{"id":175392,"date":"2022-04-21T06:00:00","date_gmt":"2022-04-21T06:00:00","guid":{"rendered":"https:\/\/www.oodrive.com\/?p=175392"},"modified":"2022-04-21T06:00:00","modified_gmt":"2022-04-21T06:00:00","slug":"fusions-acquisitions-cybersecurite-coeur-due-diligence","status":"publish","type":"post","link":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/","title":{"rendered":"Fusions-acquisitions : la cybers\u00e9curit\u00e9 au c\u0153ur de la due diligence"},"content":{"rendered":"\n<p>Le rachat d\u2019une entreprise peut donner un v\u00e9ritable coup d\u2019acc\u00e9l\u00e9rateur au d\u00e9veloppement d&rsquo;une autre. <\/p>\n\n\n\n<p>Le nombre de fusions-acquisitions ne cesse ainsi&nbsp; de cro\u00eetre, atteignant, en 2021, le chiffre record de 62 193 (45 000 en 2020). <\/p>\n\n\n\n<p>Un chiffre impressionnant qui ne manque pas d\u2019<strong>attirer l\u2019attention des pirates informatiques<\/strong>, dans un contexte o\u00f9, en 2020, le <strong>nombre de cyberattaques<\/strong> a \u00e9t\u00e9 multipli\u00e9 par 4 d\u2019apr\u00e8s l\u2019Autorit\u00e9 nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (Anssi).<\/p>\n\n\n\n<p>Malgr\u00e9 une prise de conscience progressive parmi les d\u00e9cisionnaires, le volet cybers\u00e9curit\u00e9 dans la <strong>d\u00e9marche de \u201cdue diligence\u201d<\/strong> n\u2019intervient pas toujours au bon moment et se limite encore exclusivement aux dimensions financi\u00e8res, marketing, RH, etc. <\/p>\n\n\n\n<p>Pire, cette phase essentielle peut \u00eatre incompl\u00e8te et ainsi exposer les deux entreprises. De plus, la complexit\u00e9 des enjeux de cybers\u00e9curit\u00e9 ajoute un niveau de risque (menaces internes, risques externes, risques r\u00e9glementaires)<\/p>\n\n\n\n<p>D\u00e8s lors, les questions suivantes deviennent l\u00e9gitimes : quels sont les <strong>risques en mati\u00e8re de cybers\u00e9curit\u00e9<\/strong> et leurs cons\u00e9quences lors d\u2019une fusion-acquisition ? Comment mettre en place un audit de s\u00e9curit\u00e9 et de conformit\u00e9 efficace et en n s\u2019appuyant sur quelle d\u00e9marche&nbsp;&nbsp;?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Une due diligence souvent incompl\u00e8te, secondaire ou ignor\u00e9e<\/h2>\n\n\n\n<p>De mani\u00e8re g\u00e9n\u00e9rale, la notion de cybers\u00e9curit\u00e9 doit occuper un plus grand r\u00f4le dans une due diligence. <\/p>\n\n\n\n<p>Cette n\u00e9cessit\u00e9 s&rsquo;illustre dans une \u00e9tude datant de 2021 dans laquelle seuls \u201c<em>25 % des acteurs financiers et des entreprises consid\u00e8rent la <strong>due diligence des syst\u00e8mes informatiques<\/strong> comme tr\u00e8s importante, un chiffre qui tombe respectivement \u00e0 18 % et 13 % lorsqu&rsquo;il s&rsquo;agit d&rsquo;une due diligence de la cybers\u00e9curit\u00e9<\/em>\u201d. <\/p>\n\n\n\n<p>Cette recommandation est d\u2019autant plus essentielle si l\u2019entreprise cible manipule un grand nombre de donn\u00e9es ou dispose d\u2019un avantage comp\u00e9titif en lien avec une composante technologique importante. <\/p>\n\n\n\n<p>En effet, une faille de <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/donnees-sensibles-informatiques-les-gerer-efficacement\/\">s\u00e9curit\u00e9 informatique <\/a>peut avoir <strong>expos\u00e9 des donn\u00e9es sensibles<\/strong> ou d\u00e9valoriser une propri\u00e9t\u00e9 intellectuelle en l\u2019ayant ill\u00e9galement mise \u00e0 disposition d\u2019autres entreprises.<\/p>\n\n\n\n<p>L\u2019autre probl\u00e8me concerne l\u2019\u00e9tape o\u00f9 l\u2019on accorde une <strong>importance \u00e0 la cybers\u00e9curit\u00e9<\/strong>. Celle-ci doit se concr\u00e9tiser d\u00e8s la phase initiale d\u2019une transaction et non pas uniquement dans la phase d&rsquo;int\u00e9gration, comme c\u2019est encore trop r\u00e9guli\u00e8rement le cas.