Image The cyber attack potential assessment database [By Thierry Autret, GIE Cartes bancaires]
Secops
12.23.14 Secops
The cyber attack potential assessment database By Thierry Autret, GIE Cartes bancaires
Read
04
MIN
Image Edito - The Sony case [By General of the army (2S) Watin-Augouard]
Cyber stability
12.23.14 Cyber stability
Edito – The Sony case By General of the army (2S) Watin-Augouard
Read
02
MIN
Image FIC Breakfast: "Cybersecurity of connected objects: the example of smart meter Linky".
11.26.14
FIC Breakfast: “Cybersecurity of connected objects: the example of smart meter Linky”.
Read
01
MIN
Image Dynamic Identity Verification and Authentication (DIVA) [by André Jacques Brisson, Whitenoise Laboratories Canada Inc.]
Secops
11.21.14 Secops
Dynamic Identity Verification and Authentication (DIVA) by André Jacques Brisson, Whitenoise Laboratories Canada Inc.
Read
10
MIN
Image Review of the FIC Observatory Breakfast: the digitalisation of European societies
11.04.14
Review of the FIC Observatory Breakfast: the digitalisation of European societies
Read
03
MIN
Image Review of the FIC Observatory Breakfast: The dematerialization of payment methods. What are the impacts on companies today?
10.29.14
Review of the FIC Observatory Breakfast: The dematerialization of payment methods. What are the impacts on companies today?
Read
02
MIN
Image Feedback on the Breakfast Talk of the FIC Observatory entitled “Cybersecurity, lever of transformation of a business sector. Presentation of the Alb@tros project in the aerospace industry”.
09.29.14
Feedback on the Breakfast Talk of the FIC Observatory entitled “Cybersecurity, lever of transformation of a business sector. Presentation of the Alb@tros project in the aerospace industry”.
Read
02
MIN
Image Knowledge means security - but how to develop a more proactive strategy to information security?
Secops
09.29.14 Secops
Knowledge means security – but how to develop a more proactive strategy to information security?
Read
04
MIN
Image Edito – Towards a coherent and comprehensive national digital strategy? [par Romain Galesne-Fontaine Directeur Analyses et Stratégies Institutionnelles de CEIS]
Risks management
09.26.14 Risks management
Edito – Towards a coherent and comprehensive national digital strategy? par Romain Galesne-Fontaine Directeur Analyses et Stratégies Institutionnelles de CEIS
Read
04
MIN
Image Breakfast talk : "Digital Sovereignty & Cloud Computing"
Cyber stability
09.08.14 Cyber stability
Breakfast talk : “Digital Sovereignty & Cloud Computing”
Read
03
MIN
Image The Three Internets: How to Survive and Help the Two Others
Cyber stability
09.08.14 Cyber stability
The Three Internets: How to Survive and Help the Two Others
Read
07
MIN
Image Edito - Report on the “Protection of Internet Users”: towards an interdepartmental chain of fight against cybercrime [by Myriam Quéméner]
Cybercrime
09.08.14 Cybercrime
Edito – Report on the “Protection of Internet Users”: towards an interdepartmental chain of fight against cybercrime by Myriam Quéméner
Read
04
MIN
Image Log Analysis in the context of the Internet of Things
Secops
06.13.14 Secops
Log Analysis in the context of the Internet of Things
Read
11
MIN
Image Breakfast talk : What future for Internet governance after NetMundial?
06.04.14
Breakfast talk : What future for Internet governance after NetMundial?
Read
03
MIN
Image CitiZENSec in the FICcity !
Cyber +
01.15.14 Cyber +
CitiZENSec in the FICcity !
Read
02
MIN
Image Cyber Jihad: The Internet’s contribution to Jihad [par Julien Babanoury, CEIS]
Cybercrime
01.09.14 Cybercrime
Cyber Jihad: The Internet’s contribution to Jihad par Julien Babanoury, CEIS
Read
02
MIN
Image Is Cyberwar Good for Peace? [par Martin Libicki]
Cyber stability
01.09.14 Cyber stability
Is Cyberwar Good for Peace? par Martin Libicki
Read
29
MIN
Image Back to the Future: Criminal Organizations Exploit Another New Technology, Crypto-Currencies
Cybercrime
01.09.14 Cybercrime
Back to the Future: Criminal Organizations Exploit Another New Technology, Crypto-Currencies
Read
15
MIN