw, 34px\" \/>Pilier 3 &#8211; <\/b><b>Prestataires TIC : <span class=\"TextRun SCXP90909470 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-scheme-color=\"@4EA72E,9,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP90909470 BCX8\">Elargissement du champ d&#8217;application aux prestataires et fournisseurs de services TIC<\/span><\/span><span class=\"EOP SCXP90909470 BCX8\">\u200b<\/span><\/b><\/span>\u200b<\/p>\n<ul style=\"font-weight: 400; text-align: justify;\">\n<li data-charcodes=\"8226\" data-font=\"Arial,Sans-Serif\" data-buautonum=\"8\" data-margin=\"450\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Ma\u00eetrise des risques sur toute la cha\u00eene : Une supervision sp\u00e9cifique est mise en place pour les tiers et fournisseurs de services TIC critiques.<\/span>\u200b<\/li>\n<li data-charcodes=\"8226\" data-font=\"Arial,Sans-Serif\" data-buautonum=\"8\" data-margin=\"450\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Responsabilit\u00e9 ultime de l\u2019entit\u00e9 financi\u00e8re : En cas d\u2019externalisation, l\u2019institution financi\u00e8re reste responsable.<\/span>\u200b<\/li>\n<li data-charcodes=\"8226\" data-font=\"Arial,Sans-Serif\" data-buautonum=\"8\" data-margin=\"450\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Encadrement des fonctions critiques : Mise en place d\u2019un cadre de gestion du risque d\u2019externalisation, obligation d\u2019une strat\u00e9gie de gestion des <\/span><span data-usefontface=\"true\" data-contrast=\"none\">risques et d\u2019un registre individuel des prestataires TIC.<\/span>\u200b<\/li>\n<li data-charcodes=\"8226\" data-font=\"Arial,Sans-Serif\" data-buautonum=\"8\" data-margin=\"450\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-usefontface=\"true\" data-contrast=\"none\">Contr\u00f4le des sous-d\u00e9l\u00e9gations : Les prestataires tiers doivent respecter des exigences suppl\u00e9mentaires pour toute sous-traitance.<\/span>\u200b<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1739375821760{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;]\n<p data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"color: #44546a;\"><b><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-3795 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/attention-1.png\" alt=\"\" width=\"34\" height=\"34\" data-sizes=\"auto\" data-srcset=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/attention-1.png 64w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/attention-1-20x20.png 20w\" sizes=\"auto, (max-width: 34px) 100vw, 34px\" \/>Pilier 4 &#8211; Alerte : <span class=\"TextRun Underlined SCXP171773342 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-scheme-color=\"@4EA72E,9,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SingleUnderline SCXP171773342 BCX8\">Signalement obligatoire de tout incident aux autorit\u00e9s et d\u00e9lais<\/span><\/span><span class=\"EOP SCXP171773342 BCX8\">\u200b<\/span><\/b>\u200b<\/span><\/p>\n<p style=\"text-align: justify;\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 16px;\">Tout incident majeur doit obligatoirement \u00eatre signal\u00e9 aux autorit\u00e9s comp\u00e9tentes (notification initiale 4h apr\u00e8s classification de l\u2019incident comme majeur, et sous 24h apr\u00e8s sa d\u00e9tection. Rapport interm\u00e9diaire 72h apr\u00e8s la notification, puis rapport final 1 mois apr\u00e8s)\u200b<\/span><\/p>\n<p style=\"text-align: justify;\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><b><span data-usefontface=\"true\" data-contrast=\"none\">Cadre pour la classification des incidents majeurs :<\/span><\/b><\/p>\n<p style=\"text-align: justify;\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><b><span data-usefontface=\"true\" data-contrast=\"none\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3581 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/Sans-titre-1500-x-1022-px-1500-x-1400-px-2400-x-1400-px-1.png\" alt=\"\" width=\"2400\" height=\"1400\" data-sizes=\"auto\" data-srcset=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/Sans-titre-1500-x-1022-px-1500-x-1400-px-2400-x-1400-px-1.png 2400w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/Sans-titre-1500-x-1022-px-1500-x-1400-px-2400-x-1400-px-1-1024x597.png 1024w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/Sans-titre-1500-x-1022-px-1500-x-1400-px-2400-x-1400-px-1-768x448.png 768w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/Sans-titre-1500-x-1022-px-1500-x-1400-px-2400-x-1400-px-1-1536x896.png 1536w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/Sans-titre-1500-x-1022-px-1500-x-1400-px-2400-x-1400-px-1-2048x1195.png 