{"id":32,"date":"2026-01-17T11:00:39","date_gmt":"2026-01-17T10:00:39","guid":{"rendered":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/?page_id=32"},"modified":"2026-03-12T14:47:40","modified_gmt":"2026-03-12T13:47:40","slug":"defense-cyber","status":"publish","type":"page","link":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/","title":{"rendered":"Les Rencontres D\u00e9fense &amp; Cyber"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-background-color:var(--awb-color4);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1920\" height=\"720\" alt=\"Rencontres D\u00e9fense &amp; Cyber 2024\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/Banniere-Cycle-Defense-Cyber_2026.jpg\" class=\"img-responsive wp-image-1692\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/Banniere-Cycle-Defense-Cyber_2026-200x75.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/Banniere-Cycle-Defense-Cyber_2026-400x150.jpg 400w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/Banniere-Cycle-Defense-Cyber_2026-600x225.jpg 600w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/Banniere-Cycle-Defense-Cyber_2026-800x300.jpg 800w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/Banniere-Cycle-Defense-Cyber_2026-1200x450.jpg 1200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/Banniere-Cycle-Defense-Cyber_2026.jpg 1920w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:10px;--awb-margin-top:0px;--awb-background-color:var(--awb-color5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;line-height:1.6em;\">Dans un contexte strat\u00e9gique marqu\u00e9 par la transformation num\u00e9rique des arm\u00e9es, l\u2019acc\u00e9l\u00e9ration des menaces hybrides, l\u2019\u00e9l\u00e9vation du niveau de risque cyber et les exigences croissantes de souverainet\u00e9, de r\u00e9silience et de continuit\u00e9 d\u2019action, accentu\u00e9es par un contexte g\u00e9opolitique international dangereux et incertain, les Rencontres D\u00e9fense &amp; Cyber s\u2019imposent comme un temps privil\u00e9gi\u00e9 de r\u00e9flexion, de dialogue et de mobilisation collective. Inscrite dans la dynamique du <a href=\"https:\/\/defense-cyber.fr\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #ffffff;\">Cycle D\u00e9fense &amp; Cyber<\/span>,<\/a> anim\u00e9e par le CyberCercle depuis 2022, leur 4\u00e8me \u00e9dition, pour la premi\u00e8re fois \u00e0 Paris, constitue un point d\u2019orgue du Cycle 2026 et un rendez-vous affirm\u00e9 sur les enjeux de s\u00e9curit\u00e9 et de confiance num\u00e9riques pour et dans la D\u00e9fense.<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-padding-bottom:10px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-flex-start\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);--awb-filter:saturate(0%);--awb-filter-transition:filter 0.3s ease;--awb-filter-hover:saturate(100%);\"><span class=\" fusion-imageframe imageframe-dropshadow imageframe-2 hover-type-none\" style=\"border-radius:10px;-webkit-box-shadow: 3px 3px 7px rgba(67,67,67,0.65);box-shadow: 3px 3px 7px rgba(67,67,67,0.65);\"><img decoding=\"async\" width=\"300\" height=\"230\" alt=\"Rencontres D\u00e9fense et Cyber 2024\" title=\"Rencontres D\u00e9fense et Cyber 2024\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/RDefCyber-2024-scaled-e1718190794388-300x230.jpg\" class=\"img-responsive wp-image-1569\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/RDefCyber-2024-scaled-e1718190794388-200x153.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/RDefCyber-2024-scaled-e1718190794388-400x306.jpg 400w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/RDefCyber-2024-scaled-e1718190794388-600x460.jpg 600w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/RDefCyber-2024-scaled-e1718190794388-800x613.jpg 800w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/RDefCyber-2024-scaled-e1718190794388-1200x919.jpg 1200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/RDefCyber-2024-scaled-e1718190794388.jpg 1787w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);--awb-filter:saturate(0%);--awb-filter-transition:filter 0.3s ease;--awb-filter-hover:saturate(100%);\"><span class=\" fusion-imageframe imageframe-dropshadow imageframe-3 hover-type-none\" style=\"border-radius:10px;-webkit-box-shadow: 3px 3px 7px rgba(67,67,67,0.65);box-shadow: 3px 3px 7px rgba(67,67,67,0.65);\"><img decoding=\"async\" width=\"300\" height=\"225\" alt=\"Cycle D\u00e9fense &amp; Cyber 2025\" title=\"Cycle D\u00e9fense &#038; Cyber 2025\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/1854352c-f532-4db5-a489-3b4d06dcbe90-300x225.jpg\" class=\"img-responsive wp-image-1785\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/1854352c-f532-4db5-a489-3b4d06dcbe90-200x150.