{"id":16378,"date":"2025-07-31T11:42:55","date_gmt":"2025-07-31T15:42:55","guid":{"rendered":"https:\/\/cybereco.ca\/projects\/"},"modified":"2026-04-28T10:18:39","modified_gmt":"2026-04-28T14:18:39","slug":"projects","status":"publish","type":"page","link":"https:\/\/cybereco.ca\/en\/projects\/","title":{"rendered":"Projects"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"16378\" class=\"elementor elementor-16378 elementor-15785\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c2ad198 e-flex e-con-boxed e-con e-parent\" data-id=\"5c2ad198\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4a86211e e-con-full e-flex e-con e-child\" data-id=\"4a86211e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c635763 elementor-widget elementor-widget-heading\" data-id=\"5c635763\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><span style=\"color: #003e51\">Our distinctive <br>experience<\/span> <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54701d3 elementor-widget elementor-widget-heading\" data-id=\"54701d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><span style=\"color: #E7EDEF\">Our distinctive <br>experience<\/span> <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-51a08fec e-con-full e-flex e-con e-child\" data-id=\"51a08fec\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-50b7d10b e-con-full e-flex e-con e-child\" data-id=\"50b7d10b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1e019e1f e-con-full e-flex e-con e-child\" data-id=\"1e019e1f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54fb8745 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"54fb8745\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\"><span data-olk-copy-source=\"MessageBody\">Driven by collaboration between its members, Cybereco&#8217;s projects tackle the challenges of cybersecurity in concrete terms. By leveraging collective intelligence, the organization fosters the co-creation of innovative solutions, the development of concrete tools and a positive influence on the sector&#8217;s direction. <\/span><\/p><p>Its agile, impact-driven approach enables us to anticipate emerging challenges and sustainably strengthen the digital resilience of Canadian organizations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a1892de e-con-full e-flex e-con e-child\" data-id=\"2a1892de\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f679db9 e-flex e-con-boxed e-con e-parent\" data-id=\"4f679db9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cad883c e-con-full e-flex e-con e-child\" data-id=\"cad883c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3465565a e-con-full e-flex e-con e-child\" data-id=\"3465565a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-21a95253 e-con-full toggle-title e-flex e-con e-child\" data-id=\"21a95253\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3bafbb11 e-con-full e-flex e-con e-child\" data-id=\"3bafbb11\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f839040 e-con-full e-flex e-con e-child\" data-id=\"7f839040\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-341b7f4b elementor-widget elementor-widget-html\" data-id=\"341b7f4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script>document.addEventListener(\"DOMContentLoaded\", function () {\r\n    document.querySelectorAll('.toggle-title').forEach(item => {\r\n        item.addEventListener('click', () => {\r\n            const content = item.nextElementSibling;\r\n\r\n            \/\/ Fermer tous les autres contenus et retirer la classe active\r\n            document.querySelectorAll('.content-accordeon').forEach(c => {\r\n                if (c !== content) {\r\n                    c.classList.remove('show');\r\n                    if (c.previousElementSibling) {\r\n                        c.previousElementSibling.classList.remove('active');\r\n                    }\r\n                }\r\n            });\r\n\r\n            \/\/ Ouvrir\/fermer le contenu cliqu\u00e9\r\n            content.classList.toggle('show');\r\n            item.classList.toggle('active');\r\n        });\r\n    });\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f8219dd elementor-widget elementor-widget-heading\" data-id=\"6f8219dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybertrousse Community  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2afa1b04 elementor-widget elementor-widget-heading\" data-id=\"2afa1b04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Raising awareness and providing cybersecurity tools for SMEs  <\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-525cb6f1 e-con-full e-flex e-con e-child\" data-id=\"525cb6f1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56813e37 icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"56813e37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e70e613 icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"2e70e613\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53b942c7 e-con-full content-accordeon e-flex e-con e-child\" data-id=\"53b942c7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4349dc20 e-con-full e-flex e-con e-child\" data-id=\"4349dc20\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2cd9200a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"2cd9200a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Cybertrousse community was created in response to a crying need: to offer small and medium-sized enterprises (SMEs) concrete resources to strengthen their cybersecurity posture. Too often left to fend for themselves in the face of growing threats, SMEs lack accessible tools tailored to their reality. This community brings together experts, practitioners and partners committed to co-constructing a clear, useful and directly applicable awareness kit.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f9e9bdd e-con-full e-flex e-con e-child\" data-id=\"1f9e9bdd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1260c40f e-con-full e-flex e-con e-child\" data-id=\"1260c40f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3dc2967 elementor-widget elementor-widget-heading\" data-id=\"3dc2967\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Objective and main deliverable<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e905eb9 elementor-widget elementor-widget-text-editor\" data-id=\"1e905eb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The community&#8217;s flagship deliverable is a cybersecurity awareness kit, designed specifically for SMEs. This kit aims to : <\/p><p>&#8211; Raising companies&#8217; awareness of the main digital risks;<\/p><p>&#8211; Guide them in adopting best practices;<\/p><p>&#8211; Offer simple tools to start or structure their cybersecurity approach;<\/p><p>&#8211; Promote a gradual, realistic and sustainable rise in maturity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5724d40d e-con-full e-flex e-con e-child\" data-id=\"5724d40d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a6990eb elementor-widget elementor-widget-heading\" data-id=\"7a6990eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why this approach  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6024eaa9 elementor-widget elementor-widget-text-editor\" data-id=\"6024eaa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is no longer a luxury reserved for large organizations. In a context where SMEs are becoming prime targets for cybercriminals, it is essential to provide them with concrete, understandable and actionable resources. The Cybertrousse community is part of this drive to democratize cybersecurity and foster a culture of vigilance and digital resilience within Quebec SMEs.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-392d81c5 e-con-full e-flex e-con e-child\" data-id=\"392d81c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35b506cb elementor-widget elementor-widget-heading\" data-id=\"35b506cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Kit contents  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ea163a6 elementor-widget elementor-widget-text-editor\" data-id=\"3ea163a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The kit comprises several key components, each addressing a fundamental issue:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-559ee785 e-con-full e-flex e-con e-child\" data-id=\"559ee785\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-38b75277 e-con-full e-flex e-con e-child\" data-id=\"38b75277\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f3d518 elementor-widget elementor-widget-image\" data-id=\"0f3d518\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_Hameconnage_L.svg\" class=\"attachment-large size-large wp-image-16260\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5be117a elementor-widget elementor-widget-image\" data-id=\"5be117a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_Hameconnage_D.svg\" class=\"attachment-large size-large wp-image-16258\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ed3c728 elementor-widget elementor-widget-image-box\" data-id=\"2ed3c728\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Phishing  <\/h3><p class=\"elementor-image-box-description\">Recognize and react to fraudulent e-mail or messaging attempts<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c02fe57 e-con-full e-flex e-con e-child\" data-id=\"c02fe57\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4329bb elementor-widget elementor-widget-image\" data-id=\"a4329bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_MotDePasse_L.svg\" class=\"attachment-large size-large wp-image-16264\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51aea1a elementor-widget elementor-widget-image\" data-id=\"51aea1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_MotDePasse_D.svg\" class=\"attachment-large size-large wp-image-16262\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d5ba7a7 elementor-widget elementor-widget-image-box\" data-id=\"7d5ba7a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Password  <\/h3><p class=\"elementor-image-box-description\">Adopt secure access management practices<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-128f776c e-con-full e-flex e-con e-child\" data-id=\"128f776c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f73d447 elementor-widget elementor-widget-image\" data-id=\"f73d447\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_ProtectionDonnees_D.svg\" class=\"attachment-large size-large wp-image-16266\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a73773 elementor-widget elementor-widget-image\" data-id=\"7a73773\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_ProtectionDonnees_L.svg\" class=\"attachment-large size-large wp-image-16268\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-795034d0 elementor-widget elementor-widget-image-box\" data-id=\"795034d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Data protection<\/h3><p class=\"elementor-image-box-description\">Ensuring the confidentiality and integrity of sensitive data<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f8ddeb7 e-con-full e-flex e-con e-child\" data-id=\"1f8ddeb7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-308c933 elementor-widget elementor-widget-image\" data-id=\"308c933\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_FraudePersonnification_D.svg\" class=\"attachment-large size-large wp-image-16254\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88561fb elementor-widget elementor-widget-image\" data-id=\"88561fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_FraudePersonnification_L.svg\" class=\"attachment-large size-large wp-image-16256\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e08df9c elementor-widget elementor-widget-image-box\" data-id=\"5e08df9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Fraud by personification  <\/h3><p class=\"elementor-image-box-description\">Protecting against digital identity theft<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c21095d e-con-full e-flex e-con e-child\" data-id=\"5c21095d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35441db elementor-widget elementor-widget-image\" data-id=\"35441db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_TravailMobilite_D.svg\" class=\"attachment-large size-large wp-image-16274\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa3b77a elementor-widget elementor-widget-image\" data-id=\"aa3b77a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_TravailMobilite_L.svg\" class=\"attachment-large size-large wp-image-16276\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60fe9d63 elementor-widget elementor-widget-image-box\" data-id=\"60fe9d63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Remote working<\/h3><p class=\"elementor-image-box-description\">Supervising the safe use of mobile devices and teleworking<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3697b761 e-con-full e-flex e-con e-child\" data-id=\"3697b761\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca791fe elementor-widget elementor-widget-image\" data-id=\"ca791fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_Rancongiciel_D.svg\" class=\"attachment-large size-large wp-image-16270\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1117849 elementor-widget elementor-widget-image\" data-id=\"1117849\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_Rancongiciel_L.svg\" class=\"attachment-large size-large wp-image-16272\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a1e7e9a elementor-widget elementor-widget-image-box\" data-id=\"3a1e7e9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Ransomware  <\/h3><p class=\"elementor-image-box-description\">Understand the threat and implement preventive measures<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72f3951 e-con-full e-flex e-con e-child\" data-id=\"72f3951\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-43c2d99 e-con-full e-flex e-con e-child\" data-id=\"43c2d99\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa6fd19 elementor-widget elementor-widget-heading\" data-id=\"fa6fd19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9f8e02 e-con-full e-flex e-con e-child\" data-id=\"a9f8e02\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bb660f elementor-widget elementor-widget-image\" data-id=\"2bb660f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"164\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png\" class=\"attachment-large size-large wp-image-10145\" alt=\"\" srcset=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png 1400w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-800x164.png 800w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-768x157.png 768w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1536x315.png 1536w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-2048x420.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6d94c5b8 e-con-full e-flex e-con e-child\" data-id=\"6d94c5b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-518d0098 e-con-full toggle-title e-flex e-con e-child\" data-id=\"518d0098\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-50cf6e8e e-con-full e-flex e-con e-child\" data-id=\"50cf6e8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78eba0d6 e-con-full e-flex e-con e-child\" data-id=\"78eba0d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-132a640f elementor-widget elementor-widget-heading\" data-id=\"132a640f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Community Internal threats<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3658f elementor-widget elementor-widget-heading\" data-id=\"d3658f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Better understanding, better prevention<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-55bbb2a7 e-con-full e-flex e-con e-child\" data-id=\"55bbb2a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffbeeb2 icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ffbeeb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a30146 icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8a30146\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-41301226 e-con-full content-accordeon e-flex e-con e-child\" data-id=\"41301226\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-5c6b6955 e-con-full e-flex e-con e-child\" data-id=\"5c6b6955\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c54ab8d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3c54ab8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Internal Threats community has been set up to equip organizations to deal with a risk that is all too often underestimated: that which comes from within. As detection tools (SIEM, DLP, behavioral AI, etc.) multiply, governance, compliance and privacy issues become central. This community aims to provide a space for reflection and co-construction to better understand, frame and mitigate the risks associated with internal threats.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a7d3572 e-con-full e-flex e-con e-child\" data-id=\"1a7d3572\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-17dcf7d1 e-con-full e-flex e-con e-child\" data-id=\"17dcf7d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3445a361 elementor-widget elementor-widget-heading\" data-id=\"3445a361\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main deliverable  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28707a35 elementor-widget elementor-widget-text-editor\" data-id=\"28707a35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The community is currently working on updating and enriching the internal threat protection guide. This guide aims to : <\/p><p>&#8211; Present the types of detection mechanisms used in organizations ;<\/p><p>&#8211; Draw up an overview of the ethical, legal and operational issues associated with their deployment;<\/p><p>&#8211; Offer concrete recommendations that can be applied in different organizational contexts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3082b6b4 e-con-full e-flex e-con e-child\" data-id=\"3082b6b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b61689a elementor-widget elementor-widget-heading\" data-id=\"1b61689a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why this approach  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d242367 elementor-widget elementor-widget-text-editor\" data-id=\"6d242367\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The insider threat is a complex, multidimensional phenomenon that affects all organizations, whatever their size or sector. Managing it requires close coordination between security teams, legal departments, human resources and management. By pooling expertise within the community, we aim to :  <\/p><ul><li>Promoting a shared understanding of the phenomenon ;<\/li><li>Define a balanced framework for action that is both effective in terms of security and respectful of rights ;<\/li><li>Provide organizations with the tools they need to implement prevention strategies tailored to their specific situation.