{"version":"1.0","provider_name":"AZARA Consulting","provider_url":"https:\/\/azara.ma\/en","author_name":"A. Ennabo","author_url":"https:\/\/azara.ma\/en\/author\/aennaboazara-ma\/","title":"Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872] - AZARA Consulting","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"GNIk1rCnVJ\"><a href=\"https:\/\/azara.ma\/en\/ingenieur-securite-de-linformation-cons-2872\/\">Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872]<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/azara.ma\/en\/ingenieur-securite-de-linformation-cons-2872\/embed\/#?secret=GNIk1rCnVJ\" width=\"600\" height=\"338\" title=\"&#8220;Ing\u00e9nieur S\u00e9curit\u00e9 de l\u2019Information [CONS-2872]&#8221; &#8212; AZARA Consulting\" data-secret=\"GNIk1rCnVJ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>","description":"Missions&nbsp; Assurer Le pilotage et la MOA des projets s\u00e9curit\u00e9 L\u2019\u00e9valuation des risques IT pour les projets informatiques bancaire et infrastructure La formalisation des proc\u00e9dures et processus s\u00e9curit\u00e9 de l\u2019information Le reporting L\u2019audit technique des syst\u00e8mes et des applications Garantir L\u2019appr\u00e9ciation des risques IT aussi bien sur le volet fonctionnel que technique La bonne application [&hellip;]"}