{"id":12246,"date":"2025-04-14T11:56:18","date_gmt":"2025-04-14T10:56:18","guid":{"rendered":"https:\/\/www.groupe-cyllene.com\/?p=12246"},"modified":"2025-04-16T09:44:27","modified_gmt":"2025-04-16T08:44:27","slug":"afterwork-cybersecurite-logpoint","status":"publish","type":"post","link":"https:\/\/www.groupe-cyllene.com\/en\/afterwork-cybersecurite-logpoint\/","title":{"rendered":"Afterwork : La cybers\u00e9curit\u00e9 \u00e0 la fran\u00e7aise"},"content":{"rendered":"<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2d6dbb\" class=\"has-inline-color\">Face aux g\u00e9ants \u00e9trangers, une alternative s\u2019impose : une cybers\u00e9curit\u00e9 souveraine, aff\u00fbt\u00e9e, port\u00e9e par Cyllene &amp; LogPoint, rejoignez-nous pour en discuter autour d\u2019un verre.<\/mark><\/h3>\n\n\n\n<div style=\"height:49px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-text-color has-link-color has-text-align-center has-custom-font-size wp-element-button\" href=\"#inscription-evenement\" style=\"color:#2d6dbb;font-size:24px\">Je m&rsquo;inscris<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:92px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center is-image-fill-element\" style=\"grid-template-columns:27% auto\"><figure  class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"978\" height=\"842\" alt=\"\" src=\"https:\/\/www.groupe-cyllene.com\/wp-content\/uploads\/2025\/02\/Image01.png\" style=\"object-position:40% 60%;\" class=\"wp-image-12221 size-full\" srcset=\"https:\/\/www.groupe-cyllene.com\/wp-content\/uploads\/2025\/02\/Image01.png 978w, https:\/\/www.groupe-cyllene.com\/wp-content\/uploads\/2025\/02\/Image01-300x258.png 300w, https:\/\/www.groupe-cyllene.com\/wp-content\/uploads\/2025\/02\/Image01-768x661.png 768w, https:\/\/www.groupe-cyllene.com\/wp-content\/uploads\/2025\/02\/Image01-14x12.png 14w\" sizes=\"auto, (max-width: 978px) 100vw, 978px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div style=\"height:48px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-color\" style=\"color:#000000;font-size:32px\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2d6dbb\" class=\"has-inline-color\">\ud83d\udc49 <\/mark>Le 15 mai 2025 &#8211; 18h00<\/h3>\n\n\n\n<p class=\"has-text-color\" style=\"color:#000000;font-size:17px\">L\u2019\u00e9v\u00e9nement aura lieu au sein de l\u2019H\u00f4tel Ker Moor situ\u00e9, 13 Rue du Pr\u00e9sident Le S\u00e9n\u00e9cal \u2013 22410 \u00e0 Saint-Quay-Portrieux.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#000000;font-size:17px\">Confirmez, d\u00e8s maintenant, votre pr\u00e9sence en compl\u00e9tant le formulaire d&rsquo;inscription.<\/p>\n\n\n\n<div style=\"height:48px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-color\" style=\"color:#000000;font-size:32px\">Le Programme<\/h3>\n\n\n\n<p class=\"has-text-color\" style=\"color:#000000;font-size:17px\">\ud83d\udd35 Accueil &amp; ap\u00e9ritif.<\/p>\n\n\n\n<p>\u26aa\ufe0f Pr\u00e9sentation express : Cybers\u00e9curit\u00e9, l\u2019alternative fran\u00e7aise avec Cyllene &amp; Logpoint.<\/p>\n\n\n\n<p>\ud83d\udd34 \u00c9changes informels &amp; networking autour d\u2019un verre.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--2\"><a class=\"wp-block-button__link wp-element-button\" href=\"#inscription-evenement\">Je m&rsquo;inscris<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div id=\"inscription-evenement\" style=\"padding: 0px 0px; text-align: center;\">&nbsp;<\/div>","protected":false},"excerpt":{"rendered":"<p>Face aux g\u00e9ants \u00e9trangers, une alternative s\u2019impose : une cybers\u00e9curit\u00e9 souveraine, aff\u00fbt\u00e9e, port\u00e9e par Cyllene &amp; LogPoint, rejoignez-nous pour en discuter autour d\u2019un verre. &nbsp;<\/p>","protected":false},"author":11,"featured_media":12221,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[33,45],"tags":[86],"class_list":["post-12246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tout","category-evenements","tag-cybersecurite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nos Actualit\u00e9s | Ev\u00e8nements - Afterwork cybers\u00e9curit\u00e9<\/title>\n<meta name=\"description\" content=\"Face aux g\u00e9ants \u00e9trangers, une alternative s\u2019impose : une cybers\u00e9curit\u00e9 souveraine, et aff\u00fbt\u00e9e port\u00e9e par Cyllene et LogPoint\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.groupe-cyllene.com\/en\/afterwork-cybersecurite-logpoint\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nos