<< Back to Sessions On the Shoulder of Giants: Reviving WSUS Attacks In 2015, Paul Stone and Alex Chapman presented a novel attack at the BlackHat USA conference. Their talk covered their exploration of the usual enterprise deployment of the Windows Update...
<< Back to Sessions Forget your Perimeter: From Phishing Email to Full VPN Compromise Like it or not, the perimeter has been a necessary line of defense to protect corporate networks from adversaries. Virtual Private Networks (VPNs) appliances are exposed on...
<< Back to Sessions A Crash Course in Getting Your Cybersecurity Right in 2021 In this session, we will take a look at the current real threatscape, consider the cybersecurity challenges and decisions every company needs to face head-on this year as they prepare...
<< Back to Sessions No Privacy without Security We are collecting and generating data at an unprecedented rate and there is no end to it. The volume, velocity and variety of data collected, transmitted, and stored is associated with numbers that hardly anyone...
<< Back to Sessions Le droit à l’expectative de vie privée en matière criminelle et technologies de l’information : enjeux et état de la situation en 2020 La notion d’expectative de vie privée en droit criminel a évoluée de manière importante au courant des...
<< Back to Sessions L’identité numérique, un pilier de l’écosystème intelligent blockchain Les interactions/processus dans le monde numérique sont limitées par le manque de confiance entre les participants. L’identité numérique est l’un des plus vieux problèmes...
Recent Comments