{"id":2,"date":"2025-09-18T11:16:40","date_gmt":"2025-09-18T09:16:40","guid":{"rendered":"http:\/\/localhost:8888\/cyber_for_good_org\/?page_id=2"},"modified":"2026-04-27T15:51:33","modified_gmt":"2026-04-27T13:51:33","slug":"home","status":"publish","type":"page","link":"https:\/\/cyberforgood.org\/fr\/","title":{"rendered":"Home"},"content":{"rendered":"<section id=\"block-section-hero-block_b7f7faac5b61d7a40f2596649bb180b7\" class=\"block-section-hero blank\"><div class=\"content-wrapper\"><img decoding=\"async\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/11\/C4G_ICONS_07A_YELLOW-1024x1024.png\" width=\"960\" height=\"960\" alt=\"\"><div class=\"text-wrapper\"><h2 class=\"section-title\"><span>Cyber for Good<\/span> I Prot\u00e9ger les acteurs essentiels \u00e0 notre d\u00e9mocratie<\/h2><div class=\"home-hero-lead block-hero-lead\"><p>Un programme gratuit visant \u00e0 prot\u00e9ger et outiller les acteurs essentiels \u00e0 la d\u00e9mocratie face aux enjeux cyber, renforcer leur souverainet\u00e9 num\u00e9rique et leur permettre de tirer parti du num\u00e9rique en toute confiance.<\/p>\n<\/div><div class=\"home-hero-sign block-hero-sign\"><p>Un programme cr\u00e9\u00e9 par le fonds de dotation Advens for People and Planet.<\/p>\n<\/div><div class=\"hero-logos\"><div><img decoding=\"async\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/10\/Logo-AFPP-2024-couleurs-1-300x104.png\" width=\"300\" height=\"104\" alt=\"Advens for People and Planet\"><\/div><\/div><\/div><div class=\"button-wrapper\"><button class=\"white-hover\"><a href=\"https:\/\/cyberforgood.org\/\/fr\/ess\/\" title=\"Je suis une structure ESS \u2192\" target=\"\">Je suis une structure ESS \u2192<\/a><\/button><button class=\"white-hover\"><a href=\"https:\/\/cyberforgood.org\/\/fr\/media\/\" title=\"Je suis journaliste \/ m\u00e9dia \u2192\" target=\"\">Je suis journaliste \/ m\u00e9dia \u2192<\/a><\/button><\/div><\/div><\/section>\n\n<section data-block-id=\"block_783033038428476a84d3f8f148a2db97\" id=\"block-two-sectionsblock_783033038428476a84d3f8f148a2db97\" class=\"block-two-sections\"><div class=\"content-wrapper\"><h2 class=\"section-title\">Deux programmes, <span class=\"home-v2-programs-title-accent\">un m\u00eame objectif<\/span><\/h2><div class=\"sections-wrapper col-2\"><article class=\"section-site ess\"><div class=\"two-section-header\"><img decoding=\"async\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Pastille-ESS.svg\" alt=\"Pastille ESS\"><h3>La cybers\u00e9curit\u00e9 pour les acteurs de l&rsquo;\u00c9conomie Sociale et Solidaire<\/h3><\/div><div class=\"two-sections_text\"><p><span class=\"TextRun SCXW162378918 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW162378918 BCX8\">Les structures de l\u2019\u00c9conomie Sociale et Solidaire (ESS) jouent un r\u00f4le vital aupr\u00e8s de publics vuln\u00e9rables. Pourtant, elles restent souvent peu pr\u00e9par\u00e9es face aux risques num\u00e9riques. <\/span><\/span><\/p>\n<p><span class=\"TextRun SCXW162378918 BCX8\" lang=\"FR-FR\" xml:lang=\"FR-FR\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW162378918 BCX8\">Faute de moyens, de formation ou de ressources techniques, elles sont particuli\u00e8rement vuln\u00e9rables aux cyberattaques. Les accompagner, c\u2019est renforcer la r\u00e9silience de tout un \u00e9cosyst\u00e8me solidaire et interconnect\u00e9.