Image Thematic breakfast on the 20th October 2015 : « Mobile apps security : the new challenge »
10.20.15
Thematic breakfast on the 20th October 2015 : « Mobile apps security : the new challenge »
Read
02
MIN
Image Safe Harbor: what consequences? (by Army General (2S) Watin-Augouard, Founder of the FIC)
Cyber stability
10.16.15 Cyber stability
Safe Harbor: what consequences? (by Army General (2S) Watin-Augouard, Founder of the FIC)
Read
04
MIN
Image Cyber security: French speaking people unite at FIC 2016 [by Jean-Marie Corriere, Systemis]
Risks management
10.15.15 Risks management
Cyber security: French speaking people unite at FIC 2016 by Jean-Marie Corriere, Systemis
Read
02
MIN
Image Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. [by Jean-Marc Rietsch, international dematerialisation expert]
Secops
10.15.15 Secops
Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. by Jean-Marc Rietsch, international dematerialisation expert
Read
03
MIN
Image The Security of Executives: A Challenge for CISOs [by Guillaume Tissier, CEIS]
Secops
09.09.15 Secops
The Security of Executives: A Challenge for CISOs by Guillaume Tissier, CEIS
Read
08
MIN
Image The Economics of Cybersecurity: Drawing Inspiration from Insurance to Fight Against Market Biases [by Maxime ALAY-EDDINE, Cyberwatch SAS
Secops
09.08.15 Secops
The Economics of Cybersecurity: Drawing Inspiration from Insurance to Fight Against Market Biases [by Maxime ALAY-EDDINE, Cyberwatch SAS
Read
11
MIN
Image News on the "loi sur le renseignement" [by General (2S) Marc Watin-Augouard]
Cybercrime
08.04.15 Cybercrime
News on the “loi sur le renseignement” by General (2S) Marc Watin-Augouard
Read
03
MIN
Image Data Theft: the French Court of Cassation Refines the Godfrain Law [by General (2S) Marc Watin-Augouard]
Cybercrime
08.04.15 Cybercrime
Data Theft: the French Court of Cassation Refines the Godfrain Law by General (2S) Marc Watin-Augouard
Read
04
MIN
Image Japan plans to fortify its cybersecurity [by Yoko Nitta, Visiting Lecturer, National Defense Academy]
Cyber stability
08.04.15 Cyber stability
Japan plans to fortify its cybersecurity by Yoko Nitta, Visiting Lecturer, National Defense Academy
Read
06
MIN
Image After Chief Digital Officer, now introducing Chief Data Officer! [by Alexandra Droullé, Partner Eurosearch & associates, consulting in resource management]
Cyber +
08.04.15 Cyber +
After Chief Digital Officer, now introducing Chief Data Officer! by Alexandra Droullé, Partner Eurosearch & associates, consulting in resource management
Read
04
MIN
Image Healthcare Data Security: 'I' Well Before 'C' [by Cédric Cartau, CISO of Nantes Hospital]
Secops
08.03.15 Secops
Healthcare Data Security: ‘I’ Well Before ‘C’ by Cédric Cartau, CISO of Nantes Hospital
Read
07
MIN
Image Cyberspace has not won the survival of the fittest, says the UN [by Florence Mangin, Ambassador coordinator for cybersecurity and public data]
Cyber stability
08.03.15 Cyber stability
Cyberspace has not won the survival of the fittest, says the UN by Florence Mangin, Ambassador coordinator for cybersecurity and public data
Read
04
MIN
Image Summary and comments on the breakfast organized by the FIC observatory: "Cyber Prefect, to serve citizens, businesses and the state"
07.02.15
Summary and comments on the breakfast organized by the FIC observatory: “Cyber Prefect, to serve citizens, businesses and the state”
Read
06
MIN
Image The connected automobile – its infrastructure, vehicles and drivers: a connected future [by Cindy Roth, CEIS]
Digital transformation
The connected automobile – its infrastructure, vehicles and drivers: a connected future by Cindy Roth, CEIS
Read
09
MIN
Image The quest for reliable and secure source code [by Sebastien Giora, Advens]
Secops
07.02.15 Secops
The quest for reliable and secure source code by Sebastien Giora, Advens
Read
04
MIN
Image Conference "Supporting cybersecurity startups in Europe: overview & best practices", June 10th in Bruxelles
06.10.15
Conference “Supporting cybersecurity startups in Europe: overview & best practices”, June 10th in Bruxelles
Read
02
MIN
Image Sovereign OS: the Holy Grail of digital sovereignty? [by Guillaume Tissier, CEIS]
Cyber stability
05.21.15 Cyber stability
Sovereign OS: the Holy Grail of digital sovereignty? by Guillaume Tissier, CEIS
Read
03
MIN
Image Global Online Fraud Losses = 140,000 Jobs [by Fabrice Colas, Ubivar]
Cybercrime
05.12.15 Cybercrime
Global Online Fraud Losses = 140,000 Jobs by Fabrice Colas, Ubivar
Read
05
MIN
Image The risk of a major flood in the the Ile-de-France region is also a challenge in terms of Information Systems Security [by Vincent Balouet, maitrisedesrisques.com]
Secops
05.12.15 Secops
The risk of a major flood in the the Ile-de-France region is also a challenge in terms of Information Systems Security by Vincent Balouet, maitrisedesrisques.com
Read
10
MIN
Image Conclusion to Symantec's annual report on Internet security threats [by Laurent Heslault, Symantec]
Cybercrime
05.12.15 Cybercrime
Conclusion to Symantec’s annual report on Internet security threats by Laurent Heslault, Symantec
Read
04
MIN
Image The first FIC 2016 scientific committee held on April 14, 2015
05.12.15
The first FIC 2016 scientific committee held on April 14, 2015
Read
01
MIN