{"id":2958,"date":"2023-02-20T13:21:54","date_gmt":"2023-02-20T13:21:54","guid":{"rendered":"https:\/\/www.keytech.be\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/"},"modified":"2023-02-23T10:17:55","modified_gmt":"2023-02-23T10:17:55","slug":"aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement","status":"publish","type":"post","link":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/","title":{"rendered":"D\u00e9couvrez une \u00ab\u00a0vraie attaque ransomware\u00a0\u00bb, de la conception au d\u00e9ploiement"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:2%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1260px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:none;--fontSize:38;line-height:1.4;\"><p>Adoptez les bonnes mesures comportementales et techniques<br \/>\npour faire obstacle \u00e0 un ramsomware dans chaque phase de son cycle de vie<\/p><\/h2><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-1 awb-text-cols fusion-text-columns-2 fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-content-alignment:justify;--awb-columns:2;--awb-column-spacing:2em;--awb-column-min-width:100px;\"><p>Inscrivez-vous \u00e0 nos <strong>Ap\u00e9ros de la Cybers\u00e9curit\u00e9<\/strong> (de 12h00 \u00e0 12h30) et profitez de <strong>10 sessions de coaching de 30 minutes<\/strong> anim\u00e9es par un expert en cybers\u00e9curit\u00e9 (20 min. de pr\u00e9sentation + 10 min. de questions-r\u00e9ponses).<\/p>\n<p>Prix par participant pour les 10 sessions : <strong>200 \u20ac HTVA<\/strong> (factur\u00e9)<\/p>\n<p>Public cible : Quel que soit votre profil (manager ou employ\u00e9) ou votre bagage technique (informaticien ou non), chacun profitera de pr\u00e9cieux conseils\u00a0 lors de chaque phase de la d\u00e9monstration saisissante de cette attaque.<\/p>\n<p><strong>Pr\u00e9sentation g\u00e9n\u00e9rique et non commerciale (pas de publicit\u00e9 de produits) !<\/strong><\/p>\n<p>Les formations se d\u00e9rouleront en anglais mais vous pourrez poser vos questions en fran\u00e7ais ou en n\u00e9erlandais lors de la partie \u00ab\u00a0questions-r\u00e9ponses\u00a0\u00bb.<\/p>\n<p>Pour chaque session, un <strong>lien Teams<\/strong> vous sera envoy\u00e9 <strong>2 jours \u00e0 l&rsquo;avance<\/strong>.<br \/>\nApr\u00e8s chaque session, les slides Powerpoint utilis\u00e9s seront envoy\u00e9s \u00e0 toutes les personnes inscrites, y compris celles qui ont rat\u00e9 la session.<br \/>\nLes sessions sont construites de telle mani\u00e8re que vous pouvez en manquer une et suivre la suivante sans difficult\u00e9s, mais elles ne seront pas enregistr\u00e9es.<\/p>\n<p>Pour garantir la qualit\u00e9 de la bande passante et donner \u00e0 chacun la possibilit\u00e9 de poser des questions, les inscriptions sont <strong>limit\u00e9es \u00e0 25 personnes<\/strong>, mais vous serez inform\u00e9 de la prochaine s\u00e9rie en mai et juin si vous avez tard\u00e9 \u00e0 vous inscrire \u00e0 celle-ci.<\/p>\n<\/div><div class=\"fusion-text fusion-text-2 fusion-no-large-visibility\" style=\"--awb-content-alignment:center;\"><p>Inscrivez-vous \u00e0 nos <strong>Ap\u00e9ros de la Cybers\u00e9curit\u00e9<\/strong> (de 12h00 \u00e0 12h30) et profitez de <strong>10 sessions de coaching de 30 minutes<\/strong> anim\u00e9es par un expert en cybers\u00e9curit\u00e9 (20 min. de pr\u00e9sentation + 10 min. de questions-r\u00e9ponses).<\/p>\n<p>Prix par participant pour les 10 sessions : <strong>200 \u20ac HTVA<\/strong> (factur\u00e9)<\/p>\n<p>Public cible : Quel que soit votre profil (manager ou employ\u00e9) ou votre bagage technique (informaticien ou non), chacun profitera de pr\u00e9cieux conseils\u00a0 lors de chaque phase de la d\u00e9monstration saisissante de cette attaque.<\/p>\n<p><strong>Pr\u00e9sentation g\u00e9n\u00e9rique et non commerciale (pas de publicit\u00e9 de produits) !<\/strong><\/p>\n<p>Les formations se d\u00e9rouleront en anglais mais vous pourrez poser vos questions en fran\u00e7ais ou en n\u00e9erlandais lors de la partie \u00ab\u00a0questions-r\u00e9ponses\u00a0\u00bb.<\/p>\n<p>Pour chaque session, un <strong>lien Teams<\/strong> vous sera envoy\u00e9 <strong>2 jours \u00e0 l&rsquo;avance<\/strong>.<br \/>\nApr\u00e8s chaque session, les slides Powerpoint utilis\u00e9s seront envoy\u00e9s \u00e0 toutes les personnes inscrites, y compris celles qui ont rat\u00e9 la session.<br \/>\nLes sessions sont construites de telle mani\u00e8re que vous pouvez en manquer une et suivre la suivante sans difficult\u00e9s, mais elles ne seront pas enregistr\u00e9es.