<\/span><\/span><\/p>\n<\/div><button><a href=\"https:\/\/cyberforgood.org\/ess\/\" title=\"D\u00e9couvrez l&#039;offre ESS\" target=\"\">D\u00e9couvrez l&#039;offre ESS<\/a><\/button><\/article><article class=\"section-site media\"><div class=\"two-section-header\"><img decoding=\"async\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Pastille-MEDIA.svg\" alt=\"Pastille M\u00e9dia\"><h3>Prot\u00e9ger les journalistes ind\u00e9pendants et de la PQR face \u00e0 la menace informatique<\/h3><\/div><div class=\"two-sections_text\"><p>Les journalistes sont de plus en plus cibl\u00e9s par les cyberattaques et les manipulations de l&rsquo;information, en raison de leur visibilit\u00e9 et de leur r\u00f4le critique dans la diffusion de donn\u00e9es parfois tr\u00e8s sensibles.<\/p>\n<p>Notre mission est de mieux les prot\u00e9ger et les outiller face aux ing\u00e9rences et risques num\u00e9riques. Ce programme s&rsquo;adresse aux journalistes, aux m\u00e9dias ind\u00e9pendants et \u00e0 la presse quotidienne r\u00e9gionale (PQR).<\/p>\n<\/div><button><a href=\"https:\/\/cyberforgood.org\/media\/\" title=\"D\u00e9couvrez l&#039;offre M\u00e9dia\" target=\"\">D\u00e9couvrez l&#039;offre M\u00e9dia<\/a><\/button><\/article><\/div><\/div><\/section>\n\n<section data-block-id=\"block_47a8f301501a248f50c52711212417d3\" id=\"key-figures-block_47a8f301501a248f50c52711212417d3\" class=\"key-figures\"><div class=\"content-wrapper\"><h2 class=\"section-title\">Chiffres cl\u00e9s<\/h2><div class=\"key-figures col-4\"><div class=\"key-figure-container initial\"><h4><span class=\"figure countup\" id=\"figure-block_47a8f301501a248f50c52711212417d3-1\" data-max-number=\"39\">0<\/span><span>%<\/span><br>d&rsquo;attaques en plus chaque ann\u00e9e depuis 2023<\/h4><\/div><script>\n\t\tvar waypoint = new Waypoint({\n\t\t  element: document.querySelector(\"[data-block-id='block_47a8f301501a248f50c52711212417d3']\"),\n\t\t  handler: function(direction) {\n\t\t\tArray.from(document.querySelectorAll(\"#figure-block_47a8f301501a248f50c52711212417d3-1\")).forEach(function (elem) {\n\t\t\t  window.numberRush(\"figure-block_47a8f301501a248f50c52711212417d3-1\", {\n\t\t\t\tspeed: 60,\n\t\t\t\tsteps: 1,\n\t\t\t  });\n\t\t\t});\n\t\t  },\n\t\t  offset: \"70%\"\n\t\t})\n\t<\/script><div class=\"key-figure-container initial\"><h4><span class=\"figure countup\" id=\"figure-block_47a8f301501a248f50c52711212417d3-2\" data-max-number=\"87\">0<\/span><span>%<\/span><br>des experts cyber d&rsquo;Advens ont \u00e9t\u00e9 confront\u00e9s \u00e0 des attaques pilot\u00e9es par l\u2019IA en 2024<\/h4><\/div><script>\n\t\tvar waypoint = new Waypoint({\n\t\t  element: document.querySelector(\"[data-block-id='block_47a8f301501a248f50c52711212417d3']\"),\n\t\t  handler: function(direction) {\n\t\t\tArray.from(document.querySelectorAll(\"#figure-block_47a8f301501a248f50c52711212417d3-2\")).forEach(function (elem) {\n\t\t\t  window.numberRush(\"figure-block_47a8f301501a248f50c52711212417d3-2\", {\n\t\t\t\tspeed: 50,\n\t\t\t\tsteps: 1,\n\t\t\t  });\n\t\t\t});\n\t\t  },\n\t\t  offset: \"70%\"\n\t\t})\n\t<\/script><div class=\"key-figure-container initial\"><h4><span class=\"figure countup\" id=\"figure-block_47a8f301501a248f50c52711212417d3-3\" data-max-number=\"50\">0<\/span><span>K<\/span><br>est le co\u00fbt