{"id":2190,"date":"2021-10-27T09:56:05","date_gmt":"2021-10-27T09:56:05","guid":{"rendered":"https:\/\/amethyste.fr\/WordPress\/?page_id=2190"},"modified":"2023-10-25T10:15:57","modified_gmt":"2023-10-25T10:15:57","slug":"cyberquartz-logiciel-gestion-risque-cyber","status":"publish","type":"page","link":"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/","title":{"rendered":"Logiciel de Gestion du Risque Cyber &#8211; CyberQuartz"},"content":{"rendered":"\n    \n    <section class=\"u-align-left u-clearfix u-image u-section-2\" src=\"\" id=\"sec-4ccf\" data-image-width=\"2560\" data-image-height=\"1086\" style=\"background-image: url(&quot;https:\/\/amethyste.fr\/WordPress\/wp-content\/uploads\/Cyber-Header-2-scaled.jpg&quot;);\">\n      <div class=\"u-clearfix u-sheet u-sheet-1\">\n        <h1 class=\"u-align-right u-text u-text-1\" data-lang-fr=\"Logiciel de Gestion du<br>Risque Cyber<br>\" data-lang-en=\"\u200bCyber Risk Management<br>Software\">Logiciel de Gestion du<br>Risque Cyber<br>\n        <\/h1>\n      <\/div>\n    <\/section>\n    <section class=\"u-clearfix u-section-3\" id=\"sec-7096\">\n      <div class=\"u-clearfix u-sheet u-sheet-1\">\n        <h2 class=\"u-text u-text-1\" data-lang-fr=\"\u200bL\u2019\u00e9valuation\nde risques au service de la cyber r\u00e9silience\" data-lang-en=\"\u200bCyber resilience\nthrough risk assessment\"> L\u2019\u00e9valuation\nde risques au service de la cyber r\u00e9silience<\/h2>\n      <\/div>\n    <\/section>\n    <section class=\"u-clearfix u-section-4\" id=\"sec-64df\">\n      <div class=\"u-clearfix u-sheet u-valign-middle u-sheet-1\">\n        <div class=\"u-clearfix u-expanded-width u-layout-wrap u-layout-wrap-1\">\n          <div class=\"u-layout\">\n            <div class=\"u-layout-row\">\n              <div class=\"u-container-style u-layout-cell u-size-47 u-layout-cell-1\">\n                <div class=\"u-container-layout u-container-layout-1\">\n                  <p class=\"u-text u-text-1\" data-lang-fr=\"\u200b\n\u200b\nA l\u2019\u00e8re de l\u2019augmentation\ndes cibles potentielles d\u2019attaques cyber (IoTs, e-commerce, t\u00e9l\u00e9travail\u2026), le <b>risque\ncyber<\/b> est une pr\u00e9occupation mondiale pour toutes les industries, toutes les\ninfrastructures et les soci\u00e9t\u00e9s de toutes tailles, particuli\u00e8rement renforc\u00e9e\npar l\u2019augmentation de la cyber criminalit\u00e9, impactant divers domaines&amp;nbsp;: <b>pertes\nfinanci\u00e8res et op\u00e9rationnelles, paralysie des syst\u00e8mes, donn\u00e9es vol\u00e9es et\nperdues, menaces sur les clients et la r\u00e9putation de l\u2019entreprise<\/b>\u2026 Aujourd\u2019hui\nle risque cyber doit \u00eatre vu comme un <b>risque d\u2019entreprise majeur<\/b> et un <b>point\ncl\u00e9 de la gouvernance<\/b>.<br><br>Augmentant la <b>s\u00e9curit\u00e9\ndes syst\u00e8mes informatiques<\/b> en fournissant une <b>vision globale<\/b> de l\u2019infrastructure,\nen <b>identifiant les vuln\u00e9rabilit\u00e9s<\/b> et en <b>am\u00e9liorant les temps de\nr\u00e9action<\/b> et les <b>reprises<\/b> <b>d\u2019activit\u00e9<\/b> \u00e0 la suite d\u2019une\nintrusion dans le syst\u00e8me, le <b>module CyberQuartz\u00ae<\/b> aide les Responsables\nde la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information \u00e0 mettre en place les recommandations\nde l\u2019<a href=&quot;https:\/\/www.iso.org\/fr\/isoiec-27001-information-security.html&quot; class=&quot;u-active-none u-border-none u-btn u-button-link u-button-style u-custom-font u-hover-none u-none u-text-custom-color-1 u-block-control u-btn-1&quot; target=&quot;_blank&quot; data-block=&quot;29&quot; style=&quot;background-image: none; font-family: Montserrat, sans-serif; text-decoration: underline !important; padding-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0&quot;>ISO27001<\/a> et de l\u2019<a href=&quot;https:\/\/www.ssi.gouv.fr\/guide\/ebios-2010-expression-des-besoins-et-identification-des-objectifs-de-securite\/&quot; class=&quot;u-active-none u-border-none u-btn u-button-link u-button-style u-custom-font u-hover-none u-none u-text-custom-color-1 u-block-control u-btn-2&quot; target=&quot;_blank&quot; data-block=&quot;30&quot; style=&quot;background-image: none; font-family: Montserrat, sans-serif; text-decoration: underline !important; padding-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0&quot;>EBIOS<\/a>. \n\" data-lang-en=\"\u200b\n\u200b\n\u200bIn the era of increasing targets for cyber attacks (IoTs, e-commerce,\nwork from home, \u2026), <b>cyber risk<\/b> is a worldwide concern for all industries,\nall infrastructures and all company sizes, especially with the rise of cyber criminality,\nimpacting diverse areas: <b>financial and operational losses, system paralysis,\nstolen and lost data, threats on clients and reputation<\/b>\u2026 Today cyber risk\nhas to be looked at as a <b>major corporate risk<\/b> and a <b>key point in\ngovernance<\/b>.