Recherche

[fusion_global id=”11998″][fusion_builder_container hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” admin_toggled=”no” admin_label=”Titre “][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title margin_top=”” margin_bottom=”15″ hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” size=”1″ content_align=”center” style_type=”none” sep_color=””]

RECHERCHE

[/fusion_title][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”” bottom_margin=”” border_size=”” icon=”fa-search” icon_circle=”yes” icon_circle_color=”#ffffff” width=”” alignment=”center” /][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container admin_label=”Image principale” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” admin_toggled=”no”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”15″ padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”11913″ style_type=”none” stylecolor=”” hover_type=”none” bordersize=”” bordercolor=”” borderradius=”” align=”none” lightbox=”no” gallery_id=”” lightbox_image=”” alt=”” link=”” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]https://www.chairecyber-cni.org/wp-content/uploads/2017/11/Recherche-Chaire-cyber-cni.jpg[/fusion_imageframe][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” admin_toggled=”no” admin_label=”Introduction + 4 containers”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title margin_top=”” margin_bottom=”15″ hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” size=”2″ content_align=”center” style_type=”none” sep_color=””]

Cybersécurité des systèmes de contrôle industriels : une priorité pour la recherche !

[/fusion_title][fusion_separator style_type=”default” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”” bottom_margin=”15″ border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][fusion_text]

Au travers des dimensions analytique, métrique, remédiation et gestion sécurisée des données, la Chaire Cyber CNI étudie la vulnérabilité des infrastructures critiques face aux menaces de cybersécurité.

 

[/fusion_text][/fusion_builder_column][fusion_builder_column type=”1_4″ layout=”1_4″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”#f6f6f6″ background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”10″ padding_bottom=”” padding_left=”10″ margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”11925″ style_type=”none” stylecolor=”” hover_type=”none” bordersize=”” bordercolor=”” borderradius=”” align=”center” lightbox=”no” gallery_id=”” lightbox_image=”” alt=”” link=”” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”picto_page_niv_2″ id=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]https://www.chairecyber-cni.org/wp-content/uploads/2017/11/section-analytique.png[/fusion_imageframe][fusion_title margin_top=”” margin_bottom=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” size=”3″ content_align=”left” style_type=”none” sep_color=””]

Analytique

[/fusion_title][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” class=”” id=””]

Ou comment analyser
et corréler de grands volumes d’événements afin d’identifier les menaces de sécurité
et les vulnérabilités ?

 

[/fusion_text][fusion_button link=”https://www.chairecyber-cni.org/recherche/analytique/” title=”” target=”_self” link_attributes=”” alignment=”center” modal=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”btn_niv_2″ id=”” color=”default” button_gradient_top_color=”” button_gradient_bottom_color=”” button_gradient_top_color_hover=”” button_gradient_bottom_color_hover=”” accent_color=”” accent_hover_color=”” type=”” bevel_color=”” border_width=”” size=”” stretch=”default” shape=”” icon=”” icon_position=”left” icon_divider=”no” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]En savoir plus[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_4″ layout=”1_4″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”#f6f6f6″ background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”10″ padding_bottom=”” padding_left=”10″ margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”11927″ style_type=”none” stylecolor=”” hover_type=”none” bordersize=”” bordercolor=”” borderradius=”” align=”center” lightbox=”no” gallery_id=”” lightbox_image=”” alt=”” link=”” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”picto_page_niv_2″ id=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]https://www.chairecyber-cni.org/wp-content/uploads/2017/11/section-metriques.png[/fusion_imageframe][fusion_title margin_top=”” margin_bottom=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” size=”3″ content_align=”left” style_type=”none” sep_color=””]

Métriques

[/fusion_title][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” class=”” id=””]

Ou comment mesurer l’impact d’une menace et l’efficacité des contre-mesures et, plus globalement, trouver le bon compromis entre les exigences opérationnelles et de sécurité du système ?

