Image Doctolib, COVID vaccination appointment and GDRP
Digital identity
04.14.21 Digital identity
Doctolib, COVID vaccination appointment and GDRP
Read
05
MIN
Image To be adequate or not…
Digital Sovereignty
To be adequate or not…
Read
03
MIN
Image Realities and perspectives of the structuring of the Franco-German and European cloud
Digital Sovereignty
Realities and perspectives of the structuring of the Franco-German and European cloud
Read
15
MIN
Image Alicem Mobile App Validated by the French Conseil d'Etat
Digital Sovereignty
Alicem Mobile App Validated by the French Conseil d’Etat
Read
05
MIN
Image Interview of Abeer Khedr, Information Security Director
Secops
11.02.20 Secops
Interview of Abeer Khedr, Information Security Director
Read
01
MIN
Image Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”
Cybercrime
10.30.20 Cybercrime
Obs Breakfast: “Cybersecurity, an asset in corporate communication and marketing?”
Read
02
MIN
Image 9/12/2021: #DigitalTrends Presidential J-500
10.29.20
9/12/2021: #DigitalTrends Presidential J-500
Read
01
MIN
Image Data at the Epicenter of Investigation
Digital transformation
Data at the Epicenter of Investigation
Read
07
MIN
Image PPP in the Netherlands: the right approach to deal with online abuse
Cybercrime
10.28.20 Cybercrime
PPP in the Netherlands: the right approach to deal with online abuse
Read
03
MIN
Image 28/10 - Breakfast: "Invalidation of the Privacy Shield, a chance for Europe"
10.14.20
28/10 – Breakfast: “Invalidation of the Privacy Shield, a chance for Europe”
Read
01
MIN
Image 08/10/20: Launch of the Trust Valley
10.02.20
08/10/20: Launch of the Trust Valley
Read
01
MIN
Image 1/10/2020 : WEBINAR  Dependencies and dominances in the cyberspace: what solutions to become more autonomous and develop our sovereignty?
09.30.20
1/10/2020 : WEBINAR Dependencies and dominances in the cyberspace: what solutions to become more autonomous and develop our sovereignty?
Read
01
MIN
Image 16/09: “From vulnerability management to risk management”
09.30.20
16/09: “From vulnerability management to risk management”
Read
01
MIN
Image Interview of Maarten Van Horenbeeck, FIC Advisory Board Member
Cybercrime
09.29.20 Cybercrime
Interview of Maarten Van Horenbeeck, FIC Advisory Board Member
Read
04
MIN
Image The European Union Imposes Its First Ever Sanctions Against Cyber-attacks
Digital Sovereignty
The European Union Imposes Its First Ever Sanctions Against Cyber-attacks
Read
07
MIN
Image EncroChat: Deciphering of the End-to-End Encryption Service Used by Criminals
Cybercrime
07.15.20 Cybercrime
EncroChat: Deciphering of the End-to-End Encryption Service Used by Criminals
Read
03
MIN
Image Tracing, not Tracking
Digital Sovereignty
Tracing, not Tracking
Read
04
MIN
Image Towards a Post-Digital Era ?
Digital transformation
Towards a Post-Digital Era ?
Read
05
MIN
Image The "right to be forgotten", a relative right
Digital Sovereignty
The “right to be forgotten”, a relative right
Read
02
MIN
Image For a collective and collaborative cybersecurity!
04.09.20
For a collective and collaborative cybersecurity!
Read
03
MIN
Image Continuous Improvement: How do Counterproductive Routines Linger On In Security "best practices"?
Secops
04.09.20 Secops
Continuous Improvement: How do Counterproductive Routines Linger On In Security “best practices”?
Read
06
MIN