{"id":27748,"date":"2024-08-20T15:54:13","date_gmt":"2024-08-20T19:54:13","guid":{"rendered":"https:\/\/knowledgeflow.org\/?p=27748"},"modified":"2024-09-06T12:52:43","modified_gmt":"2024-09-06T16:52:43","slug":"expert-interview-demystifying-cybersecurity-careers-part-1","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/fr\/expert-interview-demystifying-cybersecurity-careers-part-1\/","title":{"rendered":"Interview d'un expert - D\u00e9mystifier les carri\u00e8res en cybers\u00e9curit\u00e9 - Partie 1"},"content":{"rendered":"<style>.kb-row-layout-id27748_a4aeb3-bc > .kt-row-column-wrap{align-content:center;}:where(.kb-row-layout-id27748_a4aeb3-bc > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:center;}.kb-row-layout-id27748_a4aeb3-bc > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);grid-template-columns:minmax(0, calc(45% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(55% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id27748_a4aeb3-bc > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id27748_a4aeb3-bc > .kt-row-column-wrap{grid-template-columns:repeat(2, minmax(0, 1fr));}}@media all and (max-width: 767px){.kb-row-layout-id27748_a4aeb3-bc > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id27748_a4aeb3-bc alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-middle\">\n<style>.kadence-column27748_29d837-4d > .kt-inside-inner-col,.kadence-column27748_29d837-4d > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column27748_29d837-4d > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column27748_29d837-4d > .kt-inside-inner-col{flex-direction:column;}.kadence-column27748_29d837-4d > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column27748_29d837-4d > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column27748_29d837-4d{position:relative;}@media all and (max-width: 1024px){.kadence-column27748_29d837-4d > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column27748_29d837-4d > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column27748_29d837-4d\"><div class=\"kt-inside-inner-col\">\n<h3 class=\"wp-block-heading\">Interview d'un expert : D\u00e9mystifier les carri\u00e8res en cybers\u00e9curit\u00e9, avec Claudiu Popa (1\u00e8re partie)<\/h3>\n\n\n\n<p>La demande de professionnels qualifi\u00e9s en cybers\u00e9curit\u00e9 au Canada ne cesse d'augmenter \u00e0 mesure que les menaces num\u00e9riques deviennent de plus en plus sophistiqu\u00e9es et r\u00e9pandues. Selon un rapport r\u00e9cent du Conseil des technologies de l'information et des communications (CTIC), le Canada est actuellement confront\u00e9 \u00e0 une p\u00e9nurie de 25 000 professionnels de la cybers\u00e9curit\u00e9, ce qui cr\u00e9e un \u00e9cart important dans le vivier de talents n\u00e9cessaires pour prot\u00e9ger les entreprises, les gouvernements et les particuliers (<a href=\"https:\/\/ictc-ctic.ca\/articles\/what-cses-2022-23-annual-report-tells-us-about-cyberthreats-to-canadas-digital-economy\" target=\"_blank\" rel=\"noreferrer noopener\">CTIC<\/a>). Cette p\u00e9nurie est un probl\u00e8me critique, d'autant plus qu'un poste sur six dans le domaine de la cybers\u00e9curit\u00e9 n'est pas pourvu dans le pays, ce qui rend les organisations vuln\u00e9rables \u00e0 des cybermenaces de plus en plus complexes et de plus en plus fr\u00e9quentes (<a href=\"https:\/\/2024backup.ictc-ctic.ca\/news-events\/one-in-six-canadian-cybersecurity-roles-go-unfilled-new-report-explores-talent-shortage-and-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">Conseil TIC<\/a>). <\/p>\n<\/div><\/div>\n\n\n<style>.kadence-column27748_e777de-c3 > .kt-inside-inner-col,.kadence-column27748_e777de-c3 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column27748_e777de-c3 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column27748_e777de-c3 > .kt-inside-inner-col{flex-direction:column;}.kadence-column27748_e777de-c3 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column27748_e777de-c3 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column27748_e777de-c3{position:relative;}@media all and (max-width: 1024px){.kadence-column27748_e777de-c3 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column27748_e777de-c3 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column27748_e777de-c3\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"344\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/Screenshot-2024-08-16-at-2.01.52\u202fPM.png\" alt=\"\" class=\"wp-image-27806\" style=\"width:683px;height:auto\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/Screenshot-2024-08-16-at-2.01.52\u202fPM.png 666w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/Screenshot-2024-08-16-at-2.01.52\u202fPM-600x310.