2048w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/Sans-titre-1500-x-1022-px-1500-x-1400-px-2400-x-1400-px-1-640x373.png 640w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/Sans-titre-1500-x-1022-px-1500-x-1400-px-2400-x-1400-px-1-20x12.png 20w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/Sans-titre-1500-x-1022-px-1500-x-1400-px-2400-x-1400-px-1-320x187.png 320w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/Sans-titre-1500-x-1022-px-1500-x-1400-px-2400-x-1400-px-1-1280x747.png 1280w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/Sans-titre-1500-x-1022-px-1500-x-1400-px-2400-x-1400-px-1-1920x1120.png 1920w\" sizes=\"auto, (max-width: 2400px) 100vw, 2400px\" \/> <\/span><\/b><\/p>\n<p style=\"text-align: justify;\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"color: #44546a;\"><b><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3796 alignleft lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/fleches-opposees.png\" alt=\"\" width=\"30\" height=\"30\" data-sizes=\"auto\" data-srcset=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/fleches-opposees.png 64w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/fleches-opposees-20x20.png 20w\" sizes=\"auto, (max-width: 30px) 100vw, 30px\" \/>Pilier 5 &#8211; Transparence et \u00e9change d\u2019informations : <span class=\"TextRun SCXP169082738 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-scheme-color=\"@4EA72E,9,\" data-usefontface=\"true\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP169082738 BCX8\">Am\u00e9lioration collective de la r\u00e9silience des acteurs concern\u00e9s<\/span><\/span><span class=\"EOP SCXP169082738 BCX8\">\u200b<\/span><\/b>\u200b<\/span><\/p>\n<p style=\"text-align: justify;\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 16px;\">Renforcement de la communication aupr\u00e8s de toutes les parties prenantes sur toutes les mesures de renforcement de la r\u00e9silience num\u00e9rique (autorit\u00e9s comp\u00e9tentes, clients, \u2026)\u200b<\/span><br \/><span style=\"font-size: 16px;\">Template de reporting des cyber-menaces jug\u00e9s importantes, sur base du volontariat pour contribuer \u00e0 la r\u00e9silience du secteur financier.<br \/>Encouragements \u00e0 partager toutes les informations et renseignement sur les cybermenaces pour soutenir les capacit\u00e9s de d\u00e9tection\u200b et de d\u00e9fense.<\/span><\/p>\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;]\t<div id=\"thb-iconbox-69f189e4895ef\" class=\"thb-iconbox top type2 has-img   animation-off \" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t\t\t<figure>\n\t\t\t\t\t\t\t<div class=\"iconbox-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" class=\"thb_image lazyload attachment-full thb-lazyload lazyload\" alt=\"\" title=\"gouvernement\" sizes=\"auto, (max-width: 128px) 100vw, 128px\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/gouvernement.png\" data-sizes=\"auto\" data-srcset=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/gouvernement.png 128w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/gouvernement-20x20.png 20w\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Gouvernance et Supervision<\/h5>\t\t\t<div class=\"thb-iconbox-text\">\n\t\t\t\t<p>Les autorit\u00e9s nationales comp\u00e9tentes (ANC) et les autorit\u00e9s europ\u00e9ennes (ABE, ESMA, EIOPA) jouent un r\u00f4le cl\u00e9 dans la supervision et l'application des r\u00e8gles de DORA.<br \/>Ces autorit\u00e9s peuvent imposer des sanctions en cas de non-conformit\u00e9.<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<style>\n\t\t\t\t\t\t\t\t\t#thb-iconbox-69f189e4895ef.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-69f189e4895ef.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-69f189e4895ef.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-69f189e4895ef.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #f17b20;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-iconbox-69f189e4895ef.thb-iconbox figure {\n\t\t\t\t\twidth: 64px;\n\t\t\t\t\theight: auto;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-iconbox-69f189e4895ef.thb-iconbox.type2:hover {\n\t\t\t\t\tbackground-color: #629fb9;\n\t\t\t\t\tborder-color: #629fb9;\n\t\t\t\t}\n\t\t\t\t#thb-iconbox-69f189e4895ef.thb-iconbox.type3:after {\n\t\t\t\t\tbox-shadow: inset 0 -75px 60px -35px #629fb9;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t\t  #thb-iconbox-69f189e4895ef.thb-iconbox .iconbox-content p {\n\t\t\t\t  font-size: 14px;\n\t\t\t  }\n\t\t\t\t\t<\/style>\n\t\t\t<\/div>\n\t\t<div id=\"thb-iconbox-69f189e48a010\" class=\"thb-iconbox top type2 has-img   animation-off \" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t\t\t<figure>\n\t\t\t\t\t\t\t<div class=\"iconbox-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" class=\"thb_image lazyload attachment-full thb-lazyload lazyload\" alt=\"\" title=\"calendrier (7)\" sizes=\"auto, (max-width: 128px) 100vw, 128px\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/calendrier-7.png\" data-sizes=\"auto\" data-srcset=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/calendrier-7.png 128w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/calendrier-7-20x20.png 20w\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Quand ?