 

[/fusion_text][fusion_button link=”https://www.chairecyber-cni.org/recherche/metriques/” title=”” target=”_self” link_attributes=”” alignment=”center” modal=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”btn_niv_2″ id=”” color=”default” button_gradient_top_color=”” button_gradient_bottom_color=”” button_gradient_top_color_hover=”” button_gradient_bottom_color_hover=”” accent_color=”” accent_hover_color=”” type=”” bevel_color=”” border_width=”” size=”” stretch=”default” shape=”” icon=”” icon_position=”left” icon_divider=”no” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]En savoir plus[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_4″ layout=”1_4″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”#f6f6f6″ background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”10″ padding_bottom=”” padding_left=”10″ margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”11928″ style_type=”none” stylecolor=”” hover_type=”none” bordersize=”” bordercolor=”” borderradius=”” align=”center” lightbox=”no” gallery_id=”” lightbox_image=”” alt=”” link=”” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”picto_page_niv_2″ id=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]https://www.chairecyber-cni.org/wp-content/uploads/2017/11/section-remediation.png[/fusion_imageframe][fusion_title margin_top=”” margin_bottom=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” size=”3″ content_align=”left” style_type=”none” sep_color=””]

Remédiation

[/fusion_title][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” class=”” id=””]

Ou comment agir
sur les événements de sécurité, notamment les menaces,
qui peuvent correspondre
à des scénarios d’intrusion simultanés et coordonnés ?

 

[/fusion_text][fusion_button link=”https://www.chairecyber-cni.org/recherche/remediation/” title=”” target=”_self” link_attributes=”” alignment=”center” modal=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”btn_niv_2″ id=”” color=”default” button_gradient_top_color=”” button_gradient_bottom_color=”” button_gradient_top_color_hover=”” button_gradient_bottom_color_hover=”” accent_color=”” accent_hover_color=”” type=”” bevel_color=”” border_width=”” size=”” stretch=”default” shape=”” icon=”” icon_position=”left” icon_divider=”no” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]En savoir plus[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_4″ layout=”1_4″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”#f6f6f6″ background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”10″ padding_bottom=”” padding_left=”10″ margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”11926″ style_type=”none” stylecolor=”” hover_type=”none” bordersize=”” bordercolor=”” borderradius=”” align=”center” lightbox=”no” gallery_id=”” lightbox_image=”” alt=”” link=”” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”picto_page_niv_2″ id=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]https://www.chairecyber-cni.org/wp-content/uploads/2017/11/section-GSD.png[/fusion_imageframe][fusion_title margin_top=”” margin_bottom=”10″ hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” size=”3″ content_align=”left” style_type=”none” sep_color=””]

Gestion sécurisée des données

[/fusion_title][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” class=”” id=””]

Ou comment collecter
et gérer de façon sécurisée
de gros volumes d’événements de sécurité provenant de systèmes hétérogènes et distribués ?

 

[/fusion_text][fusion_button link=”https://www.chairecyber-cni.org/recherche/gestion-securisee-donnees/” title=”” target=”_self” link_attributes=”” alignment=”center” modal=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”btn_niv_2″ id=”” color=”default” button_gradient_top_color=”” button_gradient_bottom_color=”” button_gradient_top_color_hover=”” button_gradient_bottom_color_hover=”” accent_color=”” accent_hover_color=”” type=”” bevel_color=”” border_width=”” size=”” stretch=”default” shape=”” icon=”” icon_position=”left” icon_divider=”no” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]En savoir plus[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” margin_top=”40″ margin_bottom=”40″ padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” admin_label=”Texte section 1″ admin_toggled=”no”][fusion_builder_row][fusion_builder_column type=”3_4″ layout=”3_4″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]

