Image Interview of Abeer Khedr, Information Security Director
Secops
11.02.20 Secops
Interview of Abeer Khedr, Information Security Director
Read
01
MIN
Image Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”
Cybercrime
10.30.20 Cybercrime
Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”
Read
02
MIN
Image 9/12/2021: #DigitalTrends Presidential J-500
10.29.20
9/12/2021: #DigitalTrends Presidential J-500
Read
01
MIN
Image Data at the Epicenter of Investigation
Digital transformation
Data at the Epicenter of Investigation
Read
07
MIN
Image PPP in the Netherlands: the right approach to deal with online abuse
Cybercrime
10.28.20 Cybercrime
PPP in the Netherlands: the right approach to deal with online abuse
Read
03
MIN
Image 28/10 - Breakfast: "Invalidation of the Privacy Shield, a chance for Europe"
10.14.20
28/10 – Breakfast: “Invalidation of the Privacy Shield, a chance for Europe”
Read
01
MIN
Image 08/10/20: Launch of the Trust Valley
10.02.20
08/10/20: Launch of the Trust Valley
Read
01
MIN
Image 1/10/2020 : WEBINAR  Dependencies and dominances in the cyberspace: what solutions to become more autonomous and develop our sovereignty?
09.30.20
1/10/2020 : WEBINAR Dependencies and dominances in the cyberspace: what solutions to become more autonomous and develop our sovereignty?
Read
01
MIN
Image 16/09: “From vulnerability management to risk management”
09.30.20
16/09: “From vulnerability management to risk management”
Read
01
MIN
Image Interview of Maarten Van Horenbeeck, FIC Advisory Board Member
Cybercrime
09.29.20 Cybercrime
Interview of Maarten Van Horenbeeck, FIC Advisory Board Member
Read
04
MIN
Image The European Union Imposes Its First Ever Sanctions Against Cyber-attacks
Digital Sovereignty
The European Union Imposes Its First Ever Sanctions Against Cyber-attacks
Read
07
MIN
Image EncroChat: Deciphering of the End-to-End Encryption Service Used by Criminals
Cybercrime
07.15.20 Cybercrime
EncroChat: Deciphering of the End-to-End Encryption Service Used by Criminals
Read
03
MIN
Image Tracing, not Tracking
Digital Sovereignty
Tracing, not Tracking
Read
04
MIN
Image Towards a Post-Digital Era ?
Digital transformation
Towards a Post-Digital Era ?
Read
05
MIN
Image The "right to be forgotten", a relative right
Digital Sovereignty
The “right to be forgotten”, a relative right
Read
02
MIN
Image For a collective and collaborative cybersecurity!
04.09.20
For a collective and collaborative cybersecurity!
Read
03
MIN
Image Continuous Improvement: How do Counterproductive Routines Linger On In Security "best practices"?
Secops
04.09.20 Secops
Continuous Improvement: How do Counterproductive Routines Linger On In Security “best practices”?
Read
06
MIN
Image Training the Swiss Police
Cybercrime
03.05.20 Cybercrime
Training the Swiss Police
Read
05
MIN
Image Cybersecurity: The 10 Key Trends for 2020
Digital transformation
Cybersecurity: The 10 Key Trends for 2020
Read
03
MIN
Image Presentation of the EBIOS Risk Manager method
Risks management
03.05.20 Risks management
Presentation of the EBIOS Risk Manager method
Read
06
MIN
Image FIC 2021: Building a 'Common' Digital Space
03.05.20
FIC 2021: Building a ‘Common’ Digital Space
Read
03
MIN