[{"data":1,"prerenderedAt":1026},["ShallowReactive",2],{"/fr-fr/the-source/security/key-security-trends-for-cisos-in-2025/":3,"footer-fr-fr":37,"the-source-navigation-fr-fr":349,"the-source-newsletter-fr-fr":376,"key-security-trends-for-cisos-in-2025-article-hero-category-fr-fr":388,"key-security-trends-for-cisos-in-2025-the-source-gated-asset-fr-fr":412,"key-security-trends-for-cisos-in-2025-category-fr-fr":427,"key-security-trends-for-cisos-in-2025-the-source-resources-fr-fr":439,"key-security-trends-for-cisos-in-2025-article-hero-author-fr-fr":477},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"config":8,"seo":14,"content":20,"type":29,"category":5,"slug":30,"_id":31,"_type":32,"title":7,"_source":33,"_file":34,"_stem":35,"_extension":36},"/fr-fr/the-source/security/key-security-trends-for-cisos-in-2025","security",false,"",{"layout":9,"template":10,"articleType":11,"author":12,"featured":6,"gatedAsset":13},"the-source","TheSourceArticle","Regular","josh-lemos","source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach",{"title":15,"description":16,"ogImage":17,"config":18},"Tendances clés en matière de sécurité en 2025 que les responsables de la sécurité doivent connaître","Découvrez les tendances sécurité de 2025 et comment l'IA crée de nouveaux risques et défis, transforme la gestion des identités et renforce les équipes DevOps.","https://res.cloudinary.com/about-gitlab-com/image/upload/v1751464506/hyue0lgqq2lqk3arwnel.jpg",{"ignoreTitleCharLimit":19},true,{"title":15,"date":21,"description":22,"timeToRead":23,"heroImage":17,"keyTakeaways":24,"articleBody":28},"2025-02-25","Découvrez les principales tendances en matière de sécurité pour 2025 : comment l'IA engendre à la fois de nouveaux risques et de nouvelles opportunités, remodèle la gestion des identités et renforce les équipes DevOps.","Lecture : 5 min",[25,26,27],"L'adoption de l'IA est à la fois source de risques et d'opportunités en matière de sécurité : vous devez surveiller comment les fournisseurs l’intègrent aux outils, anticiper les éventuelles pannes tout en renforçant vos contrôles de sécurité grâce à elle.","Il est nécessaire de moderniser la gestion des identités afin de gérer les interactions complexes entre machines, les autorisations dynamiques et l'accès au système d'IA. Ce changement nécessite des outils de sécurité plus flexibles et adaptatifs.","Les outils d'IA aident à combler le déficit de compétences en sécurité au sein des équipes DevOps en automatisant les contrôles de sécurité, en suggérant des coding patterns sécurisés et en intégrant la sécurité à chaque étape du développement logiciel.","En 2025, bon nombre d'outils de sécurité critiques incluront des modèles d'IA sur lesquels vous n'aurez ni visibilité ni contrôle total. Votre direction s'interroge déjà sur les moyens d'éviter la prochaine atteinte à la sécurité majeure qui ferait la une des journaux. Pendant ce temps, vos concurrents tirent parti de l'IA pour automatiser la sécurité à une échelle qui était encore impensable il y a seulement quelques mois. L'évolution des réglementations complique davantage la situation, avec de nouvelles règles en vigueur dans l'Union européenne et en Californie qui encadrent votre utilisation des systèmes d'IA.\n\nLe domaine de la sécurité évolue à toute allure. Adoptez une approche réfléchie pour tourner ces défis à votre avantage afin de renforcer vos défenses et de vous protéger contre les nouvelles cybermenaces. Voici trois tendances que vous devez anticiper, car elles domineront les questions de sécurité des entreprises cette année.\n\n## 1. Les vulnérabilités dans les LLM propriétaires\nDe nombreux fournisseurs utilisent désormais des grands modèles de langage (LLM) propriétaires qui servent de modèle de fondation dans leurs produits. Cette évolution expose votre entreprise à de nouveaux risques. La plupart de ces LLM fonctionnent en vase clos : vous disposez d'une visibilité très restreinte sur leurs mécanismes internes et les contrôles de sécurité dont ils disposent. Les experts en sécurité ont démontré la fragilité des garde-fous de l'IA. La surface d'attaque des modèles eux-mêmes et, par conséquence, des produits dans lesquels ils sont intégrés, ne cesse de croître.\n\nDans la mesure où de nombreux produits intègrent les mêmes LLM propriétaires, une attaque sur un grand modèle de langage pourrait affecter plusieurs de vos systèmes simultanément. Cette concentration des risques est particulièrement préoccupante, car elle se produit en parallèle de l'augmentation du nombre de fonctions commerciales critiques qui dépendent d'outils alimentés par l'IA. Dès lors, il devient impératif de pouvoir :\n\n- Identifier parmi vos fournisseurs ceux qui utilisent des LLM\n- Évaluer les contrôles de sécurité qu'ils ont mis en place\n- Anticiper d'éventuelles pannes en cas de défaillance d'un service basé sur un LLM\n- Élaborer des plans de sauvegarde pour les systèmes critiques dépendant de l'IA\n\n> Pour en savoir plus, consultez cet article : [7 questions à poser à votre fournisseur DevOps pour établir une stratégie d'IA basée sur la transparence](https://about.gitlab.com/the-source/ai/building-a-transparency-first-ai-strategy-7-questions-to-ask-your-devops/)\n\n## 2. Les défis de la gestion des identités\nLe cloud et les systèmes d'IA transforment la façon dont nous gérons l'accès aux systèmes utilisés quotidiennement. Vos systèmes de gestion des identités doivent désormais être capables de gérer :\n\n- Une augmentation des identités non humaines liées à des services automatisés\n- Un plus grand nombre de connexions entre machines\n- Des changements rapides apportés aux droits d'accès\n- Des chaînes complexes d'autorisations entre les services\n- Des systèmes d'IA qui nécessitent différents niveaux d'accès aux données\n\nOr, les outils traditionnels de gestion des identités et des accès n'ont pas été conçus pour relever ces défis. Vous aurez besoin d'outils plus flexibles, capables de s'adapter rapidement à l'évolution de vos besoins. Mettre en œuvre les [principes Zero Trust et l'accès privilégié Just-In-Time](https://about.gitlab.com/the-source/security/field-guide-to-threat-vectors-in-the-software-supply-chain/) permet de mieux contrôler ces environnements dynamiques.