top of page


Synopsis of the Week 2022

Trusted Digital Cities and Territories in the face of the cyber threat
Tuesday, November 15, 2022
Cyber and societal issues
Tuesday, November 15, 2022
Cybersecurity in Canada
Tuesday, November 15, 2022
CAID Conference
Wednesday 16 + Thursday November 17, 2022
Implementation of post-quantum cryptography
Wednesday 16 + Thursday November 17, 2022
CTF Challenge
Wednesday, November 16, 2022
Supply Chain Cybersecurity
Thursday, November 17, 2022
Workshop AIRBUS
Wednesday, November 16, 2022
 Training Day
Wednesday, November 16, 2022
TEHTRIS Workshop
Wednesday, November 16, 2022
29th C&ESAR Conference
Tuesday 15 + Wednesday November 16, 2022
Cyber cognitive threats seminar
Tuesday, November 15, 2022
Innovations and Cyber Strategies Day
Wednesday, November 16, 2022
Investor Day / Pitches 
Wednesday, November 16, 2022
The European Day
Wednesday, November 16, 2022
Cyber & Health
Thursday, November 17, 2022
Thursday, November 17, 2022
CNI Chair
Wednesday, November 16, 2022
Oodrive Workshop
Wednesday, November 16, 2022


You will find on this page,frequently updated,information on the different sessions offered to you as part of ECW 2022.

Introduction of the week in the Grand Auditorium 

  • Opening by the VAE (2S) Arnaud Coustillière, president of the Cyber Center of Excellence,

  • Speech by Mr. Loïg Chesnais-Girard, President of the Regional Council of Brittany

  • Speech by Mr. Emmanuel Chiva, General Delegate for Armaments


Speech by Guillaume POUPARD, Director General of the ANSSI

  • La Nef, 18h30-19h15

Implementation of post-quantum cryptography
Workshop  DGA - IRMAR - IRISA

In the continuity of the 2021 edition, the DGA - Information Management, the IRMAR and the IRISA co-organize with the support of the Pôle d'excellence cyber, the Creach Labs, the CNRS and Inria, the second edition of the days on "Implementation of post-quantum cryptography".

The objective of these days is to bring together academics, industrialists and institutions to discuss issues related to the implementation of the switch to post-quantum cryptography for applications requiring cryptographic services.

The program includes

  • Institutional presentations, including one from NIST on the status of the standardization process of the selected finalists

  • Industry presentations on the progress made since the first edition of the workshop in 2021 and feedback on the implementation of post-quantum cryptography solutions

  • Presentations of ongoing academic research. 

Steering committee

  • Marie-Thérèse André (DGA MI)

  • Laurent Boher (DGA MI)

  • Cédric Delaunay (DGA MI)

  • Oswald Farin (DGA MI)

  • Benoît Gérard (DGA MI et IRISA)

  • Pierre Loidreau (DGA MI et IRMAR)

  • David Lubicz (DGA MI et IRMAR)

  • Adeline Roux-Langlois (IRISA)

  • Tuong-Huy Nguyen (DGA MI et IRISA)


Wednesday 16th November

13h30 – 15h00 – Environment

  • Introduction

  • Building a large-scale quantum computer for useful applications: challenges & current state of play from a hardware perspective, Jérémie Guillaud, Alice & Bob, France

  • Institutional presentations

    • Post-Quantum Cryptography at DGA, Olivier Mangeot, DGA, France

    • The BSI Post-Quantum Policy and Roadmap, Stavros Kousidis, BSI (Federal Office for information security), Germany


16h00 - 17h15 - Standardization

  • The 3rd Round is Over. Now what? - Dustin Moody, NIST, USA

  • Challenges in the standardization of Post-Quantum Cryptography - Ludovic Perret, Sorbonne University, France

17h15 - Quantum technology

  • Development status of scalable quantum computers with ion traps - advantages and schedule of MAGIC technology, Rainer Baumgart, Germany


Thursday 17th November

9h00 – 10h15 - Post-Quantum cryptography in protocols

  • Post-Quantum cryptography deployment and protocols hybridation - Jean-Charles Faugère, CryptoNext Security and François Bonnet The GreenBow, France

  • The Road to a Post-Quantum Secure Internet - Bas Westerbaan,  Cloudflare, Netherlands


11h00 – 12h00 Implementation I                                                              

  • Profiling of accelerated execution of lattice-based cryptographic schemes on a hardware security module - Silvio Dragone, IBM, Switzerland

  • Hardware Coprocessor for computation on Euclidean lattices - Sofiane Takarabt, Secure IC, France


