{"id":77447,"date":"2018-04-11T10:59:56","date_gmt":"2018-04-11T10:59:56","guid":{"rendered":"https:\/\/www.internetsociety.org\/collaborative-security\/"},"modified":"2023-08-08T21:26:47","modified_gmt":"2023-08-08T21:26:47","slug":"collaborative-security","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/collaborativesecurity\/","title":{"rendered":"S\u00e9curit\u00e9 Collaborative"},"content":{"rendered":"<div class=\"content-container\"><main id=\"content\" class=\"content\"><\/p>\n<section class=\"component-row component-theme-background  padding-top padding-bottom row-text-white  \" style=\"background-repeat: no-repeat; background-size: cover; background-position: center center; background-color: #0c1c2c; background-image: url('https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/stefan-stefancik-257625-unsplash-768x512.jpg');\" data-bgverylarge=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/stefan-stefancik-257625-unsplash.jpg\" data-bglarge=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/stefan-stefancik-257625-unsplash-1024x683.jpg\" data-bgmediumlarge=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/stefan-stefancik-257625-unsplash-768x512.jpg\" data-bgmedium=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/stefan-stefancik-257625-unsplash-300x200.jpg\" data-logo-color=\"row-text-white\">\n<div class=\"background-gradient\"><\/div>\n<div class=\"component-row-inner pure-g component-row-standard component-alignment-center \">\n<div class=\"column desktop-hidden tablet-hidden mobile-hidden component-theme-default\"><\/div>\n<div class=\"column  pure-u-lg--1 pure-u-md-1-1 pure-u-sm-1-1 component-theme-default \">\n<section class=\"component component-text\">\n<div class=\"content-wrapper\">\n<h1 class=\"headline2 align-center\">S\u00e9curit\u00e9 Collaborative<\/h1>\n<div class=\"body-text align-center\">\n<p>Les individus sont la force que tient Internet. Le d\u00e9veloppement d\u2019Internet a \u00e9t\u00e9 bas\u00e9 sur la coop\u00e9ration et la collaboration des volontaires. Ces deux facteurs restent essentiels de la prosp\u00e9rit\u00e9 et du potentiel d\u2019Internet.<\/p>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"component-row component-theme-default  padding-top-small padding-bottom-small row-text-black  \" data-logo-color=\"row-text-black\">\n<div class=\"component-row-inner pure-g component-row-standard component-alignment-center \">\n<div class=\"column desktop-hidden tablet-hidden mobile-hidden component-theme-default\"><\/div>\n<div class=\"column  pure-u-lg-3-4 pure-u-md-3-4 pure-u-sm-4-4 component-theme-default \">\n<section class=\"component component-text\">\n<div class=\"content-wrapper\">\n<div class=\"body-text align-center\">\n<p>La <strong>s\u00e9curit\u00e9 collaborative<\/strong> est une approche caract\u00e9ris\u00e9e par cinq \u00e9l\u00e9ments cl\u00e9s:<\/p>\n<ul>\n<li>Favoriser la confiance et prot\u00e9ger les opportunit\u00e9s: L\u2019objectif de la s\u00e9curit\u00e9 est de renforcer la confiance dans Internet et d\u2019assurer le succ\u00e8s continu d\u2019Internet en tant que moteur de l\u2019innovation \u00e9conomique et sociale.<\/li>\n<li>Responsabilit\u00e9 collective: les participants \u00e0 Internet partagent une responsabilit\u00e9 envers le syst\u00e8me dans son ensemble.<\/li>\n<li>Propri\u00e9t\u00e9s et valeurs fondamentales: Les solutions de s\u00e9curit\u00e9 doivent \u00eatre compatibles avec les droits de l\u2019homme fondamentaux et pr\u00e9server les propri\u00e9t\u00e9s fondamentales d\u2019Internet \u2013 les invariants Internet.