
{"id":7050,"date":"2023-04-26T14:27:23","date_gmt":"2023-04-26T14:27:23","guid":{"rendered":"https:\/\/novelis.io\/?post_type=business-cases&#038;p=7050"},"modified":"2023-05-25T15:23:45","modified_gmt":"2023-05-25T15:23:45","slug":"renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite","status":"publish","type":"business-cases","link":"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/","title":{"rendered":"Renforcer sa s\u00e9curit\u00e9 informatique gr\u00e2ce aux audits et simulations de cybers\u00e9curit\u00e9\u00a0\u00a0"},"content":{"rendered":"","protected":false},"featured_media":7051,"template":"","categories":[107],"custom_tag":[299],"class_list":["post-7050","business-cases","type-business-cases","status-publish","has-post-thumbnail","hentry","category-cas-client","custom_tag-cybersecurite"],"acf":{"client":[7104],"secteurs_dactivite":["Public"],"types_de_projet":["Cyber"],"summary":"En France 9 entreprises sur 10 ont d\u00e9j\u00e0 \u00e9t\u00e9 touch\u00e9es par un acte de cyber malveillance et 43% d\u2019entre elles sont des PME. Pour autant seulement 17% des PME sont prot\u00e9g\u00e9es contre les cyberattaques\u2026 ","challenges_&_results_colomns":false,"challenges":"<p><span data-contrast=\"none\">Le <a href=\"https:\/\/www.cdg72.fr\/\">centre de gestion de la Sarthe <\/a><\/span><span data-contrast=\"auto\">participe \u00e0 la gestion des personnels et au d\u00e9veloppement des collectivit\u00e9s territoriales de la r\u00e9gion. Son r\u00f4le est d\u2019assumer des missions relatives au recrutement et \u00e0 la gestion de certaines cat\u00e9gories d\u2019agents territoriaux.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">C\u2019est pour r\u00e9pondre \u00e0 un objectif de renforcement de la s\u00e9curit\u00e9 informatique que cet acteur r\u00e9gional a fait appel aux services de Novelis pour mettre en place des mesures de s\u00e9curit\u00e9 suppl\u00e9mentaires et ainsi r\u00e9duire les risques identifi\u00e9s.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","realisations":"<p><span data-contrast=\"none\">Afin de s\u00e9curiser l\u2019organisation et les syst\u00e8mes de notre client, notre \u00e9quipe cybers\u00e9curit\u00e9 est intervenue pour mener plusieurs actions\u202f:<\/span><\/p>\n<p><span data-contrast=\"none\">Un audit d&rsquo;intrusion pour trois applications m\u00e9tiers : Nous avons analys\u00e9 les vuln\u00e9rabilit\u00e9s de ces applications et identifi\u00e9 les points d&rsquo;entr\u00e9e possibles pour des attaquants malveillants. Nous avons fourni des recommandations sp\u00e9cifiques pour renforcer la s\u00e9curit\u00e9 de ces applications.<\/span><\/p>\n<p><span data-contrast=\"auto\">Deux audits bo\u00eete blanche et boite noire sur le SI de notre client : Nous avons men\u00e9 des audits de s\u00e9curit\u00e9 approfondis sur le syst\u00e8me d&rsquo;information, en utilisant \u00e0 la fois des techniques d&rsquo;audit bo\u00eete blanche (o\u00f9 nous avions acc\u00e8s aux informations sur le syst\u00e8me) et bo\u00eete noire (o\u00f9 nous avons simul\u00e9 une attaque externe). Nous avons identifi\u00e9 les vuln\u00e9rabilit\u00e9s et les failles de s\u00e9curit\u00e9 et avons fourni des recommandations pour les corriger.<\/span><\/p>\n<p><span data-contrast=\"auto\">Un audit de configuration et architecture : Nous avons \u00e9valu\u00e9 la configuration et l&rsquo;architecture du syst\u00e8me d&rsquo;information de notre client pour identifier les zones \u00e0 risque et les opportunit\u00e9s d&rsquo;am\u00e9lioration de la s\u00e9curit\u00e9. Nous avons propos\u00e9 des recommandations pour renforcer la s\u00e9curit\u00e9 de la configuration et de l&rsquo;architecture.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Une simulation de phishing pour l&rsquo;ensemble des collaborateurs : Nous avons r\u00e9alis\u00e9 une simulation de phishing pour tester la sensibilisation et la vigilance des collaborateurs de l\u2019entreprise face \u00e0 ces attaques. Nous avons fourni des rapports d\u00e9taill\u00e9s sur les r\u00e9sultats de la simulation, ainsi que des recommandations pour renforcer la s\u00e9curit\u00e9 de l&rsquo;organisation.