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/1854352c-f532-4db5-a489-3b4d06dcbe90-400x300.jpg 400w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/1854352c-f532-4db5-a489-3b4d06dcbe90-600x450.jpg 600w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/1854352c-f532-4db5-a489-3b4d06dcbe90-800x600.jpg 800w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/1854352c-f532-4db5-a489-3b4d06dcbe90-1200x900.jpg 1200w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);--awb-filter:saturate(0%);--awb-filter-transition:filter 0.3s ease;--awb-filter-hover:saturate(100%);\"><span class=\" fusion-imageframe imageframe-dropshadow imageframe-4 hover-type-none\" style=\"border-radius:10px;-webkit-box-shadow: 3px 3px 7px rgba(67,67,67,0.65);box-shadow: 3px 3px 7px rgba(67,67,67,0.65);\"><img decoding=\"async\" width=\"300\" height=\"225\" alt=\"Cycle D\u00e9fense &amp; Cyber 2025\" title=\"Cycle D\u00e9fense &#038; Cyber 2025\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/IMG_9956-300x225.jpg\" class=\"img-responsive wp-image-1788\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/IMG_9956-200x150.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/IMG_9956-400x300.jpg 400w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/IMG_9956-600x450.jpg 600w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/IMG_9956.jpg 640w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:24px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h1 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\">Une journ\u00e9e \u00e0 destination des acteurs de la Communaut\u00e9 de D\u00e9fense et de la Communaut\u00e9 Cyber<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:justify;\"><p>Pens\u00e9es comme un cadre de confiance, en format restreint et plac\u00e9es sous les r\u00e8gles de Chatham House, les Rencontres D\u00e9fense &amp; Cyber ont pour vocation de faire dialoguer des acteurs civils et militaires qui, par leurs responsabilit\u00e9s, leurs expertises et leur engagement, oeuvrent, dans et pour la D\u00e9fense dans le champ cyber.<\/p>\n<p>Elles r\u00e9unissent ainsi la communaut\u00e9 de D\u00e9fense et la communaut\u00e9 Cyber dans leur diversit\u00e9 : \u00e9lus, arm\u00e9es, institutions, industriels de la BITD, experts, chercheurs, enseignants, offreurs de solutions et d\u00e9cideurs publics.<\/p>\n<p>Cette vocation de mise en relation est au c\u0153ur de leur identit\u00e9 : cr\u00e9er un langage commun, rapprocher les cultures professionnelles, faire dialoguer strat\u00e9gie, politiques publiques, retours d\u2019exp\u00e9rience et besoins de terrain.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:24px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h1 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\">Un cadre privil\u00e9gi\u00e9 de dialogue<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:justify;\"><p data-start=\"1692\" data-end=\"2204\">Les Rencontres D\u00e9fense &amp; Cyber repr\u00e9sentent ainsi un espace exigeant de travaux, de partages d\u2019expertise et de r\u00e9flexion collective sur les enjeux de s\u00e9curit\u00e9 et de confiance num\u00e9riques qui concernent la D\u00e9fense. Au-del\u00e0 de l\u2019\u00e9v\u00e9nement lui-m\u00eame, elles visent \u00e0 nourrir une culture commune, \u00e0 croiser les approches institutionnelles, op\u00e9rationnelles, industrielles et acad\u00e9miques, et \u00e0 favoriser l\u2019\u00e9mergence d\u2019analyses partag\u00e9es sur des sujets devenus structurants pour la D\u00e9fense nationale. Elles permettent \u00e9galement d&rsquo;alimenter la r\u00e9flexion sur les politiques publiques qui pourraient \u00eatre mises en oeuvre pour accompagner la mont\u00e9e en puissance de cet enjeu au coeur de la D\u00e9fense.