<\/li>\n<li>\u00c9volution et consensus: Une s\u00e9curit\u00e9 efficace repose sur des \u00e9tapes \u00e9volutives agiles bas\u00e9es sur l\u2019expertise d\u2019un large \u00e9ventail de parties prenantes.<\/li>\n<li>Penser globalement, agir localement: C\u2019est gr\u00e2ce \u00e0 une auto-organisation ascendante volontaire que les solutions les plus efficaces sont susceptibles d\u2019avoir abouti.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"column desktop-hidden tablet-hidden mobile-hidden component-theme-default padding-left\"><\/div>\n<div class=\"column  pure-u-lg-1-4 pure-u-md-1-4 pure-u-sm-4-4 component-theme-default padding-left \">\n<section class=\"component component-text\">\n<div class=\"content-wrapper\">\n<div class=\"body-text align-center\">\n<div style=\"background-color: white; text-align: center;\">\n<a href=\"https:\/\/www.internetsociety.org\/collaborativesecurity\/approach\/\"><img decoding=\"async\" class=\"aligncenter\" style=\"width: 150px;\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/collsec.jpg\" \/><\/a>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/collaborativesecurity\/approach\/\">Lire\u00a0 \u00ab\u00a0Collaborative Security: An approach to tackling Internet Security issues\u00a0\u00bb<\/a><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"component-row component-theme-default  padding-top-small padding-bottom-small row-text-black  \" data-logo-color=\"row-text-black\">\n<div class=\"component-row-inner pure-g component-row-standard component-alignment-center \">\n<div class=\"column desktop-hidden tablet-hidden mobile-hidden component-theme-default\"><\/div>\n<div class=\"column  pure-u-lg--1 pure-u-md-1-1 pure-u-sm-1-1 component-theme-default \">\n<section class=\"component component-boxes boxes-3\">\n<div class=\"content-wrapper align-center\">\n<h2 class=\"headline2 align-center\">Exemples de s\u00e9curit\u00e9 collaborative en action<\/h2>\n<div class=\"boxes\">\n<div class=\"box-item row-text-white #02837d\" style=\"background-color: #02837d;\">\n<h3 class=\"font-size:32px; headline6\">Un effort multipartite pour r\u00e9duire le spam &#8211; Le cas du Br\u00e9sil (2005 -)<\/h3>\n<div class=\"body-text\">\n<p>CGI.br a mis en place un groupe de travail anti-spam (CT-Spam) compos\u00e9 de parties prenantes et, gr\u00e2ce \u00e0 un grand nombre d\u2019actions positives et coordonn\u00e9es, a r\u00e9ussi \u00e0 r\u00e9duire la quantit\u00e9 de spam provenant des r\u00e9seaux br\u00e9siliens.<\/p>\n<p><a href=\"https:\/\/www.cert.br\/docs\/palestras\/certbr-isoc-lac2014.pdf\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"box-item row-text-white #02837d\" style=\"background-color: #02837d;\">\n<h4 class=\"headline6\">Mutually Agreed Norms for Routing Security (MANRS)<br \/>\n(2014 &#8211; )<\/h4>\n<div class=\"body-text\">\n<p>Au d\u00e9but de 2014, un groupe d\u2019op\u00e9rateurs de r\u00e9seaux a commenc\u00e9 \u00e0 travailler pour rassembler la communaut\u00e9 \u00e9largie afin d\u2019am\u00e9liorer la s\u00e9curit\u00e9 et la r\u00e9silience du syst\u00e8me de routage mondial. Aujourd\u2019hui, deux cat\u00e9gories de participants (op\u00e9rateurs de r\u00e9seau et IXP) d\u00e9finissent une base d\u2019actions \u00e0 suivre pour s\u00e9curiser l\u2019\u00e9cosyst\u00e8me de routage global. Ensemble, nous fournissons des correctifs essentiels pour r\u00e9duire les menaces de routage les plus courantes.