{"id":37745,"date":"2026-05-12T16:52:51","date_gmt":"2026-05-12T20:52:51","guid":{"rendered":"https:\/\/www.rsa.com\/resources\/\/\/"},"modified":"2026-05-12T21:08:55","modified_gmt":"2026-05-13T01:08:55","slug":"gartner-report-ai-security-priorities-for-cisos","status":"publish","type":"resources_post_type","link":"https:\/\/www.rsa.com\/fr\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/","title":{"rendered":"Rapport Gartner\u00ae : Priorit\u00e9s des RSSI en mati\u00e8re de s\u00e9curit\u00e9 de l'IA"},"content":{"rendered":"<section class=\"wp-block-create-block-glide-section-container bg-black container-1320\"><div class=\"wrapper\"><section class=\"container-fluid position-relative py-5 bg-black banner-resource-section\">\n  <div class=\"container position-relative py-3 banner-resource\">\n\n    \n          <div class=\"row justify-content-center align-items-center pt-5\">\n\n                  <div class=\"col-12 col-sm-10 col-lg-6 pe-4 content-block\">\n            <div class=\"z-3 position-relative d-grid item-content\">\n\n                              <h1 class=\"item-title\">\n                  Rapport Gartner\u00ae : Priorit\u00e9s des RSSI en mati\u00e8re de s\u00e9curit\u00e9 de l'IA\n                <\/h1>\n              \n                              <div class=\"pe-5 item-text\">\n                  L'IA est d\u00e9sormais indissociable de la strat\u00e9gie de cybers\u00e9curit\u00e9, les RSSI \u00e9tant soumis \u00e0 une pression croissante pour d\u00e9montrer que leurs organisations deviennent natives de l'IA. Cela cr\u00e9e une tension famili\u00e8re : agir rapidement pour adopter l'IA ou ralentir pour s'assurer que les investissements sont r\u00e9ellement rentables. Dans le rapport Gartner \u201cPredicts 2026 : CISOs Must Embrace Relief of Missing Out on AI\u201d, Gartner d\u00e9clare que \u201cles strat\u00e9gies de cybers\u00e9curit\u00e9 bas\u00e9es sur la peur de manquer conduiront \u00e0 des investissements inutiles et \u00e0 une valeur r\u00e9alis\u00e9e d\u00e9cevante\u2018. Les RSSI doivent se r\u00e9jouir de l'IA en donnant la priorit\u00e9 aux initiatives d'IA qui s'alignent sur leurs priorit\u00e9s en mati\u00e8re de cybers\u00e9curit\u00e9.\n                <\/div>\n                                            <div class=\"py-3 item-link\">\n                  <a href=\"#form\" \n                  \n                  role=\"button\" class=\"btn btn-primary\">\n                    T\u00e9l\u00e9charger le rapport\n                  <\/a>\n                  \t\t\t\t\t\t\t<a\n\t\t\t\t\t\t\t\thref=\"\"\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tclass=\"btn\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/a>\n                <\/div>\n                                        <\/div>\n          <\/div>\n                          <div class=\"col-12 col-sm-10 col-lg-6 position-relative d-flex justify-content-center align-items-center pt-4 pt-lg-0 resource-block\"  style=\"min-height: 500px\" >\n            <div class=\"position-absolute item-video\">\n              <video autoplay muted loop playsinline>\n                <source src=\"https:\/\/www.rsa.com\/wp-content\/uploads\/Authentication-Risk-Ai.webm\" type=\"video\/webm\">\n              <\/video>\n            <\/div>\n                      <\/div>\n              <\/div>\n    \n  <\/div>\n<\/section><\/div><\/section>\n\n\n\n<section class=\"wp-block-create-block-glide-section-container bg-black container-1320\"><div class=\"wrapper\"><div class=\"py-5 