{"version":"1.0","provider_name":"AZARA Consulting","provider_url":"https:\/\/azara.ma\/en","author_name":"A. Ennabo","author_url":"https:\/\/azara.ma\/en\/author\/aennaboazara-ma\/","title":"Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435] - AZARA Consulting","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"BW0GdzwISK\"><a href=\"https:\/\/azara.ma\/en\/expert-fonctionnel-securite-de-linformation-cons-3435\/\">Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435]<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/azara.ma\/en\/expert-fonctionnel-securite-de-linformation-cons-3435\/embed\/#?secret=BW0GdzwISK\" width=\"600\" height=\"338\" title=\"&#8220;Expert fonctionnel S\u00e9curit\u00e9 de l\u2019Information [CONS-3435]&#8221; &#8212; AZARA Consulting\" data-secret=\"BW0GdzwISK\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>","description":"Missions&nbsp; Assurer : Le pilotage et la MOA de programmes\/projets s\u00e9curit\u00e9 L\u2019\u00e9valuation des risques IT pour les projets informatiques bancaires et infrastructures, aussi bien sur le volet fonctionnel que technique La bonne application des principes de gestion des risques et la proposition de solutions permettant de limiter les risques identifi\u00e9s La r\u00e9alisation et le pilotage [&hellip;]"}