<\/h5>\t\t\t<div class=\"thb-iconbox-text\">\n\t\t\t\t<p>Depuis le 17 Janvier 2025<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<style>\n\t\t\t\t\t\t\t\t\t#thb-iconbox-69f189e48a010.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-69f189e48a010.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-69f189e48a010.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-69f189e48a010.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #f17b20;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-iconbox-69f189e48a010.thb-iconbox figure {\n\t\t\t\t\twidth: 64px;\n\t\t\t\t\theight: auto;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-iconbox-69f189e48a010.thb-iconbox.type2:hover {\n\t\t\t\t\tbackground-color: #629fb9;\n\t\t\t\t\tborder-color: #629fb9;\n\t\t\t\t}\n\t\t\t\t#thb-iconbox-69f189e48a010.thb-iconbox.type3:after {\n\t\t\t\t\tbox-shadow: inset 0 -75px 60px -35px #629fb9;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t\t  #thb-iconbox-69f189e48a010.thb-iconbox .iconbox-content p {\n\t\t\t\t  font-size: 14px;\n\t\t\t  }\n\t\t\t\t\t<\/style>\n\t\t\t<\/div>\n\t\t<div id=\"thb-iconbox-69f189e48a591\" class=\"thb-iconbox top type2 has-img   animation-off \" href=\"\" target=\"_self\" data-animation_speed=\"1.5\">\n\t\t\t\t\t\t<figure>\n\t\t\t\t\t\t\t<div class=\"iconbox-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" class=\"thb_image lazyload attachment-full thb-lazyload lazyload\" alt=\"\" title=\"cible\" sizes=\"auto, (max-width: 128px) 100vw, 128px\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/cible.png\" data-sizes=\"auto\" data-srcset=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/cible.png 128w, https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/02\/cible-20x20.png 20w\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/figure>\n\t\t\t\t<div class=\"iconbox-content\">\n\t\t\t\t\t\t\t<h5>Quels impacts ?<\/h5>\t\t\t<div class=\"thb-iconbox-text\">\n\t\t\t\t<p>Co\u00fbt de mise en conformit\u00e9 : Les entreprises doivent investir dans des technologies, des processus et des formations pour r\u00e9pondre aux exigences de DORA.<br \/>Opportunit\u00e9s : Une meilleure r\u00e9silience num\u00e9rique peut renforcer la confiance des clients et am\u00e9liorer la comp\u00e9titivit\u00e9 sur le march\u00e9.<br \/>Risques : Les entreprises qui ne respectent pas les exigences peuvent faire face \u00e0 des sanctions financi\u00e8res et \u00e0 des dommages sur leur activit\u00e9 et leur r\u00e9putation.<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<style>\n\t\t\t\t\t\t\t\t\t#thb-iconbox-69f189e48a591.thb-iconbox figure svg path,\n\t\t\t#thb-iconbox-69f189e48a591.thb-iconbox figure svg circle,\n\t\t\t#thb-iconbox-69f189e48a591.thb-iconbox figure svg rect,\n\t\t\t#thb-iconbox-69f189e48a591.thb-iconbox figure svg ellipse {\n\t\t\t\tstroke: #f17b20;\n\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-iconbox-69f189e48a591.thb-iconbox figure {\n\t\t\t\t\twidth: 64px;\n\t\t\t\t\theight: auto;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t#thb-iconbox-69f189e48a591.thb-iconbox.type2:hover {\n\t\t\t\t\tbackground-color: #629fb9;\n\t\t\t\t\tborder-color: #629fb9;\n\t\t\t\t}\n\t\t\t\t#thb-iconbox-69f189e48a591.thb-iconbox.type3:after {\n\t\t\t\t\tbox-shadow: inset 0 -75px 60px -35px #629fb9;\n\t\t\t\t}\n\t\t\t\t\t\t\t\t\t\t\t\t\/* Hover *\/\n\t\t\t\t\t\t\t\t\t\t\t\t  #thb-iconbox-69f189e48a591.thb-iconbox .iconbox-content p {\n\t\t\t\t  font-size: 14px;\n\t\t\t  }\n\t\t\t\t\t<\/style>\n\t\t\t<\/div>\n\t[\/vc_column][\/vc_row][vc_row thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1739381279249{background-color: #f7f7f7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1739382288052{margin-top: 3% !important;margin-bottom: 0% !important;border-bottom-width: 0% !important;padding-bottom: 0% !important;}&#8221;]\n<h3 style=\"text-align: center;\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559683&quot;:0,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335562764&quot;:2,&quot;335562765&quot;:1.15,&quot;335562766&quot;:4,&quot;335562767&quot;:0,&quot;335562768&quot;:4,&quot;335562769&quot;:0}\"><span style=\"font-size: 16px;\">Command Strategy vous aide \u00e0 mettre en \u0153uvre cette r\u00e9glementation gr\u00e2ce \u00e0 des solutions adapt\u00e9es \u00e0 vos enjeux. Pour toute demande d\u2019accompagnement, contactez notre \u00e9quipe.