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-797d569 e-con-full e-flex e-con e-child\" data-id=\"797d569\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ad406fa elementor-widget elementor-widget-heading\" data-id=\"7ad406fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What we're working on  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e9c5e49 elementor-widget elementor-widget-text-editor\" data-id=\"3e9c5e49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW225001347 BCX8\" lang=\"FR-CA\" xml:lang=\"FR-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW225001347 BCX8\">The guide is structured along the following lines:<\/span><\/span><span class=\"EOP SCXW225001347 BCX8\" data-ccp-props=\"{\"134233117\":true,\"134233118\":true,\"335551550\":6,\"335551620\":6}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67195a29 e-con-full e-flex e-con e-child\" data-id=\"67195a29\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7b8da727 e-con-full e-flex e-con e-child\" data-id=\"7b8da727\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5938943 elementor-widget elementor-widget-image\" data-id=\"5938943\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_ContexteDefinition_L.svg\" class=\"attachment-large size-large wp-image-16324\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90ee3de elementor-widget elementor-widget-image\" data-id=\"90ee3de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_ContexteDefinition_D.svg\" class=\"attachment-large size-large wp-image-16322\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1775e4f4 elementor-widget elementor-widget-image-box\" data-id=\"1775e4f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Background and definition<\/h3><p class=\"elementor-image-box-description\">Understand the nature of internal threats, how they manifest themselves and the impact they have on organizations.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6370ab80 e-con-full e-flex e-con e-child\" data-id=\"6370ab80\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49d8244 elementor-widget elementor-widget-image\" data-id=\"49d8244\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_TechnologiesDetection_L.svg\" class=\"attachment-large size-large wp-image-16340\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a60f402 elementor-widget elementor-widget-image\" data-id=\"a60f402\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_TechnologiesDetection_D.svg\" class=\"attachment-large size-large wp-image-16338\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c908ea0 elementor-widget elementor-widget-image-box\" data-id=\"7c908ea0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Detection technologies<\/h3><p class=\"elementor-image-box-description\">Exploration of tools such as SIEM, DLP, AI solutions, and their integration into IT environments<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4897f189 e-con-full e-flex e-con e-child\" data-id=\"4897f189\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34ee772 elementor-widget elementor-widget-image\" data-id=\"34ee772\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_ViePrivee_Surveillance_L.svg\" class=\"attachment-large size-large wp-image-16344\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b68492 elementor-widget elementor-widget-image\" data-id=\"4b68492\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_ViePrivee_Surveillance_D.svg\" class=\"attachment-large size-large wp-image-16342\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54639906 elementor-widget elementor-widget-image-box\" data-id=\"54639906\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Privacy and surveillance<\/h3><p class=\"elementor-image-box-description\">Balance between security and respect for fundamental rights, principles of proportionality, consent and minimization<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a896a5f e-con-full e-flex e-con e-child\" data-id=\"1a896a5f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be3136a elementor-widget elementor-widget-image\" data-id=\"be3136a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_CadreReglementaires_L.svg\" class=\"attachment-large size-large wp-image-16320\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad1358a elementor-widget elementor-widget-image\" data-id=\"ad1358a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_CadreReglementaires_D.svg\" class=\"attachment-large size-large wp-image-16318\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5600d079 elementor-widget elementor-widget-image-box\" data-id=\"5600d079\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Regulatory frameworks<\/h3><p class=\"elementor-image-box-description\">Compliance with Bill 25 (QC), RGPD (EU), CCPA (California), etc.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3846d932 e-con-full e-flex e-con e-child\" data-id=\"3846d932\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ee5bac elementor-widget elementor-widget-image\" data-id=\"7ee5bac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_Gouvernance_L.svg\" class=\"attachment-large size-large wp-image-16328\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b303632 elementor-widget elementor-widget-image\" data-id=\"b303632\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_Gouvernance_D.svg\" class=\"attachment-large size-large wp-image-16326\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59915eaf elementor-widget elementor-widget-image-box\" data-id=\"59915eaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Governance  <\/h3><p class=\"elementor-image-box-description\">Roles and responsibilities of CISOs, DPOs, management and partners in implementing an effective program.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58a0e8cf e-con-full e-flex e-con e-child\" data-id=\"58a0e8cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d87912c elementor-widget elementor-widget-image\" data-id=\"d87912c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_RisquesJuridiques_L.svg\" class=\"attachment-large size-large wp-image-16336\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ba3095 elementor-widget elementor-widget-image\" data-id=\"7ba3095\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_RisquesJuridiques_D.svg\" class=\"attachment-large size-large wp-image-16334\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73b1149a elementor-widget elementor-widget-image-box\" data-id=\"73b1149a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Legal risks<\/h3><p class=\"elementor-image-box-description\">Case studies, case law, consequences of non-compliance.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3fd8fa6c e-con-full e-flex e-con e-child\" data-id=\"3fd8fa6c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6f4300 elementor-widget elementor-widget-image\" data-id=\"e6f4300\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_RecommandationsPratiques_D.svg\" class=\"attachment-large size-large wp-image-16330\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3932469 elementor-widget elementor-widget-image\" data-id=\"3932469\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Menaces-internes_RecommandationsPratiques_L.svg\" class=\"attachment-large size-large wp-image-16332\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59030328 elementor-widget elementor-widget-image-box\" data-id=\"59030328\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Practical recommendations<\/h3><p class=\"elementor-image-box-description\">Practical tools (checklists, sample contract clauses, best training practices).<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8af50fd e-con-full e-flex e-con e-child\" data-id=\"8af50fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ddaacaa e-con-full e-flex e-con e-child\" data-id=\"ddaacaa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-124ecc8 elementor-widget elementor-widget-heading\" data-id=\"124ecc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d80ab82 e-con-full e-flex e-con e-child\" data-id=\"d80ab82\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63ad515 elementor-widget elementor-widget-image\" data-id=\"63ad515\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"244\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/d15-desjardins-logo-couleur-1-1.webp\" class=\"attachment-large size-large wp-image-16112\" alt=\"\" srcset=\"https:\/\/cybereco.ca\/wp-content\/uploads\/d15-desjardins-logo-couleur-1-1.webp 1373w, https:\/\/cybereco.ca\/wp-content\/uploads\/d15-desjardins-logo-couleur-1-1-800x244.webp 800w, https:\/\/cybereco.ca\/wp-content\/uploads\/d15-desjardins-logo-couleur-1-1-768x234.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d556a0a e-con-full e-flex e-con e-child\" data-id=\"d556a0a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-513b66e e-con-full toggle-title e-flex e-con e-child\" data-id=\"513b66e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2150e376 e-con-full e-flex e-con e-child\" data-id=\"2150e376\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21e46907 e-con-full e-flex e-con e-child\" data-id=\"21e46907\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7de70cd0 elementor-widget elementor-widget-heading\" data-id=\"7de70cd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Community Third-party management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-312a4548 elementor-widget elementor-widget-heading\" data-id=\"312a4548\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Managing risk, supporting SMEs<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-538b6774 e-con-full e-flex e-con e-child\" data-id=\"538b6774\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d90d98 icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"1d90d98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d53c3e icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"9d53c3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5626a42f e-con-full content-accordeon e-flex e-con e-child\" data-id=\"5626a42f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4fb0de9e e-con-full e-flex e-con e-child\" data-id=\"4fb0de9e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-348b91a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"348b91a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Third-Party Management community was created to meet a growing need: to help organizations, particularly SMEs, structure and strengthen their management of suppliers, subcontractors and digital partners from a cybersecurity perspective. In a context where supply chains are increasingly interconnected, third parties now represent a major vector of risk. Incidents such as SolarWinds and MOVEit have demonstrated the extent to which an external breach can have serious internal consequences. Yet SMEs often lack the resources, time or expertise to implement robust practices.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a954a3e e-con-full e-flex e-con e-child\" data-id=\"6a954a3e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3fb9a545 e-con-full e-flex e-con e-child\" data-id=\"3fb9a545\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-792e2714 elementor-widget elementor-widget-heading\" data-id=\"792e2714\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main deliverable  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bbcf02d elementor-widget elementor-widget-text-editor\" data-id=\"2bbcf02d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The community is working on a strategic and pragmatic white paper, specifically adapted to the context of Quebec SMEs. This document will aim to : <\/p>\n<ul>\n<li>Take stock of current third-party management practices;<\/li>\n<li>Analyze applicable legal obligations (e.g. Law 25) ;<\/li>\n<li>Integrate international standards (ISO, NIST, etc.) in a contextualized way;<\/li>\n<li>Propose concrete, actionable recommendations.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-680d622d e-con-full e-flex e-con e-child\" data-id=\"680d622d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-578214fd elementor-widget elementor-widget-heading\" data-id=\"578214fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why this approach  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a207ac2 elementor-widget elementor-widget-text-editor\" data-id=\"a207ac2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Because third-party management is now a pillar of organizational security, and without support, SMEs risk remaining weak links in the chain. This community wishes to : <\/p>\n<ul>\n<li>Offer a credible, applicable and localized reference in Quebec;<\/li>\n<li>Provide SMEs with practical tools to enable them to take action without the burden of jargon;<\/li>\n<li>Possibly lay the foundations for simplified certification mechanisms or concerted sectoral initiatives.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-41e847d4 e-con-full e-flex e-con e-child\" data-id=\"41e847d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68ecb1d7 elementor-widget elementor-widget-heading\" data-id=\"68ecb1d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What we're working on  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1251f1d elementor-widget elementor-widget-text-editor\" data-id=\"1251f1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The community mobilizes its collective expertise in the following areas:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c0f3f5a e-con-full e-flex e-con e-child\" data-id=\"3c0f3f5a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fcc0431 e-con-full e-flex e-con e-child\" data-id=\"fcc0431\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d6ac98 elementor-widget elementor-widget-image\" data-id=\"2d6ac98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/GestionDesTiers_IdentificationEnjeuxSpecifiques_D.svg\" class=\"attachment-large size-large wp-image-16310\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96350ac elementor-widget elementor-widget-image\" data-id=\"96350ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/GestionDesTiers_IdentificationEnjeuxSpecifiques_L.svg\" class=\"attachment-large size-large wp-image-16312\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7a35a7 elementor-widget elementor-widget-image-box\" data-id=\"c7a35a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Identifying issues specific to Quebec SMEs<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-723f9dc1 e-con-full e-flex e-con e-child\" data-id=\"723f9dc1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b0ca6a elementor-widget elementor-widget-image\" data-id=\"1b0ca6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/GestionDesTiers_AnalyseReglementaire_L.svg\" class=\"attachment-large size-large wp-image-16304\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8957b9c elementor-widget elementor-widget-image\" data-id=\"8957b9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/GestionDesTiers_AnalyseReglementaire_D.svg\" class=\"attachment-large size-large wp-image-16302\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-498100be elementor-widget elementor-widget-image-box\" data-id=\"498100be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Regulatory analysis: Law 25, RGPD, sectoral obligations<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-698af94 e-con-full e-flex e-con e-child\" data-id=\"698af94\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb65c5d elementor-widget elementor-widget-image\" data-id=\"bb65c5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/GestionDesTiers_AdaptationBonnesPratiqueInternationales_L.svg\" class=\"attachment-large size-large wp-image-16300\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fcb1b62 elementor-widget elementor-widget-image\" data-id=\"fcb1b62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/GestionDesTiers_AdaptationBonnesPratiqueInternationales_D.svg\" class=\"attachment-large size-large wp-image-16298\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e4360f9 elementor-widget elementor-widget-image-box\" data-id=\"5e4360f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Adaptation of international best practices (ISO 27036, NIST SP 800-161, etc.)<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71a8db61 e-con-full e-flex e-con e-child\" data-id=\"71a8db61\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4dd68d2 elementor-widget elementor-widget-image\" data-id=\"4dd68d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/GestionDesTiers_ProductionContenuPedagogique_L.svg\" class=\"attachment-large size-large wp-image-16316\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc85d40 elementor-widget elementor-widget-image\" data-id=\"fc85d40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/GestionDesTiers_ProductionContenuPedagogique_D.svg\" class=\"attachment-large size-large wp-image-16314\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3756f63b elementor-widget elementor-widget-image-box\" data-id=\"3756f63b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Production of pedagogical and operational content: templates, grids, tools<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-105fe4ba e-con-full e-flex e-con e-child\" data-id=\"105fe4ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dee9adf elementor-widget elementor-widget-image\" data-id=\"dee9adf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/GestionDesTiers_DefinitionParcoursMiseEnOeuvre_L.svg\" class=\"attachment-large size-large wp-image-16308\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57af056 elementor-widget elementor-widget-image\" data-id=\"57af056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/GestionDesTiers_DefinitionParcoursMiseEnOeuvre_D.svg\" class=\"attachment-large size-large wp-image-16306\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76e8f39 elementor-widget elementor-widget-image-box\" data-id=\"76e8f39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Definition of a progressive implementation path for low-resource organizations<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-547f972e e-con-full e-flex e-con e-child\" data-id=\"547f972e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32ebeb65 elementor-widget elementor-widget-heading\" data-id=\"32ebeb65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Intended contents of the white paper<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c2237f6 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7c2237f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe document will be enriched with practical resources to facilitate its adoption in the field:\n<ul>\n \t<li>Maturity self-assessment tools ;<\/li>\n \t<li>Standard contractual clauses to govern relations with third parties ;<\/li>\n \t<li>Threat catalogs by supplier type ;<\/li>\n \t<li>Maturity grids to guide organizational progress.