Choose below the show you want to invite this(these) person(s):
Choose below which the webtv to export this user:
Follow us on Twitter!
Become our friend
Subscribe RSS
Email
Password
Forgot password?
Remember Me
Acces by format...
----------------------
Talkshow (959)
Conference (553)
Interview – in depth (417)
PITCH (189)
Interactive interview (185)
Interview – short news on... (62)
Interactive talkshow (59)
Workshop - Webinar (53)
Chronicle (50)
Article (41)
Teaser (40)
Networking day (23)
Interactive Verbatim (22)
Resource (18)
Meeting IRL (13)
Tutorial (10)
Video Clip (9)
Report (8)
Keynote (5)
Document(ary) (1)
Other social-tv...
syntec-numerique.tv
salesvocation.com
expocrise.tv
relationspublics.com
cafeine.tv
playmywebinar.com
assurchannel.com
online-expo.tv
observatoire-immate...
digital4change.com
futurdsi.tv
mines-telecom.tv
bascunana.com
digitalsuntzu.com
politoscope.tv
finansphere.com
designpro.tv
hrchannel.com
medicalpro.tv
techinfrance.tv
mobilepro.tv
Connection
|
Subscription
Follow us on:
Priority to webcasts/shooting projects titles/subtitles research
OnLine
Media
Collaborative
technologies
e-Business
Social Innovation
& "Digitainable"
Entrepreneurship
Software
development
Mobile
Business
Digital rights
and duties
Actus, tendances et trouvailles (NEW)
A propos de nous
Topics
Suggest a new topic
Upcoming events
Community
Signup on techtoc.tv network
Why should I register and create my account here?
Invite collegues or friends
Newsfeed
Subscribers
Contributors
Think tank
Chat room
Humor
Channels
About
First steps on this site
About this site
Think tank
Access to our studios
Other social-tv
Partnership procedure[s]
Contact Us
Plan d'accès vers nos studios TV et notre espace de meetup (Cafeine TV + SmartNomad + @PitchParties + Mercury Eloquence)
Our offer
Mon job de conférencier en entreprises
STUDIO TV : privatisez-le pour vos opérations
CONTENT MARKETING : laissez-nous le "faire dire" par vos clients
BRAND CHANNEL : audience garantie sur votre page entreprise et web-TV à l'année
WEBINAIRE : webcastez vos conférences et workshops en livestreaming
ABONNEMENT : créez un flux régulier de talkshows TV
STUDIO TV : privatisez-le pour vos opérations
AUDIENCE
Partage du revenu avec nos contributeurs
My profile
Signup on techtoc.tv network
Why should I register and create my account here?
Edit my profile
How can I edit my profile?
Changing profile photo.
My favorites subjects
Manage theese alerts / Display list in full screen
I propose a shooting subject
I propose un blog entry
My Blog Entries
What's new on my network
I invite collegues to join us
My Account and Notif. Settings
My web-TVs and channels
My webcasts & show events
My groups
See my all contacts on techtoc.tv
See my Incoming Friend Requests
See my Outgoing Friend Requests
Compose a private message
Message Inbox
Sent messages
Humor
PRO area
Here are our subjects which are refined on: «
Activity sector : Computer & Network Security
»...
Filter the topics by:
State
Thematic
Format
Treatment
Activity sector
Other filter
All subjects
|
Articles preparing a filming session or without video
|
Articles with a video
Collaborative technologies
OnLine Media
e-Business
Entrepreneurship
Software development
Mobile Business
Social Innovation & "Digitainable"
Digital rights and duties
Actus, tendances et trouvailles (NEW)
A propos de nous
Talkshow
|
Conference
|
Interview – in depth
|
PITCH
|
Interactive interview
|
Interview – short news on the spot
|
Interactive talkshow
|
Workshop - Webinar
|
Chronicle
|
Article
|
Teaser
|
Networking day
|
Interactive Verbatim
|
Resource
|
Meeting IRL
|
Tutorial
|
Video Clip
|
Report
|
Keynote
|
Outside classification
|
Document(ary)
Subjects I have commented
|
Sujets that I have created/updated
|
Where I spoke or volunteered
« Previous page
Ordre :
Alphabetic
By publishing date (ZA)
Chronological (ZA)
Chronological (AZ)
Les plus vus
Most commented
By category
Next page »
Comment les hackers oeuvrent pour le monde de la sécurité IT... et pour la société qui les entoure
Ils sortent du bois et c'est sans langue de bois
Under preparation
SLOT 13
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
LOT 14
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 15
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 16
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 17
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 18
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SOT 19
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 20
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 21
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 22
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 12
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 11
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 01
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 02
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 03
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 04
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 05
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 06
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 07
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 08
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SOT 09
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 10
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 23
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 24
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 06
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 07
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 08
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SOT 09
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 10
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 11
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 12
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 13
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
LOT 14
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 05
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 04
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 02
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 25
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 26
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 27
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 28
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 29
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 30
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 16
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 26
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 01
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 15
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 27
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 21
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 25
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 24
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 23
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 22
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 20
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SOT 19
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 17
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 18
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 29
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 30
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 28
This is a slot I can book for my expert interview (cybersecurity, hacking...)