<\/p>\n<p>Pour garantir la qualit\u00e9 de la bande passante et donner \u00e0 chacun la possibilit\u00e9 de poser des questions, les inscriptions sont <strong>limit\u00e9es \u00e0 25 personnes<\/strong>, mais vous serez inform\u00e9 de la prochaine s\u00e9rie en mai et juin si vous avez tard\u00e9 \u00e0 vous inscrire \u00e0 celle-ci.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;\"><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:none;--fontSize:38;line-height:1.4;\">Programme #SaisonUne<\/h2><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-2 fusion-columns-total-10 fusion-content-boxes-1 content-boxes-timeline-horizontal content-left content-boxes-icon-on-top content-boxes-timeline-layout fusion-delayed-animation\" style=\"--awb-backgroundcolor:var(--awb-color2);--awb-hover-accent-color:var(--awb-custom_color_2);--awb-circle-hover-accent-color:transparent;\" data-animation-delay=\"350\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:var(--awb-color2);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27545%27%20height%3D%27250%27%20viewBox%3D%270%200%20545%20250%27%3E%3Crect%20width%3D%27545%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/darksideoftheweb.jpg\" width=\"545\" height=\"250\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;\">#1 The dark side of the force<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>The cybercrime business model on the dark web<\/p>\n<p><strong>21 march 2023 from 12h00 to 12h30<\/strong><\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color2);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27545%27%20height%3D%27250%27%20viewBox%3D%270%200%20545%20250%27%3E%3Crect%20width%3D%27545%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/ransomware-pc.jpg\" width=\"545\" height=\"250\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;\">#2 Ransomware illustrated<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>The lifecycle of a ransomware from build to deployment<\/p>\n<p><strong>23 march 2023 from 12h00 to 12h30<\/strong><\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color2);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27545%27%20height%3D%27250%27%20viewBox%3D%270%200%20545%20250%27%3E%3Crect%20width%3D%27545%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/suicidebunnies.jpg\" width=\"545\" height=\"250\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;\">#3 Suicide bunnies<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>\u00ab\u00a0Suicide bunnies\u00a0\u00bb exposing a big attack\/vulnerability surface<\/p>\n<p><strong>28 march 2023 from 12h00 to 12h30<\/strong><\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color2);\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27545%27%20height%3D%27250%27%20viewBox%3D%270%200%20545%20250%27%3E%3Crect%20width%3D%27545%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/trojanhorse.jpg\" width=\"545\" height=\"250\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;\">#4 Trojan horses illustrated<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>From myth to malwares (malicious software, files, devices, \u2026)<\/p>\n<p><strong>30 march 2023 from 12h00 to 12h30<\/strong><\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color2);\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27545%27%20height%3D%27250%27%20viewBox%3D%270%200%20545%20250%27%3E%3Crect%20width%3D%27545%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/anobotnet.jpg\" width=\"545\" height=\"250\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;\">#5 Hidden exploits illustrated<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>When your computer becomes part of a botnet &#8230;<\/p>\n<p><strong>4 april 2023 from 12h00 to 12h30<\/strong><\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color2);\" class=\"fusion-column content-box-column content-box-column content-box-column-6 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27545%27%20height%3D%27250%27%20viewBox%3D%270%200%20545%20250%27%3E%3Crect%20width%3D%27545%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/socialnetworkinvasion.jpg\" width=\"545\" height=\"250\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;\">#6 Privacy invasion<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Reduce your fingerprint!