m\u00e9dian d&rsquo;une cyberattaque<\/h4><\/div><script>\n\t\tvar waypoint = new Waypoint({\n\t\t  element: document.querySelector(\"[data-block-id='block_47a8f301501a248f50c52711212417d3']\"),\n\t\t  handler: function(direction) {\n\t\t\tArray.from(document.querySelectorAll(\"#figure-block_47a8f301501a248f50c52711212417d3-3\")).forEach(function (elem) {\n\t\t\t  window.numberRush(\"figure-block_47a8f301501a248f50c52711212417d3-3\", {\n\t\t\t\tspeed: 67,\n\t\t\t\tsteps: 1,\n\t\t\t  });\n\t\t\t});\n\t\t  },\n\t\t  offset: \"70%\"\n\t\t})\n\t<\/script><div class=\"key-figure-container initial\"><h4><span class=\"figure countup\" id=\"figure-block_47a8f301501a248f50c52711212417d3-4\" data-max-number=\"300\">0<\/span><br>ing\u00e9rences num\u00e9riques \u00e9trang\u00e8res d\u00e9tect\u00e9es chaque ann\u00e9e en France<\/h4><p class=\"source\"><a href=\"https:\/\/info.advens.fr\/fr\/rapport-etat-de-la-menace-2025\" target=\"_blank\">Source : Rapport sur l\u2019\u00e9tat de la menace Advens 2024-2025 et VIGINUM<\/a><\/p><\/div><script>\n\t\tvar waypoint = new Waypoint({\n\t\t  element: document.querySelector(\"[data-block-id='block_47a8f301501a248f50c52711212417d3']\"),\n\t\t  handler: function(direction) {\n\t\t\tArray.from(document.querySelectorAll(\"#figure-block_47a8f301501a248f50c52711212417d3-4\")).forEach(function (elem) {\n\t\t\t  window.numberRush(\"figure-block_47a8f301501a248f50c52711212417d3-4\", {\n\t\t\t\tspeed: 12,\n\t\t\t\tsteps: 1,\n\t\t\t  });\n\t\t\t});\n\t\t  },\n\t\t  offset: \"70%\"\n\t\t})\n\t<\/script><\/div><\/div><\/section>\n\n<section id=\"section-point-list-block_b3f2df49e7301e18ecede0f320db6132\" class=\"section-point-list\"><div class=\"content-wrapper\"><h2 class=\"section-title\">Pourquoi Cyber for Good ?<\/h2><p class=\"subtitle\">Notre mission<\/p><ul class=\"col-3\"><li class=\"point\"><em class=\"big-number\">01.<\/em><div><h3>\ud83d\udee1\ufe0f Prot\u00e9ger, outiller et accompagner les acteurs vuln\u00e9rables<\/h3>\n<p>Face \u00e0 la mont\u00e9e des cyberattaques et des manipulations num\u00e9riques, les programmes de Cyber for Good proposent des outils pour comprendre, anticiper et contrer ces menaces : intelligence artificielle, hygi\u00e8ne num\u00e9rique, conformit\u00e9 juridique\u2026 De la sensibilisation aux bonnes pratiques jusqu&rsquo;\u00e0 la ma\u00eetrise des enjeux cyber, soyez pr\u00eats \u00e0 prot\u00e9ger vos donn\u00e9es en ligne<\/p>\n<\/div><\/li><li class=\"point\"><em class=\"big-number\">02.<\/em><div><h3>\ud83c\udfdb\ufe0f Rassembler les experts europ\u00e9ens cyber engag\u00e9s pour la d\u00e9mocratie<\/h3>\n<p>Cyber for Good est la plateforme qui f\u00e9d\u00e8re les entreprises de la tech fran\u00e7aises autour d&rsquo;un objectif : partager des ressources et des outils align\u00e9s avec les valeurs et les normes europ\u00e9ennes. Ensemble, construisons un num\u00e9rique responsable, s\u00e9curis\u00e9 et respectueux des valeurs d\u00e9mocratiques.<\/p>\n<\/div><\/li><li class=\"point\"><em class=\"big-number\">03.<\/em><div><h3>\ud83c\udf10 D\u00e9fendre la souverainet\u00e9 num\u00e9rique en France et en Europe<\/h3>\n<p>\u00c0 l&rsquo;heure o\u00f9 le num\u00e9rique fa\u00e7onne profond\u00e9ment nos soci\u00e9t\u00e9s, la souverainet\u00e9 num\u00e9rique europ\u00e9enne appara\u00eet comme un imp\u00e9ratif strat\u00e9gique majeur. Elle incarne la capacit\u00e9 de l&rsquo;Europe \u00e0 ma\u00eetriser ses technologies, ses infrastructures et ses donn\u00e9es, afin de garantir son ind\u00e9pendance, sa s\u00e9curit\u00e9 et sa cr\u00e9ativit\u00e9.