{"id":34467,"date":"2025-08-05T09:54:33","date_gmt":"2025-08-05T13:54:33","guid":{"rendered":"https:\/\/www.rsa.com\/resources\/\/\/"},"modified":"2026-03-24T17:10:41","modified_gmt":"2026-03-24T21:10:41","slug":"securing-critical-infrastructure-how-identity-security-builds-resilience","status":"publish","type":"resources_post_type","link":"https:\/\/www.rsa.com\/fr\/resources\/webinars\/securing-critical-infrastructure-how-identity-security-builds-resilience\/","title":{"rendered":"S\u00e9curiser les infrastructures critiques : Comment la s\u00e9curit\u00e9 de l'identit\u00e9 renforce la r\u00e9silience"},"content":{"rendered":"","protected":false},"featured_media":0,"template":"","class_list":["post-34467","resources_post_type","type-resources_post_type","status-publish","hentry","resource_type-webinars"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing Critical Infrastructure: How Identity Security Builds Resilience - RSA<\/title>\n<meta name=\"description\" content=\"Watch the RSA Webinar on-demand to learn the identity security capabilities EU leaders need to meet DORA and NIS2 cybersecurity requirements.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr\/resources\/webinars\/securing-critical-infrastructure-how-identity-security-builds-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Critical Infrastructure: How Identity Security Builds Resilience\" \/>\n<meta property=\"og:description\" content=\"Watch the RSA Webinar on-demand to learn the identity security capabilities EU leaders need to meet DORA and NIS2 cybersecurity requirements.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr\/resources\/webinars\/securing-critical-infrastructure-how-identity-security-builds-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T21:10:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Securing Critical Infrastructure: How Identity Security Builds Resilience\" \/>\n<meta name=\"twitter:description\" content=\"Watch the RSA Webinar on-demand to learn the identity security capabilities EU leaders need to meet DORA and NIS2 cybersecurity requirements.\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/webinars\\\/securing-critical-infrastructure-how-identity-security-builds-resilience\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/webinars\\\/securing-critical-infrastructure-how-identity-security-builds-resilience\\\/\",\"name\":\"Securing Critical Infrastructure: How Identity Security Builds Resilience - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"datePublished\":\"2025-08-05T13:54:33+00:00\",\"dateModified\":\"2026-03-24T21:10:41+00:00\",\"description\":\"Watch the RSA Webinar on-demand to learn the identity security capabilities EU leaders need to meet DORA and NIS2 cybersecurity requirements.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/webinars\\\/securing-critical-infrastructure-how-identity-security-builds-resilience\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/webinars\\\/securing-critical-infrastructure-how-identity-security-builds-resilience\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/webinars\\\/securing-critical-infrastructure-how-identity-security-builds-resilience\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Critical Infrastructure: How Identity Security Builds Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curiser les infrastructures critiques : Comment la s\u00e9curit\u00e9 de l'identit\u00e9 renforce la r\u00e9silience - RSA","description":"Regardez le webinaire RSA \u00e0 la demande pour d\u00e9couvrir les capacit\u00e9s de s\u00e9curit\u00e9 de l'identit\u00e9 dont les dirigeants de l'UE ont besoin pour r\u00e9pondre aux exigences de cybers\u00e9curit\u00e9 DORA et NIS2.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr\/resources\/webinars\/securing-critical-infrastructure-how-identity-security-builds-resilience\/","og_locale":"fr_FR","og_type":"article","og_title":"Securing Critical Infrastructure: How Identity Security Builds Resilience","og_description":"Watch the RSA Webinar on-demand to learn the identity security capabilities EU leaders need to meet DORA and NIS2 cybersecurity requirements.","og_url":"https:\/\/www.rsa.com\/fr\/resources\/webinars\/securing-critical-infrastructure-how-identity-security-builds-resilience\/","og_site_name":"RSA","article_modified_time":"2026-03-24T21:10:41+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_title":"Securing Critical Infrastructure: How Identity Security Builds Resilience","twitter_description":"Watch the RSA Webinar on-demand to learn the identity security capabilities EU leaders need to meet DORA and NIS2 cybersecurity requirements.","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/fr\/resources\/webinars\/securing-critical-infrastructure-how-identity-security-builds-resilience\/","url":"https:\/\/www.rsa.com\/fr\/resources\/webinars\/securing-critical-infrastructure-how-identity-security-builds-resilience\/","name":"S\u00e9curiser les infrastructures critiques : Comment la s\u00e9curit\u00e9 de l'identit\u00e9 renforce la r\u00e9silience - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"datePublished":"2025-08-05T13:54:33+00:00","dateModified":"2026-03-24T21:10:41+00:00","description":"Regardez le webinaire RSA \u00e0 la demande pour d\u00e9couvrir les capacit\u00e9s de s\u00e9curit\u00e9 de l'identit\u00e9 dont les dirigeants de l'UE ont besoin pour r\u00e9pondre aux exigences de cybers\u00e9curit\u00e9 DORA et NIS2.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/webinars\/securing-critical-infrastructure-how-identity-security-builds-resilience\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/fr\/resources\/webinars\/securing-critical-infrastructure-how-identity-security-builds-resilience\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/fr\/resources\/webinars\/securing-critical-infrastructure-how-identity-security-builds-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Securing Critical Infrastructure: How Identity Security Builds Resilience"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/resources_post_type\/34467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/resources_post_type"}],"about":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/types\/resources_post_type"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media?parent=34467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}