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/Screenshot-2024-08-16-at-2.01.52\u202fPM-300x155.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/Screenshot-2024-08-16-at-2.01.52\u202fPM-18x9.png 18w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><\/figure>\n<\/div><\/div>\n\n<\/div><\/div>\n\n\n<p>Cette p\u00e9nurie de talents repr\u00e9sente un d\u00e9fi de taille pour l'\u00e9conomie num\u00e9rique du Canada, car l'adoption acc\u00e9l\u00e9r\u00e9e des technologies num\u00e9riques dans tous les secteurs a \u00e9largi la \"surface d'attaque\" des cybermenaces. Compte tenu de l'ampleur croissante de ces menaces, le besoin de professionnels de la cybers\u00e9curit\u00e9 n'a jamais \u00e9t\u00e9 aussi urgent. Les facteurs qui contribuent \u00e0 cette p\u00e9nurie sont notamment l'\u00e9puisement des professionnels en place, le manque d'\u00e9tudiants dans le domaine de la cybers\u00e9curit\u00e9 et la forte concurrence des emplois mieux r\u00e9mun\u00e9r\u00e9s dans le domaine de la cybers\u00e9curit\u00e9 dans d'autres pays, en particulier aux \u00c9tats-Unis (en anglais).<a href=\"https:\/\/ictc-ctic.ca\/news-events\/one-in-six-canadian-cybersecurity-roles-go-unfilled-new-report-explores-talent-shortage-and-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">CTIC<\/a>).<\/p>\n\n\n<style>.kb-row-layout-id27748_722b1b-5b > .kt-row-column-wrap{align-content:center;}:where(.kb-row-layout-id27748_722b1b-5b > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:center;}.kb-row-layout-id27748_722b1b-5b > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:repeat(2, minmax(0, 1fr));}.kb-row-layout-id27748_722b1b-5b > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id27748_722b1b-5b > .kt-row-column-wrap{grid-template-columns:repeat(2, minmax(0, 1fr));}}@media all and (max-width: 767px){.kb-row-layout-id27748_722b1b-5b > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id27748_722b1b-5b alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-middle\">\n<style>.kadence-column27748_5ce3eb-c8 > .kt-inside-inner-col,.kadence-column27748_5ce3eb-c8 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column27748_5ce3eb-c8 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column27748_5ce3eb-c8 > .kt-inside-inner-col{flex-direction:column;}.kadence-column27748_5ce3eb-c8 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column27748_5ce3eb-c8 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column27748_5ce3eb-c8{position:relative;}@media all and (max-width: 1024px){.kadence-column27748_5ce3eb-c8 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column27748_5ce3eb-c8 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column27748_5ce3eb-c8\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.claudiupopa.ca\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/IMG_1984-1024x683.jpg\" alt=\"Entretien d&#039;expert avec Claudiu Popa, partie 1. \" class=\"wp-image-27750\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/IMG_1984-1024x683.jpg 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/IMG_1984-scaled-600x400.jpg 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/IMG_1984-300x200.jpg 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/IMG_1984-768x512.jpg 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/IMG_1984-1536x1024.jpg 1536w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/IMG_1984-2048x1365.jpg 2048w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/IMG_1984-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column27748_e68903-6b > .kt-inside-inner-col,.kadence-column27748_e68903-6b > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column27748_e68903-6b > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column27748_e68903-6b > .kt-inside-inner-col{flex-direction:column;}.kadence-column27748_e68903-6b > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column27748_e68903-6b > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column27748_e68903-6b{position:relative;}@media all and (max-width: 1024px){.kadence-column27748_e68903-6b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column27748_e68903-6b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column27748_e68903-6b\"><div class=\"kt-inside-inner-col\">\n<h3 class=\"wp-block-heading\">Rem\u00e9dier \u00e0 la p\u00e9nurie de talents<\/h3>\n\n\n\n<p>Pour r\u00e9pondre \u00e0 cette question, <a href=\"https:\/\/knowledgeflow.org\/\">Fondation