{"id":32,"date":"2022-12-15T17:17:39","date_gmt":"2022-12-15T16:17:39","guid":{"rendered":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/?page_id=32"},"modified":"2025-04-13T17:54:06","modified_gmt":"2025-04-13T15:54:06","slug":"defense-cyber","status":"publish","type":"page","link":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/","title":{"rendered":"Rencontres D\u00e9fense et Cyber 2022"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-background-color:var(--awb-color4);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2200\" height=\"472\" alt=\"1\u00e8res Rencontres D\u00e9fense et Cyber 2022\" title=\"Rencontres D\u00e9fense et Cyber 2022\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/RDEFENSECYBER-2022-Banniere-3.jpg\" class=\"img-responsive wp-image-987\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/RDEFENSECYBER-2022-Banniere-3-200x43.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/RDEFENSECYBER-2022-Banniere-3-400x86.jpg 400w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/RDEFENSECYBER-2022-Banniere-3-600x129.jpg 600w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/RDEFENSECYBER-2022-Banniere-3-800x172.jpg 800w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/RDEFENSECYBER-2022-Banniere-3-1200x257.jpg 1200w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/RDEFENSECYBER-2022-Banniere-3.jpg 2200w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:10px;--awb-margin-top:0px;--awb-background-color:var(--awb-color5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;line-height:1.6em;\">Les 1eres <strong>RENCONTRES DEFENSE &amp; CYBER<\/strong> se sont d\u00e9roul\u00e9es le 19 octobre 2022 \u00e0 Lyon dans les salons de l\u2019H\u00f4tel du D\u00e9partement du Rh\u00f4ne, gr\u00e2ce au soutien de son Pr\u00e9sident, <strong><a style=\"color: #ffffff;\" href=\"https:\/\/defense-cyber.fr\/intervenants-defense-cyber\/guilloteau-christophe\/\" target=\"_blank\" rel=\"noopener\">Christophe GUILLOTEAU<\/a><\/strong>. s\u2019inscrivent dans la dynamique du <strong>CYCLE DEFENSE &amp; CYBER<\/strong> lanc\u00e9 d\u00e9but 2022 \u00e0 Lyon dans le prolongement de notre action dans le secteur de la D\u00e9fense et de notre implication en Auvergne-Rh\u00f4ne-Alpes.<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-padding-bottom:10px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);--awb-filter:saturate(0%);--awb-filter-transition:filter 0.3s ease;--awb-filter-hover:saturate(100%);\"><span class=\" fusion-imageframe imageframe-dropshadow imageframe-2 hover-type-none\" style=\"border-radius:10px;-webkit-box-shadow: 3px 3px 7px rgba(67,67,67,0.65);box-shadow: 3px 3px 7px rgba(67,67,67,0.65);\"><img decoding=\"async\" width=\"640\" height=\"428\" alt=\"Christophe Guilloteau aux 1\u00e8res rencontres D\u00e9fense et Cyber\" title=\"Christophe Guilloteau aux 1\u00e8res rencontres D\u00e9fense et Cyber\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_4555.jpg\" class=\"img-responsive wp-image-907\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_4555-200x134.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_4555-400x268.jpg 400w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_4555-600x401.jpg 600w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_4555.jpg 640w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:center;\"><p><strong>M. Christophe GUILLOTEAU<\/strong><br \/>\nPr\u00e9sident du d\u00e9partement du Rh\u00f4ne<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color6);--awb-font-size:24px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h1 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\">Les 1\u00e8res Rencontres D\u00e9fense &amp; Cyber 2022<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:justify;\"><p>Un \u00e9v\u00e9nement qui s\u2019inscrit dans le cadre du CYCLE DEFENSE &amp; CYBER lanc\u00e9 cette ann\u00e9e \u00e0 Lyon et qui a d\u00e9j\u00e0 donn\u00e9 lieu aux MATINEES DEFENSE &amp; CYBER qui se sont d\u00e9roul\u00e9es <a href=\"https:\/\/defense-cyber.fr\/matinees-defense-cyber\/ingerence-et-influence\/\" target=\"_blank\" rel=\"noopener\">le 16 mars<\/a> et <a href=\"https:\/\/defense-cyber.fr\/matinees-defense-cyber\/gestion-de-crise-cyber\/\" target=\"_blank\" rel=\"noopener\">le 12 juillet<\/a>.