{"id":4105,"date":"2016-02-24T22:02:47","date_gmt":"2016-02-24T21:02:47","guid":{"rendered":"https:\/\/www.okiok.com\/?p=4105"},"modified":"2022-11-10T09:01:31","modified_gmt":"2022-11-10T14:01:31","slug":"4105-2","status":"publish","type":"post","link":"https:\/\/www.okiok.com\/fr\/4105-2\/","title":{"rendered":"La s\u00e9curit\u00e9 applicative et l&rsquo;hame\u00e7onnage &#8211; Conf\u00e9rence d&rsquo;OKIOK @ OWASP Montr\u00e9al"},"content":{"rendered":"<p><strong>Montr\u00e9al, le 24 f\u00e9vrier 2016<\/strong><\/p>\n<p><strong>OKIOK est ravie d&rsquo;avoir pr\u00e9sent\u00e9 aujourd&rsquo;hui\u00a0\u00a0\u00ab\u00a0La s\u00e9curit\u00e9 applicative et l&rsquo;hame\u00e7onnage\u00a0\u00bb dans le cadre de la <a href=\"https:\/\/www.eventbrite.ca\/e\/la-securite-applicative-et-lhameconnage-tickets-21406160402\">conf\u00e9rence organis\u00e9e par OWASP Montr\u00e9al<\/a>.\u00a0En effet, OKIOK avait \u00e9t\u00e9 invit\u00e9e \u00e0 exposer les\u00a0impacts\u00a0li\u00e9s au <em>phishing,<\/em>\u00a0tel que vu et exp\u00e9riment\u00e9 en entreprise ainsi que les plans d&rsquo;action pour traiter ce risque.<\/strong><\/p>\n<p>La pr\u00e9sentation a permis de pr\u00e9senter et d\u2019insister sur les liens de causalit\u00e9 et l\u2019approche pragmatique entre la s\u00e9curit\u00e9 des applications et les campagnes d\u2019hame\u00e7onnage. Lors d&rsquo;une \u00e9tude r\u00e9alis\u00e9e en\u00a02015, l\u2019APWG (Anti Phishing Work Group) d\u00e9nombrait pas moins de 1,3 Million de campagnes d\u2019hame\u00e7onnage uniques. C\u2019est deux fois plus qu\u2019en 2014 et quatre fois plus qu\u2019en 2010.<\/p>\n<p>La tendance actuelle s\u2019oriente donc une vers une augmentation constante du nombre de courriels frauduleux, en ciblant de plus en plus les entreprises. Liens de redirections, portail web frauduleux, pi\u00e8ce jointe infect\u00e9e et usurpation d\u2019identit\u00e9 sont des exemples d&rsquo;attaque qui ont \u00e9t\u00e9 abord\u00e9es \u00e0 travers les diff\u00e9rents sc\u00e9narios expos\u00e9s par Alexandre Pieyre et Fran\u00e7ois-Xavier Desmarais, conseillers principaux chez OKIOK.<\/p>\n<p>Il est important de garder \u00e0 l\u2019esprit que peu importe le niveau de s\u00e9curit\u00e9 de votre application, si une r\u00e9cup\u00e9ration frauduleuse des identifiants s\u2019y rapportant est effectu\u00e9e, votre p\u00e9rim\u00e8tre de s\u00e9curit\u00e9 est vain, et ce principe s\u2019applique tant pour les applications accessibles de l\u2019externe que de l\u2019interne. Que l\u2019on parle de drive-by-download, de Cross Site Request Forgery (CSRF) ou de Email Spoofing, le but commun est de vous amener \u00e0 divulguer ou \u00e0 agir contre les propri\u00e9t\u00e9s d\u2019int\u00e9grit\u00e9 et de confidentialit\u00e9 des actifs informationnels.<\/p>\n<p>Pour contrer ces menaces et pr\u00e9server la p\u00e9rennit\u00e9 de vos donn\u00e9es, plusieurs recommandations ont \u00e9t\u00e9 \u00e9mises et comprennent\u00a0:<\/p>\n<ul>\n<li>Sensibilisation des employ\u00e9s<\/li>\n<li>Configurations s\u00e9curitaires des serveurs de courriels<\/li>\n<li>Identification et blocage des domaines suspicieux<\/li>\n<li>Proc\u00e9dure de gestion des incidents<\/li>\n<li>Privil\u00e9gier le partage de fichier \u00e0 travers des services pr\u00e9vus \u00e0 cet effet<\/li>\n<li>D\u00e9tection d\u2019intrusions<\/li>\n<\/ul>\n<p>Si vous souhaitez\u00a0prendre part \u00e0 cette pratique, sachez que nous d\u00e9tenons une <a href=\"\/fr\/services-et-solutions\/tests-dintrusion-et-evaluation-des-vulnerabilites\/\">expertise de pointe<\/a> en ce qui a trait aux campagnes d\u2019hame\u00e7onnage &#8211; statistiques, \u00e9volution du nombre de courriels frauduleux et indicateurs personnalis\u00e9s sont toutes des donn\u00e9es que nous fournissons \u00e0 nos clients lors de ces exercices.<\/p>\n<p><iframe loading=\"lazy\" title=\"OWASP Montr\u00e9al - 24 f\u00e9vrier - La s\u00e9curit\u00e9 applicative et l&#039;hame\u00e7onnage\" width=\"1140\" height=\"641\" src=\"https:\/\/www.youtube.com\/embed\/1RYlOiIENjQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p><strong>\u00c0 propos d\u2019OKIOK<\/strong><\/p>\n<p>Pionni\u00e8re mondiale et chef de file canadien en s\u00e9curit\u00e9 de l\u2019information, OKIOK offre depuis plus de trente ans un \u00e9ventail complet de services et de produits, notamment de transfert s\u00e9curis\u00e9 des donn\u00e9es, de gestion des identit\u00e9s et des acc\u00e8s\u00a0et d\u2019enqu\u00eates informatiques. Sa vaste offre prend la forme de services-conseils, de services impartis de gestion de la s\u00e9curit\u00e9, de solutions commerciales et sur mesure ainsi que de formation.