Image News on the "loi sur le renseignement" [by General (2S) Marc Watin-Augouard]
Cybercrime
08.04.15 Cybercrime
News on the “loi sur le renseignement” by General (2S) Marc Watin-Augouard
Read
03
MIN
Image Data Theft: the French Court of Cassation Refines the Godfrain Law [by General (2S) Marc Watin-Augouard]
Cybercrime
08.04.15 Cybercrime
Data Theft: the French Court of Cassation Refines the Godfrain Law by General (2S) Marc Watin-Augouard
Read
04
MIN
Image Japan plans to fortify its cybersecurity [by Yoko Nitta, Visiting Lecturer, National Defense Academy]
Cyber stability
08.04.15 Cyber stability
Japan plans to fortify its cybersecurity by Yoko Nitta, Visiting Lecturer, National Defense Academy
Read
06
MIN
Image After Chief Digital Officer, now introducing Chief Data Officer! [by Alexandra Droullé, Partner Eurosearch & associates, consulting in resource management]
Cyber +
08.04.15 Cyber +
After Chief Digital Officer, now introducing Chief Data Officer! by Alexandra Droullé, Partner Eurosearch & associates, consulting in resource management
Read
04
MIN
Image Healthcare Data Security: 'I' Well Before 'C' [by Cédric Cartau, CISO of Nantes Hospital]
Secops
08.03.15 Secops
Healthcare Data Security: ‘I’ Well Before ‘C’ by Cédric Cartau, CISO of Nantes Hospital
Read
07
MIN
Image Cyberspace has not won the survival of the fittest, says the UN [by Florence Mangin, Ambassador coordinator for cybersecurity and public data]
Cyber stability
08.03.15 Cyber stability
Cyberspace has not won the survival of the fittest, says the UN by Florence Mangin, Ambassador coordinator for cybersecurity and public data
Read
04
MIN
Image Summary and comments on the breakfast organized by the FIC observatory: "Cyber Prefect, to serve citizens, businesses and the state"
07.02.15
Summary and comments on the breakfast organized by the FIC observatory: “Cyber Prefect, to serve citizens, businesses and the state”
Read
06
MIN
Image The connected automobile – its infrastructure, vehicles and drivers: a connected future [by Cindy Roth, CEIS]
Digital transformation
The connected automobile – its infrastructure, vehicles and drivers: a connected future by Cindy Roth, CEIS
Read
09
MIN
Image The quest for reliable and secure source code [by Sebastien Giora, Advens]
Secops
07.02.15 Secops
The quest for reliable and secure source code by Sebastien Giora, Advens
Read
04
MIN
Image Conference "Supporting cybersecurity startups in Europe: overview & best practices", June 10th in Bruxelles
06.10.15
Conference “Supporting cybersecurity startups in Europe: overview & best practices”, June 10th in Bruxelles
Read
02
MIN
Image Sovereign OS: the Holy Grail of digital sovereignty? [by Guillaume Tissier, CEIS]
Cyber stability
05.21.15 Cyber stability
Sovereign OS: the Holy Grail of digital sovereignty? by Guillaume Tissier, CEIS
Read
03
MIN
Image Global Online Fraud Losses = 140,000 Jobs [by Fabrice Colas, Ubivar]
Cybercrime
05.12.15 Cybercrime
Global Online Fraud Losses = 140,000 Jobs by Fabrice Colas, Ubivar
Read
05
MIN
Image The risk of a major flood in the the Ile-de-France region is also a challenge in terms of Information Systems Security [by Vincent Balouet, maitrisedesrisques.com]
Secops
05.12.15 Secops
The risk of a major flood in the the Ile-de-France region is also a challenge in terms of Information Systems Security by Vincent Balouet, maitrisedesrisques.com
Read
10
MIN
Image Conclusion to Symantec's annual report on Internet security threats [by Laurent Heslault, Symantec]
Cybercrime
05.12.15 Cybercrime
Conclusion to Symantec’s annual report on Internet security threats by Laurent Heslault, Symantec
Read
04
MIN
Image The first FIC 2016 scientific committee held on April 14, 2015
05.12.15
The first FIC 2016 scientific committee held on April 14, 2015
Read
01
MIN
Image Review of the FIC observatory breakfast: Is e-commerce a precursor to the fight against digital identity fraud?
05.12.15
Review of the FIC observatory breakfast: Is e-commerce a precursor to the fight against digital identity fraud?
Read
03
MIN
Image FIC Observatory Breakfast Talk : « E-commerce, the precursor to the fight against digital identity fraud ? »
04.14.15
FIC Observatory Breakfast Talk : « E-commerce, the precursor to the fight against digital identity fraud ? »
Read
01
MIN
Image Personal data: a cornerstone of sovereignty? [by Loïs Samain, CEIS]
Cyber stability
04.07.15 Cyber stability
Personal data: a cornerstone of sovereignty? by Loïs Samain, CEIS
Read
07
MIN
Image The FIC 2016 will take place on 25-26 January 2016 and focus on the overarching theme of data security & privacy
04.07.15
The FIC 2016 will take place on 25-26 January 2016 and focus on the overarching theme of data security & privacy
Read
04
MIN
Image [Contribution] Which strategy should you adopt to boost your SOC's in-house appeal? [by Thomas Girard, CS]
Cyber stability
04.07.15 Cyber stability
Contribution Which strategy should you adopt to boost your SOC’s in-house appeal? by Thomas Girard, CS
Read
05
MIN
Image Next FIC Breakfast on "Security and mobility"
03.11.15
Next FIC Breakfast on “Security and mobility”
Read
01
MIN