- What are the impacts of 5G on security?
5G is an important topic of discussion these days, with political, financial, technical, but also security implications. Many people warn of risks to national sovereignty, to the point of attempting to exclude a major sector player. Others are concerned about the network architecture that would block investigation operations conducted by intelligence services and the police. But what is really at stake? What are the risks of this technology that is expected to be "disruptive"? And how can companies prepare for them? This round table will provide an opportunity to hear 5G experts discuss these security issues and clear up the confusion.
- Undersea cables for Internet: A major strategic challenge
Over 95% of the world’s information flow currently travels through undersea cables. A full 450 cables have been laid by telecoms operators and more and more often by GAFAM who control 50% of market share. So, it’s clear that the security and protection of this underwater heritage are crucial.
- The Zero Trust model put to the test
New business processes have created new attack surfaces, upsetting the security models previously put in place. Protection is now necessary where applications, but also data, users and devices are located. This round table will seek to understand this new paradigm and consider its consequences for companies.
- Financing cybersecurity in France
In France, numerous start-ups are moving into the niche of cybersecurity, and more and more investors are helping them do it. However, after the launch stage, how can these start-ups continue to pair innovation, which is indispensable for their growth, and investment, which they also need for their sustainability? This round table brings together CEOs of start-ups, Business Angels, a representative of an investment fund and of the BPI.
- Industrial data, business data: What’s at stake?
In the industrial world, ISS and business experts sometimes find it difficult to understand each other or even get along. Nevertheless, data concerns require they try to work together. So, the question is, how can we use and secure this data? This round table offers an opportunity for a discussion between ISS experts and business and industry experts.
- GDPR: What have companies done, 18 months on?
More than a year after the entry into application of the European regulation, several companies look back on its implementation and the difficulties they have encountered. How did they move from a project to a process? How did they find a balance between business projects and compliance?
- Cyber insurance: Which models for which policies?
More and more companies are taking out insurance to cover damage caused by cyberattacks. However, recent examples (Mondelez-Zurich, etc.) show that the market is not yet mature and that the parties (insurers-brokers/companies) may have difficulty agreeing or even understanding each other. This round table will examine how insurers model cyber risk in a very "new" sector with still little quantitative data. It will also examine the scope of cyber policies and how insurers can assist their clients in this area.
- Health: How to secure a hyper exposed sector?
The health sector is especially exposed to the risk of potentially dramatic cyberattacks, as seen in the past. Furthermore, the development of e-health (which offers great promise) will lead to a broader attack surface. So, how can we protect ourselves in this context? How can we protect medical equipment and patient data?