<\/p>\n<p>Parmi les seules entreprises au Canada \u00e0 faire de la recherche et d\u00e9veloppement sa pierre angulaire, OKIOK se tient \u00e0 l\u2019avant-garde de son secteur gr\u00e2ce \u00e0 la conception de solutions in\u00e9dites.<\/p>\n<p><a href=\"\/\">www.okiok.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Montr\u00e9al, le 24 f\u00e9vrier 2016 OKIOK est ravie d&rsquo;avoir pr\u00e9sent\u00e9 aujourd&rsquo;hui\u00a0\u00a0\u00ab\u00a0La s\u00e9curit\u00e9 applicative et l&rsquo;hame\u00e7onnage\u00a0\u00bb dans le cadre de la conf\u00e9rence organis\u00e9e par OWASP Montr\u00e9al.\u00a0En effet, OKIOK avait \u00e9t\u00e9 invit\u00e9e \u00e0 exposer les\u00a0impacts\u00a0li\u00e9s au phishing,\u00a0tel que vu et exp\u00e9riment\u00e9 en entreprise ainsi que les plans d&rsquo;action pour traiter ce risque. La pr\u00e9sentation a permis de [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13902,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[174],"tags":[],"class_list":["post-4105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nouvelles-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La s\u00e9curit\u00e9 applicative et l&#039;hame\u00e7onnage |\u00a0OKIOK - Conf\u00e9rence<\/title>\n<meta name=\"description\" content=\"Dans le cadre de la conf\u00e9rence &quot;La s\u00e9curit\u00e9 applicative et l&#039;hame\u00e7onnage&quot; organis\u00e9e par OWASP Montr\u00e9al, OKIOK \u00e0 expos\u00e9 les\u00a0impacts\u00a0li\u00e9s au phishing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La s\u00e9curit\u00e9 applicative et l&#039;hame\u00e7onnage |\u00a0OKIOK - Conf\u00e9rence\" \/>\n<meta property=\"og:description\" content=\"Dans le cadre de la conf\u00e9rence &quot;La s\u00e9curit\u00e9 applicative et l&#039;hame\u00e7onnage&quot; organis\u00e9e par OWASP Montr\u00e9al, OKIOK \u00e0 expos\u00e9 les\u00a0impacts\u00a0li\u00e9s au phishing.\" \/>\n<meta property=\"og:site_name\" content=\"OKIOK - Securit\u00e9 dans un monde en changement\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/okiokdata\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-24T21:02:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-10T14:01:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.okiok.com\/wp-content\/uploads\/2016\/10\/AdobeStock_93466086.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1680\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre Pieyre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OKIOKdata\" \/>\n<meta name=\"twitter:site\" content=\"@OKIOKdata\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre Pieyre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La s\u00e9curit\u00e9 applicative et l'hame\u00e7onnage |\u00a0OKIOK - Conf\u00e9rence","description":"Dans le cadre de la conf\u00e9rence \"La s\u00e9curit\u00e9 applicative et l'hame\u00e7onnage\" organis\u00e9e par OWASP Montr\u00e9al, OKIOK \u00e0 expos\u00e9 les\u00a0impacts\u00a0li\u00e9s au phishing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"La s\u00e9curit\u00e9 applicative et l'hame\u00e7onnage |\u00a0OKIOK - Conf\u00e9rence","og_description":"Dans le cadre de la conf\u00e9rence \"La s\u00e9curit\u00e9 applicative et l'hame\u00e7onnage\" organis\u00e9e par OWASP Montr\u00e9al, OKIOK \u00e0 expos\u00e9 les\u00a0impacts\u00a0li\u00e9s au phishing.","og_site_name":"OKIOK - Securit\u00e9 dans un monde en changement","article_publisher":"https:\/\/www.facebook.com\/okiokdata\/","article_published_time":"2016-02-24T21:02:47+00:00","article_modified_time":"2022-11-10T14:01:31+00:00","og_image":[{"width":1680,"height":1200,"url":"https:\/\/www.okiok.com\/wp-content\/uploads\/2016\/10\/AdobeStock_93466086.jpeg","type":"image\/jpeg"}],"author":"Alexandre Pieyre","twitter_card":"summary_large_image","twitter_creator":"@OKIOKdata","twitter_site":"@OKIOKdata","twitter_misc":{"\u00c9crit par":"Alexandre Pieyre","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.okiok.com\/fr\/4105-2\/#article","isPartOf":{"@id":"https:\/\/www.okiok.com\/fr\/4105-2\/"},"author":{"name":"Alexandre Pieyre","@id":"https:\/\/www.okiok.com\/fr\/#\/schema\/person\/669fc5af284f5f7d1960a0a44594dc03"},"headline":"La s\u00e9curit\u00e9 applicative et l&rsquo;hame\u00e7onnage &#8211; Conf\u00e9rence d&rsquo;OKIOK @ OWASP Montr\u00e9al","datePublished":"2016-02-24T21:02:47+00:00","dateModified":"2022-11-10T14:01:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.okiok.com\/fr\/4105-2\/"},"wordCount":558,"commentCount":0,"publisher":{"@id":"https:\/\/www.okiok.