Under preparation
SLOT 03
This is a slot I can book for my expert interview (cybersecurity, hacking...)
#HackingTeam : 3 questions à un expert pour comprendre ses conséquences
En compagnie de Fabrice Epelboin (Sciences Po) et Yassir KAZAR, expert cybersécurité et hacker éthique
Retour sur l'affaire #HackingTeam et ses conséquences 1er talk : la boîte de Pandore de la surveillance est-elle ouverte ?
Nous cherchons des intervenants experts pour réaliser une vidéo pédagogique sur ce sujet !
Qu'est-ce que l'authentification forte ?
Attention sujet moins trivial qu'il n'y paraît : écoutez le CTO de DenyAll, Vincent Maury
Culture Sécurité IT : qu'est ce qu'un Bug Bounty ?
Nous cherchons des intervenants experts pour réaliser une vidéo pédagogique sur ce sujet !
Under preparation
Cyber sécurité : paradoxes et complexité
Nous cherchons des intervenants experts pour réaliser une vidéo pédagogique sur ce sujet !
Under preparation
Danger sur internet : quels scénarios catastrophe pour mon site web ?
Nous cherchons des intervenants experts pour réaliser une vidéo pédagogique sur ce sujet !
Under preparation
Pourquoi un tel manque de culture de sécurité IT dans le web ?
Nous cherchons des intervenants experts pour réaliser une vidéo pédagogique sur ce sujet !
Startups : pour vous faire une idée concrète de l'offshore programming...
Avec d'un côté les start-upers qui ont un usage de l'offshore programming, et en face le représentant d'une société de service basée en Inde
Conseils de pro pour sécuriser Android en entreprise
Avec Jérôme Robert, de LEXSI
Comment rester LIBRE (dans tous les sens du terme) à l'ère numérique ?
Privacy, Cybersécurité, logiciel libre : vous saurez tout de leurs interconnexions !
Rencontre avec 10 experts internationaux de la cybersécurité à NoSuchCon 2014
Meeting with Cybersecurity experts at NoSuchCon 2014
Comment Qualys aborde les problématiques de sécurité en exploitant la puissance de calcul du cloud
Rencontre avec Frédéric Saulet, DG Europe du Sud
L'activité sécurité du groupe SOGETI : une approche technique doublée d'un effort d'évangélisation
Edouard Jeanson porte l'effort pédagogique et accompagne les organisations dans la prise en compte de la sécurité.
Meeting with Jonathan BROSSARD, International Cybersecurity expert
(at the last NOSUCHCON hacker's conference)
Meeting with Nikita Tarakanov, high flying international cybersecurity expert (from Russia)
and founder / CEO at Crowdstrike (at the last NOSUCHCON hacker's conference)
Meeting with Robin DELAUGUERRE, CONIX (Cybersecurity expert)
(at the last NOSUCHCON hacker's conference)
Meeting with Dmitri Alperovitch, high flying international cybersecurity expert
and founder / CEO at Crowdstrike (at the last NOSUCHCON hacker's conference)
Meeting with Cédric BLANCHET, EADS senior cybersecurity expert
(at the last NOSUCHCON hacker's conference)
RIAMs 2014 : envoyez le programme !
Rencontre avec le patron d'Atheos (désormais Orange Cyberdéfense)
Rencontre avec Dominique Loiselet, Director Regional Sales France chez Blue Coat Systems
Rencontré lors des RIAMS 2013 à St Tropez (pardon)
Entretien avec Philippe COURTOT, fondateur de Qualys
Rencontré lors des RIAMS 2013 à St Tropez (pardon)
Entretien avec Hugh Thomson, Chief Security Strategist and Senior Vice-President at BlueCoat
Rencontré lors des RIAMS 2013 à St Tropez (pardon)
Entretien avec Thierry Karsenty, Directeur technique chez Checkpoint Software
Rencontré lors des RIAMS 2013 à St Tropez (pardon)
Entretien avec Pierre Siaut, Security Expert Team Leader chez Trend Micro
Rencontré lors des RIAMS 2013 à St Tropez (pardon)
Entretien avec Christophe Badot, Country Manager at Check Point Software Technologies
Rencontré lors des RIAMS 2013 à St Tropez (pardon)
Inwebo : sécuriser votre identité numérique
Rencontre avec Olivier Perroquin, Directeur général Inwebo
Discretio : une solution de chiffrement des communications téléphoniques
Rencontre avec Hervé Baroukh, CEO MBDSYS
Trend Micro : une protection complète des utilisateurs et des entreprises
Rencontre avec Loic Guezo, Security Evangelist - Trend Micro France
Sourcefire : Que faire après une cyber-attaque qu'on n'a pas été en mesure de détecter ?
