
{"id":1614,"date":"2021-06-04T16:46:13","date_gmt":"2021-06-04T14:46:13","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=1614"},"modified":"2021-06-04T16:49:09","modified_gmt":"2021-06-04T14:49:09","slug":"les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/","title":{"rendered":"Les enjeux de s\u00e9curit\u00e9 informatique en Afrique au c\u0153ur du Cyber Africa Forum d&rsquo;Abidjan"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"799\" height=\"449\" src=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/image-7.png\" alt=\"\" class=\"wp-image-1615\" srcset=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/image-7.png 799w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/image-7-300x169.png 300w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/image-7-768x432.png 768w\" sizes=\"auto, (max-width: 799px) 100vw, 799px\" \/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>Le continent africain subit quotidiennement des piratages informatiques. Et comme c\u2019est le cas pour toutes les r\u00e9gions du monde, la cybercriminalit\u00e9 est nuisible au d\u00e9veloppement \u00e9conomique. Le Cyber Africa Forum se penche sur ce fl\u00e9au, le 7 juin prochain, \u00e0 Abidjan.<\/strong><\/p>\n\n\n\n<p>En Afrique comme ailleurs, des organisations criminelles ou des entit\u00e9s para-\u00e9tatiques multiplient les attaques informatiques contre les infrastructures num\u00e9riques critiques de nombreux pays. Des cyberflibustiers sans vergogne&nbsp;profitent de l\u2019\u00e9pid\u00e9mie de Covid-19 pour ran\u00e7onner des \u00e9tablissements hospitaliers d\u00e9j\u00e0 fragilis\u00e9s par la crise sanitaire ou piratent des institutions financi\u00e8res.<\/p>\n\n\n\n<p>C\u2019est pour endiguer ce fl\u00e9au que le&nbsp;<a href=\"https:\/\/cyberafricaforum.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Forum international de la cybers\u00e9curit\u00e9<\/strong><\/a>&nbsp;donne rendez-vous aux acteurs et experts de la cybers\u00e9curit\u00e9 africains et internationaux \u00e0 Abidjan, en C\u00f4te d\u2019Ivoire, le 7 juin prochain. L\u2019\u00e9v\u00e9nement est plac\u00e9 sous le haut patronage de Roger Adom, ministre de l\u2019\u00c9conomie num\u00e9rique de la R\u00e9publique de C\u00f4te d\u2019Ivoire et soutenu, entre autres, par la C\u00e9d\u00e9ao. Il r\u00e9unit \u00e0 la fois des d\u00e9cideurs politiques, des d\u00e9l\u00e9gu\u00e9s de grands groupes bancaires ou des t\u00e9l\u00e9communications, des experts en cyberd\u00e9fense et des repr\u00e9sentants de la soci\u00e9t\u00e9 civile.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Des pr\u00e9judices financiers importants<\/h2>\n\n\n\n<p>Ces rencontres ont pour objectif d\u2019inscrire les menaces cyber au c\u0153ur des probl\u00e9matiques de d\u00e9veloppement. Cela repr\u00e9sente un&nbsp;enjeu \u00e9norme pour toute l\u2019Afrique, qui doit pr\u00e9server et prot\u00e9ger une \u00e9mergence \u00e9conomique port\u00e9e de longue date par le num\u00e9rique et que partagent la plupart des pays africains, pr\u00e9cise Franck Ki\u00e9, expert et consultant sur les questions de cybergouvernance et organisateur de l\u2019\u00e9v\u00e9nement : \u00ab&nbsp;<em>La plupart des menaces profitent de la m\u00e9connaissance du probl\u00e8me et, donc, des faiblesses humaines. Une des premi\u00e8res solutions est la sensibilisation du public pour que le plus grand nombre soit au courant de ces risques qui p\u00e8sent sur l\u2019ensemble des syst\u00e8mes \u00e9conomiques africains. Aujourd\u2019hui, on parle de 1<\/em>&nbsp;<em>000 milliards de dollars de pr\u00e9judices financiers imputables \u00e0 la cybercriminalit\u00e9 au niveau mondial et de 4 milliards de dollars de pertes pour l\u2019Afrique avec ces attaques informatiques qui sont devenues de plus en plus sophistiqu\u00e9es.&nbsp;<\/em>\u00bb<\/p>\n\n\n\n<p>Entre janvier et ao\u00fbt 2020, 28 millions d\u2019attaques informatiques sophistiqu\u00e9es ont \u00e9t\u00e9 lanc\u00e9es \u00e0 travers le continent. La plupart sont parvenues \u00e0 leur fin.&nbsp;Parmi les cibles de pr\u00e9dilection des pirates, les institutions financi\u00e8res, victimes \u00e0 85% de ces attaques, puis les bases de donn\u00e9es gouvernementales et enfin les enseignes du commerce \u00e9lectronique qui ont permis \u00e0 l\u2019ensemble des pays africains de d\u00e9velopper une \u00e9conomie num\u00e9rique en pleine expansion.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Quels moyens ?<\/h2>\n\n\n\n<p>\u00ab<em>\u00a0Nos \u00c9tats doivent donc mettre en place, tr\u00e8s rapidement, les structures de gouvernance pour parvenir \u00e0 endiguer ce fl\u00e9au quand elles n\u2019existent pas, mettre en place des l\u00e9gislations ou du moins les renforcer pour qu\u2019elles soient efficaces. Mais les gouvernements en Afrique doivent aussi investir massivement dans les infrastructures et dans la formation de sp\u00e9cialistes en syst\u00e8mes d\u2019information. Aujourd\u2019hui, on estime \u00e0 3,5 millions de personnes qualifi\u00e9es en cybers\u00e9curit\u00e9 dans le monde. En Afrique, ces professionnels ne sont qu\u2019environ 10\u00a0000. Cela repr\u00e9sente un vrai foss\u00e9 qu\u2019il faut d\u00e9sormais combler pour se donner les moyens de lutte contre la cybercriminalit\u00e9\u00a0<\/em>\u00bb, estime Franck Ki\u00e9.