13h30 – 15h00 - Implementation II

  •  Optimizing Post-Quantum Cryptography on Arm, Roberto Avanzi, Arm, Germany

  •  Presentation of the Lotus upstream study - Mathieu Carbone, Antoine Christin, Thalès, France

16h00 -  Prospects

  • New lattice-based constructions - Thomas Ricosset, Thalès, France

  • Fully Homomorphic Encryption - Malika Izabachène, Cosmian, France

  • Presentation of research works - Adeline Roux-Langlois, CNRS, France

  •  Closing

pec png.png

Investor Day / Cyber Pitches 

Our cybersecurity solutions of tomorrow are taking shape today, and this is where it's happening!
Come and discover promising startups, led by passionate and exciting entrepreneurs who will present their solutions around key technologies and services in the IT fight in all its forms.

Once again this year, the European Cyber Week pitch competition continues, still with a European scope: its winners will automatically be qualified to participate in the European Cybersecurity STARtup Award , the "prize of prizes" organized by the ECSO (European Cyber Security Organization ) , partner of the event.

The day, punctuated by various presentations, will allow you to take an overview of new cyber trends and why not identify some nuggets with which you will work tomorrow...

This day is organized by Sopra Steria in partnership with ECSO .

You are a young company (less than 5 years old, independent and really new) and you wish to participate in this prize? Contact:

pec png.png
Investor Day

"How to ensure trust in a decentralized world?"


Every year since 1997, the Ministry of the Armed Forces has organized a conference on cybersecurity, called C&ESAR .

This conference is now one of the main events of the European Cyber Week (ECW) held each fall in Rennes, France.

The objective of C&ESAR is to bring together and facilitate exchanges between various governmental, industrial and academic actors with an interest in cybersecurity.


This event, both educational and scientific, brings together experts, researchers, practitioners and decision-makers.


This interdisciplinary approach allows operational practitioners to know and anticipate future technological (r)evolutions, and allows academics and industrialists to confront the research and development of products and services with operational realities. Each year, C&ESAR explores a different topic in the field of cybersecurity.

C&ESAR Program Committee

   Erwan Abgrall
   José Araujo (Orange Cyberdefense)
   Frédéric Besson (University of Rennes 1)
   Christophe Bidan (CentraleSupelec)
   Yves Correc (ARCSI)
   Frédéric Cuppens (Polytechnique Montreal)
   Herve Debar (Telecom SudParis)
   Ivan Fontarensky (Thales)
   Jacques Fournier (CEA)
   Julien Francq (Naval Group)
   Brittia Guiriec (DGA MI)

   Gurvan Le Guernic (DGA MI, University of Rennes 1)
   Frédéric Majorczyk (DGA MI, CentraleSupélec)
   Guillaume Meier (Airbus R&D)
   Laurence Ogor (DGA MI)
   Marc-Oliver Pahl (IMT Atlantique, Cyber CNI Chair)
   Yves-Alexis Perez (ANSSI)
   Ludovic Pietre-Cambacedes (EDF)
   Olivier Poupel (DGA MI)
   Denis Real (DGA MI)
   Louis RILLING (DG MI)
   Franck Rousset (DGNum)
   Florence Schadle (DGA MI)
   Eric Wiatrowski

pec png.png

The European Day

In 2021, the European Union has launched several strategic initiatives and adopted an ambitious budget to reshape the European Union cybersecurity landscape and foster its ambition to develop the EU's technological sovereignty in cybersecurity.

Some of the most relevant initiatives as the agreement on the launch of the European Cybersecurity Competence Network and Center (ECCC), the cybersecurity-related budget of Digital Europe and Horizon Europe programmes, the creation of a network European digital innovation hubs, the Action Plan on synergies between civil, defense and space industries, the discussion on the creation of cybersecurity investment platform and the NIS2.0 will surely accelerate the cooperation among “Smart Cyber Regions”. 

Such dynamic will benefit regions themselves by improving the visibility of their successful, sustainable, and innovative ecosystem.

The European Cybersecurity Week is a unique opportunity for discussing the direct impact of such initiatives on the operations of European ecosystems and their strategy in consolidating a European cybersecurity ecosystem.

On the 16th of November, the ECW will gather high-level speakers from EU institutions and representatives of European industry and regional authorities to discuss the status of play and the future developments of European cooperation on the synergies between space-defence-cyber industries, the internationalization of the “Cybersecurity Made in Europe” label, and the new European cybersecurity policy framework. 

