Image Selective Malware: A New Cyber Weapon? (By Clémence Le Liepvre, CEIS)
Cybercrime
01.13.18 Cybercrime
Selective Malware: A New Cyber Weapon? (By Clémence Le Liepvre, CEIS)
Read
07
MIN
Image From Safety to Cybersecurity (Frédéric Cuppens and Nora Cuppens, IMT Atlantique)
Risks management
01.13.18 Risks management
From Safety to Cybersecurity (Frédéric Cuppens and Nora Cuppens, IMT Atlantique)
Read
06
MIN
Image Dark Analtycis (By Cyrille Savelief)
Secops
12.21.17 Secops
Dark Analtycis (By Cyrille Savelief)
Read
11
MIN
Image Making Digital Space Secure: the issues (By Air Force General (2S) Jean-Paul Paloméros)
Digital transformation
Making Digital Space Secure: the issues (By Air Force General (2S) Jean-Paul Paloméros)
Read
08
MIN
Image Cyber Governance: Incentive Policies for Coordinated Vulnerability Disclosure (By Guillaume Vassault-Houlière, YesWeHack)
Risks management
11.28.17 Risks management
Cyber Governance: Incentive Policies for Coordinated Vulnerability Disclosure (By Guillaume Vassault-Houlière, YesWeHack)
Read
04
MIN
Image Insurance — Challenges of New Partnerships Between Insurers and IT Service Companies (By Bertrand Boutoille)
Risks management
11.28.17 Risks management
Insurance — Challenges of New Partnerships Between Insurers and IT Service Companies (By Bertrand Boutoille)
Read
03
MIN
Image Interview: Health data in the context of the GDPR (Philippe Tourron, Marseille Public University Hospital System)
Digital Sovereignty
Interview: Health data in the context of the GDPR (Philippe Tourron, Marseille Public University Hospital System)
Read
08
MIN
Image Suspicious Activities on Social Media: What Can Be Learnt from Counterterrorist Financing Efforts? (By Oliver Kraft, RUSI)
Cyber stability
11.28.17 Cyber stability
Suspicious Activities on Social Media: What Can Be Learnt from Counterterrorist Financing Efforts? (By Oliver Kraft, RUSI)
Read
05
MIN
Image Breakfast Debate "The Resilience Challenge in a Hyperconnected EU"
11.07.17
Breakfast Debate “The Resilience Challenge in a Hyperconnected EU”
Read
01
MIN
Image Amelia Anderstotter, Internet Expert
Digital Sovereignty
Amelia Anderstotter, Internet Expert
Read
03
MIN
Image Why Are We Still Talking About ‘Women in Cyber Security’? (Laura Brent, NATO)
Risks management
10.26.17 Risks management
Why Are We Still Talking About ‘Women in Cyber Security’? (Laura Brent, NATO)
Read
06
MIN
Image Shadow Brokers, the fog of war in the cyberspace (Rafael Ponce, CEIS)
Cyber stability
10.26.17 Cyber stability
Shadow Brokers, the fog of war in the cyberspace (Rafael Ponce, CEIS)
Read
06
MIN
Image Security and Freedom: Inextricably Intertwined in the Digital Arena
Digital transformation
Security and Freedom: Inextricably Intertwined in the Digital Arena
Read
06
MIN
Image Yes to a European Cybersecurity Act — but Not to Just Any Requirement (SD MAGAZINE)
Digital Sovereignty
Yes to a European Cybersecurity Act — but Not to Just Any Requirement (SD MAGAZINE)
Read
07
MIN
Image Cybersecurity: you’ll all be rated, sooner or later! (Guillaume Tissier, Managing Director, CEIS)
Digital transformation
Cybersecurity: you’ll all be rated, sooner or later! (Guillaume Tissier, Managing Director, CEIS)
Read
08
MIN
Image Through "Regtech" solutions, GDPR will be the future technical and operational standard for personal data processing (Pierre-Olivier Grenouiller, Legal IT Factory)
Cyber +
09.26.17 Cyber +
Through “Regtech” solutions, GDPR will be the future technical and operational standard for personal data processing (Pierre-Olivier Grenouiller, Legal IT Factory)
Read
05
MIN
Image The Cloud: A Weapon of Mass Seduction for Cybercriminals (By Vincent Riou, Bluecyforce)
Risks management
09.26.17 Risks management
The Cloud: A Weapon of Mass Seduction for Cybercriminals (By Vincent Riou, Bluecyforce)
Read
05
MIN
Image Thematic breakfast: "GDPR and the rise of RegTechs"
09.19.17
Thematic breakfast: “GDPR and the rise of RegTechs”
Read
01
MIN
Image Hexatrust: let’s create the FrenchTech Industry in cybersecurity!
Cyber +
07.24.17 Cyber +
Hexatrust: let’s create the FrenchTech Industry in cybersecurity!
Read
02
MIN
Image Microsoft's Geneva Convention: protecting web users against State irresponsible behaviors in the cyberspace ? {By Darius Fadier, CEIS}
Digital Sovereignty
Microsoft’s Geneva Convention: protecting web users against State irresponsible behaviors in the cyberspace ? {By Darius Fadier, CEIS}
Read
04
MIN
Image Security Beyond Smart Meters - Smart Homes (By Luay Baltaji, Cybersecurity Manager, OMNETRIC Group)
Digital transformation
Security Beyond Smart Meters – Smart Homes (By Luay Baltaji, Cybersecurity Manager, OMNETRIC Group)
Read
08
MIN