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Due diligence et cybers\u00e9curit\u00e9 : les \u00e9tapes incontournables<\/h2>\n\n\n\n<p>Une fois de plus, il est n\u00e9cessaire de rappeler un \u00e9l\u00e9ment fondamental : un processus de due diligence sur le sujet de la cybers\u00e9curit\u00e9 ne peut se faire sans impliquer le DSI et\/ou le RSSI (Responsable de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information).<\/p>\n\n\n\n<a href=\"https:\/\/www.oodrive.com\/fr\/produits\/oodrive-work\/\" class=\"product__section\" id=\"work-banner\"><div class=\"product__section-container\"><p class=\"product__section-title\">La collaboration s\u00e9curis\u00e9e<\/p><p class=\"product__section-description\">D\u00e9couvrez notre plateforme de collaboration s\u00e9curis\u00e9e et certifi\u00e9e ISO 27001, SecNumCloud et HDS. <\/p><img decoding=\"async\" src=\"https:\/\/www.oodrive.com\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/bg-banner_work.svg\" class=\"product__section-bg\"\/><\/div><div class=\"product__section-link\"><img decoding=\"async\" src=\"https:\/\/www.oodrive.com\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/logo-work-black-color.svg\" class=\"product__section-logo\" alt=\"oodrive work\"\/><div class=\"cta\"><span>En savoir plus<\/span><\/div><\/div><\/a>\n\n\n\n<p>Ensuite, un audit doit \u00eatre r\u00e9alis\u00e9 afin de <strong>r\u00e9colter et d&rsquo;analyser des informations<\/strong> portant sur : les pratiques de s\u00e9curit\u00e9, les derniers incidents de s\u00e9curit\u00e9, une cartographie des outils et infrastructures informatiques utilis\u00e9es, les risques existants, la formation des salari\u00e9s sur la cybers\u00e9curit\u00e9, l\u2019organigramme des \u00e9quipes en charge de la s\u00e9curit\u00e9 informatique, etc. <\/p>\n\n\n\n<p>Sans surprise, cette phase n\u00e9cessite une grande transparence de la part de l\u2019entreprise cible.<\/p>\n\n\n\n<p>Cet audit doit \u00eatre compl\u00e9t\u00e9 par des actions concr\u00e8tes et mesurables visant \u00e0 <strong>identifier les failles ou dangers<\/strong>. <\/p>\n\n\n\n<p>Cela peut se traduire par une collecte des bases de donn\u00e9es sur les infrastructures r\u00e9seaux, des tests d\u2019intrusion, des analyses des flux r\u00e9seau, des recherches sur des sites sp\u00e9cialis\u00e9s afin de voir si l\u2019entreprise a \u00e9t\u00e9 cibl\u00e9e ou fait partie de futures cibles de la part de groupes de pirate informatique (\u201cHacker\u201d). <\/p>\n\n\n\n<p>Ces t\u00e2ches peuvent \u00eatre effectu\u00e9es \u00e0 l&rsquo;aide d&rsquo;outils automatis\u00e9s.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Des risques importants<\/h2>\n\n\n\n<p>Faire l\u2019impasse sur la <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/infographie-cybersecurite-2023-ou-en-sont-les-entreprises-2\/\">cybers\u00e9curit\u00e9<\/a> peut avoir de <strong>lourdes cons\u00e9quences<\/strong>.<\/p>\n\n\n\n<p>L\u2019un des impacts peut \u00eatre la d\u00e9gradation de l\u2019image de l\u2019entreprise, comme ce fut dans le rachat des h\u00f4tels Starwood par Marriott, dans lequel les donn\u00e9es de 500 millions de clients ont \u00e9t\u00e9 expos\u00e9es ill\u00e9galement. <\/p>\n\n\n\n<p>On peut aussi mentionner d\u2019autres risques comme l\u2019arr\u00eat de la production, la fuite de donn\u00e9es entra\u00eenant des p\u00e9nalit\u00e9s (RGPD), une diminution de chiffre d\u2019affaires, une r\u00e9duction des b\u00e9n\u00e9fices, voire un impact sur la r\u00e9putation de la marque.