Lorsqu’une cybermenace est détectée, en général, les procédures et protocoles de sécurité – qu’il s’agisse d’une entreprise ou d’une organisation – suivent à peu près le même schéma de résolution : l’impact de l’attaque est analysé ; les options de remédiation sont déterminées ; les contrôles de sécurité sont sélectionnés. Et enfin, une nouvelle configuration de sécurité est décidée. Puis déployée. Une méthode qui s’avère coûteuse, chronophage et source de nouvelles erreurs… Pourquoi ?  Parce que les organisations et les entreprises victimes de ces attaques se contentent de poser une rustine sur leur système de défense à défaut de le rendre plus étanche. Les interventions sont souvent manuelles ou semi-automatiques, peu adaptées à la nature complexe de ces systèmes et surtout… largement déployées par ailleurs dans d’autres environnements ! Et donc connues. Qui plus est, les infrastructures critiques ne peuvent – durant la période de remédiation – êtres arrêtées qu’à de très rares exceptions. Une continuité de fonctionnement (ou de service), même en mode dégradé, qui rend plus difficile encore la mise en place d’une solution adéquate. Seule option alors réellement viable et pérenne : l’élévation du niveau d’automatisation permettant d’assurer ainsi les exigences de sécurité et de disponibilité des infrastructures critiques. Et c’est encore plus vrai lorsqu’on a affaire à des opérateurs d’importance vitale (OIV). Autrement dit des organisations identifiées par l’Etat comme ayant des activités indispensables ou dangereuses pour la population et tel que défini par le Code de la Défense (Article R. 1332-2).

[/fusion_text][/fusion_builder_column][fusion_builder_column type=”1_4″ layout=”1_4″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”12861″ style_type=”none” stylecolor=”” hover_type=”none” bordersize=”” bordercolor=”” borderradius=”” align=”center” lightbox=”no” gallery_id=”” lightbox_image=”” alt=”” link=”” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]https://www.chairecyber-cni.org/wp-content/uploads/2018/01/chaire-cyber-cni-imt.jpg[/fusion_imageframe][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container admin_label=”Texte section 2″ hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”bg_grey” id=”” background_color=”#eeeeee” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” margin_top=”60″ margin_bottom=”0″ padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” admin_toggled=”no”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_title margin_top=”20″ margin_bottom=”15″ hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”responsive-title-center” id=”” size=”2″ content_align=”center” style_type=”none” sep_color=””]

Se préparer aux défis de la sécurité informatique moderne

[/fusion_title][fusion_separator style_type=”default” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”” bottom_margin=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][/fusion_builder_column][fusion_builder_column type=”1_4″ layout=”1_4″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_imageframe image_id=”12851″ style_type=”none” stylecolor=”” hover_type=”none” bordersize=”” bordercolor=”” borderradius=”” align=”center” lightbox=”no” gallery_id=”” lightbox_image=”” alt=”” link=”” linktarget=”_self” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]https://www.chairecyber-cni.org/wp-content/uploads/2018/01/chaire-cyber-cni-rennes.jpg[/fusion_imageframe][/fusion_builder_column][fusion_builder_column type=”3_4″ layout=”3_4″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]

La Chaire Cyber CNI, au travers de ses différents travaux de recherche, accorde une attention toute particulière aux Systèmes de Contrôle Industriel (ICS) notamment lorsque ces derniers permettent à la fois la supervision ainsi que le contrôle des infrastructures. Des ICS parfois sensibles donc, voir même critiques, surtout lorsqu’ils pilotent des usines de production d’eau, des réseaux d’énergie ou certains processus industriels. Aujourd’hui, en effet, de plus en plus d’ICS sont connectés à l’Internet, communiquent avec les systèmes de gestion de l’entreprise et sont…. encore et toujours, développés avec des langages informatiques standards. Qui plus est, les composants techniques utilisés dans les systèmes de contrôle industriel sont bien souvent peu préparés aux défis de la sécurité informatique moderne car ils utilisent des technologies hétérogènes (matériel et logiciel) parfois vieillissantes et mal protégées. Au-delà de ces vulnérabilités intrinsèques, les ICS sont également soumis à des contraintes de disponibilité et d’exploitation qui rendent les mises à jour de sécurité difficiles.

[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]