{"id":2063,"date":"2026-04-08T02:00:37","date_gmt":"2026-04-08T06:00:37","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2063"},"modified":"2026-04-15T16:50:44","modified_gmt":"2026-04-15T20:50:44","slug":"identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/","title":{"rendered":"Gouvernance des identit\u00e9s et confiance z\u00e9ro : comment s\u00e9curiser les lieux de travail hybrides"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Rejoignez Hector Monsegur, Corporate Pen-Tester et Expert Security Researcher, Alacrinet, et Christopher Williams, SecurID Solutions Architect &amp; Field CTO, le jeudi 22 juillet \u00e0 13 heures (heure de l'Est) pour un webinaire sur la fa\u00e7on dont les organisations peuvent utiliser la gouvernance des identit\u00e9s pour maintenir la productivit\u00e9 des travailleurs et assurer la s\u00e9curit\u00e9 de l'organisation.<\/p>","protected":false},"author":10,"featured_media":2066,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-2063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity Governance and Zero Trust: How to Secure Hybrid Workplaces - RSA<\/title>\n<meta name=\"description\" content=\"Discover how IGA helps organizations apply zero trust to hybrid workforces, automate access provisioning, and prevent unauthorized lateral movement.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity Governance and Zero Trust: How to Secure Hybrid Workplaces\" \/>\n<meta property=\"og:description\" content=\"Join Hector Monsegur, Corporate Pen-Tester and Expert Security Researcher, Alacrinet, and Christopher Williams, SecurID Solutions Architect &amp; Field CTO on Thursday, July 22 at 1 PM eastern for a webinar discussion on how organizations can use identity governance to maintain workers\u2019 productivity and ensure organizational security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-08T06:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T20:50:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Miguel Bezerra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Identity Governance and Zero Trust: How to Secure Hybrid Workplaces\" \/>\n<meta name=\"twitter:description\" content=\"Join Hector Monsegur, Corporate Pen-Tester and Expert Security Researcher, Alacrinet, and Christopher Williams, SecurID Solutions Architect &amp; Field CTO on Thursday, July 22 at 1 PM eastern for a webinar discussion on how organizations can use identity governance to maintain workers\u2019 productivity and ensure organizational security.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/\"},\"author\":{\"name\":\"Miguel Bezerra\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/0224a5e120eebe4128070793a50fa23a\"},\"headline\":\"Identity Governance and Zero Trust: How to Secure Hybrid Workplaces\",\"datePublished\":\"2026-04-08T06:00:37+00:00\",\"dateModified\":\"2026-04-15T20:50:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/\"},\"wordCount\":10,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/support-and-secure-hybrid-work-with-identity-governance.jpeg\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/\",\"name\":\"Identity Governance and Zero Trust: How to Secure Hybrid Workplaces - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/support-and-secure-hybrid-work-with-identity-governance.jpeg\",\"datePublished\":\"2026-04-08T06:00:37+00:00\",\"dateModified\":\"2026-04-15T20:50:44+00:00\",\"description\":\"Discover how IGA helps organizations apply zero trust to hybrid workforces, automate access provisioning, and prevent unauthorized lateral movement.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/support-and-secure-hybrid-work-with-identity-governance.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/support-and-secure-hybrid-work-with-identity-governance.jpeg\",\"width\":946,\"height\":526},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity Governance and Zero Trust: How to Secure Hybrid Workplaces\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/0224a5e120eebe4128070793a50fa23a\",\"name\":\"Miguel Bezerra\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gouvernance des identit\u00e9s et confiance z\u00e9ro : comment s\u00e9curiser les lieux de travail hybrides - RSA","description":"D\u00e9couvrez comment IGA aide les entreprises \u00e0 appliquer la confiance z\u00e9ro aux effectifs hybrides, \u00e0 automatiser le provisionnement des acc\u00e8s et \u00e0 pr\u00e9venir les mouvements lat\u00e9raux non autoris\u00e9s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/","og_locale":"fr_CA","og_type":"article","og_title":"Identity Governance and Zero Trust: How to Secure Hybrid Workplaces","og_description":"Join Hector Monsegur, Corporate Pen-Tester and Expert Security Researcher, Alacrinet, and Christopher Williams, SecurID Solutions Architect & Field CTO on Thursday, July 22 at 1 PM eastern for a webinar discussion on how organizations can use identity governance to maintain workers\u2019 productivity and ensure organizational security.","og_url":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/","og_site_name":"RSA","article_published_time":"2026-04-08T06:00:37+00:00","article_modified_time":"2026-04-15T20:50:44+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Miguel Bezerra","twitter_card":"summary_large_image","twitter_title":"Identity Governance and Zero Trust: How to Secure Hybrid Workplaces","twitter_description":"Join Hector Monsegur, Corporate Pen-Tester and Expert Security Researcher, Alacrinet, and Christopher Williams, SecurID Solutions Architect & Field CTO on Thursday, July 22 at 1 PM eastern for a webinar discussion on how organizations can use identity governance to maintain workers\u2019 productivity and ensure organizational security.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/"},"author":{"name":"Miguel Bezerra","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/0224a5e120eebe4128070793a50fa23a"},"headline":"Identity Governance and Zero Trust: How to Secure Hybrid Workplaces","datePublished":"2026-04-08T06:00:37+00:00","dateModified":"2026-04-15T20:50:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/"},"wordCount":10,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/support-and-secure-hybrid-work-with-identity-governance.jpeg","articleSection":["Zero Trust"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/","url":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/","name":"Gouvernance des identit\u00e9s et confiance z\u00e9ro : comment s\u00e9curiser les lieux de travail hybrides - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/support-and-secure-hybrid-work-with-identity-governance.jpeg","datePublished":"2026-04-08T06:00:37+00:00","dateModified":"2026-04-15T20:50:44+00:00","description":"D\u00e9couvrez comment IGA aide les entreprises \u00e0 appliquer la confiance z\u00e9ro aux effectifs hybrides, \u00e0 automatiser le provisionnement des acc\u00e8s et \u00e0 pr\u00e9venir les mouvements lat\u00e9raux non autoris\u00e9s.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/support-and-secure-hybrid-work-with-identity-governance.jpeg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/support-and-secure-hybrid-work-with-identity-governance.jpeg","width":946,"height":526},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/identity-governance-for-hybrid-work-securing-access-with-zero-trust-rsa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Identity Governance and Zero Trust: How to Secure Hybrid Workplaces"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/0224a5e120eebe4128070793a50fa23a","name":"Miguel Bezerra","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/comments?post=2063"}],"version-history":[{"count":7,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2063\/revisions"}],"predecessor-version":[{"id":37578,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2063\/revisions\/37578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media\/2066"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media?parent=2063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/categories?post=2063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/tags?post=2063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}