<\/p>\n<p><strong>6 april 2023 from 12h00 to 12h30<\/strong><\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color2);\" class=\"fusion-column content-box-column content-box-column content-box-column-7 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27545%27%20height%3D%27250%27%20viewBox%3D%270%200%20545%20250%27%3E%3Crect%20width%3D%27545%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/credentials.jpg\" width=\"545\" height=\"250\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;\">#7 Password cracking<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Hackers mostly don\u2019t need to break in, when they can just login<\/p>\n<p><strong>11 april 2023 from 12h00 to 12h30<\/strong><\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color2);\" class=\"fusion-column content-box-column content-box-column content-box-column-8 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27545%27%20height%3D%27250%27%20viewBox%3D%270%200%20545%20250%27%3E%3Crect%20width%3D%27545%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/phishingscam.jpg\" width=\"545\" height=\"250\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;\">#8 Phish' &amp; Scam<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Sophisticated phishing and social engineering techniques in 2023<\/p>\n<p><strong>13 april 2023 from 12h00 to 12h30<\/strong><\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color2);\" class=\"fusion-column content-box-column content-box-column content-box-column-9 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27545%27%20height%3D%27250%27%20viewBox%3D%270%200%20545%20250%27%3E%3Crect%20width%3D%27545%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/sniffing.jpg\" width=\"545\" height=\"250\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;\">#9 Sniffing illustrated<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Prevent your sensitive data from being intercepted<\/p>\n<p><strong>18 april 2023 from 12h00 to 12h30<\/strong><\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color2);\" class=\"fusion-column content-box-column content-box-column content-box-column-10 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27545%27%20height%3D%27250%27%20viewBox%3D%270%200%20545%20250%27%3E%3Crect%20width%3D%27545%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/passwordmanagement.jpg\" width=\"545\" height=\"250\" alt=\"\" \/><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;\">#10 Data breaches<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Protect yourself against data breaches<\/p>\n<p><strong>20 april 2023 from 12h00 to 12h30<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:35px;width:100%;\"><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"#\" data-toggle=\"modal\" data-target=\".fusion-modal.cybersnack_signup_fr\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">INSCRIVEZ-VOUS<\/span><\/a><\/div><div class=\"fusion-modal modal fade modal-1 cybersnack_signup_fr\" tabindex=\"-1\" role=\"dialog\" aria-labelledby=\"modal-heading-1\" aria-hidden=\"true\" style=\"--awb-border-color:var(--awb-color3);--awb-background:var(--awb-color2);\"><div class=\"modal-dialog modal-lg\" role=\"document\"><div class=\"modal-content fusion-modal-content\"><div class=\"modal-header\"><button class=\"close\" type=\"button\" data-dismiss=\"modal\" aria-hidden=\"true\" aria-label=\"Close\">&times;<\/button><h3 class=\"modal-title\" id=\"modal-heading-1\" data-dismiss=\"modal\" aria-hidden=\"true\">Inscription \u00e0 notre s\u00e9rie de 10 coachings sur la cybers\u00e9curit\u00e9 (30 min.)<\/h3><\/div><div class=\"modal-body fusion-clearfix\">\n<p>Prix :<strong> 200 \u20ac HTVA<\/strong> (factur\u00e9 \u00e0 votre entreprise) par participant pour les 10 sessions.<\/p>\n<div class=\"fusion-form fusion-form-builder fusion-form-form-wrapper fusion-form-2963\" style=\"--awb-tooltip-text-color:#ffffff;--awb-tooltip-background-color:#333333;\" data-form-id=\"2963\" data-config=\"{&quot;form_id&quot;:2963,&quot;form_post_id&quot;:2963,&quot;post_id&quot;:2958,&quot;form_type&quot;:&quot;ajax&quot;,&quot;confirmation_type&quot;:&quot;message&quot;,&quot;redirect_url&quot;:&quot;&quot;,&quot;redirect_timeout&quot;:&quot;0&quot;,&quot;field_labels&quot;:{&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;vatnumber&quot;:&quot;&quot;},&quot;field_logics&quot;:{&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;vatnumber&quot;:&quot;&quot;,&quot;submit_1&quot;:&quot;&quot;,&quot;notice_1&quot;:&quot;&quot;},&quot;field_types&quot;:{&quot;firstname&quot;:&quot;text&quot;,&quot;lastname&quot;:&quot;text&quot;,&quot;email&quot;:&quot;email&quot;,&quot;company&quot;:&quot;text&quot;,&quot;vatnumber&quot;:&quot;text&quot;,&quot;submit_1&quot;:&quot;submit&quot;,&quot;recaptcha_1&quot;:&quot;recaptcha&quot;,&quot;notice_1&quot;:&quot;notice&quot;},&quot;nonce_method&quot;:&quot;ajax&quot;,&quot;form_views&quot;:&quot;ajax&quot;,&quot;form_views_counting&quot;:&quot;all&quot;}\"><form