<br><br>\u200bEnhancing the <b>security of IT systems<\/b> by providing a\nglobal view of the infrastructure, <b>identifying vulnerabilities<\/b> and <b>improving\nreaction times <\/b>and<b> recovery plans<\/b> following a system intrusion, the <b>CyberQuartz\u00ae\nmodule<\/b> helps Information Systems Security Managers in the implementation of <a href=&quot;https:\/\/www.iso.org\/fr\/isoiec-27001-information-security.html&quot; class=&quot;u-active-none u-btn-1 u-border-none u-btn u-button-link u-button-style u-custom-font u-hover-none u-none u-text-custom-color-1&quot; target=&quot;_blank&quot; style=&quot;background-image: none; font-family: Montserrat, sans-serif; text-decoration: underline !important; padding-top: 0; padding-bottom: 0; padding-left: 0; padding-right: 0&quot; data-lang-fr=&quot;{&amp;quot;content&amp;quot;:&amp;quot;ISO27001&amp;quot;,&amp;quot;href&amp;quot;:&amp;quot;https:\/\/www.iso.org\/fr\/isoiec-27001-information-security.html&amp;quot;}&quot;>ISO27001<\/a> and <a href=&quot;https:\/\/www.ssi.gouv.fr\/guide\/ebios-2010-expression-des-besoins-et-identification-des-objectifs-de-securite\/&quot; class=&quot;u-active-none u-btn-2 u-border-none u-btn u-button-link u-button-style u-custom-font u-hover-none u-none u-text-custom-color-1&quot; target=&quot;_blank&quot; style=&quot;background-image: none; font-family: Montserrat, sans-serif; text-decoration: underline !important; padding: 0px;&quot; data-lang-fr=&quot;{&amp;quot;content&amp;quot;:&amp;quot;EBIOS&amp;quot;,&amp;quot;href&amp;quot;:&amp;quot;https:\/\/www.ssi.gouv.fr\/guide\/ebios-2010-expression-des-besoins-et-identification-des-objectifs-de-securite\/&amp;quot;}&quot;>EBIOS<\/a> recommendations. \n\"> A l\u2019\u00e8re de l\u2019augmentation\ndes cibles potentielles d\u2019attaques cyber (IoTs, e-commerce, t\u00e9l\u00e9travail\u2026), le <b>risque\ncyber<\/b> est une pr\u00e9occupation mondiale pour toutes les industries, toutes les\ninfrastructures et les soci\u00e9t\u00e9s de toutes tailles, particuli\u00e8rement renforc\u00e9e\npar l\u2019augmentation de la cyber criminalit\u00e9, impactant divers domaines&nbsp;: <b>pertes\nfinanci\u00e8res et op\u00e9rationnelles, paralysie des syst\u00e8mes, donn\u00e9es vol\u00e9es et\nperdues, menaces sur les clients et la r\u00e9putation de l\u2019entreprise<\/b>\u2026 Aujourd\u2019hui\nle risque cyber doit \u00eatre vu comme un <b>risque d\u2019entreprise majeur<\/b> et un <b>point\ncl\u00e9 de la gouvernance<\/b>.<br>\n                    <br>Augmentant la <b>s\u00e9curit\u00e9\ndes syst\u00e8mes informatiques<\/b> en fournissant une <b>vision globale<\/b> de l\u2019infrastructure,\nen <b>identifiant les vuln\u00e9rabilit\u00e9s<\/b> et en <b>am\u00e9liorant les temps de\nr\u00e9action<\/b> et les <b>reprises<\/b><b>d\u2019activit\u00e9<\/b> \u00e0 la suite d\u2019une\nintrusion dans le syst\u00e8me, le <b>module CyberQuartz\u00ae<\/b> aide les Responsables\nde la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information \u00e0 mettre en place les recommandations\nde l\u2019<a href=\"https:\/\/www.iso.org\/fr\/isoiec-27001-information-security.html\" class=\"u-active-none u-border-none u-btn u-button-link u-button-style u-custom-font u-hover-none u-none u-text-custom-color-1 u-block-control u-btn-1\" target=\"_blank\">ISO27001<\/a> et de l\u2019<a href=\"https:\/\/www.ssi.gouv.fr\/guide\/ebios-2010-expression-des-besoins-et-identification-des-objectifs-de-securite\/\" class=\"u-active-none u-border-none u-btn u-button-link u-button-style u-custom-font u-hover-none u-none u-text-custom-color-1 u-block-control u-btn-2\" target=\"_blank\">EBIOS<\/a>. \n                  <\/p>\n                <\/div>\n              <\/div>\n              <div class=\"u-align-center u-container-style u-layout-cell u-size-13 u-layout-cell-2\">\n                <div class=\"u-container-layout u-container-layout-2\">\n                  <a href=\"https:\/\/amethyste.fr\/WordPress\/en\/contact\/\" class=\"u-align-center u-btn u-button-style u-palette-1-base u-text-body-alt-color u-btn-3\" data-lang-fr=\"{&quot;content&quot;:&quot;demandez une