<\/p>\n<p><strong>Un rendez-vous privil\u00e9gi\u00e9 <\/strong>pour mieux appr\u00e9hender les enjeux de la cybers\u00e9curit\u00e9 dans le secteur de la D\u00e9fense et pour la D\u00e9fense, \u00e0 destination de la communaut\u00e9 D\u00e9fense \u00e9largie : arm\u00e9es, chercheurs, industriels, \u00e9tudiants en formation D\u00e9fense, RI, s\u00e9curit\u00e9, professeurs\u2026 et \u00e0 la communaut\u00e9 num\u00e9rique et cybers\u00e9curit\u00e9 qui souhaite mieux conna\u00eetre le secteur de la D\u00e9fense.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:20px;--awb-background-color:var(--awb-color7);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><ul style=\"--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons txt-justify\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Des TRAVAUX et des PARTAGES d\u2019EXPERTISES :<\/strong><\/p>\n<ul>\n<li><strong>une table ronde<\/strong> autour de \u00ab\u00a0La cybers\u00e9curit\u00e9 de la supply chain de la BITD : un enjeu majeur pour la D\u00e9fense\u00a0\u00bb ,<\/li>\n<li><strong>des keynotes :<\/strong> quels m\u00e9tiers de la cybers\u00e9curit\u00e9 dans la D\u00e9fense, un retex DEFNET<\/li>\n<li><strong>une session d\u2019ateliers r\u00e9serv\u00e9s aux professionnels : <\/strong>relations grands groupes \u2013 pmepmi, innovation<\/li>\n<li><strong>des conf\u00e9rences : <\/strong>la dimension cyber de la guerre russo-ukrainienne, le lien Arm\u00e9e-Nation sur la cybers\u00e9curit\u00e9-cyberd\u00e9fense<\/li>\n<li><strong>la projection d\u2019un film de sensibilisation sur la s\u00e9curit\u00e9 num\u00e9rique \u2013 s\u00e9curit\u00e9 \u00e9conomique \u00e0 destination des jeunes<\/strong> \u2013 mais tout aussi utile pour les moins jeunes !<\/li>\n<\/ul>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Des <strong>MOMENTS de CONVIVIALITE<\/strong> pour d\u00e9velopper son r\u00e9seau relationnel, \u00e9changer de mani\u00e8re privil\u00e9gi\u00e9 avec des repr\u00e9sentants d\u2019INSTITUTIONS DEFENSE, d\u2019ENTREPRISES et de FORMATIONS qui seront pr\u00e9sents avec des corners.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Un <strong>EVENEMENT avec une dimension CARITATIVE <\/strong>: les Rencontres D\u00e9fense &amp; Cyber qui sera \u00e9galement l\u2019occasion de collecter des fonds au profit des bless\u00e9s de guerre en partenariat avec le Bleuet de France.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Un <strong>EVENEMENT qui accueille la RENTREE DU TRINOME ACADEMIQUE DE LYON<\/strong> : parce que la D\u00e9fense et la Cybers\u00e9curit\u00e9 sont des sujets majeurs qui impliquent chacun une dimension \u00e9ducation, nous sommes ravis d\u2019accueillir en cl\u00f4ture de la journ\u00e9e la Rentr\u00e9e du Trin\u00f4me Acad\u00e9mique de Lyon pour continuer les \u00e9changes.<\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:600px;--awb-max-height:360px;--awb-margin-bottom:20px;\"><div class=\"video-shortcode\"><div class=\"fluid-width-video-wrapper\" style=\"padding-top:60%;\" ><iframe title=\"YouTube video player 1\" src=\"https:\/\/www.youtube.com\/embed\/eusUEKjxPw0?wmode=transparent&autoplay=0\" width=\"600\" height=\"360\" allowfullscreen allow=\"autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture;\"><\/iframe><\/div><\/div><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-content-alignment:center;\"><p><strong>B\u00e9n\u00e9dicte PILLIET<\/strong><br \/>\nPr\u00e9sident du CyberCercle<\/p>\n<p><strong>\u00ab\u00a0Pourquoi des Rencontres D\u00e9fense &amp; Cyber \u00e0 Lyon ?