{"id":3655,"date":"2022-07-04T14:10:55","date_gmt":"2022-07-04T14:10:55","guid":{"rendered":"https:\/\/locaterisk.com\/?p=3655"},"modified":"2025-08-08T07:27:58","modified_gmt":"2025-08-08T07:27:58","slug":"__lieferkettengesetz","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/fr\/__lieferkettengesetz\/","title":{"rendered":"S\u00e9curit\u00e9 informatique et loi sur la cha\u00eene d'approvisionnement : ce qu'il faut faire maintenant"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Retour au blog                <a href=\"https:\/\/locaterisk.com\/fr\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\"><strong><strong>la s\u00e9curit\u00e9 informatique et la loi sur la cha\u00eene d'approvisionnement :<br>Ce qu'il faut faire maintenant<\/strong><\/strong><\/h1>\r\n            <p class=\"paragraph\">La loi sur la cha\u00eene d'approvisionnement oblige les entreprises ( &gt; 3.000 collaborateurs \u00e0 partir du 1.01.2023, &gt; 1.000 collaborateurs \u00e0 partir du 1.01.2024) \u00e0 prouver qu'elles g\u00e8rent leurs activit\u00e9s de mani\u00e8re durable et socialement \u00e9quitable. Cela comprend aussi bien la propre organisation que ses participations ainsi que les fournisseurs et sous-traitants. En bref : l'ensemble de la cha\u00eene d'approvisionnement dans le monde entier. En commen\u00e7ant par l'extraction des mati\u00e8res premi\u00e8res jusqu'\u00e0 la livraison des produits. <br><br>Les achats et la gestion de la conformit\u00e9 sont plus que jamais appel\u00e9s \u00e0 contr\u00f4ler en permanence les risques globaux des fournisseurs. Le syst\u00e8me de surveillance de la s\u00e9curit\u00e9 LocateRisk permet d\u00e9j\u00e0 d'y parvenir facilement dans le domaine de la s\u00e9curit\u00e9 informatique. Les analyses effectu\u00e9es de mani\u00e8re automatis\u00e9e enregistrent, \u00e9valuent et documentent en permanence la situation de s\u00e9curit\u00e9 informatique externe de chaque organisation et fournissent des recommandations d'action pour r\u00e9duire rapidement les risques. Cela assure la transparence dans la cha\u00eene d'approvisionnement, \u00e9conomise des ressources et contribue \u00e0 un approvisionnement sans faille.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"534\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz-1024x534.png\" alt=\"\" class=\"wp-image-3658\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz-1024x534.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz-300x156.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz-768x400.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz-18x9.png 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Qu'attend-on exactement des entreprises dans le cadre de la loi sur la cha\u00eene d'approvisionnement ?<\/h3>\n\n\n\n<p>Bien s\u00fbr, les entreprises ne peuvent pas \u00eatre tenues responsables de tous les risques potentiels dans la cha\u00eene d'approvisionnement. Mais on attend d'elles qu'elles connaissent les risques de leurs fournisseurs  et qu'elles s'efforcent de prendre des mesures qui contribuent \u00e0 am\u00e9liorer le respect des normes de conformit\u00e9. Ces efforts doivent \u00eatre d\u00e9montr\u00e9s.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Loi sur la cha\u00eene d'approvisionnement - qu'est-ce que cela signifie en termes de s\u00e9curit\u00e9 informatique ?<\/strong><\/h3>\n\n\n\n<p>Dans le cadre de la nouvelle loi sur la cha\u00eene d'approvisionnement, ceux qui ne l'ont pas encore fait devraient \u00e9galement se pencher sur la question de la s\u00e9curit\u00e9 informatique dans la cha\u00eene d'approvisionnement. La collaboration entre les entreprises, les fournisseurs et les prestataires de services repose sur le partage de donn\u00e9es \u00e0 caract\u00e8re personnel. Cela exige de tous les participants l'ouverture de leur propre r\u00e9seau \u00e0 des acc\u00e8s externes. Il convient de les s\u00e9curiser de mani\u00e8re ad\u00e9quate afin de minimiser les cyberattaques via les acc\u00e8s et les pertes de donn\u00e9es qui en r\u00e9sultent ainsi que les risques de panne.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><b><strong><strong><strong>Pourquoi les attaques via la cha\u00eene d'approvisionnement sont-elles si mena\u00e7antes ?