Image Type Softly, Carry a Big Gun
Cyber stability
04.30.18 Cyber stability
Type Softly, Carry a Big Gun
Read
05
MIN
Image Investment in cybersecurity: an upturn?
Digital transformation
Investment in cybersecurity: an upturn?
Read
05
MIN
Image Shipping and cybersecurity
Cyber stability
04.30.18 Cyber stability
Shipping and cybersecurity
Read
04
MIN
Image Facebook: a move towards questioning the model?
Digital transformation
Facebook: a move towards questioning the model?
Read
04
MIN
Image CYBERSECURITY, AN ISSUE THAT MUST BE SHARED AT ALL LEVELS OF HIERARCHY
Cyber stability
03.21.18 Cyber stability
CYBERSECURITY, AN ISSUE THAT MUST BE SHARED AT ALL LEVELS OF HIERARCHY
Read
01
MIN
Image Sporting Events and New Technologies: Opportunities and Threats (By Vincent Riou, CEIS)
Cybercrime
03.21.18 Cybercrime
Sporting Events and New Technologies: Opportunities and Threats (By Vincent Riou, CEIS)
Read
08
MIN
Image Cyberprotection of Industrial Control Systems: a Model-Based Approach to Detect and Respond to Cyberattacks
Secops
03.21.18 Secops
Cyberprotection of Industrial Control Systems: a Model-Based Approach to Detect and Respond to Cyberattacks
Read
08
MIN
Image The maritime industry and cyber risk (by Brice Ducoum, Groupe EYSSAUTIER)
Digital Sovereignty
The maritime industry and cyber risk (by Brice Ducoum, Groupe EYSSAUTIER)
Read
05
MIN
Image How 4chan and The_Donald Influence the Fake News Ecosystem (By Jeremy Blackburn, University of Alabama at Birmingham)
Digital transformation
How 4chan and The_Donald Influence the Fake News Ecosystem (By Jeremy Blackburn, University of Alabama at Birmingham)
Read
09
MIN
Image CrossCheck: An Initiative to Protect the French Presidential Elections from Fake News (Walid Salem, Rue 89)
Digital transformation
CrossCheck: An Initiative to Protect the French Presidential Elections from Fake News (Walid Salem, Rue 89)
Read
05
MIN
Image Vulnerability management: act before it is too late (By Sergio Loureiro, SecludIT)
Risks management
01.13.18 Risks management
Vulnerability management: act before it is too late (By Sergio Loureiro, SecludIT)
Read
04
MIN
Image Selective Malware: A New Cyber Weapon? (By Clémence Le Liepvre, CEIS)
Cybercrime
01.13.18 Cybercrime
Selective Malware: A New Cyber Weapon? (By Clémence Le Liepvre, CEIS)
Read
07
MIN
Image From Safety to Cybersecurity (Frédéric Cuppens and Nora Cuppens, IMT Atlantique)
Risks management
01.13.18 Risks management
From Safety to Cybersecurity (Frédéric Cuppens and Nora Cuppens, IMT Atlantique)
Read
06
MIN
Image Dark Analtycis (By Cyrille Savelief)
Secops
12.21.17 Secops
Dark Analtycis (By Cyrille Savelief)
Read
11
MIN
Image Making Digital Space Secure: the issues (By Air Force General (2S) Jean-Paul Paloméros)
Digital transformation
Making Digital Space Secure: the issues (By Air Force General (2S) Jean-Paul Paloméros)
Read
08
MIN
Image Cyber Governance: Incentive Policies for Coordinated Vulnerability Disclosure (By Guillaume Vassault-Houlière, YesWeHack)
Risks management
11.28.17 Risks management
Cyber Governance: Incentive Policies for Coordinated Vulnerability Disclosure (By Guillaume Vassault-Houlière, YesWeHack)
Read
04
MIN
Image Insurance — Challenges of New Partnerships Between Insurers and IT Service Companies (By Bertrand Boutoille)
Risks management
11.28.17 Risks management
Insurance — Challenges of New Partnerships Between Insurers and IT Service Companies (By Bertrand Boutoille)
Read
03
MIN
Image Interview: Health data in the context of the GDPR (Philippe Tourron, Marseille Public University Hospital System)
Digital Sovereignty
Interview: Health data in the context of the GDPR (Philippe Tourron, Marseille Public University Hospital System)
Read
08
MIN
Image Suspicious Activities on Social Media: What Can Be Learnt from Counterterrorist Financing Efforts? (By Oliver Kraft, RUSI)
Cyber stability
11.28.17 Cyber stability
Suspicious Activities on Social Media: What Can Be Learnt from Counterterrorist Financing Efforts? (By Oliver Kraft, RUSI)
Read
05
MIN
Image Breakfast Debate "The Resilience Challenge in a Hyperconnected EU"
11.07.17
Breakfast Debate “The Resilience Challenge in a Hyperconnected EU”
Read
01
MIN
Image Amelia Anderstotter, Internet Expert
Digital Sovereignty
Amelia Anderstotter, Internet Expert
Read
03
MIN