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-63b9f5d e-con-full e-flex e-con e-child\" data-id=\"63b9f5d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-981cd40 e-con-full e-flex e-con e-child\" data-id=\"981cd40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4da6816 elementor-widget elementor-widget-heading\" data-id=\"4da6816\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18be099 e-con-full e-flex e-con e-child\" data-id=\"18be099\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3c7d72 elementor-widget elementor-widget-image\" data-id=\"c3c7d72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"281\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/IBM-slider2.png\" class=\"attachment-large size-large wp-image-3332\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c0f0cc e-con-full e-flex e-con e-child\" data-id=\"1c0f0cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-857c74f e-con-full toggle-title e-flex e-con e-child\" data-id=\"857c74f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-fc1428c e-con-full e-flex e-con e-child\" data-id=\"fc1428c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0261e0 e-con-full e-flex e-con e-child\" data-id=\"c0261e0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3122e1 elementor-widget elementor-widget-heading\" data-id=\"f3122e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AI Community - Artificial intelligence and cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6af69ab elementor-widget elementor-widget-heading\" data-id=\"6af69ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Understanding, managing and using AI safely<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b9b85e e-con-full e-flex e-con e-child\" data-id=\"6b9b85e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93251f2 icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"93251f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9432d6d icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"9432d6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71ae34e e-con-full content-accordeon e-flex e-con e-child\" data-id=\"71ae34e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-7f0ca13 e-con-full e-flex e-con e-child\" data-id=\"7f0ca13\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b1eec6 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3b1eec6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The rise of artificial intelligence (AI) is profoundly transforming organizations, both in their operational practices and in their cybersecurity posture. While AI opens the door to major gains in efficiency, automation and threat detection, it also raises new risks: hallucinations, data leaks, adversarial attacks, deficient algorithmic governance, etc. <\/p><p>The AI Community was created to help organizations frame the adoption of artificial intelligence in a way that is responsible, safe and in line with their business and regulatory realities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c042b9 e-con-full e-flex e-con e-child\" data-id=\"8c042b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9dedf65 e-con-full e-flex e-con e-child\" data-id=\"9dedf65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5153408 elementor-widget elementor-widget-heading\" data-id=\"5153408\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Objectives<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b47fa0f elementor-widget elementor-widget-text-editor\" data-id=\"b47fa0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Assess the risks and opportunities associated with the use of AI in business processes and security functions;<\/li><li>Share AI management and governance practices (internal policies, charters, evaluation mechanisms);<\/li><li>Identify relevant use cases for AI in cybersecurity (SOC, DLP, EDR, GRC, etc.) ;<\/li><li>Encourage the controlled adoption of generative AI in the enterprise, while respecting data confidentiality and integrity.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-074d71c e-con-full e-flex e-con e-child\" data-id=\"074d71c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3f39e8 elementor-widget elementor-widget-heading\" data-id=\"f3f39e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why this approach  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0b5da6 elementor-widget elementor-widget-text-editor\" data-id=\"c0b5da6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Artificial intelligence cannot be adopted blindly. It requires a rigorous, interdisciplinary and evolutionary framework to avoid excesses and maximize benefits. <\/p><p>This community enables organizations to :<\/p><ul><li>Share their initiatives, concerns and concrete experiences;<\/li><li>Develop a responsible AI culture aligned with cybersecurity principles;<\/li><li>Preparing for future regulatory requirements and society&#8217;s expectations;<\/li><li>Harness the full potential of AI while minimizing risks to people and information assets.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb3921f e-con-full e-flex e-con e-child\" data-id=\"cb3921f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4bc8f28 elementor-widget elementor-widget-heading\" data-id=\"4bc8f28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Work in progress<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f29fbb elementor-widget elementor-widget-text-editor\" data-id=\"5f29fbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The community structures its reflections and deliverables around the following axes:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-29d68e7 e-con-full e-flex e-con e-child\" data-id=\"29d68e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0b09d6f e-con-full e-flex e-con e-child\" data-id=\"0b09d6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9378dd6 elementor-widget elementor-widget-image\" data-id=\"9378dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteIA_EncadrementIA_D.svg\" class=\"attachment-large size-large wp-image-17664\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75f231d elementor-widget elementor-widget-image\" data-id=\"75f231d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteIA_EncadrementIA_L.svg\" class=\"attachment-large size-large wp-image-17662\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38771d9 elementor-widget elementor-widget-image-box\" data-id=\"38771d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Supervision of generative AI in companies<\/h3><p class=\"elementor-image-box-description\"><br>- Usage policies, access to tools, training and awareness;\n<br><br>\n- Risks linked to information leaks, misinformation and content manipulation.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7542aad e-con-full e-flex e-con e-child\" data-id=\"7542aad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e2da90 elementor-widget elementor-widget-image\" data-id=\"9e2da90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteIA_EvaluationFournisseurs_L.svg\" class=\"attachment-large size-large wp-image-17668\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec210a0 elementor-widget elementor-widget-image\" data-id=\"ec210a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteIA_EvaluationFournisseurs_D.svg\" class=\"attachment-large size-large wp-image-17666\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c956421 elementor-widget elementor-widget-image-box\" data-id=\"c956421\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">IA supplier evaluation<\/h3><p class=\"elementor-image-box-description\"><br>- Selection criteria, contractual clauses, transparency and explicability requirements;\n<br><br>- Alignment with emerging regulations (EU AI Act, Canadian guidelines).\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d2b5129 e-con-full e-flex e-con e-child\" data-id=\"d2b5129\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a463d5 elementor-widget elementor-widget-image\" data-id=\"0a463d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteIA_GouvernanceImputabiliteAlgo_L.svg\" class=\"attachment-large size-large wp-image-17672\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-307401d elementor-widget elementor-widget-image\" data-id=\"307401d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteIA_GouvernanceImputabiliteAlgo_D.svg\" class=\"attachment-large size-large wp-image-17670\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35da503 elementor-widget elementor-widget-image-box\" data-id=\"35da503\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Governance and algorithmic accountability<\/h3><p class=\"elementor-image-box-description\"><br>- Traceability of automated decisions, right to explanation, algorithmic biases;\n<br><br>- Roles and responsibilities: ethics committee, AI management, security, legal.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9815973 e-con-full e-flex e-con e-child\" data-id=\"9815973\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2dad6d elementor-widget elementor-widget-image\" data-id=\"c2dad6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteIA_UsageIARenforcerCyber_L.svg\" class=\"attachment-large size-large wp-image-17676\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab4c59e elementor-widget elementor-widget-image\" data-id=\"ab4c59e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteIA_UsageIARenforcerCyber_D.svg\" class=\"attachment-large size-large wp-image-17674\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-067d276 elementor-widget elementor-widget-image-box\" data-id=\"067d276\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Using AI to strengthen cybersecurity<\/h3><p class=\"elementor-image-box-description\"><br>- AI tools for behavioral analysis, anomaly detection, alert triage;\n<br><br>- Limitations and framing of the use of AI in critical contexts.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d3bef2 e-con-full e-flex e-con e-child\" data-id=\"5d3bef2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fae3b17 e-con-full e-flex e-con e-child\" data-id=\"fae3b17\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-008b054 elementor-widget elementor-widget-heading\" data-id=\"008b054\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6951b92 e-con-full e-flex e-con e-child\" data-id=\"6951b92\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e85a0a elementor-widget elementor-widget-image\" data-id=\"3e85a0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Vooban.webp\" class=\"attachment-large size-large wp-image-16746\" alt=\"\" srcset=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Vooban.webp 500w, https:\/\/cybereco.ca\/wp-content\/uploads\/Vooban-400x400.webp 400w, https:\/\/cybereco.ca\/wp-content\/uploads\/Vooban-280x280.webp 280w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a503b2b e-con-full e-flex e-con e-child\" data-id=\"a503b2b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d904389 e-con-full toggle-title e-flex e-con e-child\" data-id=\"d904389\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-94ecddd e-con-full e-flex e-con e-child\" data-id=\"94ecddd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d742b22 e-con-full e-flex e-con e-child\" data-id=\"d742b22\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74ccab4 elementor-widget elementor-widget-heading\" data-id=\"74ccab4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Health IoT Community<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e69a868 elementor-widget elementor-widget-heading\" data-id=\"e69a868\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Securing connected objects in clinical environments<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-524aeb8 e-con-full e-flex e-con e-child\" data-id=\"524aeb8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0dd36c icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"d0dd36c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fa7f9f icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"7fa7f9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ac067e e-con-full content-accordeon e-flex e-con e-child\" data-id=\"5ac067e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-d687b7e e-con-full e-flex e-con e-child\" data-id=\"d687b7e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0bde27 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b0bde27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The growing deployment of connected objects (IoT) in the healthcare sector &#8211; medical sensors, wearable devices, remote monitoring equipment, smart pumps, etc. &#8211; raises major challenges in terms of cybersecurity, confidentiality and operational resilience.<\/p><p>In an environment where the availability, integrity and security of data can have a direct impact on patient health, it is becoming essential to manage the entire lifecycle of these devices.<\/p><p>The Health IoT community was created to bring together technical experts, clinicians, information security officers and managers to share concrete practices and build a common approach across the healthcare network.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b633e1 e-con-full e-flex e-con e-child\" data-id=\"6b633e1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4285df3 e-con-full e-flex e-con e-child\" data-id=\"4285df3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c28cac elementor-widget elementor-widget-heading\" data-id=\"4c28cac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Objectives<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb60756 elementor-widget elementor-widget-text-editor\" data-id=\"bb60756\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Document the specific cybersecurity challenges of connected medical devices;<\/li><li>Propose a governance framework for the deployment, management and decommissioning of IoT ;<\/li><li>Share use cases, real-life incidents and feedback on the integration of connected objects in healthcare environments;<\/li><li>Encourage cooperation between clinical, IT, biomedical and legal departments;<\/li><li>Highlight the responsibilities of manufacturers, purchasers and operators.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-888058f e-con-full e-flex e-con e-child\" data-id=\"888058f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d836d5d elementor-widget elementor-widget-heading\" data-id=\"d836d5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why this approach  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a158d3e elementor-widget elementor-widget-text-editor\" data-id=\"a158d3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The healthcare sector is a prime target for cyber-attacks, and the rapid increase in connected devices is multiplying the surfaces of exposure.<\/p><p>This community aims to :<\/p><ul><li>Strengthening digital security in healthcare establishments without holding back innovation;<\/li><li>Provide equipment management teams with practical tools;<\/li><li>Promote a multidisciplinary approach that takes into account clinical and operational constraints;<\/li><li>Contribute to a shared vision of medical cybersecurity across the Quebec healthcare network.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee169d2 e-con-full e-flex e-con e-child\" data-id=\"ee169d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9740bfb elementor-widget elementor-widget-heading\" data-id=\"9740bfb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Work in progress<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e13bc8 elementor-widget elementor-widget-text-editor\" data-id=\"3e13bc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The community&#8217;s reflections are structured around the following axes:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8542b25 e-con-full e-flex e-con e-child\" data-id=\"8542b25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-745b559 e-con-full e-flex e-con e-child\" data-id=\"745b559\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e37431 elementor-widget elementor-widget-image\" data-id=\"7e37431\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteloTSante_EncadrementInventaireIA_D.svg\" class=\"attachment-large size-large wp-image-17684\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92a24b3 elementor-widget elementor-widget-image\" data-id=\"92a24b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteloTSante_EncadrementInventaireIA_L.svg\" class=\"attachment-large size-large wp-image-17682\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d41a38 elementor-widget elementor-widget-image-box\" data-id=\"2d41a38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">FramingInventory and classification of generative AI health IoTs in the enterprise.<\/h3><p class=\"elementor-image-box-description\"><br>- Equipment typology (diagnostics, monitoring, administration, etc.);\n<br><br>- Critical level, dependencies and network exposure.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9949944 e-con-full e-flex e-con e-child\" data-id=\"9949944\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6769a8 elementor-widget elementor-widget-image\" data-id=\"f6769a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteloTSante_CadreGouvernance_L.svg\" class=\"attachment-large size-large wp-image-17686\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3174e4b elementor-widget elementor-widget-image\" data-id=\"3174e4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteloTSante_CadreGouvernance_D.svg\" class=\"attachment-large size-large wp-image-17688\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aecc86d elementor-widget elementor-widget-image-box\" data-id=\"aecc86d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Governance and safety frameworks<\/h3><p class=\"elementor-image-box-description\"><br>- Purchasing policies, minimum security requirements (firmware, encryption, updates, etc.);\n<br><br>- Device life cycle: installation, maintenance, removal.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73f79dd e-con-full e-flex e-con e-child\" data-id=\"73f79dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e74cf8 elementor-widget elementor-widget-image\" data-id=\"1e74cf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteloTSante_RisquesVulnerabilites_L.svg\" class=\"attachment-large size-large wp-image-17696\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa65512 elementor-widget elementor-widget-image\" data-id=\"fa65512\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteloTSante_RisquesVulnerabilites_D.svg\" class=\"attachment-large size-large wp-image-17694\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-836f2ec elementor-widget elementor-widget-image-box\" data-id=\"836f2ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Risks and vulnerabilities<\/h3><p class=\"elementor-image-box-description\"><br>- Unauthorized access, update failures, inadequate segmentation, unencrypted communications;\n<br><br>- Potential consequences for data confidentiality or continuity of care.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5de1c04 e-con-full e-flex e-con e-child\" data-id=\"5de1c04\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7db74d4 elementor-widget elementor-widget-image\" data-id=\"7db74d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"29\" height=\"29\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteloTSante_IntegrationEnvironnementsTI_L.svg\" class=\"attachment-large size-large wp-image-17700\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d736f5e elementor-widget elementor-widget-image\" data-id=\"d736f5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"29\" height=\"29\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteloTSante_IntegrationEnvironnementsTI_D.svg\" class=\"attachment-large size-large wp-image-17698\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89b9e04 elementor-widget elementor-widget-image-box\" data-id=\"89b9e04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Integration with hospital IT environments<\/h3><p class=\"elementor-image-box-description\"><br>- Identity management, network segmentation, flow monitoring, anomaly detection;\n<br><br>- Collaboration between IT, biomedical and clinical teams.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b23d5c5 e-con-full e-flex e-con e-child\" data-id=\"b23d5c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d87c9da elementor-widget elementor-widget-image\" data-id=\"d87c9da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteloTSante_ReglementationConformite_L.svg\" class=\"attachment-large size-large wp-image-17702\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5768d7 elementor-widget elementor-widget-image\" data-id=\"d5768d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteloTSante_ReglementationConformite_D.svg\" class=\"attachment-large size-large wp-image-17704\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-738348f elementor-widget elementor-widget-image-box\" data-id=\"738348f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Regulations and compliance<\/h3><p class=\"elementor-image-box-description\"><br>- Alignment with the requirements of Bill 25, ISO standards (27001, 27799), MSSS guidelines and FDA\/EMA recommendations.