[{"data":1,"prerenderedAt":347},["Reactive",2],{"menuQuery_fr":3,"settingsQuery_fr":190,"routerQuery_/security-engagement-kit_fr":196},{"data":4,"loading":188,"networkStatus":189},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":121,"footer_menu_external_links":142,"footer_menu_meta":170},{"__typename":6,"name":7,"items":8},"Menu","Navigation principale",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Compétences",{"__typename":13,"path":14},"Url","/fr/competences",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cybersécurité",{"__typename":13,"path":19},"/fr/competences/cyber-securite",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/fr/node/219",[],{"__typename":10,"title":27,"url":28,"children":30},"Service juridique et acquisitions",{"__typename":13,"path":29},"/fr/competences/procurement-legal",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/fr/competences/identite-numerique",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/fr/competences/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Réseau de la recherche",{"__typename":13,"path":44},"/fr/competences/reseau-de-recherche",[],{"__typename":10,"title":47,"url":48,"children":50},"Solutions",{"__typename":13,"path":49},"/fr/solutions",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/fr/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communities",{"__typename":13,"path":59},"/fr/switch-communities",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/fr/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"À propos de nous",{"__typename":13,"path":69},"/fr/propos-de-nous",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Notre fondation",{"__typename":13,"path":74},"/fr/about/notre-fondation",[],{"__typename":10,"title":77,"url":78,"children":80},"Politique de l'enseignement superieur",{"__typename":13,"path":79},"/fr/politique-de-l-enseignement-superieur",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovations",{"__typename":13,"path":84},"/fr/node/407",[],{"__typename":10,"title":87,"url":88,"children":90},"Collaborations",{"__typename":13,"path":89},"/fr/Collaborations-mise",[],{"__typename":10,"title":92,"url":93,"children":95},"Emplois",{"__typename":13,"path":94},"/fr/emplois",[],{"__typename":10,"title":97,"url":98,"children":100},"Contactez-nous",{"__typename":13,"path":99},"/fr/contact",[],{"__typename":6,"name":102,"items":103},"Footer Column 1",[104,107,111,115,118],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":108,"url":109,"children":110},"Services cloud",{"__typename":13,"path":24},[],{"__typename":10,"title":112,"url":113,"children":114},"Identité numérique",{"__typename":13,"path":34},[],{"__typename":10,"title":27,"url":116,"children":117},{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":119,"children":120},{"__typename":13,"path":39},[],{"__typename":6,"name":122,"items":123},"Footer Column 2",[124,127,130,133,137],{"__typename":10,"title":42,"url":125,"children":126},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":128,"children":129},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":131,"children":132},{"__typename":13,"path":64},[],{"__typename":10,"title":134,"url":135,"children":136}," A propos de nous",{"__typename":13,"path":74},[],{"__typename":10,"title":138,"url":139,"children":141},"Newsletter",{"__typename":13,"path":140},"/fr/newsletter",[],{"__typename":6,"name":143,"items":144},"Footer Column 3 (External Links)",[145,150,155,160,165],{"__typename":10,"title":146,"url":147,"children":149},"nic.ch",{"__typename":13,"path":148},"https://www.nic.ch/",[],{"__typename":10,"title":151,"url":152,"children":154},"nic.li",{"__typename":13,"path":153},"https://www.nic.li/",[],{"__typename":10,"title":156,"url":157,"children":159},"eduid.ch",{"__typename":13,"path":158},"https://eduid.ch/",[],{"__typename":10,"title":161,"url":162,"children":164},"eduhub.ch",{"__typename":13,"path":163},"https://www.eduhub.ch/",[],{"__typename":10,"title":166,"url":167,"children":169},"Community Portal",{"__typename":13,"path":168},"https://portal.switch.ch/",[],{"__typename":6,"name":171,"items":172},"Copyright",[173,178,183],{"__typename":10,"title":174,"url":175,"children":177},"Juridique",{"__typename":13,"path":176},"/fr/juridique",[],{"__typename":10,"title":179,"url":180,"children":182},"Mentions légales",{"__typename":13,"path":181},"/fr/mentions-legales",[],{"__typename":10,"title":184,"url":185,"children":187},"Protection et sécurité des