\u00a0\u00bb<\/strong><\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color1);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color4);--button_gradient_bottom_color:var(--awb-color4);--button_gradient_top_color_hover:var(--awb-color6);--button_gradient_bottom_color_hover:var(--awb-color6);--button_margin-top:20px;\" target=\"_self\" href=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/programme-defense-et-cyber-2022\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">LE PROGRAMME<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:justify;\"><p>Elle associe <strong><a href=\"https:\/\/www.jeunes-ihedn.org\/\" target=\"_blank\" rel=\"noopener\">LES JEUNES IHEDN<\/a><\/strong>, <strong><a href=\"https:\/\/trinome-academique.enseigne.ac-lyon.fr\/spip\/\" target=\"_blank\" rel=\"noopener\">le Trin\u00f4me Acad\u00e9mique de l\u2019Acad\u00e9mie de Lyon<\/a><\/strong>, l\u2019AR-14 R\u00e9gion Lyonnaise de l\u2019IHEDN et le <strong><a href=\"https:\/\/facdedroit.univ-lyon3.fr\/master-relations-internationales-et-diplomatie-2\" target=\"_blank\" rel=\"noopener\">Master Relations Internationales de l\u2019Universit\u00e9 Lyon 3.<\/a><\/strong><\/p>\n<\/div><ul style=\"--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-2 fusion-checklist-default type-icons txt-justify\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Un objectif<\/strong>\u00a0: \u00eatre \u00e0 Lyon\u00a0<strong>un cadre d\u2019\u00e9changes de confiance<\/strong> sur les questions de s\u00e9curit\u00e9 num\u00e9rique li\u00e9es \u00e0 la DEFENSE.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Des rendez-vous r\u00e9guliers<\/strong> : des matin\u00e9es trimestrielles, les <strong>MATINEES DEFENSE &amp; CYBER<\/strong>, et un colloque annuel, <strong>les RENCONTRES DEFENSE &amp; CYBER<\/strong>.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Pour qui<\/strong>\u00a0: Le CYCLE DEFENSE &amp; CYBER s\u2019adresse \u00e0<strong>\u00a0l\u2019ensemble des acteurs, civils et militaires, de la D\u00e9fense et impliqu\u00e9s sur les sujets D\u00e9fense<\/strong>\u00a0qui veulent mieux comprendre les enjeux de la cybers\u00e9curit\u00e9 et aux <strong>acteurs de la Cybers\u00e9curit\u00e9\u00a0<\/strong>qui souhaitent mieux appr\u00e9hender le secteur de la D\u00e9fense.<\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:20px;--awb-background-color:var(--awb-color5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:30px;--awb-sep-color:var(--awb-color1);--awb-font-size:24px;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color1);\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h3 class=\"fusion-title-heading title-heading-center\" style=\"margin:0;font-size:1em;\">Les 1\u00e8res Rencontres D\u00e9fense &amp; Cyber en images<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color1);\"><\/div><\/div><\/div><div class=\"awb-gallery-wrapper awb-gallery-wrapper-1 button-span-no\" style=\"--more-btn-alignment:center;\"><div style=\"margin:-5px;--awb-bordersize:0px;\" class=\"fusion-gallery fusion-gallery-container fusion-grid-5 fusion-columns-total-5 fusion-gallery-layout-grid fusion-gallery-1\"><div style=\"padding:5px;\" class=\"fusion-grid-column fusion-gallery-column fusion-gallery-column-5 hover-type-zoomin\"><div class=\"fusion-gallery-image\"><img decoding=\"async\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_4553-320x202.jpg\" width=\"320\" height=\"202\" alt=\"Christophe Guilloteau aux 1\u00e8res rencontres D\u00e9fense et Cyber\" title=\"Christophe Guilloteau aux 1\u00e8res rencontres D\u00e9fense et Cyber\" aria-label=\"Christophe Guilloteau aux 1\u00e8res rencontres D\u00e9fense et Cyber\" class=\"img-responsive wp-image-905 fusion-gallery-image-size-fixed\"  \/><\/div><\/div><div style=\"padding:5px;\" class=\"fusion-grid-column fusion-gallery-column fusion-gallery-column-5 hover-type-zoomin\"><div class=\"fusion-gallery-image\"><img decoding=\"async\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_4556-320x202.jpg\" width=\"320\" height=\"202\" alt=\"B\u00e9n\u00e9dicte Pilliet et Beno\u00eet Moreau aux 1\u00e8res rencontres D\u00e9fense et Cyber\" title=\"B\u00e9n\u00e9dicte Pilliet et Beno\u00eet Moreau aux 1\u00e8res rencontres D\u00e9fense et Cyber\" aria-label=\"B\u00e9n\u00e9dicte Pilliet et Beno\u00eet Moreau aux 1\u00e8res rencontres D\u00e9fense et Cyber\" class=\"img-responsive wp-image-908 fusion-gallery-image-size-fixed\"  \/><\/div><\/div><div style=\"padding:5px;\" class=\"fusion-grid-column fusion-gallery-column fusion-gallery-column-5 hover-type-zoomin\"><div class=\"fusion-gallery-image\"><img