\n\nLes équipes de sécurité doivent également élaborer des stratégies pour faire face à la complexité croissante de l'IA agentique, sans se départir du niveau de rigueur et d'auditabilité qu'elles appliquent aux utilisateurs humains. À mesure que les systèmes d'IA se multiplient, [le suivi et la sécurisation de ces identités non humaines](https://about.gitlab.com/blog/improve-ai-security-in-gitlab-with-composite-identities/) deviennent aussi essentiels que la gestion des accès des utilisateurs humains.\n\n## 3. L'implémentation de la sécurité dans le processus DevOps\n[Dans une enquête récente](https://about.gitlab.com/developer-survey/), 58 % des développeurs ont déclaré se sentir responsables de la sécurité applicative. Il demeure toutefois difficile de recruter des ingénieurs DevOps dotés de compétences dans ce domaine. Les outils alimentés par l'IA peuvent contribuer à combler cette lacune en se chargeant des tâches suivantes :\n\n- Vérifier la présence de failles de sécurité et de menaces potentielles dans le code dès les premières étapes du processus de développement, avant qu'elles ne causent des problèmes\n- Suggérer des coding patterns sécurisés\n- Configurer automatiquement les autorisations d'accès appropriées\n- Automatiser les tâches répétitives tout au long du processus de développement\n\nCes outils peuvent aider votre équipe de sécurité en place à gagner en efficacité, tout en simplifiant la détection des problèmes de sécurité fréquents avant que le code n'atteigne l'environnement de production. Résultat : moins de situations d'urgence auxquelles votre équipe doit faire face, ainsi qu'une posture de sécurité globale renforcée.\n\nEnvisagez d'investir dans des outils qui s'intègrent directement dans les workflows des développeurs. Plus ces derniers ont les moyens de travailler dans des environnements sécurisés, plus ils sont enclins à naturellement adopter de bonnes pratiques de sécurité.\n\n## Passez à l'action : tirez parti de l'IA pour sécuriser le développement logiciel\nPour garder une longueur d'avance face à ces transformations, suivez ces principes :\n\n1. Déterminez les points de contact entre les outils d'IA et vos systèmes, puis évaluez les risques associés\n2. Adaptez votre gestion des identités aux exigences du cloud et de l'IA\n3. Identifiez des moyens de renforcer vos mesures de sécurité avec l'IA\n4. Informez régulièrement votre direction des nouveaux risques et réglementations liés à l'IA\n5. Établissez un dialogue avec vos principaux fournisseurs afin de comprendre les mesures de sécurité qu'ils appliquent à l'utilisation de l'IA\n6. Formez vos équipes aux menaces de sécurité ainsi qu'aux opportunités liés à l'IA\n\nBien que l'IA introduise de nouveaux risques, elle vous offre également des outils puissants permettant de protéger votre entreprise. L'enjeu consiste à exploiter le potentiel de l'IA pour renforcer votre posture de sécurité tout en restant attentif aux nouvelles menaces. Révisez régulièrement votre stratégie de sécurité liée à l'IA pour rester proactif aux risques émergents.\n\n## Les perspectives d'avenir\nLe domaine de la sécurité continuera d'évoluer au rythme des avancées de la technologie d'IA. Faites preuve de flexibilité et adaptez votre stratégie de sécurité à l’émergence de nouvelles menaces comme de nouvelles opportunités. Renforcez la collaboration au sein de votre entreprise, en particulier avec les équipes juridiques, de développement et des opérations. Vous pourrez ainsi répondre plus efficacement aux défis de sécurité.\n\nEn dépit de l'évolution des technologies, n'oubliez pas que votre mission principale demeure inchangée : protéger les actifs de votre entreprise et garantir la sécurité de vos activités commerciales. Optez pour de nouveaux outils et approches lorsque cela est pertinent, sans vous précipiter pour adopter l'IA, ni perdre de vue les principes de base en matière de sécurité.","article","key-security-trends-for-cisos-in-2025","content:fr-fr:the-source:security:key-security-trends-for-cisos-in-2025:index.yml","yaml","content","fr-fr/the-source/security/key-security-trends-for-cisos-in-2025/index.yml","fr-fr/the-source/security/key-security-trends-for-cisos-in-2025/index","yml",{"_path":38,"_dir":39,"_draft":6,"_partial":6,"_locale":7,"data":40,"_id":345,"_type":32,"title":346,"_source":33,"_file":347,"_stem":348,"_extension":36},"/shared/fr-fr/main-footer","fr-fr",{"text":41,"source":42,"edit":48,"contribute":53,"config":58,"items":63,"minimal":336},"Git est une marque déposée de Software Freedom Conservancy et notre utilisation de « GitLab » est sous licence",{"text":43,"config":44},"Afficher le code source de la page",{"href":45,"dataGaName":46,"dataGaLocation":47},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/","page source","footer",{"text":49,"config":50},"Modifier cette page",{"href":51,"dataGaName":52,"dataGaLocation":47},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/content/","web ide",{"text":54,"config":55},"Veuillez contribuer",{"href":56,"dataGaName":57,"dataGaLocation":47},"https://gitlab.com/gitlab-com/marketing/digital-experience/about-gitlab-com/-/blob/main/CONTRIBUTING.md/","please contribute",{"twitter":59,"facebook":60,"youtube":61,"linkedin":62},"https://twitter.com/gitlab","https://www.facebook.com/gitlab","https://www.youtube.com/channel/UCnMGQ8QHMAnVIsI3xJrihhg","https://www.linkedin.com/company/gitlab-com",[64,91,164,236,298],{"title":65,"links":66,"subMenu":72},"Plateforme",[67],{"text":68,"config":69},"Plateforme DevSecOps",{"href":70,"dataGaName":71,"dataGaLocation":47},"/fr-fr/platform/","devsecops platform",[73],{"title":74,"links":75},"Tarifs",[76,81,86],{"text":77,"config":78},"Voir les forfaits",{"href":79,"dataGaName":80,"dataGaLocation":47},"/fr-fr/pricing/","view plans",{"text":82,"config":83},"Pourquoi choisir GitLab Premium ?",{"href":84,"dataGaName":85,"dataGaLocation":47},"/fr-fr/pricing/premium/","why premium",{"text":87,"config":88},"Pourquoi choisir GitLab Ultimate ?",{"href":89,"dataGaName":90,"dataGaLocation":47},"/fr-fr/pricing/ultimate/","why ultimate",{"title":92,"links":93},"Solutions",[94,99,104,109,114,119,124,129,134,139,144,149,154,159],{"text":95,"config":96},"Transformation digitale",{"href":97,"dataGaName":98,"dataGaLocation":47},"/fr-fr/topics/digital-transformation/","digital transformation",{"text":100,"config":101},"Sécurité et conformité",{"href":102,"dataGaName":103,"dataGaLocation":47},"/fr-fr/solutions/security-compliance/","security & compliance",{"text":105,"config":106},"Livraison de logiciels automatisée",{"href":107,"dataGaName":108,"dataGaLocation":47},"/fr-fr/solutions/delivery-automation/","automated