Image Suspicious Activities on Social Media: What Can Be Learnt from Counterterrorist Financing Efforts? (By Oliver Kraft, RUSI)
Cyber stability
11.28.17 Cyber stability
Suspicious Activities on Social Media: What Can Be Learnt from Counterterrorist Financing Efforts? (By Oliver Kraft, RUSI)
Read
05
MIN
Image Breakfast Debate "The Resilience Challenge in a Hyperconnected EU"
11.07.17
Breakfast Debate “The Resilience Challenge in a Hyperconnected EU”
Read
01
MIN
Image Amelia Anderstotter, Internet Expert
Digital Sovereignty
Amelia Anderstotter, Internet Expert
Read
03
MIN
Image Why Are We Still Talking About ‘Women in Cyber Security’? (Laura Brent, NATO)
Risks management
10.26.17 Risks management
Why Are We Still Talking About ‘Women in Cyber Security’? (Laura Brent, NATO)
Read
06
MIN
Image Shadow Brokers, the fog of war in the cyberspace (Rafael Ponce, CEIS)
Cyber stability
10.26.17 Cyber stability
Shadow Brokers, the fog of war in the cyberspace (Rafael Ponce, CEIS)
Read
06
MIN
Image Security and Freedom: Inextricably Intertwined in the Digital Arena
Digital transformation
Security and Freedom: Inextricably Intertwined in the Digital Arena
Read
06
MIN
Image Yes to a European Cybersecurity Act — but Not to Just Any Requirement (SD MAGAZINE)
Digital Sovereignty
Yes to a European Cybersecurity Act — but Not to Just Any Requirement (SD MAGAZINE)
Read
07
MIN
Image Cybersecurity: you’ll all be rated, sooner or later! (Guillaume Tissier, Managing Director, CEIS)
Digital transformation
Cybersecurity: you’ll all be rated, sooner or later! (Guillaume Tissier, Managing Director, CEIS)
Read
08
MIN
Image Through "Regtech" solutions, GDPR will be the future technical and operational standard for personal data processing (Pierre-Olivier Grenouiller, Legal IT Factory)
Cyber +
09.26.17 Cyber +
Through “Regtech” solutions, GDPR will be the future technical and operational standard for personal data processing (Pierre-Olivier Grenouiller, Legal IT Factory)
Read
05
MIN
Image The Cloud: A Weapon of Mass Seduction for Cybercriminals (By Vincent Riou, Bluecyforce)
Risks management
09.26.17 Risks management
The Cloud: A Weapon of Mass Seduction for Cybercriminals (By Vincent Riou, Bluecyforce)
Read
05
MIN
Image Thematic breakfast: "GDPR and the rise of RegTechs"
09.19.17
Thematic breakfast: “GDPR and the rise of RegTechs”
Read
01
MIN
Image Hexatrust: let’s create the FrenchTech Industry in cybersecurity!
Cyber +
07.24.17 Cyber +
Hexatrust: let’s create the FrenchTech Industry in cybersecurity!
Read
02
MIN
Image Microsoft's Geneva Convention: protecting web users against State irresponsible behaviors in the cyberspace ? {By Darius Fadier, CEIS}
Digital Sovereignty
Microsoft’s Geneva Convention: protecting web users against State irresponsible behaviors in the cyberspace ? {By Darius Fadier, CEIS}
Read
04
MIN
Image Security Beyond Smart Meters - Smart Homes (By Luay Baltaji, Cybersecurity Manager, OMNETRIC Group)
Digital transformation
Security Beyond Smart Meters – Smart Homes (By Luay Baltaji, Cybersecurity Manager, OMNETRIC Group)
Read
08
MIN
Image Are American and European Voting Systems Subject to Russian Hacking? (By SecGate)
Cyber stability
07.13.17 Cyber stability
Are American and European Voting Systems Subject to Russian Hacking? (By SecGate)
Read
09
MIN
Image Thematic Breakfast: Quantum Computing: the encryption challenge
06.13.17
Thematic Breakfast: Quantum Computing: the encryption challenge
Read
01
MIN
Image The Six Principles Behind GDPR (Giovanni Buttarelli, European Data Protection Supervisor)
Digital transformation
The Six Principles Behind GDPR (Giovanni Buttarelli, European Data Protection Supervisor)
Read
06
MIN
Image How can we make smart cities smart and secure?
Digital transformation
How can we make smart cities smart and secure?
Read
08
MIN
Image Thematic Breakfast: How to make smart cities safe and secure ?
05.03.17
Thematic Breakfast: How to make smart cities safe and secure ?
Read
01
MIN
Image Incident Response: Preparation is essential - Download the MagIT dedicated E-Guide
Secops
04.13.17 Secops
Incident Response: Preparation is essential – Download the MagIT dedicated E-Guide
Read
01
MIN
Image The Future of Cyber and Data Insurance (By Gregory Fenn)
Cyber +
04.11.17 Cyber +
The Future of Cyber and Data Insurance (By Gregory Fenn)
Read
08
MIN