<\/strong><\/strong><\/strong><\/b><\/h3>\n\n\n\n<p>Si des cybercriminels parviennent \u00e0 compromettre un prestataire de services ou un fournisseur, il existe un risque de r\u00e9action en cha\u00eene avec des cons\u00e9quences incalculables sur la cha\u00eene d'approvisionnement. Un exemple connu d'un tel cas est l'attaque contre le prestataire de services informatiques am\u00e9ricain Kaseya. En exploitant une faille, les pirates ont r\u00e9ussi \u00e0 crypter les donn\u00e9es de centaines d'entreprises aux \u00c9tats-Unis, en Allemagne et en Su\u00e8de. L'attaque contre le prestataire de services informatiques du fournisseur d'\u00e9nergie Entega de Darmstadt est un peu plus petite, mais tr\u00e8s actuelle. L'attaque par ransomware a touch\u00e9 d'un seul coup non seulement Entega mais aussi plusieurs clients, dont le groupe d'\u00e9limination et de service de Francfort (FES), les services municipaux de Mayence, Heag Holding en tant que groupe des entreprises municipales de Darmstadt, Bauverein AG en tant qu'entreprise immobili\u00e8re de la ville, l'entreprise propre de Darmstadt pour les t\u00e2ches et services municipaux (EAD) ainsi que plusieurs communes de l'Odenwald. Les infrastructures critiques n'ont certes pas \u00e9t\u00e9 touch\u00e9es, mais les pages d'accueil n'\u00e9taient plus accessibles et de nombreux services en ligne ont \u00e9t\u00e9 fortement limit\u00e9s. En outre, des milliers d'employ\u00e9s n'ont pas pu acc\u00e9der \u00e0 leurs comptes de messagerie.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Comment le monitoring de la s\u00e9curit\u00e9 informatique aide \u00e0 minimiser les risques<\/strong><\/h3>\n\n\n\n<p>La surface d'attaque informatique externe des entreprises augmente et \u00e9volue en permanence. Il n'est plus possible de surveiller les infrastructures complexes de mani\u00e8re manuelle. Parall\u00e8lement, des r\u00e9glementations telles que l'IT Sig 2.0 et le RGPD de l'UE obligent \u00e0 am\u00e9liorer en permanence le niveau de s\u00e9curit\u00e9. Il faut s'attendre \u00e0 ce que cela devienne \u00e9galement pertinent dans le cadre de la loi sur la cha\u00eene d'approvisionnement.<\/p>\n\n\n\n<p>Les analyses de s\u00e9curit\u00e9 informatique automatis\u00e9es de LocateRisk aident d\u00e9j\u00e0 de nombreuses entreprises et institutions \u00e0 minimiser syst\u00e9matiquement les risques. Elles consolident les donn\u00e9es de centaines de sources dans un rapport de risques hi\u00e9rarchis\u00e9 en fonction de la criticit\u00e9. Les responsables voient d'un coup d'\u0153il o\u00f9 en est la situation de la s\u00e9curit\u00e9 informatique des partenaires commerciaux et des fournisseurs, peuvent attribuer directement des t\u00e2ches et en d\u00e9duire des d\u00e9cisions. Pour une gestion centralis\u00e9e, la solution peut \u00eatre connect\u00e9e \u00e0 diff\u00e9rentes plateformes de surveillance et de reporting telles que Jira, Splunk, etc.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Avec le monitoring de la s\u00e9curit\u00e9 informatique, vous pouvez :<\/strong><\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Contr\u00f4ler, \u00e9valuer et comparer la s\u00e9curit\u00e9 informatique de milliers d'entreprises en m\u00eame temps<\/li>\n\n\n\n<li>D\u00e9montrer le respect des exigences sectorielles et de conformit\u00e9 dans l'approvisionnement<\/li>\n\n\n\n<li>Documenter les mesures et les activit\u00e9s de r\u00e9duction des risques dans le cadre de la loi sur la cha\u00eene d'approvisionnement<\/li>\n\n\n\n<li>Acc\u00e9l\u00e9rer le processus de gestion des risques des partenaires commerciaux<\/li>\n\n\n\n<li>\u00c9conomiser du temps et des ressources humaines gr\u00e2ce \u00e0 des audits automatis\u00e9s<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Analyses de s\u00e9curit\u00e9 informatique pour la gestion des risques des partenaires commerciaux<\/h3>\n\n\n\n<p>Lire maintenant :&nbsp;<a href=\"https:\/\/locaterisk.com\/fr\/landing\/geschaftspartner-risikomanagement\/\">Audit de s\u00e9curit\u00e9 automatis\u00e9 chez les fournisseurs<\/a><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"__lieferkettengesetz\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">Je suis d'accord avec la politique de confidentialit\u00e9<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Demander une d\u00e9mo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>La durabilit\u00e9 et les droits de l'homme sont au c\u0153ur de la loi sur la cha\u00eene d'approvisionnement. Mais le th\u00e8me de la cybers\u00e9curit\u00e9 devient \u00e9galement pertinent. D\u00e9couvrez ce que vous pouvez faire d\u00e8s aujourd'hui.