software delivery",{"text":110,"config":111},"Développement agile",{"href":112,"dataGaName":113,"dataGaLocation":47},"/fr-fr/solutions/agile-delivery/","agile delivery",{"text":115,"config":116},"Transformation cloud",{"href":117,"dataGaName":118,"dataGaLocation":47},"/fr-fr/topics/cloud-native/","cloud transformation",{"text":120,"config":121},"SCM",{"href":122,"dataGaName":123,"dataGaLocation":47},"/fr-fr/solutions/source-code-management/","source code management",{"text":125,"config":126},"CI/CD",{"href":127,"dataGaName":128,"dataGaLocation":47},"/fr-fr/solutions/continuous-integration/","continuous integration & delivery",{"text":130,"config":131},"Gestion de la chaîne de valeur",{"href":132,"dataGaName":133,"dataGaLocation":47},"/fr-fr/solutions/value-stream-management/","value stream management",{"text":135,"config":136},"GitOps",{"href":137,"dataGaName":138,"dataGaLocation":47},"/fr-fr/solutions/gitops/","gitops",{"text":140,"config":141},"Entreprises",{"href":142,"dataGaName":143,"dataGaLocation":47},"/fr-fr/enterprise/","enterprise",{"text":145,"config":146},"PME",{"href":147,"dataGaName":148,"dataGaLocation":47},"/fr-fr/small-business/","small business",{"text":150,"config":151},"Secteur public",{"href":152,"dataGaName":153,"dataGaLocation":47},"/fr-fr/solutions/public-sector/","public sector",{"text":155,"config":156},"Formation",{"href":157,"dataGaName":158,"dataGaLocation":47},"/fr-fr/solutions/education/","education",{"text":160,"config":161},"Services financiers",{"href":162,"dataGaName":163,"dataGaLocation":47},"/fr-fr/solutions/finance/","financial services",{"title":165,"links":166},"Ressources",[167,172,177,182,187,192,196,201,206,211,216,221,226,231],{"text":168,"config":169},"Installation",{"href":170,"dataGaName":171,"dataGaLocation":47},"/fr-fr/install/","install",{"text":173,"config":174},"Guides de démarrage rapide",{"href":175,"dataGaName":176,"dataGaLocation":47},"/fr-fr/get-started/","quick setup checklists",{"text":178,"config":179},"Apprentissage",{"href":180,"dataGaName":181,"dataGaLocation":47},"https://university.gitlab.com/","learn",{"text":183,"config":184},"Documentation sur le produit",{"href":185,"dataGaName":186,"dataGaLocation":47},"https://docs.gitlab.com/","docs",{"text":188,"config":189},"Blog",{"href":190,"dataGaName":191},"/fr-fr/blog/","blog",{"text":193,"config":194},"Histoires de réussite client",{"href":195,"dataGaLocation":47},"/customers/",{"text":197,"config":198},"Histoires de succès client",{"href":199,"dataGaName":200,"dataGaLocation":47},"/fr-fr/customers/","customer success stories",{"text":202,"config":203},"Travail à distance",{"href":204,"dataGaName":205,"dataGaLocation":47},"https://handbook.gitlab.com/handbook/company/culture/all-remote/","remote",{"text":207,"config":208},"Services GitLab",{"href":209,"dataGaName":210,"dataGaLocation":47},"/fr-fr/services/","services",{"text":212,"config":213},"TeamOps",{"href":214,"dataGaName":215,"dataGaLocation":47},"/fr-fr/teamops/","teamops",{"text":217,"config":218},"Communauté",{"href":219,"dataGaName":220,"dataGaLocation":47},"/community/","community",{"text":222,"config":223},"Forum",{"href":224,"dataGaName":225,"dataGaLocation":47},"https://forum.gitlab.com/","forum",{"text":227,"config":228},"Événements",{"href":229,"dataGaName":230,"dataGaLocation":47},"/events/","events",{"text":232,"config":233},"Partenaires",{"href":234,"dataGaName":235,"dataGaLocation":47},"/fr-fr/partners/","partners",{"title":237,"links":238},"Société",[239,244,249,254,259,264,269,273,278,283,288,293],{"text":240,"config":241},"À propos",{"href":242,"dataGaName":243,"dataGaLocation":47},"/fr-fr/company/","company",{"text":245,"config":246},"Emplois",{"href":247,"dataGaName":248,"dataGaLocation":47},"/jobs/","jobs",{"text":250,"config":251},"Leadership",{"href":252,"dataGaName":253,"dataGaLocation":47},"/company/team/e-group/","leadership",{"text":255,"config":256},"Équipe",{"href":257,"dataGaName":258,"dataGaLocation":47},"/company/team/","team",{"text":260,"config":261},"Manuel",{"href":262,"dataGaName":263,"dataGaLocation":47},"https://handbook.gitlab.com/","handbook",{"text":265,"config":266},"Relations avec les investisseurs",{"href":267,"dataGaName":268,"dataGaLocation":47},"https://ir.gitlab.com/","investor relations",{"text":270,"config":271},"Sustainability",{"href":272,"dataGaName":270,"dataGaLocation":47},"/sustainability/",{"text":274,"config":275},"Diversité, inclusion et appartenance (DIB)",{"href":276,"dataGaName":277,"dataGaLocation":47},"/fr-fr/diversity-inclusion-belonging/","Diversity, inclusion and belonging",{"text":279,"config":280},"Centre de confiance",{"href":281,"dataGaName":282,"dataGaLocation":47},"/fr-fr/security/","trust center",{"text":284,"config":285},"Newsletter",{"href":286,"dataGaName":287,"dataGaLocation":47},"/company/contact/","newsletter",{"text":289,"config":290},"Presse",{"href":291,"dataGaName":292,"dataGaLocation":47},"/press/","press",{"text":294,"config":295},"Déclaration de transparence sur l'esclavage moderne",{"href":296,"dataGaName":297,"dataGaLocation":47},"https://handbook.gitlab.com/handbook/legal/modern-slavery-act-transparency-statement/","modern slavery transparency statement",{"title":299,"links":300},"Nous contacter",[301,306,311,316,321,326,331],{"text":302,"config":303},"Échanger avec un expert",{"href":304,"dataGaName":305,"dataGaLocation":47},"/fr-fr/sales/","sales",{"text":307,"config":308},"Aide",{"href":309,"dataGaName":310,"dataGaLocation":47},"/support/","get help",{"text":312,"config":313},"Portail clients GitLab",{"href":314,"dataGaName":315,"dataGaLocation":47},"https://customers.gitlab.com/customers/sign_in/","customer portal",{"text":317,"config":318},"Statut",{"href":319,"dataGaName":320,"dataGaLocation":47},"https://status.gitlab.com/","status",{"text":322,"config":323},"Conditions d'utilisation",{"href":324,"dataGaName":325},"/terms/","terms of use",{"text":327,"config":328},"Déclaration de confidentialité",{"href":329,"dataGaName":330,"dataGaLocation":47},"/fr-fr/privacy/","privacy statement",{"text":332,"config":333},"Préférences en matière de cookies",{"dataGaName":334,"dataGaLocation":47,"id":335,"isOneTrustButton":19},"cookie preferences","ot-sdk-btn",{"items":337},[338,340,343],{"text":322,"config":339},{"href":324,"dataGaName":325,"dataGaLocation":47},{"text":341,"config":342},"Politique de