Cybers\u00e9curit\u00e9 KnowledgeFlow<\/a> a demand\u00e9 l'avis du plus grand expert en cybers\u00e9curit\u00e9 du Canada, Claudiu Popa, PDG de <a href=\"https:\/\/www.informatica.org\/\" target=\"_blank\" rel=\"noopener\">Informatica Corporation<\/a> et <a href=\"https:\/\/www.datarisk.ca\/\" target=\"_blank\" rel=\"noopener\">Datarisk Canada<\/a>. Peu de gens connaissent mieux la cybers\u00e9curit\u00e9 au Canada que Claudiu, qui est \u00e0 la pointe de l'innovation et de l'\u00e9ducation en mati\u00e8re de cybers\u00e9curit\u00e9 depuis des d\u00e9cennies. Dans cet entretien exclusif en deux parties, nous nous penchons sur l'\u00e9tat des carri\u00e8res en cybers\u00e9curit\u00e9 au Canada, en explorant tous les aspects de la question, des r\u00f4les essentiels aux certifications indispensables.<\/p>\n\n\n\n<p>Dans la premi\u00e8re partie de notre s\u00e9rie d'entretiens, Claudiu nous fait part de son point de vue sur la composition des \u00e9quipes de cybers\u00e9curit\u00e9, sur les r\u00f4les sp\u00e9cifiques qui sont essentiels au Canada et sur les comp\u00e9tences essentielles dont les professionnels ont besoin pour r\u00e9ussir dans ce domaine qui \u00e9volue rapidement.<\/p>\n<\/div><\/div>\n\n<\/div><\/div>\n\n\n<h3 class=\"wp-block-heading\">Comprendre les r\u00f4les cl\u00e9s dans la cybers\u00e9curit\u00e9 au Canada<\/h3>\n\n\n\n<p>Alors que les menaces de cybers\u00e9curit\u00e9 continuent d'\u00e9voluer, les r\u00f4les au sein des \u00e9quipes de cybers\u00e9curit\u00e9 sont devenus de plus en plus sp\u00e9cialis\u00e9s. Les diff\u00e9rentes r\u00e9gions du Canada ont des besoins et des d\u00e9fis uniques, et il est donc essentiel de comprendre quels r\u00f4les sont les plus importants dans ce paysage diversifi\u00e9. Dans la premi\u00e8re question de notre entretien, Claudiu nous \u00e9claire sur les r\u00f4les qui sont particuli\u00e8rement essentiels au renforcement de la cybers\u00e9curit\u00e9 au Canada.<br><br><strong>W<\/strong><strong>uels sont les <\/strong><strong>R\u00f4les essentiels en mati\u00e8re de cybers\u00e9curit\u00e9 <\/strong><strong>Canada<\/strong><strong>?<\/strong><\/p>\n\n\n\n<p><strong><em>Claudiu : <\/em><\/strong><em>\u201c<\/em>Au Canada, et en particulier en Ontario, les comp\u00e9tences en mati\u00e8re de cybers\u00e9curit\u00e9 font l'objet d'une demande sp\u00e9cifique qui rend certains r\u00f4les particuli\u00e8rement essentiels. La technologie op\u00e9rationnelle (OT) est de plus en plus importante, car elle consiste \u00e0 s\u00e9curiser le mat\u00e9riel et les logiciels qui contr\u00f4lent les processus physiques dans des secteurs tels que la fabrication et les services publics. Ces syst\u00e8mes \u00e9tant de plus en plus connect\u00e9s, le besoin de professionnels de la cybers\u00e9curit\u00e9 qui comprennent \u00e0 la fois la technologie op\u00e9rationnelle et les d\u00e9fis de s\u00e9curit\u00e9 qui lui sont propres s'est consid\u00e9rablement accru.<\/p>\n\n\n\n<p>Outre ces r\u00f4les sp\u00e9cialis\u00e9s, les postes de g\u00e9n\u00e9ralistes sont \u00e9galement essentiels en Ontario. Les g\u00e9n\u00e9ralistes, qui ont une connaissance approfondie des diff\u00e9rents domaines de la cybers\u00e9curit\u00e9, sont essentiels pour s'adapter aux besoins vari\u00e9s des diff\u00e9rentes industries. Ils supervisent souvent un large \u00e9ventail de mesures de s\u00e9curit\u00e9, ce qui fait d'eux des acteurs cl\u00e9s dans les environnements o\u00f9 la flexibilit\u00e9 et un large \u00e9ventail de comp\u00e9tences sont n\u00e9cessaires. Les r\u00f4les sp\u00e9cialis\u00e9s et g\u00e9n\u00e9ralistes sont cruciaux pour quiconque souhaite avoir un impact significatif sur le paysage de la cybers\u00e9curit\u00e9 au Canada\".<\/p>\n\n\n\n<p>Bien entendu, la compr\u00e9hension des r\u00f4les n'est qu'une partie de l'\u00e9quation. Les comp\u00e9tences sp\u00e9cifiques requises pour exceller dans ces r\u00f4les sont tout aussi importantes. Dans la prochaine partie de notre conversation, Claudiu se penche sur les comp\u00e9tences techniques, humaines et logicielles essentielles dont les professionnels ont besoin pour r\u00e9ussir dans le secteur de la cybers\u00e9curit\u00e9 au Canada.<\/p>\n\n\n\n<p><strong>Quels sont les <\/strong><strong>Critique<\/strong><strong> Comp\u00e9tences en cybers\u00e9curit\u00e9<\/strong><strong> <\/strong><strong>en <\/strong><strong>Le Canada ?