<\/p>\n<p><a href=\"https:\/\/www.manrs.org\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"box-item row-text-white #02837d\" style=\"background-color: #02837d;\">\n<h4 class=\"headline6\">Projet canadien de s\u00e9curit\u00e9 de l&rsquo;IoT (2018)<\/h4>\n<div class=\"body-text\">\n<p>Processus d\u2019une ann\u00e9e pour \u00e9laborer des recommandations pour un ensemble de normes et \/ ou de politiques visant \u00e0 s\u00e9curiser l\u2019IdO au Canada. L\u2019Internet Society s\u2019est associ\u00e9e \u00e0 Innovation, Sciences et D\u00e9veloppement \u00e9conomique (<a href=\"https:\/\/www.canada.ca\/en\/innovation-science-economic-development.html\">Innovation, Science and Economic Development)<\/a>, \u00e0 l\u2019Autorit\u00e9 canadienne pour les enregistrements Internet (<a href=\"https:\/\/cira.ca\/\">Canadian Internet Registration Authority)<\/a>, \u00e0\u00a0<a href=\"https:\/\/www.canarie.ca\/language\/\">CANARIE<\/a> et \u00e0\u00a0<a href=\"https:\/\/cippic.ca\/\">CIPPIC<\/a> pour organiser la premi\u00e8re de plusieurs r\u00e9unions multipartites sur la s\u00e9curit\u00e9 des dispositifs IoT le 4 avril 2018 \u00e0 Ottawa, au Canada.<\/p>\n<p><a href=\"https:\/\/www.internetsociety.org\/blog\/2018\/03\/enhancing-iot-security-kicks-off-ottawa\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"column desktop-hidden tablet-hidden mobile-hidden component-theme-default\"><\/div>\n<div class=\"column  pure-u-lg--1 pure-u-md-1-1 pure-u-sm-1-1 component-theme-default \">\n<section class=\"component component-boxes boxes-3\">\n<div class=\"content-wrapper align-center\">\n<div class=\"boxes\">\n<div class=\"box-item row-text-white #02837d\" style=\"background-color: #02837d;\">\n<h4 class=\"headline6\">Lignes directrices pour la s\u00e9curit\u00e9 des infrastructures Internet en Afrique: une initiative conjointe de l&rsquo;Internet Society et de la Commission de l&rsquo;Union africaine (2017)<\/h4>\n<div class=\"body-text\">\n<p>Les toutes premi\u00e8res lignes directrices pour la s\u00e9curit\u00e9 des infrastructures Internet en Afrique ont \u00e9t\u00e9 \u00e9labor\u00e9es avec la contribution d\u2019experts r\u00e9gionaux et mondiaux de la s\u00e9curit\u00e9 des infrastructures Internet, de repr\u00e9sentants des gouvernements et du CERT et d\u2019op\u00e9rateurs de r\u00e9seaux ccTLD et de r\u00e9seaux.<\/p>\n<p><a href=\"https:\/\/www.internetsociety.org\/news\/press-releases\/2017\/internet-society-and-commission-of-the-african-union-launch-internet-infrastructure-security-guidelines-for-africa\/\" target=\"_blank\" rel=\"noopener\">Savoir plus<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"box-item row-text-white #02837d\" style=\"background-color: #02837d;\">\n<h4 class=\"headline6\">OECD Security Guidelines &#8211;<em> Digital Security Risk Management<\/em> (2015)<\/h4>\n<div class=\"body-text\">\n<p>L\u2019adoption de cette recommandation par le Conseil de l\u2019OCDE en septembre 2015 est <a href=\"https:\/\/www.oecd.org\/sti\/ieconomy\/2002-security-guidelines-review.htm\">le r\u00e9sultat d\u2019un processus multipartite<\/a> lanc\u00e9 en 2012 par le Groupe de travail de l\u2019OCDE sur la s\u00e9curit\u00e9 et la protection de la vie priv\u00e9e dans l\u2019\u00e9conomie num\u00e9rique (SPDE) Lignes directrices pour la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information et des r\u00e9seaux: vers une culture de la s\u00e9curit\u00e9.\u00a0<a href=\"https:\/\/www.oecd.org\/sti\/ieconomy\/oecdguidelinesforthesecurityofinformationsystemsandnetworkstowardsacultureofsecurity.htm\" target=\"_blank\" rel=\"noopener\">Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security<\/a>.