Rechercher par propriété
De Wiki Campus Cyber
Cette page fournit une simple interface de navigation pour trouver des entités décrites par une propriété et une valeur nommée. D’autres interfaces de recherche disponibles comprennent la page recherche de propriété, et le constructeur de requêtes « ask ».
Liste de résultats
- Réglementation de l'IA + (Synthèse de la règlemention européen dite « Artificial Intelligence Act ».)
- Spécifications générales et gouvernance wiki + (Synthèse des spécifications du wiki et du modèle de gouvernance à développer.)
- Synthèse Ressources Mutualisées + (Synthèse des travaux d'analyses du GT Ressources Mutualisées)
- Technology mapping - Agile cybersecurity + (Technology mapping - Agile cybersecurity)
- Cybersécurité Agile - Cartographie des technologies + (Technology mapping - Agile cybersecurity)
- Cyber-Augmented Communication Plan + (The Awareness WG has created the PCCA - Plan de Communication Cyber Augmenté - to massively disseminate cyber risk awareness messages.)
- Plan de Communication Cyber Augmenté + (The Awareness WG has created the PCCA - Plan de Communication Cyber Augmenté - to massively disseminate cyber risk awareness messages.)
- TOP - The Osint Project + (The Osint Project est une plateforme ludo-pédagogique dédiée à la sensibilisation à l'OSINT, aux bonnes pratiques numériques et au développement de l'esprit critique.)
- TOP - The Osint Project + (The Osint Project est une plateforme ludo-pédagogique dédiée à la sensibilisation à l'OSINT, aux bonnes pratiques numériques et au développement de l'esprit critique.)
- TOP - The Osint Project + (The Osint Project is an edutainment platform dedicated to OSINT awareness, good digital practices and critical thinking.)
- TOP - The Osint Project + (The Osint Project is an edutainment platform dedicated to OSINT awareness, good digital practices and critical thinking.)
- Post-quantum cryptography - Awareness + (The PQC workgroup produced a booklet to ra … The PQC workgroup produced a booklet to raise awareness about the urgency of implementing transition plans in your organizations.</br>This concise booklet can be proposed to decision-making teams to acculturate them to the inherent risks in the arrival of quantum computing.risks in the arrival of quantum computing.)
- Post-quantum cryptography - Sensibilisation + (The PQC workgroup produced a booklet to ra … The PQC workgroup produced a booklet to raise awareness about the urgency of implementing transition plans in your organizations.</br>This concise booklet can be proposed to decision-making teams to acculturate them to the inherent risks in the arrival of quantum computing.risks in the arrival of quantum computing.)
- Campus Normandie Cyber + (The Territorial Campus Cyber of Normandie: serving the digital security of organisations and territory, the development of the regional sector and the national network of cybersecurity campuses.)
- Training Cycle 2 : synthesis + (The Training WG aims to propose actions to make training offers visible and thus supply the sector with new recruits at the right skill level.)
- Synthèse Formation Cycle 2 + (The Training WG aims to propose actions to make training offers visible and thus supply the sector with new recruits at the right skill level.)
- Insider - CI Gestion de crise d'origine cyber, entraînement + (The Working Group is structured around three main areas: doctrine, equipment and training.)
- Ressources Mutualisées + (The aim is to identify services that can be pooled and to propose a governance framework.)
- Mutualized resources + (The aim is to identify services that can be pooled and to propose a governance framework.)
- Insider Broadcast - CyberSystainability Methodology Release + (The aim of the CyberSustainability Methodology is to initiate a systemic change in cyber ecosystems by promoting a large secure-and-sustainable-by-design cybersecurity movement.)
- Insider Broadcast - CyberSystainability Methodology Release + (The aim of the CyberSustainability Methodology is to initiate a systemic change in cyber ecosystems by promoting a large secure-and-sustainable-by-design cybersecurity movement.)
- Insider Broadcast - CyberSystainability Methodology Release + (The aim of the CyberSustainability Methodology is to initiate a systemic change in cyber ecosystems by promoting a large secure-and-sustainable-by-design cybersecurity movement.)
- Insider Broadcast - CyberSystainability Methodology Release + (The aim of the CyberSustainability Methodology is to initiate a systemic change in cyber ecosystems by promoting a large secure-and-sustainable-by-design cybersecurity movement.)
- Artificial Intelligence Security Manager + (The cybersecurity advisor for data scientists is an integral part of their working environment. He or she is their main point of contact for ensuring that cybersecurity is taken into account in the AI projects they develop.)