Yes We Hack.png
pec png.png

9h00 Opening: Joanna Swiatkowska (COO, ECSO) as moderator of the day

Welcoming remarks: Pierre Jeanne, Vice-President, cybersecurity technologies & Solutions Domain THALES & VP Europe, Pôle d’Excellence Cyber

9h15-10h30 Panel discussion #1: The EU action plan on synergies between civil, defence and space, moderated by Danilo D’Elia (VP Global Public Affairs, YesWeHack)

Keynote “Cyber Security for Space and Corporate activities”by Massimo Mercati, Head of the Security Office, European Space Agency (15’)

Panel Discussion 

Invited speakers:

  • Fréderic Renaudeau, Conseiller Défense, Plan de Relance, Compétences & Formations, Pole Mer Bretagne

  • Massimo Mercati, Head of the Security Office, European Space Agency

  • Sylvain Guilley, CTO, Secure-IC

  • Roya Ayazi, Secretary-General, Network of European Regions Using Space Technologies

  • Vincent Kerbaol, Head of Satellite Imagery & UAS Department, CLS

  • Yacine Felk, COO and co-founder CYSEC


10h30-11h00 Coffee break

11h00-12h00 Panel discussion #2 The CYBERSECURITY MADE IN EUROPE label: Challenges and opportunities for the internationalisation of European scaleups- moderated by Milda Kaklauskaitė, Senior Policy Manager, ECSO

Invited speakers:

  • Alix Carmona, Head of Cyber Programmes, Airbus Defence & Space

  • Ingrid Sollner, Chief Marketing Officer, Tehtris

  • Eriz Lopetegui Fernández, Operations Engineer, Basque Cybersecurity Centre

  • Marcel Labelle, Directeur Général, Cybereco

  • Nicolas Duguay, Director Business Development, InSecM

  • Thomas Stubbings, CEO, Cyber Trust Services GmgH


12h00-13h30 Lunch break

13h30-15h00 Panel discussion #3 The European cybersecurity policy and regulatory framework:  how do we set the rules to shape a reinforced and multi-layered public-private partnership? moderated by Joanna Swiatkowska, COO, ECSO

  • Alexis Caurette, VP Strategy and Marketing, CyberDefense Solutions Business Line, Thales

  • Allard Kernkamp, Quartermaster / project lead National Coordination Centre, NCC-NL

  • Axel Deininger, CEO secunet and Chairman ECSO

  • Dan Cimpean, Director Romanian National Cyber Security Directorate

  • Éric Vétillard, Lead Certification Expert, ENISA

  • Julien Levrard, Group CISO, OVH

15h00-15h30 Coffee break

15h30-17h00 Panel #4 The European Digital Innovation Hubs: strategy and services aiming to defragment the European cybersecurity market moderated by Francois Fleith, advisor, Pole d’Excellence Cyber

  • Ana Vallés Bori, Policy manager, ECSO

  • Carmelo Dimauro, Director, SECURITYMADEIN.LU

  • Fabien Gainier, Project Leader, Cyber Campus

  • Hervé Saliou, CTO, Images & Réseaux

  • Nikolaos Matskanis, Project director, CETIC

  • Simon Boisserpe, Adviser for development and digital innovation, Atlanpole


17h00 Closing remarks by Yves PAINDAVEINE, Head of sector - Digitising European Industry governance at European Commission

17h15 Final closing remarks by Jean-Yves Le Drian, former French Minister of Europe and Foreign Affairs (2017-2022) and former French Mister of Defence (2012-2017)

European Day

Conference on Artificial Intelligence for Defense



Session 1: AI applied to multi-agent systems

1:30 p.m.-3:00 p.m.


1:30 p.m.: Opening speech


2 p.m.: Heterogeneous swarm for collaborative combat based on multi-agent reinforcement learning.

Heterogeneous Swarming for Collaborative Combat using Multi-Agent Deep Reinforcement Learning

Mathias Formoso, MBDA & Jacques Bois MBDA


2:30 p.m.: Optimized drone placement algorithms for the design of communication networks

Algorithms for optimized drone location in telecommunications network design

Adele Pass-Lanneau, CEO


Session 2: AI at the service of cybersecurity and Cybersecurity at the service of AI

3:30-6:00 p.m.