gated-asset\">\n\t\t<div class=\"container\">\n\t\t\t<div class=\"row py-5\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-5 z-1 pt-4 form-block\">\n\t\t\t\t\t\t<div class=\"position-relative bg-black form-wrapper\">\n  \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"pb-3 text-center form-title\">\n\t\t\t\t\t\t\t\t\tT\u00e9l\u00e9charger le rapport\n\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<iframe\n\t\t\t\t\t\t\t\t\tdata-pardot=\"true\"\n\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www2.rsa.com\/l\/797543\/2026-04-30\/5h7797\"\n\t\t\t\t\t\t\t\t\taria-label=\"Formulaire RSA\"\n\t\t\t\t\t\t\t\t\twidth=\"100%\"\n\t\t\t\t\t\t\t\t\theight=\"670\"\n\t\t\t\t\t\t\t\t\ttype=\"text\/html\"\n\t\t\t\t\t\t\t\t\tframeborder=\"0\"\n\t\t\t\t\t\t\t\t\tallowtransparency=\"true\"\n\t\t\t\t\t\t\t\t\tstyle=\"border: 0\"\n\t\t\t\t\t\t\t\t\tloading=\"lazy\"\n\t\t\t\t\t\t\t\t\tid=\"form\">\n\t\t\t\t\t\t\t\t<\/iframe>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"col-12 offset-lg-1 col-lg-6\">\n\t\t\t\t\t<div class=\"wysiwyg-editor\" id=\"gated-content\">\n\t\t\t\t\t\t<h3>L'IA dans la cybers\u00e9curit\u00e9 cr\u00e9e une nouvelle pression pour les RSSI<\/h3>\n<p>L'adoption de l'IA sur le march\u00e9 de la cybers\u00e9curit\u00e9 s'acc\u00e9l\u00e8re rapidement, et les organisations de s\u00e9curit\u00e9 sont cens\u00e9es obtenir des r\u00e9sultats rapides. Dans de nombreux cas, comme le souligne l'\u00e9tude de Gartner, \u201cl'engouement pour l'IA pousse les dirigeants \u00e0 multiplier les initiatives et \u00e0 donner la priorit\u00e9 \u00e0 la rapidit\u00e9 d'adoption plut\u00f4t qu'\u00e0 l'identification et \u00e0 la gestion des risques.\u201d<\/p>\n<p>Pour les RSSI responsables de la r\u00e9silience op\u00e9rationnelle, de la conformit\u00e9 r\u00e9glementaire et de l'efficacit\u00e9 budg\u00e9taire, cette dynamique cr\u00e9e \u00e0 la fois un risque de s\u00e9curit\u00e9 tangible et une dette strat\u00e9gique \u00e0 long terme.<\/p>\n<h3>Pourquoi la strat\u00e9gie de s\u00e9curit\u00e9 de l'IA doit-elle se concentrer sur la valeur de la cybers\u00e9curit\u00e9 ?<\/h3>\n<p>L'un des principaux messages du rapport Gartner est que l'IA ne doit pas \u00eatre l'objectif en soi, mais qu'elle doit plut\u00f4t \u00eatre au service des r\u00e9sultats en mati\u00e8re de cybers\u00e9curit\u00e9. Une strat\u00e9gie efficace de s\u00e9curit\u00e9 de l'IA n\u00e9cessite une feuille de route pratique qui lie les initiatives aux priorit\u00e9s de l'entreprise et aux principes fondamentaux de la cybers\u00e9curit\u00e9.<\/p>\n<p>Le rapport contient parmi ses recommandations un appel sp\u00e9cifique \u00e0 \u201cd\u00e9grader l'IA d'une feuille de route discr\u00e8te \u00e0 un ensemble d'activit\u00e9s \u00e0 l'int\u00e9rieur des objectifs de base de la cybers\u00e9curit\u00e9 (par exemple, NIST CSF 2.0 : Gouverner, Identifier, Prot\u00e9ger, D\u00e9tecter, R\u00e9pondre, R\u00e9cup\u00e9rer) lors de la pr\u00e9sentation d'une feuille de route de cybers\u00e9curit\u00e9\u2019.\u201d<\/p>\n<h2>Principaux enseignements : Risques et d\u00e9fis li\u00e9s \u00e0 la s\u00e9curit\u00e9 de l'IA<\/h2>\n<ul>\n<li>La FOMO induite par l'IA peut conduire \u00e0 des investissements inutiles et \u00e0 des programmes bloqu\u00e9s.<\/li>\n<li>Les projets d'IA men\u00e9s \u00e0 la h\u00e2te contournent souvent les meilleures pratiques en mati\u00e8re de gouvernance et de s\u00e9curit\u00e9.<\/li>\n<li>Les outils de cybers\u00e9curit\u00e9 \u00e0 IA g\u00e9n\u00e9rative peuvent cr\u00e9er une rotation continue de la feuille de route.