{"id":24271,"date":"2025-10-10T14:24:05","date_gmt":"2025-10-10T14:24:05","guid":{"rendered":"https:\/\/phelps:8890\/leadership-en-cybersecurite-votre-organisation-est-elle-a-la-hauteur\/"},"modified":"2026-01-07T21:00:55","modified_gmt":"2026-01-07T21:00:55","slug":"leadership-en-cybersecurite-votre-organisation-est-elle-a-la-hauteur","status":"publish","type":"post","link":"https:\/\/phelpsgroup.ca\/fr\/leadership-en-cybersecurite-votre-organisation-est-elle-a-la-hauteur\/","title":{"rendered":"Leadership en cybers\u00e9curit\u00e9&nbsp;: votre organisation est-elle \u00e0 la hauteur&nbsp;?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24271\" class=\"elementor elementor-24271 elementor-23401\">\n\t\t\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-d213f0c elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible\" data-id=\"d213f0c\" data-element_type=\"section\" data-e-type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default \">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-49e586e pxl-column-none pxl-column-overflow-hidden-no pxl-column-line-no\" data-id=\"49e586e\" data-element_type=\"column\" data-e-type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-0b95195 elementor-widget elementor-widget-pxl_heading\" data-id=\"0b95195\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div id=\"pxl-pxl_heading-0b95195-7580\" class=\"pxl-heading px-sub-title-default-style \">\n\t<div class=\"pxl-heading--inner\">\n\t\t\n\t\t<h3 class=\"pxl-item--title style-default ft-gt highlight-default \" data-wow-delay=\"ms\">\n\t\t\t\t\t\t\tCybersecurity Leadership: Does Your Organization Measure Up?\t\n\t\t\t\t\n\t\t<\/h3>\n\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85c21b8 elementor-widget elementor-widget-pxl_image\" data-id=\"85c21b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl_image-85c21b8-6080\" class=\"pxl-image-single df pxl-disable-parallax-sm pxl-hide-sr-lg  \" data-wow-delay=\"ms\"  >\r\n    <div class=\"pxl-item--inner\" data-wow-delay=\"120ms\">\r\n        \r\n                    <div class=\"pxl-item--image df\" data-parallax-value=\"\">\r\n                                <img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1650\" src=\"https:\/\/phelpsgroup.ca\/wp-content\/uploads\/2025\/10\/getty-images-ltpb_WinC3Y-unsplash-scaled.jpg\" class=\"no-lazyload attachment-full\" alt=\"- Phelps Canada\" title=\"| Phelps Canada\">                                            <\/div>\r\n                \r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a43e445 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"a43e445\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p><strong>5 key traits to look for when recruiting for cybersecurity leadership<\/strong><\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36afa02 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"36afa02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>It\u2019s a scene familiar to too many organizational leaders: It\u2019s Sunday evening. You\u2019re<br \/>settling in with the family after dinner, prepared for an evening of relaxation before the<br \/>grind of another week begins. Suddenly your smartphone pings with a calendar<br \/>invitation. Subject line: Vendor Security Breach Briefing. Scheduled for 8 a.m. Monday.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb25385 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"bb25385\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>The breach? It\u2019s been traced back to a third-party vendor your organization works with.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f154ff elementor-widget elementor-widget-pxl_text_editor\" data-id=\"1f154ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>Your stomach drops.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2610fe elementor-widget elementor-widget-pxl_text_editor\" data-id=\"c2610fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>No details. No context. Just the unsettling implication that something has gone terribly<br \/>wrong. What\u2019s been compromised? Who\u2019s affected? How bad is it? Sleep won\u2019t come<br \/>easy tonight.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21ef9f2 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"21ef9f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>No details. No context. Just the unsettling implication that something has gone terribly<br \/>wrong. What\u2019s been compromised? Who\u2019s affected? How bad is it? Sleep won\u2019t come<br \/>easy tonight.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1665cf1 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"1665cf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>It\u2019s become a daily headline, another company, another breach. From global enterprises<br \/>to small startups, no one is immune. What\u2019s most alarming is that many of these<br \/>organizations already had comprehensive security plans in place. They invested in<br \/>tools, trained their teams, and followed compliance protocols. And yet, still, they were<br \/>breached.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a52071 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"0a52071\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>Cybersecurity isn\u2019t just a technical function or a compliance checkbox; it\u2019s a cultural<br \/>imperative. And culture starts at the top.