<\/p>\n\n\n\n<p>RFI<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le continent africain subit quotidiennement des piratages informatiques. Et comme c\u2019est le cas pour toutes les r\u00e9gions du monde, la cybercriminalit\u00e9 est nuisible au d\u00e9veloppement \u00e9conomique. Le Cyber Africa Forum [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1617,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,7,195,11],"tags":[],"class_list":["post-1614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-afrique","category-cyberespionnage","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les enjeux de s\u00e9curit\u00e9 informatique en Afrique au c\u0153ur du Cyber Africa Forum d&#039;Abidjan - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les enjeux de s\u00e9curit\u00e9 informatique en Afrique au c\u0153ur du Cyber Africa Forum d&#039;Abidjan - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"Le continent africain subit quotidiennement des piratages informatiques. Et comme c\u2019est le cas pour toutes les r\u00e9gions du monde, la cybercriminalit\u00e9 est nuisible au d\u00e9veloppement \u00e9conomique. Le Cyber Africa Forum [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-04T14:46:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-04T14:49:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-13.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Les enjeux de s\u00e9curit\u00e9 informatique en Afrique au c\u0153ur du Cyber Africa Forum d&rsquo;Abidjan\",\"datePublished\":\"2021-06-04T14:46:13+00:00\",\"dateModified\":\"2021-06-04T14:49:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/\"},\"wordCount\":594,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/at-13.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Afrique\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/\",\"name\":\"Les enjeux de s\u00e9curit\u00e9 informatique en Afrique au c\u0153ur du Cyber Africa Forum d'Abidjan - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/at-13.jpg\",\"datePublished\":\"2021-06-04T14:46:13+00:00\",\"dateModified\":\"2021-06-04T14:49:09+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/at-13.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/at-13.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/06\\\/04\\\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les enjeux de s\u00e9curit\u00e9 informatique en Afrique au c\u0153ur du Cyber Africa Forum d&rsquo;Abidjan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les enjeux de s\u00e9curit\u00e9 informatique en Afrique au c\u0153ur du Cyber Africa Forum d'Abidjan - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/","og_locale":"fr_FR","og_type":"article","og_title":"Les enjeux de s\u00e9curit\u00e9 informatique en Afrique au c\u0153ur du Cyber Africa Forum d'Abidjan - Parlons Techs - Store","og_description":"Le continent africain subit quotidiennement des piratages informatiques. Et comme c\u2019est le cas pour toutes les r\u00e9gions du monde, la cybercriminalit\u00e9 est nuisible au d\u00e9veloppement \u00e9conomique. Le Cyber Africa Forum [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-06-04T14:46:13+00:00","article_modified_time":"2021-06-04T14:49:09+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-13.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Les enjeux de s\u00e9curit\u00e9 informatique en Afrique au c\u0153ur du Cyber Africa Forum d&rsquo;Abidjan","datePublished":"2021-06-04T14:46:13+00:00","dateModified":"2021-06-04T14:49:09+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/"},"wordCount":594,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-13.jpg","articleSection":["Actualit\u00e9","Afrique","Cyberespionnage","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/","url":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/","name":"Les enjeux de s\u00e9curit\u00e9 informatique en Afrique au c\u0153ur du Cyber Africa Forum d'Abidjan - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-13.jpg","datePublished":"2021-06-04T14:46:13+00:00","dateModified":"2021-06-04T14:49:09+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-13.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/06\/at-13.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/06\/04\/les-enjeux-de-securite-informatique-en-afrique-au-coeur-du-cyber-africa-forum-dabidjan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Les enjeux de s\u00e9curit\u00e9 informatique en Afrique au c\u0153ur du Cyber Africa Forum d&rsquo;Abidjan"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=1614"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1614\/revisions"}],"predecessor-version":[{"id":1616,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1614\/revisions\/1616"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/1617"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=1614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=1614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=1614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}