<\/p>\n<p data-start=\"2206\" data-end=\"2575\">Les Rencontres D\u00e9fense &amp; Cyber traduisent une conviction forte port\u00e9e par le CyberCercle : les enjeux cyber de la D\u00e9fense appellent \u00e0 la fois de la hauteur de vue, de la coop\u00e9ration, du d\u00e9cloisonnement et une capacit\u00e9 \u00e0 faire dialoguer, au-del\u00e0 des experts, des univers qui se connaissent parfois encore insuffisamment.<\/p>\n<p data-start=\"2206\" data-end=\"2575\">Une philosophie de partage, de d\u00e9cloisonnement des silots et de travail en commun au coeur de l&rsquo;action du CyberCercle.<\/p>\n<p data-start=\"2206\" data-end=\"2575\">C\u2019est dans cet esprit que le Cycle D\u00e9fense &amp; Cyber a \u00e9t\u00e9 con\u00e7u depuis son lancement.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:20px;--awb-background-color:var(--awb-color7);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:24px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h1 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\">Les Rencontres D\u00e9fense &amp; Cyber 2026, c&rsquo;est<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color4);\"><\/div><\/div><\/div><ul style=\"--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons txt-justify\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Des TRAVAUX et des PARTAGES d\u2019EXPERTISES <\/strong>\u00e0 travers 4 tables rondes th\u00e9matiques et 2 keynotes<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Des <strong>MOMENTS de CONVIVIALITE<\/strong> pour d\u00e9velopper un r\u00e9seau qualifi\u00e9<\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);--awb-filter:saturate(0%);--awb-filter-transition:filter 0.3s ease;--awb-filter-hover:saturate(100%);\"><span class=\" fusion-imageframe imageframe-dropshadow imageframe-5 hover-type-none\" style=\"border-radius:10px;-webkit-box-shadow: 3px 3px 7px rgba(67,67,67,0.65);box-shadow: 3px 3px 7px rgba(67,67,67,0.65);\"><img decoding=\"async\" width=\"300\" height=\"244\" alt=\"Cycle D\u00e9fense &amp; Cyber 2024\" title=\"Cycle D\u00e9fense &#038; Cyber 2024\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/rdefensecyber2024_ouverture-300x244.jpg\" class=\"img-responsive wp-image-1790\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/rdefensecyber2024_ouverture-200x163.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/rdefensecyber2024_ouverture-400x325.jpg 400w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/rdefensecyber2024_ouverture-600x488.jpg 600w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/rdefensecyber2024_ouverture-800x651.jpg 800w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/rdefensecyber2024_ouverture-1200x976.jpg 1200w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:20px;--awb-background-color:var(--awb-color5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-sep-color:var(--awb-color1);--awb-font-size:24px;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color1);\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h3 class=\"fusion-title-heading title-heading-center\" style=\"margin:0;font-size:1em;\">Retour sur les Rencontres D\u00e9fense &amp; Cyber 2024<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:var(--awb-color1);\"><\/div><\/div><\/div><div class=\"awb-gallery-wrapper awb-gallery-wrapper-1 button-span-no\" style=\"--more-btn-alignment:center;\"><div style=\"margin:-5px;--awb-bordersize:0px;\" class=\"fusion-gallery fusion-gallery-container fusion-grid-5 fusion-columns-total-5 fusion-gallery-layout-grid fusion-gallery-1\"><div style=\"padding:5px;\" class=\"fusion-grid-column fusion-gallery-column fusion-gallery-column-5 hover-type-zoomin\"><div class=\"fusion-gallery-image\"><img decoding=\"async\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG-20240611-WA0011-320x202.jpg\" width=\"320\" height=\"202\" alt=\"Rencontres D\u00e9fense et Cyber 2024\" title=\"Rencontres D\u00e9fense et Cyber 2024\" aria-label=\"Rencontres D\u00e9fense et Cyber 2024\" class=\"img-responsive wp-image-1593 fusion-gallery-image-size-fixed\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG-20240611-WA0011-320x202.jpg 320w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG-20240611-WA0011-700x441.jpg 