 {"id":4487,"date":"2021-12-10T14:06:24","date_gmt":"2021-12-10T14:06:24","guid":{"rendered":"https:\/\/securityaccent.com\/serviceataglance\/our-consulting-services-at-a-glance-1\/"},"modified":"2026-02-05T09:01:28","modified_gmt":"2026-02-05T08:01:28","slug":"our-consulting-services-at-a-glance-1","status":"publish","type":"serviceataglance","link":"https:\/\/securityaccent.com\/fr\/serviceataglance\/our-consulting-services-at-a-glance-1\/","title":{"rendered":"Gouvernance de programme"},"content":{"rendered":"<p>Nous vous aidons \u00e0 atteindre une visibilit\u00e9 compl\u00e8te des identit\u00e9s num\u00e9riques \u00e0 l\u2019\u00e9chelle de l\u2019entreprise.<br \/>\nMise en \u0153uvre des meilleures pratiques<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nous vous aidons \u00e0 atteindre une visibilit\u00e9 compl\u00e8te des identit\u00e9s num\u00e9riques \u00e0 l\u2019\u00e9chelle de l\u2019entreprise. Mise en \u0153uvre des meilleures pratiques<\/p>\n","protected":false},"author":6,"featured_media":2450,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","format":"standard","meta":{"_acf_changed":false,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-4487","serviceataglance","type-serviceataglance","status-publish","format-standard","has-post-thumbnail","hentry","service_at_glance_categories-identity-governance"],"acf":[],"_links":{"self":[{"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/serviceataglance\/4487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/serviceataglance"}],"about":[{"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/types\/serviceataglance"}],"author":[{"embeddable":true,"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/comments?post=4487"}],"version-history":[{"count":1,"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/serviceataglance\/4487\/revisions"}],"predecessor-version":[{"id":4488,"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/serviceataglance\/4487\/revisions\/4488"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/media\/2450"}],"wp:attachment":[{"href":"https:\/\/securityaccent.com\/fr\/wp-json\/wp\/v2\/media?parent=4487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}