{"id":85533,"date":"2020-05-12T09:26:52","date_gmt":"2020-05-12T07:26:52","guid":{"rendered":"https:\/\/territorialchallenges.com\/?p=85533"},"modified":"2020-05-12T09:26:52","modified_gmt":"2020-05-12T07:26:52","slug":"industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee","status":"publish","type":"post","link":"https:\/\/territorialchallenges.com\/en\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","title":{"rendered":"Industry 4.0: Cybersecurity for a redesigned manufacturing industry"},"content":{"rendered":"<p>Legacy IT systems linked to new connections have demonstrated vulnerabilities in the facilities of the industries of the future. Cyberattacks may not be at the top of software installers&#039; list when considering the risks faced by manufacturers who are customers. Instead, installers may gravitate\u2026 <\/p>\n<div class=\"pmpro_content_message\">Article only viewable by subscribers.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Connection<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/en\/wp-login.php\/?action=register\">Register<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter... <\/p>\n<div class=\"pmpro_content_message\">Article only viewable by subscribers.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Connection<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/en\/wp-login.php\/?action=register\">Register<\/a><\/div>","protected":false},"author":11,"featured_media":85534,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"pmpro_default_level":0,"footnotes":""},"categories":[17,127],"tags":[],"blocksy_meta":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/territorialchallenges.com\/en\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges\" \/>\n<meta property=\"og:description\" content=\"Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/territorialchallenges.com\/en\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\" \/>\n<meta property=\"og:site_name\" content=\"Territorial Challenges\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-12T07:26:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2020\/05\/robot-2791671_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ni.abdi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Ni.abdi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ni.abdi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"},\"author\":{\"name\":\"ni.abdi\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\"},\"headline\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e\",\"datePublished\":\"2020-05-12T07:26:52+00:00\",\"dateModified\":\"2020-05-12T07:26:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"},\"wordCount\":722,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"articleSection\":[\"Industrie 5.0\",\"Actualit\u00e9 Europe\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\",\"url\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\",\"name\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/#website\"},\"datePublished\":\"2020-05-12T07:26:52+00:00\",\"dateModified\":\"2020-05-12T07:26:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/territorialchallenges.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/territorialchallenges.com\/#website\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"name\":\"Territorial Challenges\",\"description\":\"Veille Internationale - Strat\u00e9gie Intelligentes - Bonnes pratiques\",\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/territorialchallenges.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/territorialchallenges.com\/#organization\",\"name\":\"Territorial Challenges\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"contentUrl\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"width\":1832,\"height\":576,\"caption\":\"Territorial Challenges\"},\"image\":{\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\",\"name\":\"ni.abdi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"caption\":\"ni.abdi\"},\"sameAs\":[\"https:\/\/twitter.com\/Ni.abdi\"],\"url\":\"https:\/\/territorialchallenges.com\/en\/author\/ni-abdi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/territorialchallenges.com\/en\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","og_locale":"en_US","og_type":"article","og_title":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","og_description":"Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter [&hellip;]","og_url":"https:\/\/territorialchallenges.com\/en\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","og_site_name":"Territorial Challenges","article_published_time":"2020-05-12T07:26:52+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2020\/05\/robot-2791671_1920.jpg","type":"image\/jpeg"}],"author":"ni.abdi","twitter_card":"summary_large_image","twitter_creator":"@Ni.abdi","twitter_misc":{"Written by":"ni.abdi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#article","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"},"author":{"name":"ni.abdi","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f"},"headline":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e","datePublished":"2020-05-12T07:26:52+00:00","dateModified":"2020-05-12T07:26:52+00:00","mainEntityOfPage":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"},"wordCount":722,"commentCount":0,"publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"articleSection":["Industrie 5.0","Actualit\u00e9 Europe"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","url":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","name":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/#website"},"datePublished":"2020-05-12T07:26:52+00:00","dateModified":"2020-05-12T07:26:52+00:00","breadcrumb":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/territorialchallenges.com\/"},{"@type":"ListItem","position":2,"name":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/territorialchallenges.com\/#website","url":"https:\/\/territorialchallenges.com\/","name":"Territorial Challenges","description":"Veille Internationale - Intelligent strategies - Best practices","publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/territorialchallenges.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/territorialchallenges.com\/#organization","name":"Territorial Challenges","url":"https:\/\/territorialchallenges.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/","url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","contentUrl":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","width":1832,"height":576,"caption":"Territorial Challenges"},"image":{"@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f","name":"ni.abdi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","caption":"ni.abdi"},"sameAs":["https:\/\/twitter.com\/Ni.abdi"],"url":"https:\/\/territorialchallenges.com\/en\/author\/ni-abdi\/"}]}},"_links":{"self":[{"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/posts\/85533"}],"collection":[{"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/comments?post=85533"}],"version-history":[{"count":1,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/posts\/85533\/revisions"}],"predecessor-version":[{"id":85538,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/posts\/85533\/revisions\/85538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/media\/85534"}],"wp:attachment":[{"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/media?parent=85533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/categories?post=85533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/territorialchallenges.com\/en\/wp-json\/wp\/v2\/tags?post=85533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}