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","results":{"result":"<p><span class=\"TextRun SCXW238084743 BCX0\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW238084743 BCX0\">En combinant ces <\/span><span class=\"NormalTextRun SCXW238084743 BCX0\">4 <\/span><span class=\"NormalTextRun SCXW238084743 BCX0\">audits <\/span><span class=\"NormalTextRun SCXW238084743 BCX0\">de s\u00e9curit\u00e9 <\/span><span class=\"NormalTextRun SCXW238084743 BCX0\">et <\/span><span class=\"NormalTextRun SCXW238084743 BCX0\">en effectuant une simulation d\u2019attaque aupr\u00e8s des collaborateurs de notre client<\/span><span class=\"NormalTextRun SCXW238084743 BCX0\">, nous a<\/span><span class=\"NormalTextRun SCXW238084743 BCX0\">vons \u00e9t\u00e9 en mesure de fournir <\/span><span class=\"NormalTextRun SCXW238084743 BCX0\">une<\/span><span class=\"NormalTextRun SCXW238084743 BCX0\"> vue d&rsquo;ensemble compl\u00e8te sur l\u2019\u00e9tat de la<\/span><span class=\"NormalTextRun SCXW238084743 BCX0\"> s\u00e9curit\u00e9 informatique, ainsi qu&rsquo;un plan de s\u00e9curisation pour am\u00e9liorer leur s\u00e9curit\u00e9.<\/span><\/span><span class=\"EOP SCXW238084743 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","2nd_column":""},"added_value":{"title":"La valeur ajout\u00e9e de Novelis","image_section":{"title":"Notre expertise en cybers\u00e9curit\u00e9","description":"<div class=\"pb-2 custom-wp-content\">\n<p><em><span class=\"TextRun SCXW41590928 BCX0\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW41590928 BCX0\">Les cyberattaques ne sont pas l\u2019apanage des grands groupes et en France 9 entreprises sur 10 ont d\u00e9j\u00e0 \u00e9t\u00e9 touch\u00e9es par un acte de cyber malveillance.\u00a0<\/span><\/span><\/em><\/p>\n<p><span class=\"TextRun SCXW41590928 BCX0\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"none\"><span class=\"NormalTextRun SpellingErrorV2 SCXW41590928 BCX0\">Novelis<\/span><span class=\"NormalTextRun SCXW41590928 BCX0\"> propose son expertise en mati\u00e8re de cybers\u00e9curit\u00e9 dans une approche pragmatique, int\u00e9grant \u00e0 la fois la dimension li\u00e9e \u00e0 l\u2019analyse de la situation actuelle (tests d\u2019intrusion, audit, identification des menaces internes et externes\u2026) mais \u00e9galement sur un accompagnement sur le long terme en mati\u00e8re de gouvernance, de processus et de bonnes pratiques pour se pr\u00e9munir des cyberattaques et instaurer une m\u00e9canique de cyber-r\u00e9silience.<\/span><\/span><\/p>\n<p><strong><a href=\"https:\/\/novelis.io\/fr\/expertises\/cybersecurite\/\">En savoir plus<\/a><\/strong><\/p>\n<\/div>\n","image":{"ID":5587,"id":5587,"title":"consultant cyber s\u00e9curit\u00e9","filename":"Add-a-heading-4.png","filesize":600509,"url":"https:\/\/novelis.io\/wp-content\/uploads\/2022\/07\/Add-a-heading-4.png","link":"https:\/\/novelis.io\/fr\/?attachment_id=5587","alt":"","author":"5","description":"","caption":"","name":"add-a-heading-4","status":"inherit","uploaded_to":5586,"date":"2022-07-06 09:47:44","modified":"2022-07-06 09:47:55","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/novelis.io\/wp-includes\/images\/media\/default.png","width":930,"height":520,"sizes":{"thumbnail":"https:\/\/novelis.io\/wp-content\/uploads\/2022\/07\/Add-a-heading-4-250x140.png","thumbnail-width":250,"thumbnail-height":140,"medium":"https:\/\/novelis.io\/wp-content\/uploads\/2022\/07\/Add-a-heading-4-600x335.png","medium-width":600,"medium-height":335,"medium_large":"https:\/\/novelis.io\/wp-content\/uploads\/2022\/07\/Add-a-heading-4-768x429.png","medium_large-width":640,"medium_large-height":358,"large":"https:\/\/novelis.io\/wp-content\/uploads\/2022\/07\