confidentialité",{"href":329,"dataGaName":330,"dataGaLocation":47},{"text":332,"config":344},{"dataGaName":334,"dataGaLocation":47,"id":335,"isOneTrustButton":19},"content:shared:fr-fr:main-footer.yml","Main Footer","shared/fr-fr/main-footer.yml","shared/fr-fr/main-footer",{"_path":350,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"logo":351,"subscribeLink":356,"navItems":360,"_id":372,"_type":32,"title":373,"_source":33,"_file":374,"_stem":375,"_extension":36},"/shared/fr-fr/the-source/navigation",{"altText":352,"config":353},"the source logo",{"src":354,"href":355},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1750191004/t7wz1klfb2kxkezksv9t.svg","/fr-fr/the-source/",{"text":357,"config":358},"S'abonner",{"href":359},"#subscribe",[361,365,368],{"text":362,"config":363},"Intelligence artificielle",{"href":364},"/fr-fr/the-source/ai/",{"text":100,"config":366},{"href":367},"/fr-fr/the-source/security/",{"text":369,"config":370},"Plateforme et infrastructure",{"href":371},"/fr-fr/the-source/platform/","content:shared:fr-fr:the-source:navigation.yml","Navigation","shared/fr-fr/the-source/navigation.yml","shared/fr-fr/the-source/navigation",{"_path":377,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"title":378,"description":379,"submitMessage":380,"formData":381,"_id":385,"_type":32,"_source":33,"_file":386,"_stem":387,"_extension":36},"/shared/fr-fr/the-source/newsletter","La newsletter The Source","Recevez une mine d'informations sur l'avenir du développement logiciel.","Vous êtes désormais inscrit à la newsletter The Source.",{"config":382},{"formId":383,"formName":384,"hideRequiredLabel":19},28453,"thesourcenewsletter","content:shared:fr-fr:the-source:newsletter.yml","shared/fr-fr/the-source/newsletter.yml","shared/fr-fr/the-source/newsletter",{"_path":389,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":390,"seo":391,"content":393,"type":408,"slug":5,"_id":409,"_type":32,"title":7,"_source":33,"_file":410,"_stem":411,"_extension":36},"/fr-fr/the-source/security",{"layout":9},{"title":100,"description":392,"ogImage":7},"Découvrez comment les entreprises peuvent se protéger des dernières menaces de sécurité tout en respectant les exigences de conformité.",[394,400],{"componentName":395,"componentContent":396},"TheSourceCategoryHero",{"title":100,"description":392,"image":397},{"config":398},{"src":399},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463273/aplkxrvwpii26xao5yhi.png",{"componentName":401,"componentContent":402},"TheSourceCategoryMainSection",{"config":403},{"gatedAssets":404},[405,406,407],"source-lp-guide-to-dynamic-sboms","source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain","application-security-in-the-digital-age","category","content:fr-fr:the-source:security:index.yml","fr-fr/the-source/security/index.yml","fr-fr/the-source/security/index",{"_path":413,"_dir":414,"_draft":6,"_partial":6,"_locale":7,"config":415,"title":416,"description":417,"link":418,"_id":424,"_type":32,"_source":33,"_file":425,"_stem":426,"_extension":36},"/shared/fr-fr/the-source/gated-assets/source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach","gated-assets",{"id":13},"Développez une stratégie d'innovation logicielle intégrant judicieusement l'IA","Les outils d'IA générative ne sont pas une mode éphémère. Les entreprises dotées d'équipes d'ingénierie logicielle qui souhaitent recruter et retenir les meilleurs talents doivent introduire l'IA dans leur processus pour rester compétitives. La formation continue, l'adoption progressive et un accompagnement structuré sont essentiels pour exploiter le potentiel de l'IA en toute sécurité et de manière responsable. Téléchargez notre guide destiné aux dirigeants d'entreprise pour découvrir comment préparer vos cadres supérieurs, votre équipe de direction et vos équipes de développement aux capacités actuelles et futures de l'IA afin accélérer le développement logiciel.",{"text":419,"config":420},"Consulter le guide",{"href":421,"dataGaName":422,"dataGaLocation":423},"https://about.gitlab.com/the-source/ai/ai-guide-for-enterprise-leaders-building-the-right-approach//","AI Guide For Enterprise Leaders: Building the Right Approach","thesource","content:shared:fr-fr:the-source:gated-assets:source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach.yml","shared/fr-fr/the-source/gated-assets/source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach.yml","shared/fr-fr/the-source/gated-assets/source-lp-ai-guide-for-enterprise-leaders-building-the-right-approach",{"_path":389,"_dir":9,"_draft":6,"_partial":6,"_locale":7,"config":428,"seo":429,"content":430,"type":408,"slug":5,"_id":409,"_type":32,"title":7,"_source":33,"_file":410,"_stem":411,"_extension":36},{"layout":9},{"title":100,"description":392,"ogImage":7},[431,435],{"componentName":395,"componentContent":432},{"title":100,"description":392,"image":433},{"config":434},{"src":399},{"componentName":401,"componentContent":436},{"config":437},{"gatedAssets":438},[405,406,407],[440,454,465],{"_path":441,"_dir":414,"_draft":6,"_partial":6,"_locale":7,"config":442,"title":444,"description":445,"link":446,"_id":451,"_type":32,"_source":33,"_file":452,"_stem":453,"_extension":36},"/shared/fr-fr/the-source/gated-assets/application-security-in-the-digital-age",{"id":407,"formId":443},1002,"La sécurité des applications à l'ère du numérique","Lisez les [conclusions de notre enquête menée auprès de plus de 5 000 professionnels DevSecOps dans le monde entier](https://about.gitlab.com/fr-fr/developer-survey/2024/security-compliance/) afin de comprendre pourquoi les entreprises sont confrontées à l'augmentation des surfaces d'attaque et à l'évolution des comportements à l'égard de la sécurité et de l'IA.",{"text":447,"config":448},"Lire le rapport",{"href":449,"dataGaName":450,"dataGaLocation":423},"https://about.gitlab.com/developer-survey/2024/security-compliance","Application Security in the Digital Age","content:shared:fr-fr:the-source:gated-assets:application-security-in-the-digital-age.yml","shared/fr-fr/the-source/gated-assets/application-security-in-the-digital-age.yml","shared/fr-fr/the-source/gated-assets/application-security-in-the-digital-age",{"_path":455,"_dir":414,"_draft":6,"_partial":6,"_locale":7,"config":456,"title":457,"link":458,"_id":462,"_type":32,"_source":33,"_file":463,"_stem":464,"_extension":36},"/shared/fr-fr/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"id":406},"Guide pratique sur les vecteurs de menace dans la chaîne d'approvisionnement