demo&quot;,&quot;href&quot;:&quot;https:\/\/amethyste.fr\/WordPress\/en\/contact\/&quot;}\" data-lang-en=\"{&quot;content&quot;:&quot;ask for a demo&quot;,&quot;href&quot;:&quot;https:\/\/amethyste.fr\/WordPress\/en\/contact\/&quot;}\">demandez une demo<\/a>\n                  <a href=\"https:\/\/amethyste.fr\/WordPress\/fr\/modules-asset-integrity-management\/\" class=\"u-align-center u-btn u-button-style u-hover-palette-1-dark-1 u-palette-1-base u-btn-4\" data-lang-fr=\"{&quot;content&quot;:&quot;tous nos modules&quot;,&quot;href&quot;:&quot;https:\/\/amethyste.fr\/WordPress\/fr\/modules-asset-integrity-management\/&quot;}\" data-lang-en=\"{&quot;content&quot;:&quot;all our modules&quot;,&quot;href&quot;:&quot;https:\/\/amethyste.fr\/WordPress\/fr\/modules-asset-integrity-management\/&quot;}\">tous nos modules<\/a>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/section>\n    <section class=\"u-clearfix u-section-5\" id=\"sec-96a9\">\n      <div class=\"u-clearfix u-sheet u-valign-middle u-sheet-1\">\n        <div class=\"u-clearfix u-expanded-width u-layout-wrap u-layout-wrap-1\">\n          <div class=\"u-layout\">\n            <div class=\"u-layout-row\">\n              <div class=\"u-container-style u-layout-cell u-size-30 u-layout-cell-1\">\n                <div class=\"u-container-layout u-container-layout-1\">\n                  <h3 class=\"u-text u-text-1\" data-lang-fr=\"\u200bUne\nvision globale de l\u2019infrastructure IT\" data-lang-en=\"\u200b\u200bA global vision of the IT\ninfrastructure\"> Une\nvision globale de l\u2019infrastructure IT<\/h3>\n                  <p class=\"u-text u-text-2\" data-lang-fr=\"\u200b\nD\u00e9finition des\nentr\u00e9es de la base de donn\u00e9es dans l\u2019Asset Register:\n\" data-lang-en=\"\u200b<b><span style=&quot;font-weight: 400;&quot;>Definition of the\ndatabase i<\/span><span style=&quot;font-weight: 400;&quot;>tems of the company\u2019s network in the Asset Register:<\/span><\/b>\n                  \"> D\u00e9finition des\nentr\u00e9es de la base de donn\u00e9es dans l\u2019Asset Register: <\/p>\n                  <ul class=\"u-text u-text-3\" data-lang-fr=\"\n                    <li style=&quot;&quot;><div class=&quot;hidden u-list-icon u-block-65a8-19&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-list-icon u-block-65a8-20&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-list-icon u-block-65a8-17&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-list-icon u-block-65a8-18&quot; style=&quot;&quot;><\/div><!--[if !supportLists]--><!--[endif]-->\u200bEquipements physiques et IoTs<\/li><li style=&quot;&quot;><div class=&quot;hidden u-list-icon u-block-65a8-21&quot; style=&quot;&quot;><\/div>Logiciels install\u00e9s<\/li><li style=&quot;&quot;><div class=&quot;hidden u-list-icon u-block-65a8-22&quot; style=&quot;&quot;><\/div>Donn\u00e9es et proc\u00e9dures<\/li><li style=&quot;&quot;><div class=&quot;hidden u-list-icon u-block-65a8-23&quot; style=&quot;&quot;><\/div>Ressources et leurs acc\u00e8s<\/li><li style=&quot;&quot;><div class=&quot;hidden u-list-icon u-block-65a8-24&quot; style=&quot;&quot;><\/div>Syst\u00e8mes externes, interfaces, services, fournisseurs\net sous-traitants&amp;nbsp;<\/li><li style=&quot;&quot;><div class=&quot;hidden u-list-icon u-block-65a8-25&quot; style=&quot;&quot;><\/div><!--[endif]-->Information \u00e0 sauvegarder et fr\u00e9quences\n<\/li>\" data-lang-en=\"\n                    <li style=&quot;&quot;><div class=&quot;hidden u-block-65a8-19 u-list-icon&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-block-65a8-20 u-list-icon&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-block-65a8-17 u-list-icon&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-block-65a8-18 u-list-icon&quot; style=&quot;&quot;><\/div><!--[if !supportLists]--><!--[endif]-->\u200b\u200bPhysical equipment and IoTs<\/li><li style=&quot;&quot;><div class=&quot;hidden u-block-65a8-21 u-list-icon&quot;><\/div>Installed software<\/li><li style=&quot;&quot;><div class=&quot;hidden u-block-65a8-22 u-list-icon&quot;><\/div>Data and procedures<\/li><li style=&quot;&quot;><div class=&quot;hidden u-block-65a8-23 u-list-icon&quot;><\/div>Resources and their accesses<\/li><li style=&quot;&quot;><div class=&quot;hidden u-block-65a8-24 u-list-icon&quot;><\/div>External systems interfaces, services, providers\nand subsidiaries<br><\/li><li style=&quot;&quot;><div class=&quot;hidden u-block-65a8-25 u-list-icon&quot;><\/div>Information to back-up and frequencies<\/li>\">\n                    <li style=\"\"><!