/Add-a-heading-4.png","large-width":640,"large-height":358,"1536x1536":"https:\/\/novelis.io\/wp-content\/uploads\/2022\/07\/Add-a-heading-4.png","1536x1536-width":930,"1536x1536-height":520,"2048x2048":"https:\/\/novelis.io\/wp-content\/uploads\/2022\/07\/Add-a-heading-4.png","2048x2048-width":930,"2048x2048-height":520,"1400x1400":"https:\/\/novelis.io\/wp-content\/uploads\/2022\/07\/Add-a-heading-4.png","1400x1400-width":930,"1400x1400-height":520,"preload_img":"https:\/\/novelis.io\/wp-content\/uploads\/2022\/07\/Add-a-heading-4-30x17.png","preload_img-width":30,"preload_img-height":17}}}}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybers\u00e9curit\u00e9 : comment renforcer sa s\u00e9curit\u00e9 informatique<\/title>\n<meta name=\"description\" content=\"Cet acteur r\u00e9gional a fait appel aux services de Novelis pour mettre en place des mesures de cybers\u00e9curit\u00e9 et ainsi r\u00e9duire les risques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 : comment renforcer sa s\u00e9curit\u00e9 informatique\" \/>\n<meta property=\"og:description\" content=\"Cet acteur r\u00e9gional a fait appel aux services de Novelis pour mettre en place des mesures de cybers\u00e9curit\u00e9 et ainsi r\u00e9duire les risques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Novelis innovation\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/novelis.io\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-25T15:23:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/novelis.io\/wp-content\/uploads\/2023\/04\/BLOG-1200-\u00d7-628-px-16.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@novelis_io\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/\",\"url\":\"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/\",\"name\":\"Cybers\u00e9curit\u00e9 : comment renforcer sa s\u00e9curit\u00e9 informatique\",\"isPartOf\":{\"@id\":\"https:\/\/novelis.io\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/novelis.io\/wp-content\/uploads\/2023\/04\/BLOG-1200-\u00d7-628-px-16.jpg\",\"datePublished\":\"2023-04-26T14:27:23+00:00\",\"dateModified\":\"2023-05-25T15:23:45+00:00\",\"description\":\"Cet acteur r\u00e9gional a fait appel aux services de Novelis pour mettre en place des mesures de cybers\u00e9curit\u00e9 et ainsi r\u00e9duire les risques.\",\"breadcrumb\":{\"@id\":\"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/novelis.io\/wp-content\/uploads\/2023\/04\/BLOG-1200-\u00d7-628-px-16.jpg\",\"contentUrl\":\"https:\/\/novelis.io\/wp-content\/uploads\/2023\/04\/BLOG-1200-\u00d7-628-px-16.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Sarthe\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/novelis.io\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Renforcer sa s\u00e9curit\u00e9 informatique gr\u00e2ce aux audits et simulations de cybers\u00e9curit\u00e9\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/novelis.io\/fr\/#website\",\"url\":\"https:\/\/novelis.io\/fr\/\",\"name\":\"Novelis innovation\",\"description\":\"Novelis innovation\",\"publisher\":{\"@id\":\"https:\/\/novelis.io\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/novelis.io\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/novelis.io\/fr\/#organization\",\"name\":\"Novelis innovation\",\"url\":\"https:\/\/novelis.io\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/novelis.io\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/novelis.io\/wp-content\/uploads\/2021\/12\/logo-1.png\",\"contentUrl\":\"https:\/\/novelis.io\/wp-content\/uploads\/2021\/12\/logo-1.png\",\"width\":479,\"height\":98,\"caption\":\"Novelis innovation\"},\"image\":{\"@id\":\"https:\/\/novelis.io\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/novelis.io\",\"https:\/\/x.com\/novelis_io\",\"https:\/\/www.linkedin.com\/company\/novelis-consulting\/\",\"https:\/\/www.youtube.com\/channel\/UCJ5eJR22n2GtfKaTWueWRPQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 : comment renforcer