<\/strong><\/p>\n\n\n\n<p><strong><em>Claudiu : <\/em><\/strong>\"Au Canada, les comp\u00e9tences essentielles en mati\u00e8re de cybers\u00e9curit\u00e9 continuent de s'articuler autour des piliers fondamentaux de la s\u00e9curit\u00e9 de l'information, \u00e0 savoir la confidentialit\u00e9, l'int\u00e9grit\u00e9 et la disponibilit\u00e9. Ces principes constituent la base technique que tout professionnel de la cybers\u00e9curit\u00e9 doit ma\u00eetriser. Toutefois, \u00e0 mesure que le domaine \u00e9volue, il est tout aussi important pour les professionnels de rester ouverts \u00e0 la recertification et \u00e0 l'apprentissage continu afin de rester au fait des derniers d\u00e9veloppements.<\/p>\n\n\n\n<p>Au-del\u00e0 des comp\u00e9tences techniques, les sp\u00e9cialistes doivent exceller dans la recherche, l'analyse et la r\u00e9daction de rapports. La recherche est essentielle pour garder une longueur d'avance sur les menaces \u00e9mergentes, l'analyse aide \u00e0 identifier les vuln\u00e9rabilit\u00e9s et \u00e0 \u00e9valuer les mesures de s\u00e9curit\u00e9, et des rapports efficaces garantissent que les conclusions et les recommandations sont clairement communiqu\u00e9es \u00e0 des publics techniques et non techniques. Ensemble, ces comp\u00e9tences sont essentielles pour avoir un impact significatif sur le paysage de la cybers\u00e9curit\u00e9\".<\/p>\n\n\n\n<p>Si les comp\u00e9tences sont un aspect crucial, l'efficacit\u00e9 de ces r\u00f4les et de ces comp\u00e9tences d\u00e9pend largement de la mani\u00e8re dont les \u00e9quipes de cybers\u00e9curit\u00e9 sont structur\u00e9es et organis\u00e9es. Cela nous am\u00e8ne au point important suivant : la composition des \u00e9quipes de cybers\u00e9curit\u00e9. Dans la question suivante, Claudiu explique comment les \u00e9quipes sont g\u00e9n\u00e9ralement compos\u00e9es et quelles sont les fonctions cl\u00e9s qu'elles doivent remplir pour relever les d\u00e9fis complexes de la cybers\u00e9curit\u00e9 moderne.<\/p>\n\n\n\n<p><strong>Ce qu'il faut faire <\/strong><strong>est le <\/strong><strong>Id\u00e9al <\/strong><strong>Composition des \u00e9quipes de cybers\u00e9curit\u00e9<\/strong><strong>?<\/strong><\/p>\n\n\n\n<p><strong><em>Claudiu<\/em><\/strong><strong>: <\/strong>\"Les \u00e9quipes de cybers\u00e9curit\u00e9 sont g\u00e9n\u00e9ralement structur\u00e9es autour de trois fonctions principales : la s\u00e9curit\u00e9 de l'information (infosec), la conformit\u00e9 et l'informatique. Les \u00e9quipes infosec se concentrent sur la protection des donn\u00e9es et des syst\u00e8mes, les \u00e9quipes de conformit\u00e9 veillent au respect des normes juridiques et r\u00e9glementaires, et les \u00e9quipes informatiques g\u00e8rent l'infrastructure technique. Au sein de ces domaines, les \u00e9quipes sont souvent divis\u00e9es en sous-groupes sp\u00e9cialis\u00e9s, tels que des comit\u00e9s ou des groupes de travail, qui se concentrent sur des t\u00e2ches sp\u00e9cifiques telles que la r\u00e9ponse aux incidents ou l'\u00e9laboration de politiques.<\/p>\n\n\n\n<p>\u00c0 mesure que le paysage de la cybers\u00e9curit\u00e9 \u00e9volue, la composition de ces \u00e9quipes devient plus sp\u00e9cialis\u00e9e. De nouvelles fonctions telles que celles d'analyste des menaces, d'expert en r\u00e9silience et d'officier de liaison sont de plus en plus courantes. Les analystes des menaces travaillent \u00e0 l'identification et \u00e0 l'att\u00e9nuation des menaces potentielles, les experts en r\u00e9silience veillent \u00e0 ce que les organisations puissent se remettre rapidement des cyberincidents, et les officiers de liaison facilitent la communication entre les \u00e9quipes techniques et les autres d\u00e9partements. Ces r\u00f4les refl\u00e8tent le besoin croissant d'une approche globale et proactive de la cybers\u00e9curit\u00e9\".<\/p>\n\n\n<style>.kb-row-layout-id27748_9b9292-d9 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id27748_9b9292-d9 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id27748_9b9292-d9 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, calc(40% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(60% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id27748_9b9292-d9 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id27748_9b9292-d9 > .kt-row-column-wrap{grid-template-columns:repeat(2, minmax(0, 1fr));}}@media all and (max-width: 767px){.kb-row-layout-id27748_9b9292-d9 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id27748_9b9292-d9 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column27748_c3ffbe-04 > .kt-inside-inner-col,.kadence-column27748_c3ffbe-04 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column27748_c3ffbe-04 