decoding=\"async\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_42021-320x202.jpeg\" width=\"320\" height=\"202\" alt=\"Ev\u00e9nement de rentr\u00e9e du trin\u00f4me acad\u00e9mique de Lyon - 1\u00e8res rencontres D\u00e9fense et Cyber\" title=\"Ev\u00e9nement de rentr\u00e9e du trin\u00f4me acad\u00e9mique de Lyon &#8211; 1\u00e8res rencontres D\u00e9fense et Cybers\" aria-label=\"Ev\u00e9nement de rentr\u00e9e du trin\u00f4me acad\u00e9mique de Lyon &#8211; 1\u00e8res rencontres D\u00e9fense et Cybers\" class=\"img-responsive wp-image-911 fusion-gallery-image-size-fixed\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_42021-320x202.jpeg 320w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_42021-700x441.jpeg 700w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/div><\/div><div style=\"padding:5px;\" class=\"fusion-grid-column fusion-gallery-column fusion-gallery-column-5 hover-type-zoomin\"><div class=\"fusion-gallery-image\"><img decoding=\"async\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_4554-320x202.jpg\" width=\"320\" height=\"202\" alt=\"8h30 : ouverture des travaux des 1\u00e8res rencontres D\u00e9fense et Cyber\" title=\"8h30 : ouverture des travaux des 1\u00e8res rencontres D\u00e9fense et Cyber\" aria-label=\"8h30 : ouverture des travaux des 1\u00e8res rencontres D\u00e9fense et Cyber\" class=\"img-responsive wp-image-906 fusion-gallery-image-size-fixed\"  \/><\/div><\/div><div style=\"padding:5px;\" class=\"fusion-grid-column fusion-gallery-column fusion-gallery-column-5 hover-type-zoomin\"><div class=\"fusion-gallery-image\"><img decoding=\"async\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/IMG_4109-rotated-1-320x202.jpg\" width=\"320\" height=\"202\" alt=\"Table ronde : La cybers\u00e9curit\u00e9 de la supply chain de la BITD\" title=\"Table ronde : La cybers\u00e9curit\u00e9 de la supply chain de la BITD\" aria-label=\"Table ronde : La cybers\u00e9curit\u00e9 de la supply chain de la BITD\" class=\"img-responsive wp-image-881 fusion-gallery-image-size-fixed\"  \/><\/div><\/div><div class=\"clearfix\"><\/div><\/div><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color1);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color4);--button_gradient_bottom_color:var(--awb-color4);--button_gradient_top_color_hover:var(--awb-color6);--button_gradient_bottom_color_hover:var(--awb-color6);--button_margin-top:40px;\" target=\"_self\" href=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/rencontres-defense-cyber-galerie\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">voir les photos et vid\u00e9os<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:20px;--awb-background-color:var(--awb-color4);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color1);--awb-font-size:24px;\"><h3 class=\"fusion-title-heading title-heading-center\" style=\"margin:0;text-transform:none;font-size:1em;\"><p>Vous avez besoin de plus d\u2019informations ?<br \/>\nOu vous souhaitez devenir partenaire, sponsor de notre cycle D\u00e9fense &amp; Cyber ?<\/p><\/h3><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-3 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color4);--button_accent_hover_color:var(--awb-color6);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color7);--button_gradient_bottom_color_hover:var(--awb-color7);\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/defense-cyber.fr\/contact-defense-cyber\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Contactez-nous<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-padding-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-bottom:30px;--awb-font-size:24px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-bottom:10px;--awb-font-size:24px;\"><h4 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\">Nos partenaires<\/h4><\/div><div class=\"fusion-image-carousel fusion-image-carousel-fixed fusion-image-carousel-1 fusion-carousel-border\"><div class=\"awb-carousel awb-swiper awb-swiper-carousel awb-carousel--carousel awb-swiper-dots-position-bottom\" data-layout=\"carousel\" data-autoplay=\"yes\" data-autoplayspeed=\"2500\" data-autoplaypause=\"no\" data-columns=\"5\" data-columnsmedium=\"1\" data-columnssmall=\"1\" data-itemmargin=\"13\" data-itemwidth=\"180\" data-touchscroll=\"no\" data-freemode=\"no\" data-imagesize=\"fixed\" data-scrollitems=\"0\" data-centeredslides=\"no\" data-rotationangle=\"50\" data-depth=\"100\" data-speed=\"500\" data-shadow=\"no\" data-pagination=\"bullets\" style=\"--awb-border-width:1px;--awb-border-color:#e9eaee;--awb-dots-align:center;\"><div class=\"swiper-wrapper awb-image-carousel-wrapper fusion-flex-align-items-center\"><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/DEPARTEMENT-RHONE.