{"id":122291,"date":"2024-02-12T19:43:41","date_gmt":"2024-02-12T18:43:41","guid":{"rendered":"https:\/\/territorialchallenges.com\/?p=122291"},"modified":"2024-02-12T19:43:43","modified_gmt":"2024-02-12T18:43:43","slug":"cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie","status":"publish","type":"post","link":"https:\/\/territorialchallenges.com\/nl\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","title":{"rendered":"Cyberdreiging bij verkiezingen: ontwikkeling van een cybersecuritydoctrine ter bescherming van de democratie"},"content":{"rendered":"<p>Geconfronteerd met de alarmerende toename van desinformatie, aangestuurd door kunstmatige intelligentie, mobiliseren lokale gekozen functionarissen zich om verkiezingen veilig te stellen. Naar aanleiding van recente incidenten, waaronder het gebruik van deepfakes tijdens de voorverkiezingen in New Hampshire in de Verenigde Staten, luiden Amerikaanse gekozen functionarissen en politici de noodklok en benadrukken ze de noodzaak van een cybersecuritydoctrine... <\/p>\n<div class=\"pmpro_content_message\">Artikel alleen beschikbaar voor abonnees.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Login<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/nl\/wp-login.php\/?action=register\">Register<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Face \u00e0 la mont\u00e9e alarmante de la d\u00e9sinformation propuls\u00e9e par l&rsquo;intelligence artificielle, les \u00e9lus locaux se mobilisent pour s\u00e9curiser les \u00e9lections. \u00c0 la lumi\u00e8re des r\u00e9cents incidents, notamment l&rsquo;utilisation de deepfakes lors des primaires au New Hampshire aux Etats-Unis, des \u00e9lus et politiques amricains, tirent la sonnette d&rsquo;alarme, soulignant la n\u00e9cessit\u00e9 d&rsquo;une doctrine de cybers\u00e9curit\u00e9... <\/p>\n<div class=\"pmpro_content_message\">Artikel alleen beschikbaar voor abonnees.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Login<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/nl\/wp-login.php\/?action=register\">Register<\/a><\/div>","protected":false},"author":11,"featured_media":122292,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":0,"footnotes":""},"categories":[130,117],"tags":[],"blocksy_meta":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybermenace \u00e9lectorale : \u00e9laboration d&#039;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/territorialchallenges.com\/nl\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybermenace \u00e9lectorale : \u00e9laboration d&#039;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges\" \/>\n<meta property=\"og:description\" content=\"Face \u00e0 la mont\u00e9e alarmante de la d\u00e9sinformation propuls\u00e9e par l&rsquo;intelligence artificielle, les \u00e9lus locaux se mobilisent pour s\u00e9curiser les \u00e9lections. \u00c0 la lumi\u00e8re des r\u00e9cents incidents, notamment l&rsquo;utilisation de deepfakes lors des primaires au New Hampshire aux Etats-Unis, des \u00e9lus et politiques amricains, tirent la sonnette d&rsquo;alarme, soulignant la n\u00e9cessit\u00e9 d&rsquo;une doctrine de cybers\u00e9curit\u00e9 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/territorialchallenges.com\/nl\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\" \/>\n<meta property=\"og:site_name\" content=\"Territorial Challenges\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-12T18:43:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-12T18:43:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2024\/02\/reflexionfaite12.02.24.Photo_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ni.abdi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Ni.abdi\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"ni.abdi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\"},\"author\":{\"name\":\"ni.abdi\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\"},\"headline\":\"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie\",\"datePublished\":\"2024-02-12T18:43:41+00:00\",\"dateModified\":\"2024-02-12T18:43:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\"},\"wordCount\":577,\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"articleSection\":[\"R\u00e9flexion faite\",\"\u00c9cosyst\u00e8me\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\",\"url\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\",\"name\":\"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/#website\"},\"datePublished\":\"2024-02-12T18:43:41+00:00\",\"dateModified\":\"2024-02-12T18:43:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/territorialchallenges.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/territorialchallenges.com\/#website\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"name\":\"Territorial Challenges\",\"description\":\"Veille Internationale - Strat\u00e9gie Intelligentes - Bonnes pratiques\",\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/territorialchallenges.