logicielle",{"config":459},{"href":460,"dataGaName":461,"dataGaLocation":423},"https://about.gitlab.com/the-source/security/field-guide-to-threat-vectors-in-the-software-supply-chain/","A field guide to threat vectors in the software supply chain","content:shared:fr-fr:the-source:gated-assets:source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/fr-fr/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain.yml","shared/fr-fr/the-source/gated-assets/source-lp-a-field-guide-to-threat-vectors-in-the-software-supply-chain",{"_path":466,"_dir":414,"_draft":6,"_partial":6,"_locale":7,"config":467,"title":468,"description":469,"link":470,"_id":474,"_type":32,"_source":33,"_file":475,"_stem":476,"_extension":36},"/shared/fr-fr/the-source/gated-assets/source-lp-guide-to-dynamic-sboms",{"id":405},"Guide de GitLab sur les nomenclatures logicielles dynamiques : un élément essentiel du développement logiciel moderne","Découvrez comment gagner en visibilité sur des risques organisationnels jusqu'alors non identifiés grâce à une nomenclature logicielle (SBOM).",{"text":419,"config":471},{"href":472,"dataGaName":473,"dataGaLocation":423},"https://about.gitlab.com/the-source/security/guide-to-dynamic-sboms/","Guide to Dynamic SBOMs","content:shared:fr-fr:the-source:gated-assets:source-lp-guide-to-dynamic-sboms.yml","shared/fr-fr/the-source/gated-assets/source-lp-guide-to-dynamic-sboms.yml","shared/fr-fr/the-source/gated-assets/source-lp-guide-to-dynamic-sboms",[478,501,517,533,549,570,590,606,624,644,661,682,698,716,733,751,770,788,807,828,848,864,880,898,916,935,951,969,985,1004],{"_path":479,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":481,"seo":482,"content":484,"type":496,"slug":497,"_id":498,"_type":32,"title":483,"_source":33,"_file":499,"_stem":500,"_extension":36},"/fr-fr/the-source/authors/amanda-rueda","authors",{"layout":9},{"title":483},"Amanda Rueda",[485,494],{"componentName":486,"componentContent":487},"TheSourceAuthorHero",{"config":488,"name":483,"headshot":491},{"gitlabHandle":489,"linkedInProfileUrl":490},"amandarueda","https://www.linkedin.com/in/amandamrueda/",{"altText":483,"config":492},{"src":493},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463383/osecw1pzbxvb7fhqhiky.png",{"componentName":495},"TheSourceArticlesList","author","amanda-rueda","content:fr-fr:the-source:authors:amanda-rueda.yml","fr-fr/the-source/authors/amanda-rueda.yml","fr-fr/the-source/authors/amanda-rueda",{"_path":502,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":503,"seo":504,"content":506,"type":496,"slug":513,"_id":514,"_type":32,"title":505,"_source":33,"_file":515,"_stem":516,"_extension":36},"/fr-fr/the-source/authors/andre-michael-braun",{"layout":9},{"title":505},"Andre Michael Braun",[507,512],{"componentName":486,"componentContent":508},{"name":505,"headshot":509},{"altText":505,"config":510},{"src":511},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463336/yl27k7wdlnkzsizwknn1.jpg",{"componentName":495},"andre-michael-braun","content:fr-fr:the-source:authors:andre-michael-braun.yml","fr-fr/the-source/authors/andre-michael-braun.yml","fr-fr/the-source/authors/andre-michael-braun",{"_path":518,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":519,"seo":520,"content":522,"type":496,"slug":529,"_id":530,"_type":32,"title":521,"_source":33,"_file":531,"_stem":532,"_extension":36},"/fr-fr/the-source/authors/andrew-haschka",{"layout":9},{"title":521},"Andrew Haschka",[523,528],{"componentName":486,"componentContent":524},{"name":521,"headshot":525},{"altText":521,"config":526},{"src":527},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463349/z1qnc4uxmqgg3hnm3da4.png",{"componentName":495},"andrew-haschka","content:fr-fr:the-source:authors:andrew-haschka.yml","fr-fr/the-source/authors/andrew-haschka.yml","fr-fr/the-source/authors/andrew-haschka",{"_path":534,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":535,"seo":536,"content":538,"type":496,"slug":545,"_id":546,"_type":32,"title":537,"_source":33,"_file":547,"_stem":548,"_extension":36},"/fr-fr/the-source/authors/ayoub-fandi",{"layout":9},{"title":537},"Ayoub Fandi",[539,544],{"componentName":486,"componentContent":540},{"name":537,"headshot":541},{"altText":537,"config":542},{"src":543},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463329/wyp554loeyoibx3ozren.jpg",{"componentName":495},"ayoub-fandi","content:fr-fr:the-source:authors:ayoub-fandi.yml","fr-fr/the-source/authors/ayoub-fandi.yml","fr-fr/the-source/authors/ayoub-fandi",{"_path":550,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":551,"seo":552,"content":554,"type":496,"slug":566,"_id":567,"_type":32,"title":553,"_source":33,"_file":568,"_stem":569,"_extension":36},"/fr-fr/the-source/authors/brian-wald",{"layout":9},{"title":553},"Brian Wald",[555,565],{"componentName":486,"componentContent":556},{"config":557,"name":553,"role":560,"bio":561,"headshot":562},{"gitlabHandle":558,"linkedInProfileUrl":559},"brianwald","https://www.linkedin.com/in/brianwald/","Head of Global Field CTO org","Brian Wald est Head of Global Field CTO org chez GitLab. Il dirige une équipe dynamique de directeurs techniques de terrain, dédiée à la transformation des pratiques de développement logiciel en entreprise.",{"altText":553,"config":563},{"src":564},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463417/fugpbux9miqbdx3wewtu.jpg",{"componentName":495},"brian-wald","content:fr-fr:the-source:authors:brian-wald.yml","fr-fr/the-source/authors/brian-wald.yml","fr-fr/the-source/authors/brian-wald",{"_path":571,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":572,"seo":573,"content":575,"type":496,"slug":586,"_id":587,"_type":32,"title":574,"_source":33,"_file":588,"_stem":589,"_extension":36},"/fr-fr/the-source/authors/bryan-ross",{"layout":9},{"title":574},"Bryan Ross",[576,585],{"componentName":486,"componentContent":577},{"config":578,"name":574,"headshot":582},{"gitlabHandle":579,"twitterXProfileUrl":580,"linkedInProfileUrl":581},"bryanrossuk","https://twitter.com/bryanrossuk","https://www.linkedin.com/in/bryanross",{"altText":574,"config":583},{"src":584},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463324/mvdyvskii4hltdrgqxom.jpg",{"componentName":495},"bryan-ross","content:fr-fr:the-source:authors:bryan-ross.yml","fr-fr/the-source/authors/bryan-ross.yml","fr-fr/the-source/authors/bryan-ross",{"_path":591,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":592,"seo":593,"content":595,"type":496,"slug":602,"_id":603,"_type":32,"title":594,"_source":33,"_file":604,"_stem":605,"_extension":36},"/fr-fr/the-source/authors/chandler-gibbons",{"layout":9},{"title":594},"Chandler