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"D\u00e9partement du Rh\u00f4ne, partenaire du Cycle D\u00e9fense et Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/DEPARTEMENT-RHONE-200x80.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/DEPARTEMENT-RHONE.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/AVANT-DE-CLIQUER-Logo.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Avant de cliquer, partenaire du cycle D\u00e9fense et Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/AVANT-DE-CLIQUER-Logo-200x80.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/AVANT-DE-CLIQUER-Logo.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/Cybersecurity-business-school.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"CSB School, partenaire du cycle D\u00e9fense et Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/Cybersecurity-business-school-200x80.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/Cybersecurity-business-school.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"162\" height=\"133\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/CEA-Logo.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"CEA, partenaire du cycle D\u00e9fense et Cyber\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/CERTITUDE-NUMERIQUE-Logo2.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Certitude Num\u00e9rique, partenaire du cycle D\u00e9fense et Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/CERTITUDE-NUMERIQUE-Logo2-200x80.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/CERTITUDE-NUMERIQUE-Logo2.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"150\" height=\"149\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2024\/03\/DGA_Logo_small.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"DGA partenaire du Cycle D\u00e9fense et Cyber\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/ELYSIUM-Logo.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Elysium Security, partenaire du cycle D\u00e9fense et Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/ELYSIUM-Logo-200x80.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/ELYSIUM-Logo.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/NEXTER-Logo.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Nexter, partenaire du cycle D\u00e9fense et Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/NEXTER-Logo-200x80.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/NEXTER-Logo.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/div><\/div><\/div><\/div><div class=\"awb-swiper-button awb-swiper-button-prev\"><i class=\"awb-icon-angle-left\" aria-hidden=\"true\"><\/i><\/div><div class=\"awb-swiper-button awb-swiper-button-next\"><i class=\"awb-icon-angle-right\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-bottom:10px;--awb-font-size:24px;\"><h4 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\">Nos soutiens<\/h4><\/div><div class=\"fusion-image-carousel fusion-image-carousel-fixed fusion-image-carousel-2 fusion-carousel-border\"><div class=\"awb-carousel awb-swiper awb-swiper-carousel awb-carousel--carousel awb-swiper-dots-position-bottom\" data-layout=\"carousel\" data-autoplay=\"yes\" data-autoplayspeed=\"2500\" data-autoplaypause=\"no\" data-columns=\"5\" data-columnsmedium=\"1\" data-columnssmall=\"1\" data-itemmargin=\"13\" data-itemwidth=\"180\" data-touchscroll=\"no\" data-freemode=\"no\" data-imagesize=\"fixed\" data-scrollitems=\"0\" data-centeredslides=\"no\" data-rotationangle=\"50\" data-depth=\"100\" data-speed=\"500\" data-shadow=\"no\" data-pagination=\"bullets\" style=\"--awb-border-width:1px;--awb-border-color:#e9eaee;--awb-dots-align:center;\"><div class=\"swiper-wrapper awb-image-carousel-wrapper fusion-flex-align-items-center\"><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"180\" height=\"180\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/MINISTERE-DES-ARMEES-Logo3.