<\/span><\/h3>\n[\/vc_column_text][vc_btn title=&#8221;Contactez-nous&#8221; style=&#8221;classic&#8221; color=&#8221;black&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1739382728242{margin-top: 2% !important;margin-bottom: 3% !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.commandstrategy.com%2Fcontact%2F|target:_blank&#8221;][\/vc_column][\/vc_row][vc_row thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1755768322871{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1755769144851{margin-top: 3% !important;margin-bottom: 0% !important;border-bottom-width: 0% !important;padding-bottom: 0% !important;}&#8221;]\n<div style=\"max-width: 380px; margin: 20px auto; border: 1px solid #eee; border-radius: 10px; padding: 20px; background: #fafafa; box-shadow: 0 2px 8px rgba(0,0,0,0.05); text-align: center;\">\n<p><img loading=\"lazy\" decoding=\"async\" style=\"border-radius: 50%; box-shadow: 0 2px 6px rgba(0,0,0,0.1); margin-bottom: 6px;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/06\/photo_cercle_final.png\" alt=\"Vincent TARRIT\" width=\"90\" height=\"90\" class=\"lazyload\" \/><\/p>\n<div style=\"font-size: 12px; color: #999; margin-bottom: 2px; line-height: 1.2;\">Auteur<\/div>\n<div style=\"font-size: 16px; font-weight: bold; color: #111; margin-bottom: 2px; line-height: 1.3;\">Vincent TARRIT<\/div>\n<div style=\"font-size: 14px; color: #666; line-height: 1.2;\">Manager<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1755769173826{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1755768813048{margin-top: 3% !important;margin-bottom: 0% !important;border-bottom-width: 0% !important;padding-bottom: 0% !important;}&#8221;]\n<div style=\"max-width: 500px; margin: 20px auto; border: 1px solid #eee; border-radius: 10px; padding: 18px 20px; background: #fafafa; box-shadow: 0 2px 8px rgba(0,0,0,0.05); display: flex; flex-direction: row; align-items: center; gap: 15px;\">\n<p><img loading=\"lazy\" decoding=\"async\" style=\"border-radius: 50%; box-shadow: 0 2px 6px rgba(0,0,0,0.1);\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/06\/photo_cercle_final.png\" alt=\"Vincent TARRIT\" width=\"80\" height=\"80\" class=\"lazyload\" \/><\/p>\n<div>\n<div style=\"font-size: 12px; color: #999; margin-bottom: 2px;\">Auteur<\/div>\n<div style=\"font-size: 16px; font-weight: bold; color: #111;\">Vincent TARRIT<\/div>\n<div style=\"font-size: 14px; color: #666;\">Manager<\/div>\n<\/div>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_column css=&#8221;.vc_custom_1715255294334{padding-top: 5% !important;padding-bottom: 4% !important;}&#8221;][\/vc_column][vc_column_inner][\/vc_column_inner]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1738663599205{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;][vc_column css=&#8221;.vc_custom_1738663616915{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1739177429150{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;] Context Increased&hellip;<\/p>\n","protected":false},"author":2,"featured_media":6049,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ub_ctt_via":"","footnotes":""},"categories":[15],"tags":[],"class_list":["post-5543","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles-en"],"featured_image_src":"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg","author_info":{"display_name":"Tidia YETTOU","author_link":"https:\/\/www.commandstrategy.com\/en\/author\/cmds\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DORA regulations - Command Strategy<\/title>\n<meta name=\"description\" content=\"Discover the impact of the DORA regulation on digital risk management and compliance in the financial sector, with expert guidance from Command Strategy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA regulations - Command Strategy\" \/>\n<meta property=\"og:description\" content=\"Discover the impact of the DORA regulation on digital risk management and compliance in the financial sector, with expert guidance from Command Strategy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/\" \/>\n<meta property=\"og:site_name\" content=\"Command Strategy\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-03T15:36:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"783\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tidia YETTOU\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tidia YETTOU\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/\"},\"author\":{\"name\":\"Tidia YETTOU\",\"@id\":\"https:\/\/www.commandstrategy.com\/en\/#\/schema\/person\/5dbd1656e88af114296e65484885d53c\"},\"headline\":\"DORA regulations\",\"datePublished\":\"2025-09-03T15:36:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/\"},\"wordCount\":3285,\"publisher\":{\"@id\":\"https:\/\/www.commandstrategy.