--[if !supportLists]--><!--[endif]--> Equipements physiques et IoTs<\/li>\n                    <li style=\"\">Logiciels install\u00e9s<\/li>\n                    <li style=\"\">Donn\u00e9es et proc\u00e9dures<\/li>\n                    <li style=\"\">Ressources et leurs acc\u00e8s<\/li>\n                    <li style=\"\">Syst\u00e8mes externes, interfaces, services, fournisseurs\net sous-traitants&nbsp;<\/li>\n                    <li style=\"\"><!--[endif]-->Information \u00e0 sauvegarder et fr\u00e9quences <\/li>\n                  <\/ul>\n                <\/div>\n              <\/div>\n              <div class=\"u-align-center-sm u-align-center-xs u-container-style u-layout-cell u-size-30 u-layout-cell-2\">\n                <div class=\"u-container-layout u-valign-top u-container-layout-2\">\n                  <img decoding=\"async\" src=\"https:\/\/amethyste.fr\/WordPress\/wp-content\/uploads\/8fa24bf8a7a02a65888bb76b17821f887e9a0bd72efdb92a1ae619af6f3b5abaac8bae4b296b3a2132ebf0eb0e707bf8f2517125d1ef89cd06c04b_1280.png?_t=1635326059\" alt=\"Gestion du Risque Cyber: cartographier l&amp;apos;infrastructure IT\" class=\"u-expanded-width u-image u-image-default u-image-1\" data-image-width=\"1280\" data-image-height=\"833\" data-lang-fr=\"Gestion du Risque Cyber: cartographier l&amp;apos;infrastructure IT\" data-lang-en=\"Gestion du Risque Cyber: cartographier l&amp;apos;infrastructure IT\">\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/section>\n    <section class=\"u-clearfix u-section-6\" id=\"carousel_3ab3\">\n      <div class=\"u-clearfix u-sheet u-valign-middle u-sheet-1\">\n        <div class=\"u-clearfix u-expanded-width u-layout-wrap u-layout-wrap-1\">\n          <div class=\"u-layout\" style=\"\">\n            <div class=\"u-layout-row\" style=\"\">\n              <div class=\"u-container-style u-layout-cell u-size-30 u-layout-cell-1\">\n                <div class=\"u-container-layout u-container-layout-1\">\n                  <img decoding=\"async\" src=\"https:\/\/amethyste.fr\/WordPress\/wp-content\/uploads\/cyber2.jpg?_t=1635322758\" alt=\"Gestion du Risque Cyber: Matrice de risque\" class=\"u-align-center u-image u-image-default u-image-1\" data-image-width=\"267\" data-image-height=\"270\" data-lang-fr=\"Gestion du Risque Cyber: Matrice de risque\" data-lang-en=\"Gestion du Risque Cyber: Matrice de risque\">\n                <\/div>\n              <\/div>\n              <div class=\"u-container-style u-layout-cell u-size-30 u-layout-cell-2\">\n                <div class=\"u-container-layout u-valign-top u-container-layout-2\">\n                  <h3 class=\"u-text u-text-1\" data-lang-fr=\"\u200bAnticiper\npour am\u00e9liorer la s\u00e9curit\u00e9 du syst\u00e8me\" data-lang-en=\"\u200b\u200bAnticipate actions to\nimprove system security\"> Anticiper\npour am\u00e9liorer la s\u00e9curit\u00e9 du syst\u00e8me<\/h3>\n                  <p class=\"u-text u-text-2\" data-lang-fr=\"\u200b\nEvaluation de risque:\n\" data-lang-en=\"\u200bRisk assessment: \"> Evaluation de risque: <\/p>\n                  <ul class=\"u-text u-text-3\" data-lang-fr=\"\n                    <li><div class=&quot;hidden u-list-icon u-block-0286-25&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-list-icon u-block-0286-26&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-list-icon u-block-0286-23&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-list-icon u-block-0286-24&quot; style=&quot;&quot;><\/div>\u200bGestion des anomalies dans l\u2019Anomaly\nRegister<\/li><li><div class=&quot;hidden u-list-icon u-block-0286-27&quot; style=&quot;&quot;><\/div>Gestion d\u2019audit<\/li><li style=&quot;&quot;><div class=&quot;hidden u-list-icon u-block-0286-28&quot; style=&quot;&quot;><\/div><!--[endif]-->D\u00e9finition du niveau de risqu\u00e9 acceptable\npour chaque entr\u00e9e<\/li><li style=&quot;&quot; data-block-type=&quot;&quot;><div class=&quot;hidden u-list-icon u-block-0286-29&quot; style=&quot;&quot;><\/div><!