données",{"__typename":13,"path":186},"/fr/protection-des-donnees",[],false,7,{"data":191,"loading":188,"networkStatus":189},{"settings":192},{"__typename":193,"site_name":194,"slogan":195},"SiteSettings","Switch","",{"data":197,"loading":188,"networkStatus":189},{"router":198},{"__typename":199,"entity":200},"EntityResponse",{"__typename":201,"_id":202,"nid":203,"title":204,"langcode":205,"alternates":206,"breadcrumb":220,"seo_information":221,"content_elements":225,"lead":345,"background_color":346,"teaser_title":204,"teaser_subtitle":220,"teaser_text":345},"DetailPage","42034182-756a-4340-8353-d195380ffcab",506,"Security Engagement Kit","fr",[207,211,214,217],{"__typename":208,"language_id":209,"url":210},"AlternatePathItem","EN","/en/security-engagement-kit",{"__typename":208,"language_id":212,"url":213},"DE","/de/security-engagement-kit",{"__typename":208,"language_id":215,"url":216},"IT","/it/security-engagement-kit",{"__typename":208,"language_id":218,"url":219},"FR","/fr/security-engagement-kit",null,{"__typename":222,"meta_description":223,"meta_name_robots":195,"canonical":219,"page_title":224,"keywords":195,"hreflang":205},"SeoInformation","Impliquer les collaborateurs dans la sécurité ? Le Security Engagement Kit est conçu précisément pour cela. Fondé sur des données probantes. Personnalisable. Accompagné par des experts, de l’évaluation initiale au suivi régulier.","Security Engagement Kit | Switch",[226,231,265,288,293],{"__typename":227,"_id":228,"paragraph_id":229,"title":220,"text":230},"TextItem","f80695f0-ad86-4c4b-ac6a-f903c391c35a",3498,"\u003Cp>Le\u003Cstrong> Security Engagement Kit\u003C/strong> est un programme personnalisé, prêt à l’emploi et fondé sur des données probantes, qui réduit la complexité et favorise le changement de comportement. Il se concentre sur les comportements clés et offre aux collaborateurs les capacités nécessaires, c’est à dire les connaissances et compétences, les conditions adéquates comme les outils et processus, ainsi que la motivation pour les mettre en pratique, au travail comme dans la vie privée. Les personnes développent ainsi leurs compétences en sécurité numérique et s’engagent activement.\u003C/p>\u003Cp>Contrairement aux plateformes d’e-learning isolées ou aux projets de conseil de grande envergure, le Security Engagement Kit combine la simplicité des solutions d’e-learning avec l’efficacité de mesures de communication multicanales. Il propose un portefeuille de services à fort impact et facile à planifier, permettant aux responsables de la sécurité de se concentrer sur leurs responsabilités principales.\u003C/p>",{"__typename":232,"_id":233,"paragraph_id":234,"title":235,"intro":236,"fact_list_type":237,"facts":238},"FactsList","9b3d0cfd-f88f-4198-94ad-407ebbf29ef0",3504,"Un programme flexible conçu autour de vos besoins","\u003Cp>Notre solution combine cinq modules avec une gamme de composants personnalisables, proposés via un abonnement simple.\u003C/p>","icon",[239,245,250,255,260],{"__typename":240,"id":241,"title":242,"text":243,"icon_name":244,"image":220,"link":220},"Fact",3499,"I: Kick-off ","\u003Cp>Planifier. Analyser les obstacles. Définir la démarche.\u003C/p>","screen-users",{"__typename":240,"id":246,"title":247,"text":248,"icon_name":249,"image":220,"link":220},3500,"II: Informer et former","\u003Cp>Former. Combler les lacunes en connaissances et compétences.\u003C/p>","scroll-old",{"__typename":240,"id":251,"title":252,"text":253,"icon_name":254,"image":220,"link":220},3501,"III: Security Adventures ","\u003Cp>Motiver. Créer de la pertinence par l’expérience.\u003C/p>","roller-coaster",{"__typename":240,"id":256,"title":257,"text":258,"icon_name":259,"image":220,"link":220},3502,"IV: Outils et processus","\u003Cp>Permettre. Mettre en place les bonnes structures et conditions.\u003C/p>","toolbox",{"__typename":240,"id":261,"title":262,"text":263,"icon_name":264,"image":220,"link":220},3503,"V: Évaluation","\u003Cp>Évaluer. Mesurer ce qui a évolué.\u003C/p>","rocket-launch",{"__typename":266,"_id":267,"paragraph_id":268,"title":220,"items":269},"ImageTextList","470b10ab-c521-4ee2-8aaf-9016b27f32c0",3506,[270],{"__typename":271,"id":272,"_id":273,"title":274,"text":275,"cta":220,"cta_style":276,"image":277},"ImageTextItem",3505,"50d1d6f7-d442-401c-9739-a28202d3294b","Un seul abonnement.","\u003Cp>Accompagnement par des experts tout au long du processus. Conçu pour les responsables de la sécurité qui ont besoin de résultats, pas de programmes supplémentaires à gérer.