Image New uses at the heart of the FIC 2017
Digital transformation
New uses at the heart of the FIC 2017
Read
01
MIN
Image Cybersecurity, Cyril Hanouna and the alien effect [by Clément Rossi, CEIS]
Secops
05.02.16 Secops
Cybersecurity, Cyril Hanouna and the alien effect by Clément Rossi, CEIS
Read
08
MIN
Image Trade secrets directive adopted  [by Sandrine Cullafroz-Jos, PwC Avocats ]
Cybercrime
05.02.16 Cybercrime
Trade secrets directive adopted by Sandrine Cullafroz-Jos, PwC Avocats
Read
03
MIN
Image A decisive step by Senegal towards accession to and ratification of the Budapest and Malabo Conventions  [By Dr Papa Assange Touré, Legislative and Regulatory Affairs, Government of Senegal]
Cyber stability
05.02.16 Cyber stability
A decisive step by Senegal towards accession to and ratification of the Budapest and Malabo Conventions By Dr Papa Assange Touré, Legislative and Regulatory Affairs, Government of Senegal
Read
08
MIN
Image The blockchain phenomenon
Cyber +
05.02.16 Cyber +
The blockchain phenomenon
Read
06
MIN
Image 1st SECURITY FILM FESTIVAL – Tuesday, 11 October 2016, in Enghien-Les-Bains, France
05.02.16
1st SECURITY FILM FESTIVAL – Tuesday, 11 October 2016, in Enghien-Les-Bains, France
Read
01
MIN
Image CNIL Report — Qualified person's report on measures to withdraw, block and declassify unlawful websites through administrative channels — April 2016 [by General Watin-Augouard]
Cybercrime
05.02.16 Cybercrime
CNIL Report — Qualified person’s report on measures to withdraw, block and declassify unlawful websites through administrative channels — April 2016 by General Watin-Augouard
Read
03
MIN
Image Save the date: the 3rd edition of SecurityDay will take place on March 15th and 16th 2016 at King Fahd Palace in Dakar.
03.15.16
Save the date: the 3rd edition of SecurityDay will take place on March 15th and 16th 2016 at King Fahd Palace in Dakar.
Read
01
MIN
Image Sustainable Security Applied to Cybersecurity [by Charles d'Aumale, founder of Trust & Tech]
Risks management
02.17.16 Risks management
Sustainable Security Applied to Cybersecurity by Charles d’Aumale, founder of Trust & Tech
Read
04
MIN
Image Data vulnerability: companies must strengthen their security [by Sofia Rufin, Brainloop’s Regional Vice President]
Risks management
01.19.16 Risks management
Data vulnerability: companies must strengthen their security by Sofia Rufin, Brainloop’s Regional Vice President
Read
06
MIN
Image Cybersecurity Is Everyone's Business [by Jean-Christophe Mathieu, product and solution security officer, Siemens France]
Risks management
01.19.16 Risks management
Cybersecurity Is Everyone’s Business by Jean-Christophe Mathieu, product and solution security officer, Siemens France
Read
06
MIN
Image Voting by Internet : secure and verifiable [by Thierry Flajoliet, CEO of Election-Europe]
Digital transformation
Voting by Internet : secure and verifiable by Thierry Flajoliet, CEO of Election-Europe
Read
05
MIN
Image Whose Privacy Are We Protecting? Balancing Rights to Anonymity with Rights to Public Safety
Cyber stability
01.13.16 Cyber stability
Whose Privacy Are We Protecting? Balancing Rights to Anonymity with Rights to Public Safety
Read
04
MIN
Image The Frogans technology makes the publication of data on the Internet secure [by Julie Laurent-Ledoux]
Digital transformation
The Frogans technology makes the publication of data on the Internet secure by Julie Laurent-Ledoux
Read
08
MIN
Image Dealing with spam: a technical & organizational approach [by Charles Ibrahim]
Secops
01.06.16 Secops
Dealing with spam: a technical & organizational approach by Charles Ibrahim
Read
10
MIN
Image 2020: new Technologies, new Hopes, new Challenges [by John Suffolk, Huawei Senior Vice President, Global Cyber Security & Privacy Officier]
Risks management
12.31.15 Risks management
2020: new Technologies, new Hopes, new Challenges by John Suffolk, Huawei Senior Vice President, Global Cyber Security & Privacy Officier
Read
05
MIN
Image Cyber Attacks : Crisis Recovery and Anticipated Measures [by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague]
Secops
12.31.15 Secops
Cyber Attacks : Crisis Recovery and Anticipated Measures by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague
Read
13
MIN
Image An Ecosystem for Private Customer Data Management [by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus]
Secops
12.31.15 Secops
An Ecosystem for Private Customer Data Management by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus
Read
13
MIN
Image Internet of Things, Big Data, Cloud : take Security and Privacy seriously to stay in the game [by Corix Partners]
Risks management
12.31.15 Risks management
Internet of Things, Big Data, Cloud : take Security and Privacy seriously to stay in the game by Corix Partners
Read
02
MIN
Image Security in Horizon 2020 : its implementation in France [by Arnaud Nachef, Coordinator of the French NCP consortium for Secure Societies, CEA]
Cyber stability
12.31.15 Cyber stability
Security in Horizon 2020 : its implementation in France by Arnaud Nachef, Coordinator of the French NCP consortium for Secure Societies, CEA
Read
09
MIN
Image The French–German conference on digital affairs: a missed opportunity? [by Guy Mamou-Mani, vice-chairman of Open and chairman of Syntec Numérique]
Cyber stability
11.27.15 Cyber stability
The French–German conference on digital affairs: a missed opportunity? by Guy Mamou-Mani, vice-chairman of Open and chairman of Syntec Numérique
Read
04
MIN