{"id":4277,"date":"2026-01-28T07:37:54","date_gmt":"2026-01-28T07:37:54","guid":{"rendered":"https:\/\/fortil.group\/?p=4277"},"modified":"2026-01-28T13:55:17","modified_gmt":"2026-01-28T13:55:17","slug":"protection-donnees-controle","status":"publish","type":"post","link":"https:\/\/fortil.group\/fr\/2026\/01\/28\/protection-donnees-controle\/","title":{"rendered":"Protection des donn\u00e9es en 2026 : reprendre le contr\u00f4le face aux nouveaux risques"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4277\" class=\"elementor elementor-4277\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0eb2074 e-con-full e-flex e-con e-parent\" data-id=\"0eb2074\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8dabf2a elementor-align-left elementor-widget-mobile__width-initial elementor-widget elementor-widget-post-info\" data-id=\"8dabf2a\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-706ba37 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/fortil.group\/fr\/category\/transformation-digitale\/\" class=\"elementor-post-info__terms-list-item\">Digital Transformation<\/a>, <a href=\"https:\/\/fortil.group\/fr\/category\/insight\/\" class=\"elementor-post-info__terms-list-item\">Insight<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9aef88 elementor-widget__width-initial elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"c9aef88\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Data protection in 2026: regaining control against emerging risks<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7abec99 e-flex e-con-boxed e-con e-parent\" data-id=\"7abec99\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9037cfb e-con-full e-flex e-con e-child\" data-id=\"9037cfb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6644bf1 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6644bf1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"340\" data-end=\"631\">In 2026, protecting sensitive data is no longer just about defending against cyberattacks. For organizations, the challenge now also lies in ensuring that their data is not exploited, intentionally or unintentionally, by external artificial intelligence systems, without control or visibility.<\/p><p data-start=\"633\" data-end=\"785\">Data protection starts with a simple but often overlooked question:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66d91ce elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"66d91ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"673\" data-end=\"1068\">Do you know what data your employees share every day with generative AI tools?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a50070 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"4a50070\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"787\" data-end=\"968\">Today, it is no longer relevant to ask whether employees use generative AI. Numerous studies and surveys have already shown that these tools are widely adopted across organizations.<\/p><p data-start=\"970\" data-end=\"1101\">The real issue lies elsewhere:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2057209 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"2057209\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"673\" data-end=\"1068\">What types of data are being used, through which AI solutions, and with what level of control?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6495793 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6495793\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"970\" data-end=\"1101\">In this article, we share our engineering-driven vision: how to regain control over your data, implement proportionate security measures, and turn cybersecurity constraints into strategic business decisions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f528f1b e-flex e-con-boxed e-con e-parent\" data-id=\"f528f1b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa560e2 elementor-align-center elementor-widget-mobile__width-initial elementor-widget elementor-widget-button\" data-id=\"fa560e2\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjI1MTEiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact an expert about your project<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b75a869 e-flex e-con-boxed e-con e-parent\" data-id=\"b75a869\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-97542a1 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"97542a1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data leakage: a silent but critical risk<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef0fef2 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ef0fef2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1515\" data-end=\"1663\">At a time when data leaks have become a goldmine for attackers\u2014and in an increasingly tense geopolitical context\u2014data control is no longer optional.<\/p><p data-start=\"1665\" data-end=\"1904\">An effective data protection strategy can no longer be limited to securing internal systems alone. It must also address data leakage risks across the entire corporate ecosystem, particularly in relationships with third parties and vendors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2fb4fca e-flex e-con-boxed e-con e-parent\" data-id=\"2fb4fca\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a3b7a5 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"5a3b7a5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data identification: the foundation of any security strategy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b27e519 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b27e519\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1976\" data-end=\"2052\">Regaining control starts with a fundamental step: identifying your data.