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Cette situation peut mener \u00e0 des amendes r\u00e9glementaires ainsi que des proc\u00e9dures judiciaires. <\/p>\n\n\n\n<p>Rappelons que, selon le Ponemon Institute, en partenariat avec IBM, le vol de donn\u00e9es personnelles ou confidentielles co\u00fbte 7,91 millions de dollars en moyenne.<\/p>\n\n\n\n<p>De mani\u00e8re g\u00e9n\u00e9rale, <strong>l&rsquo;existence d\u2019une faille de s\u00e9curit\u00e9<\/strong> diminue la valorisation de l\u2019entreprise ainsi que son attractivit\u00e9. <\/p>\n\n\n\n<p>Comment ne pas reconsid\u00e9rer la fusion ou l\u2019acquisition d\u2019une entreprise si celle-ci est <strong>expos\u00e9e \u00e0 des risques majeurs<\/strong> pouvant se r\u00e9pandre \u00e0 l&rsquo;autre entreprise\u2026<\/p>\n\n\n\n<p>Le <strong>processus de fusion-acquisition n\u2019est donc pas sans risques<\/strong> d\u2019un point de vue cybers\u00e9curit\u00e9. Bien au contraire ! <\/p>\n\n\n\n<p>Une vigilance accrue et une m\u00e9thodologie rigoureuse sont n\u00e9cessaires afin de r\u00e9ussir sa due diligence. <\/p>\n\n\n\n<p>Les entreprises cherchant \u00e0 \u00eatre rachet\u00e9es ont int\u00e9r\u00eat \u00e0 investir sur un syst\u00e8me informatique capable de r\u00e9sister aux <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/top-10-des-cyberattaques-2025\/\">cyberattaques<\/a> et de disposer de collaborateurs form\u00e9s \u00e0 \u00e9viter les pi\u00e8ges les plus fr\u00e9quents au travers d\u2019une formation efficace sur la \u201ccyber hygi\u00e8ne\u201d.<\/p>\n\n\n\n<p>Tandis que les entreprises qui souhaitent acqu\u00e9rir d\u2019autres entreprises doivent mieux prendre en consid\u00e9ration la cybers\u00e9curit\u00e9 dans l&rsquo;\u00e9valuation des entreprises.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><a class=\"button green-border-button button-margin\" href=\"https:\/\/www.oodrive.com\/fr\/apercu\/\">D\u00e9couvrez comment Oodrive peut vous accompagner dans le cadre d\u2019une fusion-acquisition<\/a><\/p>\n\n\n\n<br>\n","protected":false},"excerpt":{"rendered":"<p>Le rachat d\u2019une entreprise peut donner un v\u00e9ritable coup d\u2019acc\u00e9l\u00e9rateur au d\u00e9veloppement d&rsquo;une autre. Le nombre de fusions-acquisitions ne cesse ainsi&nbsp; de cro\u00eetre, atteignant, en 2021, le chiffre record de 62 193 (45 000 en 2020). Un chiffre impressionnant qui ne manque pas d\u2019attirer l\u2019attention des pirates informatiques, dans un contexte o\u00f9, en 2020, le [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":180242,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1227],"class_list":["post-175392","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>M&amp;A : la cybers\u00e9curit\u00e9, un enjeu cl\u00e9 de la due diligence<\/title>\n<meta name=\"description\" content=\"Comment mettre en place un audit complet de la cybers\u00e9curit\u00e9 lors d\u2019une fusion-acquisition ? Toutes les r\u00e9ponses\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"M&amp;A : la cybers\u00e9curit\u00e9, un enjeu cl\u00e9 de la due diligence\" \/>\n<meta property=\"og:description\" content=\"Comment mettre en place un audit complet de la cybers\u00e9curit\u00e9 lors d\u2019une fusion-acquisition ? Toutes les r\u00e9ponses\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Oodrive\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-21T06:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/04\/Fusions-acquisitions-cybersecurite-au-coeur-de-la-due-diligence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The oodrive team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"The oodrive team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/\"},\"author\":{\"name\":\"The oodrive team\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/3ea3600f300637f6e916964b1bb82908\"},\"headline\":\"Fusions-acquisitions : la cybers\u00e9curit\u00e9 au c\u0153ur de la due diligence\",\"datePublished\":\"2022-04-21T06:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/\"},\"wordCount\":979,\"publisher\":{\"@id\":\"https:\/\/www.oodrive.