{"version":"1.0","provider_name":"AZARA Consulting","provider_url":"https:\/\/azara.ma\/en","author_name":"A. Ennabo","author_url":"https:\/\/azara.ma\/en\/author\/aennaboazara-ma\/","title":"Expert en Cyber S\u00e9curit\u00e9 - Contr\u00f4le &amp; Reporting [CONS-2747] - AZARA Consulting","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qNR0dd0fmW\"><a href=\"https:\/\/azara.ma\/en\/expert-en-cyber-securite-controle-reporting-cons-2747\/\">Expert en Cyber S\u00e9curit\u00e9 &#8211; Contr\u00f4le &amp; Reporting [CONS-2747]<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/azara.ma\/en\/expert-en-cyber-securite-controle-reporting-cons-2747\/embed\/#?secret=qNR0dd0fmW\" width=\"600\" height=\"338\" title=\"&#8220;Expert en Cyber S\u00e9curit\u00e9 &#8211; Contr\u00f4le &amp; Reporting [CONS-2747]&#8221; &#8212; AZARA Consulting\" data-secret=\"qNR0dd0fmW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>","description":"Missions Assurer le contr\u00f4le et le reporting Cyber de la R\u00e9gion D\u00e9finir des indicateurs et d\u00e9ploiement et suivi d&rsquo;un tableau de bord Cyber et Risque Planification, r\u00e9alisation, accompagnement et suivi des scans et des pentest Pilotage de mise en conformit\u00e9 des exigences cyber du Groupe Remonter les \u00e9tats des lieux et l&rsquo;avancement dans des comit\u00e9s [&hellip;]"}