--[endif]-->Identification et mise en \u00e9vidence des vuln\u00e9rabilit\u00e9s\ngr\u00e2ce aux checklists de l'ISO27001 et de l'EBIOS \n<\/li>\" data-lang-en=\"\n                    <li><div class=&quot;hidden u-block-0286-25 u-list-icon&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-block-0286-26 u-list-icon&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-block-0286-23 u-list-icon&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-block-0286-24 u-list-icon&quot; style=&quot;&quot;><\/div>\u200b\u200bAnomaly management in the Anomaly Register<\/li><li><div class=&quot;hidden u-block-0286-27 u-list-icon&quot;><\/div>Audit management<\/li><li><div class=&quot;hidden u-block-0286-28 u-list-icon&quot;><\/div>Definition of acceptable level of risk for each\nitem<\/li><li><div class=&quot;hidden u-block-0286-29 u-list-icon&quot;><\/div>Identification and highlight of vulnerabilities\nthrough the ISO27001 and EBIOS checklists<\/li>\">\n                    <li> Gestion des anomalies dans l\u2019Anomaly\nRegister<\/li>\n                    <li>Gestion d\u2019audit<\/li>\n                    <li style=\"\"><!--[endif]-->D\u00e9finition du niveau de risqu\u00e9 acceptable\npour chaque entr\u00e9e<\/li>\n                    <li style=\"\"><!--[endif]-->Identification et mise en \u00e9vidence des vuln\u00e9rabilit\u00e9s\ngr\u00e2ce aux checklists de l'ISO27001 et de l'EBIOS <\/li>\n                  <\/ul>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/section>\n    <section class=\"u-clearfix u-section-7\" id=\"carousel_5e2a\">\n      <div class=\"u-clearfix u-sheet u-valign-middle u-sheet-1\">\n        <div class=\"u-clearfix u-expanded-width u-layout-wrap u-layout-wrap-1\">\n          <div class=\"u-layout\">\n            <div class=\"u-layout-row\">\n              <div class=\"u-container-style u-layout-cell u-size-30 u-layout-cell-1\">\n                <div class=\"u-container-layout u-container-layout-1\">\n                  <h3 class=\"u-text u-text-1\" data-lang-fr=\"\u200bSoutenir\nla d\u00e9finition de la strat\u00e9gie de r\u00e9duction du risque<br>\" data-lang-en=\"\u200b\u200bSupport to the definition\nof the risk reduction strategy\"> Soutenir\nla d\u00e9finition de la strat\u00e9gie de r\u00e9duction du risque<br>\n                  <\/h3>\n                  <ul class=\"u-text u-text-2\" data-lang-fr=\"\n                    <li style=&quot;&quot;><div class=&quot;hidden u-list-icon u-block-6bb4-17&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-list-icon u-block-6bb4-18&quot; style=&quot;&quot;><\/div><!--[if !supportLists]--><!--[endif]-->Priorisation des points cl\u00e9s et des zones\nd\u2019am\u00e9lioration<\/li><li style=&quot;&quot;><div class=&quot;hidden u-list-icon u-block-6bb4-19&quot; style=&quot;&quot;><\/div><!--[endif]-->D\u00e9finition des r\u00e9solutions \u00e0 prendre pour\nun risque d\u00e9fini<\/li><li style=&quot;&quot;><div class=&quot;hidden u-list-icon u-block-6bb4-20&quot; style=&quot;&quot;><\/div><!--[endif]-->Gestion des t\u00e2ches et des ressources en\ndiagramme de Gantt \n<\/li>\" data-lang-en=\"\n                    <li style=&quot;&quot;><div class=&quot;hidden u-block-6bb4-17 u-list-icon&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-block-6bb4-18 u-list-icon&quot; style=&quot;&quot;><\/div><!--[if !supportLists]--><!--[endif]-->\u200bPrioritization of key points and areas of\nimprovement<\/li><li style=&quot;&quot;><div class=&quot;hidden u-block-6bb4-19 u-list-icon&quot;><\/div>Definition of motions to take on a certain risk<\/li><li style=&quot;&quot;><div class=&quot;hidden u-block-6bb4-20 u-list-icon&quot;><\/div>Task and resource management in Gantt diagrams<\/li>\">\n                    <li style=\"\"><!--[if !supportLists]--><!--[endif]-->Priorisation des points cl\u00e9s et des zones\nd\u2019am\u00e9lioration<\/li>\n                    <li style=\"\"><!--[endif]-->D\u00e9finition des r\u00e9solutions \u00e0 prendre pour\nun risque d\u00e9fini<\/li>\n                    <li style=\"\"><!--[endif]-->Gestion des t\u00e2ches et des ressources en\ndiagramme de Gantt <\/li>\n                  <\/ul>\n                <\/div>\n              <\/div>\n              <div class=\"u-align-center-sm u-align-center-xs u-container-style u-layout-cell u-size-30 u-layout-cell-2\">\n                <div class=\"u-container-layout u-valign-top u-container-layout-2\">\n                  <img decoding=\"async\" src=\"https:\/\/amethyste.fr\/WordPress\/wp-content\/uploads\/AdobeStock_448646108-scaled.jpeg?_t=1635327218\" alt=\"Gestion du Risque Cyber: strat\u00e9gie de r\u00e9duction du risque\" class=\"u-expanded-width u-image u-image-default u-image-1\" data-image-width=\"2560\" data-image-height=\"1354\" data-lang-fr=\"Gestion du Risque Cyber: strat\u00e9gie de r\u00e9duction du risque\" data-lang-en=\"Gestion du Risque Cyber: strat\u00e9gie de r\u00e9duction du risque\">\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/section>\n    <section class=\"u-clearfix u-section-8\" id=\"carousel_611b\">\n      <div class=\"u-clearfix u-sheet u-valign-middle u-sheet-1\">\n        <div class=\"u-clearfix u-expanded-width u-layout-wrap u-layout-wrap-1\">\n          <div class=\"u-layout\" style=\"\">\n            <div class=\"u-layout-row\" style=\"\">\n              <div class=\"u-container-style u-layout-cell u-size-30 u-layout-cell-1\">\n                <div class=\"u-container-layout u-valign-top u-container-layout-1\">\n                  <img decoding=\"async\" src=\"https:\/\/amethyste.fr\/WordPress\/wp-content\/uploads\/AdobeStock_373474197-scaled.jpeg?