Le Digital Operational Resilience Act («DORA ») fait partie du paquet législatif relatif aux services numérique présenté en 2020 par la Commission de l’Union Européenne (« UE ») et voté fin 2022 par le Parlement. Ce règlement (UE) 2022 /2554 vise à assurer la stabilité et le sain développement du secteur financier à l’heure de […]
The CyAN Blog
Cybersecurity Advisors Network’s blog is a forum for CyAN members and friends to present their work and analysis to the broader information security community.
CyAN Announces Mentorship Programme
The Cybersecurity Advisors Network (CyAN) is piloting its cybersecurity mentorship programme for university students.
Navigating the Discrepancy Between GDPR and KYC Obligations
In this article, we’ll explore the key differences between GDPR and KYC obligations and how they can create challenges for organizations.
Interview with Dr. Cormac Callanan about The US National Cybersecurity Strategy
Dr. Cormac Callanan and John Salomon discuss the US National Cybersecurity Strategy, released by the White House on March 1 2023. In this extensive conversation, they dive into the five pillars of the strategy. What is the US government doing to drive greater cybersecurity maturity? How will the strategy not only impact the United States’ […]
Translation – Fujitsu Breach
The following is a translation by James Briscoe, CyAN Secretary General. The original Japanese announcement by Fujitsu details the results of an investigation by Fujitsu into unauthorised external communications on one of their services. This announcement has not yet made it into the English language. Please find the original Japanese announcement on Fujitsu’s site here. […]
Cybersecurity and Online Gambling
John Salomon talks to Jonathan Srugo, cybersecurity consultant, founder of Nebotain Smart Digital Defense, and former CISO of an Asian online gaming company. Internet gambling is a sector that, while not familiar to many cybersecurity professionals, nonetheless presents a major attack surface to numerous threat actors – including organized crime, fraudsters, extortionists, and governments. In […]
Expert Discussion – Zero Trust: What is Real in the Myth?
Are you interested in learning what is real in the myth of Zero Trust? Then join us for an informative panel discussion moderated by James Briscoe, CyAN Secretary General, where a group of experts will delve into the topic and answer some key questions. Our panelists include: During this recorded webinar, the panel explores the […]
Analyzing Trust in Secure Messenger Apps
CyAN board member Dr. Greg Dzsinich and his team at EM Lyon Business School in France investigate the security of several popular instant messaging apps Any user of online messaging services should be concerned about not only the security of their information in transit, but the trustworthiness of the entire messaging platform – underlying cryptosystem […]
Interview with Jean-Christophe Le Toquin about Privacy Vs Security
“The problem is that if we really implement these technologies to the full extent, and they should be if you want to protect children from being abused in private communications, then there is no limit to the technology, and our homes will be turned into glass houses, and this is not something we want to […]