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7e7def elementor-widget elementor-widget-pxl_image\" data-id=\"f7e7def\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl_image-f7e7def-1159\" class=\"pxl-image-single df pxl-disable-parallax-sm pxl-hide-sr-lg  \" data-wow-delay=\"ms\"  >\r\n    <div class=\"pxl-item--inner\" data-wow-delay=\"120ms\">\r\n        \r\n                    <div class=\"pxl-item--image df\" data-parallax-value=\"\">\r\n                                <img decoding=\"async\" width=\"1024\" height=\"820\" src=\"https:\/\/phelpsgroup.ca\/wp-content\/uploads\/2025\/10\/CarmiLevy.jpg\" class=\"no-lazyload attachment-full\" alt=\"- Phelps Canada\" title=\"| Phelps Canada\">                                            <\/div>\r\n                \r\n    <\/div>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3064513 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"3064513\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>Carmi Levy is a Canadian technology analyst and journalist and often speaks about the<br \/>importance of leadership-driven security awareness. \u201cToo many organizations still treat<br \/>cybersecurity as the domain of IT, disconnected from leadership strategy,\u201d he says. \u201cBut<br \/>in today\u2019s threat landscape, that mindset is dangerously outdated and won\u2019t on its own<br \/>keep the bad guys out. Building a resilient security culture requires a leader who doesn\u2019t<br \/>just understand the tech, but who can embed security into the very DNA of the<br \/>organization.\u201d<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-199ac70 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"199ac70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>\u201cLeadership-driven security awareness is no longer a \u2018nice to have\u2019. It\u2019s a business-<br \/>critical skill set,\u201d he adds. \u201cThe ability to protect brand trust, customer data, and<br \/>operational continuity hinges on whether your leaders can champion security as a<br \/>shared responsibility.\u201d<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-656f483 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"656f483\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>Levy suggests organizations look for the following key traits when evaluating leadership<br \/>candidates to ensure everyone around the c-suite table aligns with a cybersecurity-first<br \/>culture.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33e6ab3 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"33e6ab3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p><strong>1 &#8211; Communication and Connection<\/strong><\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edb6bce elementor-widget elementor-widget-pxl_text_editor\" data-id=\"edb6bce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>Strong cybersecurity leaders don\u2019t just communicate, they know how to connect. They<br \/>know how to speak to executives and staff in ways that resonate. But it\u2019s not just about<br \/>talking; it\u2019s about earning trust, influencing decisions, and navigating the politics of<br \/>change in a fast-moving environment.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53a95d4 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"53a95d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p><strong>2 &#8211; Business Knowledge<\/strong><\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a34cde9 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"a34cde9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>Great cybersecurity leaders go beyond technical expertise; they understand the<br \/>business and its strategic goals. Their true value lies in translating complex technical<br \/>issues into language that business stakeholders understand and can relate to.<br \/>Too often, technical practitioners equate technical problems directly to risk, leaving<br \/>decision-makers confused. Leaders play a critical role in bridging that gap by adjusting<br \/>both the language and the message to ensure clarity and relevance. A strong technical<br \/>understanding enables cybersecurity leaders to challenge assumptions, validate<br \/>solutions, and maintain credibility with their teams.<br \/>It&amp;#39;s not about being the most technical person in the room, however. It&amp;#39;s about knowing<br \/>enough to ask the right questions and recognize when something doesn\u2019t add up.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6c2a86 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"c6c2a86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p><strong>3 &#8211; Organizational Agility<\/strong><\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d055d1 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"1d055d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>Cybersecurity leaders don\u2019t just view IT as a service; they see it as a strategic partner.<br \/>Their strength lies in understanding how systems fit together and having the strategies<br \/>and playbooks ready to respond when incidents occur.<br \/>It\u2019s not about knowing how to build every system; it\u2019s about being prepared to lead<br \/>through disruption. They also bring the leadership presence needed to rally cross-<br \/>functional teams and drive coordinated action.<br \/>While everyone plays a role in managing risk, accountability must be clearly defined: the<br \/>business owns the risk, and the broader organization is responsible for supporting its<br \/>management.