<\/p><p data-start=\"2054\" data-end=\"2270\">Data mapping is the cornerstone not only of data protection, but of all future cybersecurity initiatives. The more accurate the data inventory, the easier it becomes to apply relevant and effective security controls.<\/p><p data-start=\"2272\" data-end=\"2440\">The goal is not to be exhaustive from day one. A pragmatic approach is recommended: work by data category and iterate over time, start simple, then progressively refine.<\/p><p data-start=\"2272\" data-end=\"2440\"><span class=\"TextRun SCXO210359722 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXO210359722 BCX0\">For each type of data, this process can be structured along three core dimensions:<\/span><\/span><span class=\"EOP SCXO210359722 BCX0\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5fe9e58 e-flex e-con-boxed e-con e-parent\" data-id=\"5fe9e58\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-39c31b0 e-con-full e-flex e-con e-child\" data-id=\"39c31b0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13d1d76 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"13d1d76\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1976\" data-end=\"2052\">Storage<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2697a76 elementor-widget-tablet__width-initial elementor-widget__width-initial elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"2697a76\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Is the data stored internally or externally?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What security measures are in place?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Do contracts adequately cover the identified risks?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-298964d e-con-full e-flex e-con e-child\" data-id=\"298964d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86333fd elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"86333fd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1976\" data-end=\"2052\">Processing<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71554fe elementor-widget-tablet__width-initial elementor-widget__width-initial elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"71554fe\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">How is the data used?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Is processing handled internally or by third parties?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Are security levels aligned with data sensitivity?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26bccca e-con-full e-flex e-con e-child\" data-id=\"26bccca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3329324 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3329324\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1976\" data-end=\"2052\">Data Flows<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01e095e elementor-widget-tablet__width-initial elementor-widget__width-initial elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"01e095e\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Where does the data circulate?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Which data flows are essential to business operations?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Which flows are unnecessary or insufficiently controlled?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e96a9af e-flex e-con-boxed e-con e-parent\" data-id=\"e96a9af\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64bfe48 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"64bfe48\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proportionate security and strategic choices<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93512e1 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"93512e1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3047\" data-end=\"3165\">Once visibility is established, the challenge is to align security measures with the organization\u2019s actual risk level.<\/p><p data-start=\"3167\" data-end=\"3248\">For example, relying on a software vendor is not inherently risky. It depends on:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0e1799 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a0e1799\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The industry sector<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The nature of the data involved<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Regulatory requirements<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">And above all, the defined security strategy and the vendor\u2019s own security practices<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f46fde elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5f46fde\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3047\" data-end=\"3165\">That said, organizations must always retain control over their data security, either by contractually enforcing third-party accountability or by strengthening their own security mechanisms.