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c08a9aa e-con-full e-flex e-con e-child\" data-id=\"c08a9aa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b6c2782 e-con-full e-flex e-con e-child\" data-id=\"b6c2782\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d70fb94 elementor-widget elementor-widget-heading\" data-id=\"d70fb94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34f90ea e-con-full e-flex e-con e-child\" data-id=\"34f90ea\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e693fb elementor-widget elementor-widget-image\" data-id=\"3e693fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"214\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/qc-drapeau-sante-qc.svg\" class=\"attachment-large size-large wp-image-17433\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a8fa0c e-con-full e-flex e-con e-child\" data-id=\"2a8fa0c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f3e0a25 e-con-full toggle-title e-flex e-con e-child\" data-id=\"f3e0a25\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-dd652a0 e-con-full e-flex e-con e-child\" data-id=\"dd652a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5fcf191 e-con-full e-flex e-con e-child\" data-id=\"5fcf191\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ab4deb elementor-widget elementor-widget-heading\" data-id=\"0ab4deb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Imperial Project<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4bb470 elementor-widget elementor-widget-heading\" data-id=\"d4bb470\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Structuring technological risk governance<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f585a8 e-con-full e-flex e-con e-child\" data-id=\"9f585a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ddae0c icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"2ddae0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea424ab icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ea424ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ef3933 e-con-full content-accordeon e-flex e-con e-child\" data-id=\"5ef3933\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-629071a e-con-full e-flex e-con e-child\" data-id=\"629071a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e87e37a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e87e37a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Faced with the growing complexity of digital environments, public and private organizations in Quebec need to strengthen their ability to manage technological risks in a proactive, integrated and context-specific way.<\/p><p>The <strong>Imp\u00e9rium<\/strong> project was born of a common desire on the part of institutional and sector players (Desjardins, BRP, Deloitte, etc.) to build a structuring and accessible framework to equip organizations in terms of governance, accountability and technological risk management.<\/p><p>This community aims to co-construct the foundations of a Quebec model of technological governance, aligned with international best practices while responding to concrete needs in the field.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c7db2e9 e-con-full e-flex e-con e-child\" data-id=\"c7db2e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ece2398 e-con-full e-flex e-con e-child\" data-id=\"ece2398\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c712f1d elementor-widget elementor-widget-heading\" data-id=\"c712f1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Objectives<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09e1a24 elementor-widget elementor-widget-text-editor\" data-id=\"09e1a24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Provide boards of directors, senior management and management committees with tools for understanding, assessing and managing technological risks;<\/li><li>Clarify responsibilities and accountability mechanisms for cybersecurity, business continuity and digital transformation;<\/li><li>Offer a common language and simple indicators for dialogue between technical experts, managers and decision-makers;<\/li><li>Promote a cross-functional approach to risk management, including compliance, resilience, performance and innovation.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33b775f e-con-full e-flex e-con e-child\" data-id=\"33b775f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a15fca elementor-widget elementor-widget-heading\" data-id=\"6a15fca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why this approach  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f230c95 elementor-widget elementor-widget-text-editor\" data-id=\"f230c95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Technological risk governance can no longer be left to technical teams alone. It must be taken to the highest level, with concrete tools, clear accountability and the ability to arbitrate between performance, innovation and safety. <\/p><p>The Imperial Project enables organizations to :<\/p><ul><li>Structure their approach to digital governance without excessive complexity;<\/li><li>Clarify who does what, why and with what resources;<\/li><li>Increase their resilience and ability to anticipate technological crises;<\/li><li>Create a culture of shared governance, based on concrete, scalable and contextualized tools.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac7fcc6 e-con-full e-flex e-con e-child\" data-id=\"ac7fcc6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59cf860 elementor-widget elementor-widget-heading\" data-id=\"59cf860\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Work in progress<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cc1b39 elementor-widget elementor-widget-text-editor\" data-id=\"3cc1b39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The community is organized around several working groups, each responsible for a key aspect of the Imperial framework:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef6c9b1 e-con-full e-flex e-con e-child\" data-id=\"ef6c9b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-21ee57e e-con-full e-flex e-con e-child\" data-id=\"21ee57e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06b0459 elementor-widget elementor-widget-image\" data-id=\"06b0459\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetImperium_CadreGouvernance_D.svg\" class=\"attachment-large size-large wp-image-17726\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89f7c75 elementor-widget elementor-widget-image\" data-id=\"89f7c75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetImperium_CadreGouvernance_L.svg\" class=\"attachment-large size-large wp-image-17728\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9eec862 elementor-widget elementor-widget-image-box\" data-id=\"9eec862\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Governance framework<\/h3><p class=\"elementor-image-box-description\"><br>- Definition of roles and responsibilities: Board of Directors, Audit Committee, CIO, DPO, senior management;\n<br><br>- Governance models adapted to different types of organizations (SMEs, NPOs, large corporations).\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-683a2af e-con-full e-flex e-con e-child\" data-id=\"683a2af\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3fa1aa elementor-widget elementor-widget-image\" data-id=\"a3fa1aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetImperium_EvaluationMaturiteControles_L.svg\" class=\"attachment-large size-large wp-image-17730\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0d89cd elementor-widget elementor-widget-image\" data-id=\"a0d89cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetImperium_EvaluationMaturiteControles_D.svg\" class=\"attachment-large size-large wp-image-17732\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a91de15 elementor-widget elementor-widget-image-box\" data-id=\"a91de15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Assessment of maturity and controls<\/h3><p class=\"elementor-image-box-description\"><br>- Self-assessment tools, maturity grids, interpretation guides;\n<br><br>\n- Links with existing frameworks (NIST CSF, ISO 27001, COBIT, etc.).\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0286781 e-con-full e-flex e-con e-child\" data-id=\"0286781\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c6607a elementor-widget elementor-widget-image\" data-id=\"7c6607a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetImperium_IndicateurSuiviTableauBord_L.svg\" class=\"attachment-large size-large wp-image-17734\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99893fc elementor-widget elementor-widget-image\" data-id=\"99893fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetImperium_IndicateurSuiviTableauBord_D.svg\" class=\"attachment-large size-large wp-image-17736\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40d3b54 elementor-widget elementor-widget-image-box\" data-id=\"40d3b54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Monitoring indicators and dashboards<\/h3><p class=\"elementor-image-box-description\"><br>- Definition of key performance indicators (KPIs) and key risk indicators (KRIs);\n<br><br>- Visualization for management and governance committees.\n\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dd959e0 e-con-full e-flex e-con e-child\" data-id=\"dd959e0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8565643 elementor-widget elementor-widget-image\" data-id=\"8565643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetImperium_AppetitRisquePriori_L.svg\" class=\"attachment-large size-large wp-image-17740\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd10db0 elementor-widget elementor-widget-image\" data-id=\"dd10db0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetImperium_AppetitRisquePriori_D.svg\" class=\"attachment-large size-large wp-image-17738\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4d4c95 elementor-widget elementor-widget-image-box\" data-id=\"f4d4c95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Risk appetite and prioritization<\/h3><p class=\"elementor-image-box-description\"><br>- Frameworks for defining organizational risk appetite \n<br><br>- Alignment between technological, business and regulatory risks.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce20ebc e-con-full e-flex e-con e-child\" data-id=\"ce20ebc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1c8ba24 elementor-widget elementor-widget-image\" data-id=\"1c8ba24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetImperium_ImplementationTechnoIntegration_L.svg\" class=\"attachment-large size-large wp-image-17742\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6e5902 elementor-widget elementor-widget-image\" data-id=\"c6e5902\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetImperium_ImplementationTechnoIntegration_D.svg\" class=\"attachment-large size-large wp-image-17744\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-827158b elementor-widget elementor-widget-image-box\" data-id=\"827158b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Technology implementation and integration<\/h3><p class=\"elementor-image-box-description\"><br>- Models for integration into existing CRM, ERP or dashboard tools;\n<br><br>- Best practices for gradual deployment.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a13ca5 e-con-full e-flex e-con e-child\" data-id=\"6a13ca5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-48ed494 e-con-full e-flex e-con e-child\" data-id=\"48ed494\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-367e282 elementor-widget elementor-widget-heading\" data-id=\"367e282\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-801f85f e-con-full e-flex e-con e-child\" data-id=\"801f85f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d3e0d6c elementor-widget elementor-widget-image\" data-id=\"d3e0d6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"244\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/d15-desjardins-logo-couleur-1-1.webp\" class=\"attachment-large size-large wp-image-16112\" alt=\"\" srcset=\"https:\/\/cybereco.ca\/wp-content\/uploads\/d15-desjardins-logo-couleur-1-1.webp 1373w, https:\/\/cybereco.ca\/wp-content\/uploads\/d15-desjardins-logo-couleur-1-1-800x244.webp 800w, https:\/\/cybereco.ca\/wp-content\/uploads\/d15-desjardins-logo-couleur-1-1-768x234.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-76a3c66 e-con-full e-flex e-con e-child\" data-id=\"76a3c66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-35e6e50 e-con-full toggle-title e-flex e-con e-child\" data-id=\"35e6e50\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-46b36c0 e-con-full e-flex e-con e-child\" data-id=\"46b36c0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dad8c0b e-con-full e-flex e-con e-child\" data-id=\"dad8c0b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e8712e elementor-widget elementor-widget-heading\" data-id=\"6e8712e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cloud and cybersecurity community<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-451b83e elementor-widget elementor-widget-heading\" data-id=\"451b83e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Managing usage and securing hybrid environments<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c02620 e-con-full e-flex e-con e-child\" data-id=\"2c02620\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d0f6ee icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"1d0f6ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f86fd5 icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"9f86fd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a6d1aa4 e-con-full content-accordeon e-flex e-con e-child\" data-id=\"a6d1aa4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-72714a9 e-con-full e-flex e-con e-child\" data-id=\"72714a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bfd7bed elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"bfd7bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The accelerated adoption of the cloud is profoundly transforming the technological architecture of organizations. Cloud services, hybrid infrastructures, SaaS, PaaS, IaaS models: these are all opportunities&#8230; but also new risks in terms of governance, confidentiality, compliance and access management. <\/p><p>Quebec organizations have to navigate a constantly evolving ecosystem, often with limited resources or strong regulatory constraints.<\/p><p>The Cloud and Cybersecurity community has been set up to support this transition by promoting the sharing of expertise, the documentation of concrete practices and the development of guides adapted to the local context.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f84ff2 e-con-full e-flex e-con e-child\" data-id=\"5f84ff2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-805b44c e-con-full e-flex e-con e-child\" data-id=\"805b44c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b958eec elementor-widget elementor-widget-heading\" data-id=\"b958eec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Objectives<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23d68c3 elementor-widget elementor-widget-text-editor\" data-id=\"23d68c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Provide a governance framework for public, private and hybrid cloud environments;<\/li><li>Help organizations select, integrate and secure cloud services;<\/li><li>Share architecture models, supplier evaluation criteria and essential technical controls;<\/li><li>Meet compliance requirements (Law 25, RGPD, ISO standards) in a multi-cloud context ;<\/li><li>Promote consistency between IT, security, legal and operations.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5277139 e-con-full e-flex e-con e-child\" data-id=\"5277139\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2bc5ba elementor-widget elementor-widget-heading\" data-id=\"a2bc5ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why this approach  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-584e655 elementor-widget elementor-widget-text-editor\" data-id=\"584e655\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The cloud is often seen as a lever for transformation&#8230; as long as it is properly managed. Without a rigorous framework, it can become a source of confusion, cost overruns and even critical flaws. <\/p><p>This community enables organizations to :<\/p><ul><li>Adopt the cloud in a way that is secure, compliant and consistent with their business strategy;<\/li><li>Accelerate their digital transformation without compromising risk governance;<\/li><li>Share proven solutions adapted to Quebec realities;<\/li><li>Create a culture of cloud-based cybersecurity, supported by all stakeholders.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-956f40d e-con-full e-flex e-con e-child\" data-id=\"956f40d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-120d33b elementor-widget elementor-widget-heading\" data-id=\"120d33b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Work in progress<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a896d05 elementor-widget elementor-widget-text-editor\" data-id=\"a896d05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The community is organized around several working groups, each responsible for a key aspect of the Imperial framework:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-327b151 e-con-full e-flex e-con e-child\" data-id=\"327b151\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d1ccec9 e-con-full e-flex e-con e-child\" data-id=\"d1ccec9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8286c0c elementor-widget elementor-widget-image\" data-id=\"8286c0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteCloud_CadresGouvernance_D.svg\" class=\"attachment-large size-large wp-image-17637\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83fec5a elementor-widget elementor-widget-image\" data-id=\"83fec5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteCloud_CadresGouvernance_L.svg\" class=\"attachment-large size-large wp-image-17635\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37002a6 elementor-widget elementor-widget-image-box\" data-id=\"37002a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Cloud governance frameworks<\/h3><p class=\"elementor-image-box-description\"><br>- Shared responsibility models;\n<br><br>- Alignment between contracts, safety and operational processes.\n\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc2730d e-con-full e-flex e-con e-child\" data-id=\"dc2730d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bbb658 elementor-widget elementor-widget-image\" data-id=\"2bbb658\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteCloud_SecurityMulti-Cloud_L.svg\" class=\"attachment-large size-large wp-image-17639\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90dde8c elementor-widget elementor-widget-image\" data-id=\"90dde8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteCloud_SecurityMulti-Cloud_D-1.svg\" class=\"attachment-large size-large wp-image-17643\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2677573 elementor-widget elementor-widget-image-box\" data-id=\"2677573\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Security in multi-cloud environments<\/h3><p class=\"elementor-image-box-description\"><br>- Basic controls: encryption, access management, audit logs, network segmentation;\n<br><br>- Configuration monitoring (CSPM), automation of secure deployments.