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.okiok.com\/fr\/4105-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.okiok.com\/wp-content\/uploads\/2016\/10\/AdobeStock_93466086.jpeg","articleSection":["Nouvelles"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.okiok.com\/fr\/4105-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.okiok.com\/fr\/4105-2\/","url":"https:\/\/www.okiok.com\/fr\/4105-2\/","name":"La s\u00e9curit\u00e9 applicative et l'hame\u00e7onnage |\u00a0OKIOK - Conf\u00e9rence","isPartOf":{"@id":"https:\/\/www.okiok.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.okiok.com\/fr\/4105-2\/#primaryimage"},"image":{"@id":"https:\/\/www.okiok.com\/fr\/4105-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.okiok.com\/wp-content\/uploads\/2016\/10\/AdobeStock_93466086.jpeg","datePublished":"2016-02-24T21:02:47+00:00","dateModified":"2022-11-10T14:01:31+00:00","description":"Dans le cadre de la conf\u00e9rence \"La s\u00e9curit\u00e9 applicative et l'hame\u00e7onnage\" organis\u00e9e par OWASP Montr\u00e9al, OKIOK \u00e0 expos\u00e9 les\u00a0impacts\u00a0li\u00e9s au phishing.","breadcrumb":{"@id":"https:\/\/www.okiok.com\/fr\/4105-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.okiok.com\/fr\/4105-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.okiok.com\/fr\/4105-2\/#primaryimage","url":"https:\/\/www.okiok.com\/wp-content\/uploads\/2016\/10\/AdobeStock_93466086.jpeg","contentUrl":"https:\/\/www.okiok.com\/wp-content\/uploads\/2016\/10\/AdobeStock_93466086.jpeg","width":1680,"height":1200,"caption":"Background image bulbs"},{"@type":"BreadcrumbList","@id":"https:\/\/www.okiok.com\/fr\/4105-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/prod.okiok.com\/fr\/"},{"@type":"ListItem","position":2,"name":"La s\u00e9curit\u00e9 applicative et l&rsquo;hame\u00e7onnage &#8211; Conf\u00e9rence d&rsquo;OKIOK @ OWASP Montr\u00e9al"}]},{"@type":"WebSite","@id":"https:\/\/www.okiok.com\/fr\/#website","url":"https:\/\/www.okiok.com\/fr\/","name":"OKIOK - Securit\u00e9 dans un monde en changement","description":"","publisher":{"@id":"https:\/\/www.okiok.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.okiok.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.okiok.com\/fr\/#organization","name":"Okiok","url":"https:\/\/www.okiok.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.okiok.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.okiok.com\/wp-content\/uploads\/2017\/06\/logo-okiok-2.png","contentUrl":"https:\/\/www.okiok.com\/wp-content\/uploads\/2017\/06\/logo-okiok-2.png","width":300,"height":369,"caption":"Okiok"},"image":{"@id":"https:\/\/www.okiok.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/okiokdata\/","https:\/\/x.com\/OKIOKdata","https:\/\/www.linkedin.com\/company-beta\/119436\/"]},{"@type":"Person","@id":"https:\/\/www.okiok.com\/fr\/#\/schema\/person\/669fc5af284f5f7d1960a0a44594dc03","name":"Alexandre Pieyre","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.okiok.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/www.okiok.com\/wp-content\/litespeed\/avatar\/e2b9fc83efdede4b78bd25eacf619367.jpg?ver=1776193541","contentUrl":"https:\/\/www.okiok.com\/wp-content\/litespeed\/avatar\/e2b9fc83efdede4b78bd25eacf619367.jpg?ver=1776193541","caption":"Alexandre Pieyre"}}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/posts\/4105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/comments?post=4105"}],"version-history":[{"count":3,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/posts\/4105\/revisions"}],"predecessor-version":[{"id":22742,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/posts\/4105\/revisions\/22742"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/media\/13902"}],"wp:attachment":[{"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/media?parent=4105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/categories?post=4105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.okiok.com\/fr\/wp-json\/wp\/v2\/tags?post=4105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}