<\/li>\n<li>Les gains de productivit\u00e9 du SOC gr\u00e2ce \u00e0 l'IA pourraient \u00eatre contrebalanc\u00e9s par la complexit\u00e9 croissante des incidents.<\/li>\n<li>Les flux de travail r\u00e9p\u00e9titifs assist\u00e9s par l'IA peuvent augmenter le risque op\u00e9rationnel.<\/li>\n<\/ul>\n<h3>Comment les RSSI peuvent-ils donner la priorit\u00e9 \u00e0 la gestion des risques li\u00e9s \u00e0 l'IA et \u00e0 des investissements plus intelligents dans ce domaine ?<\/h3>\n<p>Consid\u00e9rer l'IA comme un outil parmi d'autres au sein d'un programme de cybers\u00e9curit\u00e9 plus large peut apporter des avantages significatifs. Les responsables de la s\u00e9curit\u00e9 qui s'attachent \u00e0 int\u00e9grer l'IA de mani\u00e8re r\u00e9fl\u00e9chie dans les initiatives de gouvernance, de d\u00e9tection, d'identit\u00e9 et de r\u00e9ponse peuvent \u00e9viter la dette technique, r\u00e9duire les frictions op\u00e9rationnelles et s'adapter plus efficacement \u00e0 l'\u00e9volution des menaces et des capacit\u00e9s de s\u00e9curit\u00e9 de l'IA.<\/p>\n<h3>Le r\u00f4le de la gouvernance de l'IA et de la s\u00e9curit\u00e9 des identit\u00e9s<\/h3>\n<p>\u00c0 mesure que l'IA augmente le nombre d'identit\u00e9s, de flux de travail et de d\u00e9cisions d'acc\u00e8s que les organisations doivent g\u00e9rer, la gouvernance de l'IA et la s\u00e9curit\u00e9 des identit\u00e9s deviennent fondamentales. Les environnements pilot\u00e9s par l'IA augmentent l'\u00e9chelle, la vitesse et la complexit\u00e9 de l'acc\u00e8s, ce qui rend la visibilit\u00e9, l'application des politiques et l'assurance non n\u00e9gociables.<\/p>\n<p>Du point de vue de RSA, cela renforce l'importance d'une gouvernance compl\u00e8te des identit\u00e9s, d'une gestion du cycle de vie et d'une authentification de haute s\u00e9curit\u00e9. Sans ces \u00e9l\u00e9ments, l'IA introduit de nouvelles voies d'attaque et des angles morts op\u00e9rationnels au lieu de r\u00e9duire les risques.<\/p>\n<p>Pour plus d'informations, consultez les ressources de la RSA sur l'IA, notamment <a href=\"\/fr\/resources\/blog\/zero-trust\/claude-mythos-and-capybara-best-practices-for-the-next-evolution-in-ai-powered-cybersecurity-risks\/\">adopter des bonnes pratiques pour les risques de cybers\u00e9curit\u00e9 aliment\u00e9s par l'IA.<\/a> et <a href=\"\/fr\/resources\/blog\/products-and-solutions\/securing-the-ai-workforce\/\">s\u00e9curiser la main-d'\u0153uvre dans le domaine de l'IA<\/a>.<\/p>\n<h3>T\u00e9l\u00e9charger le rapport Flex de Gartner<\/h3>\n<p>Le rapport Gartner \u201cPredicts 2026 : CISOs Must Embrace Relief of Missing Out on AI\u201d est une ressource essentielle pour les RSSI et les responsables de la s\u00e9curit\u00e9 qui cherchent \u00e0 recentrer les initiatives d'IA sur les r\u00e9sultats qui comptent.<br \/>\n<em><br \/>\nGartner, \u201cPredicts 2026 : CISOs Must Embrace Relief of Missing Out on AI\u201d, Jeremy D'Hoinne, Deepti Gopal, Pete Shoard, Akif Khan, Arthur Sivanathan, Christopher Mixter 22 d\u00e9cembre 2025<\/em><\/p>\n<p>GARTNER est une marque d\u00e9pos\u00e9e et une marque de service de Gartner, Inc. et\/ou de ses filiales aux \u00c9tats-Unis et dans le monde. Tous les droits sont r\u00e9serv\u00e9s.