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44d465e e-con-full e-flex e-con e-child\" data-id=\"44d465e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69b82e1 elementor-widget elementor-widget-image\" data-id=\"69b82e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteCloud_ChoosingCloudProviders_L.svg\" class=\"attachment-large size-large wp-image-17645\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d04223f elementor-widget elementor-widget-image\" data-id=\"d04223f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteCloud_ChoosingCloudProviders_D.svg\" class=\"attachment-large size-large wp-image-17647\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28e48f2 elementor-widget elementor-widget-image-box\" data-id=\"28e48f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Choosing and evaluating cloud providers<\/h3><p class=\"elementor-image-box-description\"><br>- Evaluation grids, critical contractual clauses, audits and certifications;\n<br><br>- Vendor lock-in risk management.\n\n\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3dc5418 e-con-full e-flex e-con e-child\" data-id=\"3dc5418\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d4feed elementor-widget elementor-widget-image\" data-id=\"7d4feed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteCloud_ConformiteReglementaireSouverainete_L.svg\" class=\"attachment-large size-large wp-image-17649\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da40093 elementor-widget elementor-widget-image\" data-id=\"da40093\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteCloud_ConformiteReglementaireSouverainete_D.svg\" class=\"attachment-large size-large wp-image-17651\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f72e8ca elementor-widget elementor-widget-image-box\" data-id=\"f72e8ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Regulatory compliance and data sovereignty<\/h3><p class=\"elementor-image-box-description\"><br>- Data localization, cross-border export, contractual requirements;\n<br><br>- Integration of Law 25 obligations into cloud models.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e287bb9 e-con-full e-flex e-con e-child\" data-id=\"e287bb9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a046e3 elementor-widget elementor-widget-image\" data-id=\"0a046e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteCloud_SensibilisationAccompagne_L.svg\" class=\"attachment-large size-large wp-image-17653\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37806fb elementor-widget elementor-widget-image\" data-id=\"37806fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CommunauteCloud_SensibilisationAccompagne_D.svg\" class=\"attachment-large size-large wp-image-17655\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ff85ca elementor-widget elementor-widget-image-box\" data-id=\"6ff85ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Awareness-raising and support<\/h3><p class=\"elementor-image-box-description\"><br>- Popularized documentation for business teams;\n<br><br>- Self-assessment tools and in-house training.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-76a8d65 e-con-full e-flex e-con e-child\" data-id=\"76a8d65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cfd3b4e e-con-full e-flex e-con e-child\" data-id=\"cfd3b4e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b0733b elementor-widget elementor-widget-heading\" data-id=\"6b0733b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf20023 e-con-full e-flex e-con e-child\" data-id=\"bf20023\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-079151a elementor-widget elementor-widget-image\" data-id=\"079151a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"591\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/KPMG_NoCP_RGB-1-1-1083x800.webp\" class=\"attachment-large size-large wp-image-16144\" alt=\"\" srcset=\"https:\/\/cybereco.ca\/wp-content\/uploads\/KPMG_NoCP_RGB-1-1-1083x800.webp 1083w, https:\/\/cybereco.ca\/wp-content\/uploads\/KPMG_NoCP_RGB-1-1-541x400.webp 541w, https:\/\/cybereco.ca\/wp-content\/uploads\/KPMG_NoCP_RGB-1-1-768x567.webp 768w, https:\/\/cybereco.ca\/wp-content\/uploads\/KPMG_NoCP_RGB-1-1-1536x1135.webp 1536w, https:\/\/cybereco.ca\/wp-content\/uploads\/KPMG_NoCP_RGB-1-1.webp 1638w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ceddb4 e-con-full e-flex e-con e-child\" data-id=\"6ceddb4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3f6144e e-con-full toggle-title e-flex e-con e-child\" data-id=\"3f6144e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-49b7a63 e-con-full e-flex e-con e-child\" data-id=\"49b7a63\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2dd25f9 e-con-full e-flex e-con e-child\" data-id=\"2dd25f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad3bac5 elementor-widget elementor-widget-heading\" data-id=\"ad3bac5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Light manufacturing and cybersecurity project<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64219bc elementor-widget elementor-widget-heading\" data-id=\"64219bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Enhancing the safety of TO environments in Quebec's manufacturing SMEs<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b002da e-con-full e-flex e-con e-child\" data-id=\"1b002da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-577fa45 icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"577fa45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7e7bff icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"b7e7bff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f593d02 e-con-full content-accordeon e-flex e-con e-child\" data-id=\"f593d02\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-838d698 e-con-full e-flex e-con e-child\" data-id=\"838d698\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f06d29 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3f06d29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Light manufacturing SMEs in Quebec are undergoing an accelerated digital transformation. However, this modernization is exposing their operational technology (OT) environments to major cyber risks: production interruption, tampering with CNC controls, uncorrected vulnerabilities, lack of segmentation, etc. <\/p><p>The <strong>Light Manufacturing and Cybersecurity<\/strong> project, supported by Cybereco and CNIMI, aims to design, test and deploy a solution for these companies that is robust, easy to integrate, affordable and developed locally using Quebec innovations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e09e5eb e-con-full e-flex e-con e-child\" data-id=\"e09e5eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e95ff46 e-con-full e-flex e-con e-child\" data-id=\"e95ff46\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84337f1 elementor-widget elementor-widget-heading\" data-id=\"84337f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Objectives<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18fbace elementor-widget elementor-widget-text-editor\" data-id=\"18fbace\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Prototype and validate a cybersecurity solution focused on TO environments and designed for the specific needs of light manufacturing SMEs;<\/li><li>Strengthen the resilience of these companies without undermining their productivity or imposing excessive complexity;<\/li><li>Accelerate the integration of best practices from industry standards (NIST CSF, IEC 62443);<\/li><li>Support the development of skills among Quebec technicians and engineers through practical training linked to the deployment of this solution.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c3380cb e-con-full e-flex e-con e-child\" data-id=\"c3380cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d90ad4 elementor-widget elementor-widget-heading\" data-id=\"7d90ad4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why this approach  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b535f96 elementor-widget elementor-widget-text-editor\" data-id=\"b535f96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Most SMEs have neither the budget nor the internal resources to equip themselves with secure TO solutions;<\/li><li>Conventional IT approaches are not compatible with industrial constraints (availability, equipment lifetime, etc.);<\/li><li>Recourse to foreign solutions remains costly, not very contextualized and sometimes over-dimensioned;<\/li><li>A locally-proven, modular, Quebec-based solution enables widespread, rapid and sustained adoption.<\/li><\/ul><p> <\/p><p>This project structures industrial cybersecurity as a <strong>strategic lever for competitiveness<\/strong>, while helping to raise the profile of Quebec&#8217;s cybersecurity ecosystem applied to Industry 4.0.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a2f793e e-con-full e-flex e-con e-child\" data-id=\"a2f793e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42fba2a elementor-widget elementor-widget-heading\" data-id=\"42fba2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Technological components of the solution<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bebee8b elementor-widget elementor-widget-text-editor\" data-id=\"bebee8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The community is organized around several working groups, each responsible for a key aspect of the Imperial framework:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e49c58 e-con-full e-flex e-con e-child\" data-id=\"3e49c58\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e9729ed e-con-full e-flex e-con e-child\" data-id=\"e9729ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd5792a e-con-full e-flex e-con e-child\" data-id=\"cd5792a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-683092c elementor-widget elementor-widget-image\" data-id=\"683092c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetFabricationLegere_ProtectionPerimetriqueTO_L.svg\" class=\"attachment-large size-large wp-image-17714\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cf0c55 elementor-widget elementor-widget-image\" data-id=\"0cf0c55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetFabricationLegere_ProtectionPerimetriqueTO_D.svg\" class=\"attachment-large size-large wp-image-17716\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7eb790 elementor-widget elementor-widget-image-box\" data-id=\"e7eb790\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Intelligent TO perimeter protection<\/h3><p class=\"elementor-image-box-description\"><br>- Industrial micro-PCs acting as firewalls, with protocol filtering, segmentation and VPN tunnels.\n<br><br>- Deep packet inspection (DPI) adapted to industrial protocols (Modbus, OPC UA, etc.).\n\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1294d5f e-con-full e-flex e-con e-child\" data-id=\"1294d5f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b6edf9 elementor-widget elementor-widget-image\" data-id=\"3b6edf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetFabricationLegere_DetectionComportIA_V.svg\" class=\"attachment-large size-large wp-image-17720\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e378b79 elementor-widget elementor-widget-image\" data-id=\"e378b79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetFabricationLegere_DetectionComportIA_D.svg\" class=\"attachment-large size-large wp-image-17718\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8eb13ca elementor-widget elementor-widget-image-box\" data-id=\"8eb13ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">AI-based behavioral detection<\/h3><p class=\"elementor-image-box-description\"><br>- Analysis of \"normal\" equipment traffic (CNC, molding, robots) and automatic detection of deviations.\n<br><br>- Virtual protection of legacy devices via virtual patching.\n\n\n\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-709fb43 e-con-full e-flex e-con e-child\" data-id=\"709fb43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d03576 elementor-widget elementor-widget-image\" data-id=\"4d03576\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetFabricationLegere_GestionCentraliseeTO_L.svg\" class=\"attachment-large size-large wp-image-17722\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d8d5e2 elementor-widget elementor-widget-image\" data-id=\"2d8d5e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProjetFabricationLegere_GestionCentraliseeTO_D.svg\" class=\"attachment-large size-large wp-image-17724\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eaf2d31 elementor-widget elementor-widget-image-box\" data-id=\"eaf2d31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Centralized TO safety management<\/h3><p class=\"elementor-image-box-description\"><br>- Unified interface for monitoring, security policy management and dynamic rule adaptation.\n<br><br>- Easy integration with existing production environments.\n\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-435d110 e-con-full e-flex e-con e-child\" data-id=\"435d110\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-30ca9e2 e-con-full e-flex e-con e-child\" data-id=\"30ca9e2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a323f5a e-con-full e-flex e-con e-child\" data-id=\"a323f5a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1911031 elementor-widget elementor-widget-heading\" data-id=\"1911031\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa0b1c8 e-con-full e-flex e-con e-child\" data-id=\"fa0b1c8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc3cd25 elementor-widget elementor-widget-image\" data-id=\"cc3cd25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"344\" height=\"101\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Logo-Cybereco-bleu-Midnight@4x.png\" class=\"attachment-large size-large wp-image-11124\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a47ef40 e-con-full e-flex e-con e-child\" data-id=\"5a47ef40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d5317b e-con-full toggle-title e-flex e-con e-child\" data-id=\"d5317b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-367e6c44 e-con-full e-flex e-con e-child\" data-id=\"367e6c44\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ecdcf93 e-con-full e-flex e-con e-child\" data-id=\"2ecdcf93\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-289c481d elementor-widget elementor-widget-heading\" data-id=\"289c481d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Post-quantum cryptography community<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-441c8221 elementor-widget elementor-widget-heading\" data-id=\"441c8221\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Preparing for the transition, mitigating risks<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37c0b414 e-con-full e-flex e-con e-child\" data-id=\"37c0b414\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ddea2cf icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ddea2cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8511899 icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8511899\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34f0ba90 e-con-full content-accordeon e-flex e-con e-child\" data-id=\"34f0ba90\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-13dfed2c e-con-full e-flex e-con e-child\" data-id=\"13dfed2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10cf40b1 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"10cf40b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Post-Quantum Cryptography community was created to support Cybereco member organizations in the face of a major technological transformation: the imminent arrival of quantum computing and the risks it poses for current cryptography.<\/p><p>The objective is clear: to put in place a structured and adapted transition framework to enable organizations to prepare for this revolution now, and thus mitigate the risks associated with the future compromise of traditional cryptographic algorithms.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-11a5cff9 e-con-full e-flex e-con e-child\" data-id=\"11a5cff9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-61f54a00 e-con-full e-flex e-con e-child\" data-id=\"61f54a00\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-372d8e78 elementor-widget elementor-widget-heading\" data-id=\"372d8e78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main deliverable  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44d6c020 elementor-widget elementor-widget-text-editor\" data-id=\"44d6c020\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The community is working on a strategic and operational support framework to facilitate the migration to quantum-attack-resistant cryptography.<\/p><p>This framework will include :<\/p><ul><li>An inventory of the risks associated with the emergence of quantum computing ;<\/li><li>Concrete mitigation measures (crypto-agility, asset management, prioritization) ;<\/li><li>Transition planning tools ;<\/li><li>Examples of progressive implementation (roadmap, best practices, multi-year migration plan).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ca9b7f4 e-con-full e-flex e-con e-child\" data-id=\"5ca9b7f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b46bb64 elementor-widget elementor-widget-heading\" data-id=\"7b46bb64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why this approach  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cdf5521 elementor-widget elementor-widget-text-editor\" data-id=\"6cdf5521\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Cryptography is the foundation of modern digital security. But this foundation will be undermined as soon as quantum computers reach a critical power threshold. <\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><p><span data-contrast=\"auto\">Waiting for the threat to become a reality means exposing yourself to retroactive attacks on sensitive data stored today.<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><p><span data-contrast=\"auto\">By structuring the transition now, this community enables organizations to :<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><ul><li><span data-contrast=\"auto\">  Anticipating technological and regulatory impacts;<\/span><\/li><li><span data-contrast=\"auto\">  Avoid rushing into decisions under pressure;<\/span><\/li><li><span data-contrast=\"auto\">  Protect their assets, customers and reputation over the long term.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-371a0f1c e-con-full e-flex e-con e-child\" data-id=\"371a0f1c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69dfd149 elementor-widget elementor-widget-heading\" data-id=\"69dfd149\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What we're working on  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b2c7e75 elementor-widget elementor-widget-text-editor\" data-id=\"4b2c7e75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW225001347 BCX8\" lang=\"FR-CA\" xml:lang=\"FR-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW225001347 BCX8\">The guide is structured along the following lines:<\/span><\/span><span class=\"EOP SCXW225001347 BCX8\" data-ccp-props=\"{\"134233117\":true,\"134233118\":true,\"335551550\":6,\"335551620\":6}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c32e698 e-con-full e-flex e-con e-child\" data-id=\"7c32e698\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2acb3c76 e-con-full e-flex e-con e-child\" data-id=\"2acb3c76\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e899dd7 elementor-widget elementor-widget-image\" data-id=\"e899dd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CryptographiePost-quantique_ComprehensionMenace_L.svg\" class=\"attachment-large size-large wp-image-16240\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f77bf08 elementor-widget elementor-widget-image\" data-id=\"f77bf08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CryptographiePost-quantique_ComprehensionMenace_D.svg\" class=\"attachment-large size-large wp-image-16238\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a33a1a elementor-widget elementor-widget-image-box\" data-id=\"4a33a1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Understanding the threat<\/h3><p class=\"elementor-image-box-description\">Explanation of the impact of quantum on RSA, ECC and other classical algorithms; \"store now, decrypt later\" scenario.