sa s\u00e9curit\u00e9 informatique","description":"Cet acteur r\u00e9gional a fait appel aux services de Novelis pour mettre en place des mesures de cybers\u00e9curit\u00e9 et ainsi r\u00e9duire les risques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 : comment renforcer sa s\u00e9curit\u00e9 informatique","og_description":"Cet acteur r\u00e9gional a fait appel aux services de Novelis pour mettre en place des mesures de cybers\u00e9curit\u00e9 et ainsi r\u00e9duire les risques.","og_url":"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/","og_site_name":"Novelis innovation","article_publisher":"https:\/\/www.facebook.com\/novelis.io","article_modified_time":"2023-05-25T15:23:45+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/novelis.io\/wp-content\/uploads\/2023\/04\/BLOG-1200-\u00d7-628-px-16.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@novelis_io","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/","url":"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/","name":"Cybers\u00e9curit\u00e9 : comment renforcer sa s\u00e9curit\u00e9 informatique","isPartOf":{"@id":"https:\/\/novelis.io\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/novelis.io\/wp-content\/uploads\/2023\/04\/BLOG-1200-\u00d7-628-px-16.jpg","datePublished":"2023-04-26T14:27:23+00:00","dateModified":"2023-05-25T15:23:45+00:00","description":"Cet acteur r\u00e9gional a fait appel aux services de Novelis pour mettre en place des mesures de cybers\u00e9curit\u00e9 et ainsi r\u00e9duire les risques.","breadcrumb":{"@id":"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/#primaryimage","url":"https:\/\/novelis.io\/wp-content\/uploads\/2023\/04\/BLOG-1200-\u00d7-628-px-16.jpg","contentUrl":"https:\/\/novelis.io\/wp-content\/uploads\/2023\/04\/BLOG-1200-\u00d7-628-px-16.jpg","width":1200,"height":628,"caption":"Sarthe"},{"@type":"BreadcrumbList","@id":"https:\/\/novelis.io\/fr\/business-cases\/renforcer-sa-securite-informatique-grace-aux-audits-et-simulations-de-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/novelis.io\/fr\/"},{"@type":"ListItem","position":2,"name":"Renforcer sa s\u00e9curit\u00e9 informatique gr\u00e2ce aux audits et simulations de cybers\u00e9curit\u00e9\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/novelis.io\/fr\/#website","url":"https:\/\/novelis.io\/fr\/","name":"Novelis innovation","description":"Novelis innovation","publisher":{"@id":"https:\/\/novelis.io\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/novelis.io\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/novelis.io\/fr\/#organization","name":"Novelis innovation","url":"https:\/\/novelis.io\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/novelis.io\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/novelis.io\/wp-content\/uploads\/2021\/12\/logo-1.png","contentUrl":"https:\/\/novelis.io\/wp-content\/uploads\/2021\/12\/logo-1.png","width":479,"height":98,"caption":"Novelis innovation"},"image":{"@id":"https:\/\/novelis.io\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/novelis.io","https:\/\/x.com\/novelis_io","https:\/\/www.linkedin.com\/company\/novelis-consulting\/","https:\/\/www.youtube.com\/channel\/UCJ5eJR22n2GtfKaTWueWRPQ"]}]}},"_links":{"self":[{"href":"https:\/\/novelis.io\/fr\/wp-json\/wp\/v2\/business-cases\/7050"}],"collection":[{"href":"https:\/\/novelis.io\/fr\/wp-json\/wp\/v2\/business-cases"}],"about":[{"href":"https:\/\/novelis.io\/fr\/wp-json\/wp\/v2\/types\/business-cases"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/novelis.io\/fr\/wp-json\/wp\/v2\/media\/7051"}],"wp:attachment":[{"href":"https:\/\/novelis.io\/fr\/wp-json\/wp\/v2\/media?parent=7050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/novelis.io\/fr\/wp-json\/wp\/v2\/categories?post=7050"},{"taxonomy":"custom_tag","embeddable":true,"href":"https:\/\/novelis.io\/fr\/wp-json\/wp\/v2\/custom_tag?post=7050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}