{"version":"1.0","provider_name":"Maxdrey Consultants","provider_url":"https:\/\/maxdreyconsultants.com\/fr\/","author_name":"Diablocalvo","author_url":"https:\/\/maxdreyconsultants.com\/fr\/author\/diablocalvo\/","title":"Gestion de la s\u00e9curit\u00e9 informatique - Maxdrey Consultants","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"YcEPRWmoIh\"><a href=\"https:\/\/maxdreyconsultants.com\/fr\/service\/gestion-de-la-securite-informatique\/\">Gestion de la s\u00e9curit\u00e9 informatique<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/maxdreyconsultants.com\/fr\/service\/gestion-de-la-securite-informatique\/embed\/#?secret=YcEPRWmoIh\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Gestion de la s\u00e9curit\u00e9 informatique\u00a0\u00bb &#8212; Maxdrey Consultants\" data-secret=\"YcEPRWmoIh\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/maxdreyconsultants.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/maxdreyconsultants.com\/wp-content\/uploads\/2020\/03\/close-up-of-hand-holding-tablet-with-creative-glow-2026-01-11-08-32-41-utc-1-scaled.jpg","thumbnail_width":2560,"thumbnail_height":1707,"description":"Gestion de la s\u00e9curit\u00e9 informatique Chaque secteur subit une forte pression pour mettre l\u2019innovation sur le march\u00e9, se connecter aux clients, am\u00e9liorer les op\u00e9rations et collaborer avec des partenaires et des fournisseurs \u2014 autant d\u2019\u00e9l\u00e9ments qui peuvent pr\u00e9senter de nouveaux risques pour l\u2019entreprise. La protection des syst\u00e8mes et des donn\u00e9es critiques est essentielle pour les [&hellip;]"}