<\/p>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/section>","protected":false},"featured_media":37749,"template":"template-t25-resource-template-v2.blade.php","class_list":["post-37745","resources_post_type","type-resources_post_type","status-publish","has-post-thumbnail","hentry","resource_type-reports"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gartner\u00ae Report: AI Security Priorities for CISOs - RSA<\/title>\n<meta name=\"description\" content=\"Download the Gartner report to learn best practices for CISOs can deploy AI capabilities that enhance cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gartner\u00ae Report: AI Security Priorities for CISOs - RSA\" \/>\n<meta property=\"og:description\" content=\"Download the Gartner report to learn best practices for CISOs can deploy AI capabilities that enhance cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-13T01:08:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/gartner-report-ai-security-priorities-for-cisos-rsa-social.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/\",\"name\":\"Gartner\u00ae Report: AI Security Priorities for CISOs - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp\",\"datePublished\":\"2026-05-12T20:52:51+00:00\",\"dateModified\":\"2026-05-13T01:08:55+00:00\",\"description\":\"Download the Gartner report to learn best practices for CISOs can deploy AI capabilities that enhance cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gartner\u00ae Report: AI Security Priorities for CISOs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rapport Gartner\u00ae : Priorit\u00e9s des RSSI en mati\u00e8re de s\u00e9curit\u00e9 de l'IA - RSA","description":"T\u00e9l\u00e9chargez le rapport Gartner pour d\u00e9couvrir les meilleures pratiques pour les RSSI qui peuvent d\u00e9ployer des capacit\u00e9s d'IA qui am\u00e9liorent la cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/","og_locale":"fr_FR","og_type":"article","og_title":"Gartner\u00ae Report: AI Security Priorities for CISOs - RSA","og_description":"Download the Gartner report to learn best practices for CISOs can deploy AI capabilities that enhance cybersecurity.","og_url":"https:\/\/www.rsa.com\/fr\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/","og_site_name":"RSA","article_modified_time":"2026-05-13T01:08:55+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/gartner-report-ai-security-priorities-for-cisos-rsa-social.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/fr\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/","url":"https:\/\/www.rsa.com\/fr\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/","name":"Rapport Gartner\u00ae : Priorit\u00e9s des RSSI en mati\u00e8re de s\u00e9curit\u00e9 de l'IA - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp","datePublished":"2026-05-12T20:52:51+00:00","dateModified":"2026-05-13T01:08:55+00:00","description":"T\u00e9l\u00e9chargez le rapport Gartner pour d\u00e9couvrir les meilleures pratiques pour les RSSI qui peuvent d\u00e9ployer des capacit\u00e9s d'IA qui am\u00e9liorent la cybers\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/fr\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/fr\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Gartner\u00ae Report: AI Security Priorities for CISOs"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/resources_post_type\/37745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/resources_post_type"}],"about":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/types\/resources_post_type"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media\/37749"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media?parent=37745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}