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a053462 e-flex e-con-boxed e-con e-parent\" data-id=\"a053462\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d8284c6 e-con-full e-flex e-con e-child\" data-id=\"d8284c6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a904d23 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"a904d23\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Shadow AI: choosing strategy over reaction<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15f6cc8 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"15f6cc8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3661\" data-end=\"3730\">The rise of Shadow AI perfectly illustrates these new challenges.<\/p><p data-start=\"3732\" data-end=\"3922\">The first step is to identify real, and often invisible, uses of generative AI within the organization. Once this reality is acknowledged, several strategic options can be considered, such as:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b9b902 elementor-widget-tablet__width-initial elementor-widget__width-initial elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"3b9b902\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Subscribing to enterprise-grade generative AI solutions with contractual safeguards<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Deploying and operating an internal generative AI architecture<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prohibiting the use of public AI tools without an enterprise license<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implementing technical architectures to control outbound data flows to public AI platforms<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Defining clear rules on which types of data are authorized or prohibited<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4c8428 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"d4c8428\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3661\" data-end=\"3730\">The key is not to endure uncontrolled AI usage, but to define and implement a clear strategy to prevent sensitive data leaks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8b5e57 e-con-full e-flex e-con e-child\" data-id=\"e8b5e57\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ceaee6c e-flex e-con-boxed e-con e-parent\" data-id=\"ceaee6c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fd84f6 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3fd84f6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The human factor: a critical lever<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50c4bc5 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"50c4bc5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"4489\" data-end=\"4556\">As with any security initiative, success largely depends on people.<\/p><p data-start=\"4558\" data-end=\"4607\">Organizations must support these changes through:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4903b7 elementor-widget-tablet__width-initial elementor-widget__width-initial elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b4903b7\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Progressive awareness of data-related risks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Regular security awareness initiatives<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Training programs tailored to specific roles and use cases<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5773a62 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5773a62\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3661\" data-end=\"3730\">The objective is not to ban usage, but to enable responsible, controlled, and secure use of company data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3df71b7 e-grid e-con-boxed e-con e-parent\" data-id=\"3df71b7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cd6ee57 e-con-full e-flex e-con e-child\" data-id=\"cd6ee57\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-479c3ee elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"479c3ee\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"4884\" data-end=\"5011\">Protecting data in 2026 means above all regaining control in an environment where practices evolve faster than regulations.<\/p><p data-start=\"5013\" data-end=\"5195\">Identify, decide, govern, and support, these are the essential levers for starting the year with greater confidence and a cybersecurity strategy truly aligned with today\u2019s challenges.<\/p><p data-start=\"5013\" data-end=\"5195\">We support you throughout your cybersecurity journey.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52f1166 elementor-align-center elementor-widget-mobile__width-initial elementor-widget elementor-widget-button\" data-id=\"52f1166\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjI1MTEiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact one of our experts<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-347f30f e-con-full e-flex e-con e-parent\" data-id=\"347f30f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b895ed8 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b895ed8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">More insights<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d19e1b0 elementor-widget__width-initial elementor-posts--align-left elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"d19e1b0\" data-element_type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-4277 post type-post status-publish