Actualit\u00e9s | Ev\u00e8nements - Afterwork cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Face aux g\u00e9ants \u00e9trangers, une alternative s\u2019impose : une cybers\u00e9curit\u00e9 souveraine, et aff\u00fbt\u00e9e port\u00e9e par Cyllene et LogPoint\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.groupe-cyllene.com\/en\/afterwork-cybersecurite-logpoint\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyllene\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-14T10:56:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-16T08:44:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.groupe-cyllene.com\/wp-content\/uploads\/2025\/02\/Image01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"551\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/afterwork-cybersecurite-logpoint\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/afterwork-cybersecurite-logpoint\\\/\"},\"author\":{\"name\":\"Marketing\",\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/#\\\/schema\\\/person\\\/cd069af89e51212e3b442b62db2da893\"},\"headline\":\"Afterwork : La cybers\u00e9curit\u00e9 \u00e0 la fran\u00e7aise\",\"datePublished\":\"2025-04-14T10:56:18+00:00\",\"dateModified\":\"2025-04-16T08:44:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/afterwork-cybersecurite-logpoint\\\/\"},\"wordCount\":112,\"image\":{\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/afterwork-cybersecurite-logpoint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Image01.png\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Tout\",\"\u00c9v\u00e9nements\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/afterwork-cybersecurite-logpoint\\\/\",\"url\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/afterwork-cybersecurite-logpoint\\\/\",\"name\":\"Nos Actualit\u00e9s | Ev\u00e8nements - Afterwork cybers\u00e9curit\u00e9\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/afterwork-cybersecurite-logpoint\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/afterwork-cybersecurite-logpoint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Image01.png\",\"datePublished\":\"2025-04-14T10:56:18+00:00\",\"dateModified\":\"2025-04-16T08:44:27+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/#\\\/schema\\\/person\\\/cd069af89e51212e3b442b62db2da893\"},\"description\":\"Face aux g\u00e9ants \u00e9trangers, une alternative s\u2019impose : une cybers\u00e9curit\u00e9 souveraine, et aff\u00fbt\u00e9e port\u00e9e par Cyllene et LogPoint\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.groupe-cyllene.com\\\/afterwork-cybersecurite-logpoint\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/afterwork-cybersecurite-logpoint\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Image01.png\",\"contentUrl\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Image01.png\",\"width\":978,\"height\":842},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/#website\",\"url\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/\",\"name\":\"Cyllene\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.groupe-cyllene.com\\\/#\\\/schema\\\/person\\\/cd069af89e51212e3b442b62db2da893\",\"name\":\"Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42014d031b39fab7271aaa3bd52e866cf95c7fa6e1963c62e144a27090a48899?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42014d031b39fab7271aaa3bd52e866cf95c7fa6e1963c62e144a27090a48899?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42014d031b39fab7271aaa3bd52e866cf95c7fa6e1963c62e144a27090a48899?s=96&d=mm&r=g\",\"caption\":\"Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nos Actualit\u00e9s | Ev\u00e8nements - Afterwork cybers\u00e9curit\u00e9","description":"Face aux g\u00e9ants \u00e9trangers, une alternative s\u2019impose : une cybers\u00e9curit\u00e9 souveraine, et aff\u00fbt\u00e9e port\u00e9e par Cyllene et LogPoint","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.groupe-cyllene.com\/en\/afterwork-cybersecurite-logpoint\/","og_locale":"en_GB","og_type":"article","og_title":"Nos Actualit\u00e9s | Ev\u00e8nements - Afterwork cybers\u00e9curit\u00e9","og_description":"Face aux g\u00e9ants \u00e9trangers, une alternative s\u2019impose : une cybers\u00e9curit\u00e9 souveraine, et aff\u00fbt\u00e9e port\u00e9e par Cyllene et