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column27748_c3ffbe-04 > .kt-inside-inner-col{flex-direction:column;}.kadence-column27748_c3ffbe-04 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column27748_c3ffbe-04 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column27748_c3ffbe-04{position:relative;}@media all and (max-width: 1024px){.kadence-column27748_c3ffbe-04 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column27748_c3ffbe-04 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column27748_c3ffbe-04\"><div class=\"kt-inside-inner-col\">\n<h3 class=\"wp-block-heading\">Tracer sa route\" de KnowledgeFlow<\/h3>\n\n\n\n<p>KnowledgeFlow offre le service \"<a href=\"https:\/\/knowledgeflow.org\/initiative\/charting-your-couse-a-map-from-cybersafety-to-cybersecurity\/\">Tracer sa route<\/a>Le programme \"Cybers\u00e9curit\u00e9\" est un programme d'\u00e9tudes de haut niveau. Ce cours propose un parcours structur\u00e9 allant d'une sensibilisation de base \u00e0 la cybers\u00e9curit\u00e9 \u00e0 une carri\u00e8re \u00e0 part enti\u00e8re dans le domaine de la cybers\u00e9curit\u00e9. Il commence par des connaissances fondamentales, couvrant des principes cl\u00e9s tels que la d\u00e9tection des menaces, la gestion des risques et les protocoles de s\u00e9curit\u00e9, et progresse progressivement vers des sujets plus avanc\u00e9s et des exercices pratiques qui simulent des sc\u00e9narios du monde r\u00e9el.<\/p>\n\n\n\n<p>Restez \u00e0 l'\u00e9coute pour la deuxi\u00e8me partie de notre entretien, dans laquelle Claudiu Popa parlera des cheminements de carri\u00e8re, des points d'entr\u00e9e dans l'industrie de la cybers\u00e9curit\u00e9 et des certifications qui peuvent aider les professionnels \u00e0 faire progresser leur carri\u00e8re au Canada.<\/p>\n<\/div><\/div>\n\n\n<style>.kadence-column27748_d7b152-88 > .kt-inside-inner-col{display:flex;}.kadence-column27748_d7b152-88 > .kt-inside-inner-col,.kadence-column27748_d7b152-88 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column27748_d7b152-88 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column27748_d7b152-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column27748_d7b152-88 > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column27748_d7b152-88{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column27748_d7b152-88{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column27748_d7b152-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column27748_d7b152-88 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column27748_d7b152-88{position:relative;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column27748_d7b152-88{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column27748_d7b152-88{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column27748_d7b152-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kadence-column27748_d7b152-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column27748_d7b152-88{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column27748_d7b152-88{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column27748_d7b152-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column27748_d7b152-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column27748_d7b152-88\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"607\" height=\"512\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/Image-2024-08-16-at-12.16\u202fPM-2.jpeg\" alt=\"\" class=\"wp-image-27804\" style=\"width:644px;height:auto\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/Image-2024-08-16-at-12.16\u202fPM-2.jpeg 607w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/Image-2024-08-16-at-12.16\u202fPM-2-600x506.jpeg 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/Image-2024-08-16-at-12.16\u202fPM-2-300x253.jpeg 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/Image-2024-08-16-at-12.16\u202fPM-2-14x12.jpeg 14w\" sizes=\"auto, (max-width: 607px) 100vw, 607px\" \/><\/figure>\n<\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Le Canada est confront\u00e9 \u00e0 une p\u00e9nurie de 25 000 professionnels de la cybers\u00e9curit\u00e9. Claudiu Popa, PDG d'Informatica, aborde les r\u00f4les cl\u00e9s tels que les sp\u00e9cialistes et les g\u00e9n\u00e9ralistes en OT, les comp\u00e9tences essentielles et les structures d'\u00e9quipe indispensables pour faire face aux cybermenaces d'aujourd'hui. Restez \u00e0 l'\u00e9coute pour la deuxi\u00e8me partie sur les parcours de carri\u00e8re et les certifications.