<\/p>\n<p><a href=\"https:\/\/www.oecd.org\/sti\/ieconomy\/digital-security-risk-management.htm\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"box-item row-text-white #02837d\" style=\"background-color: #02837d;\">\n<h4 class=\"headline6\">Conf\u00e9rence mondiale sur le cyberespace (2011 -)<\/h4>\n<div class=\"body-text\">\n<p>Des conf\u00e9rences biannuelles mondiales o\u00f9 des dirigeants internationaux, des d\u00e9cideurs, des experts de l\u2019industrie, des groupes de r\u00e9flexion, des experts en cyberespace, etc. se rassemblent pour d\u00e9lib\u00e9rer sur les probl\u00e8mes et les d\u00e9fis li\u00e9s \u00e0 l\u2019utilisation optimale du cyberespace. GCCS a \u00e9t\u00e9 lanc\u00e9 en vue d\u2019\u00e9tablir des \u00abr\u00e8gles de conduite\u00bb internationalement reconnues pour le comportement dans le cyberespace et de cr\u00e9er un dialogue plus cibl\u00e9 et inclusif entre tous les acteurs d\u2019Internet (gouvernements, soci\u00e9t\u00e9 civile et industrie). leur.<\/p>\n<p><a href=\"https:\/\/www.thegfce.com\/about\/gccs\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"column desktop-hidden tablet-hidden mobile-hidden component-theme-default\"><\/div>\n<div class=\"column  pure-u-lg--1 pure-u-md-1-1 pure-u-sm-1-1 component-theme-default \">\n<section class=\"component component-boxes boxes-3\">\n<div class=\"content-wrapper align-center\">\n<div class=\"boxes\">\n<div class=\"box-item row-text-white #02837d\" style=\"background-color: #02837d;\">\n<h4 class=\"headline6\">Commission mondiale sur la stabilit\u00e9 du cyberespace (2017 -)<\/h4>\n<div class=\"body-text\">\n<p>La Commission mondiale sur la stabilit\u00e9 du cyberespace (GCSC) contribue \u00e0 promouvoir la connaissance et la compr\u00e9hension mutuelles entre les diff\u00e9rentes communaut\u00e9s du cyberespace travaillant sur des questions li\u00e9es \u00e0 la cybers\u00e9curit\u00e9 internationale. La Commission comprend 26 commissaires de premier plan repr\u00e9sentant un large \u00e9ventail de r\u00e9gions g\u00e9ographiques ainsi que des acteurs gouvernementaux, industriels, techniques et de la soci\u00e9t\u00e9 civile ayant l\u00e9gitimit\u00e9 pour parler de diff\u00e9rents aspects du cyberespace.<\/p>\n<p>En novembre 2017, les commissaires de GCSC ont lanc\u00e9 un appel \u00e0 prot\u00e9ger le noyau public d\u2019Internet. \u2018<a href=\"https:\/\/cyberstability.org\/wp-content\/uploads\/2017\/11\/call-to-protect-the-public-core-of-the-internet.pdf\" target=\"_blank\" rel=\"noopener\">Call to Protect the Public Core of the Internet<\/a>\u2018 La d\u00e9claration exhorte les acteurs \u00e9tatiques et non \u00e9tatiques \u00e0 \u00e9viter toute activit\u00e9 qui porterait intentionnellement et gravement atteinte \u00e0 la disponibilit\u00e9 g\u00e9n\u00e9rale ou \u00e0 l\u2019int\u00e9grit\u00e9 du \u00ab\u00a0noyau public\u00a0\u00bb de l\u2019Internet.<\/p>\n<p><a href=\"https:\/\/cyberstability.org\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"box-item row-text-white #02837d\" style=\"background-color: #02837d;\">\n<h4 class=\"headline6\">Forum mondial sur la cyber expertise (2015 -)<\/h4>\n<div class=\"body-text\">\n<p>Le Forum mondial sur la cyber-expertise (GFCE) est une plate-forme mondiale permettant aux pays, aux organisations internationales et aux entreprises priv\u00e9es d\u2019\u00e9changer leurs meilleures pratiques et leur expertise en mati\u00e8re de renforcement des capacit\u00e9s informatiques.