LogPoint","og_url":"https:\/\/www.groupe-cyllene.com\/en\/afterwork-cybersecurite-logpoint\/","og_site_name":"Cyllene","article_published_time":"2025-04-14T10:56:18+00:00","article_modified_time":"2025-04-16T08:44:27+00:00","og_image":[{"url":"https:\/\/www.groupe-cyllene.com\/wp-content\/uploads\/2025\/02\/Image01.png","width":640,"height":551,"type":"image\/png"}],"author":"Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marketing","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.groupe-cyllene.com\/afterwork-cybersecurite-logpoint\/#article","isPartOf":{"@id":"https:\/\/www.groupe-cyllene.com\/afterwork-cybersecurite-logpoint\/"},"author":{"name":"Marketing","@id":"https:\/\/www.groupe-cyllene.com\/#\/schema\/person\/cd069af89e51212e3b442b62db2da893"},"headline":"Afterwork : La cybers\u00e9curit\u00e9 \u00e0 la fran\u00e7aise","datePublished":"2025-04-14T10:56:18+00:00","dateModified":"2025-04-16T08:44:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.groupe-cyllene.com\/afterwork-cybersecurite-logpoint\/"},"wordCount":112,"image":{"@id":"https:\/\/www.groupe-cyllene.com\/afterwork-cybersecurite-logpoint\/#primaryimage"},"thumbnailUrl":"https:\/\/www.groupe-cyllene.com\/wp-content\/uploads\/2025\/02\/Image01.png","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Tout","\u00c9v\u00e9nements"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.groupe-cyllene.com\/afterwork-cybersecurite-logpoint\/","url":"https:\/\/www.groupe-cyllene.com\/afterwork-cybersecurite-logpoint\/","name":"Nos Actualit\u00e9s | Ev\u00e8nements - Afterwork cybers\u00e9curit\u00e9","isPartOf":{"@id":"https:\/\/www.groupe-cyllene.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.groupe-cyllene.com\/afterwork-cybersecurite-logpoint\/#primaryimage"},"image":{"@id":"https:\/\/www.groupe-cyllene.com\/afterwork-cybersecurite-logpoint\/#primaryimage"},"thumbnailUrl":"https:\/\/www.groupe-cyllene.com\/wp-content\/uploads\/2025\/02\/Image01.png","datePublished":"2025-04-14T10:56:18+00:00","dateModified":"2025-04-16T08:44:27+00:00","author":{"@id":"https:\/\/www.groupe-cyllene.com\/#\/schema\/person\/cd069af89e51212e3b442b62db2da893"},"description":"Face aux g\u00e9ants \u00e9trangers, une alternative s\u2019impose : une cybers\u00e9curit\u00e9 souveraine, et aff\u00fbt\u00e9e port\u00e9e par Cyllene et LogPoint","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.groupe-cyllene.com\/afterwork-cybersecurite-logpoint\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.groupe-cyllene.com\/afterwork-cybersecurite-logpoint\/#primaryimage","url":"https:\/\/www.groupe-cyllene.com\/wp-content\/uploads\/2025\/02\/Image01.png","contentUrl":"https:\/\/www.groupe-cyllene.com\/wp-content\/uploads\/2025\/02\/Image01.png","width":978,"height":842},{"@type":"WebSite","@id":"https:\/\/www.groupe-cyllene.com\/#website","url":"https:\/\/www.groupe-cyllene.com\/","name":"Cyllene","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.groupe-cyllene.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.groupe-cyllene.com\/#\/schema\/person\/cd069af89e51212e3b442b62db2da893","name":"Marketing","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/42014d031b39fab7271aaa3bd52e866cf95c7fa6e1963c62e144a27090a48899?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/42014d031b39fab7271aaa3bd52e866cf95c7fa6e1963c62e144a27090a48899?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/42014d031b39fab7271aaa3bd52e866cf95c7fa6e1963c62e144a27090a48899?s=96&d=mm&r=g","caption":"Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.groupe-cyllene.com\/en\/wp-json\/wp\/v2\/posts\/12246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.groupe-cyllene.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.groupe-cyllene.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.groupe-cyllene.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.groupe-cyllene.com\/en\/wp-json\/wp\/v2\/comments?post=12246"}],"version-history":[{"count":42,"href":"https:\/\/www.groupe-cyllene.com\/en\/wp-json\/wp\/v2\/posts\/12246\/revisions"}],"predecessor-version":[{"id":12354,"href":"https:\/\/www.groupe-cyllene.com\/en\/wp-json\/wp\/v2\/posts\/12246\/revisions\/12354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.groupe-cyllene.com\/en\/wp-json\/wp\/v2\/media\/12221"}],"wp:attachment":[{"href":"https:\/\/www.groupe-cyllene.com\/en\/wp-json\/wp\/v2\/media?parent=12246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.groupe-cyllene.com\/en\/wp-json\/wp\/v2\/categories?post=12246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.groupe-cyllene.com\/en\/wp-json\/wp\/v2\/tags?post=12246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}