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5150e93 elementor-widget elementor-widget-pxl_text_editor\" data-id=\"5150e93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p><strong>4 &#8211; Cybersecurity Competency<\/strong><\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58a63fc elementor-widget elementor-widget-pxl_text_editor\" data-id=\"58a63fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>Yes, leaders need business savvy, but they also need to walk the walk technically. It\u2019s<br \/>not enough to be fluent in compliance. True resilience comes from a layered approach<br \/>to protection, supported by proper controls and checks and balances.<br \/>Security is not the same as compliance; it requires a deeper understanding of how<br \/>systems operate and how risks manifest in real-world environments.<br \/>Effective leaders don\u2019t need to build the systems themselves, but they must understand<br \/>how those systems fit together and how to assess their integrity. This technical foundation enables them to challenge assumptions, validate strategies, and lead with<br \/>confidence in both routine operations and crisis scenarios.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-717466a elementor-widget elementor-widget-pxl_text_editor\" data-id=\"717466a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p><strong>5 &#8211; Strategic Vision<\/strong><\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc7c01b elementor-widget elementor-widget-pxl_text_editor\" data-id=\"cc7c01b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p>Vision is great, but execution is everything. Strong leaders can set priorities and position<br \/>cybersecurity as an enabler of business success. But they also know how to navigate<br \/>real-world business challenges like budgets and reporting lines.<br \/>Because without execution, even the best vision falls flat.<br \/><strong>It\u2019s about what you know. And at Phelps, it\u2019s about who WE know.<\/strong> Connect with us<br \/>today to discover how we can help secure top-tier cybersecurity leadership helping your<br \/>organization be future ready.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3257fc elementor-widget elementor-widget-pxl_text_editor\" data-id=\"d3257fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner  \" data-wow-delay=\"ms\">\n\t\t<p><span data-contrast=\"auto\">The Phelps team is composed of seasoned consultants, researchers, marketers, and leadership advisors who combine deep sector knowledge with a rigorous, value-driven approach to executive search. The firm is committed to aligning vision, values, and agility to spark transformative impact, ensuring that every leadership placement is not only a strategic fit but a catalyst for organizational excellence.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Whether guiding succession planning, conducting board-level searches, or advising on leadership development, Phelps continues to set the standard for executive search across Canada.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-bae373b elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible\" data-id=\"bae373b\" data-element_type=\"section\" data-e-type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default \">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-417e6d2 pxl-column-none pxl-column-overflow-hidden-no pxl-column-line-no\" data-id=\"417e6d2\" data-element_type=\"column\" data-e-type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-820c13f elementor-align-center elementor-widget elementor-widget-pxl_button\" data-id=\"820c13f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"pxl_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl-pxl_button-820c13f-2603\" class=\"pxl-button pxl-atc-link \" data-wow-delay=\"ms\">\r\n    <a href=\"\/fr\/parlons-talent\/\" class=\"btn pxl-icon-active  btn-default  inline pxl-icon--left\" data-wow-delay=\"ms\" data-target=\".pxl-page-popup-template-0\">\r\n                <span class=\"pxl--btn-text\" data-text=\" Parlons talent\">\r\n             Parlons talent        <\/span>\r\n            <\/a>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Leadership en cybers\u00e9curit\u00e9 : votre organisation est-elle \u00e0 la hauteur? 5 qualit\u00e9s essentielles \u00e0 rechercher lors du recrutement de leaders encybers\u00e9curit\u00e9 C\u2019est une sc\u00e8ne trop famili\u00e8re pour de nombreux dirigeants : un dimanche soir, vousvous d\u00e9tendez en famille apr\u00e8s le souper, pr\u00eat pour une soir\u00e9e tranquille avant le d\u00e9butd\u2019une nouvelle semaine. Soudain, votre t\u00e9l\u00e9phone vibre.<\/p>\n","protected":false},"author":2,"featured_media":24273,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100],"tags":[],"class_list":["post-24271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-categorise"],"_links":{"self":[{"href":"https:\/\/phelpsgroup.ca\/fr\/wp-json\/wp\/v2\/posts\/24271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phelpsgroup.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phelpsgroup.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phelpsgroup.ca\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/phelpsgroup.ca\/fr\/wp-json\/wp\/v2\/comments?post=24271"}],"version-history":[{"count":6,"href":"https:\/\/phelpsgroup.ca\/fr\/wp-json\/wp\/v2\/posts\/24271\/revisions"}],"predecessor-version":[{"id":24778,"href":"https:\/\/phelpsgroup.ca\/fr\/wp-json\/wp\/v2\/posts\/24271\/revisions\/24778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phelpsgroup.ca\/fr\/wp-json\/wp\/v2\/media\/24273"}],"wp:attachment":[{"href":"https:\/\/phelpsgroup.ca\/fr\/wp-json\/wp\/v2\/media?parent=24271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phelpsgroup.ca\/fr\/wp-json\/wp\/v2\/categories?post=24271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phelpsgroup.ca\/fr\/wp-json\/wp\/v2\/tags?post=24271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}