700w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/div><\/div><div style=\"padding:5px;\" class=\"fusion-grid-column fusion-gallery-column fusion-gallery-column-5 hover-type-zoomin\"><div class=\"fusion-gallery-image\"><img decoding=\"async\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG-20240611-WA0038-320x202.jpg\" width=\"320\" height=\"202\" alt=\"Rencontres D\u00e9fense et Cyber 2024\" title=\"Rencontres D\u00e9fense et Cyber 2024\" aria-label=\"Rencontres D\u00e9fense et Cyber 2024\" class=\"img-responsive wp-image-1594 fusion-gallery-image-size-fixed\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG-20240611-WA0038-320x202.jpg 320w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG-20240611-WA0038-700x441.jpg 700w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/div><\/div><div style=\"padding:5px;\" class=\"fusion-grid-column fusion-gallery-column fusion-gallery-column-5 hover-type-zoomin\"><div class=\"fusion-gallery-image\"><img decoding=\"async\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG-20240611-WA0008-e1718206126229-320x202.jpg\" width=\"320\" height=\"202\" alt=\"Rencontres D\u00e9fense et Cyber 2024\" title=\"Rencontres D\u00e9fense et Cyber 2024\" aria-label=\"Rencontres D\u00e9fense et Cyber 2024\" class=\"img-responsive wp-image-1595 fusion-gallery-image-size-fixed\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG-20240611-WA0008-e1718206126229-320x202.jpg 320w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG-20240611-WA0008-e1718206126229-700x441.jpg 700w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/div><\/div><div style=\"padding:5px;\" class=\"fusion-grid-column fusion-gallery-column fusion-gallery-column-5 hover-type-zoomin\"><div class=\"fusion-gallery-image\"><img decoding=\"async\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG_20240611_095853-scaled-e1718206183797-320x202.jpg\" width=\"320\" height=\"202\" alt=\"Rencontres D\u00e9fense et Cyber 2024\" title=\"Rencontres D\u00e9fense et Cyber 2024\" aria-label=\"Rencontres D\u00e9fense et Cyber 2024\" class=\"img-responsive wp-image-1596 fusion-gallery-image-size-fixed\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG_20240611_095853-scaled-e1718206183797-320x202.jpg 320w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG_20240611_095853-scaled-e1718206183797-700x441.jpg 700w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/div><\/div><div style=\"padding:5px;\" class=\"fusion-grid-column fusion-gallery-column fusion-gallery-column-5 hover-type-zoomin\"><div class=\"fusion-gallery-image\"><img decoding=\"async\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG_20240611_084951-320x202.jpg\" width=\"320\" height=\"202\" alt=\"Rencontres D\u00e9fense et Cyber 2024\" title=\"Rencontres D\u00e9fense et Cyber 2024\" aria-label=\"Rencontres D\u00e9fense et Cyber 2024\" class=\"img-responsive wp-image-1597 fusion-gallery-image-size-fixed\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG_20240611_084951-320x202.jpg 320w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2024\/06\/IMG_20240611_084951-700x441.jpg 700w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/div><\/div><div class=\"clearfix\"><\/div><\/div><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--awb-margin-top:40px;--button_accent_color:var(--awb-color1);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color4);--button_gradient_bottom_color:var(--awb-color4);--button_gradient_top_color_hover:var(--awb-color6);--button_gradient_bottom_color_hover:var(--awb-color6);\" target=\"_self\" href=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/rencontres-defense-cyber-galerie\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">voir les photos et vid\u00e9os<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:20px;--awb-background-color:var(--awb-color4);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:24px;\"><h3 class=\"fusion-title-heading title-heading-center\" style=\"margin:0;text-transform:none;font-size:1em;\"><p>Vous avez besoin de plus d\u2019informations ?<br \/>\nVous souhaitez devenir partenaire du Cycle D\u00e9fense &amp; Cyber ?