format-standard has-post-thumbnail hentry category-digital-transformation category-insight\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/fortil.group\/fr\/2026\/01\/28\/protection-donnees-controle\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1-300x169.png\" class=\"attachment-medium size-medium wp-image-4284\" alt=\"\" srcset=\"https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1-300x169.png 300w, https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1-1024x576.png 1024w, https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1-768x432.png 768w, https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1-1536x864.png 1536w, https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1-18x10.png 18w, https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Digital Transformation<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h2 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/fortil.group\/fr\/2026\/01\/28\/protection-donnees-controle\/\" >\n\t\t\t\tData protection in 2026: regaining control against emerging risks\t\t\t<\/a>\n\t\t<\/h2>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/fortil.group\/fr\/2026\/01\/28\/protection-donnees-controle\/\" aria-label=\"En savoir plus sur Data protection in 2026: regaining control against emerging risks\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-4111 post type-post status-publish format-standard has-post-thumbnail hentry category-energy category-engineering-commissioning\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/fortil.group\/fr\/2026\/01\/08\/conception-gaine-echappement-turbine\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/fortil.group\/wp-content\/uploads\/2025\/08\/Waste-to-energy-plant-300x200.jpg\" class=\"attachment-medium size-medium wp-image-3428\" alt=\"\" srcset=\"https:\/\/fortil.group\/wp-content\/uploads\/2025\/08\/Waste-to-energy-plant-300x200.jpg 300w, https:\/\/fortil.group\/wp-content\/uploads\/2025\/08\/Waste-to-energy-plant-1024x682.jpg 1024w, https:\/\/fortil.group\/wp-content\/uploads\/2025\/08\/Waste-to-energy-plant-768x511.jpg 768w, https:\/\/fortil.group\/wp-content\/uploads\/2025\/08\/Waste-to-energy-plant-1536x1022.jpg 1536w, https:\/\/fortil.group\/wp-content\/uploads\/2025\/08\/Waste-to-energy-plant-18x12.jpg 18w, https:\/\/fortil.group\/wp-content\/uploads\/2025\/08\/Waste-to-energy-plant.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Energy<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h2 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/fortil.group\/fr\/2026\/01\/08\/conception-gaine-echappement-turbine\/\" >\n\t\t\t\tDesign of a Steam Turbine Exhaust Duct for a Waste-to-Energy Plant in Europe\t\t\t<\/a>\n\t\t<\/h2>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/fortil.group\/fr\/2026\/01\/08\/conception-gaine-echappement-turbine\/\" aria-label=\"En savoir plus sur Design of a Steam Turbine Exhaust Duct for a Waste-to-Energy Plant in Europe\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-625 post type-post status-publish format-standard has-post-thumbnail hentry category-digital-transformation category-finance\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/fortil.group\/fr\/2025\/02\/13\/mise-en-place-efront-mo-private-capital\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/fortil.group\/wp-content\/uploads\/2025\/02\/delivery-model-engineering-fortil-1-300x200.jpg\" class=\"attachment-medium size-medium wp-image-626\" alt=\"\" srcset=\"https:\/\/fortil.group\/wp-content\/uploads\/2025\/02\/delivery-model-engineering-fortil-1-300x200.jpg 300w, https:\/\/fortil.group\/wp-content\/uploads\/2025\/02\/delivery-model-engineering-fortil-1-1024x683.jpg 1024w, https:\/\/fortil.group\/wp-content\/uploads\/2025\/02\/delivery-model-engineering-fortil-1-768x512.jpg 768w, https:\/\/fortil.group\/wp-content\/uploads\/2025\/02\/delivery-model-engineering-fortil-1-1536x1025.jpg 1536w, https:\/\/fortil.group\/wp-content\/uploads\/2025\/02\/delivery-model-engineering-fortil-1-18x12.jpg 18w, https:\/\/fortil.group\/wp-content\/uploads\/2025\/02\/delivery-model-engineering-fortil-1.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Digital Transformation<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h2 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/fortil.group\/fr\/2025\/02\/13\/mise-en-place-efront-mo-private-capital\/\" >\n\t\t\t\teFront MO Implementation for Private Capital Management\t\t\t<\/a>\n\t\t<\/h2>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/fortil.group\/fr\/2025\/02\/13\/mise-en-place-efront-mo-private-capital\/\" aria-label=\"En savoir plus sur eFront MO Implementation for Private Capital Management\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d76a6b elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"6d76a6b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fortil.group\/fr\/insights\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-left\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back to all insights<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In 2026, protecting sensitive data is no longer just about defending against cyberattacks. For organizations, the challenge now also lies in ensuring that their data<\/p>","protected":false},"author":2,"featured_media":4284,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,20],"tags":[],"class_list":["post-4277","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-transformation","category-insight"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data