{"id":82576,"date":"2018-06-27T13:45:44","date_gmt":"2018-06-27T13:45:44","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/06\/enhancing-iot-security-project-continues-with-second-successful-multistakeholder-event-in-ottawa\/"},"modified":"2025-11-10T16:36:11","modified_gmt":"2025-11-10T16:36:11","slug":"enhancing-iot-security-project-continues-with-second-successful-multistakeholder-event-in-ottawa","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/06\/enhancing-iot-security-project-continues-with-second-successful-multistakeholder-event-in-ottawa\/","title":{"rendered":"Le projet d&rsquo;optimisation de la s\u00e9curit\u00e9 IdO continue avec la deuxi\u00e8me r\u00e9union multipartite \u00e0 Ottawa"},"content":{"rendered":"<p>Le projet <em>Enhancing IoT Security<\/em>\u00a0ou <em>l&rsquo;Optimisation de la s\u00e9curit\u00e9 IdO<\/em>\u00a0a accueilli son deuxi\u00e8me \u00e9v\u00e9nement multipartite le 21 juin 2018. Cette r\u00e9union a permis aux nouveaux participants de se joindre aux discussions et aux participants de la premi\u00e8re r\u00e9union, pour continuer \u00e0 travailler sur un consensus et les normes de s\u00e9curit\u00e9 IdO, ainsi que d&rsquo;assurer la r\u00e9silience du r\u00e9seau. Un groupe de 30 personnes s&rsquo;est r\u00e9uni \u00e0 Ottawa, et 16 autres se sont r\u00e9unies virtuellement pour classer par ordre de priorit\u00e9 les points d&rsquo;action de la derni\u00e8re r\u00e9union, ainsi que d&rsquo;\u00e9tablir des groupes de travail qui collaboreront et m\u00e8neront des recherches plus pouss\u00e9es pour chaque \u00e9l\u00e9ment. Les participants comprenaient des repr\u00e9sentants d&rsquo;entreprises du secteur priv\u00e9, de groupes d&rsquo;int\u00e9r\u00eat public, de la communaut\u00e9 technique, d&rsquo;universit\u00e9s et d&rsquo;organismes gouvernementaux, dont chaque participant a offert des perspectives uniques et pr\u00e9cieuses sur le projet. Andrew Sullivan, Fellow chez Oracle \/ Dyn, a facilit\u00e9 cette discussion et la cr\u00e9ation des groupes de travail.<\/p>\n<p><em>Connaissez vous les risques li\u00e9s au appareils IdO que vous achetez ? <a href=\"https:\/\/www.internetsociety.org\/iot\/getiotsmart\/\">Get IoT smart<\/a>!<\/em><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><em>Image\u00a0\u00a9Katie Watson, Internet Society CC BY-NC-SA 4.0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le projet Enhancing IoT Security\u00a0ou l&rsquo;Optimisation de la s\u00e9curit\u00e9 IdO\u00a0a accueilli son deuxi\u00e8me \u00e9v\u00e9nement multipartite le 21 juin 2018. Cette r\u00e9union a permis aux nouveaux participants de se joindre aux discussions et aux participants de la premi\u00e8re r\u00e9union, pour continuer \u00e0 travailler sur un consensus et les normes de s\u00e9curit\u00e9 IdO, ainsi que d&rsquo;assurer la [&hellip;]<\/p>\n","protected":false},"author":1465,"featured_media":81928,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[170,156,4909],"tags":[6247],"region_news_regions":[142],"content_category":[6101],"ppma_author":[4779],"class_list":["post-82576","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-confidentialite","category-iot-fr","category-renforcer-internet","tag-internet-des-objets-ido","region_news_regions-amerique-du-nord","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT-300x129.jpg",300,129,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/Ottawa-Enhancing-IoT.jpg",600,258,false]},"uagb_author_info":{"display_name":"Katie Jordan","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/jordan\/"},"uagb_comment_info":0,"uagb_excerpt":"Le projet Enhancing IoT Security\u00a0ou l&rsquo;Optimisation de la s\u00e9curit\u00e9 IdO\u00a0a accueilli son deuxi\u00e8me \u00e9v\u00e9nement multipartite le 21 juin 2018. Cette r\u00e9union a permis aux nouveaux participants de se joindre aux discussions et aux participants de la premi\u00e8re r\u00e9union, pour continuer \u00e0 travailler sur un consensus et les normes de s\u00e9curit\u00e9 IdO, ainsi que d&rsquo;assurer la\u2026","authors":[{"term_id":4779,"user_id":1465,"is_guest":0,"slug":"jordan","display_name":"Katie Jordan","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/df0367a5fbf1c19234e4da1dbdba8feda23c450ba0ead4e80b86393a7ee80f25?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/82576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1465"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=82576"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/82576\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/81928"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=82576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=82576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=82576"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=82576"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=82576"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=82576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}