action=\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/\" method=\"post\" class=\"fusion-form fusion-form-2963\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"2963\"><input type=\"text\" autocomplete=\"off\" name=\"firstname\" id=\"firstname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Pr\u00e9nom *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"2963\"><input type=\"text\" autocomplete=\"off\" name=\"lastname\" id=\"lastname\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Nom de famille *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-email-field fusion-form-label-above\" style=\"\" data-form-id=\"2963\"><input type=\"email\" autocomplete=\"off\" name=\"email\" id=\"email\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Email *\" data-holds-private-data=\"false\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"2963\"><input type=\"text\" autocomplete=\"off\" name=\"company\" id=\"company\" value=\"\"  class=\"fusion-form-input\" required=\"true\" aria-required=\"true\" placeholder=\"Soci\u00e9t\u00e9 *\" data-holds-private-data=\"false\" minlength=\"0\"\/><\/div><div class=\"fusion-form-field fusion-form-text-field fusion-form-label-above\" style=\"\" data-form-id=\"2963\"><input type=\"text\" autocomplete=\"off\" name=\"vatnumber\" id=\"vatnumber\" value=\"\"  class=\"fusion-form-input\" placeholder=\"Num\u00e9ro de TVA (BE xxxx.xxx.xxx) \" data-holds-private-data=\"false\" minlength=\"10\" maxlength=\"15\"\/><\/div><div class=\"fusion-form-field fusion-form-submit-field fusion-form-label-above\" style=\"\" data-form-id=\"2963\"><div class=\"fusion-aligncenter\"><button type=\"submit\" class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span  button-default form-form-submit\" style=\"--button_margin-bottom:30px;\" data-form-number=\"2963\" tabindex=\"\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">S'enregistrer<\/span><\/button><\/div><\/div><div class=\"fusion-form-field fusion-form-recaptcha-field fusion-form-label-above\" style=\"\" data-form-id=\"2963\">\t\t\t\t<div class=\"form-creator-recaptcha\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fusion-form-recaptcha-wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tid=\"g-recaptcha-id-form-2963\"\n\t\t\t\t\t\t\tclass=\"fusion-form-recaptcha-v3 recaptcha-container \"\n\t\t\t\t\t\t\tdata-sitekey=\"6LdQojwiAAAAAPdAow3cEOtGjSwVtrDdKbgCAeue\"\n\t\t\t\t\t\t\tdata-badge=\"inline\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"hidden\"\n\t\t\t\t\t\t\tname=\"fusion-form-recaptcha-response\"\n\t\t\t\t\t\t\tclass=\"g-recaptcha-response\"\n\t\t\t\t\t\t\tid=\"fusion-form-recaptcha-response-2963\"\n\t\t\t\t\t\t\tvalue=\"\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><div class=\"form-submission-notices data-notice_1\" id=\"fusion-notices-1\"><div class=\"fusion-alert alert success alert-success fusion-alert-center fusion-form-response fusion-form-response-success fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-check-circle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">Merci pour votre inscription. Elle a \u00e9t\u00e9 prise en compte.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><div class=\"fusion-alert alert error alert-danger fusion-alert-center fusion-form-response fusion-form-response-error fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"alert-icon\"><i class=\"awb-icon-exclamation-triangle\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-alert-content\">Une erreur s'est produite lors de l'envoi de votre inscription. Veuillez r\u00e9essayer plus tard.<\/span><\/div><button type=\"button\" class=\"close toggle-alert\" data-dismiss=\"alert\" aria-label=\"Close\">&times;<\/button><\/div><\/div><\/div><\/div><\/div><\/div><\/form><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Apprenez \u00e0 mieux vous prot\u00e9ger, vous et votre entreprise, contre les cyberattaques sophistiqu\u00e9es et les ransomwares.