{"id":69,"date":"2024-09-06T07:08:09","date_gmt":"2024-09-06T07:08:09","guid":{"rendered":"https:\/\/cabinet-louis-reynaud.eu\/?page_id=69"},"modified":"2025-07-23T13:29:19","modified_gmt":"2025-07-23T13:29:19","slug":"cybersecurite-des-intelligences-artificielles","status":"publish","type":"page","link":"https:\/\/cabinet-louis-reynaud.eu\/en\/cybersecurite-des-intelligences-artificielles\/","title":{"rendered":"Artificial Intelligence Cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"69\" class=\"elementor elementor-69\">\n\t\t\t\t<div class=\"elementor-element elementor-element-19417ad e-flex e-con-boxed e-con e-parent\" data-id=\"19417ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f18227e e-con-full e-flex e-con e-child\" data-id=\"f18227e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed1b0e0 elementor-widget elementor-widget-text-editor\" data-id=\"ed1b0e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 class=\" translation-block\"><strong>Objective of the compliance assessment<\/strong><\/h3><h3>\u00a0<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a73cb5a e-con-full e-flex e-con e-child\" data-id=\"a73cb5a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65a2d6b elementor-widget elementor-widget-text-editor\" data-id=\"65a2d6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>The cybersecurity conformity assessment of artificial intelligences allows you to verify that your artificial intelligence implementations comply with best practices and security requirements.<\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73d5f35 e-con-full e-flex e-con e-child\" data-id=\"73d5f35\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62997f5 elementor-widget elementor-widget-text-editor\" data-id=\"62997f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Compliance assessment: <\/strong>Artificial Intelligence Cybersecurity<\/h4><h4><strong>Frameworks:<\/strong><\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e2ef3a e-con-full e-flex e-con e-child\" data-id=\"6e2ef3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6755b9a elementor-widget elementor-widget-htmega-datatable-addons\" data-id=\"6755b9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"htmega-datatable-addons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"htmega-table-style htmega-table-style-1 htb-table-responsive\">\n            <table class=\"htb-table\">\n                                <tbody>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-f6144c9\" >Test Plan<\/td><td class=\"elementor-repeater-item-1bd3910\" >CLR.PRO.037.PTIA<\/td>                        <\/tr>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-12a356f\" >Norm or Referential<\/td><td class=\"elementor-repeater-item-4a7f7bc\" >EN 17640<\/td>                        <\/tr>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-a480488\" >Application Profile<\/td><td class=\"elementor-repeater-item-89d5835\" >AI based on the requirements of CEN JTC21 N196<\/td>                        <\/tr>\n                                            <tr>\n                            <td class=\"elementor-repeater-item-18eb015\" >Evaluation methodology<\/td><td class=\"elementor-repeater-item-1e55afb\" >EN 17640<\/td>                        <\/tr>\n                                    <\/tbody>\n            <\/table>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Objectif de l&lsquo;\u00e9valuation de conformit\u00e9 \u00a0 L&rsquo;\u00e9valuation de conformit\u00e9 de cybers\u00e9curit\u00e9 des intelligences artificielles vous permet de v\u00e9rifier que vos impl\u00e9mentations d\u2019intelligence artificielle sont bien conformes aux bonnes pratiques et aux exigences de s\u00e9curit\u00e9. \u00c9valuation de conformit\u00e9 : Cybers\u00e9curit\u00e9 des Intelligences Artificielles R\u00e9f\u00e9rentiels : Plan de test CLR.PRO.037.PTIA Norme ou Referentiel EN 17640 Application Profile&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/cabinet-louis-reynaud.eu\/en\/cybersecurite-des-intelligences-artificielles\/\">Read more<\/a><\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-69","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/pages\/69","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/comments?post=69"}],"version-history":[{"count":23,"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/pages\/69\/revisions"}],"predecessor-version":[{"id":1289,"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/pages\/69\/revisions\/1289"}],"wp:attachment":[{"href":"https:\/\/cabinet-louis-reynaud.eu\/en\/wp-json\/wp\/v2\/media?parent=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}