1_Cybersécurité
Home / Dossiers / Society / Facing cyber threats: public and industrial strategies
π Society π Digital π Industry

Facing cyber threats: public and industrial strategies

5 episodes
  • 1
    Cybersecurity: why protecting public data is critical
  • 2
    Cybersecurity flaws make French industry vulnerable
  • 3
    Why are cyber attackers targeting supply chains?
  • 4
    Ethical hacking: at the heart of modern cybersecurity
  • 5
    What the future holds for cybersecurity in connected vehicles
Épisode 1/5
On January 15th, 2025
5 min reading time
Christophe Gaie
Christophe Gaie
Head of the Engineering and Digital Innovation Division at the Prime Minister's Office
Jean LANGLOIS-BERTHELOT
Jean Langlois-Berthelot
Doctor of Applied Mathematics and Head of Division in the French Army

Key takeaways

  • Cybersecurity is now a major digital challenge in the face of new and varied threats: cybercriminals, enemy states or activist groups.
  • Cyber threats are diversifying, targeting critical infrastructures and being reinforced by new technologies (artificial intelligence, blockchain, etc.).
  • Public institutions are important targets because they concentrate sensitive data such as personal, financial or strategic information.
  • Public institutions must put a strategy in place that protects their information systems against threats while guaranteeing the continuity of services and respecting the rights and freedoms of citizens.
  • France, Poland and Italy have put in place strategies to deal with cyber threats, with common objectives but different action plans.
Épisode 2/5
On March 2nd, 2023
5 min reading time
Jean-Luc Gibernon
Jean-Luc Gibernon
cybersecurity director at Sopra Steria and administrator of the Cyber Campus
Avatar
Guillaume Poupard
former director of Anssi, the French national agency for information systems security

Key takeaways

  • Cybersecurity is a hot topic: in 2022, there was an estimated 26% increase in computer attacks.
  • This is partly because the digital transition is not always immediately accompanied by appropriate cybersecurity.
  • There are two types of threat: the state threat, centred on espionage, and the criminal threat, centred on extortion.
  • Large industrial players are less vulnerable than SMEs or ETIs, as they have both a budget and a dedicated cybersecurity department.
  • In 2021, cybercrime cost an average of $1,000bn worldwide.
Épisode 3/5
On April 9th, 2025
3 min reading time
Badis Hammi
Badis Hammi
Associate Professor at Télécom SudParis (IP Paris)
H1_London_044 (2)
Roni Carta
Ethical Hacker and Founder of Lupin & Holmes

Key takeaways

  • The number of phishing attacks tripled between 2020 and 2021, reaching a record high in 2023, when the Anti-Phishing Working Group recorded nearly 5 million attacks.
  • Attacks on the digital supply chain represent a real threat to IT security.
  • They can exploit an organisation’s network of partners to target it, thus multiplying the possible attack surface.
  • Developers frequently use pieces of code that are freely available on the Internet, allowing hackers to exploit software vulnerabilities.
  • To counter this, ethical hackers carry out voluntary intrusions to identify network and infrastructure vulnerabilities in general.
Épisode 4/5
On May 14th, 2025
4 min reading time
Christophe Gaie
Christophe Gaie
Head of the Engineering and Digital Innovation Division at the Prime Minister's Office
Jean LANGLOIS-BERTHELOT
Jean Langlois-Berthelot
Doctor of Applied Mathematics and Head of Division in the French Army

Key takeaways

  • Ethical hacking is a discipline that uses techniques similar to those employed by cybercriminals, but with the aim of strengthening the resilience of information systems.
  • The objective is to proactively identify vulnerabilities in IT systems in order to prevent them from being exploited by malicious actors.
  • It is based on a rigorous methodology, founded on recognised standards (such as PTES or OSSTMM), and requires advanced technical skills.
  • This discipline is also used in crisis situations to analyse compromises, identify attack vectors and propose corrective measures.
  • Ethical hacking is set to expand with the rise of artificial intelligence, blockchain and quantum computing.
Épisode 5/5
On February 24th, 2026
4 min reading time
Thomas Le Goff_VF
Thomas Le Goff
Senior Lecturer in Digital Law at Télécom Paris (IP Paris)

Key takeaways

  • A modern car comprises more than 100 million lines of code, significantly more than an airliner.
  • In Europe, several regulatory texts exist: the General Data Protection Regulation (GDPR), the Cyber Resilience Act, and the Data Act.
  • The aim of the Data Act is to empower users and increase the flow of data between users, businesses and public authorities.
  • However, more than 70% of European companies’ data is stored on non-European clouds.
  • Depending on the company, these clouds are subject to foreign jurisdictions, making hosted data accessible even if it is physically stored on European territory.