<\/p>\n<\/div><\/li><\/ul><\/div><\/section>\n\n<section id=\"block-latest-posts-block_140936b0dfa4391359eb2f6c0752d706\" class=\"block-latest-posts\"><div class=\"content-wrapper\"><h2 class=\"section-title\">Derni\u00e8res interviews &amp; analyses<\/h2><div class=\"post-list\">\n<article id=\"post-1338\" class=\"post-1338 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber category-cyber-en tag-interview\">\n\n\n\t\t\t<header class=\"entry-header cyber\">\n\t\t<div class=category-container><a href=\"https:\/\/cyberforgood.org\/fr\/cat\/cyber\/\" alt=\"See news in the category Cyber\" class=\"category-term\">Cyber<\/a><\/div>\t<\/header><!-- .entry-header -->\n\n\t<div class=\"entry-content\">\n\t\t<a class=thumbnail-link href=\"https:\/\/cyberforgood.org\/fr\/giulio-coppi-couper-internet-devient-larme-des-pouvoirs-repressifs\/\"><img decoding=\"async\" width=\"257\" height=\"300\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/10\/Sebestien-Courou-257x300.png\" class=\"custom-medium wp-post-image\" alt=\"\" srcset=\"\" sizes=\"\" \/><\/a><div class=card-text><p class=pre-intro>Expert Senior chez Access Now<\/p><h3><a href=\"https:\/\/cyberforgood.org\/fr\/giulio-coppi-couper-internet-devient-larme-des-pouvoirs-repressifs\/\">Giulio Coppi : \u00ab Couper Internet devient l\u2019arme des pouvoirs r\u00e9pressifs \u00bb<\/a><\/h3><time>f\u00e9vrier 2026<\/time><p>\u00c0 travers le monde, les r\u00e9gimes r\u00e9pressifs voient dans l\u2019augmentation de l\u2019interconnectivit\u00e9 une opportunit\u00e9 pour manipuler les populations. Giulio Coppi, Expert Senior chez Access Now et sp\u00e9cialiste des risques digitaux dans les situations de crises humanitaires, tente d\u2019\u00e9tablir un cadre l\u00e9gal pour interdire ce genre d\u2019attaques et prot\u00e9ger les droits des citoyens.<\/p><\/div>\t<\/div><!-- .entry-content -->\n\n<\/article><!-- #post-1338 -->\n\n<article id=\"post-1290\" class=\"post-1290 post type-post status-publish format-standard has-post-thumbnail hentry category-media tag-interview\">\n\n\n\t\t\t<header class=\"entry-header media\">\n\t\t<div class=category-container><a href=\"https:\/\/cyberforgood.org\/fr\/cat\/media\/\" alt=\"See news in the category M\u00e9dia\" class=\"category-term\">M\u00e9dia<\/a><\/div>\t<\/header><!-- .entry-header -->\n\n\t<div class=\"entry-content\">\n\t\t<a class=thumbnail-link href=\"https:\/\/cyberforgood.org\/fr\/chine-labbe-newsguard-sources-fiables-debunking\/\"><img decoding=\"async\" width=\"300\" height=\"265\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/12\/Open-Peeps-Avatar-2-1-300x265.png\" class=\"custom-medium wp-post-image\" alt=\"\" srcset=\"\" sizes=\"\" \/><\/a><div class=card-text><p class=pre-intro>R\u00e9dactrice en chef &#038; Vice-pr\u00e9sidente senior charg\u00e9e des partenariats, Europe et Canada<\/p><h3><a href=\"https:\/\/cyberforgood.org\/fr\/chine-labbe-newsguard-sources-fiables-debunking\/\">Chine Labb\u00e9 : \u00ab Constituer son propre corpus de sources fiables est aujourd&rsquo;hui indispensable \u00bb<\/a><\/h3><time>d\u00e9cembre 2025<\/time><p>\u00c0 