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23b56153 e-con-full e-flex e-con e-child\" data-id=\"23b56153\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5337caf elementor-widget elementor-widget-image\" data-id=\"5337caf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CryptographiePost-quantique_CartographieActifsCrypto_L.svg\" class=\"attachment-large size-large wp-image-16236\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5137b6b elementor-widget elementor-widget-image\" data-id=\"5137b6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CryptographiePost-quantique_CartographieActifsCrypto_D.svg\" class=\"attachment-large size-large wp-image-16234\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44ae23de elementor-widget elementor-widget-image-box\" data-id=\"44ae23de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Cryptographic asset mapping<\/h3><p class=\"elementor-image-box-description\">Identification of systems, data and suppliers at risk.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a5d5ff e-con-full e-flex e-con e-child\" data-id=\"4a5d5ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-978249d elementor-widget elementor-widget-image\" data-id=\"978249d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CryptographiePost-quantique_PlanMigrationVersCrypto_Lsvg.svg\" class=\"attachment-large size-large wp-image-16248\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a579e1 elementor-widget elementor-widget-image\" data-id=\"4a579e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CryptographiePost-quantique_EvaluationImpactsOrganisationnels_D.svg\" class=\"attachment-large size-large wp-image-16242\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f38ca61 elementor-widget elementor-widget-image-box\" data-id=\"2f38ca61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Organizational impact assessment  <\/h3><p class=\"elementor-image-box-description\">Legal (Law 25, RGPD), technological (hardware, software) and operational (supply chains) aspects.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14b0a8cb e-con-full e-flex e-con e-child\" data-id=\"14b0a8cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55c6e35 elementor-widget elementor-widget-image\" data-id=\"55c6e35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CryptographiePost-quantique_EvaluationImpactsOrganisationnels_L.svg\" class=\"attachment-large size-large wp-image-16244\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5d9a59 elementor-widget elementor-widget-image\" data-id=\"e5d9a59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CryptographiePost-quantique_PlanMigrationVersCrypto_D.svg\" class=\"attachment-large size-large wp-image-16246\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9e84b7 elementor-widget elementor-widget-image-box\" data-id=\"a9e84b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Migration plan to post-quantum cryptography (CPQ)  <\/h3><p class=\"elementor-image-box-description\">Definition of priorities, integration of crypto-agility, alignment with NIST recommendations.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-355ae1c2 e-con-full e-flex e-con e-child\" data-id=\"355ae1c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef08797 elementor-widget elementor-widget-image\" data-id=\"ef08797\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CryptographiePost-quantique_SensibilisationDirectionsPartiesPrenantes_L.svg\" class=\"attachment-large size-large wp-image-16252\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13d507f elementor-widget elementor-widget-image\" data-id=\"13d507f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CryptographiePost-quantique_SensibilisationDirectionsPartiesPrenantes_D.svg\" class=\"attachment-large size-large wp-image-16250\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ff25d43 elementor-widget elementor-widget-image-box\" data-id=\"3ff25d43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Raising awareness among management and stakeholders<\/h3><p class=\"elementor-image-box-description\">Get the subject recognized as a strategic risk that needs to be addressed now.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e84186 e-con-full e-flex e-con e-child\" data-id=\"7e84186\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3948346 e-con-full e-flex e-con e-child\" data-id=\"3948346\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55c08a2 elementor-widget elementor-widget-heading\" data-id=\"55c08a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-521b427 e-con-full e-flex e-con e-child\" data-id=\"521b427\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b91c45 elementor-widget elementor-widget-image\" data-id=\"2b91c45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"164\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png\" class=\"attachment-large size-large wp-image-10145\" alt=\"\" srcset=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png 1400w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-800x164.png 800w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-768x157.png 768w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1536x315.png 1536w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-2048x420.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-337d0893 e-con-full e-flex e-con e-child\" data-id=\"337d0893\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-59d6a939 e-con-full toggle-title e-flex e-con e-child\" data-id=\"59d6a939\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-398c0dc7 e-con-full e-flex e-con e-child\" data-id=\"398c0dc7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-132fe56c e-con-full e-flex e-con e-child\" data-id=\"132fe56c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7055b0fe elementor-widget elementor-widget-heading\" data-id=\"7055b0fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Community Data protection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-318b0cbb elementor-widget elementor-widget-heading\" data-id=\"318b0cbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Structuring, labeling and securing information<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b378032 e-con-full e-flex e-con e-child\" data-id=\"7b378032\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-816fef0 icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"816fef0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c44082 icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"0c44082\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-550b1a23 e-con-full content-accordeon e-flex e-con e-child\" data-id=\"550b1a23\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1046467a e-con-full e-flex e-con e-child\" data-id=\"1046467a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f1b61f0 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3f1b61f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW181897825 BCX0\" lang=\"FR-CA\" xml:lang=\"FR-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW181897825 BCX0\">The Data Protection community was created in response to the growing challenges associated with managing unstructured data, which today accounts for a large and growing proportion of all data. <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW181897825 BCX0\">and often<\/span><span class=\"NormalTextRun SCXW181897825 BCX0\"> often <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW181897825 BCX0\">neglected part of the<\/span><span class=\"NormalTextRun SCXW181897825 BCX0\">  organizations&#8217; information assets. This data (documents, e-mails, images, videos, messages, etc.) is difficult to inventory, classify and protect, making it a major vector of legal, operational and strategic risk. <\/span><\/span><span class=\"EOP SCXW181897825 BCX0\" data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2af703d2 e-con-full e-flex e-con e-child\" data-id=\"2af703d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1c678bd4 e-con-full e-flex e-con e-child\" data-id=\"1c678bd4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-efb13df elementor-widget elementor-widget-heading\" data-id=\"efb13df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main deliverable  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66698ca1 elementor-widget elementor-widget-text-editor\" data-id=\"66698ca1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The community is working on a practical guide to protecting unstructured data, with a particular focus on labeling, governance, compliance (Law 25, RGPD) and technological tools.<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><p><span data-contrast=\"auto\">This guide is aimed at a multidisciplinary audience: CIOs, DPOs, security managers, IT architects, data managers and operational teams.<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2180010c e-con-full e-flex e-con e-child\" data-id=\"2180010c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d58f85e elementor-widget elementor-widget-heading\" data-id=\"3d58f85e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why this approach  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69753d52 elementor-widget elementor-widget-text-editor\" data-id=\"69753d52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Regulatory obligations (notably Bill 25 in Quebec) demand rigorous control of personal information, including in unstructured formats. Yet most organizations underestimate the volume and sensitivity of this data. <br><\/span><span data-contrast=\"auto\">This community aims to :<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><ul><li><span data-contrast=\"auto\">  Strengthen collective expertise on these technical, legal and organizational issues;<\/span><\/li><li><span data-contrast=\"auto\">  Equip organizations with applicable practices and concrete models;<\/span><\/li><li><span data-contrast=\"auto\">  Foster innovation in information security, based on a collaborative and evolutionary approach.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-259a0453 e-con-full e-flex e-con e-child\" data-id=\"259a0453\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a32077f elementor-widget elementor-widget-heading\" data-id=\"1a32077f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What we're working on  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c2ab966 e-con-full e-flex e-con e-child\" data-id=\"6c2ab966\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-53c02784 e-con-full e-flex e-con e-child\" data-id=\"53c02784\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23900ab elementor-widget elementor-widget-image\" data-id=\"23900ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProtectionDonnees_ComprehensionDonneesNonStruct_D.svg\" class=\"attachment-large size-large wp-image-16350\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b34b511 elementor-widget elementor-widget-image\" data-id=\"b34b511\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProtectionDonnees_ComprehensionDonneesNonStruct_L.svg\" class=\"attachment-large size-large wp-image-16352\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c1c588c elementor-widget elementor-widget-image-box\" data-id=\"4c1c588c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Understanding unstructured data  <\/h3><p class=\"elementor-image-box-description\"><br>- Definition, use cases, distinctions with structured and semi-structured data;\n<br><br>\n- Specific problems: lack of schema, varied formats, accessibility, dispersed storage.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50691773 e-con-full e-flex e-con e-child\" data-id=\"50691773\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57b615d elementor-widget elementor-widget-image\" data-id=\"57b615d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProtectionDonnees_PourquoiEtiqueter_D.svg\" class=\"attachment-large size-large wp-image-16358\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-324ff3f elementor-widget elementor-widget-image\" data-id=\"324ff3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProtectionDonnees_PourquoiEtiqueter_L.svg\" class=\"attachment-large size-large wp-image-16360\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5169ec82 elementor-widget elementor-widget-image-box\" data-id=\"5169ec82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Why label data?  <\/h3><p class=\"elementor-image-box-description\"><br>Legal reasons (Act 25, RGPD, NIST) and compliance issues; \n<br><br>\nInformation security: classification, protection, encryption; \n<br><br>\nEfficiency: automation, archiving, lifecycle, risk reduction.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-452fa052 e-con-full e-flex e-con e-child\" data-id=\"452fa052\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36693bc elementor-widget elementor-widget-image\" data-id=\"36693bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProtectionDonnees_Taxonomie_D.svg\" class=\"attachment-large size-large wp-image-16362\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d3ef2b elementor-widget elementor-widget-image\" data-id=\"9d3ef2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProtectionDonnees_Taxonomie_L.svg\" class=\"attachment-large size-large wp-image-16364\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f8df6f6 elementor-widget elementor-widget-image-box\" data-id=\"3f8df6f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Taxonomy and labeling systems  <\/h3><p class=\"elementor-image-box-description\"><br>Sensitivity, compliance and business labels; \n<br><br>Recognized standards (Microsoft Purview, ISO\/IEC 27001\/27002); \n<br><br>Integration into Microsoft 365, DLP, SIEM, etc. environments.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ceadbef e-con-full e-flex e-con e-child\" data-id=\"4ceadbef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f58ce19 elementor-widget elementor-widget-image\" data-id=\"f58ce19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProtectionDonnees_EtapesProjetClass_D.svg\" class=\"attachment-large size-large wp-image-16354\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e1033d elementor-widget elementor-widget-image\" data-id=\"7e1033d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProtectionDonnees_EtapesProjetClass_L.svg\" class=\"attachment-large size-large wp-image-16356\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c5f7e8d elementor-widget elementor-widget-image-box\" data-id=\"1c5f7e8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Stages of a classification project  <\/h3><p class=\"elementor-image-box-description\"><br>Identification of sources, scope and objectives; \n<br><br>Selection of tools (manual, automated, classification AI); \n<br><br>Deployment, training, adoption and ongoing governance.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f2d062b e-con-full e-flex e-con e-child\" data-id=\"7f2d062b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d3ae51 elementor-widget elementor-widget-image\" data-id=\"4d3ae51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProtectionDonnees_BonnesPratiques_D.svg\" class=\"attachment-large size-large wp-image-16346\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d6b84c elementor-widget elementor-widget-image\" data-id=\"4d6b84c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/ProtectionDonnees_BonnesPratiques_L.svg\" class=\"attachment-large size-large wp-image-16348\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4260d489 elementor-widget elementor-widget-image-box\" data-id=\"4260d489\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Best practices and pitfalls to avoid  <\/h3><p class=\"elementor-image-box-description\"><br>Avoid under\/over-classification; \n<br><br>Keep classification alive and relevant; \n<br><br>Align policies with business needs and legal requirements.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4503837 e-con-full e-flex e-con e-child\" data-id=\"4503837\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6d96d06 e-con-full e-flex e-con e-child\" data-id=\"6d96d06\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3b5b7b elementor-widget elementor-widget-heading\" data-id=\"f3b5b7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a714367 e-con-full e-flex e-con e-child\" data-id=\"a714367\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-70e2ec4 elementor-widget elementor-widget-image\" data-id=\"70e2ec4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"164\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png\" class=\"attachment-large size-large wp-image-10145\" alt=\"\" srcset=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png 1400w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-800x164.png 800w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-768x157.png 768w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1536x315.png 1536w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-2048x420.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bbbfff e-con-full e-flex e-con e-child\" data-id=\"bbbfff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1613e04d e-con-full toggle-title e-flex e-con e-child\" data-id=\"1613e04d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-62fc4e8f e-con-full e-flex e-con e-child\" data-id=\"62fc4e8f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-779804d9 e-con-full e-flex e-con e-child\" data-id=\"779804d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74ee72af elementor-widget elementor-widget-heading\" data-id=\"74ee72af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DevSecOps &amp; AppSec community<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40dca6cd elementor-widget elementor-widget-heading\" data-id=\"40dca6cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Securing development, equipping teams  <\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69f23c40 e-con-full e-flex e-con e-child\" data-id=\"69f23c40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e1adbf icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"4e1adbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80618b6 icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"80618b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-193bef60 e-con-full content-accordeon e-flex e-con e-child\" data-id=\"193bef60\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-61f90fb3 e-con-full e-flex e-con e-child\" data-id=\"61f90fb3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69f27306 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"69f27306\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW39720726 BCX0\" lang=\"FR-CA\" xml:lang=\"FR-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW39720726 BCX0\">This community aims to integrate cybersecurity into all stages of the software development cycle. By combining   <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW39720726 BCX0\">DevSecOps<\/span><span class=\"NormalTextRun SCXW39720726 BCX0\"> and <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW39720726 BCX0\">AppSec<\/span><span class=\"NormalTextRun SCXW39720726 BCX0\">Its mission is to strengthen application and infrastructure security, while adapting practices to the realities of Quebec organizations.