{"id":68793,"date":"2017-12-12T09:23:46","date_gmt":"2017-12-12T09:23:46","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2017\/12\/reflections-global-cyber-heavy-week-gccs-gfce\/"},"modified":"2025-11-14T15:15:51","modified_gmt":"2025-11-14T15:15:51","slug":"reflections-global-cyber-heavy-week-gccs-gfce","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2017\/12\/reflections-global-cyber-heavy-week-gccs-gfce\/","title":{"rendered":"R\u00e9flexions sur une semaine \u00ab\u00a0globale\u00a0\u00bb et \u00ab\u00a0cyber\u00a0\u00bb intense \u00e0 GCCS et GFCE"},"content":{"rendered":"<p>Il y a deux semaines, une petite d\u00e9l\u00e9gation de l&rsquo;Internet Society \u00e9tait \u00e0 Delhi pour participer \u00e0 un certain nombre d&rsquo;\u00e9v\u00e9nements qui contenaient les mots \u00abGlobal\u00bb et \u00abCyber\u00bb. Dans ce post, je vais partager certaines de nos perspectives sur les deux premiers \u00e9v\u00e9nements &#8211; le GCCS et le GFCE.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2017\/12\/reflections-global-cyber-heavy-week-gccs-gfce\/\">Lire l&rsquo;article entier en anglais<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3>Lecture approfondie sur le sujet<\/h3>\n<ul>\n<li>\u2018<a href=\"http:\/\/www.slate.com\/blogs\/future_tense\/2017\/12\/01\/the_word_cyber_has_lost_all_meaning.html\">The word Cyber now means everything \u2013 and nothing at all<\/a><\/li>\n<li><a href=\"http:\/\/www.circleid.com\/posts\/20171202_kaljarund_commission_building_bridges_over_troubled_cyber_water\/\">In this Circle ID blog<\/a><\/li>\n<li>The Geneva Internet Platform\u2019s Digital Watch\u00a0<a href=\"https:\/\/dig.watch\/processes\/ungge\">\u00a0UN GGE<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Il y a deux semaines, une petite d\u00e9l\u00e9gation de l&rsquo;Internet Society \u00e9tait \u00e0 Delhi pour participer \u00e0 un certain nombre d&rsquo;\u00e9v\u00e9nements qui contenaient les mots \u00abGlobal\u00bb et \u00abCyber\u00bb. Dans ce post, je vais partager certaines de nos perspectives sur les deux premiers \u00e9v\u00e9nements &#8211; le GCCS et le GFCE. Lire l&rsquo;article entier en anglais &nbsp; [&hellip;]<\/p>\n","protected":false},"author":866,"featured_media":65483,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,185,189,169,172,4909,4775,183],"tags":[6215],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4140],"class_list":["post-68793","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-confiance","category-evenements","category-les-normes-internet-ouvertes","category-politique-publique","category-renforcer-internet","category-securite-fr","category-technologie","tag-evenements","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",4912,3264,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-300x199.jpg",300,199,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-768x510.jpg",768,510,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-1024x680.jpg",1024,680,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",1536,1021,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",2048,1361,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-250x166.jpg",250,166,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",300,199,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",400,266,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072.jpg",600,399,false]},"uagb_author_info":{"display_name":"Olaf Kolkman","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/kolkman\/"},"uagb_comment_info":0,"uagb_excerpt":"Il y a deux semaines, une petite d\u00e9l\u00e9gation de l&rsquo;Internet Society \u00e9tait \u00e0 Delhi pour participer \u00e0 un certain nombre d&rsquo;\u00e9v\u00e9nements qui contenaient les mots \u00abGlobal\u00bb et \u00abCyber\u00bb. Dans ce post, je vais partager certaines de nos perspectives sur les deux premiers \u00e9v\u00e9nements &#8211; le GCCS et le GFCE. Lire l&rsquo;article entier en anglais &nbsp;\u2026","authors":[{"term_id":4140,"user_id":866,"is_guest":0,"slug":"kolkman","display_name":"Olaf Kolkman","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/68793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/866"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=68793"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/68793\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/65483"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=68793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=68793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=68793"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=68793"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=68793"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=68793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}