Head of the Engineering and Digital Innovation Division at the Prime Minister's Office
Jean Langlois-Berthelot
Doctor of Applied Mathematics and Head of Division in the French Army
Key takeaways
Cybersecurity is now a major digital challenge in the face of new and varied threats: cybercriminals, enemy states or activist groups.
Cyber threats are diversifying, targeting critical infrastructures and being reinforced by new technologies (artificial intelligence, blockchain, etc.).
Public institutions are important targets because they concentrate sensitive data such as personal, financial or strategic information.
Public institutions must put a strategy in place that protects their information systems against threats while guaranteeing the continuity of services and respecting the rights and freedoms of citizens.
France, Poland and Italy have put in place strategies to deal with cyber threats, with common objectives but different action plans.
Associate Professor at Télécom SudParis (IP Paris)
Roni Carta
Ethical Hacker and Founder of Lupin & Holmes
Key takeaways
The number of phishing attacks tripled between 2020 and 2021, reaching a record high in 2023, when the Anti-Phishing Working Group recorded nearly 5 million attacks.
Attacks on the digital supply chain represent a real threat to IT security.
They can exploit an organisation’s network of partners to target it, thus multiplying the possible attack surface.
Developers frequently use pieces of code that are freely available on the Internet, allowing hackers to exploit software vulnerabilities.
To counter this, ethical hackers carry out voluntary intrusions to identify network and infrastructure vulnerabilities in general.
Head of the Engineering and Digital Innovation Division at the Prime Minister's Office
Jean Langlois-Berthelot
Doctor of Applied Mathematics and Head of Division in the French Army
Key takeaways
Ethical hacking is a discipline that uses techniques similar to those employed by cybercriminals, but with the aim of strengthening the resilience of information systems.
The objective is to proactively identify vulnerabilities in IT systems in order to prevent them from being exploited by malicious actors.
It is based on a rigorous methodology, founded on recognised standards (such as PTES or OSSTMM), and requires advanced technical skills.
This discipline is also used in crisis situations to analyse compromises, identify attack vectors and propose corrective measures.
Ethical hacking is set to expand with the rise of artificial intelligence, blockchain and quantum computing.
Senior Lecturer in Digital Law at Télécom Paris (IP Paris)
Key takeaways
A modern car comprises more than 100 million lines of code, significantly more than an airliner.
In Europe, several regulatory texts exist: the General Data Protection Regulation (GDPR), the Cyber Resilience Act, and the Data Act.
The aim of the Data Act is to empower users and increase the flow of data between users, businesses and public authorities.
However, more than 70% of European companies’ data is stored on non-European clouds.
Depending on the company, these clouds are subject to foreign jurisdictions, making hosted data accessible even if it is physically stored on European territory.
Subscribe to our weekly newsletterSubscribe to our weekly newsletter