protection in 2026: regaining control against emerging risks - fortil Group<\/title>\n<meta name=\"description\" content=\"Regain control of your data in 2026. Learn how to manage AI risks, prevent data leaks, and build a proportionate cybersecurity strategy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fortil.group\/fr\/2026\/01\/28\/protection-donnees-controle\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data protection in 2026: regaining control against emerging risks - fortil Group\" \/>\n<meta property=\"og:description\" content=\"Regain control of your data in 2026. Learn how to manage AI risks, prevent data leaks, and build a proportionate cybersecurity strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fortil.group\/fr\/2026\/01\/28\/protection-donnees-controle\/\" \/>\n<meta property=\"og:site_name\" content=\"fortil Group\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-28T07:37:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-28T13:55:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Josephine Bardin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Josephine Bardin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/\"},\"author\":{\"name\":\"Josephine Bardin\",\"@id\":\"https:\\\/\\\/fortil.group\\\/#\\\/schema\\\/person\\\/99fe2d7e2b72cbd8175357b364aaf4b4\"},\"headline\":\"Data protection in 2026: regaining control against emerging risks\",\"datePublished\":\"2026-01-28T07:37:54+00:00\",\"dateModified\":\"2026-01-28T13:55:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/\"},\"wordCount\":704,\"publisher\":{\"@id\":\"https:\\\/\\\/fortil.group\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fortil.group\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Cybersecurite-1920x1080-1.png\",\"articleSection\":[\"Digital Transformation\",\"Insight\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/\",\"url\":\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/\",\"name\":\"Data protection in 2026: regaining control against emerging risks - fortil Group\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fortil.group\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fortil.group\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Cybersecurite-1920x1080-1.png\",\"datePublished\":\"2026-01-28T07:37:54+00:00\",\"dateModified\":\"2026-01-28T13:55:17+00:00\",\"description\":\"Regain control of your data in 2026. Learn how to manage AI risks, prevent data leaks, and build a proportionate cybersecurity strategy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/#primaryimage\",\"url\":\"https:\\\/\\\/fortil.group\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Cybersecurite-1920x1080-1.png\",\"contentUrl\":\"https:\\\/\\\/fortil.group\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Cybersecurite-1920x1080-1.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fortil.group\\\/2026\\\/01\\\/28\\\/data-protection-regaining-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/fortil.group\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data protection in 2026: regaining control against emerging risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fortil.group\\\/#website\",\"url\":\"https:\\\/\\\/fortil.group\\\/\",\"name\":\"Fortil Group\",\"description\":\"fortil Group - Committed to sustainable performance\",\"publisher\":{\"@id\":\"https:\\\/\\\/fortil.group\\\/#organization\"},\"alternateName\":\"Fortil Group\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fortil.group\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fortil.group\\\/#organization\",\"name\":\"Fortil Group\",\"url\":\"https:\\\/\\\/fortil.group\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fortil.group\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/fortil.group\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cropped-Logo-Picto_Degrade.png\",\"contentUrl\":\"https:\\\/\\\/fortil.group\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cropped-Logo-Picto_Degrade.png\",\"width\":512,\"height\":512,\"caption\":\"Fortil Group\"},\"image\":{\"@id\":\"https:\\\/\\\/fortil.group\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fortil.group\\\/#\\\/schema\\\/person\\\/99fe2d7e2b72cbd8175357b364aaf4b4\",\"name\":\"Josephine Bardin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85a030e01bab4475615e7eda083afa7ecf887a1ac3abe3ae53232d619e4b5896?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85a030e01bab4475615e7eda083afa7ecf887a1ac3abe3ae53232d619e4b5896?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85a030e01bab4475615e7eda083afa7ecf887a1ac3abe3ae53232d619e4b5896?s=96&d=mm&r=g\",\"caption\":\"Josephine Bardin\"},\"url\":\"https:\\\/\\\/fortil.group\\\/fr\\\/author\\\/josephine-bardin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protection des donn\u00e9es en 2026 : reprendre le contr\u00f4le face aux nouveaux risques - fortil Group","description":"Reprenez le contr\u00f4le de vos donn\u00e9es en 2026. D\u00e9couvrez comment ma\u00eetriser les risques li\u00e9s \u00e0 l\u2019IA, pr\u00e9venir les fuites de donn\u00e9es et construire une strat\u00e9gie de cybers\u00e9curit\u00e9 proportionn\u00e9e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fortil.group\/fr\/2026\/01\/28\/protection-donnees-controle\/","og_locale":"fr_FR","og_type":"article","og_title":"Data