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Minist\u00e8re des arm\u00e9es, soutien du cycle D\u00e9fense et Cyber\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"180\" height=\"180\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/COM-CYBER-Logo2.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"COMCYBER, soutien du cycle D\u00e9fense et Cyber\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"180\" height=\"180\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/DRSD-Logo2.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"La DRSD, soutien du cycle D\u00e9fense et Cyber\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"180\" height=\"180\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/AUDITEURS-IHEDN-Logo2.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Association des auditeurs de l&#039;IHEDN, soutien de D\u00e9fense et Cyber\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"180\" height=\"180\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/DICE-Logo2.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Dic\u00e9, soutien du cycle D\u00e9fense et Cyber\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"180\" height=\"180\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/JEUNES-IHEDN-Logo2.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Les jeunes de l&#039;IHEDN, soutien de D\u00e9fense et Cyber\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"152\" height=\"152\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/LRCS-Logo.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"LRCS, soutien du cycle D\u00e9fense et Cyber\" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/ONAC-VG-Logo.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"ONAC VG et le Bleuet de France, soutiens de D\u00e9fense et Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/ONAC-VG-Logo-200x80.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/ONAC-VG-Logo.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/UNIVERSITE-JEAN-MOULIN-Logot.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Universit\u00e9 Jean Moulin, soutien de D\u00e9fense et Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/UNIVERSITE-JEAN-MOULIN-Logot-200x80.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2022\/12\/UNIVERSITE-JEAN-MOULIN-Logot.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/div><\/div><\/div><\/div><div class=\"awb-swiper-button awb-swiper-button-prev\"><i class=\"awb-icon-angle-left\" aria-hidden=\"true\"><\/i><\/div><div class=\"awb-swiper-button awb-swiper-button-next\"><i class=\"awb-icon-angle-right\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-32","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Rencontres D\u00e9fense et Cyber 2022 by Cybercercle<\/title>\n<meta name=\"description\" content=\"Les rencontres D\u00e9fense et Cyber d\u00e9di\u00e9es \u00e0 la cybers\u00e9curit\u00e9 du secteur de la D\u00e9fense, des forces arm\u00e9es, de la BITD ...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"1\u00e8res Rencontres D\u00e9fense et Cyber by CyberCercle\" \/>\n<meta property=\"og:description\" content=\"Les 1eres RENCONTRES DEFENSE &amp; CYBER se sont d\u00e9roul\u00e9es le 19 octobre 2022 \u00e0 Lyon dans les salons de l\u2019H\u00f4tel du D\u00e9partement du Rh\u00f4ne. En savoir plus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Rencontres D\u00e9fense et Cyber 2022\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-13T15:54:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/OP-RC-19102022.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"1\u00e8res Rencontres D\u00e9fense et Cyber by CyberCercle\" \/>\n<meta name=\"twitter:description\" content=\"Les 1eres RENCONTRES DEFENSE &amp; CYBER se sont d\u00e9roul\u00e9es le 19 octobre 2022 \u00e0 Lyon dans les salons de l\u2019H\u00f4tel du D\u00e9partement du Rh\u00f4ne. En savoir plus.