Image Accelerating the business of cybersecurity [by Vincent Riou, CEIS]
Risks management
02.18.15 Risks management
Accelerating the business of cybersecurity by Vincent Riou, CEIS
Read
06
MIN
Image The Sony Pictures Entertainment Case : The employees’ low-profile initiative
Secops
01.15.15 Secops
The Sony Pictures Entertainment Case : The employees’ low-profile initiative
Read
01
MIN
Image [Contribution] Why CerberHost? Because your sites are vulnerable... [by Emile Heitor, CTO, NBS Systems]
Cybercrime
01.12.15 Cybercrime
Contribution Why CerberHost? Because your sites are vulnerable… by Emile Heitor, CTO, NBS Systems
Read
02
MIN
Image [Contribution] Closing the door to attackers with continued security and the Cloud [by Philippe Courtot, Qualys]
Cybercrime
01.12.15 Cybercrime
Contribution Closing the door to attackers with continued security and the Cloud by Philippe Courtot, Qualys
Read
01
MIN
Image [Contribution] Evolve or Die: Security Adaptation in a Virtual World [by Bitdefender]
Secops
01.05.15 Secops
Contribution Evolve or Die: Security Adaptation in a Virtual World by Bitdefender
Read
02
MIN
Image Who’s Afraid of Cybercrime? Law Enforcement Must Combat Cybercrime by Thinking and Acting Like a Cybercriminal
Cybercrime
01.05.15 Cybercrime
Who’s Afraid of Cybercrime? Law Enforcement Must Combat Cybercrime by Thinking and Acting Like a Cybercriminal
Read
09
MIN
Image [Contribution] Whitenoise, Dynamic Identity Verification and Authentication and Dynamic Distributed Key Infrastructures [by André Jacques Brisson, Whitenoise Laboratories Canada Inc]
Secops
01.05.15 Secops
Contribution Whitenoise, Dynamic Identity Verification and Authentication and Dynamic Distributed Key Infrastructures by André Jacques Brisson, Whitenoise Laboratories Canada Inc
Read
10
MIN
Image Are you ready for the next attack? [By Symantec]
Secops
12.23.14 Secops
Are you ready for the next attack? By Symantec
Read
05
MIN
Image The cyber attack potential assessment database [By Thierry Autret, GIE Cartes bancaires]
Secops
12.23.14 Secops
The cyber attack potential assessment database By Thierry Autret, GIE Cartes bancaires
Read
04
MIN
Image Edito - The Sony case [By General of the army (2S) Watin-Augouard]
Cyber stability
12.23.14 Cyber stability
Edito – The Sony case By General of the army (2S) Watin-Augouard
Read
02
MIN
Image FIC Breakfast: "Cybersecurity of connected objects: the example of smart meter Linky".
11.26.14
FIC Breakfast: “Cybersecurity of connected objects: the example of smart meter Linky”.
Read
01
MIN
Image Dynamic Identity Verification and Authentication (DIVA) [by André Jacques Brisson, Whitenoise Laboratories Canada Inc.]
Secops
11.21.14 Secops
Dynamic Identity Verification and Authentication (DIVA) by André Jacques Brisson, Whitenoise Laboratories Canada Inc.
Read
10
MIN
Image Review of the FIC Observatory Breakfast: the digitalisation of European societies
11.04.14
Review of the FIC Observatory Breakfast: the digitalisation of European societies
Read
03
MIN
Image Review of the FIC Observatory Breakfast: The dematerialization of payment methods. What are the impacts on companies today?
10.29.14
Review of the FIC Observatory Breakfast: The dematerialization of payment methods. What are the impacts on companies today?
Read
02
MIN
Image Feedback on the Breakfast Talk of the FIC Observatory entitled “Cybersecurity, lever of transformation of a business sector. Presentation of the Alb@tros project in the aerospace industry”.
09.29.14
Feedback on the Breakfast Talk of the FIC Observatory entitled “Cybersecurity, lever of transformation of a business sector. Presentation of the Alb@tros project in the aerospace industry”.
Read
02
MIN
Image Knowledge means security - but how to develop a more proactive strategy to information security?
Secops
09.29.14 Secops
Knowledge means security – but how to develop a more proactive strategy to information security?
Read
04
MIN
Image Edito – Towards a coherent and comprehensive national digital strategy? [par Romain Galesne-Fontaine Directeur Analyses et Stratégies Institutionnelles de CEIS]
Risks management
09.26.14 Risks management
Edito – Towards a coherent and comprehensive national digital strategy? par Romain Galesne-Fontaine Directeur Analyses et Stratégies Institutionnelles de CEIS
Read
04
MIN
Image Breakfast talk : "Digital Sovereignty & Cloud Computing"
Cyber stability
09.08.14 Cyber stability
Breakfast talk : “Digital Sovereignty & Cloud Computing”
Read
03
MIN
Image The Three Internets: How to Survive and Help the Two Others
Cyber stability
09.08.14 Cyber stability
The Three Internets: How to Survive and Help the Two Others
Read
07
MIN
Image Edito - Report on the “Protection of Internet Users”: towards an interdepartmental chain of fight against cybercrime [by Myriam Quéméner]
Cybercrime
09.08.14 Cybercrime
Edito – Report on the “Protection of Internet Users”: towards an interdepartmental chain of fight against cybercrime by Myriam Quéméner
Read
04
MIN
Image Log Analysis in the context of the Internet of Things
Secops
06.13.14 Secops
Log Analysis in the context of the Internet of Things
Read
11
MIN