{"id":17277,"date":"2021-07-02T16:30:32","date_gmt":"2021-07-02T14:30:32","guid":{"rendered":"https:\/\/www.kaspersky.fr\/blog\/?p=17277"},"modified":"2021-07-02T16:30:32","modified_gmt":"2021-07-02T14:30:32","slug":"podcast-cyber-pop-episode-5","status":"publish","type":"post","link":"https:\/\/www.kaspersky.fr\/blog\/podcast-cyber-pop-episode-5\/17277\/","title":{"rendered":"Podcast : Cyber Pop \u00e9pisode 5"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Pour ne plus rien rater de L\u2019actu Tech : innovation, protection des donn\u00e9es, gaming, r\u00e9seaux sociaux, tendances mais aussi risques, etc. Abonnez-vous \u00e0 Cyber Pop, le nouveau podcast par Kaspersky, au menu des tables rondes, des interviews exclusives de nos experts et chercheurs en cybers\u00e9curit\u00e9, ainsi que de nos partenaires.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Dans ce podcast, nous revenons sur la th\u00e9matique de la protection des donn\u00e9es personnelles et des enjeux derri\u00e8re ce concept. Comment faire en sorte de continuer \u00e0 pouvoir b\u00e9n\u00e9ficier du \u00ab\u00a0pouvoir de la data\u00a0\u00bb sans pour autant se retrouver confront\u00e9s au risque ? Comment prendre conscience de la valeur d\u2019une donn\u00e9e personnelle ? Comment finalement partager ses donn\u00e9es en toute conscience et en toute s\u00e9curit\u00e9 ?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Pour illustrer cet \u00e9change, nous reviendrons notamment sur <\/span><a href=\"https:\/\/www.kaspersky.fr\/blog\/europe-privacy-heat-map\/17047\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400\">les r\u00e9sultats de l\u2019\u00e9tude \u00ab\u00a0privacy heatmap\u00a0\u00bb<\/span><\/a><span style=\"font-weight: 400\"> r\u00e9alis\u00e9e en Europe au printemps 2021 pour expliquer les diff\u00e9rences de perception et d\u2019action des diff\u00e9rents citoyens d\u2019Europe vis \u00e0 vis du partage de leurs donn\u00e9es.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Nous expliquerons \u00e9galement en quoi la collecte de donn\u00e9es personnelles par des personnes malveillantes peut \u00eatre un probl\u00e8me en donnant <\/span><a href=\"https:\/\/www.kaspersky.fr\/blog\/doxing-methods\/16867\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400\">notamment la d\u00e9finition du doxing<\/span><\/a><span style=\"font-weight: 400\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Enfin, et parce qu\u2019il semble compliqu\u00e9 d\u2019aborder le sujet des donn\u00e9es personnelles sans parler de RGPD, ce podcast fera un petit rappel de ce qu\u2019est cette loi et comment elle est cens\u00e9e redonner un peu de souverainet\u00e9 au citoyen europ\u00e9en vis \u00e0 vis des donn\u00e9es qui le concernent.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Bonne \u00e9coute !<\/span><\/p>\n<p><iframe loading=\"lazy\" style=\"border: none\" height=\"90\" scrolling=\"no\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/19685879\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/87A93A\/\" width=\"100%\"><\/iframe><\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/fr\/podcast\/cyber-pop\/id1560176761\" target=\"_blank\" rel=\"noopener nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-16662\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/93\/2021\/03\/26142645\/button-subscribe-apple-2-e1616768977574.png\" alt=\"\" width=\"198\" height=\"48\"><\/a><a href=\"https:\/\/open.spotify.com\/show\/26yTFGclVFe5nUHLCUxguy\" target=\"_blank\" rel=\"noopener nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-16661\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/93\/2021\/03\/26142527\/button-subscribe-spotify-3-e1616768877882.png\" alt=\"Spotify-feed\" width=\"133\" height=\"87\"><\/a><a href=\"http:\/\/cyber-pop.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-16643\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/93\/2021\/03\/26093221\/button-subscribe-rss-2-e1616768284593.png\" alt=\"RSS-feed\" width=\"116\" height=\"51\"><\/a><\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans ce cinqui\u00e8me \u00e9pisode de CyberPop, nous nous int\u00e9ressons aux donn\u00e9es priv\u00e9es en ligne, \u00e0 leur r\u00e9glementation, aux risques associ\u00e9s \u00e0 la divulgation de ses donn\u00e9es et aux diff\u00e9rents comportements des Europ\u00e9ens quant \u00e0 la gestion de leurs donn\u00e9es.<\/p>\n","protected":false},"author":2607,"featured_media":17281,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6,1868],"tags":[4105,202,1014,4131,1538,2837],"class_list":{"0":"post-17277","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"tag-cyber-pop","10":"tag-cybersecurite","11":"tag-donnees-privees","12":"tag-doxing","13":"tag-podcast","14":"tag-rgpd"},"hreflang":[{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/podcast-cyber-pop-episode-5\/17277\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.fr\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/17277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/users\/2607"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/comments?post=17277"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/17277\/revisions"}],"predecessor-version":[{"id":17283,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/17277\/revisions\/17283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media\/17281"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media?parent=17277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/categories?post=17277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/tags?post=17277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}