<\/span><\/span><span class=\"EOP SCXW39720726 BCX0\" data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c31775c e-con-full e-flex e-con e-child\" data-id=\"2c31775c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2361c07a e-con-full e-flex e-con e-child\" data-id=\"2361c07a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c441372 elementor-widget elementor-widget-heading\" data-id=\"6c441372\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Objectives  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-777d021a elementor-widget elementor-widget-text-editor\" data-id=\"777d021a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span data-contrast=\"auto\">  Create a forum for practitioners to share challenges, tools and best practices;<\/span><\/li><li><span data-contrast=\"auto\">  Promote the adoption of &#8220;by design&#8221; security right from the software design stage;<\/span><\/li><li><span data-contrast=\"auto\">  Identify relevant partners, tools and frames of reference within the Canadian ecosystem;<\/span><\/li><li><span data-contrast=\"auto\">  Collectively evaluate centralization strategies, RACI models and remediation approaches ;<\/span><\/li><li><span data-contrast=\"auto\">  Promote a culture of security among developers, with structuring support from the AppSec team.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46ca93fa e-con-full e-flex e-con e-child\" data-id=\"46ca93fa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c50c5a0 elementor-widget elementor-widget-heading\" data-id=\"3c50c5a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why it matters  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4260158e elementor-widget elementor-widget-text-editor\" data-id=\"4260158e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">At a time when software vulnerabilities account for a growing proportion of security incidents, this community enables :<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><ul><li><span data-contrast=\"auto\">  Aligning development and cybersecurity practices in a collaborative approach;<\/span><\/li><li><span data-contrast=\"auto\">  Take advantage of feedback from organizations of all sizes;<\/span><\/li><li><span data-contrast=\"auto\">  Develop practices pragmatically, in line with the constraints and operational realities of IT teams.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-116b964b e-con-full e-flex e-con e-child\" data-id=\"116b964b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7317408f elementor-widget elementor-widget-heading\" data-id=\"7317408f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deliverables and work in progress  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d714807 elementor-widget elementor-widget-text-editor\" data-id=\"6d714807\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW225001347 BCX8\" lang=\"FR-CA\" xml:lang=\"FR-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW225001347 BCX8\">The guide is structured along the following lines:<\/span><\/span><span class=\"EOP SCXW225001347 BCX8\" data-ccp-props=\"{\"134233117\":true,\"134233118\":true,\"335551550\":6,\"335551620\":6}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33ba792 e-con-full e-flex e-con e-child\" data-id=\"33ba792\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-442d2aad e-con-full e-flex e-con e-child\" data-id=\"442d2aad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a7292e4 elementor-widget elementor-widget-image\" data-id=\"a7292e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/DevSecOps_SessionsThematique_L.svg\" class=\"attachment-large size-large wp-image-16296\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7a35b1 elementor-widget elementor-widget-image\" data-id=\"c7a35b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/DevSecOps_SessionsThematique_D.svg\" class=\"attachment-large size-large wp-image-16294\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15fabe8c elementor-widget elementor-widget-image-box\" data-id=\"15fabe8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Thematic sessions based on real cases and AppSec roadmaps  <\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68983b4a e-con-full e-flex e-con e-child\" data-id=\"68983b4a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0461314 elementor-widget elementor-widget-image\" data-id=\"0461314\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/DevSecOps_AnalyseDeCentralisee_L.svg\" class=\"attachment-large size-large wp-image-16284\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-103dbe8 elementor-widget elementor-widget-image\" data-id=\"103dbe8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/DevSecOps_AnalyseDeCentralisee_D.svg\" class=\"attachment-large size-large wp-image-16282\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7701ef34 elementor-widget elementor-widget-image-box\" data-id=\"7701ef34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Comparative analysis of centralized vs. decentralized approaches to safety in development<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1138c958 e-con-full e-flex e-con e-child\" data-id=\"1138c958\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3027de7 elementor-widget elementor-widget-image\" data-id=\"3027de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/DevSecOps_DiscussionIntegrationModele_L.svg\" class=\"attachment-large size-large wp-image-16288\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f79a27 elementor-widget elementor-widget-image\" data-id=\"8f79a27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/DevSecOps_DiscussionIntegrationModele_D.svg\" class=\"attachment-large size-large wp-image-16286\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e3f406e elementor-widget elementor-widget-image-box\" data-id=\"4e3f406e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">  Discussions on integrating security models into CI\/CD pipelines, including secret detection, WAF \"as code\" management and SBOMs<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42cad290 e-con-full e-flex e-con e-child\" data-id=\"42cad290\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d740a7 elementor-widget elementor-widget-image\" data-id=\"8d740a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/DevSecOps_ElaborationRecommandation_L.svg\" class=\"attachment-large size-large wp-image-16292\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07f94e8 elementor-widget elementor-widget-image\" data-id=\"07f94e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/CryptographiePost-quantique_PlanMigrationVersCrypto_D.svg\" class=\"attachment-large size-large wp-image-16246\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b054fab elementor-widget elementor-widget-image-box\" data-id=\"1b054fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Development of recommendations on targeted training tools, threat modeling, partial remediation automation and internal CTFs as a culture lever.  <\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-edfe60d e-con-full e-flex e-con e-child\" data-id=\"edfe60d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-960e591 e-con-full e-flex e-con e-child\" data-id=\"960e591\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0212f0f elementor-widget elementor-widget-heading\" data-id=\"0212f0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e6a1c6e e-con-full e-flex e-con e-child\" data-id=\"e6a1c6e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-919970e elementor-widget elementor-widget-image\" data-id=\"919970e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"164\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png\" class=\"attachment-large size-large wp-image-10145\" alt=\"\" srcset=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png 1400w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-800x164.png 800w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-768x157.png 768w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1536x315.png 1536w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-2048x420.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-723ba755 e-con-full e-flex e-con e-child\" data-id=\"723ba755\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-acef85a e-con-full toggle-title e-flex e-con e-child\" data-id=\"acef85a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-61e85814 e-con-full e-flex e-con e-child\" data-id=\"61e85814\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-181784b8 e-con-full e-flex e-con e-child\" data-id=\"181784b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10c5b08a elementor-widget elementor-widget-heading\" data-id=\"10c5b08a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Loss Protection (DLP) Community of Practice  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72ddd9ab elementor-widget elementor-widget-heading\" data-id=\"72ddd9ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Prevent leaks, share best practices  <\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c45e506 e-con-full e-flex e-con e-child\" data-id=\"7c45e506\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5afb79 icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"b5afb79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8301b5 icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"d8301b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b182d76 e-con-full content-accordeon e-flex e-con e-child\" data-id=\"2b182d76\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-6a251e62 e-con-full e-flex e-con e-child\" data-id=\"6a251e62\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5bee07e2 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5bee07e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The DLP Data Loss Prevention community brings together technical experts from the public and private sectors to collectively strengthen the security posture of organizations in the face of the risks of exfiltration, leakage or mishandling of sensitive data.<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><p><span data-contrast=\"auto\">It aims to create a collaborative space for sharing configurations, testing innovative approaches, solving common challenges and supporting each other around data loss prevention platforms.<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7db7cda8 e-con-full e-flex e-con e-child\" data-id=\"7db7cda8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-680a25f7 e-con-full e-flex e-con e-child\" data-id=\"680a25f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b3b4c0c elementor-widget elementor-widget-heading\" data-id=\"2b3b4c0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Objectives  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1db94af8 elementor-widget elementor-widget-text-editor\" data-id=\"1db94af8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span data-contrast=\"auto\">  Create a forum for practical exchanges on DLP tools;<\/span><\/li><li><span data-contrast=\"auto\">  Document and compare labeling, encryption and policy configuration strategies;<\/span><\/li><li><span data-contrast=\"auto\">  Sharing learning from large organizations ;<\/span><\/li><li><span data-contrast=\"auto\">  Pool knowledge to avoid recurring errors;<\/span><\/li><li><span data-contrast=\"auto\">  Promote the adoption of technical best practices within cybersecurity teams.<\/span><\/li><li> <\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a172ee e-con-full e-flex e-con e-child\" data-id=\"8a172ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-408520ab elementor-widget elementor-widget-heading\" data-id=\"408520ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why it matters  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b7035af elementor-widget elementor-widget-text-editor\" data-id=\"1b7035af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">As sensitive data is increasingly dispersed across hybrid environments (cloud, local, mobile), DLP tools need to be finely tuned and adapted to the business context.<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><p><span data-contrast=\"auto\">This community enables organizations to :<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><ul><li><span data-contrast=\"auto\">  Share their successes and failures, to avoid duplication of effort;<\/span><\/li><li><span data-contrast=\"auto\">  Co-construct a common base of useful configurations, adapted to their realities;<\/span><\/li><li><span data-contrast=\"auto\">  Support innovation and operational agility, while maintaining strict compliance with regulatory obligations (Law 25, ISO standards, etc.).<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-487fb797 e-con-full e-flex e-con e-child\" data-id=\"487fb797\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c708c3b elementor-widget elementor-widget-heading\" data-id=\"7c708c3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Working shutters  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d851037 elementor-widget elementor-widget-text-editor\" data-id=\"2d851037\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The community is organized around several sub-themes and collaborative workshops:<\/span><span data-ccp-props=\"{\"134233117\":true,\"134233118\":true,\"335551550\":6,\"335551620\":6,\"335559685\":360}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48a63038 e-con-full e-flex e-con e-child\" data-id=\"48a63038\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6026b0c1 e-con-full e-flex e-con e-child\" data-id=\"6026b0c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88167aa elementor-widget elementor-widget-image\" data-id=\"88167aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/VoletsTravail_VMicrosoftPurview_L.svg\" class=\"attachment-large size-large wp-image-17317\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3982ed elementor-widget elementor-widget-image\" data-id=\"a3982ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/VoletsTravail_VMicrosoftPurview_D.svg\" class=\"attachment-large size-large wp-image-17327\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7aa191 elementor-widget elementor-widget-image-box\" data-id=\"f7aa191\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Microsoft Purview &amp; AIP pane  <\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6d6df8e5 e-con-full e-flex e-con e-child\" data-id=\"6d6df8e5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34343d5 elementor-widget elementor-widget-image\" data-id=\"34343d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/VoletsTravail_VRegExDetection_L.svg\" class=\"attachment-large size-large wp-image-17319\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83c87fe elementor-widget elementor-widget-image\" data-id=\"83c87fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/VoletsTravail_VRegExDetection_D.svg\" class=\"attachment-large size-large wp-image-17329\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b835a25 elementor-widget elementor-widget-image-box\" data-id=\"3b835a25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">RegEx &amp; detection section  <\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45326102 e-con-full e-flex e-con e-child\" data-id=\"45326102\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82da4a4 elementor-widget elementor-widget-image\" data-id=\"82da4a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/VoletsTravail_Volet-OCRSurveillanceExfiltration_L.svg\" class=\"attachment-large size-large wp-image-17321\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac59f82 elementor-widget elementor-widget-image\" data-id=\"ac59f82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/VoletsTravail_Volet-OCRSurveillanceExfiltration_D.svg\" class=\"attachment-large size-large wp-image-17331\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-185f7872 elementor-widget elementor-widget-image-box\" data-id=\"185f7872\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">OCR component &amp; exfiltration monitoring  <\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64088fc3 e-con-full e-flex e-con e-child\" data-id=\"64088fc3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54690cb elementor-widget elementor-widget-image\" data-id=\"54690cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/VoletsTravail_V_EDM_IRM_L.svg\" class=\"attachment-large size-large wp-image-17323\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4b88f2 elementor-widget elementor-widget-image\" data-id=\"a4b88f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/VoletsTravail_V_EDM_IRM_D.svg\" class=\"attachment-large size-large wp-image-17333\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36241885 elementor-widget elementor-widget-image-box\" data-id=\"36241885\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">EDM \/ IRM component (information rights management)  <\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-41de8768 e-con-full e-flex e-con e-child\" data-id=\"41de8768\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad46331 elementor-widget elementor-widget-image\" data-id=\"ad46331\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/VoletsTravail_V_SASE_NouvelleTech_L.svg\" class=\"attachment-large size-large wp-image-17325\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b295cb2 elementor-widget elementor-widget-image\" data-id=\"b295cb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/VoletsTravail_V_SASE_NouvelleTech_D.svg\" class=\"attachment-large size-large wp-image-17335\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b49aaff elementor-widget elementor-widget-image-box\" data-id=\"3b49aaff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">SASE &amp; new technologies  <\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-92c2ed1 e-con-full e-flex e-con e-child\" data-id=\"92c2ed1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4abe88a e-con-full e-flex e-con e-child\" data-id=\"4abe88a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-319107d elementor-widget elementor-widget-heading\" data-id=\"319107d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c3c2d17 e-con-full e-flex e-con e-child\" data-id=\"c3c2d17\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b6fc368 elementor-widget elementor-widget-image\" data-id=\"b6fc368\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"164\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png\" class=\"attachment-large size-large wp-image-10145\" alt=\"\" srcset=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png 1400w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-800x164.png 800w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-768x157.png 768w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1536x315.png 1536w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-2048x420.