{"id":109,"date":"2025-11-26T17:02:11","date_gmt":"2025-11-26T16:02:11","guid":{"rendered":"http:\/\/stag2025.stagcyber.eu\/accuei\/"},"modified":"2026-01-21T09:47:04","modified_gmt":"2026-01-21T08:47:04","slug":"accuei","status":"publish","type":"page","link":"https:\/\/www.stagcyber.fr\/fr\/","title":{"rendered":"Accueil"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"109\" class=\"elementor elementor-109 elementor-2\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df7f2ab elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"df7f2ab\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa1180e elementor-widget elementor-widget-text-editor\" data-id=\"fa1180e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>L&rsquo;information est l&rsquo;atout le plus important dont peuvent disposer les organisations. G\u00e9rer correctement l&rsquo;information est le processus le plus important. <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c18174 e-grid e-con-boxed e-con e-parent\" data-id=\"5c18174\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64df870 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"64df870\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/fr\/strategie-et-conformite-reglementaire\/\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Strat\u00e9gie et conformit\u00e9 r\u00e9glementaire\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-tasks\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M139.61 35.5a12 12 0 0 0-17 0L58.93 98.81l-22.7-22.12a12 12 0 0 0-17 0L3.53 92.41a12 12 0 0 0 0 17l47.59 47.4a12.78 12.78 0 0 0 17.61 0l15.59-15.62L156.52 69a12.09 12.09 0 0 0 .09-17zm0 159.19a12 12 0 0 0-17 0l-63.68 63.72-22.7-22.1a12 12 0 0 0-17 0L3.53 252a12 12 0 0 0 0 17L51 316.5a12.77 12.77 0 0 0 17.6 0l15.7-15.69 72.2-72.22a12 12 0 0 0 .09-16.9zM64 368c-26.49 0-48.59 21.5-48.59 48S37.53 464 64 464a48 48 0 0 0 0-96zm432 16H208a16 16 0 0 0-16 16v32a16 16 0 0 0 16 16h288a16 16 0 0 0 16-16v-32a16 16 0 0 0-16-16zm0-320H208a16 16 0 0 0-16 16v32a16 16 0 0 0 16 16h288a16 16 0 0 0 16-16V80a16 16 0 0 0-16-16zm0 160H208a16 16 0 0 0-16 16v32a16 16 0 0 0 16 16h288a16 16 0 0 0 16-16v-32a16 16 0 0 0-16-16z\"><\/path><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/fr\/strategie-et-conformite-reglementaire\/\" >\n\t\t\t\t\t\t\tStrat\u00e9gie et conformit\u00e9 r\u00e9glementaire\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tConseil strat\u00e9gique. Gouvernance et intelligence de l'information. Conformit\u00e9 aux r\u00e9glementations europ\u00e9ennes en mati\u00e8re de cybers\u00e9curit\u00e9 (Cyber Resilence Act, AI Act, protection des donn\u00e9es). Mise en \u0153uvre de syst\u00e8mes de gestion de la s\u00e9curit\u00e9 de l'information.   \n\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dba6ce elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"7dba6ce\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/fr\/cybersecurite-et-criminalistique-numerique\/\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Cyber securit\u00e9\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-virus\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224,192a16,16,0,1,0,16,16A16,16,0,0,0,224,192ZM466.5,83.68l-192-80A57.4,57.4,0,0,0,256.05,0a57.4,57.4,0,0,0-18.46,3.67l-192,80A47.93,47.93,0,0,0,16,128C16,326.5,130.5,463.72,237.5,508.32a48.09,48.09,0,0,0,36.91,0C360.09,472.61,496,349.3,496,128A48,48,0,0,0,466.5,83.68ZM384,256H371.88c-28.51,0-42.79,34.47-22.63,54.63l8.58,8.57a16,16,0,1,1-22.63,22.63l-8.57-8.58C306.47,313.09,272,327.37,272,355.88V368a16,16,0,0,1-32,0V355.88c0-28.51-34.47-42.79-54.63-22.63l-8.57,8.58a16,16,0,0,1-22.63-22.63l8.58-8.57c20.16-20.16,5.88-54.63-22.63-54.63H128a16,16,0,0,1,0-32h12.12c28.51,0,42.79-34.47,22.63-54.63l-8.58-8.57a16,16,0,0,1,22.63-22.63l8.57,8.58c20.16,20.16,54.63,5.88,54.63-22.63V112a16,16,0,0,1,32,0v12.12c0,28.51,34.47,42.79,54.63,22.63l8.57-8.58a16,16,0,0,1,22.63,22.63l-8.58,8.57C329.09,189.53,343.37,224,371.88,224H384a16,16,0,0,1,0,32Zm-96,0a16,16,0,1,0,16,16A16,16,0,0,0,288,256Z\"><\/path><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/fr\/cybersecurite-et-criminalistique-numerique\/\" >\n\t\t\t\t\t\t\tCyber