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/04\/Fusions-acquisitions-cybersecurite-au-coeur-de-la-due-diligence.jpg\",\"articleSection\":[\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/\",\"url\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/\",\"name\":\"M&A : la cybers\u00e9curit\u00e9, un enjeu cl\u00e9 de la due diligence\",\"isPartOf\":{\"@id\":\"https:\/\/www.oodrive.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/04\/Fusions-acquisitions-cybersecurite-au-coeur-de-la-due-diligence.jpg\",\"datePublished\":\"2022-04-21T06:00:00+00:00\",\"description\":\"Comment mettre en place un audit complet de la cybers\u00e9curit\u00e9 lors d\u2019une fusion-acquisition ? Toutes les r\u00e9ponses\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#primaryimage\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/04\/Fusions-acquisitions-cybersecurite-au-coeur-de-la-due-diligence.jpg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/04\/Fusions-acquisitions-cybersecurite-au-coeur-de-la-due-diligence.jpg\",\"width\":1920,\"height\":500,\"caption\":\"Fusions-acquisitions : la cybers\u00e9curit\u00e9 au c\u0153ur de la due diligence\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.oodrive.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybers\u00e9curit\u00e9\",\"item\":\"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/cybersecurite\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Fusions-acquisitions : la cybers\u00e9curit\u00e9 au c\u0153ur de la due diligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oodrive.com\/#website\",\"url\":\"https:\/\/www.oodrive.com\/\",\"name\":\"Oodrive\",\"description\":\"Plateforme souveraine et s\u00e9curis\u00e9e, Oodrive permet de g\u00e9rer vos donn\u00e9es sensibles : partage, signature, sauvegarde et plus encore.\",\"publisher\":{\"@id\":\"https:\/\/www.oodrive.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oodrive.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.oodrive.com\/#organization\",\"name\":\"Oodrive\",\"url\":\"https:\/\/www.oodrive.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"width\":132,\"height\":27,\"caption\":\"Oodrive\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/3ea3600f300637f6e916964b1bb82908\",\"name\":\"The oodrive team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/03\/logo-oodrive-equipe-integration-96x96.png\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/03\/logo-oodrive-equipe-integration-96x96.png\",\"caption\":\"The oodrive team\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"M&A : la cybers\u00e9curit\u00e9, un enjeu cl\u00e9 de la due diligence","description":"Comment mettre en place un audit complet de la cybers\u00e9curit\u00e9 lors d\u2019une fusion-acquisition ? Toutes les r\u00e9ponses","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"M&A : la cybers\u00e9curit\u00e9, un enjeu cl\u00e9 de la due diligence","og_description":"Comment mettre en place un audit complet de la cybers\u00e9curit\u00e9 lors d\u2019une fusion-acquisition ? Toutes les r\u00e9ponses","og_url":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/","og_site_name":"Oodrive","article_published_time":"2022-04-21T06:00:00+00:00","og_image":[{"width":1920,"height":500,"url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/04\/Fusions-acquisitions-cybersecurite-au-coeur-de-la-due-diligence.jpg","type":"image\/jpeg"}],"author":"The oodrive team","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"The oodrive team","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#article","isPartOf":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/"},"author":{"name":"The