 {"id":4473,"date":"2022-02-03T12:25:21","date_gmt":"2022-02-03T11:25:21","guid":{"rendered":"https:\/\/securityaccent.com\/serviceataglance\/our-consulting-services-at-a-glance-6-2\/"},"modified":"2026-02-05T09:05:14","modified_gmt":"2026-02-05T08:05:14","slug":"our-consulting-services-at-a-glance-6-2","status":"publish","type":"serviceataglance","link":"https:\/\/securityaccent.com\/fr\/serviceataglance\/our-consulting-services-at-a-glance-6-2\/","title":{"rendered":"Conseil strat\u00e9gique en conformit\u00e9"},"content":{"rendered":"<p>Nous vous aidons \u00e0 contr\u00f4ler et pr\u00e9venir les \u00e9checs d\u2019audit, tout en contribuant \u00e0 la mise en place de solutions IDM efficaces et conformes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nous vous aidons \u00e0 contr\u00f4ler et pr\u00e9venir les \u00e9checs d\u2019audit, tout en contribuant \u00e0 la mise en place de solutions IDM efficaces et conformes.<\/p>\n","protected":false},"author":6,"featured_media":2462,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","format":"standard","meta":{"_acf_changed":false,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-4473","serviceataglance","type-serviceataglance","status-publish","format-standard","has-post-thumbnail","hentry","service_at_glance_categories-identity-governance"],"acf":[],"_links":{"self":[{"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/serviceataglance\/4473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/serviceataglance"}],"about":[{"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/types\/serviceataglance"}],"author":[{"embeddable":true,"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/comments?post=4473"}],"version-history":[{"count":2,"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/serviceataglance\/4473\/revisions"}],"predecessor-version":[{"id":4489,"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/serviceataglance\/4473\/revisions\/4489"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/media\/2462"}],"wp:attachment":[{"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/media?parent=4473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}