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/OP-RC-19102022.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2022\\\/\",\"url\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2022\\\/\",\"name\":\"Rencontres D\u00e9fense et Cyber 2022 by Cybercercle\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2022\\\/#website\"},\"datePublished\":\"2022-12-15T16:17:39+00:00\",\"dateModified\":\"2025-04-13T15:54:06+00:00\",\"description\":\"Les rencontres D\u00e9fense et Cyber d\u00e9di\u00e9es \u00e0 la cybers\u00e9curit\u00e9 du secteur de la D\u00e9fense, des forces arm\u00e9es, de la BITD ...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2022\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2022\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2022\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rencontres D\u00e9fense et Cyber 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2022\\\/#website\",\"url\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2022\\\/\",\"name\":\"Rencontres D\u00e9fense et Cyber 2022\",\"description\":\"Matin\u00e9es et Rencontres D\u00e9fense &amp; Cyber\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2022\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rencontres D\u00e9fense et Cyber 2022 by Cybercercle","description":"Les rencontres D\u00e9fense et Cyber d\u00e9di\u00e9es \u00e0 la cybers\u00e9curit\u00e9 du secteur de la D\u00e9fense, des forces arm\u00e9es, de la BITD ...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/","og_locale":"fr_FR","og_type":"article","og_title":"1\u00e8res Rencontres D\u00e9fense et Cyber by CyberCercle","og_description":"Les 1eres RENCONTRES DEFENSE & CYBER se sont d\u00e9roul\u00e9es le 19 octobre 2022 \u00e0 Lyon dans les salons de l\u2019H\u00f4tel du D\u00e9partement du Rh\u00f4ne. En savoir plus.","og_url":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/","og_site_name":"Rencontres D\u00e9fense et Cyber 2022","article_modified_time":"2025-04-13T15:54:06+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/OP-RC-19102022.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"1\u00e8res Rencontres D\u00e9fense et Cyber by CyberCercle","twitter_description":"Les 1eres RENCONTRES DEFENSE & CYBER se sont d\u00e9roul\u00e9es le 19 octobre 2022 \u00e0 Lyon dans les salons de l\u2019H\u00f4tel du D\u00e9partement du Rh\u00f4ne. En savoir plus.","twitter_image":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-content\/uploads\/sites\/2\/2023\/01\/OP-RC-19102022.jpg","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/","url":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/","name":"Rencontres D\u00e9fense et Cyber 2022 by Cybercercle","isPartOf":{"@id":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/#website"},"datePublished":"2022-12-15T16:17:39+00:00","dateModified":"2025-04-13T15:54:06+00:00","description":"Les rencontres D\u00e9fense et Cyber d\u00e9di\u00e9es \u00e0 la cybers\u00e9curit\u00e9 du secteur de la D\u00e9fense, des forces arm\u00e9es, de la BITD ...","breadcrumb":{"@id":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defense-cyber.fr\/rdefensecyber2022\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/"},{"@type":"ListItem","position":2,"name":"Rencontres D\u00e9fense et Cyber 2022"}]},{"@type":"WebSite","@id":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/#website","url":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/","name":"Rencontres D\u00e9fense et Cyber 2022","description":"Matin\u00e9es et Rencontres D\u00e9fense &amp; Cyber","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-json\/wp\/v2\/pages\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-json\/wp\/v2\/comments?post=32"}],"version-history":[{"count":117,"href":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-json\/wp\/v2\/pages\/32\/revisions"}],"predecessor-version":[{"id":1159,"href":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-json\/wp\/v2\/pages\/32\/revisions\/1159"}],"wp:attachment":[{"href":"https:\/\/defense-cyber.fr\/rdefensecyber2022\/wp-json\/wp\/v2\/media?parent=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}