Rencontre avec Cyrille Badeau, directeur Europe du Sud - Sourcefire
Rencontre avec Christophe Auberger, Directeur technique chez FORTINET
Une explication par le n°3 mondial des appliances de sécurité : Fortinet, et son labo Fortiguard.
Création d’Orange Cyberdefense suite au rachat d’Atheos
Un spécialiste de la Cybersécurité partage sa vision du domaine
Sécurité multi-niveaux : comment s'y prendre pour créer une synergie entre tous les modules ?
Une explication par la n°3 mondial des appliances de sécurité : Fortinet, et son labo Fortiguard.
RSSI : faut-il requalifier la fonction ?
Ma proposition : "Directeur de la Protection du Capital Informationnel."
Laurent Bloch recadre l'informatique et le numérique
Chercheur en cyberstratégie et expert en sécurité informatique
L'écosystème a besoin d'une chaîne TV Cybersécurité !
techtoc.tv lance une communauté dédiée aux RSSI et à leurs partenaires
De la Cybersécurité... à la Cybersurveillance
Les systèmes de défense embarqués dans le SI pourront-ils à terme poser une problématique RH ?
Comment appliquer le concept de « défense en profondeur » à la cybersécurité ? - Partie 4 : la détection au service d'une vision globale de la sécurité
introduit par Léonard DAHAN, country manager Stonesoft France
Comment appliquer le concept de « défense en profondeur » à la cybersécurité ? - Partie 3 : la détection au coeur de la défense en profondeur
introduit par Léonard DAHAN, country manager Stonesoft France
Comment appliquer le concept de « défense en profondeur » à la cybersécurité ? - Partie 2 : définition de la défense en profondeur
introduit par Léonard DAHAN, country manager Stonesoft France
Comment appliquer le concept de « défense en profondeur » à la cybersécurité ? (Partie 1 : l'échec de la défense périmétrique ?)
introduit par Léonard DAHAN, country manager Stonesoft France
Meeting with Thomas LIM, high flying international security expert profile
and founder / CEO at COSEINC (We met at the last NOSUCHCON ethical hacker's conference)
De l'intégrité des données...
Point de vue en 57"
On peut toujours essayer de voler mes VM : notre techno a tout prévu...
Pourquoi... réponse en 51"
La sécurité ? - ça passe quand même par la qualité et les compétences du personnel !
Point de vue en 50"
Bon, et si on me vole mes VM ?
Synthèse en 21"
CLOUNGE ! Le Cloud est dans le Lounge - 3ème édition
Lounge TV day dédié aux experts et usagers du Cloud et de la virtualisation
Cloud : les problématiques de sécurité font leur entrée (Partie 1)
Les bonnes questions à poser et à se poser avant de faire son choix
Cloud : les problématiques de sécurité font leur entrée (Partie 2)
Les bonnes questions à poser et à se poser avant de faire son choix
« Previous page
Ordre :
Alphabetic
By publishing date (ZA)
Chronological (ZA)
Chronological (AZ)
Les plus vus
Most commented
By category
Next page »
Already have an account on this site? -
Click here to login
Don't have an account yet?
Click here to create it now!
Mr
Miss
Lastname *
Firstname *
Type of participant *
Choose from the list
Administration / Education
Agency
Association / Alumni network
Engineering
Contractor / TPE
Editor
Student
Large Business
Pro groupment / Think tank
NGO
Private / Independent
SME / SMI
Publisher / Media
Reseller
B2B event
other value...
My company
My activity sector *
Choose from the list
- all are concerned -
Agri-Food
Farming
Food Production
Ranching
Fishery
Dairy
Wine & Spirits
Arts / Creative / Design
Arts & Crafts
Performing Arts
Fine Art
Architecture & Planning
Graphic Design
Design
Animation
Motion Pictures & Film
Museums & Institutions
Music
Photography
Translation & Localization
Automotive / Aerospace / Rail / Other Transp [...]