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/\",\"url\":\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/\",\"name\":\"DORA regulations - Command Strategy\",\"isPartOf\":{\"@id\":\"https:\/\/www.commandstrategy.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg\",\"datePublished\":\"2025-09-03T15:36:45+00:00\",\"description\":\"Discover the impact of the DORA regulation on digital risk management and compliance in the financial sector, with expert guidance from Command Strategy\",\"breadcrumb\":{\"@id\":\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#primaryimage\",\"url\":\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg\",\"contentUrl\":\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg\",\"width\":1200,\"height\":783},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.commandstrategy.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA regulations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.commandstrategy.com\/en\/#website\",\"url\":\"https:\/\/www.commandstrategy.com\/en\/\",\"name\":\"Command Strategy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.commandstrategy.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.commandstrategy.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.commandstrategy.com\/en\/#organization\",\"name\":\"Command Strategy\",\"url\":\"https:\/\/www.commandstrategy.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.commandstrategy.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2023\/10\/LogoCommandStrategy_Orange-1.jpg\",\"contentUrl\":\"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2023\/10\/LogoCommandStrategy_Orange-1.jpg\",\"width\":964,\"height\":458,\"caption\":\"Command Strategy\"},\"image\":{\"@id\":\"https:\/\/www.commandstrategy.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.commandstrategy.com\/en\/#\/schema\/person\/5dbd1656e88af114296e65484885d53c\",\"name\":\"Tidia YETTOU\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.commandstrategy.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1a7b17ef3b6192517a63690214027f59e57ed1b540e3b225cbd1dc2e86dcca12?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1a7b17ef3b6192517a63690214027f59e57ed1b540e3b225cbd1dc2e86dcca12?s=96&d=mm&r=g\",\"caption\":\"Tidia YETTOU\"},\"url\":\"https:\/\/www.commandstrategy.com\/en\/author\/cmds\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DORA regulations - Command Strategy","description":"Discover the impact of the DORA regulation on digital risk management and compliance in the financial sector, with expert guidance from Command Strategy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/","og_locale":"en_US","og_type":"article","og_title":"DORA regulations - Command Strategy","og_description":"Discover the impact of the DORA regulation on digital risk management and compliance in the financial sector, with expert guidance from Command Strategy","og_url":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/","og_site_name":"Command Strategy","article_published_time":"2025-09-03T15:36:45+00:00","og_image":[{"width":1200,"height":783,"url":"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg","type":"image\/jpeg"}],"author":"Tidia YETTOU","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tidia YETTOU","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#article","isPartOf":{"@id":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/"},"author":{"name":"Tidia YETTOU","@id":"https:\/\/www.commandstrategy.com\/en\/#\/schema\/person\/5dbd1656e88af114296e65484885d53c"},"headline":"DORA regulations","datePublished":"2025-09-03T15:36:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/"},"wordCount":3285,"publisher":{"@id":"https:\/\/www.commandstrategy.com\/en\/#organization"},"image":{"@id":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#primaryimage"},"thumbnailUrl":"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg","articleSection":["Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/","url":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/","name":"DORA regulations - Command Strategy","isPartOf":{"@id":"https:\/\/www.commandstrategy.