oodrive team","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/3ea3600f300637f6e916964b1bb82908"},"headline":"Fusions-acquisitions : la cybers\u00e9curit\u00e9 au c\u0153ur de la due diligence","datePublished":"2022-04-21T06:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/"},"wordCount":979,"publisher":{"@id":"https:\/\/www.oodrive.com\/#organization"},"image":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/04\/Fusions-acquisitions-cybersecurite-au-coeur-de-la-due-diligence.jpg","articleSection":["Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/","url":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/","name":"M&A : la cybers\u00e9curit\u00e9, un enjeu cl\u00e9 de la due diligence","isPartOf":{"@id":"https:\/\/www.oodrive.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#primaryimage"},"image":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/04\/Fusions-acquisitions-cybersecurite-au-coeur-de-la-due-diligence.jpg","datePublished":"2022-04-21T06:00:00+00:00","description":"Comment mettre en place un audit complet de la cybers\u00e9curit\u00e9 lors d\u2019une fusion-acquisition ? Toutes les r\u00e9ponses","breadcrumb":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#primaryimage","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/04\/Fusions-acquisitions-cybersecurite-au-coeur-de-la-due-diligence.jpg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/04\/Fusions-acquisitions-cybersecurite-au-coeur-de-la-due-diligence.jpg","width":1920,"height":500,"caption":"Fusions-acquisitions : la cybers\u00e9curit\u00e9 au c\u0153ur de la due diligence"},{"@type":"BreadcrumbList","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/cybersecurite\/fusions-acquisitions-cybersecurite-coeur-due-diligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.oodrive.com\/es\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"Cybers\u00e9curit\u00e9","item":"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/cybersecurite\/"},{"@type":"ListItem","position":4,"name":"Fusions-acquisitions : la cybers\u00e9curit\u00e9 au c\u0153ur de la due diligence"}]},{"@type":"WebSite","@id":"https:\/\/www.oodrive.com\/#website","url":"https:\/\/www.oodrive.com\/","name":"Oodrive","description":"Plateforme souveraine et s\u00e9curis\u00e9e, Oodrive permet de g\u00e9rer vos donn\u00e9es sensibles : partage, signature, sauvegarde et plus encore.","publisher":{"@id":"https:\/\/www.oodrive.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oodrive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.oodrive.com\/#organization","name":"Oodrive","url":"https:\/\/www.oodrive.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","width":132,"height":27,"caption":"Oodrive"},"image":{"@id":"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/3ea3600f300637f6e916964b1bb82908","name":"The oodrive team","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/image\/","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/03\/logo-oodrive-equipe-integration-96x96.png","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2022\/03\/logo-oodrive-equipe-integration-96x96.png","caption":"The oodrive team"}}]}},"_links":{"self":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/175392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/comments?post=175392"}],"version-history":[{"count":0,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/175392\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/media\/180242"}],"wp:attachment":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/media?parent=175392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/categories?post=175392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}