<\/p>\n<p><a href=\"https:\/\/www.thegfce.com\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"box-item row-text-white #02837d\" style=\"background-color: #02837d;\">\n<h4 class=\"headline6\">R\u00e9seau de communications non sollicit\u00e9es (UCENet) (2004 -)<\/h4>\n<div class=\"body-text\">\n<p>L\u2019UCENet compte parmi ses membres des repr\u00e9sentants de la communaut\u00e9 gouvernementale charg\u00e9e de la r\u00e9glementation et de l\u2019application de la loi, ainsi que des membres de l\u2019industrie int\u00e9ress\u00e9s. Par le biais de r\u00e9unions annuelles et de t\u00e9l\u00e9conf\u00e9rences bimensuelles, les membres restent connect\u00e9s et partagent des informations essentielles pour toute organisation engag\u00e9e dans la r\u00e9glementation et la mise en application de la loi anti-pourriel.<\/p>\n<p><a href=\"https:\/\/www.ucenet.org\/\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"column desktop-hidden tablet-hidden mobile-hidden component-theme-default\"><\/div>\n<div class=\"column  pure-u-lg--1 pure-u-md-1-1 pure-u-sm-1-1 component-theme-default \">\n<section class=\"component component-boxes boxes-3\">\n<div class=\"content-wrapper align-center\">\n<div class=\"boxes\">\n<div class=\"box-item row-text-white #02837d\" style=\"background-color: #02837d;\">\n<h4 class=\"headline6\">Politique nationale chilienne sur la cybers\u00e9curit\u00e9<\/h4>\n<div class=\"body-text\">\n<p>La politique nationale chilienne sur la cybers\u00e9curit\u00e9 a \u00e9t\u00e9 \u00e9labor\u00e9e par le gouvernement chilien en collaboration avec les parties prenantes chiliennes. La politique fournit une feuille de route pour l\u2019approche du gouvernement chilien \u00e0 l\u2019\u00e9gard de la cybers\u00e9curit\u00e9 dans un avenir proche, comprenant \u00e0 la fois des objectifs et des \u00e9tapes pour les atteindre. La politique reconna\u00eet le r\u00f4le important des parties prenantes non gouvernementales en d\u00e9clarant: \u00ab\u00a0Le pays doit renforcer son travail dans ce domaine, en tenant compte des d\u00e9fis particuliers auxquels sont confront\u00e9s non seulement les conditions techniques et le caract\u00e8re mondial et d\u00e9centralis\u00e9 de le r\u00e9seau, mais aussi en ce qui concerne sa port\u00e9e politique et un syst\u00e8me de gouvernance de l\u2019Internet incluant de multiples parties prenantes o\u00f9 le secteur priv\u00e9 et la soci\u00e9t\u00e9 civile ont un r\u00f4le particulier. \u00a0\u00bb<\/p>\n<p><a href=\"http:\/\/ciberseguridad.interior.gob.cl\/media\/2017\/05\/NCSP-ENG.pdf\" target=\"_blank\" rel=\"noopener\">En savoir plus<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"component-row component-theme-black  padding-top-small padding-bottom-small row-text-white  \" data-logo-color=\"row-text-white\">\n<div class=\"component-row-inner pure-g component-row-standard component-alignment-center \">\n<div class=\"column desktop-hidden tablet-hidden mobile-hidden component-theme-default padding-bottom-small\"><\/div>\n<div class=\"column  pure-u-lg-3-12 pure-u-md-2-12 pure-u-sm-12-12 component-theme-default padding-bottom-small \">\n<section class=\"component component-text\">\n<div class=\"content-wrapper\">\n<h2 class=\"headline2 align-center\">Ressources<\/h2>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"column desktop-hidden tablet-hidden mobile-hidden component-theme-default\"><\/div>\n<div class=\"column  pure-u-lg-1-12 pure-u-md-1-12 pure-u-sm-12-12 component-theme-default \">\n<section class=\"component component-text\">\n<div class=\"content-wrapper\"><\/div>\n<\/section>\n<\/div>\n<div class=\"column desktop-hidden tablet-hidden mobile-hidden component-theme-default\"><\/div>\n<div class=\"column  pure-u-lg-8-12 pure-u-md-8-12 pure-u-sm-12-12 component-theme-default \">\n<section class=\"component component-table\">\n<div class=\"content-wrapper\">\n<ul