Gibbons",[596,601],{"componentName":486,"componentContent":597},{"name":594,"headshot":598},{"altText":594,"config":599},{"src":600},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463362/o7g9fqtqtjvegfwniuxh.jpg",{"componentName":495},"chandler-gibbons","content:fr-fr:the-source:authors:chandler-gibbons.yml","fr-fr/the-source/authors/chandler-gibbons.yml","fr-fr/the-source/authors/chandler-gibbons",{"_path":607,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":608,"seo":609,"content":611,"type":496,"slug":620,"_id":621,"_type":32,"title":610,"_source":33,"_file":622,"_stem":623,"_extension":36},"/fr-fr/the-source/authors/dave-steer",{"layout":9},{"title":610},"Dave Steer",[612,619],{"componentName":486,"componentContent":613},{"config":614,"name":610,"headshot":616},{"gitlabHandle":615},"dsteer",{"altText":610,"config":617},{"src":618},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463457/zbtapdkglu3yb9suaq7w.png",{"componentName":495},"dave-steer","content:fr-fr:the-source:authors:dave-steer.yml","fr-fr/the-source/authors/dave-steer.yml","fr-fr/the-source/authors/dave-steer",{"_path":625,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":626,"seo":627,"content":629,"type":496,"slug":639,"_id":640,"_type":32,"title":641,"_source":33,"_file":642,"_stem":643,"_extension":36},"/fr-fr/the-source/authors/ddesanto",{"layout":9},{"title":628},"David DeSanto",[630,638],{"componentName":486,"componentContent":631},{"config":632,"name":628,"headshot":635},{"gitlabHandle":633,"linkedInProfileUrl":634},"david","https://www.linkedin.com/in/ddesanto/",{"altText":628,"config":636},{"src":637},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463446/bgnljs84zcsxj0t6nvix.png",{"componentName":495},"ddesanto","content:fr-fr:the-source:authors:ddesanto.yml","Ddesanto","fr-fr/the-source/authors/ddesanto.yml","fr-fr/the-source/authors/ddesanto",{"_path":645,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":646,"seo":647,"content":649,"type":496,"slug":656,"_id":657,"_type":32,"title":658,"_source":33,"_file":659,"_stem":660,"_extension":36},"/fr-fr/the-source/authors/derek-debellis",{"layout":9},{"title":648},"Derek DeBellis",[650,655],{"componentName":486,"componentContent":651},{"name":648,"headshot":652},{"altText":648,"config":653},{"src":654},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463385/sbnjwfaguszi5g2smzr7.png",{"componentName":495},"derek-debellis","content:fr-fr:the-source:authors:derek-debellis.yml","Derek Debellis","fr-fr/the-source/authors/derek-debellis.yml","fr-fr/the-source/authors/derek-debellis",{"_path":662,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":663,"seo":664,"content":666,"type":496,"slug":678,"_id":679,"_type":32,"title":665,"_source":33,"_file":680,"_stem":681,"_extension":36},"/fr-fr/the-source/authors/emilio-salvador",{"layout":9},{"title":665},"Emilio Salvador",[667,677],{"componentName":486,"componentContent":668},{"config":669,"name":665,"role":672,"bio":673,"headshot":674},{"gitlabHandle":670,"linkedInProfileUrl":671},"esalvadorp","https://www.linkedin.com/in/emiliosp/","Vice President, Strategy and Developer Relations","Emilio Salvador est Vice President de la stratégie et des relations avec les développeurs chez GitLab. Cadre dans le domaine des technologies avec plus de 20 ans d'expérience, Emilio a occupé des postes chez Amazon et Microsoft. Il a plus récemment dirigé la stratégie et les opérations de l'équipe « Developer Advocacy and Experience » chez Google. Il est titulaire d'un MBA de la Sloan School of Management du MIT.",{"altText":665,"config":675},{"src":676},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463402/g0snp3uisjm4tj3pkqcw.jpg",{"componentName":495},"emilio-salvador","content:fr-fr:the-source:authors:emilio-salvador.yml","fr-fr/the-source/authors/emilio-salvador.yml","fr-fr/the-source/authors/emilio-salvador",{"_path":683,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":684,"seo":685,"content":687,"type":496,"slug":694,"_id":695,"_type":32,"title":686,"_source":33,"_file":696,"_stem":697,"_extension":36},"/fr-fr/the-source/authors/erika-feldman",{"layout":9},{"title":686},"Erika Feldman",[688,693],{"componentName":486,"componentContent":689},{"name":686,"headshot":690},{"altText":686,"config":691},{"src":692},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463354/d9quqvz7d2ayjwif7vdn.png",{"componentName":495},"erika-feldman","content:fr-fr:the-source:authors:erika-feldman.yml","fr-fr/the-source/authors/erika-feldman.yml","fr-fr/the-source/authors/erika-feldman",{"_path":699,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":700,"seo":701,"content":703,"type":496,"slug":712,"_id":713,"_type":32,"title":702,"_source":33,"_file":714,"_stem":715,"_extension":36},"/fr-fr/the-source/authors/george-kichukov",{"layout":9},{"title":702},"George Kichukov",[704,711],{"componentName":486,"componentContent":705},{"config":706,"name":702,"headshot":708},{"gitlabHandle":707},"gkichukov",{"altText":702,"config":709},{"src":710},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463366/dk2knfancgsxocjkmyoa.jpg",{"componentName":495},"george-kichukov","content:fr-fr:the-source:authors:george-kichukov.yml","fr-fr/the-source/authors/george-kichukov.yml","fr-fr/the-source/authors/george-kichukov",{"_path":717,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":718,"seo":719,"content":721,"type":496,"slug":728,"_id":729,"_type":32,"title":730,"_source":33,"_file":731,"_stem":732,"_extension":36},"/fr-fr/the-source/authors/gitlab",{"layout":9},{"title":720},"GitLab",[722,727],{"componentName":486,"componentContent":723},{"name":720,"headshot":724},{"altText":720,"config":725},{"src":726},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463461/ts7io0hgpdyqylbzfire.png",{"componentName":495},"gitlab","content:fr-fr:the-source:authors:gitlab.yml","Gitlab","fr-fr/the-source/authors/gitlab.yml","fr-fr/the-source/authors/gitlab",{"_path":734,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":735,"seo":736,"content":738,"type":496,"slug":747,"_id":748,"_type":32,"title":737,"_source":33,"_file":749,"_stem":750,"_extension":36},"/fr-fr/the-source/authors/grant-hickman",{"layout":9},{"title":737},"Grant