protection in 2026: regaining control against emerging risks - fortil Group","og_description":"Regain control of your data in 2026. Learn how to manage AI risks, prevent data leaks, and build a proportionate cybersecurity strategy.","og_url":"https:\/\/fortil.group\/fr\/2026\/01\/28\/protection-donnees-controle\/","og_site_name":"fortil Group","article_published_time":"2026-01-28T07:37:54+00:00","article_modified_time":"2026-01-28T13:55:17+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1.png","type":"image\/png"}],"author":"Josephine Bardin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Josephine Bardin","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/#article","isPartOf":{"@id":"https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/"},"author":{"name":"Josephine Bardin","@id":"https:\/\/fortil.group\/#\/schema\/person\/99fe2d7e2b72cbd8175357b364aaf4b4"},"headline":"Data protection in 2026: regaining control against emerging risks","datePublished":"2026-01-28T07:37:54+00:00","dateModified":"2026-01-28T13:55:17+00:00","mainEntityOfPage":{"@id":"https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/"},"wordCount":704,"publisher":{"@id":"https:\/\/fortil.group\/#organization"},"image":{"@id":"https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/#primaryimage"},"thumbnailUrl":"https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1.png","articleSection":["Digital Transformation","Insight"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/","url":"https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/","name":"Protection des donn\u00e9es en 2026 : reprendre le contr\u00f4le face aux nouveaux risques - fortil Group","isPartOf":{"@id":"https:\/\/fortil.group\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/#primaryimage"},"image":{"@id":"https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/#primaryimage"},"thumbnailUrl":"https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1.png","datePublished":"2026-01-28T07:37:54+00:00","dateModified":"2026-01-28T13:55:17+00:00","description":"Reprenez le contr\u00f4le de vos donn\u00e9es en 2026. D\u00e9couvrez comment ma\u00eetriser les risques li\u00e9s \u00e0 l\u2019IA, pr\u00e9venir les fuites de donn\u00e9es et construire une strat\u00e9gie de cybers\u00e9curit\u00e9 proportionn\u00e9e.","breadcrumb":{"@id":"https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/#primaryimage","url":"https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1.png","contentUrl":"https:\/\/fortil.group\/wp-content\/uploads\/2026\/01\/Cybersecurite-1920x1080-1.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/fortil.group\/2026\/01\/28\/data-protection-regaining-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fortil.group\/"},{"@type":"ListItem","position":2,"name":"Data protection in 2026: regaining control against emerging risks"}]},{"@type":"WebSite","@id":"https:\/\/fortil.group\/#website","url":"https:\/\/fortil.group\/","name":"Fortil Group","description":"fortil Group - Committed to sustainable performance","publisher":{"@id":"https:\/\/fortil.group\/#organization"},"alternateName":"Fortil Group","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fortil.group\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fortil.group\/#organization","name":"Fortil Group","url":"https:\/\/fortil.group\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fortil.group\/#\/schema\/logo\/image\/","url":"https:\/\/fortil.group\/wp-content\/uploads\/2025\/05\/cropped-Logo-Picto_Degrade.png","contentUrl":"https:\/\/fortil.group\/wp-content\/uploads\/2025\/05\/cropped-Logo-Picto_Degrade.png","width":512,"height":512,"caption":"Fortil Group"},"image":{"@id":"https:\/\/fortil.group\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/fortil.group\/#\/schema\/person\/99fe2d7e2b72cbd8175357b364aaf4b4","name":"Josephine Bardin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/85a030e01bab4475615e7eda083afa7ecf887a1ac3abe3ae53232d619e4b5896?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/85a030e01bab4475615e7eda083afa7ecf887a1ac3abe3ae53232d619e4b5896?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85a030e01bab4475615e7eda083afa7ecf887a1ac3abe3ae53232d619e4b5896?s=96&d=mm&r=g","caption":"Josephine Bardin"},"url":"https:\/\/fortil.group\/fr\/author\/josephine-bardin\/"}]}},"_links":{"self":[{"href":"https:\/\/fortil.group\/fr\/wp-json\/wp\/v2\/posts\/4277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortil.group\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fortil.group\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fortil.group\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fortil.group\/fr\/wp-json\/wp\/v2\/comments?post=4277"}],"version-history":[{"count":65,"href":"https:\/\/fortil.group\/fr\/wp-json\/wp\/v2\/posts\/4277\/revisions"}],"predecessor-version":[{"id":4346,"href":"https:\/\/fortil.group\/fr\/wp-json\/wp\/v2\/posts\/4277\/revisions\/4346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortil.group\/fr\/wp-json\/wp\/v2\/media\/4284"}],"wp:attachment":[{"href":"https:\/\/fortil.group\/fr\/wp-json\/wp\/v2\/media?parent=4277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fortil.group\/fr\/wp-json\/wp\/v2\/categories?post=4277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fortil.group\/fr\/wp-json\/wp\/v2\/tags?post=4277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}