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/territorialchallenges.com\/#organization\",\"name\":\"Territorial Challenges\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"contentUrl\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"width\":1832,\"height\":576,\"caption\":\"Territorial Challenges\"},\"image\":{\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\",\"name\":\"ni.abdi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"caption\":\"ni.abdi\"},\"sameAs\":[\"https:\/\/twitter.com\/Ni.abdi\"],\"url\":\"https:\/\/territorialchallenges.com\/nl\/author\/ni-abdi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/territorialchallenges.com\/nl\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","og_locale":"nl_NL","og_type":"article","og_title":"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges","og_description":"Face \u00e0 la mont\u00e9e alarmante de la d\u00e9sinformation propuls\u00e9e par l&rsquo;intelligence artificielle, les \u00e9lus locaux se mobilisent pour s\u00e9curiser les \u00e9lections. \u00c0 la lumi\u00e8re des r\u00e9cents incidents, notamment l&rsquo;utilisation de deepfakes lors des primaires au New Hampshire aux Etats-Unis, des \u00e9lus et politiques amricains, tirent la sonnette d&rsquo;alarme, soulignant la n\u00e9cessit\u00e9 d&rsquo;une doctrine de cybers\u00e9curit\u00e9 [&hellip;]","og_url":"https:\/\/territorialchallenges.com\/nl\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","og_site_name":"Territorial Challenges","article_published_time":"2024-02-12T18:43:41+00:00","article_modified_time":"2024-02-12T18:43:43+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2024\/02\/reflexionfaite12.02.24.Photo_.jpg","type":"image\/jpeg"}],"author":"ni.abdi","twitter_card":"summary_large_image","twitter_creator":"@Ni.abdi","twitter_misc":{"Geschreven door":"ni.abdi","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#article","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/"},"author":{"name":"ni.abdi","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f"},"headline":"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie","datePublished":"2024-02-12T18:43:41+00:00","dateModified":"2024-02-12T18:43:43+00:00","mainEntityOfPage":{"@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/"},"wordCount":577,"publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"articleSection":["R\u00e9flexion faite","\u00c9cosyst\u00e8me"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","url":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","name":"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/#website"},"datePublished":"2024-02-12T18:43:41+00:00","dateModified":"2024-02-12T18:43:43+00:00","breadcrumb":{"@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/territorialchallenges.com\/"},{"@type":"ListItem","position":2,"name":"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie"}]},{"@type":"WebSite","@id":"https:\/\/territorialchallenges.com\/#website","url":"https:\/\/territorialchallenges.com\/","name":"Territoriale uitdagingen","description":"Internationale monitoring - Slimme strategie\u00ebn - Beste praktijken","publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/territorialchallenges.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/territorialchallenges.com\/#organization","name":"Territoriale uitdagingen","url":"https:\/\/territorialchallenges.com\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/","url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","contentUrl":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","width":1832,"height":576,"caption":"Territorial Challenges"},"image":{"@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f","name":"ni.abdi","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","caption":"ni.abdi"},"sameAs":["https:\/\/twitter.com\/Ni.abdi"],"url":"https:\/\/territorialchallenges.com\/nl\/author\/ni-abdi\/"}]}},"_links":{"self":[{"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/posts\/122291"}],"collection":[{"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/comments?post=122291"}],"version-history":[{"count":1,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/posts\/122291\/revisions"}],"predecessor-version":[{"id":122293,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/posts\/122291\/revisions\/122293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/media\/122292"}],"wp:attachment":[{"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/media?parent=122291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/categories?post=122291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/tags?post=122291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}