<\/p><\/h3><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color4);--button_accent_hover_color:var(--awb-color6);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color1);--button_gradient_bottom_color:var(--awb-color1);--button_gradient_top_color_hover:var(--awb-color7);--button_gradient_bottom_color_hover:var(--awb-color7);\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/defense-cyber.fr\/contact-defense-cyber\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Contactez-nous<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-padding-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color6);--awb-margin-bottom:10px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:24px;\"><h4 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\">Nos partenaires<\/h4><\/div><div class=\"fusion-image-carousel fusion-image-carousel-fixed fusion-image-carousel-1 fusion-carousel-border\"><div class=\"awb-carousel awb-swiper awb-swiper-carousel awb-carousel--carousel awb-swiper-dots-position-bottom\" data-layout=\"carousel\" data-autoplay=\"yes\" data-autoplayspeed=\"2500\" data-autoplaypause=\"no\" data-loop=\"yes\" data-columns=\"5\" data-columnsmedium=\"1\" data-columnssmall=\"1\" data-itemmargin=\"13\" data-itemwidth=\"180\" data-touchscroll=\"no\" data-freemode=\"no\" data-imagesize=\"fixed\" data-scrollitems=\"0\" data-centeredslides=\"no\" data-rotationangle=\"50\" data-depth=\"100\" data-speed=\"500\" data-shadow=\"no\" data-pagination=\"bullets\" style=\"--awb-border-width:1px;--awb-border-color:#e9eaee;--awb-dots-align:center;\"><div class=\"swiper-wrapper awb-image-carousel-wrapper fusion-flex-align-items-center\"><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\" https:\/\/defense-cyber.fr\/partenaires-defense-cyber\/ministere-des-armees\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"200\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/04\/MinistereDesArmees-1.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Minist\u00e8re des arm\u00e9es, partenaire du cycle D\u00e9fense &amp; Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/04\/MinistereDesArmees-1-200x160.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/04\/MinistereDesArmees-1.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/defense-cyber.fr\/partenaires-defense-cyber\/etat-major-des-armees\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"180\" height=\"180\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2023\/03\/Logo_EMA_Small.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Etat major des arm\u00e9es, partenaire du cycle D\u00e9fense &amp; Cyber\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/defense-cyber.fr\/partenaires-defense-cyber\/cnd\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/CND_Long_250.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Commissariat au num\u00e9rique des arm\u00e9es, partenaire des Rencontres D\u00e9fense &amp; Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/CND_Long_250-200x80.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/CND_Long_250.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/defense-cyber.fr\/partenaires-defense-cyber\/avant-de-cliquer\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"91\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/HUCENCY_250_100.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Avant de cliquer, partenaire du cycle D\u00e9fense &amp; Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/HUCENCY_250_100-200x73.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/HUCENCY_250_100.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/defense-cyber.fr\/partenaires-defense-cyber\/groupelaposte\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2022\/12\/GROUPE-LA-POSTE-Logo.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Groupe La Poste, partenaire du Cycle D\u00e9fense &amp; Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2022\/12\/GROUPE-LA-POSTE-Logo-200x80.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2022\/12\/GROUPE-LA-POSTE-Logo.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/defense-cyber.fr\/partenaires-defense-cyber\/bluefiles\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2023\/03\/Logo_BlueFiles.