Image Through "Regtech" solutions, GDPR will be the future technical and operational standard for personal data processing (Pierre-Olivier Grenouiller, Legal IT Factory)
Cyber +
09.26.17 Cyber +
Through “Regtech” solutions, GDPR will be the future technical and operational standard for personal data processing (Pierre-Olivier Grenouiller, Legal IT Factory)
Read
05
MIN
Image The Cloud: A Weapon of Mass Seduction for Cybercriminals (By Vincent Riou, Bluecyforce)
Risks management
09.26.17 Risks management
The Cloud: A Weapon of Mass Seduction for Cybercriminals (By Vincent Riou, Bluecyforce)
Read
05
MIN
Image Thematic breakfast: "GDPR and the rise of RegTechs"
09.19.17
Thematic breakfast: “GDPR and the rise of RegTechs”
Read
01
MIN
Image Hexatrust: let’s create the FrenchTech Industry in cybersecurity!
Cyber +
07.24.17 Cyber +
Hexatrust: let’s create the FrenchTech Industry in cybersecurity!
Read
02
MIN
Image Microsoft's Geneva Convention: protecting web users against State irresponsible behaviors in the cyberspace ? {By Darius Fadier, CEIS}
Digital Sovereignty
Microsoft’s Geneva Convention: protecting web users against State irresponsible behaviors in the cyberspace ? {By Darius Fadier, CEIS}
Read
04
MIN
Image Security Beyond Smart Meters - Smart Homes (By Luay Baltaji, Cybersecurity Manager, OMNETRIC Group)
Digital transformation
Security Beyond Smart Meters – Smart Homes (By Luay Baltaji, Cybersecurity Manager, OMNETRIC Group)
Read
08
MIN
Image Are American and European Voting Systems Subject to Russian Hacking? (By SecGate)
Cyber stability
07.13.17 Cyber stability
Are American and European Voting Systems Subject to Russian Hacking? (By SecGate)
Read
09
MIN
Image Thematic Breakfast: Quantum Computing: the encryption challenge
06.13.17
Thematic Breakfast: Quantum Computing: the encryption challenge
Read
01
MIN
Image The Six Principles Behind GDPR (Giovanni Buttarelli, European Data Protection Supervisor)
Digital transformation
The Six Principles Behind GDPR (Giovanni Buttarelli, European Data Protection Supervisor)
Read
06
MIN
Image How can we make smart cities smart and secure?
Digital transformation
How can we make smart cities smart and secure?
Read
08
MIN
Image Thematic Breakfast: How to make smart cities safe and secure ?
05.03.17
Thematic Breakfast: How to make smart cities safe and secure ?
Read
01
MIN
Image Incident Response: Preparation is essential - Download the MagIT dedicated E-Guide
Secops
04.13.17 Secops
Incident Response: Preparation is essential – Download the MagIT dedicated E-Guide
Read
01
MIN
Image The Future of Cyber and Data Insurance (By Gregory Fenn)
Cyber +
04.11.17 Cyber +
The Future of Cyber and Data Insurance (By Gregory Fenn)
Read
08
MIN
Image Which opportunities for the French digital and cybersecurity industries in Africa ? (By Clément Rossi, CEIS)
Cyber stability
04.07.17 Cyber stability
Which opportunities for the French digital and cybersecurity industries in Africa ? (By Clément Rossi, CEIS)
Read
07
MIN
Image Thematic Breakfast: Uberisation: What role for trusted third parties in terms of security and digital trust ?
03.28.17
Thematic Breakfast: Uberisation: What role for trusted third parties in terms of security and digital trust ?
Read
01
MIN
Image Prepare for security incidents: Download LeMagIT dedicated E-Guide
Secops
03.13.17 Secops
Prepare for security incidents: Download LeMagIT dedicated E-Guide
Read
01
MIN
Image 2016: The Year the Veils Over State Offensive Cyber Operations Were Lifted (By François Delerue, CEIS)
Cyber stability
03.13.17 Cyber stability
2016: The Year the Veils Over State Offensive Cyber Operations Were Lifted (By François Delerue, CEIS)
Read
23
MIN
Image Mobilization: Deconstructing BYOD Cybersecurity (By Cheng Lai Ki, freelance cybersecurity researcher)
Digital transformation
Mobilization: Deconstructing BYOD Cybersecurity (By Cheng Lai Ki, freelance cybersecurity researcher)
Read
06
MIN
Image Thematic Breakfast : Which opportunities for the French digital and cybersecurity industries in Africa ?
03.01.17
Thematic Breakfast : Which opportunities for the French digital and cybersecurity industries in Africa ?
Read
02
MIN
Image The Rapid Evolution of the Ransomware industry (By Patrick Vibert, Control Risks)
Digital transformation
The Rapid Evolution of the Ransomware industry (By Patrick Vibert, Control Risks)
Read
11
MIN
Image The Constant Evolution of Security Threats and the Need for a Paradigm Shift (By Ramyan Selvam, Juniper Networks)
Secops
02.14.17 Secops
The Constant Evolution of Security Threats and the Need for a Paradigm Shift (By Ramyan Selvam, Juniper Networks)
Read
03
MIN