Hickman",[739,746],{"componentName":486,"componentContent":740},{"config":741,"name":737,"headshot":743},{"gitlabHandle":742},"g.hickman",{"altText":737,"config":744},{"src":745},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463463/f3uqwtugqotyhwutz5gu.png",{"componentName":495},"grant-hickman","content:fr-fr:the-source:authors:grant-hickman.yml","fr-fr/the-source/authors/grant-hickman.yml","fr-fr/the-source/authors/grant-hickman",{"_path":752,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":753,"seo":754,"content":756,"type":496,"slug":766,"_id":767,"_type":32,"title":755,"_source":33,"_file":768,"_stem":769,"_extension":36},"/fr-fr/the-source/authors/haim-snir",{"layout":9},{"title":755},"Haim Snir",[757,765],{"componentName":486,"componentContent":758},{"config":759,"name":755,"headshot":762},{"gitlabHandle":760,"linkedInProfileUrl":761},"hsnir1","https://www.linkedin.com/in/haimsnir/",{"altText":755,"config":763},{"src":764},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463395/nubmshvaq8wpomopllni.png",{"componentName":495},"haim-snir","content:fr-fr:the-source:authors:haim-snir.yml","fr-fr/the-source/authors/haim-snir.yml","fr-fr/the-source/authors/haim-snir",{"_path":771,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":772,"seo":773,"content":775,"type":496,"slug":779,"_id":784,"_type":32,"title":785,"_source":33,"_file":786,"_stem":787,"_extension":36},"/fr-fr/the-source/authors/iganbaruch",{"layout":9},{"title":774},"Itzik Gan Baruch",[776,783],{"componentName":486,"componentContent":777},{"config":778,"name":774,"headshot":780},{"gitlabHandle":779},"iganbaruch",{"altText":774,"config":781},{"src":782},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463443/vibb2fkc0ojni2d1eqde.png",{"componentName":495},"content:fr-fr:the-source:authors:iganbaruch.yml","Iganbaruch","fr-fr/the-source/authors/iganbaruch.yml","fr-fr/the-source/authors/iganbaruch",{"_path":789,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":790,"seo":791,"content":793,"type":496,"slug":802,"_id":803,"_type":32,"title":804,"_source":33,"_file":805,"_stem":806,"_extension":36},"/fr-fr/the-source/authors/jlongo",{"layout":9},{"title":792},"Joseph Longo",[794,801],{"componentName":486,"componentContent":795},{"config":796,"name":792,"headshot":798},{"gitlabHandle":797},"jlongo_gitlab",{"altText":792,"config":799},{"src":800},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463434/uoxaknpmoposbbgzqji8.png",{"componentName":495},"jlongo","content:fr-fr:the-source:authors:jlongo.yml","Jlongo","fr-fr/the-source/authors/jlongo.yml","fr-fr/the-source/authors/jlongo",{"_path":808,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":809,"seo":810,"content":812,"type":496,"slug":824,"_id":825,"_type":32,"title":811,"_source":33,"_file":826,"_stem":827,"_extension":36},"/fr-fr/the-source/authors/joel-krooswyk",{"layout":9},{"title":811},"Joel Krooswyk",[813,823],{"componentName":486,"componentContent":814},{"config":815,"name":811,"role":818,"bio":819,"headshot":820},{"gitlabHandle":816,"linkedInProfileUrl":817},"jkrooswyk","https://www.linkedin.com/in/joelrkrooswyk/","Federal CTO","Joel Krooswyk est federal CTO chez GitLab. Joel contribue activement à la croissance de GitLab depuis 2017. Ses 25 années d'expérience en matière de leadership couvrent non seulement le secteur public américain, mais aussi les petites, moyennes et grandes entreprises à l'échelle mondiale. Joel cumule une profonde expertise en matière de politique gouvernementale avec une riche expérience dans les domaines de la technologie, du développement logiciel, de l'IA et de la cybersécurité. Il est souvent sollicité par le secteur public comme privé pour fournir des commentaires et des réponses dans le cadre de leurs politiques.",{"altText":811,"config":821},{"src":822},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463423/mkmdhuxsjggfvokdmdv7.jpg",{"componentName":495},"joel-krooswyk","content:fr-fr:the-source:authors:joel-krooswyk.yml","fr-fr/the-source/authors/joel-krooswyk.yml","fr-fr/the-source/authors/joel-krooswyk",{"_path":829,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":830,"seo":831,"content":833,"type":496,"slug":12,"_id":845,"_type":32,"title":832,"_source":33,"_file":846,"_stem":847,"_extension":36},"/fr-fr/the-source/authors/josh-lemos",{"layout":9},{"title":832},"Josh Lemos",[834,844],{"componentName":486,"componentContent":835},{"config":836,"name":832,"role":839,"bio":840,"headshot":841},{"gitlabHandle":837,"linkedInProfileUrl":838},"joshlemos","https://www.linkedin.com/in/joshlemos/","Chief Information Security Officer","Josh Lemos, Chief Information Security Officer chez GitLab Inc., bénéficie de 20 ans d'expérience dans la direction d'équipes de sécurité de l'information. Il est responsable de la vision, de la stratégie et du programme de l'entreprise dans le but de protéger efficacement les actifs et les technologies de l'information. Il a également pour mission de renforcer la plateforme DevSecOps de Gitlab et d'offrir une sécurité de pointe aux clients.",{"altText":832,"config":842},{"src":843},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463405/f4rqtiecakrekvxfhqar.jpg",{"componentName":495},"content:fr-fr:the-source:authors:josh-lemos.yml","fr-fr/the-source/authors/josh-lemos.yml","fr-fr/the-source/authors/josh-lemos",{"_path":849,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":850,"seo":851,"content":853,"type":496,"slug":860,"_id":861,"_type":32,"title":852,"_source":33,"_file":862,"_stem":863,"_extension":36},"/fr-fr/the-source/authors/julie-griffin",{"layout":9},{"title":852},"Julie Griffin",[854,859],{"componentName":486,"componentContent":855},{"name":852,"headshot":856},{"altText":852,"config":857},{"src":858},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463371/hqkbr3uk8hw2de7tltn4.webp",{"componentName":495},"julie-griffin","content:fr-fr:the-source:authors:julie-griffin.yml","fr-fr/the-source/authors/julie-griffin.yml","fr-fr/the-source/authors/julie-griffin",{"_path":865,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":866,"seo":867,"content":869,"type":496,"slug":876,"_id":877,"_type":32,"title":868,"_source":33,"_file":878,"_stem":879,"_extension":36},"/fr-fr/the-source/authors/kristina-weis",{"layout":9},{"title":868},"Kristina