_t=1635327567\" alt=\"Gestion du Risque Majeur pour une reprise efficace\" class=\"u-align-center-sm u-align-center-xs u-expanded-width u-image u-image-default u-image-1\" data-image-width=\"2560\" data-image-height=\"1547\" data-lang-fr=\"Gestion du Risque Majeur pour une reprise efficace\" data-lang-en=\"Gestion du Risque Majeur pour une reprise efficace\">\n                <\/div>\n              <\/div>\n              <div class=\"u-container-style u-layout-cell u-size-30 u-layout-cell-2\">\n                <div class=\"u-container-layout u-valign-top u-container-layout-2\">\n                  <h3 class=\"u-text u-text-1\" data-lang-fr=\"\u200b\nReprise efficace gr\u00e2ce \u00e0 la gestion du Risque Majeur\n\" data-lang-en=\"\u200b\n\u200bEfficient recovery\nthrough Major Risk management\"> Reprise efficace gr\u00e2ce \u00e0 la gestion du Risque Majeur <\/h3>\n                  <ul class=\"u-text u-text-2\" data-lang-fr=\"\n                    <li><div class=&quot;hidden u-list-icon u-block-38a6-20&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-list-icon u-block-38a6-21&quot; style=&quot;&quot;><\/div><!--[if !supportLists]--><!--[endif]-->Identification de Sc\u00e9nario de Risque\nMajeur<\/li><li><div class=&quot;hidden u-list-icon u-block-38a6-22&quot; style=&quot;&quot;><\/div>Gestion des plans de reprise d\u2019activit\u00e9<\/li><li><div class=&quot;hidden u-list-icon u-block-38a6-23&quot; style=&quot;&quot;><\/div>Historiques des tentatives d\u2019intrusion et\nanalyse des r\u00e9ponses apport\u00e9es\n<\/li>\" data-lang-en=\"\n                    <li><div class=&quot;hidden u-block-38a6-20 u-list-icon&quot; style=&quot;&quot;><\/div><div class=&quot;hidden u-block-38a6-21 u-list-icon&quot; style=&quot;&quot;><\/div><!--[if !supportLists]--><!--[endif]-->\u200bMajor Risk Scenario identification<\/li><li><div class=&quot;hidden u-block-38a6-22 u-list-icon&quot;><\/div>Recovery plan management<\/li><li><div class=&quot;hidden u-block-38a6-23 u-list-icon&quot;><\/div>Attempted intrusion history and given response\nanalysis<\/li>\">\n                    <li><!--[if !supportLists]--><!--[endif]-->Identification de Sc\u00e9nario de Risque\nMajeur<\/li>\n                    <li>Gestion des plans de reprise d\u2019activit\u00e9<\/li>\n                    <li>Historiques des tentatives d\u2019intrusion et\nanalyse des r\u00e9ponses apport\u00e9es <\/li>\n                  <\/ul>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/section>\n    <section class=\"u-clearfix u-section-9\" id=\"sec-c032\">\n      <div class=\"u-clearfix u-sheet u-sheet-1\">\n        <p class=\"u-text u-text-1\" data-lang-fr=\"\u200b\nCe module est\ncompatible avec nos Modules Techniques (Mass Upload\u00ae, Dashboard Builder\u00ae,\nReport Builder\u00ae) pour une utilization facile ainsi que des dashboards et\nrapports customis\u00e9s : nombre de vuln\u00e9rabilit\u00e9s par entr\u00e9e, \u00e9volution des tentatives\nd\u2019intrusion, entr\u00e9es les plus cibl\u00e9es\u2026 \n\" data-lang-en=\"\u200bThis module is compatible with our Technical Modules (Mass\nUpload\u00ae, Dashboard Builder\u00ae, Report Builder\u00ae) for ease of use and customized dashboards\n&amp;amp; reports: number of vulnerabilities per item, evolution of intrusion\nattempts, most targeted items\u2026 \"> Ce module est\ncompatible avec nos Modules Techniques (Mass Upload\u00ae, Dashboard Builder\u00ae,\nReport Builder\u00ae) pour une utilization facile ainsi que des dashboards et\nrapports customis\u00e9s : nombre de vuln\u00e9rabilit\u00e9s par entr\u00e9e, \u00e9volution des tentatives\nd\u2019intrusion, entr\u00e9es les plus cibl\u00e9es\u2026 <\/p>\n        <img decoding=\"async\" class=\"u-align-center u-image u-image-default u-image-1\" src=\"https:\/\/amethyste.fr\/WordPress\/wp-content\/uploads\/cyber1.png?