{"id":122291,"date":"2024-02-12T19:43:41","date_gmt":"2024-02-12T18:43:41","guid":{"rendered":"https:\/\/territorialchallenges.com\/?p=122291"},"modified":"2024-02-12T19:43:43","modified_gmt":"2024-02-12T18:43:43","slug":"cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie","status":"publish","type":"post","link":"https:\/\/territorialchallenges.com\/en\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","title":{"rendered":"Election Cyber Threat: Developing a Cybersecurity Doctrine to Protect Democracy"},"content":{"rendered":"<p>Faced with the alarming rise of disinformation powered by artificial intelligence, local elected officials are mobilizing to secure elections. In light of recent incidents, including the use of deepfakes during the New Hampshire primaries in the United States, American elected officials and politicians are sounding the alarm, emphasizing the need for a cybersecurity doctrine... <\/p>\n<div class=\"pmpro_content_message\">Article only viewable by subscribers.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Connection<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/en\/wp-login.php\/?action=register\">Register<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Face \u00e0 la mont\u00e9e alarmante de la d\u00e9sinformation propuls\u00e9e par l&rsquo;intelligence artificielle, les \u00e9lus locaux se mobilisent pour s\u00e9curiser les \u00e9lections. \u00c0 la lumi\u00e8re des r\u00e9cents incidents, notamment l&rsquo;utilisation de deepfakes lors des primaires au New Hampshire aux Etats-Unis, des \u00e9lus et politiques amricains, tirent la sonnette d&rsquo;alarme, soulignant la n\u00e9cessit\u00e9 d&rsquo;une doctrine de cybers\u00e9curit\u00e9... <\/p>\n<div class=\"pmpro_content_message\">Article only viewable by subscribers.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Connection<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/en\/wp-login.php\/?action=register\">Register<\/a><\/div>","protected":false},"author":11,"featured_media":122292,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":0,"footnotes":""},"categories":[130,117],"tags":[],"blocksy_meta":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybermenace \u00e9lectorale : \u00e9laboration d&#039;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/territorialchallenges.com\/en\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybermenace \u00e9lectorale : \u00e9laboration d&#039;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges\" \/>\n<meta property=\"og:description\" content=\"Face \u00e0 la mont\u00e9e alarmante de la d\u00e9sinformation propuls\u00e9e par l&rsquo;intelligence artificielle, les \u00e9lus locaux se mobilisent pour s\u00e9curiser les \u00e9lections. \u00c0 la lumi\u00e8re des r\u00e9cents incidents, notamment l&rsquo;utilisation de deepfakes lors des primaires au New Hampshire aux Etats-Unis, des \u00e9lus et politiques amricains, tirent la sonnette d&rsquo;alarme, soulignant la n\u00e9cessit\u00e9 d&rsquo;une doctrine de cybers\u00e9curit\u00e9 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/territorialchallenges.com\/en\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\" \/>\n<meta property=\"og:site_name\" content=\"Territorial Challenges\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-12T18:43:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-12T18:43:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2024\/02\/reflexionfaite12.02.24.Photo_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ni.abdi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Ni.abdi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ni.abdi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\"},\"author\":{\"name\":\"ni.abdi\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\"},\"headline\":\"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie\",\"datePublished\":\"2024-02-12T18:43:41+00:00\",\"dateModified\":\"2024-02-12T18:43:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\"},\"wordCount\":577,\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"articleSection\":[\"R\u00e9flexion faite\",\"\u00c9cosyst\u00e8me\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\",\"url\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\",\"name\":\"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/#website\"},\"datePublished\":\"2024-02-12T18:43:41+00:00\",\"dateModified\":\"2024-02-12T18:43:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/territorialchallenges.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/territorialchallenges.com\/#website\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"name\":\"Territorial Challenges\",\"description\":\"Veille Internationale - Strat\u00e9gie Intelligentes - Bonnes pratiques\",\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/territorialchallenges.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/territorialchallenges.com\/#organization\",\"name\":\"Territorial Challenges\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"contentUrl\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"width\":1832,\"height\":576,\"caption\":\"Territorial Challenges\"},\"image\":{\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\",\"name\":\"ni.abdi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"caption\":\"ni.abdi\"},\"sameAs\":[\"https:\/\/twitter.com\/Ni.abdi\"],\"url\":\"https:\/\/territorialchallenges.com\/en\/author\/ni-abdi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/territorialchallenges.com\/en\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","og_locale":"en_US","og_type":"article","og_title":"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges","og_description":"Face \u00e0 la mont\u00e9e alarmante de la d\u00e9sinformation propuls\u00e9e par l&rsquo;intelligence artificielle, les \u00e9lus locaux se mobilisent pour s\u00e9curiser les \u00e9lections. \u00c0 la lumi\u00e8re des r\u00e9cents incidents, notamment l&rsquo;utilisation de deepfakes lors des primaires au New Hampshire aux Etats-Unis, des \u00e9lus et politiques amricains, tirent la sonnette d&rsquo;alarme, soulignant la n\u00e9cessit\u00e9 d&rsquo;une doctrine de cybers\u00e9curit\u00e9 [&hellip;]","og_url":"https:\/\/territorialchallenges.com\/en\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","og_site_name":"Territorial Challenges","article_published_time":"2024-02-12T18:43:41+00:00","article_modified_time":"2024-02-12T18:43:43+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2024\/02\/reflexionfaite12.02.24.Photo_.jpg","type":"image\/jpeg"}],"author":"ni.abdi","twitter_card":"summary_large_image","twitter_creator":"@Ni.abdi","twitter_misc":{"Written by":"ni.abdi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#article","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/"},"author":{"name":"ni.abdi","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f"},"headline":"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie","datePublished":"2024-02-12T18:43:41+00:00","dateModified":"2024-02-12T18:43:43+00:00","mainEntityOfPage":{"@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/"},"wordCount":577,"publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"articleSection":["R\u00e9flexion faite","\u00c9cosyst\u00e8me"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","url":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","name":"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/#website"},"datePublished":"2024-02-12T18:43:41+00:00","dateModified":"2024-02-12T18:43:43+00:00","breadcrumb":{"@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/territorialchallenges.com\/"},{"@type":"ListItem","position":2,"name":"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie"}]},{"@type":"WebSite","@id":"https:\/\/territorialchallenges.com\/#website","url":"https:\/\/territorialchallenges.com\/","name":"Territorial Challenges","description":"Veille Internationale - Intelligent strategies - Best practices","publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/territorialchallenges.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/territorialchallenges.com\/#organization","name":"Territorial Challenges","url":"https:\/\/territorialchallenges.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/","url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","contentUrl":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","width":1832,"height":576,"caption":"Territorial Challenges"},"image":{"@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f","name":"ni.abdi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","caption":"ni.abdi"},"sameAs":["https:\/\/twitter.com\/Ni.abdi"],"url":"https:\/\/territorialchallenges.com\/en\/author\/ni-abdi\/"}]}},"_links":{"self":[{"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/posts\/122291"}],"collection":[{"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/comments?post=122291"}],"version-history":[{"count":1,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/posts\/122291\/revisions"}],"predecessor-version":[{"id":122293,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/posts\/122291\/revisions\/122293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/media\/122292"}],"wp:attachment":[{"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/media?parent=122291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/categories?post=122291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/tags?post=122291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}