<\/p>","protected":false},"author":8,"featured_media":3658,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[4,27],"class_list":["post-3655","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-it-sicherheit","tag-lieferkettengesetz"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist - LocateRisk<\/title>\n<meta name=\"description\" content=\"Im Fokus des neuen Lieferkettengesetzes stehen Nachhaltigkeit und Menschenrechte. Doch auch das Thema IT-Sicherheit ist relevant. Erfahren Sie, was Sie heute schon tun k\u00f6nnen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/__lieferkettengesetz\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Im Fokus des neuen Lieferkettengesetzes stehen Nachhaltigkeit und Menschenrechte. Doch auch das Thema IT-Sicherheit ist relevant. Erfahren Sie, was Sie heute schon tun k\u00f6nnen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/__lieferkettengesetz\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-04T14:10:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:27:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist\",\"datePublished\":\"2022-07-04T14:10:55+00:00\",\"dateModified\":\"2025-08-08T07:27:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/\"},\"wordCount\":671,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Visualisierung-Lieferkettengesetz.png\",\"keywords\":[\"IT-Sicherheit\",\"Lieferkettengesetz\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/\",\"name\":\"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Visualisierung-Lieferkettengesetz.png\",\"datePublished\":\"2022-07-04T14:10:55+00:00\",\"dateModified\":\"2025-08-08T07:27:58+00:00\",\"description\":\"Im Fokus des neuen Lieferkettengesetzes stehen Nachhaltigkeit und Menschenrechte. Doch auch das Thema IT-Sicherheit ist relevant. Erfahren Sie, was Sie heute schon tun k\u00f6nnen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Visualisierung-Lieferkettengesetz.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Visualisierung-Lieferkettengesetz.png\",\"width\":1080,\"height\":563,\"caption\":\"Photo Shutterstock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/__lieferkettengesetz\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 informatique et loi sur la cha\u00eene d'approvisionnement : ce qu'il faut faire maintenant - LocateRisk","description":"La durabilit\u00e9 et les droits de l'homme sont au c\u0153ur de la nouvelle loi sur la cha\u00eene d'approvisionnement. Mais le th\u00e8me de la s\u00e9curit\u00e9 informatique est \u00e9galement pertinent. D\u00e9couvrez ce que vous pouvez faire d\u00e8s aujourd'hui.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/__lieferkettengesetz\/","og_locale":"fr_FR","og_type":"article","og_title":"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist - LocateRisk","og_description":"Im Fokus des neuen Lieferkettengesetzes stehen Nachhaltigkeit und Menschenrechte. Doch auch das Thema IT-Sicherheit ist relevant. Erfahren Sie, was Sie heute schon tun k\u00f6nnen.","og_url":"https:\/\/locaterisk.com\/fr\/__lieferkettengesetz\/","og_site_name":"LocateRisk","article_published_time":"2022-07-04T14:10:55+00:00","article_modified_time":"2025-08-08T07:27:58+00:00","og_image":[{"width":1080,"height":563,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Kristina Breuer","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist","datePublished":"2022-07-04T14:10:55+00:00","dateModified":"2025-08-08T07:27:58+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/"},"wordCount":671,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png","keywords":["IT-Sicherheit","Lieferkettengesetz"],"articleSection":["Blog post"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/","url":"https:\/\/locaterisk.com\/__lieferkettengesetz\/","name":"S\u00e9curit\u00e9 informatique et loi sur la cha\u00eene d'approvisionnement : ce qu'il faut faire maintenant - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png","datePublished":"2022-07-04T14:10:55+00:00","dateModified":"2025-08-08T07:27:58+00:00","description":"La durabilit\u00e9 et les droits de l'homme sont au c\u0153ur de la nouvelle loi sur la cha\u00eene d'approvisionnement. Mais le th\u00e8me de la s\u00e9curit\u00e9 informatique est \u00e9galement pertinent. D\u00e9couvrez ce que vous pouvez faire d\u00e8s aujourd'hui.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/__lieferkettengesetz\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/07\/Visualisierung-Lieferkettengesetz.png","width":1080,"height":563,"caption":"Photo Shutterstock"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/__lieferkettengesetz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"IT-Sicherheit und das Lieferkettengesetz: Was jetzt zu tun ist"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/3655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=3655"}],"version-history":[{"count":29,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/3655\/revisions"}],"predecessor-version":[{"id":6310,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/3655\/revisions\/6310"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media\/3658"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=3655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/categories?post=3655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/tags?post=3655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}