{"id":35136,"date":"2025-10-13T03:00:20","date_gmt":"2025-10-13T07:00:20","guid":{"rendered":"https:\/\/www.rsa.com\/?p=35136"},"modified":"2026-03-24T17:17:42","modified_gmt":"2026-03-24T21:17:42","slug":"the-case-for-identity-centric-risk-reduction","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/","title":{"rendered":"Les arguments en faveur d'une r\u00e9duction des risques ax\u00e9e sur l'identit\u00e9"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":35210,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[166],"tags":[],"class_list":["post-35136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-governance-and-administration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Case for Identity-Centric Risk Reduction - RSA<\/title>\n<meta name=\"description\" content=\"Learn how RSA helps organizations leverage identity security posture management (ISPM) to find and resolve risks before they cause breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Case for Identity-Centric Risk Reduction | RSA Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how RSA helps organizations leverage identity security posture management (ISPM) to find and resolve risks before they cause breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-13T07:00:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T21:17:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/the-case-for-identity-centric-risk-reduction-rsa-social.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ben Lebeaux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Case for Identity-Centric Risk Reduction | RSA Blog\" \/>\n<meta name=\"twitter:description\" content=\"Learn how RSA helps organizations leverage identity security posture management (ISPM) to find and resolve risks before they cause breaches.\" \/>\n<meta name=\"twitter:creator\" content=\"@bcomroe@logical-inc.com\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/\"},\"author\":{\"name\":\"Ben Lebeaux\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\"},\"headline\":\"The Case for Identity-Centric Risk Reduction\",\"datePublished\":\"2025-10-13T07:00:20+00:00\",\"dateModified\":\"2026-03-24T21:17:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/\"},\"wordCount\":6,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-case-for-identity-centric-risk-reduction-rsa-blog-1.webp\",\"articleSection\":[\"Identity Governance &amp; Administration\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/\",\"name\":\"The Case for Identity-Centric Risk Reduction - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-case-for-identity-centric-risk-reduction-rsa-blog-1.webp\",\"datePublished\":\"2025-10-13T07:00:20+00:00\",\"dateModified\":\"2026-03-24T21:17:42+00:00\",\"description\":\"Learn how RSA helps organizations leverage identity security posture management (ISPM) to find and resolve risks before they cause breaches.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-case-for-identity-centric-risk-reduction-rsa-blog-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-case-for-identity-centric-risk-reduction-rsa-blog-1.webp\",\"width\":1200,\"height\":741,\"caption\":\"The Case for Identity-Centric Risk Reduction\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-case-for-identity-centric-risk-reduction\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Case for Identity-Centric Risk Reduction\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\",\"name\":\"Ben Lebeaux\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/bcomroe@logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les arguments en faveur d'une r\u00e9duction des risques centr\u00e9e sur l'identit\u00e9 - RSA","description":"D\u00e9couvrez comment RSA aide les organisations \u00e0 tirer parti de la gestion de la posture de s\u00e9curit\u00e9 de l'identit\u00e9 (ISPM) pour trouver et r\u00e9soudre les risques avant qu'ils n'entra\u00eenent des violations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/","og_locale":"fr_FR","og_type":"article","og_title":"The Case for Identity-Centric Risk Reduction | RSA Blog","og_description":"Learn how RSA helps organizations leverage identity security posture management (ISPM) to find and resolve risks before they cause breaches.","og_url":"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/","og_site_name":"RSA","article_published_time":"2025-10-13T07:00:20+00:00","article_modified_time":"2026-03-24T21:17:42+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-case-for-identity-centric-risk-reduction-rsa-social.webp","type":"image\/webp"}],"author":"Ben Lebeaux","twitter_card":"summary_large_image","twitter_title":"The Case for Identity-Centric Risk Reduction | RSA Blog","twitter_description":"Learn how RSA helps organizations leverage identity security posture management (ISPM) to find and resolve risks before they cause breaches.","twitter_creator":"@bcomroe@logical-inc.com","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/"},"author":{"name":"Ben Lebeaux","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9"},"headline":"The Case for Identity-Centric Risk Reduction","datePublished":"2025-10-13T07:00:20+00:00","dateModified":"2026-03-24T21:17:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/"},"wordCount":6,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-case-for-identity-centric-risk-reduction-rsa-blog-1.webp","articleSection":["Identity Governance &amp; Administration"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/","url":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/","name":"Les arguments en faveur d'une r\u00e9duction des risques centr\u00e9e sur l'identit\u00e9 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-case-for-identity-centric-risk-reduction-rsa-blog-1.webp","datePublished":"2025-10-13T07:00:20+00:00","dateModified":"2026-03-24T21:17:42+00:00","description":"D\u00e9couvrez comment RSA aide les organisations \u00e0 tirer parti de la gestion de la posture de s\u00e9curit\u00e9 de l'identit\u00e9 (ISPM) pour trouver et r\u00e9soudre les risques avant qu'ils n'entra\u00eenent des violations.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-case-for-identity-centric-risk-reduction-rsa-blog-1.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-case-for-identity-centric-risk-reduction-rsa-blog-1.webp","width":1200,"height":741,"caption":"The Case for Identity-Centric Risk Reduction"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/identity-governance-and-administration\/the-case-for-identity-centric-risk-reduction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"The Case for Identity-Centric Risk Reduction"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9","name":"Ben Lebeaux","sameAs":["https:\/\/x.com\/bcomroe@logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/35136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/comments?post=35136"}],"version-history":[{"count":9,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/35136\/revisions"}],"predecessor-version":[{"id":37433,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/35136\/revisions\/37433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media\/35210"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media?parent=35136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/categories?post=35136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/tags?post=35136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}