class=\"table\">\n<li class=\"table-item\">\n<h3 class=\"font-size:32px; headline6\"><a href=\"https:\/\/www.internetsociety.org\/collaborativesecurity\/approach\/\">Collaborative Security: An approach to tackling Internet Security issues<\/a><\/h3>\n<p class=\"small-text\">NOTE: \u2013 A set of PowerPoint slides explaining Collaborative Security\u00a0is available for use in presentations. Executive Summary People are&#8230;<\/p>\n<\/li>\n<li class=\"table-item\">\n<h4 class=\"headline6\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2016\/policy-framework-for-an-open-and-trusted-internet\/\">Un cadre strat\u00e9gique pour un Internet ouvert et digne de confiance<\/a><\/h4>\n<p class=\"small-text\">Ce cadre strat\u00e9gique dessine une approche pour aborder les complexit\u00e9s d\u2019une construction de la confiance dans un environnement ouvert&#8230;<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"component-row component-theme-default  padding-top-small padding-bottom-small row-text-black  \" data-logo-color=\"row-text-black\">\n<div class=\"component-row-inner pure-g component-row-standard component-alignment-center \">\n<div class=\"column desktop-hidden tablet-hidden mobile-hidden component-theme-default\"><\/div>\n<div class=\"column  pure-u-lg--1 pure-u-md-1-1 pure-u-sm-1-1 component-theme-default \">\n<h2 class=\"headline2 align-center\">Actualit\u00e9<\/h2>\n<section class=\"component component-feed \" data-component-name=\"Feed\">\n<div class=\"content-wrapper align-center\">\n<div class=\"feed loadable masonryFeed\" style=\"position: relative; height: 1037.6px;\" data-cat-exclude=\"\" data-tag=\"60\" data-order=\"DESC\" data-orderby=\"date\" data-meta=\"0\" data-post-count=\"6\" data-taxonomy=\"\" data-region=\"\" data-search=\"\" data-post-parent=\"\" data-event-time=\"future\" data-category=\"\" data-post-type=\"post,news\">\n<div class=\"grid-sizer\"><\/div>\n<div class=\"gutter-sizer\"><\/div>\n<div class=\"feed-item load-item\" style=\"position: absolute; left: 0%; top: 0px;\" data-max-pages=\"1\" data-post-id=\"83300\"><a class=\"feed-link\" href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/07\/collaborative-governance-leaders-canada-and-senegal-exchange-notes-on-iot-security-frameworks\/\">Leaders de la gouvernance collaborative, le Canada et le S\u00e9n\u00e9gal \u00e9changent les notes sur le cadre de s\u00e9curit\u00e9 IoT<\/a><\/p>\n<div class=\"responsive-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"attachment-square size-square wp-post-image\" title=\"Leaders de la gouvernance collaborative, le Canada et le S\u00e9n\u00e9gal \u00e9changent les notes sur le cadre de s\u00e9curit\u00e9 IoT Thumbnail\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/ottawa-senegal-iot-600x550.jpg\" alt=\"Leaders de la gouvernance collaborative, le Canada et le S\u00e9n\u00e9gal \u00e9changent les notes sur le cadre de s\u00e9curit\u00e9 IoT Thumbnail\" width=\"600\" height=\"550\" \/><\/div>\n<div class=\"feed-item-info row-text-black align-left\"><span class=\"eyebrow\">Internet des objets (IdO)<\/span> <span class=\"eyebrow eyebrow-regular\">18 juillet 2018<\/span><\/p>\n<h3 class=\"headline5\">Leaders de la gouvernance collaborative, le Canada et le S\u00e9n\u00e9gal \u00e9changent les notes sur le cadre de s\u00e9curit\u00e9 IoT<\/h3>\n<p class=\"regular-text\">Les partenaires du Canada et du S\u00e9n\u00e9gal se r\u00e9unissent pour un \u00e9change d\u2019apprentissage comparatif sur le d\u00e9veloppement de solides&#8230;<\/p>\n<\/div>\n<\/div>\n<div class=\"feed-item load-item\" style=\"position: absolute; left: 0%; top: 530.764px;\" data-max-pages=\"1\" data-post-id=\"77030\"><a class=\"feed-link\" href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/kathy-browns-op-ed-canadas-hill-times\/\">L\u2019\u00e9ditorial de Kathy Brown au Hill Times: l\u2019occasion unique du Canada de diriger l\u2019avenir de l\u2019Internet<\/a><\/p>\n<div class=\"responsive-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"attachment-square size-square wp-post-image\" title=\"L\u2019\u00e9ditorial de Kathy Brown au Hill Times: l\u2019occasion unique du Canada de diriger l\u2019avenir de l\u2019Internet Thumbnail\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/hill-op-ed-600x550.jpg\" alt=\"L\u2019\u00e9ditorial de Kathy Brown au Hill Times: l\u2019occasion unique du Canada de diriger l\u2019avenir de l\u2019Internet Thumbnail\" width=\"600\" height=\"550\" \/><\/div>\n<div class=\"feed-item-info row-text-black align-left\"><span class=\"eyebrow\">Gouvernance Internet<\/span> <span class=\"eyebrow eyebrow-regular\">29 mars 2018<\/span><\/p>\n<h3 class=\"headline5\">L\u2019\u00e9ditorial de Kathy Brown au Hill Times: l\u2019occasion unique du Canada de diriger l\u2019avenir de l\u2019Internet<\/h3>\n<p class=\"regular-text\">Kathy Brown, PDG de l\u2019Internet Society, a r\u00e9cemment r\u00e9dig\u00e9 un \u00e9ditorial pour le Hill Times du Canada (Op-Ed for&#8230;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"content-wrapper align-center\"><button id=\"loadMore\" class=\"button component loadMore\" tabindex=\"0\" data-component-name=\"LoadMore\">T\u00e9l\u00e9chargez plus<\/button><\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/section>\n<p><\/main><\/div>\n","protected":false},"excerpt":{"rendered":"<p>S\u00e9curit\u00e9 Collaborative Les individus sont la force que tient Internet. Le d\u00e9veloppement d\u2019Internet a \u00e9t\u00e9 bas\u00e9 sur la coop\u00e9ration et la collaboration des volontaires. Ces deux facteurs restent essentiels de la prosp\u00e9rit\u00e9 et du potentiel d\u2019Internet. La s\u00e9curit\u00e9 collaborative est une approche caract\u00e9ris\u00e9e par cinq \u00e9l\u00e9ments cl\u00e9s: Favoriser la confiance et prot\u00e9ger les opportunit\u00e9s: L\u2019objectif [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[4898],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[4057],"class_list":["post-77447","page","type-page","status-publish","hentry","category-strong-internet"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"S\u00e9curit\u00e9 Collaborative Les individus sont la force que tient Internet. Le d\u00e9veloppement d\u2019Internet a \u00e9t\u00e9 bas\u00e9 sur la coop\u00e9ration et la collaboration des volontaires. Ces deux facteurs restent essentiels de la prosp\u00e9rit\u00e9 et du potentiel d\u2019Internet. La s\u00e9curit\u00e9 collaborative est une approche caract\u00e9ris\u00e9e par cinq \u00e9l\u00e9ments cl\u00e9s: Favoriser la confiance et prot\u00e9ger les opportunit\u00e9s: L\u2019objectif\u2026","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/77447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=77447"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/77447\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=77447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=77447"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=77447"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=77447"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=77447"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=77447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}