{"id":78009,"date":"2018-04-16T13:53:47","date_gmt":"2018-04-16T13:53:47","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/04\/rsa-usa-2018-san-francisco-week-join-iot-security-conversation-tuesday-april-17\/"},"modified":"2025-11-14T15:13:00","modified_gmt":"2025-11-14T15:13:00","slug":"rsa-usa-2018-san-francisco-week-join-iot-security-conversation-tuesday-april-17","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/04\/rsa-usa-2018-san-francisco-week-join-iot-security-conversation-tuesday-april-17\/","title":{"rendered":"Et\u00eas vous \u00e0 la conf\u00e9rence RSA 2018 aux USA \u00e0 San Francisco cette semaine? Participez \u00e0 la conversation sur l&rsquo;IoT Security le mardi 17 avril"},"content":{"rendered":"<p>Et\u00eas vous \u00e0 la conf\u00e9rence\u00a0<a href=\"https:\/\/www.rsaconference.com\/events\/us18\">RSA 2018<\/a> aux USA \u00e0 San Francisco cette semaine? Participez \u00e0 la conversation sur la s\u00e9curit\u00e9 de IdO le mardi 17 avril.<\/p>\n<p><strong>Titre de la s\u00e9ance :\u00a0<\/strong><a href=\"https:\/\/www.rsaconference.com\/events\/us18\/agenda\/sessions\/11139-IoT-Trust-by-Design-Lessons-Learned-in-Wearables-and-Smart-Home-Products\">Avoir confiance dans l\u2019IdO grace au Design: le\u00e7ons tir\u00e9es des exemples des technologies vestimentaires et des produits intelligents con\u00e7us pour la maison<\/a>\u00a0(<strong>IoT Trust by Design: Lessons Learned in Wearables and Smart Home Products)<\/strong><\/p>\n<p><a href=\"https:\/\/www.internetsociety.org\/author\/wilbur\/\"><strong>Mod\u00e9rateur : J<\/strong>eff Wilbur<\/a>, Directeur de\u00a0<a href=\"https:\/\/www.otalliance.org\/\">Online Trust Alliance (OTA)<\/a><\/p>\n<hr \/>\n<p><strong>R\u00e9sum\u00e9 de la s\u00e9ance<\/strong>: Le monde a pris conscience du besoin de s\u00e9curit\u00e9 et de protection de la vie priv\u00e9e dans les offres IoT grand public. Les experts du domaine porteront sur les principaux vecteurs d\u2019attaque, les vuln\u00e9rabilit\u00e9s typiques des appareils, des applications et des syst\u00e8mes, les raisons communes du compromis de conception, l\u2019\u00e9volution de la s\u00e9curit\u00e9 et de la confidentialit\u00e9 dans IoT et dans quelle direction doit-il \u00e9voluer.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/04\/rsa-usa-2018-san-francisco-week-join-iot-security-conversation-tuesday-april-17\/\">Savoir plus<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Et\u00eas vous \u00e0 la conf\u00e9rence\u00a0RSA 2018 aux USA \u00e0 San Francisco cette semaine? Participez \u00e0 la conversation sur la s\u00e9curit\u00e9 de IdO le mardi 17 avril. Titre de la s\u00e9ance :\u00a0Avoir confiance dans l\u2019IdO grace au Design: le\u00e7ons tir\u00e9es des exemples des technologies vestimentaires et des produits intelligents con\u00e7us pour la maison\u00a0(IoT Trust by Design: [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":77855,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,170,156,4909,4775],"tags":[6247],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4048],"class_list":["post-78009","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-confidentialite","category-iot-fr","category-renforcer-internet","category-securite-fr","tag-internet-des-objets-ido","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1.gif",1031,500,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1-150x150.gif",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1-300x145.gif",300,145,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1-768x372.gif",768,372,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1-1024x497.gif",1024,497,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1.gif",1031,500,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1.gif",1031,500,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1-250x121.gif",250,121,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1-600x500.gif",600,500,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1.gif",300,145,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1.gif",400,194,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/rsa-conference-2018-1.gif",600,291,false]},"uagb_author_info":{"display_name":"Dan York","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/york\/"},"uagb_comment_info":0,"uagb_excerpt":"Et\u00eas vous \u00e0 la conf\u00e9rence\u00a0RSA 2018 aux USA \u00e0 San Francisco cette semaine? Participez \u00e0 la conversation sur la s\u00e9curit\u00e9 de IdO le mardi 17 avril. Titre de la s\u00e9ance :\u00a0Avoir confiance dans l\u2019IdO grace au Design: le\u00e7ons tir\u00e9es des exemples des technologies vestimentaires et des produits intelligents con\u00e7us pour la maison\u00a0(IoT Trust by Design:\u2026","authors":[{"term_id":4048,"user_id":14,"is_guest":0,"slug":"york","display_name":"Dan York","avatar_url":{"url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url2x":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g2x"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/78009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=78009"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/78009\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/77855"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=78009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=78009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=78009"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=78009"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=78009"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=78009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}