Image CNIL Report — Qualified person's report on measures to withdraw, block and declassify unlawful websites through administrative channels — April 2016 [by General Watin-Augouard]
Cybercrime
05.02.16 Cybercrime
CNIL Report — Qualified person’s report on measures to withdraw, block and declassify unlawful websites through administrative channels — April 2016 by General Watin-Augouard
Read
03
MIN
Image Save the date: the 3rd edition of SecurityDay will take place on March 15th and 16th 2016 at King Fahd Palace in Dakar.
03.15.16
Save the date: the 3rd edition of SecurityDay will take place on March 15th and 16th 2016 at King Fahd Palace in Dakar.
Read
01
MIN
Image Sustainable Security Applied to Cybersecurity [by Charles d'Aumale, founder of Trust & Tech]
Risks management
02.17.16 Risks management
Sustainable Security Applied to Cybersecurity by Charles d’Aumale, founder of Trust & Tech
Read
04
MIN
Image Data vulnerability: companies must strengthen their security [by Sofia Rufin, Brainloop’s Regional Vice President]
Risks management
01.19.16 Risks management
Data vulnerability: companies must strengthen their security by Sofia Rufin, Brainloop’s Regional Vice President
Read
06
MIN
Image Cybersecurity Is Everyone's Business [by Jean-Christophe Mathieu, product and solution security officer, Siemens France]
Risks management
01.19.16 Risks management
Cybersecurity Is Everyone’s Business by Jean-Christophe Mathieu, product and solution security officer, Siemens France
Read
06
MIN
Image Voting by Internet : secure and verifiable [by Thierry Flajoliet, CEO of Election-Europe]
Digital transformation
Voting by Internet : secure and verifiable by Thierry Flajoliet, CEO of Election-Europe
Read
05
MIN
Image Whose Privacy Are We Protecting? Balancing Rights to Anonymity with Rights to Public Safety
Cyber stability
01.13.16 Cyber stability
Whose Privacy Are We Protecting? Balancing Rights to Anonymity with Rights to Public Safety
Read
04
MIN
Image The Frogans technology makes the publication of data on the Internet secure [by Julie Laurent-Ledoux]
Digital transformation
The Frogans technology makes the publication of data on the Internet secure by Julie Laurent-Ledoux
Read
08
MIN
Image Dealing with spam: a technical & organizational approach [by Charles Ibrahim]
Secops
01.06.16 Secops
Dealing with spam: a technical & organizational approach by Charles Ibrahim
Read
10
MIN
Image 2020: new Technologies, new Hopes, new Challenges [by John Suffolk, Huawei Senior Vice President, Global Cyber Security & Privacy Officier]
Risks management
12.31.15 Risks management
2020: new Technologies, new Hopes, new Challenges by John Suffolk, Huawei Senior Vice President, Global Cyber Security & Privacy Officier
Read
05
MIN
Image Cyber Attacks : Crisis Recovery and Anticipated Measures [by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague]
Secops
12.31.15 Secops
Cyber Attacks : Crisis Recovery and Anticipated Measures by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague
Read
13
MIN
Image An Ecosystem for Private Customer Data Management [by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus]
Secops
12.31.15 Secops
An Ecosystem for Private Customer Data Management by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus
Read
13
MIN
Image Internet of Things, Big Data, Cloud : take Security and Privacy seriously to stay in the game [by Corix Partners]
Risks management
12.31.15 Risks management
Internet of Things, Big Data, Cloud : take Security and Privacy seriously to stay in the game by Corix Partners
Read
02
MIN
Image Security in Horizon 2020 : its implementation in France [by Arnaud Nachef, Coordinator of the French NCP consortium for Secure Societies, CEA]
Cyber stability
12.31.15 Cyber stability
Security in Horizon 2020 : its implementation in France by Arnaud Nachef, Coordinator of the French NCP consortium for Secure Societies, CEA
Read
09
MIN
Image The French–German conference on digital affairs: a missed opportunity? [by Guy Mamou-Mani, vice-chairman of Open and chairman of Syntec Numérique]
Cyber stability
11.27.15 Cyber stability
The French–German conference on digital affairs: a missed opportunity? by Guy Mamou-Mani, vice-chairman of Open and chairman of Syntec Numérique
Read
04
MIN
Image Thematic breakfast on the 20th October 2015 : « Mobile apps security : the new challenge »
10.20.15
Thematic breakfast on the 20th October 2015 : « Mobile apps security : the new challenge »
Read
02
MIN
Image Safe Harbor: what consequences? (by Army General (2S) Watin-Augouard, Founder of the FIC)
Cyber stability
10.16.15 Cyber stability
Safe Harbor: what consequences? (by Army General (2S) Watin-Augouard, Founder of the FIC)
Read
04
MIN
Image Cyber security: French speaking people unite at FIC 2016 [by Jean-Marie Corriere, Systemis]
Risks management
10.15.15 Risks management
Cyber security: French speaking people unite at FIC 2016 by Jean-Marie Corriere, Systemis
Read
02
MIN
Image Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. [by Jean-Marc Rietsch, international dematerialisation expert]
Secops
10.15.15 Secops
Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. by Jean-Marc Rietsch, international dematerialisation expert
Read
03
MIN
Image The Security of Executives: A Challenge for CISOs [by Guillaume Tissier, CEIS]
Secops
09.09.15 Secops
The Security of Executives: A Challenge for CISOs by Guillaume Tissier, CEIS
Read
08
MIN
Image The Economics of Cybersecurity: Drawing Inspiration from Insurance to Fight Against Market Biases [by Maxime ALAY-EDDINE, Cyberwatch SAS
Secops
09.08.15 Secops
The Economics of Cybersecurity: Drawing Inspiration from Insurance to Fight Against Market Biases [by Maxime ALAY-EDDINE, Cyberwatch SAS
Read
11
MIN