\u003C/p>","primary",{"__typename":278,"src":279,"sources":280,"width":285,"height":285,"alt":286,"type":287,"caption":220},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/adventures.jpg?itok=atgN-1ED",[281],{"__typename":282,"src":283,"media":220,"sizes":284},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-03/adventures.jpg?itok=atgN-1ED 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-03/adventures.jpg?itok=YS1DIlzO 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-03/adventures.jpg?itok=B8-4LxKh 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-03/adventures.jpg?itok=pywu76Fk 1230w","(min-width: 984px) 51vw, 95vw",600,"security engagement kit","image/jpeg",{"__typename":227,"_id":289,"paragraph_id":290,"title":291,"text":292},"2cd06956-d37e-45b7-a518-b4d098d28aae",3507,"Security Adventures – Apprendre à penser comme un hacker","\u003Cp>Créez un engagement durable grâce à des expériences de sécurité pratiques : « Hack The Hacker » dans l’escape room, « Track The Hacker » lors d’une quête en extérieur, sauvez les vidéos de chats dans notre « Security Arcade » ou tentez d’obtenir votre « Piece of Cake » dans notre jeu de rôle sur table.\u003C/p>\u003Cp>Pour en savoir plus ici: &nbsp;\u003Ca href=\"https://www.switch.ch/en/security-adventures\">\u003Cspan style=\"font-family:&quot;Euclid Circular B&quot;,sans-serif;\" lang=\"EN-GB\">Security Adventures\u003C/span>\u003C/a>\u003C/p>\u003Cp>\u003Cbr>Vous souhaitez en savoir plus ? Notre équipe d’experts est là pour \u003Cstrong>vous!\u003C/strong>\u003C/p>",{"__typename":294,"_id":295,"paragraph_id":296,"title":297,"contact_boxes":298},"ContactBoxList","897c7d04-73c9-4c8a-83cc-0aafcd626c11",3515,"Des questions ?",[299,312,322,334],{"__typename":300,"name":301,"image":302,"phone_number":220,"e_mail_address":310,"job_title":311,"organisation":220},"ContactBox","Katja Dörlemann, PhD",{"__typename":278,"src":303,"sources":304,"width":285,"height":285,"alt":308,"type":309,"caption":220},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2025-09/katja_webb-1_1.png?itok=09sAvBcf",[305],{"__typename":282,"src":306,"media":220,"sizes":307},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2025-09/katja_webb-1_1.png?itok=76EUDSVb 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2025-09/katja_webb-1_1.png?itok=09sAvBcf 640w","100vw"," x","image/png","katja.doerlemann@switch.ch","Expert Human-Centred Security",{"__typename":300,"name":313,"image":314,"phone_number":220,"e_mail_address":321,"job_title":311,"organisation":220},"Cornelia Puhze ",{"__typename":278,"src":315,"sources":316,"width":319,"height":319,"alt":320,"type":287,"caption":320},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2024-08/cornelia-puhze-switch.jpg?itok=3pWyFm2f",[317],{"__typename":282,"src":318,"media":220,"sizes":307},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2024-08/cornelia-puhze-switch.jpg?itok=i_Z93KJr 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2024-08/cornelia-puhze-switch.jpg?itok=3pWyFm2f 640w",3730,"Cornelia Puhze, Security Awareness Specialist at Switch","cornelia.puhze@switch.ch",{"__typename":300,"name":323,"image":324,"phone_number":220,"e_mail_address":332,"job_title":333,"organisation":220},"Fabio Greiner ",{"__typename":278,"src":325,"sources":326,"width":329,"height":330,"alt":331,"type":287,"caption":220},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/website.jpg?itok=GGXIVwYC",[327],{"__typename":282,"src":328,"media":220,"sizes":307},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2026-03/website.jpg?itok=R7iT5ZGS 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/website.jpg?itok=GGXIVwYC 640w",4937,3840,"Fabio Greiner","Fabio.Greiner@switch.ch","Specialist Human-Centred Security",{"__typename":300,"name":335,"image":336,"phone_number":220,"e_mail_address":343,"job_title":344,"organisation":220},"Céline Neubig",{"__typename":278,"src":337,"sources":338,"width":341,"height":341,"alt":342,"type":287,"caption":220},"https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/celine.jpg?itok=iLy3FaOm",[339],{"__typename":282,"src":340,"media":220,"sizes":307},"https://static.www.switch.ch/sites/default/files/styles/square_small_1_5x/public/2026-03/celine.jpg?itok=E2Mlklw1 270w, https://static.www.switch.ch/sites/default/files/styles/square_small/public/2026-03/celine.jpg?itok=iLy3FaOm 640w",400,"celine n","celine.neubig@switch.ch","Educational Game Design","Impliquer les collaborateurs dans la sécurité ? Le Security Engagement Kit est conçu précisément pour cela. Fondé sur des données probantes. Personnalisable. Accompagné par des experts, de l’évaluation initiale au suivi régulier.\r\n","purple-red",1776426981002]