- Référent sécurité en Intelligence Artificielle + (The cybersecurity advisor for data scientists is an integral part of their working environment. He or she is their main point of contact for ensuring that cybersecurity is taken into account in the AI projects they develop.)
- Campus Cyber Hauts de France - Lille Métropole + (The focal point for the cybersecurity sector in Hauts-de-France.)
- Skills matrix for related professions + (The matrix is a summary reference framework which identifies the skills and their level for access to a profession.)
- Matrice des compétences - métiers connexes + (The matrix is a summary reference framework which identifies the skills and their level for access to a profession.)
- Matrice des compétences des métiers techniques + (The matrix is a synthetic frame of reference that identifies skills and their levels for access to a profession.)
- Skills matrix for technical professions + (The matrix is a synthetic frame of reference that identifies skills and their levels for access to a profession.)
- GT Formation : Matrice des compétences métiers connexes + (The matrix is a synthetic frame of reference for identifying skills and their levels for access to a profession.)
- WG Training: Skills matrix for related professions + (The matrix is a synthetic frame of reference for identifying skills and their levels for access to a profession.)
- WG Training: Skills matrix for technical professions + (The matrix is a synthetic frame of reference for identifying skills and their levels for access to a profession.)
- GT Formation : Matrice des compétences métiers techniques cyber + (The matrix is a synthetic frame of reference for identifying skills and their levels for access to a profession.)
- Méthodologie d'évaluation sur noeuds Ethereum inspiré de la CSPN + (The objective of this production is to verify if the EN 17640 evaluation methodology can be used for performing an Ethereum Nodes evaluation under the French C.S.P.N certification scheme.)
- Evaluation methodology for Ethereum nodes within the CSPN framework + (The objective of this production is to verify if the EN 17640 evaluation methodology can be used for performing an Ethereum Nodes evaluation under the French C.S.P.N certification scheme.)
- Méthodologie d'évaluation des Smart Contract inspiré de la CSPN + (The objective of this production is to verify whether the EN 17640 evaluation methodology can be used for the evaluation of Smart Contracts within the framework of the C.S.P.N certification scheme.)
- Evaluation methodology for Ethereum nodes within the CSPN framework + (The objective of this production is to verify whether the EN 17640 evaluation methodology can be used for the evaluation of Smart Contracts within the framework of the C.S.P.N certification scheme.)
- Attribut:Owl:differentFrom + (The property that determines that two given individuals are different.)
- Livre Blanc - Gestion des Vulnérabilités + (This White Paper is a guide to the proper management of vulnerabilities in an IT system, from detection to remediation, right through to the feedback phase.)
- White paper - Vulnerability Management + (This White Paper is a guide to the proper management of vulnerabilities in an IT system, from detection to remediation, right through to the feedback phase.)
- Matrice d'évaluation du niveau de maturité d'une organisation en matière de PQC + (This document is intended to help companies that wish to assess their posture and maturity level with regard to their exposure and ability to protect themselves against the quantum threat. It is a general framework to inspire companies that wish to do so.)
- Sécurisation de la donnée dans le Cloud + (This guide to ‘Securing Data in the Cloud’ is intended for professionals responsible for designing or deploying cloud solutions, such as architects, developers and security advisors. It focuses on a fundamental lever of data security: encryption.)
- Data Security in the Cloud + (This guide to ‘Securing Data in the Cloud’ is intended for professionals responsible for designing or deploying cloud solutions, such as architects, developers and security advisors. It focuses on a fundamental lever of data security: encryption.)
- Formation des analystes Cloud - Exercices de cadrage + (Training exercises for Cloud analysts, according to their level and responsabilities.)
- GT Détection en environnement Cloud - Formation des analystes + (Training of analysts operating in Cloud environments)
- GT Detection in Cloud environment - Analyst training + (Training of analysts operating in Cloud environments)
- Formation des analystes Cloud - Référentiel de formation + (Training reference framework for Cloud analysts, according to their level and responsabilities.)
- Attribut:Foaf:homepage + (URL of the homepage of something, which is a general web resource.)
- Fiche méthode : Exercice Systèmes industriels + (Un exercice « Système industriel » porte s … Un exercice « Système industriel » porte sur la compromission de l’environnement OT (Operational Technology). Ainsi, des équipements SCADA, automates, objets connectés, etc. de la chaine de production peuvent être touchés de par leur durée de vie, les normes spécifiques à respecter, la nature nature de leurs protocoles et les restrictions de mise-à-jour.ocoles et les restrictions de mise-à-jour.)
- Facilitateur en Intelligence Artificielle + (Un facilitateur IA est un correspondant cyber disposant de connaissances pratiques en cybersécurité et en Intelligence Artificielle.)