_t=1635322199\" alt=\"\" data-image-width=\"1776\" data-image-height=\"1720\" data-lang-fr=\"\" data-lang-en=\"\">\n      <\/div>\n    <\/section>\n    <section class=\"u-clearfix u-section-10\" id=\"sec-5694\">\n      <div class=\"u-clearfix u-sheet u-sheet-1\">\n        <div class=\"data-layout-selected u-clearfix u-expanded-width u-gutter-10 u-layout-wrap u-layout-wrap-1\">\n          <div class=\"u-layout\">\n            <div class=\"u-layout-row\">\n              <div class=\"u-container-style u-layout-cell u-size-30 u-layout-cell-1\">\n                <div class=\"u-container-layout u-container-layout-1\">\n                  <a href=\"https:\/\/amethyste.fr\/WordPress\/fr\/services-associes\/\" class=\"u-align-center u-btn u-button-style u-hover-palette-1-dark-1 u-palette-1-base u-btn-1\" data-lang-fr=\"{&quot;content&quot;:&quot;decouvrez nos services&quot;,&quot;href&quot;:&quot;https:\/\/amethyste.fr\/WordPress\/fr\/services-associes\/&quot;}\" data-lang-en=\"{&quot;content&quot;:&quot;discover our services&quot;,&quot;href&quot;:&quot;https:\/\/amethyste.fr\/WordPress\/fr\/services-associes\/&quot;}\">decouvrez nos services<\/a>\n                <\/div>\n              <\/div>\n              <div class=\"u-container-style u-layout-cell u-size-30 u-layout-cell-2\">\n                <div class=\"u-container-layout u-container-layout-2\">\n                  <a href=\"https:\/\/amethyste.fr\/documents\/orKsoft_System_Requirements_FR.pdf\" class=\"u-align-center u-btn u-button-style u-file-link u-hover-palette-1-dark-1 u-palette-1-base u-btn-2\" data-lang-fr=\"{&quot;content&quot;:&quot;crit\u00e8res techniques&quot;,&quot;href&quot;:&quot;https:\/\/amethyste.fr\/documents\/orKsoft_System_Requirements_FR.pdf&quot;}\" data-lang-en=\"{&quot;content&quot;:&quot;technical requirements&quot;,&quot;href&quot;:&quot;https:\/\/amethyste.fr\/documents\/orKsoft_System_Requirements.pdf&quot;}\" target=\"_blank\">crit\u00e8res techniques<\/a>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/section>\n    <section class=\"u-clearfix u-section-11\" id=\"sec-1370\">\n      <div class=\"u-clearfix u-sheet u-sheet-1\"><\/div>\n    <\/section>\n    \n    \n    \n    \n    \n    \n    \n    \n    \n    \n    \n    \n    \n    \n  \n","protected":false},"excerpt":{"rendered":"<p>Logiciel de Gestion duRisque Cyber L\u2019\u00e9valuation de risques au service de la cyber r\u00e9silience A l\u2019\u00e8re de l\u2019augmentation des cibles potentielles d\u2019attaques cyber (IoTs, e-commerce, t\u00e9l\u00e9travail\u2026), le risque cyber est une pr\u00e9occupation mondiale pour toutes les industries, toutes les infrastructures et les soci\u00e9t\u00e9s de toutes tailles, particuli\u00e8rement renforc\u00e9e par l\u2019augmentation de la cyber criminalit\u00e9, impactant &hellip; <a href=\"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Logiciel de Gestion du Risque Cyber &#8211; CyberQuartz&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1679,"menu_order":14,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[101,1],"tags":[],"class_list":["post-2190","page","type-page","status-publish","hentry","category-aim-modules","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Logiciel de Gestion du Risque Cyber - CyberQuartz - Am\u00e9thyste<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez CyberQuartz, notre solution de Gestion du Risque Cyber, applicable aux industries utilisant des syst\u00e8mes IT et g\u00e9rant des donn\u00e9es\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Logiciel de Gestion du Risque Cyber - CyberQuartz - Am\u00e9thyste\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez CyberQuartz, notre solution de Gestion du Risque Cyber, applicable aux industries utilisant des syst\u00e8mes IT et g\u00e9rant des donn\u00e9es\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/\" \/>\n<meta property=\"og:site_name\" content=\"Am\u00e9thyste\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-25T10:15:57+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/\",\"url\":\"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/\",\"name\":\"Logiciel de Gestion du Risque Cyber - CyberQuartz - Am\u00e9thyste\",\"isPartOf\":{\"@id\":\"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#website\"},\"datePublished\":\"2021-10-27T09:56:05+00:00\",\"dateModified\":\"2023-10-25T10:15:57+00:00\",\"description\":\"D\u00e9couvrez CyberQuartz, notre solution de Gestion du Risque Cyber, applicable aux industries utilisant des syst\u00e8mes IT et g\u00e9rant des donn\u00e9es\",\"breadcrumb\":{\"@id\":\"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/amethyste.fr\/WordPress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tous nos modules