Aviation & Aerospace
Shipbuilding
Railroad Manufacture
Civil Engineering
Automotive
Machinery
Banking / Finance / Insurance
Insurance
Investment Banking/Venture
Banking
Venture Capital
Financial Services
Investment Management
Capital Markets
Building / Construction / Public Works
Construction
Building Materials
Business services / Recruitment / Business t [...]
Business Supplies & Equipment
Outsourcing/Offshoring
Executive Office
Staffing & Recruiting
Chemical / Rubber / Plastic
Cosmetics
Chemicals
Plastics
Tobacco
Communication / Media
Events / Exhibitions organizer
Marketing & Advertising
Broadcast Media
Newspapers
Media Production
Online Media
Computer Science / Web / Software / Network [...]
Computer Hardware
Computer Software
Computer Networking
Computer & Network Security
Internet
Computer Games
Information Technology & Services
Consumers services / Social Action
Events Services
Individual & Family Services
Consumer Services
Information Services
Environmental Services
Public Relations
Sports
Council / Education / Legal / Accounting Act [...]
Law Practice
Accounting
Consulting
Management Consulting
Market Research
Legislative Office
Judiciary
Fundraising
Human Resources
Alternative Dispute Resolution
Legal Services
Electronics / Electricity
Electrical & Electronic Manufacturing
Nanotechnology
Consumer Electronics
Semiconductors
Energy / Water / Waste Management
Facilities Services
Oil & Energy
Engineering / Development website Search
Biotechnology
Think Tanks
Defense & Space
Renewables & Environment
Research
Mechanical or Industrial Engineering
General logistics / Commerce / Trade
Retail
Wholesale
International Trade & Development
Supermarkets
Hotel / Restaurant / Entertainment
Recreation & Leisure
Recreational Facilities & Services
Hospitality
Gambling & Casinos
Restaurants
Food & Beverages
Tourism & travel
Industrial / Mechanical / Metallurgy
Industrial Automation
Packaging & Containers
Warehousing
Mining & Metals
Glass, Ceramics & Concrete
Initial and ongoing training / e-learning
Higher Education
Professional Training
E-learning
Manufacturing / Furniture / Textile / Apparel
Luxury Goods & Jewelry
Sporting Goods
Consumer Goods
Apparel & Fashion
Textiles
Utilities
Furniture
Membership organizations / Public Administration
Government Administration
Education Management
International Affairs
Military
Civic & Social Organization
Libraries
Government Relations
Nonprofit Organization Management
Philanthropy
Religious Institutions
NGO
Law Enforcement
Public Policy
Political Organization
Public Safety
Security & Investigations
Pharmaceutical / Health Services
Medical Practice
Medical Device
Alternative Medicine
Health, Wellness & Fitness
Hospital & Health Care
Pharmaceuticals
Mental Health Care
Health - Patient associations
Health - Publishers and services
Veterinary
Real Estate
Commercial Real Estate
Real Estate
Telecommunications
Wireless
Telecommunications
Transport / Logistics
Airlines/Aviation
Import & Export
Logistics & Supply Chain
Package/Freight Delivery
Maritime
Transportation/Trucking/Railroad
Wood / Paper / Printing
Publishing
Printing
Paper & Forest Products
Writing & Editing
My function
Choose from the list
Sales, Marketing
Administration Sales and Service
Relationship Management, Technical Sales
Commercial
International Trade
Commercial and marketing
Regional Directorate and agency
Marketing
Sales in stores
Communication Design
Communication
Creating
Documentation, Technical Writing
Journalism, publishing
Public relations
Company management
Vice President, Board
Branch
...Founder
...President - CEO
...Vice-President
Studies, Research and Development
Design, Research
Consultant
Research and Development
Socio-economic studies
Scientific and technical projects
Test, test, validation, expertise
Management, Finance, Administration
Administration, management, organization
Accounting
Management control, audit
Directorate management, finance
Law, Taxation
Finance, Treasury
Computers
Directorate Computer
Operation, maintenance Computer
IT Management
Industrial IT
IT Web sites and portals
Project management and functional
Systems, networks, data
Industrial Production, Construction, Building
Under Building
Industrial Production Managers
Department of industrial unit
Human Resources
HR Administration
HR Development
Human Resources
Initial and continuing training
Health, Social, Culture
Activities, health, social and cultural
Technical Services
Purchases
Technical Services Branch
Logistics
Maintenance, Security
Process, Methods
Quality
other value...
In few words, I am...
My phone number
(Only use the number (promised) so that we can possibly reach you and invite you to speak on a TV show)
My email (confidential) *
Password *
Confirm *
I propose to treat the following subject (title + description):
Twitter account
LinkedIn profile
Google + account
Facebook profile
My company website
My blog