Image Voting by Internet : secure and verifiable [by Thierry Flajoliet, CEO of Election-Europe]
Digital transformation
Voting by Internet : secure and verifiable by Thierry Flajoliet, CEO of Election-Europe
Read
05
MIN
Image Whose Privacy Are We Protecting? Balancing Rights to Anonymity with Rights to Public Safety
Cyber stability
01.13.16 Cyber stability
Whose Privacy Are We Protecting? Balancing Rights to Anonymity with Rights to Public Safety
Read
04
MIN
Image The Frogans technology makes the publication of data on the Internet secure [by Julie Laurent-Ledoux]
Digital transformation
The Frogans technology makes the publication of data on the Internet secure by Julie Laurent-Ledoux
Read
08
MIN
Image Dealing with spam: a technical & organizational approach [by Charles Ibrahim]
Secops
01.06.16 Secops
Dealing with spam: a technical & organizational approach by Charles Ibrahim
Read
10
MIN
Image 2020: new Technologies, new Hopes, new Challenges [by John Suffolk, Huawei Senior Vice President, Global Cyber Security & Privacy Officier]
Risks management
12.31.15 Risks management
2020: new Technologies, new Hopes, new Challenges by John Suffolk, Huawei Senior Vice President, Global Cyber Security & Privacy Officier
Read
05
MIN
Image Cyber Attacks : Crisis Recovery and Anticipated Measures [by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague]
Secops
12.31.15 Secops
Cyber Attacks : Crisis Recovery and Anticipated Measures by Daniel Guinier, Expert in cybercrime and financial crimes for the International Criminal Court in The Hague
Read
13
MIN
Image An Ecosystem for Private Customer Data Management [by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus]
Secops
12.31.15 Secops
An Ecosystem for Private Customer Data Management by Harald Gjermundrød, Département of Computer Science, University of Nicosia, Cyprus
Read
13
MIN
Image Internet of Things, Big Data, Cloud : take Security and Privacy seriously to stay in the game [by Corix Partners]
Risks management
12.31.15 Risks management
Internet of Things, Big Data, Cloud : take Security and Privacy seriously to stay in the game by Corix Partners
Read
02
MIN
Image Security in Horizon 2020 : its implementation in France [by Arnaud Nachef, Coordinator of the French NCP consortium for Secure Societies, CEA]
Cyber stability
12.31.15 Cyber stability
Security in Horizon 2020 : its implementation in France by Arnaud Nachef, Coordinator of the French NCP consortium for Secure Societies, CEA
Read
09
MIN
Image The French–German conference on digital affairs: a missed opportunity? [by Guy Mamou-Mani, vice-chairman of Open and chairman of Syntec Numérique]
Cyber stability
11.27.15 Cyber stability
The French–German conference on digital affairs: a missed opportunity? by Guy Mamou-Mani, vice-chairman of Open and chairman of Syntec Numérique
Read
04
MIN
Image Thematic breakfast on the 20th October 2015 : « Mobile apps security : the new challenge »
10.20.15
Thematic breakfast on the 20th October 2015 : « Mobile apps security : the new challenge »
Read
02
MIN
Image Safe Harbor: what consequences? (by Army General (2S) Watin-Augouard, Founder of the FIC)
Cyber stability
10.16.15 Cyber stability
Safe Harbor: what consequences? (by Army General (2S) Watin-Augouard, Founder of the FIC)
Read
04
MIN
Image Cyber security: French speaking people unite at FIC 2016 [by Jean-Marie Corriere, Systemis]
Risks management
10.15.15 Risks management
Cyber security: French speaking people unite at FIC 2016 by Jean-Marie Corriere, Systemis
Read
02
MIN
Image Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. [by Jean-Marc Rietsch, international dematerialisation expert]
Secops
10.15.15 Secops
Dematerialisation represents an important step towards greater trust, greater fluidity, greater accessibility and greater security in digital affairs in Europe. by Jean-Marc Rietsch, international dematerialisation expert
Read
03
MIN
Image The Security of Executives: A Challenge for CISOs [by Guillaume Tissier, CEIS]
Secops
09.09.15 Secops
The Security of Executives: A Challenge for CISOs by Guillaume Tissier, CEIS
Read
08
MIN
Image The Economics of Cybersecurity: Drawing Inspiration from Insurance to Fight Against Market Biases [by Maxime ALAY-EDDINE, Cyberwatch SAS
Secops
09.08.15 Secops
The Economics of Cybersecurity: Drawing Inspiration from Insurance to Fight Against Market Biases [by Maxime ALAY-EDDINE, Cyberwatch SAS
Read
11
MIN
Image News on the "loi sur le renseignement" [by General (2S) Marc Watin-Augouard]
Cybercrime
08.04.15 Cybercrime
News on the “loi sur le renseignement” by General (2S) Marc Watin-Augouard
Read
03
MIN
Image Data Theft: the French Court of Cassation Refines the Godfrain Law [by General (2S) Marc Watin-Augouard]
Cybercrime
08.04.15 Cybercrime
Data Theft: the French Court of Cassation Refines the Godfrain Law by General (2S) Marc Watin-Augouard
Read
04
MIN
Image Japan plans to fortify its cybersecurity [by Yoko Nitta, Visiting Lecturer, National Defense Academy]
Cyber stability
08.04.15 Cyber stability
Japan plans to fortify its cybersecurity by Yoko Nitta, Visiting Lecturer, National Defense Academy
Read
06
MIN
Image After Chief Digital Officer, now introducing Chief Data Officer! [by Alexandra Droullé, Partner Eurosearch & associates, consulting in resource management]
Cyber +
08.04.15 Cyber +
After Chief Digital Officer, now introducing Chief Data Officer! by Alexandra Droullé, Partner Eurosearch & associates, consulting in resource management
Read
04
MIN
Image Healthcare Data Security: 'I' Well Before 'C' [by Cédric Cartau, CISO of Nantes Hospital]
Secops
08.03.15 Secops
Healthcare Data Security: ‘I’ Well Before ‘C’ by Cédric Cartau, CISO of Nantes Hospital
Read
07
MIN