l\u2019heure o\u00f9 les faux r\u00e9cits se propagent \u00e0 grande vitesse sur le Web, le monde de l\u2019information est \u00e0 un tournant : comment restaurer la confiance sans freiner le flux num\u00e9rique ? Fond\u00e9e en 2018, la start-up NewsGuard s\u2019est donn\u00e9 pour mission d\u2019apporter une r\u00e9ponse concr\u00e8te \u00e0 ce d\u00e9fi en \u00e9valuant la fiabilit\u00e9 des sites d\u2019actualit\u00e9 et en d\u00e9mentant les principales fausses informations qui circulent en ligne, gr\u00e2ce \u00e0 une analyse journalistique rigoureuse. Rencontre avec Chine Labb\u00e9 pour comprendre comment naviguer dans un environnement informationnel satur\u00e9.<\/p><\/div>\t<\/div><!-- .entry-content -->\n\n<\/article><!-- #post-1290 -->\n\n<article id=\"post-1282\" class=\"post-1282 post type-post status-publish format-standard has-post-thumbnail hentry category-media tag-interview\">\n\n\n\t\t\t<header class=\"entry-header media\">\n\t\t<div class=category-container><a href=\"https:\/\/cyberforgood.org\/fr\/cat\/media\/\" alt=\"See news in the category M\u00e9dia\" class=\"category-term\">M\u00e9dia<\/a><\/div>\t<\/header><!-- .entry-header -->\n\n\t<div class=\"entry-content\">\n\t\t<a class=thumbnail-link href=\"https:\/\/cyberforgood.org\/fr\/camille-grenier-innovation-regulation-democratie-desinformation-journalisme\/\"><img decoding=\"async\" width=\"248\" height=\"300\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/12\/camille-grenier-248x300.png\" class=\"custom-medium wp-post-image\" alt=\"\" srcset=\"\" sizes=\"\" \/><\/a><div class=card-text><p class=pre-intro>Directeur ex\u00e9cutif du Forum sur l\u2019Information et la D\u00e9mocratie<\/p><h3><a href=\"https:\/\/cyberforgood.org\/fr\/camille-grenier-innovation-regulation-democratie-desinformation-journalisme\/\">Camille Grenier\u00a0: \u00ab\u00a0Il n\u2019y aura pas d\u2019innovation sans r\u00e9gulation \u00bb<\/a><\/h3><time>d\u00e9cembre 2025<\/time><p>Tandis que l\u2019Union Europ\u00e9enne s\u2019appr\u00eate \u00e0 assouplir les r\u00e8gles sur l\u2019IA et la protection des donn\u00e9es, d\u2019autres voix se l\u00e8vent pour \u00e9voquer les risques. De fait, le manque de r\u00e9gulation des plateformes num\u00e9riques g\u00e9n\u00e8re d&rsquo;importantes vuln\u00e9rabilit\u00e9s pour nos d\u00e9mocraties. Camille Grenier, directeur ex\u00e9cutif du Forum sur l\u2019Information et la D\u00e9mocratie, analyse les mutations de l\u2019espace num\u00e9rique et les principes pour le r\u00e9guler. Le Forum sur l\u2019Information et la D\u00e9mocratie, cr\u00e9\u00e9 en 2019 est une organisation internationale qui rassemble \u00c9tats, soci\u00e9t\u00e9 civile et monde de la recherche pour promouvoir un espace informationnel d\u00e9mocratique et pluraliste. <\/p><\/div>\t<\/div><!-- .entry-content -->\n\n<\/article><!-- #post-1282 -->\n<\/div><button><a href=\"https:\/\/cyberforgood.org\/cyber-commons\/\" title=\"Voir tous les articles\" target=\"\">Voir tous les articles<\/a><\/button><\/div><\/section>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber for Good - Prot\u00e9ger les acteurs essentiels \u00e0 notre d\u00e9mocratie<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforgood.org\/fr\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber for Good - Prot\u00e9ger les acteurs essentiels \u00e0 notre d\u00e9mocratie\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforgood.org\/fr\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber for Good\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-27T13:51:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/11\/screenshot.