securit\u00e9\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tMise en \u0153uvre organisationnelle de la s\u00e9curit\u00e9 de l'information. Pr\u00e9paration \u00e0 la criminalistique num\u00e9rique. S\u00e9lection et mise en \u0153uvre des produits.  \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c91b221 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"c91b221\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-brain\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M208 0c-29.9 0-54.7 20.5-61.8 48.2-.8 0-1.4-.2-2.2-.2-35.3 0-64 28.7-64 64 0 4.8.6 9.5 1.7 14C52.5 138 32 166.6 32 200c0 12.6 3.2 24.3 8.3 34.9C16.3 248.7 0 274.3 0 304c0 33.3 20.4 61.9 49.4 73.9-.9 4.6-1.4 9.3-1.4 14.1 0 39.8 32.2 72 72 72 4.1 0 8.1-.5 12-1.2 9.6 28.5 36.2 49.2 68 49.2 39.8 0 72-32.2 72-72V64c0-35.3-28.7-64-64-64zm368 304c0-29.7-16.3-55.3-40.3-69.1 5.2-10.6 8.3-22.3 8.3-34.9 0-33.4-20.5-62-49.7-74 1-4.5 1.7-9.2 1.7-14 0-35.3-28.7-64-64-64-.8 0-1.5.2-2.2.2C422.7 20.5 397.9 0 368 0c-35.3 0-64 28.6-64 64v376c0 39.8 32.2 72 72 72 31.8 0 58.4-20.7 68-49.2 3.9.7 7.9 1.2 12 1.2 39.8 0 72-32.2 72-72 0-4.8-.5-9.5-1.4-14.1 29-12 49.4-40.6 49.4-73.9z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tIntelligence artificielle\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tD\u00e9ploiement des outils d'intelligence artificielle adapt\u00e9s \u00e0 votre organisation. Apprentissage automatique, traitement du langage naturel, traitement vid\u00e9o et audio. Intelligence artificielle au service du renseignement et de la s\u00e9curit\u00e9.  \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06c8b8e elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"06c8b8e\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/fr\/projets-europeens\/\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Recerche et development\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-university\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 128v16a8 8 0 0 1-8 8h-24v12c0 6.627-5.373 12-12 12H60c-6.627 0-12-5.373-12-12v-12H24a8 8 0 0 1-8-8v-16a8 8 0 0 1 4.941-7.392l232-88a7.996 7.996 0 0 1 6.118 0l232 88A8 8 0 0 1 496 128zm-24 304H40c-13.255 0-24 10.745-24 24v16a8 8 0 0 0 8 8h464a8 8 0 0 0 8-8v-16c0-13.255-10.745-24-24-24zM96 192v192H60c-6.627 0-12 5.373-12 12v20h416v-20c0-6.627-5.373-12-12-12h-36V192h-64v192h-64V192h-64v192h-64V192H96z\"><\/path><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/fr\/projets-europeens\/\" >\n\t\t\t\t\t\t\tRecerche et development\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tR\u00e9daction de propositions de projets et conseil pour les programmes de recherche et d\u00e9veloppement de l'UE ainsi que pour des projets innovants nationaux et internationaux. Gestion de projets d'innovation. Programmes de formation et s\u00e9minaires.  \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5183bc0 e-flex e-con-boxed e-con e-parent\" data-id=\"5183bc0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-446888b elementor-widget elementor-widget-heading\" data-id=\"446888b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Projets de recherche<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94265a2 e-grid e-con-full e-con e-parent\" data-id=\"94265a2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2744ffe elementor-widget