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"BlueFiles, partenaire du Cycle D\u00e9fense &amp; Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2023\/03\/Logo_BlueFiles-200x80.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2023\/03\/Logo_BlueFiles.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/defense-cyber.fr\/partenaires-defense-cyber\/certitude-numerique\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2022\/12\/CERTITUDE-NUMERIQUE-Logo2.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"CERTitude NUMERIQUE, partenaire du Cycle D\u00e9fense &amp; Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2022\/12\/CERTITUDE-NUMERIQUE-Logo2-200x80.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2022\/12\/CERTITUDE-NUMERIQUE-Logo2.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/defense-cyber.fr\/partenaires-defense-cyber\/stormshield\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/STORMSHIELD-Logo.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"Stormshield, partenaire des Rencontres D\u00e9fense &amp; Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/STORMSHIELD-Logo-200x80.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/01\/STORMSHIELD-Logo.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/defense-cyber.fr\/partenaires-defense-cyber\/cea\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"200\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/04\/cea_200.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"CERTitude NUMERIQUE, partenaire du Cycle D\u00e9fense &amp; Cyber\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/defense-cyber.fr\/partenaires-defense-cyber\/enedis\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2023\/09\/Logo_Enedis.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"ENEDIS, partenaire du Cycle D\u00e9fense &amp; Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2023\/09\/Logo_Enedis-200x80.png 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2023\/09\/Logo_Enedis.png 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\" https:\/\/defense-cyber.fr\/partenaires-defense-cyber\/ihedn-region-lyonnaise\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"180\" height=\"180\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/Logo_IHEDN_Lyon.png\" class=\"attachment-blog-medium size-blog-medium\" alt=\"IHEDN Lyon, partenaire du Cycle D\u00e9fense &amp; Cyber\" \/><\/a><\/div><\/div><\/div><div class=\"swiper-slide\"><div class=\"fusion-carousel-item-wrapper\"><div class=\"fusion-image-wrapper hover-type-zoomin\"><a href=\"https:\/\/www.protection-civile.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/FNPC_Logo_250_100.jpg\" class=\"attachment-blog-medium size-blog-medium\" alt=\"La Protection Civile, partenaire du Cycle D\u00e9fense &amp; Cyber\" srcset=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/FNPC_Logo_250_100-200x80.jpg 200w, https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-content\/uploads\/sites\/5\/2026\/03\/FNPC_Logo_250_100.jpg 250w\" sizes=\"(min-width: 2200px) 100vw, (min-width: 928px) 230px, (min-width: 856px) 287px, (min-width: 784px) 383px, (min-width: 712px) 574px, (min-width: 640px) 712px, \" \/><\/a><\/div><\/div><\/div><\/div><div class=\"awb-swiper-button awb-swiper-button-prev\"><i class=\"awb-icon-angle-left\" aria-hidden=\"true\"><\/i><\/div><div class=\"awb-swiper-button awb-swiper-button-next\"><i class=\"awb-icon-angle-right\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-32","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Rencontres D\u00e9fense &amp; Cyber 2026<\/title>\n<meta name=\"description\" content=\"Une journ\u00e9e d\u00e9di\u00e9e \u00e0 la cybers\u00e9curit\u00e9 du secteur de la D\u00e9fense, des forces arm\u00e9es, de la BITD ...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"1\u00e8res Rencontres D\u00e9fense et Cyber by CyberCercle\" \/>\n<meta property=\"og:description\" content=\"Les 1eres RENCONTRES DEFENSE &amp; CYBER se sont d\u00e9roul\u00e9es le 19 octobre 2022 \u00e0 Lyon dans les salons de l\u2019H\u00f4tel du D\u00e9partement du Rh\u00f4ne. En savoir plus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defense-cyber.fr\/rdefensecyber2026\/\" \/>\n<meta property=\"og:site_name\" content=\"Rencontres D\u00e9fense &amp; Cyber 2026\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T13:47:40+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"1\u00e8res Rencontres D\u00e9fense et Cyber by CyberCercle\" \/>\n<meta name=\"twitter:description\" content=\"Les 1eres RENCONTRES DEFENSE &amp; CYBER se sont d\u00e9roul\u00e9es le 19 octobre 2022 \u00e0 Lyon dans les salons de l\u2019H\u00f4tel du D\u00e9partement du Rh\u00f4ne. En savoir plus.