Image 08/10/20: Launch of the Trust Valley
10.02.20
08/10/20: Launch of the Trust Valley
Read
01
MIN
Image 1/10/2020 : WEBINAR  Dependencies and dominances in the cyberspace: what solutions to become more autonomous and develop our sovereignty?
09.30.20
1/10/2020 : WEBINAR Dependencies and dominances in the cyberspace: what solutions to become more autonomous and develop our sovereignty?
Read
01
MIN
Image 16/09: “From vulnerability management to risk management”
09.30.20
16/09: “From vulnerability management to risk management”
Read
01
MIN
Image Interview of Maarten Van Horenbeeck, FIC Advisory Board Member
Cybercrime
09.29.20 Cybercrime
Interview of Maarten Van Horenbeeck, FIC Advisory Board Member
Read
04
MIN
Image The European Union Imposes Its First Ever Sanctions Against Cyber-attacks
Digital Sovereignty
The European Union Imposes Its First Ever Sanctions Against Cyber-attacks
Read
07
MIN
Image EncroChat: Deciphering of the End-to-End Encryption Service Used by Criminals
Cybercrime
07.15.20 Cybercrime
EncroChat: Deciphering of the End-to-End Encryption Service Used by Criminals
Read
03
MIN
Image Tracing, not Tracking
Digital Sovereignty
Tracing, not Tracking
Read
04
MIN
Image Towards a Post-Digital Era ?
Digital transformation
Towards a Post-Digital Era ?
Read
05
MIN
Image The "right to be forgotten", a relative right
Digital Sovereignty
The “right to be forgotten”, a relative right
Read
02
MIN
Image For a collective and collaborative cybersecurity!
04.09.20
For a collective and collaborative cybersecurity!
Read
03
MIN
Image Continuous Improvement: How do Counterproductive Routines Linger On In Security "best practices"?
Secops
04.09.20 Secops
Continuous Improvement: How do Counterproductive Routines Linger On In Security “best practices”?
Read
06
MIN
Image Training the Swiss Police
Cybercrime
03.05.20 Cybercrime
Training the Swiss Police
Read
05
MIN
Image Cybersecurity: The 10 Key Trends for 2020
Digital transformation
Cybersecurity: The 10 Key Trends for 2020
Read
03
MIN
Image Presentation of the EBIOS Risk Manager method
Risks management
03.05.20 Risks management
Presentation of the EBIOS Risk Manager method
Read
06
MIN
Image FIC 2021: Building a 'Common' Digital Space
03.05.20
FIC 2021: Building a ‘Common’ Digital Space
Read
03
MIN
Image Cybersecurity: Siemens’ Commitment
01.22.20
Cybersecurity: Siemens’ Commitment
Read
03
MIN
Image Ransomware in Six Questions
Secops
01.22.20 Secops
Ransomware in Six Questions
Read
03
MIN
Image Business Email Compromise: A scourge with a no-brainer defense (by Klara Jordan, Global Cybersecurity Alliance & Rois Ni Thuama, Redsift)
Secops
01.22.20 Secops
Business Email Compromise: A scourge with a no-brainer defense (by Klara Jordan, Global Cybersecurity Alliance & Rois Ni Thuama, Redsift)
Read
07
MIN
Image Making Humans the Strong Link in the IS Defence Chain (by Cyril Bras, CISO, Grenoble-Alpes Métropole)
Risks management
01.22.20 Risks management
Making Humans the Strong Link in the IS Defence Chain (by Cyril Bras, CISO, Grenoble-Alpes Métropole)
Read
04
MIN
Image How the SPARTA Network strengthens EU’s cybersecurity capacities
Cyber stability
01.22.20 Cyber stability
How the SPARTA Network strengthens EU’s cybersecurity capacities
Read
05
MIN
Image Towards European digital sovereignty (by DG Connect, European Commission)
12.23.19
Towards European digital sovereignty (by DG Connect, European Commission)
Read
03
MIN