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#primaryimage"},"image":{"@id":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#primaryimage"},"thumbnailUrl":"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg","datePublished":"2025-09-03T15:36:45+00:00","description":"Discover the impact of the DORA regulation on digital risk management and compliance in the financial sector, with expert guidance from Command Strategy","breadcrumb":{"@id":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#primaryimage","url":"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg","contentUrl":"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg","width":1200,"height":783},{"@type":"BreadcrumbList","@id":"https:\/\/www.commandstrategy.com\/en\/dora-regulations-6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.commandstrategy.com\/en\/"},{"@type":"ListItem","position":2,"name":"DORA regulations"}]},{"@type":"WebSite","@id":"https:\/\/www.commandstrategy.com\/en\/#website","url":"https:\/\/www.commandstrategy.com\/en\/","name":"Command Strategy","description":"","publisher":{"@id":"https:\/\/www.commandstrategy.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.commandstrategy.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.commandstrategy.com\/en\/#organization","name":"Command Strategy","url":"https:\/\/www.commandstrategy.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commandstrategy.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2023\/10\/LogoCommandStrategy_Orange-1.jpg","contentUrl":"https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2023\/10\/LogoCommandStrategy_Orange-1.jpg","width":964,"height":458,"caption":"Command Strategy"},"image":{"@id":"https:\/\/www.commandstrategy.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.commandstrategy.com\/en\/#\/schema\/person\/5dbd1656e88af114296e65484885d53c","name":"Tidia YETTOU","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commandstrategy.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1a7b17ef3b6192517a63690214027f59e57ed1b540e3b225cbd1dc2e86dcca12?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a7b17ef3b6192517a63690214027f59e57ed1b540e3b225cbd1dc2e86dcca12?s=96&d=mm&r=g","caption":"Tidia YETTOU"},"url":"https:\/\/www.commandstrategy.com\/en\/author\/cmds\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg",1200,783,false],"landscape":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg",1200,783,false],"portraits":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg",1200,783,false],"thumbnail":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-150x150.jpg",150,150,true],"medium":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-300x300.jpg",300,300,true],"large":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-1024x668.jpg",1024,668,true],"1536x1536":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg",1200,783,false],"2048x2048":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg",1200,783,false],"post-thumbnail":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-80x75.jpg",80,75,true],"werkstatt-square":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-160x150.jpg",160,150,true],"werkstatt-slider":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg",1200,783,false],"werkstatt-blog":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-320x200.jpg",320,200,true],"werkstatt-bloglarge":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-640x320.jpg",640,320,true],"werkstatt-masonry":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-640x418.jpg",640,418,true],"werkstatt-squarelarge":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-380x350.jpg",380,350,true],"werkstatt-rectangle":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-320x240.jpg",320,240,true],"werkstatt-tall":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-380x700.jpg",380,700,true],"werkstatt-wide":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-760x350.jpg",760,350,true],"werkstatt-square-small":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-80x300.jpg",80,300,true],"werkstatt-square-2x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-320x300.jpg",320,300,true],"werkstatt-square-3x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-480x450.jpg",480,450,true],"werkstatt-square-mini":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-20x18.jpg",20,18,true],"werkstatt-slider-small":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-800x783.jpg",800,783,true],"werkstatt-slider-2x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg",1200,783,false],"werkstatt-slider-mini":