<\/p>\n","protected":false},"author":1,"featured_media":2843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[41,47,46],"tags":[],"class_list":["post-2958","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actus","category-event-fr","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>D\u00e9couvrez une &quot;vraie attaque ransomware&quot;, de la conception au d\u00e9ploiement - KeyTech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D\u00e9couvrez une &quot;vraie attaque ransomware&quot;, de la conception au d\u00e9ploiement - KeyTech\" \/>\n<meta property=\"og:description\" content=\"Apprenez \u00e0 mieux vous prot\u00e9ger, vous et votre entreprise, contre les cyberattaques sophistiqu\u00e9es et les ransomwares.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/\" \/>\n<meta property=\"og:site_name\" content=\"KeyTech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/keytech.be\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-20T13:21:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-23T10:17:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/cybernoonsnack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@keytechbe\" \/>\n<meta name=\"twitter:site\" content=\"@keytechbe\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.keytech.be\/en\/#\/schema\/person\/970d0d8908bc7db4a640b796ccc07f86\"},\"headline\":\"D\u00e9couvrez une \u00ab\u00a0vraie attaque ransomware\u00a0\u00bb, de la conception au d\u00e9ploiement\",\"datePublished\":\"2023-02-20T13:21:54+00:00\",\"dateModified\":\"2023-02-23T10:17:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/\"},\"wordCount\":2670,\"publisher\":{\"@id\":\"https:\/\/www.keytech.be\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/cybernoonsnack.jpg\",\"articleSection\":[\"Actus\",\"Event\",\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-BE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/\",\"url\":\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/\",\"name\":\"D\u00e9couvrez une \\\"vraie attaque ransomware\\\", de la conception au d\u00e9ploiement - KeyTech\",\"isPartOf\":{\"@id\":\"https:\/\/www.keytech.be\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/cybernoonsnack.jpg\",\"datePublished\":\"2023-02-20T13:21:54+00:00\",\"dateModified\":\"2023-02-23T10:17:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#breadcrumb\"},\"inLanguage\":\"fr-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-BE\",\"@id\":\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#primaryimage\",\"url\":\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/cybernoonsnack.jpg\",\"contentUrl\":\"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/cybernoonsnack.jpg\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.keytech.be\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D\u00e9couvrez une &#8220;vraie attaque ransomware&#8221;, de la conception au d\u00e9ploiement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.keytech.be\/en\/#website\",\"url\":\"https:\/\/www.keytech.be\/en\/\",\"name\":\"KeyTech\",\"description\":\"Digital innovation with a human touch\",\"publisher\":{\"@id\":\"https:\/\/www.keytech.be\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.keytech.be\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-BE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.keytech.be\/en\/#organization\",\"name\":\"KeyTech\",\"url\":\"https:\/\/www.keytech.be\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-BE\",\"@id\":\"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg\",\"contentUrl\":\"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg\",\"width\":500,\"height\":500,\"caption\":\"KeyTech\"},\"image\":{\"@id\":\"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/keytech.be\",\"https:\/\/x.com\/keytechbe\",\"https:\/\/www.linkedin.com\/company\/keytechbelgium\",\"https:\/\/www.instagram.com\/keytech.be\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.keytech.be\/en\/#\/schema\/person\/970d0d8908bc7db4a640b796ccc07f86\",\"name\":\"admin\",\"url\":\"https:\/\/www.keytech.be\/fr\/author\/admin_ktu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9couvrez une \"vraie attaque ransomware\", de la conception au d\u00e9ploiement - KeyTech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/","og_locale":"fr_FR","og_type":"article","og_title":"D\u00e9couvrez une \"vraie attaque ransomware\", de la conception au d\u00e9ploiement - KeyTech","og_description":"Apprenez \u00e0 mieux vous prot\u00e9ger, vous et votre entreprise, contre les cyberattaques sophistiqu\u00e9es et les ransomwares.","og_url":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/","og_site_name":"KeyTech","article_publisher":"https:\/\/www.facebook.com\/keytech.be","article_published_time":"2023-02-20T13:21:54+00:00","article_modified_time":"2023-02-23T10:17:55+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/cybernoonsnack.