{"id":85533,"date":"2020-05-12T09:26:52","date_gmt":"2020-05-12T07:26:52","guid":{"rendered":"https:\/\/territorialchallenges.com\/?p=85533"},"modified":"2020-05-12T09:26:52","modified_gmt":"2020-05-12T07:26:52","slug":"industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee","status":"publish","type":"post","link":"https:\/\/territorialchallenges.com\/nl\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","title":{"rendered":"Industrie 4.0: Cybersecurity voor een vernieuwde maakindustrie"},"content":{"rendered":"<p>Verouderde IT-systemen gekoppeld aan nieuwe verbindingen blijken kwetsbaar te zijn voor de faciliteiten van de industrie van de toekomst. Cyberaanvallen staan mogelijk niet bovenaan de prioriteitenlijst van software-installateurs gezien de risico&#039;s waarmee fabrikanten die klant zijn, worden geconfronteerd. In plaats daarvan zouden installateurs zich kunnen wenden tot... <\/p>\n<div class=\"pmpro_content_message\">Artikel alleen beschikbaar voor abonnees.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Login<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/nl\/wp-login.php\/?action=register\">Register<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter... <\/p>\n<div class=\"pmpro_content_message\">Artikel alleen beschikbaar voor abonnees.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Login<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/nl\/wp-login.php\/?action=register\">Register<\/a><\/div>","protected":false},"author":11,"featured_media":85534,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"pmpro_default_level":0,"footnotes":""},"categories":[17,127],"tags":[],"blocksy_meta":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/territorialchallenges.com\/nl\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges\" \/>\n<meta property=\"og:description\" content=\"Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/territorialchallenges.com\/nl\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\" \/>\n<meta property=\"og:site_name\" content=\"Territorial Challenges\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-12T07:26:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2020\/05\/robot-2791671_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ni.abdi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Ni.abdi\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"ni.abdi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"},\"author\":{\"name\":\"ni.abdi\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\"},\"headline\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e\",\"datePublished\":\"2020-05-12T07:26:52+00:00\",\"dateModified\":\"2020-05-12T07:26:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"},\"wordCount\":722,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"articleSection\":[\"Industrie 5.0\",\"Actualit\u00e9 Europe\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\",\"url\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\",\"name\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/#website\"},\"datePublished\":\"2020-05-12T07:26:52+00:00\",\"dateModified\":\"2020-05-12T07:26:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/territorialchallenges.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/territorialchallenges.com\/#website\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"name\":\"Territorial Challenges\",\"description\":\"Veille Internationale - Strat\u00e9gie Intelligentes - Bonnes pratiques\",\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/territorialchallenges.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/territorialchallenges.com\/#organization\",\"name\":\"Territorial Challenges\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"contentUrl\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"width\":1832,\"height\":576,\"caption\":\"Territorial Challenges\"},\"image\":{\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\",\"name\":\"ni.abdi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"caption\":\"ni.abdi\"},\"sameAs\":[\"https:\/\/twitter.com\/Ni.abdi\"],\"url\":\"https:\/\/territorialchallenges.com\/nl\/author\/ni-abdi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/territorialchallenges.com\/nl\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","og_locale":"nl_NL","og_type":"article","og_title":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","og_description":"Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter [&hellip;]","og_url":"https:\/\/territorialchallenges.com\/nl\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","og_site_name":"Territorial Challenges","article_published_time":"2020-05-12T07:26:52+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2020\/05\/robot-2791671_1920.jpg","type":"image\/jpeg"}],"author":"ni.abdi","twitter_card":"summary_large_image","twitter_creator":"@Ni.abdi","twitter_misc":{"Geschreven door":"ni.abdi","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#article","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"},"author":{"name":"ni.abdi","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f"},"headline":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e","datePublished":"2020-05-12T07:26:52+00:00","dateModified":"2020-05-12T07:26:52+00:00","mainEntityOfPage":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"},"wordCount":722,"commentCount":0,"publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"articleSection":["Industrie 5.0","Actualit\u00e9 Europe"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","url":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","name":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/#website"},"datePublished":"2020-05-12T07:26:52+00:00","dateModified":"2020-05-12T07:26:52+00:00","breadcrumb":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/territorialchallenges.com\/"},{"@type":"ListItem","position":2,"name":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/territorialchallenges.com\/#website","url":"https:\/\/territorialchallenges.com\/","name":"Territoriale uitdagingen","description":"Internationale monitoring - Slimme strategie\u00ebn - Beste praktijken","publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/territorialchallenges.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/territorialchallenges.com\/#organization","name":"Territoriale uitdagingen","url":"https:\/\/territorialchallenges.com\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/","url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","contentUrl":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","width":1832,"height":576,"caption":"Territorial Challenges"},"image":{"@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f","name":"ni.abdi","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","caption":"ni.abdi"},"sameAs":["https:\/\/twitter.com\/Ni.abdi"],"url":"https:\/\/territorialchallenges.com\/nl\/author\/ni-abdi\/"}]}},"_links":{"self":[{"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/posts\/85533"}],"collection":[{"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/comments?post=85533"}],"version-history":[{"count":1,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/posts\/85533\/revisions"}],"predecessor-version":[{"id":85538,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/posts\/85533\/revisions\/85538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/media\/85534"}],"wp:attachment":[{"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/media?parent=85533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/categories?post=85533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/territorialchallenges.com\/nl\/wp-json\/wp\/v2\/tags?post=85533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}