\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2026\\\/\",\"url\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2026\\\/\",\"name\":\"Rencontres D\u00e9fense & Cyber 2026\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2026\\\/#website\"},\"datePublished\":\"2026-01-17T10:00:39+00:00\",\"dateModified\":\"2026-03-12T13:47:40+00:00\",\"description\":\"Une journ\u00e9e d\u00e9di\u00e9e \u00e0 la cybers\u00e9curit\u00e9 du secteur de la D\u00e9fense, des forces arm\u00e9es, de la BITD ...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2026\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2026\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2026\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les Rencontres D\u00e9fense &amp; Cyber\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2026\\\/#website\",\"url\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2026\\\/\",\"name\":\"Rencontres D\u00e9fense & Cyber 2026\",\"description\":\"La Cyber au coeur de la D\u00e9fense\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defense-cyber.fr\\\/rdefensecyber2026\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rencontres D\u00e9fense & Cyber 2026","description":"Une journ\u00e9e d\u00e9di\u00e9e \u00e0 la cybers\u00e9curit\u00e9 du secteur de la D\u00e9fense, des forces arm\u00e9es, de la BITD ...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/","og_locale":"fr_FR","og_type":"article","og_title":"1\u00e8res Rencontres D\u00e9fense et Cyber by CyberCercle","og_description":"Les 1eres RENCONTRES DEFENSE & CYBER se sont d\u00e9roul\u00e9es le 19 octobre 2022 \u00e0 Lyon dans les salons de l\u2019H\u00f4tel du D\u00e9partement du Rh\u00f4ne. En savoir plus.","og_url":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/","og_site_name":"Rencontres D\u00e9fense & Cyber 2026","article_modified_time":"2026-03-12T13:47:40+00:00","twitter_card":"summary_large_image","twitter_title":"1\u00e8res Rencontres D\u00e9fense et Cyber by CyberCercle","twitter_description":"Les 1eres RENCONTRES DEFENSE & CYBER se sont d\u00e9roul\u00e9es le 19 octobre 2022 \u00e0 Lyon dans les salons de l\u2019H\u00f4tel du D\u00e9partement du Rh\u00f4ne. En savoir plus.","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/","url":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/","name":"Rencontres D\u00e9fense & Cyber 2026","isPartOf":{"@id":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/#website"},"datePublished":"2026-01-17T10:00:39+00:00","dateModified":"2026-03-12T13:47:40+00:00","description":"Une journ\u00e9e d\u00e9di\u00e9e \u00e0 la cybers\u00e9curit\u00e9 du secteur de la D\u00e9fense, des forces arm\u00e9es, de la BITD ...","breadcrumb":{"@id":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defense-cyber.fr\/rdefensecyber2026\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/"},{"@type":"ListItem","position":2,"name":"Les Rencontres D\u00e9fense &amp; Cyber"}]},{"@type":"WebSite","@id":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/#website","url":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/","name":"Rencontres D\u00e9fense & Cyber 2026","description":"La Cyber au coeur de la D\u00e9fense","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-json\/wp\/v2\/pages\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-json\/wp\/v2\/comments?post=32"}],"version-history":[{"count":8,"href":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-json\/wp\/v2\/pages\/32\/revisions"}],"predecessor-version":[{"id":1792,"href":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-json\/wp\/v2\/pages\/32\/revisions\/1792"}],"wp:attachment":[{"href":"https:\/\/defense-cyber.fr\/rdefensecyber2026\/wp-json\/wp\/v2\/media?parent=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}