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@keytechbe","twitter_site":"@keytechbe","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture est.":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#article","isPartOf":{"@id":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/"},"author":{"name":"admin","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/person\/970d0d8908bc7db4a640b796ccc07f86"},"headline":"D\u00e9couvrez une \u00ab\u00a0vraie attaque ransomware\u00a0\u00bb, de la conception au d\u00e9ploiement","datePublished":"2023-02-20T13:21:54+00:00","dateModified":"2023-02-23T10:17:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/"},"wordCount":2670,"publisher":{"@id":"https:\/\/www.keytech.be\/en\/#organization"},"image":{"@id":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#primaryimage"},"thumbnailUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/cybernoonsnack.jpg","articleSection":["Actus","Event","S\u00e9curit\u00e9"],"inLanguage":"fr-BE"},{"@type":"WebPage","@id":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/","url":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/","name":"D\u00e9couvrez une \"vraie attaque ransomware\", de la conception au d\u00e9ploiement - KeyTech","isPartOf":{"@id":"https:\/\/www.keytech.be\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#primaryimage"},"image":{"@id":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#primaryimage"},"thumbnailUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/cybernoonsnack.jpg","datePublished":"2023-02-20T13:21:54+00:00","dateModified":"2023-02-23T10:17:55+00:00","breadcrumb":{"@id":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#breadcrumb"},"inLanguage":"fr-BE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/"]}]},{"@type":"ImageObject","inLanguage":"fr-BE","@id":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#primaryimage","url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/cybernoonsnack.jpg","contentUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2023\/02\/cybernoonsnack.jpg","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.keytech.be\/fr\/aperos-de-la-cybersecurite-un-vrai-scenario-de-ransomware-de-la-conception-au-deploiement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.keytech.be\/fr\/"},{"@type":"ListItem","position":2,"name":"D\u00e9couvrez une &#8220;vraie attaque ransomware&#8221;, de la conception au d\u00e9ploiement"}]},{"@type":"WebSite","@id":"https:\/\/www.keytech.be\/en\/#website","url":"https:\/\/www.keytech.be\/en\/","name":"KeyTech","description":"Digital innovation with a human touch","publisher":{"@id":"https:\/\/www.keytech.be\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.keytech.be\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-BE"},{"@type":"Organization","@id":"https:\/\/www.keytech.be\/en\/#organization","name":"KeyTech","url":"https:\/\/www.keytech.be\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-BE","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","contentUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","width":500,"height":500,"caption":"KeyTech"},"image":{"@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/keytech.be","https:\/\/x.com\/keytechbe","https:\/\/www.linkedin.com\/company\/keytechbelgium","https:\/\/www.instagram.com\/keytech.be\/"]},{"@type":"Person","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/person\/970d0d8908bc7db4a640b796ccc07f86","name":"admin","url":"https:\/\/www.keytech.be\/fr\/author\/admin_ktu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/posts\/2958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/comments?post=2958"}],"version-history":[{"count":10,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/posts\/2958\/revisions"}],"predecessor-version":[{"id":2994,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/posts\/2958\/revisions\/2994"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/media\/2843"}],"wp:attachment":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/media?parent=2958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/categories?post=2958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/tags?post=2958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}