elementor-widget-image\" data-id=\"2744ffe\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.stagcyber.fr\/wp-content\/uploads\/elementor\/thumbs\/AICA2.0cover-e1764756686402-rflwkphf18tnb8z00tje1zw3wa00ga4esrrjm2myps.jpg\" title=\"Screenshot\" alt=\"Screenshot\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8668bc6 elementor-widget elementor-widget-image\" data-id=\"8668bc6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/social-network-analysis-in-security-and-law-enforcement\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.stagcyber.fr\/wp-content\/uploads\/elementor\/thumbs\/sna-int-2-e1764756841690-rflwor6egkd3at3de2ikah4jz01wld6t0svszymxxc.jpeg\" title=\"sna-int-2\" alt=\"{&quot;prompt&quot;:&quot;An intelligence officer is looking at a representation of a social network graph in and analysisng it for cues. More space is devoted to the network than the officer. The main hue should be bordeaux red&quot;,&quot;originalPrompt&quot;:&quot;An intelligence officer is looking at a representation of a social network graph in and analysisng it for cues. More space is devoted to the network than the officer. The main hue should be bordeaux red&quot;,&quot;width&quot;:576,&quot;height&quot;:1024,&quot;seed&quot;:42,&quot;model&quot;:&quot;flux&quot;,&quot;enhance&quot;:false,&quot;nologo&quot;:true,&quot;negative_prompt&quot;:&quot;undefined&quot;,&quot;nofeed&quot;:false,&quot;safe&quot;:false,&quot;quality&quot;:&quot;medium&quot;,&quot;image&quot;:[],&quot;transparent&quot;:false,&quot;has_nsfw_concept&quot;:false,&quot;concept&quot;:{&quot;special_scores&quot;:{&quot;0&quot;:0.3869999945163727,&quot;1&quot;:-0.09000000357627869,&quot;2&quot;:-0.11599999666213989},&quot;special_care&quot;:[[0,0.3869999945163727]],&quot;concept_scores&quot;:{&quot;0&quot;:-0.08799999952316284,&quot;1&quot;:-0.08299999684095383,&quot;2&quot;:-0.07400000095367432,&quot;3&quot;:-0.05299999937415123,&quot;4&quot;:-0.08799999952316284,&quot;5&quot;:-0.06599999964237213,&quot;6&quot;:-0.05900000035762787,&quot;7&quot;:-0.06700000166893005,&quot;8&quot;:-0.07100000232458115,&quot;9&quot;:-0.12300000339746475,&quot;10&quot;:-0.0860000029206276,&quot;11&quot;:-0.07599999755620956,&quot;12&quot;:-0.06499999761581421,&quot;13&quot;:-0.09200000017881393,&quot;14&quot;:-0.0949999988079071,&quot;15&quot;:-0.10899999737739563,&quot;16&quot;:-0.09000000357627869},&quot;bad_concepts&quot;:[]},&quot;trackingData&quot;:{&quot;actualModel&quot;:&quot;flux&quot;,&quot;usage&quot;:{&quot;completionImageTokens&quot;:1,&quot;totalTokenCount&quot;:1}}}\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Analyse des r\u00e9seaux sociaux pour les enqu\u00eates et le renseignement<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54fcb68 elementor-widget elementor-widget-image\" data-id=\"54fcb68\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.stagcyber.fr\/wp-content\/uploads\/elementor\/thumbs\/ISSE-2013-e1764756733102-rflwlxntygi4gx6tuumut6qrtdy9i1zsmufd62tglc.webp\" title=\"ISSE-2013\" alt=\"ISSE-2013\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>L&rsquo;information est l&rsquo;atout le plus important dont peuvent disposer les organisations. G\u00e9rer correctement l&rsquo;information est le processus le plus important. Strat\u00e9gie et conformit\u00e9 r\u00e9glementaire Conseil strat\u00e9gique. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page_front-page.php","meta":{"footnotes":""},"class_list":["post-109","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/pages\/109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/comments?post=109"}],"version-history":[{"count":22,"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/pages\/109\/revisions"}],"predecessor-version":[{"id":790,"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/pages\/109\/revisions\/790"}],"wp:attachment":[{"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/media?parent=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}