Asset Integrity Management\",\"item\":\"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Logiciel de Gestion du Risque Cyber &#8211; CyberQuartz\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#website\",\"url\":\"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/\",\"name\":\"Am\u00e9thyste\",\"description\":\"Asset Integrity Management software\",\"publisher\":{\"@id\":\"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#organization\",\"name\":\"Am\u00e9thyste\",\"url\":\"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/amethyste.fr\/WordPress\/wp-content\/uploads\/Amethyste-2020-80x80-1.png\",\"contentUrl\":\"https:\/\/amethyste.fr\/WordPress\/wp-content\/uploads\/Amethyste-2020-80x80-1.png\",\"width\":80,\"height\":80,\"caption\":\"Am\u00e9thyste\"},\"image\":{\"@id\":\"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Logiciel de Gestion du Risque Cyber - CyberQuartz - Am\u00e9thyste","description":"D\u00e9couvrez CyberQuartz, notre solution de Gestion du Risque Cyber, applicable aux industries utilisant des syst\u00e8mes IT et g\u00e9rant des donn\u00e9es","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/","og_locale":"en_US","og_type":"article","og_title":"Logiciel de Gestion du Risque Cyber - CyberQuartz - Am\u00e9thyste","og_description":"D\u00e9couvrez CyberQuartz, notre solution de Gestion du Risque Cyber, applicable aux industries utilisant des syst\u00e8mes IT et g\u00e9rant des donn\u00e9es","og_url":"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/","og_site_name":"Am\u00e9thyste","article_modified_time":"2023-10-25T10:15:57+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/","url":"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/","name":"Logiciel de Gestion du Risque Cyber - CyberQuartz - Am\u00e9thyste","isPartOf":{"@id":"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#website"},"datePublished":"2021-10-27T09:56:05+00:00","dateModified":"2023-10-25T10:15:57+00:00","description":"D\u00e9couvrez CyberQuartz, notre solution de Gestion du Risque Cyber, applicable aux industries utilisant des syst\u00e8mes IT et g\u00e9rant des donn\u00e9es","breadcrumb":{"@id":"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/cyberquartz-logiciel-gestion-risque-cyber\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amethyste.fr\/WordPress\/"},{"@type":"ListItem","position":2,"name":"Tous nos modules Asset Integrity Management","item":"https:\/\/amethyste.fr\/WordPress\/modules-asset-integrity-management\/"},{"@type":"ListItem","position":3,"name":"Logiciel de Gestion du Risque Cyber &#8211; CyberQuartz"}]},{"@type":"WebSite","@id":"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#website","url":"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/","name":"Am\u00e9thyste","description":"Asset Integrity Management software","publisher":{"@id":"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#organization","name":"Am\u00e9thyste","url":"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#\/schema\/logo\/image\/","url":"https:\/\/amethyste.fr\/WordPress\/wp-content\/uploads\/Amethyste-2020-80x80-1.png","contentUrl":"https:\/\/amethyste.fr\/WordPress\/wp-content\/uploads\/Amethyste-2020-80x80-1.png","width":80,"height":80,"caption":"Am\u00e9thyste"},"image":{"@id":"https:\/\/amethyste.fr\/WordPress\/en\/amethyste-asset-integrity-management-software\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amethyste.fr\/WordPress\/wp-json\/wp\/v2\/pages\/2190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amethyste.fr\/WordPress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/amethyste.fr\/WordPress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/amethyste.fr\/WordPress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/amethyste.fr\/WordPress\/wp-json\/wp\/v2\/comments?post=2190"}],"version-history":[{"count":11,"href":"https:\/\/amethyste.fr\/WordPress\/wp-json\/wp\/v2\/pages\/2190\/revisions"}],"predecessor-version":[{"id":2810,"href":"https:\/\/amethyste.fr\/WordPress\/wp-json\/wp\/v2\/pages\/2190\/revisions\/2810"}],"up":[{"embeddable":true,"href":"https:\/\/amethyste.fr\/WordPress\/wp-json\/wp\/v2\/pages\/1679"}],"wp:attachment":[{"href":"https:\/\/amethyste.fr\/WordPress\/wp-json\/wp\/v2\/media?parent=2190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/amethyste.fr\/WordPress\/wp-json\/wp\/v2\/categories?post=2190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/amethyste.fr\/WordPress\/wp-json\/wp\/v2\/tags?post=2190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}