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-704e03d e-con-full e-flex e-con e-child\" data-id=\"704e03d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1ced2bab e-con-full toggle-title last-title e-flex e-con e-child\" data-id=\"1ced2bab\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-21a57d7b e-con-full e-flex e-con e-child\" data-id=\"21a57d7b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ce76e9d e-con-full e-flex e-con e-child\" data-id=\"2ce76e9d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a016b57 elementor-widget elementor-widget-heading\" data-id=\"a016b57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">GIA Community of Practice  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2d8dff elementor-widget elementor-widget-heading\" data-id=\"a2d8dff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Control access, protect assets  <\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71dda486 e-con-full e-flex e-con e-child\" data-id=\"71dda486\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77d16ab icon-close elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"77d16ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.2 6.05 8.45 12.79 8.45 0 7.45 0 7.45 12.79 .71 6.05 0 6.75 7.95 14.71 15.91 6.75 15.2 6.05\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99efebd icon-open elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"99efebd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" width=\".22in\" height=\".2in\" viewBox=\"0 0 15.91 14.71\"><polygon points=\"15.91 7.95 7.95 0 0 7.95 .71 8.66 7.45 1.91 7.45 14.71 8.45 14.71 8.45 1.91 15.2 8.66 15.91 7.95\"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d81aac3 e-con-full content-accordeon e-flex e-con e-child\" data-id=\"5d81aac3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1ef27ec5 e-con-full e-flex e-con e-child\" data-id=\"1ef27ec5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4597eb2e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"4597eb2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The GIA community was created to equip organizations in one of the critical foundations of their cybersecurity posture: identity and access management. As digital environments become more complex and distributed remote users, cloud access, third-party suppliers access control is becoming a strategic issue, as much to prevent intrusions as to comply with regulatory requirements (Law 25, RGPD, etc.). <\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><p><span data-contrast=\"auto\">The aim of this community is to bring together experts, architects, IT managers and governance professionals around concrete solutions adapted to the realities of Quebec organizations.<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a08fc9b e-con-full e-flex e-con e-child\" data-id=\"a08fc9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c4cb2c e-con-full e-flex e-con e-child\" data-id=\"c4cb2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-429aeb77 elementor-widget elementor-widget-heading\" data-id=\"429aeb77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Objectives  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e08dc03 elementor-widget elementor-widget-text-editor\" data-id=\"7e08dc03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span data-contrast=\"auto\">  Promote the sharing of identity and access management practices, models and architectures;<\/span><\/li><li><span data-contrast=\"auto\">  Clarify roles, responsibilities and processes related to the identity lifecycle (creation, modification, deletion);<\/span><\/li><li><span data-contrast=\"auto\">  Explore key technologies (IAM, IGA, MFA, SSO, RBAC, etc.) and their integration in various contexts;<\/span><\/li><li><span data-contrast=\"auto\">  Support alignment between IT teams, HR departments, security teams and management ;<\/span><\/li><li><span data-contrast=\"auto\">  Help organizations build consistent, sustainable and compliant IAM governance.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c3de604 e-con-full e-flex e-con e-child\" data-id=\"6c3de604\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26ca10f4 elementor-widget elementor-widget-heading\" data-id=\"26ca10f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why this approach  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55d1734a elementor-widget elementor-widget-text-editor\" data-id=\"55d1734a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Poor identity and access management is at the root of many security incidents. Yet it remains a major challenge, especially for organizations with limited resources or heterogeneous environments. <\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><p><span data-contrast=\"auto\">This community enables organizations to :<\/span><span data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p><ul><li><span data-contrast=\"auto\">  Develop a structured approach based on real-life use cases;<\/span><\/li><li><span data-contrast=\"auto\">  Improving resilience to internal and external threats ;<\/span><\/li><li><span data-contrast=\"auto\">  Simplify audits and reinforce compliance;<\/span><\/li><li><span data-contrast=\"auto\">  Reduce friction for end users, while increasing safety levels.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-760ff11a e-con-full e-flex e-con e-child\" data-id=\"760ff11a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76a5b8f9 elementor-widget elementor-widget-heading\" data-id=\"76a5b8f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Work in progress  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c33273d elementor-widget elementor-widget-text-editor\" data-id=\"c33273d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW97658408 BCX0\" lang=\"FR-CA\" xml:lang=\"FR-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW97658408 BCX0\">The community structures its exchanges and deliverables around the following axes:<\/span><\/span><span class=\"EOP SCXW97658408 BCX0\" data-ccp-props=\"{\"335551550\":6,\"335551620\":6}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-224089c4 e-con-full e-flex e-con e-child\" data-id=\"224089c4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-13e255fb e-con-full e-flex e-con e-child\" data-id=\"13e255fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fead6ef elementor-widget elementor-widget-image\" data-id=\"fead6ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/TravauxEnCours_ModelesGouvernanceGIA_D.svg\" class=\"attachment-large size-large wp-image-17337\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93f22e0 elementor-widget elementor-widget-image\" data-id=\"93f22e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/TravauxEnCours_ModelesGouvernanceGIA_L.svg\" class=\"attachment-large size-large wp-image-17347\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7741ecde elementor-widget elementor-widget-image-box\" data-id=\"7741ecde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">GIA governance models  <\/h3><p class=\"elementor-image-box-description\"><br>- Definition of roles (identity owners, approvers, operators, auditors); \n<br><br>- Stakeholder and process mapping.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5659e571 e-con-full e-flex e-con e-child\" data-id=\"5659e571\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b09a913 elementor-widget elementor-widget-image\" data-id=\"b09a913\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/TravauxEnCours_CycleVieIdentites_D.svg\" class=\"attachment-large size-large wp-image-17339\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18a79d0 elementor-widget elementor-widget-image\" data-id=\"18a79d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/TravauxEnCours_CycleVieIdentites_L.svg\" class=\"attachment-large size-large wp-image-17349\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd5a6d1 elementor-widget elementor-widget-image-box\" data-id=\"bd5a6d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Identity lifecycle  <\/h3><p class=\"elementor-image-box-description\"><br>- Onboarding, internal mobility, temporary access management, offboarding; \n<br><br>- Integration with HR systems, ERP, CRM, etc.  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ceedbe0 e-con-full e-flex e-con e-child\" data-id=\"4ceedbe0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9885682 elementor-widget elementor-widget-image\" data-id=\"9885682\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/TravauxEnCours_ControleAcces_D.svg\" class=\"attachment-large size-large wp-image-17341\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6df8103 elementor-widget elementor-widget-image\" data-id=\"6df8103\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/TravauxEnCours_ControleAcces_L.svg\" class=\"attachment-large size-large wp-image-17351\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f927344 elementor-widget elementor-widget-image-box\" data-id=\"6f927344\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Access control  <\/h3><p class=\"elementor-image-box-description\"><br>- RBAC, ABAC models, principles of least privilege, separation of duties; \n<br><br>- Privileged Access Management (PAM).  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42f10bf2 e-con-full e-flex e-con e-child\" data-id=\"42f10bf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11bae04 elementor-widget elementor-widget-image\" data-id=\"11bae04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/TravauxEnCours_AuthentificationFederation_D.svg\" class=\"attachment-large size-large wp-image-17343\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0650c4 elementor-widget elementor-widget-image\" data-id=\"e0650c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/TravauxEnCours_AuthentificationFederation_L.svg\" class=\"attachment-large size-large wp-image-17353\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-518481ed elementor-widget elementor-widget-image-box\" data-id=\"518481ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Authentication and federation  <\/h3><p class=\"elementor-image-box-description\"><br>- Implementation of multifactor authentication (MFA); \n<br><br>- SSO and identity federation (SAML, OAuth, OpenID Connect).  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b733d06 e-con-full e-flex e-con e-child\" data-id=\"1b733d06\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57f1a83 elementor-widget elementor-widget-image\" data-id=\"57f1a83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/TravauxEnCours_AuditsConformite_D.svg\" class=\"attachment-large size-large wp-image-17345\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81bdb72 elementor-widget elementor-widget-image\" data-id=\"81bdb72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/TravauxEnCours_AuditsConformite_L.svg\" class=\"attachment-large size-large wp-image-17355\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ee22f0 elementor-widget elementor-widget-image-box\" data-id=\"9ee22f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Audits and compliance  <\/h3><p class=\"elementor-image-box-description\"><br>- Access monitoring, periodic reviews, anomaly alerts; \n<br><br>- Alignment with regulatory requirements (Law 25, ISO 27001, etc.).  <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-95ff4d0 e-con-full e-flex e-con e-child\" data-id=\"95ff4d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-21bc122 e-con-full e-flex e-con e-child\" data-id=\"21bc122\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-744cc1c elementor-widget elementor-widget-heading\" data-id=\"744cc1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Main contractor<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8894aeb e-con-full e-flex e-con e-child\" data-id=\"8894aeb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-70e1d31 elementor-widget elementor-widget-image\" data-id=\"70e1d31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"164\" src=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png\" class=\"attachment-large size-large wp-image-10145\" alt=\"\" srcset=\"https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1400x287.png 1400w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-800x164.png 800w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-768x157.png 768w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-1536x315.png 1536w, https:\/\/cybereco.ca\/wp-content\/uploads\/E5B-BNC-2048x420.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28f38569 e-flex e-con-boxed e-con e-parent\" data-id=\"28f38569\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d1093f3 elementor-widget elementor-widget-html\" data-id=\"5d1093f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Styles du switch --><style>.theme-toggle-container {\r\n    position: fixed;\r\n    bottom: 1rem;\r\n    right: 1rem;\r\n    z-index: 9999;\r\n  }\r\n  .theme-switch {\r\n    display: inline-block;\r\n    width: 3.5rem;\r\n    height: 1.8rem;\r\n    position: relative;\r\n  }\r\n  .theme-switch input {\r\n    opacity: 0;\r\n    width: 0;\r\n    height: 0;\r\n  }\r\n  .theme-slider {\r\n    position: absolute;\r\n    cursor: pointer;\r\n    inset: 0;\r\n    background: #ffffff;        \/* track clair *\/\r\n    border: 2px solid #6EBD4A;  \/* bordure accent *\/\r\n    border-radius: 1rem;\r\n    transition: background 0.3s, border-color 0.3s;\r\n  }\r\n  .theme-slider::before {\r\n    content: '\ud83c\udf19';\r\n    position: absolute;\r\n    top: 50%;\r\n    left: 0.2rem;\r\n    transform: translateY(-50%);\r\n    font-size: 1rem;\r\n    transition: left 0.3s, content 0.3s, background 0.3s;\r\n    width: 1.4rem;\r\n    height: 1.4rem;\r\n    line-height: 1.4rem;\r\n    text-align: center;\r\n    border-radius: 50%;\r\n    background: #6EBD4A;        \/* pastille clair *\/\r\n    color: #ffffff;             \/* ic\u00f4ne clair *\/\r\n  }\r\n  .theme-switch input:checked + .theme-slider {\r\n    background: #6EBD4A;        \/* track sombre *\/\r\n    border-color: #6EBD4A;\r\n  }\r\n  .theme-switch input:checked + .theme-slider::before {\r\n    left: calc(100% - 1.6rem);\r\n    content: '\u2600\ufe0e';\r\n    background: #ffffff;        \/* pastille sombre *\/\r\n    color: #6EBD4A;             \/* ic\u00f4ne sombre *\/\r\n  }\r\n<\/style><!-- HTML du switch --><div class=\"theme-toggle-container\"><label class=\"theme-switch\"><input type=\"checkbox\" id=\"theme-toggle\"><span class=\"theme-slider\"><\/span><\/label><\/div><!-- JavaScript de bascule --><script>(function(){\r\n    var toggle = document.getElementById('theme-toggle'),\r\n        root   = document.documentElement;\r\n\r\n    \/\/ Initialisation\r\n    if (localStorage.getItem('theme') === 'dark') {\r\n      root.setAttribute('data-theme','dark');\r\n      toggle.checked = true;\r\n    }\r\n\r\n    \/\/ Changement\r\n    toggle.addEventListener('change', function(){\r\n      if (this.checked) {\r\n        root.setAttribute('data-theme','dark');\r\n        localStorage.setItem('theme','dark');\r\n      } else {\r\n        root.removeAttribute('data-theme');\r\n        localStorage.removeItem('theme');\r\n      }\r\n    });\r\n  })();\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Our distinctive experience Our distinctive experience Driven by collaboration between its members, Cybereco&#8217;s projects tackle the challenges of cybersecurity in concrete terms. By leveraging collective intelligence, the organization fosters the co-creation of innovative solutions, the development of concrete tools and a positive influence on the sector&#8217;s direction. Its agile, impact-driven approach enables us to anticipate [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","content-type":"","footnotes":""},"class_list":["post-16378","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Projects - Cybereco<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybereco.ca\/en\/projects\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Projects - Cybereco\" \/>\n<meta property=\"og:description\" content=\"Our distinctive experience Our distinctive experience Driven by collaboration between its members, Cybereco&#8217;s projects tackle the challenges of cybersecurity in concrete terms. By leveraging collective intelligence, the organization fosters the co-creation of innovative solutions, the development of concrete tools and a positive influence on the sector&#8217;s direction. Its agile, impact-driven approach enables us to anticipate [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybereco.ca\/en\/projects\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybereco\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybereco.ca\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T14:18:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybereco.ca\/wp-content\/uploads\/cybereco_logo_only.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Cybereco1\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"21 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/projects\\\/\",\"url\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/projects\\\/\",\"name\":\"Projects - Cybereco\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/projects\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/projects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybereco.ca\\\/wp-content\\\/uploads\\\/Cybertrousse_Hameconnage_L.svg\",\"datePublished\":\"2025-07-31T15:42:55+00:00\",\"dateModified\":\"2026-04-28T14:18:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/projects\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybereco.ca\\\/en\\\/projects\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/projects\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybereco.ca\\\/wp-content\\\/uploads\\\/Cybertrousse_Hameconnage_L.svg\",\"contentUrl\":\"https:\\\/\\\/cybereco.ca\\\/wp-content\\\/uploads\\\/Cybertrousse_Hameconnage_L.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/projects\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/\",\"name\":\"Cybereco\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Projects - Cybereco","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybereco.ca\/en\/projects\/","og_locale":"en_US","og_type":"article","og_title":"Projects - Cybereco","og_description":"Our distinctive experience Our distinctive experience Driven by collaboration between its members, Cybereco&#8217;s projects tackle the challenges of cybersecurity in concrete terms. By leveraging collective intelligence, the organization fosters the co-creation of innovative solutions, the development of concrete tools and a positive influence on the sector&#8217;s direction. Its agile, impact-driven approach enables us to anticipate [&hellip;]","og_url":"https:\/\/cybereco.ca\/en\/projects\/","og_site_name":"Cybereco","article_publisher":"https:\/\/www.facebook.com\/cybereco.ca\/","article_modified_time":"2026-04-28T14:18:39+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/cybereco.ca\/wp-content\/uploads\/cybereco_logo_only.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Cybereco1","twitter_misc":{"Est. reading time":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cybereco.ca\/en\/projects\/","url":"https:\/\/cybereco.ca\/en\/projects\/","name":"Projects - Cybereco","isPartOf":{"@id":"https:\/\/cybereco.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybereco.ca\/en\/projects\/#primaryimage"},"image":{"@id":"https:\/\/cybereco.ca\/en\/projects\/#primaryimage"},"thumbnailUrl":"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_Hameconnage_L.svg","datePublished":"2025-07-31T15:42:55+00:00","dateModified":"2026-04-28T14:18:39+00:00","breadcrumb":{"@id":"https:\/\/cybereco.ca\/en\/projects\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybereco.ca\/en\/projects\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybereco.ca\/en\/projects\/#primaryimage","url":"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_Hameconnage_L.svg","contentUrl":"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_Hameconnage_L.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/cybereco.ca\/en\/projects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cybereco.ca\/en\/"},{"@type":"ListItem","position":2,"name":"Projects"}]},{"@type":"WebSite","@id":"https:\/\/cybereco.ca\/en\/#website","url":"https:\/\/cybereco.ca\/en\/","name":"Cybereco","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybereco.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/pages\/16378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/comments?post=16378"}],"version-history":[{"count":35,"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/pages\/16378\/revisions"}],"predecessor-version":[{"id":18356,"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/pages\/16378\/revisions\/18356"}],"wp:attachment":[{"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/media?parent=16378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}