{"id":36993,"date":"2025-11-17T23:37:05","date_gmt":"2025-11-18T04:37:05","guid":{"rendered":"https:\/\/staging.systech.ssdev.ca\/?page_id=36993"},"modified":"2025-11-18T00:47:06","modified_gmt":"2025-11-18T05:47:06","slug":"webinar-diversion-and-counterfeiting-uncovering-vulnerabilities","status":"publish","type":"page","link":"https:\/\/staging.systech.ssdev.ca\/fr\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","title":{"rendered":"Webinar | D\u00e9tournement et contrefa\u00e7on : D\u00e9couvrir les vuln\u00e9rabilit\u00e9s"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"36993\" class=\"elementor elementor-36993\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-dce-background-overlay-color=\"#22B8B0\" data-dce-background-image-url=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Systech-anti-counterfeit-wine-webinar-banner_12-2023-1.png\" class=\"elementor-element elementor-element-c45c5ee e-flex e-con-boxed e-con e-parent\" data-id=\"c45c5ee\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6c89efd e-con-full e-flex e-con e-child\" data-id=\"6c89efd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f28def elementor-widget elementor-widget-heading\" data-id=\"1f28def\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">WEBINAIRE \u00c0 LA DEMANDE\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-253b241 elementor-widget elementor-widget-heading\" data-id=\"253b241\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">D\u00e9tournement et contrefa\u00e7on : D\u00e9couvrir les vuln\u00e9rabilit\u00e9s<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b3c4743 e-flex e-con-boxed e-con e-parent\" data-id=\"b3c4743\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bbded74 e-con-full e-flex e-con e-child\" data-id=\"bbded74\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0af81b2 elementor-widget elementor-widget-text-editor\" data-id=\"0af81b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les produits contrefaits d\u00e9passent les fronti\u00e8res. L'impact de la contrefa\u00e7on va au-del\u00e0 des implications financi\u00e8res. Elle pr\u00e9sente des risques pour la sant\u00e9, les moyens de subsistance et bien plus encore, affectant \u00e0 la fois les fabricants, les d\u00e9taillants et les consommateurs.\u00a0<br \/><br \/>Reconna\u00eetre que les efforts de lutte contre le d\u00e9tournement et la contrefa\u00e7on n\u00e9cessitent une approche programmatique, et pas seulement le d\u00e9ploiement d'une technologie. Cette approche n\u00e9cessite d'aligner la strat\u00e9gie, la technologie, l'organisation, la formation et les ressources pour r\u00e9ussir. Il existe un r\u00e9el besoin de collaboration pour aider \u00e0 identifier, tracer et authentifier le bon produit.<br \/><br \/>Dans ce webinaire : \"D\u00e9tournement et contrefa\u00e7on : D\u00e9couvrir les vuln\u00e9rabilit\u00e9s et att\u00e9nuer les risques\", apprenez comment surmonter les obstacles et r\u00e9duire les risques de mani\u00e8re proactive en obtenant une visibilit\u00e9 de la cha\u00eene d'approvisionnement. Rejoignez-nous pour discuter de l'identification des risques de d\u00e9tournement et de contrefa\u00e7on, de la mise en \u0153uvre des meilleures pratiques et de la mani\u00e8re d'impliquer les principales parties prenantes pour obtenir des r\u00e9sultats fructueux.\u00a0<br \/><br \/>Pour faire face \u00e0 ces risques, il faut cr\u00e9er un programme d'entreprise comportant plusieurs niveaux de protection des produits et de la cha\u00eene d'approvisionnement. La tra\u00e7abilit\u00e9 de la cha\u00eene d'approvisionnement et les capacit\u00e9s d'authentification des produits sont essentielles pour lutter contre le d\u00e9tournement et la contrefa\u00e7on. \u00c0 ne pas manquer !<\/p><p>\u00a0<\/p><h3>Objectifs d'apprentissage :<\/h3><ol><li><p>Identifier les endroits de la cha\u00eene d'approvisionnement o\u00f9 le d\u00e9tournement et la contrefa\u00e7on sont les plus probables<\/p><\/li><li><p>Comment impliquer et obtenir le soutien des principales parties prenantes interdisciplinaires ?<\/p><\/li><li><p>Comment utiliser les informations provenant de logiciels et d'outils intelligents pour renforcer les efforts ?<\/p><\/li><li><p>Appliquer les meilleures pratiques pour lutter contre le d\u00e9tournement et la contrefa\u00e7on dans tous les secteurs d'activit\u00e9<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-508bdab e-con-full e-flex e-con e-child\" data-id=\"508bdab\" data-element_type=\"container\">\n\t\t<div data-dce-background-color=\"#F2F2F4\" class=\"elementor-element elementor-element-b652c84 e-con-full e-flex e-con e-child\" data-id=\"b652c84\" data-element_type=\"container\" id=\"content-form\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b23d18f elementor-widget elementor-widget-heading\" data-id=\"b23d18f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Acc\u00e9der au webinaire \u00e0 la demande\n\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cd3bd7 elementor-widget elementor-widget-html\" data-id=\"8cd3bd7\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script src=\"\/\/info.systechone.com\/js\/forms2\/js\/forms2.min.js\"><\/script> <form id=\"mktoForm_1079\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form> <script>MktoForms2.loadForm(\"\/\/info.systechone.com\", \"304-PSB-492\", 1079);<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7af9b99 e-flex e-con-boxed e-con e-parent\" data-id=\"7af9b99\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0cbc36c e-con-full e-flex e-con