Chaire Cyber CNI

Chaire Cyber CNI – Cybersecurity for Critical Networked Infrastructures

FRI, MAY 13, 2022, 5pm CET I Moritz Flößler (EuropaNova Germany e.V., Germany) – InsTitutionalizing Cybersecurity: National Strategies and their Implications for Europe

On Fri, May 13, 2022, 5pm CET I Moritz Flößler (EuropaNova Germany e.V., Germany), will talk about “Institutionalizing Cybersecurity: National Strategies and their Implications for Europe“.

Watch the trailer here: https://youtu.be/7fzsRQgmqTs?list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd

Please share the link https://talk.cybercni.fr/18 with your interested friends!

Wed, Apr 27, 2022, 5pm CET I Cora Perner (Airbus, Germany) – Security for ground and air vehicles

On Wed, Apr 27, 2022, 5pm CET I Cora Perner (Airbus, Germany), will talk about “Security for ground and air vehicles“. Watch the trailer here: https://youtu.be/u_v4cjm42qU?list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd Please share the link https://talk.cybercni.fr/2022-04 with your interested friends!

Wed, Jun 16, 2021, 17 CET I Pontus Johnson (KTH) – Mutter aller Sicherheitslücken: Arbitrary Code Execution in the Universal Turing Machine

On Jun 16, 2021, 17h CET, Pontus Johnson, Professor at KTH Royal Institute of Technology, Sweden, will give a talk on “Mutter aller Sicherheitslücken: Arbitrary Code Execution in the Universal Turing Machine”.

You are cordially invited to join the free live stream on youtube and LinkedIn! To register and subscribe to the series announcements, just enter your mail address in the box on the left at https://talk.cybercni.fr/. Please share the link https://talk.cybercni.fr/2021-06-16 with your interested friends!

Wed, Mar 31, 2021, 17 CET I Sylvain Guilley (Secure-IC) – Addressing security breaches through trusted data management

March 31, 2021, at 17h CET, Sylvain Guilley, co-founder and CTO at Secure-IC, France, will give a talk on “Addressing security breaches through trusted data management”.

This talk will explain how current security breaches, such as data leaks, sabotage and even large-scale ransom attacks, can be addressed through a “trusted data management” approach.
Topics will be covered encompass :
– End-to-end security for IoTs, from chip to cloud via edge
– DevSecOps (Development – Security – Operations) tool chain, security left shift and pre-silicon certification
– Lifecycle management, example of transitioning to Post-Quantum Cryptography
– Security improvements with Artifical Intelligence on chip
– Trends in different markets: industry 4.0, automotive, marine, government.

You are cordially invited to join the free live stream on youtube!

View More