CyAN and the Konrad-Adenauer Foundation: Security first! Expectations of France on an European Security Policy

CyAN, represented by its President Jean-Christophe Le Toquin and by Yvon Le Roux, was invited by the Konrad-Adenauer-Foundation to share its views at the seminar “Security first! Expectations of France on an European Security Policy” on 5th September 2018. The CyAN representatives provided an overview on major cyberthreats, detailed how organisations should assess these threats […]

Empowerment of child victims and children at risk of sexual exploitation, A literature review

* By Nikoleta Lydaki Simantiri, researcher on child sexual exploitation In January 2016, the Down to Zero Alliance started implementing a 5-year programme to jointly address the issue of commercial sexual exploitation of children (CSEC) in 11 countries in Asia and Latin America. The Alliance is a collaboration between Terre des Hommes Netherlands, Defence for […]

Abdul-Hakeem Ajijola named “Top Influencer” by IFSEC

Congratulations to CyAN member Abdul–Hakeem Ajijola, for being named one of the 2018 IFSEC Global “Top Influences” in Cyber Security. Mr. Ajijola is the Chair of the Cyber Incident Management & Critical Information Protection Working Group at the Global Forum on Cyber Expertise (GFCE) and a former Senior Special Assistant Innovation & Technology to the […]

The Role of the State in the Private-Sector Cybersecurity Challenge

* By Ido Sivan-Sevilla, CyAN member and Gabi Siboni – The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy or position of CyAN – After three decades of widespread development in digital technologies and telecommunications, it has become evident that cybersecurity cannot be adequately ensured […]

Dr. Dzsinich to represent CyAN at ACC Annual conference

PARIS – On 21 May 2018 CyAN member Dr. Greg Dzsinich was invited to speak at the Annual Conference of the  Association of Corporate Counsels (ACC). Dr. Dzsinich was leading an interactive workshop with IBM and EY and introduced various organizational and technical aspects of real-life cybersecurity scenarios. These cases included personally identifiable information theft, […]