e-child\" data-id=\"0cbc36c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-605121e elementor-widget elementor-widget-heading\" data-id=\"605121e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Intervenants\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa7f39c e-grid e-con-full e-con e-child\" data-id=\"fa7f39c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-40b4e4c e-con-full e-flex e-con e-child\" data-id=\"40b4e4c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-31ddbbd e-con-full e-flex e-con e-child\" data-id=\"31ddbbd\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-38852a9 e-con-full e-flex e-con e-child\" data-id=\"38852a9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51ab190 dce_masking-none elementor-widget elementor-widget-image\" data-id=\"51ab190\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\" class=\"attachment-medium size-medium wp-image-37030\" alt=\"\" srcset=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg 150w, https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW-12x12.jpg 12w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc3cade e-con-full e-flex e-con e-child\" data-id=\"fc3cade\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-818bcba elementor-widget elementor-widget-heading\" data-id=\"818bcba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Elisabeth Skoda\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c05bde8 elementor-widget elementor-widget-text-editor\" data-id=\"c05bde8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>R\u00e9dacteur en chef, Packaging Europe<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-09dd6c4 e-con-full e-flex e-con e-child\" data-id=\"09dd6c4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e52eb1 elementor-widget elementor-widget-text-editor\" data-id=\"3e52eb1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Apr\u00e8s avoir travaill\u00e9 dans le domaine de la traduction et de l'\u00e9dition d'actualit\u00e9s en ligne, Elisabeth travaille pour Packaging Europe depuis 2006. Pendant cette p\u00e9riode, elle a acquis une large compr\u00e9hension de l'industrie de l'emballage et une appr\u00e9ciation des nombreuses innovations et d\u00e9veloppements qui ont vu le jour au fil des ans.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f766688 e-con-full e-flex e-con e-child\" data-id=\"f766688\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-829e337 elementor-widget elementor-widget-heading\" data-id=\"829e337\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">H\u00f4te<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f964c3 e-grid e-con-full e-con e-child\" data-id=\"6f964c3\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-174c61f e-con-full e-flex e-con e-child\" data-id=\"174c61f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3d83f28 e-con-full e-flex e-con e-child\" data-id=\"3d83f28\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5dcf36e e-con-full e-flex e-con e-child\" data-id=\"5dcf36e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e4bd43 dce_masking-none elementor-widget elementor-widget-image\" data-id=\"7e4bd43\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Dave-DeJean_BW.jpg\" class=\"attachment-medium size-medium wp-image-37022\" alt=\"\" srcset=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Dave-DeJean_BW.jpg 150w, https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Dave-DeJean_BW-12x12.jpg 12w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53aa1ae e-con-full e-flex e-con e-child\" data-id=\"53aa1ae\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5669dcf elementor-widget elementor-widget-heading\" data-id=\"5669dcf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Dave DeJean\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dedea9 elementor-widget elementor-widget-text-editor\" data-id=\"4dedea9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Vice-pr\u00e9sident, Comptes strat\u00e9giques mondiaux, Systech<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f2dc41d e-con-full e-flex e-con e-child\" data-id=\"f2dc41d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0e8a916 elementor-widget elementor-widget-text-editor\" data-id=\"0e8a916\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dave DeJean est responsable des opportunit\u00e9s commerciales strat\u00e9giques de Systech. Il soutient et \u00e9duque les clients et les parties prenantes sur les meilleures pratiques pour la mise en \u0153uvre de solutions de s\u00e9rialisation, de tra\u00e7abilit\u00e9 et d'authentification d'entreprise. Dave a plus de 35 ans de connaissance du march\u00e9 et d'exp\u00e9rience pratique dans le d\u00e9veloppement de solutions et la m\u00e9thodologie de projet pour la conformit\u00e9 r\u00e9glementaire, la protection de la marque et la tra\u00e7abilit\u00e9 de la cha\u00eene d'approvisionnement. Il est expert en mati\u00e8re de syst\u00e8mes d'ex\u00e9cution d'emballages, d'identification de produits et de transparence de la cha\u00eene d'approvisionnement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>WEBINAR ON-DEMAND D\u00e9tournement et contrefa\u00e7on : D\u00e9couvrir les vuln\u00e9rabilit\u00e9s Les produits contrefaits d\u00e9passent les fronti\u00e8res. L'impact de la contrefa\u00e7on va au-del\u00e0 des implications financi\u00e8res. Elle pr\u00e9sente des risques pour la sant\u00e9, les moyens de subsistance et bien plus encore, affectant \u00e0 la fois les fabricants, les d\u00e9taillants et les consommateurs.  