Image Cyberspace has not won the survival of the fittest, says the UN [by Florence Mangin, Ambassador coordinator for cybersecurity and public data]
Cyber stability
08.03.15 Cyber stability
Cyberspace has not won the survival of the fittest, says the UN by Florence Mangin, Ambassador coordinator for cybersecurity and public data
Read
04
MIN
Image Summary and comments on the breakfast organized by the FIC observatory: "Cyber Prefect, to serve citizens, businesses and the state"
07.02.15
Summary and comments on the breakfast organized by the FIC observatory: “Cyber Prefect, to serve citizens, businesses and the state”
Read
06
MIN
Image The connected automobile – its infrastructure, vehicles and drivers: a connected future [by Cindy Roth, CEIS]
Digital transformation
The connected automobile – its infrastructure, vehicles and drivers: a connected future by Cindy Roth, CEIS
Read
09
MIN
Image The quest for reliable and secure source code [by Sebastien Giora, Advens]
Secops
07.02.15 Secops
The quest for reliable and secure source code by Sebastien Giora, Advens
Read
04
MIN
Image Conference "Supporting cybersecurity startups in Europe: overview & best practices", June 10th in Bruxelles
06.10.15
Conference “Supporting cybersecurity startups in Europe: overview & best practices”, June 10th in Bruxelles
Read
02
MIN
Image Sovereign OS: the Holy Grail of digital sovereignty? [by Guillaume Tissier, CEIS]
Cyber stability
05.21.15 Cyber stability
Sovereign OS: the Holy Grail of digital sovereignty? by Guillaume Tissier, CEIS
Read
03
MIN
Image Global Online Fraud Losses = 140,000 Jobs [by Fabrice Colas, Ubivar]
Cybercrime
05.12.15 Cybercrime
Global Online Fraud Losses = 140,000 Jobs by Fabrice Colas, Ubivar
Read
05
MIN
Image The risk of a major flood in the the Ile-de-France region is also a challenge in terms of Information Systems Security [by Vincent Balouet, maitrisedesrisques.com]
Secops
05.12.15 Secops
The risk of a major flood in the the Ile-de-France region is also a challenge in terms of Information Systems Security by Vincent Balouet, maitrisedesrisques.com
Read
10
MIN
Image Conclusion to Symantec's annual report on Internet security threats [by Laurent Heslault, Symantec]
Cybercrime
05.12.15 Cybercrime
Conclusion to Symantec’s annual report on Internet security threats by Laurent Heslault, Symantec
Read
04
MIN
Image The first FIC 2016 scientific committee held on April 14, 2015
05.12.15
The first FIC 2016 scientific committee held on April 14, 2015
Read
01
MIN
Image Review of the FIC observatory breakfast: Is e-commerce a precursor to the fight against digital identity fraud?
05.12.15
Review of the FIC observatory breakfast: Is e-commerce a precursor to the fight against digital identity fraud?
Read
03
MIN
Image FIC Observatory Breakfast Talk : « E-commerce, the precursor to the fight against digital identity fraud ? »
04.14.15
FIC Observatory Breakfast Talk : « E-commerce, the precursor to the fight against digital identity fraud ? »
Read
01
MIN
Image Personal data: a cornerstone of sovereignty? [by Loïs Samain, CEIS]
Cyber stability
04.07.15 Cyber stability
Personal data: a cornerstone of sovereignty? by Loïs Samain, CEIS
Read
07
MIN
Image The FIC 2016 will take place on 25-26 January 2016 and focus on the overarching theme of data security & privacy
04.07.15
The FIC 2016 will take place on 25-26 January 2016 and focus on the overarching theme of data security & privacy
Read
04
MIN
Image [Contribution] Which strategy should you adopt to boost your SOC's in-house appeal? [by Thomas Girard, CS]
Cyber stability
04.07.15 Cyber stability
Contribution Which strategy should you adopt to boost your SOC’s in-house appeal? by Thomas Girard, CS
Read
05
MIN
Image Next FIC Breakfast on "Security and mobility"
03.11.15
Next FIC Breakfast on “Security and mobility”
Read
01
MIN
Image Accelerating the business of cybersecurity [by Vincent Riou, CEIS]
Risks management
02.18.15 Risks management
Accelerating the business of cybersecurity by Vincent Riou, CEIS
Read
06
MIN
Image The Sony Pictures Entertainment Case : The employees’ low-profile initiative
Secops
01.15.15 Secops
The Sony Pictures Entertainment Case : The employees’ low-profile initiative
Read
01
MIN
Image [Contribution] Why CerberHost? Because your sites are vulnerable... [by Emile Heitor, CTO, NBS Systems]
Cybercrime
01.12.15 Cybercrime
Contribution Why CerberHost? Because your sites are vulnerable… by Emile Heitor, CTO, NBS Systems
Read
02
MIN
Image [Contribution] Closing the door to attackers with continued security and the Cloud [by Philippe Courtot, Qualys]
Cybercrime
01.12.15 Cybercrime
Contribution Closing the door to attackers with continued security and the Cloud by Philippe Courtot, Qualys
Read
01
MIN
Image [Contribution] Evolve or Die: Security Adaptation in a Virtual World [by Bitdefender]
Secops
01.05.15 Secops
Contribution Evolve or Die: Security Adaptation in a Virtual World by Bitdefender
Read
02
MIN