Weis",[870,875],{"componentName":486,"componentContent":871},{"name":868,"headshot":872},{"altText":868,"config":873},{"src":874},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463469/eoolq6n6bs0zb8gmf0js.webp",{"componentName":495},"kristina-weis","content:fr-fr:the-source:authors:kristina-weis.yml","fr-fr/the-source/authors/kristina-weis.yml","fr-fr/the-source/authors/kristina-weis",{"_path":881,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":882,"seo":883,"content":885,"type":496,"slug":894,"_id":895,"_type":32,"title":884,"_source":33,"_file":896,"_stem":897,"_extension":36},"/fr-fr/the-source/authors/lee-faus",{"layout":9},{"title":884},"Lee Faus",[886,893],{"componentName":486,"componentContent":887},{"config":888,"name":884,"headshot":890},{"gitlabHandle":889},"lfaus",{"altText":884,"config":891},{"src":892},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463398/vivhlomglvnstamj54bo.jpg",{"componentName":495},"lee-faus","content:fr-fr:the-source:authors:lee-faus.yml","fr-fr/the-source/authors/lee-faus.yml","fr-fr/the-source/authors/lee-faus",{"_path":899,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":900,"seo":901,"content":903,"type":496,"slug":907,"_id":912,"_type":32,"title":913,"_source":33,"_file":914,"_stem":915,"_extension":36},"/fr-fr/the-source/authors/ncregan",{"layout":9},{"title":902},"Niall Cregan",[904,911],{"componentName":486,"componentContent":905},{"config":906,"name":902,"headshot":908},{"gitlabHandle":907},"ncregan",{"altText":902,"config":909},{"src":910},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463431/yrtwodocb4cu3j7lkhyo.png",{"componentName":495},"content:fr-fr:the-source:authors:ncregan.yml","Ncregan","fr-fr/the-source/authors/ncregan.yml","fr-fr/the-source/authors/ncregan",{"_path":917,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":918,"seo":919,"content":921,"type":496,"slug":930,"_id":931,"_type":32,"title":932,"_source":33,"_file":933,"_stem":934,"_extension":36},"/fr-fr/the-source/authors/rschulman",{"layout":9},{"title":920},"Robin Schulman",[922,929],{"componentName":486,"componentContent":923},{"config":924,"name":920,"headshot":926},{"gitlabHandle":925},"robin",{"altText":920,"config":927},{"src":928},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463437/u2xfbudw1f8hhnkrgaoy.webp",{"componentName":495},"rschulman","content:fr-fr:the-source:authors:rschulman.yml","Rschulman","fr-fr/the-source/authors/rschulman.yml","fr-fr/the-source/authors/rschulman",{"_path":936,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":937,"seo":938,"content":940,"type":496,"slug":947,"_id":948,"_type":32,"title":939,"_source":33,"_file":949,"_stem":950,"_extension":36},"/fr-fr/the-source/authors/sabrina-farmer",{"layout":9},{"title":939},"Sabrina Farmer",[941,946],{"componentName":486,"componentContent":942},{"name":939,"headshot":943},{"altText":939,"config":944},{"src":945},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463377/udmzbjjr5xrcrffdlphx.webp",{"componentName":495},"sabrina-farmer","content:fr-fr:the-source:authors:sabrina-farmer.yml","fr-fr/the-source/authors/sabrina-farmer.yml","fr-fr/the-source/authors/sabrina-farmer",{"_path":952,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":953,"seo":954,"content":956,"type":496,"slug":965,"_id":966,"_type":32,"title":955,"_source":33,"_file":967,"_stem":968,"_extension":36},"/fr-fr/the-source/authors/sandra-gittlen",{"layout":9},{"title":955},"Sandra Gittlen",[957,964],{"componentName":486,"componentContent":958},{"config":959,"name":955,"headshot":961},{"gitlabHandle":960},"sgittlen",{"altText":955,"config":962},{"src":963},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463466/r7ckb9h2zr4c2rsz3zlm.png",{"componentName":495},"sandra-gittlen","content:fr-fr:the-source:authors:sandra-gittlen.yml","fr-fr/the-source/authors/sandra-gittlen.yml","fr-fr/the-source/authors/sandra-gittlen",{"_path":970,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":971,"seo":972,"content":974,"type":496,"slug":981,"_id":982,"_type":32,"title":973,"_source":33,"_file":983,"_stem":984,"_extension":36},"/fr-fr/the-source/authors/sharon-gaudin",{"layout":9},{"title":973},"Sharon Gaudin",[975,980],{"componentName":486,"componentContent":976},{"name":973,"headshot":977},{"altText":973,"config":978},{"src":979},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463475/h6j4nnvykzyfzgvl7txb.webp",{"componentName":495},"sharon-gaudin","content:fr-fr:the-source:authors:sharon-gaudin.yml","fr-fr/the-source/authors/sharon-gaudin.yml","fr-fr/the-source/authors/sharon-gaudin",{"_path":986,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":987,"seo":988,"content":990,"type":496,"slug":1000,"_id":1001,"_type":32,"title":989,"_source":33,"_file":1002,"_stem":1003,"_extension":36},"/fr-fr/the-source/authors/stephen-walters",{"layout":9},{"title":989},"Stephen Walters",[991,999],{"componentName":486,"componentContent":992},{"config":993,"name":989,"headshot":996},{"gitlabHandle":994,"linkedInProfileUrl":995},"swalters1","https://www.linkedin.com/in/1stephenwalters/",{"altText":989,"config":997},{"src":998},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463392/g6ktk5qb4vcqc9wqjlf9.jpg",{"componentName":495},"stephen-walters","content:fr-fr:the-source:authors:stephen-walters.yml","fr-fr/the-source/authors/stephen-walters.yml","fr-fr/the-source/authors/stephen-walters",{"_path":1005,"_dir":480,"_draft":6,"_partial":6,"_locale":7,"config":1006,"seo":1007,"content":1009,"type":496,"slug":1021,"_id":1022,"_type":32,"title":1023,"_source":33,"_file":1024,"_stem":1025,"_extension":36},"/fr-fr/the-source/authors/taylor-mccaslin",{"layout":9},{"title":1008},"Taylor McCaslin",[1010,1020],{"componentName":486,"componentContent":1011},{"config":1012,"name":1008,"role":1015,"bio":1016,"headshot":1017},{"gitlabHandle":1013,"linkedInProfileUrl":1014},"tmccaslin","https://www.linkedin.com/in/taylormccaslin/","Group Manager, Product - Data Science","Taylor McCaslin est Product Lead IA/ML chez GitLab et supervise les chefs de produit en charge des groupes dédiés aux fonctionnalités d'IA et au cycle de vie des modèles d'IA (ModelOps). Il définit la vision et oriente les processus afin d'intégrer la science des données au programme DevOps de GitLab. Avant de rejoindre GitLab, Taylor a forgé son expérience chez Indeed, Duo Security et WP Engine.",{"altText":1008,"config":1018},{"src":1019},"https://res.cloudinary.com/about-gitlab-com/image/upload/v1751463427/trfasilaeasosxfcxmsm.jpg",{"componentName":495},"taylor-mccaslin","content:fr-fr:the-source:authors:taylor-mccaslin.yml","Taylor Mccaslin","fr-fr/the-source/authors/taylor-mccaslin.yml","fr-fr/the-source/authors/taylor-mccaslin",1753475445569]