<\/p>","protected":false},"author":8,"featured_media":27827,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[565,516],"tags":[537,669,665,672,687,663,664,666,531,667,674,662,670,673,668],"class_list":["post-27748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interview","category-knowledgebytes","tag-awareness","tag-canada","tag-careers","tag-charting-your-course","tag-claudiu-popa","tag-cybersecurity","tag-cybersecurity-careers","tag-digital-security","tag-education","tag-ictc","tag-informatica","tag-interview","tag-interview-series","tag-knowledgeflow","tag-talent-shortage"],"acf":[],"taxonomy_info":{"category":[{"value":565,"label":"Interview"},{"value":516,"label":"KnowledgeBytes"}],"post_tag":[{"value":537,"label":"Awareness"},{"value":669,"label":"Canada"},{"value":665,"label":"careers"},{"value":672,"label":"charting your course"},{"value":687,"label":"claudiu popa"},{"value":663,"label":"cybersecurity"},{"value":664,"label":"cybersecurity careers"},{"value":666,"label":"digital security"},{"value":531,"label":"Education"},{"value":667,"label":"ICTC"},{"value":674,"label":"Informatica"},{"value":662,"label":"interview"},{"value":670,"label":"interview series"},{"value":673,"label":"KnowledgeFlow"},{"value":668,"label":"talent shortage"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/08\/E50F931B-CB08-4087-BA27-F5391AF3EED7.png",675,453,false],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/fr\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":565,"name":"Interview","slug":"interview","term_group":0,"term_taxonomy_id":565,"taxonomy":"category","description":"","parent":0,"count":3,"filter":"raw","cat_ID":565,"category_count":3,"category_description":"","cat_name":"Interview","category_nicename":"interview","category_parent":0},{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","cat_ID":516,"category_count":78,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":[{"term_id":537,"name":"Awareness","slug":"awareness","term_group":0,"term_taxonomy_id":537,"taxonomy":"post_tag","description":"","parent":0,"count":68,"filter":"raw"},{"term_id":669,"name":"Canada","slug":"canada","term_group":0,"term_taxonomy_id":669,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":665,"name":"careers","slug":"careers","term_group":0,"term_taxonomy_id":665,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw"},{"term_id":672,"name":"charting your course","slug":"charting-your-course","term_group":0,"term_taxonomy_id":672,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":687,"name":"claudiu popa","slug":"claudiu-popa","term_group":0,"term_taxonomy_id":687,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw"},{"term_id":663,"name":"cybersecurity","slug":"cybersecurity","term_group":0,"term_taxonomy_id":663,"taxonomy":"post_tag","description":"","parent":0,"count":14,"filter":"raw"},{"term_id":664,"name":"cybersecurity careers","slug":"cybersecurity-careers","term_group":0,"term_taxonomy_id":664,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":666,"name":"digital security","slug":"digital-security","term_group":0,"term_taxonomy_id":666,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":531,"name":"Education","slug":"education","term_group":0,"term_taxonomy_id":531,"taxonomy":"post_tag","description":"","parent":0,"count":48,"filter":"raw"},{"term_id":667,"name":"ICTC","slug":"ictc","term_group":0,"term_taxonomy_id":667,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":674,"name":"Informatica","slug":"informatica","term_group":0,"term_taxonomy_id":674,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":662,"name":"interview","slug":"interview","term_group":0,"term_taxonomy_id":662,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":670,"name":"interview series","slug":"interview-series","term_group":0,"term_taxonomy_id":670,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":673,"name":"KnowledgeFlow","slug":"knowledgeflow","term_group":0,"term_taxonomy_id":673,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":668,"name":"talent shortage","slug":"talent-shortage","term_group":0,"term_taxonomy_id":668,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/27748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/comments?post=27748"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/27748\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media\/27827"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media?parent=27748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/categories?post=27748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/tags?post=27748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}