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/\",\"url\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/\",\"name\":\"Cyber for Good - Prot\u00e9ger les acteurs essentiels \u00e0 notre d\u00e9mocratie\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/#website\"},\"datePublished\":\"2025-09-18T09:16:40+00:00\",\"dateModified\":\"2026-04-27T13:51:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/\",\"name\":\"Cyber for Good\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/#organization\",\"name\":\"Cyber for Good\",\"url\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberforgood.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Logo-CFG.svg\",\"contentUrl\":\"https:\\\/\\\/cyberforgood.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Logo-CFG.svg\",\"caption\":\"Cyber for Good\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberforgood.org\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber for Good - Prot\u00e9ger les acteurs essentiels \u00e0 notre d\u00e9mocratie","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforgood.org\/fr\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyber for Good - Prot\u00e9ger les acteurs essentiels \u00e0 notre d\u00e9mocratie","og_url":"https:\/\/cyberforgood.org\/fr\/","og_site_name":"Cyber for Good","article_modified_time":"2026-04-27T13:51:33+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/11\/screenshot.png","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberforgood.org\/fr\/","url":"https:\/\/cyberforgood.org\/fr\/","name":"Cyber for Good - Prot\u00e9ger les acteurs essentiels \u00e0 notre d\u00e9mocratie","isPartOf":{"@id":"https:\/\/cyberforgood.org\/fr\/#website"},"datePublished":"2025-09-18T09:16:40+00:00","dateModified":"2026-04-27T13:51:33+00:00","breadcrumb":{"@id":"https:\/\/cyberforgood.org\/fr\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforgood.org\/fr\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforgood.org\/fr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cyberforgood.org\/fr\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/cyberforgood.org\/fr\/#website","url":"https:\/\/cyberforgood.org\/fr\/","name":"Cyber for Good","description":"","publisher":{"@id":"https:\/\/cyberforgood.org\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforgood.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/cyberforgood.org\/fr\/#organization","name":"Cyber for Good","url":"https:\/\/cyberforgood.org\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cyberforgood.org\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg","contentUrl":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg","caption":"Cyber for Good"},"image":{"@id":"https:\/\/cyberforgood.org\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":114,"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":2322,"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/pages\/2\/revisions\/2322"}],"wp:attachment":[{"href":"https:\/\/cyberforgood.org\/fr\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}