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-20x11.jpg",20,11,true],"werkstatt-blog-small":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-160x400.jpg",160,400,true],"werkstatt-blog-2x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-640x400.jpg",640,400,true],"werkstatt-blog-mini":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-20x12.jpg",20,12,true],"werkstatt-bloglarge-small":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-320x640.jpg",320,640,true],"werkstatt-bloglarge-2x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-1200x640.jpg",1200,640,true],"werkstatt-bloglarge-mini":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-20x10.jpg",20,10,true],"werkstatt-masonry-small":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-320x209.jpg",320,209,true],"werkstatt-masonry-2x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg",1200,783,false],"werkstatt-masonry-3x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg",1200,783,false],"werkstatt-masonry-mini":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-20x13.jpg",20,13,true],"werkstatt-squarelarge-small":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-190x700.jpg",190,700,true],"werkstatt-squarelarge-2x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-760x700.jpg",760,700,true],"werkstatt-squarelarge-3x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-1140x783.jpg",1140,783,true],"werkstatt-squarelarge-mini":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-20x18.jpg",20,18,true],"werkstatt-rectangle-small":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-160x480.jpg",160,480,true],"werkstatt-rectangle-2x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-640x480.jpg",640,480,true],"werkstatt-rectangle-3x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-960x720.jpg",960,720,true],"werkstatt-rectangle-mini":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-20x15.jpg",20,15,true],"werkstatt-tall-small":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-190x783.jpg",190,783,true],"werkstatt-tall-2x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-760x783.jpg",760,783,true],"werkstatt-tall-3x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-1140x783.jpg",1140,783,true],"werkstatt-tall-mini":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-20x36.jpg",20,36,true],"werkstatt-wide-small":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-380x700.jpg",380,700,true],"werkstatt-wide-2x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-1200x700.jpg",1200,700,true],"werkstatt-wide-3x":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796.jpg",1200,783,false],"werkstatt-wide-mini":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-20x9.jpg",20,9,true],"psacp-medium":["https:\/\/www.commandstrategy.com\/wp-content\/uploads\/2025\/09\/iStock-1661126796-500x500.jpg",500,500,true]},"rttpg_author":{"display_name":"Tidia YETTOU","author_link":"https:\/\/www.commandstrategy.com\/en\/author\/cmds\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/www.commandstrategy.com\/en\/.\/articles-en\/\" rel=\"category tag\">Articles<\/a>","rttpg_excerpt":"[vc_row thb_divider_position=&#8221;bottom&#8221; css=&#8221;.vc_custom_1738663599205{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;][vc_column css=&#8221;.vc_custom_1738663616915{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1739177429150{margin-top: 0% !important;border-top-width: 0% !important;padding-top: 0% !important;}&#8221;] Context Increased&hellip;","_links":{"self":[{"href":"https:\/\/www.commandstrategy.com\/en\/wp-json\/wp\/v2\/posts\/5543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commandstrategy.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commandstrategy.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commandstrategy.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commandstrategy.com\/en\/wp-json\/wp\/v2\/comments?post=5543"}],"version-history":[{"count":1,"href":"https:\/\/www.commandstrategy.com\/en\/wp-json\/wp\/v2\/posts\/5543\/revisions"}],"predecessor-version":[{"id":5544,"href":"https:\/\/www.commandstrategy.com\/en\/wp-json\/wp\/v2\/posts\/5543\/revisions\/5544"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commandstrategy.com\/en\/wp-json\/wp\/v2\/media\/6049"}],"wp:attachment":[{"href":"https:\/\/www.commandstrategy.com\/en\/wp-json\/wp\/v2\/media?parent=5543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commandstrategy.com\/en\/wp-json\/wp\/v2\/categories?post=5543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commandstrategy.com\/en\/wp-json\/wp\/v2\/tags?post=5543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}