Image FIC 2020: Putting Human Beings at the Heart of Cybersecurity
05.09.19
FIC 2020: Putting Human Beings at the Heart of Cybersecurity
Read
02
MIN
Image 21/05 - FIC OBSERVATORY BREAKFAST: Is Lockergoga the new Wannacry ?
05.09.19
21/05 – FIC OBSERVATORY BREAKFAST: Is Lockergoga the new Wannacry ?
Read
01
MIN
Image An overview of the European Union’s current strategies, policies and concepts on cyber
Cyber stability
05.07.19 Cyber stability
An overview of the European Union’s current strategies, policies and concepts on cyber
Read
24
MIN
Image How are your Emotions Manipulated through Social Networks? (by Guy Philippe Goldstein)
Digital transformation
How are your Emotions Manipulated through Social Networks? (by Guy Philippe Goldstein)
Read
01
MIN
Image Is the Privacy Shield on borrowed time?
Digital Sovereignty
Is the Privacy Shield on borrowed time?
Read
04
MIN
Image Artificial Intelligence: A "Game Changer" for Cyber Defence
Risks management
06.28.18 Risks management
Artificial Intelligence: A “Game Changer” for Cyber Defence
Read
08
MIN
Image A month after GDPR
Digital Sovereignty
A month after GDPR
Read
02
MIN
Image Lost in the Cloud? Law Enforcement Cross-border Access to Data After the “Clarifying Lawful Overseas Use of Data” (CLOUD) Act and E-Evidence
Digital Sovereignty
Lost in the Cloud? Law Enforcement Cross-border Access to Data After the “Clarifying Lawful Overseas Use of Data” (CLOUD) Act and E-Evidence
Read
11
MIN
Image The CLOUD Act, the latest American law that speaks volumes (by Olivier Iteanu, Lawyer)
Digital transformation
The CLOUD Act, the latest American law that speaks volumes (by Olivier Iteanu, Lawyer)
Read
03
MIN
Image French-speaking Darkweb : myths and realities (Paul Barbaste, CEIS)
Cybercrime
05.30.18 Cybercrime
French-speaking Darkweb : myths and realities (Paul Barbaste, CEIS)
Read
05
MIN
Image Type Softly, Carry a Big Gun
Cyber stability
04.30.18 Cyber stability
Type Softly, Carry a Big Gun
Read
05
MIN
Image Investment in cybersecurity: an upturn?
Digital transformation
Investment in cybersecurity: an upturn?
Read
05
MIN
Image Shipping and cybersecurity
Cyber stability
04.30.18 Cyber stability
Shipping and cybersecurity
Read
04
MIN
Image Facebook: a move towards questioning the model?
Digital transformation
Facebook: a move towards questioning the model?
Read
04
MIN
Image CYBERSECURITY, AN ISSUE THAT MUST BE SHARED AT ALL LEVELS OF HIERARCHY
Cyber stability
03.21.18 Cyber stability
CYBERSECURITY, AN ISSUE THAT MUST BE SHARED AT ALL LEVELS OF HIERARCHY
Read
01
MIN
Image Sporting Events and New Technologies: Opportunities and Threats (By Vincent Riou, CEIS)
Cybercrime
03.21.18 Cybercrime
Sporting Events and New Technologies: Opportunities and Threats (By Vincent Riou, CEIS)
Read
08
MIN
Image Cyberprotection of Industrial Control Systems: a Model-Based Approach to Detect and Respond to Cyberattacks
Secops
03.21.18 Secops
Cyberprotection of Industrial Control Systems: a Model-Based Approach to Detect and Respond to Cyberattacks
Read
08
MIN
Image The maritime industry and cyber risk (by Brice Ducoum, Groupe EYSSAUTIER)
Digital Sovereignty
The maritime industry and cyber risk (by Brice Ducoum, Groupe EYSSAUTIER)
Read
05
MIN
Image How 4chan and The_Donald Influence the Fake News Ecosystem (By Jeremy Blackburn, University of Alabama at Birmingham)
Digital transformation
How 4chan and The_Donald Influence the Fake News Ecosystem (By Jeremy Blackburn, University of Alabama at Birmingham)
Read
09
MIN
Image CrossCheck: An Initiative to Protect the French Presidential Elections from Fake News (Walid Salem, Rue 89)
Digital transformation
CrossCheck: An Initiative to Protect the French Presidential Elections from Fake News (Walid Salem, Rue 89)
Read
05
MIN
Image Vulnerability management: act before it is too late (By Sergio Loureiro, SecludIT)
Risks management
01.13.18 Risks management
Vulnerability management: act before it is too late (By Sergio Loureiro, SecludIT)
Read
04
MIN