Image Why Are We Still Talking About ‘Women in Cyber Security’? (Laura Brent, NATO)
Risks management
10.26.17 Risks management
Why Are We Still Talking About ‘Women in Cyber Security’? (Laura Brent, NATO)
Read
06
MIN
Image Shadow Brokers, the fog of war in the cyberspace (Rafael Ponce, CEIS)
Cyber stability
10.26.17 Cyber stability
Shadow Brokers, the fog of war in the cyberspace (Rafael Ponce, CEIS)
Read
06
MIN
Image Security and Freedom: Inextricably Intertwined in the Digital Arena
Digital transformation
Security and Freedom: Inextricably Intertwined in the Digital Arena
Read
06
MIN
Image Yes to a European Cybersecurity Act — but Not to Just Any Requirement (SD MAGAZINE)
Digital Sovereignty
Yes to a European Cybersecurity Act — but Not to Just Any Requirement (SD MAGAZINE)
Read
07
MIN
Image Cybersecurity: you’ll all be rated, sooner or later! (Guillaume Tissier, Managing Director, CEIS)
Digital transformation
Cybersecurity: you’ll all be rated, sooner or later! (Guillaume Tissier, Managing Director, CEIS)
Read
08
MIN
Image Through "Regtech" solutions, GDPR will be the future technical and operational standard for personal data processing (Pierre-Olivier Grenouiller, Legal IT Factory)
Cyber +
09.26.17 Cyber +
Through “Regtech” solutions, GDPR will be the future technical and operational standard for personal data processing (Pierre-Olivier Grenouiller, Legal IT Factory)
Read
05
MIN
Image The Cloud: A Weapon of Mass Seduction for Cybercriminals (By Vincent Riou, Bluecyforce)
Risks management
09.26.17 Risks management
The Cloud: A Weapon of Mass Seduction for Cybercriminals (By Vincent Riou, Bluecyforce)
Read
05
MIN
Image Thematic breakfast: "GDPR and the rise of RegTechs"
09.19.17
Thematic breakfast: “GDPR and the rise of RegTechs”
Read
01
MIN
Image Hexatrust: let’s create the FrenchTech Industry in cybersecurity!
Cyber +
07.24.17 Cyber +
Hexatrust: let’s create the FrenchTech Industry in cybersecurity!
Read
02
MIN
Image Microsoft's Geneva Convention: protecting web users against State irresponsible behaviors in the cyberspace ? {By Darius Fadier, CEIS}
Digital Sovereignty
Microsoft’s Geneva Convention: protecting web users against State irresponsible behaviors in the cyberspace ? {By Darius Fadier, CEIS}
Read
04
MIN
Image Security Beyond Smart Meters - Smart Homes (By Luay Baltaji, Cybersecurity Manager, OMNETRIC Group)
Digital transformation
Security Beyond Smart Meters – Smart Homes (By Luay Baltaji, Cybersecurity Manager, OMNETRIC Group)
Read
08
MIN
Image Are American and European Voting Systems Subject to Russian Hacking? (By SecGate)
Cyber stability
07.13.17 Cyber stability
Are American and European Voting Systems Subject to Russian Hacking? (By SecGate)
Read
09
MIN
Image Thematic Breakfast: Quantum Computing: the encryption challenge
06.13.17
Thematic Breakfast: Quantum Computing: the encryption challenge
Read
01
MIN
Image The Six Principles Behind GDPR (Giovanni Buttarelli, European Data Protection Supervisor)
Digital transformation
The Six Principles Behind GDPR (Giovanni Buttarelli, European Data Protection Supervisor)
Read
06
MIN
Image How can we make smart cities smart and secure?
Digital transformation
How can we make smart cities smart and secure?
Read
08
MIN
Image Thematic Breakfast: How to make smart cities safe and secure ?
05.03.17
Thematic Breakfast: How to make smart cities safe and secure ?
Read
01
MIN
Image Incident Response: Preparation is essential - Download the MagIT dedicated E-Guide
Secops
04.13.17 Secops
Incident Response: Preparation is essential – Download the MagIT dedicated E-Guide
Read
01
MIN
Image The Future of Cyber and Data Insurance (By Gregory Fenn)
Cyber +
04.11.17 Cyber +
The Future of Cyber and Data Insurance (By Gregory Fenn)
Read
08
MIN
Image Which opportunities for the French digital and cybersecurity industries in Africa ? (By Clément Rossi, CEIS)
Cyber stability
04.07.17 Cyber stability
Which opportunities for the French digital and cybersecurity industries in Africa ? (By Clément Rossi, CEIS)
Read
07
MIN
Image Thematic Breakfast: Uberisation: What role for trusted third parties in terms of security and digital trust ?
03.28.17
Thematic Breakfast: Uberisation: What role for trusted third parties in terms of security and digital trust ?
Read
01
MIN
Image Prepare for security incidents: Download LeMagIT dedicated E-Guide
Secops
03.13.17 Secops
Prepare for security incidents: Download LeMagIT dedicated E-Guide
Read
01
MIN