Il faut reconna\u00eetre que les efforts de lutte contre le d\u00e9tournement et la contrefa\u00e7on n\u00e9cessitent une approche programmatique, et pas seulement un d\u00e9ploiement technologique. Cette approche n\u00e9cessite d'aligner la strat\u00e9gie, la technologie, l'organisation, la formation et [...]<\/p>","protected":false},"author":41,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-36993","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech<\/title>\n<meta name=\"description\" content=\"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.systech.ssdev.ca\/fr\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech\" \/>\n<meta property=\"og:description\" content=\"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.systech.ssdev.ca\/fr\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Systech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/systechone\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T05:47:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@systechone\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\",\"name\":\"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech\",\"isPartOf\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\",\"datePublished\":\"2025-11-18T04:37:05+00:00\",\"dateModified\":\"2025-11-18T05:47:06+00:00\",\"description\":\"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends\",\"breadcrumb\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\",\"contentUrl\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/staging.systech.ssdev.ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#website\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/\",\"name\":\"Systech\",\"description\":\"a solutions division of Markem-Imaje\",\"publisher\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.systech.ssdev.ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#organization\",\"name\":\"Systech International\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png\",\"contentUrl\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png\",\"width\":551,\"height\":124,\"caption\":\"Systech International\"},\"image\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/systechone\/\",\"https:\/\/x.com\/systechone\",\"https:\/\/www.linkedin.com\/company\/systech-international\",\"https:\/\/www.youtube.com\/channel\/UC1fz6UKo5eMa1WxgVMGRhpA\/videos\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech","description":"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.systech.ssdev.ca\/fr\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","og_locale":"fr_FR","og_type":"article","og_title":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech","og_description":"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends","og_url":"https:\/\/staging.systech.ssdev.ca\/fr\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","og_site_name":"Systech","article_publisher":"https:\/\/www.facebook.com\/systechone\/","article_modified_time":"2025-11-18T05:47:06+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@systechone","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","url":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","name":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech","isPartOf":{"@id":"https:\/\/staging.systech.ssdev.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg","datePublished":"2025-11-18T04:37:05+00:00","dateModified":"2025-11-18T05:47:06+00:00","description":"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends","breadcrumb":{"@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage","url":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg","contentUrl":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.systech.ssdev.ca\/"},{"@type":"ListItem","position":2,"name":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/staging.systech.ssdev.ca\/#website","url":"https:\/\/staging.systech.ssdev.ca\/","name":"Systech","description":"a solutions division of Markem-Imaje","publisher":{"@id":"https:\/\/staging.systech.ssdev.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.systech.ssdev.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/staging.systech.ssdev.ca\/#organization","name":"Systech International","url":"https:\/\/staging.systech.ssdev.ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/","url":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png","contentUrl":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png","width":551,"height":124,"caption":"Systech International"},"image":{"@id":"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/systechone\/","https:\/\/x.com\/systechone","https:\/\/www.linkedin.com\/company\/systech-international","https:\/\/www.youtube.com\/channel\/UC1fz6UKo5eMa1WxgVMGRhpA\/videos"]}]}},"_links":{"self":[{"href":"https:\/\/staging.systech.ssdev.ca\/fr\/wp-json\/wp\/v2\/pages\/36993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.systech.ssdev.ca\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.systech.ssdev.ca\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.systech.ssdev.ca\/fr\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.systech.ssdev.ca\/fr\/wp-json\/wp\/v2\/comments?post=36993"}],"version-history":[{"count":16,"href":"https:\/\/staging.systech.ssdev.ca\/fr\/wp-json\/wp\/v2\/pages\/36993\/revisions"}],"predecessor-version":[{"id":37079,"href":"https:\/\/staging.systech.ssdev.ca\/fr\/wp-json\/wp\/v2\/pages\/36993\/revisions\/37079"}],"wp:attachment":[{"href":"https:\/\/staging.systech.ssdev.ca\/fr\/wp-json\/wp\/v2\/media?parent=36993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}