3:30 p.m.: Footprint of networks with authentic entries

FBI: Fingerprinting models with Benign Inputs

Thibault Maho, INRIA Rennes


4:00 p.m.: How to watermark a convolutional neural network in an explicit and efficient way

How to efficiently and explicitly watermark your Deep Neural Network

Mohammed Lansari, Thales SIX GTS


4:30 p.m.: Anomaly detection for smart-grid networks based on an LSTM autoencoder

Anomaly detection for smart-grid networks based on an LSTM autoencoder

Youssef Laarouchi, EDF R&D & Franck Bouzon, EDF R&D


5:00 p.m.: AI-based Malware and Ransomware Detection Models

AI-based Malware and Ransomware Detection Models

Benjamin Marais, Orange Innovation & Tony Quertier, Orange Innovation


5:30 p.m.: TrustGAN: Learning deep neural networks, safe and confident, thanks to generative adversarial networks

TrustGAN: Training safe and trustworthy deep learning models through generative adversarial networks

Helion du Mas des Bourboux, Thales SIX GTS




Session 3: AI radar signal processing

9:00 a.m. to 10:30 a.m.


9h00 : Keynote: How to set Machine Learning Security?

Keynote: How should we define the Security of Machine Learning?

Teddy Furon, INRIA


9:30 a.m.: Robust Deep Learning solution to train ATR SAR models with fully synthetic MOCEM data

Robust SAR ATR on MSTAR with Deep Learning Models trained on Full Synthetic MOCEM data

Benjamin CAMUS, Scalian DS & Corentin LE BARBU, Scalian DS


10:00 a.m.: Deinterlacing and classification of RADAR emitters based on the use of Optimal Transport distances

Deinterleaving and Classification of RADAR emitters based on Optimal Transport Distances

Manon Mottier, Paris-Saclay University


Session 4: AI image and signal processing



11:00 a.m.: Detection of embarkable ships on board optical satellites

Embedded vessel detection onboard optical satellites

Thomas Goudemant, IRT Saint Exupéry


11:30 am: Estimating the trajectory of a projectile: an approach based on LSTM networks

Projectile trajectory estimation: an LSTM approach

Alicia Roux, French-German Research Institute of Saint-Louis (ISL) & Sébastien Changey, French-German Research Institute of Saint-Louis (ISL)


Session 5: AI-Based Classification

1:30 p.m.-3:00 p.m.


1:30 p.m.: Promise and Limits of Self-Supervised Learning for Automatic Speech Processing

Promises and Limitations of Self-supervised Learning for Automatic Speech Processing

Yannick Estève, Avignon Computer Laboratory


2:00 p.m.: Self-supervised pre-training on satellite imagery: a case study on efficient vehicle detection in annotation

Self-Supervised Pretraining on Satellite Imagery: a Case Study on Label-Efficient Vehicle Detection

Jules Bourcier, Preligens


2:30 p.m.: Self-supervised learning applied to the detection of labeling errors.

Anomaly detection in embedding space learned with a contrastive approach.

Corentin Lamboley, CEO


Session 6: Data for Defense Workshop

3:30-6:00 p.m.: Round table - simulated data for the benefit of defense


  • Philippe Bidaud (ONERA)

  • Khalid Choukri (ELDA/ELRA)

  • Fabienne Ealet (Ministry of the Armed Forces)

  • Yanick Estève (LIA, University of Avignon)

  • Francesca Frontini (CNR Pisa, CLARIN)

  • Pierre Noubel (Oktal-SE)

In the field of defence, as elsewhere, data is now at the heart of the various systems/services. All defense sectors are concerned because they all collect and produce large amounts of data. Whether it is satellite, terrestrial, maritime data, from social networks or databases, and in all these sectors the data is most of the time unstructured. Another important point in the defense sector is the need to process this data in real time.

At a time when more and more data, of all types, is easily accessible, at a time when machines are more and more powerful, at a time when Artificial Intelligence is booming, opens the possibility for the armed forces to be assisted in various tasks by systems for analyzing this data, making it possible, among other things, to support decision-making. Everyone agrees that it is important to give meaning and value to this large reservoir of data in order to optimize the impact of the knowledge it conveys in different fields. To do this, the quantity of data being unmanageable by humans, it is necessary to assist humans by developing technologies and tools suitable for the exploitation of these “data repositories”. These last decades have seen the development of different approaches relating to Artificial Intelligence (eg rules, learning or neural networks) making it possible to analyze, structure and give meaning to this data and this, for any type of data. either text, speech, images, videos, sound, logs, etc. However, developing an AI system that works well, regardless of the approach used, means having at the outset a set of quality data that is large enough to be representative, of a domain, of a profession, specific tasks associated with this field, with this profession. Depending on the method used, this data must also be annotated and in sufficient quantity so that the algorithms developed to give it meaning produce quality results.

However, when it comes to developing technologies for the field of defence, as well as for that of security or even medicine, researchers and industrialists come up against the problem of access to data, often because of their confidential nature. This confidentiality applies to data in different ways, including two main ones. The data itself can be confidential (for example when it concerns a particular person) but also the process for processing it (for example what information is of interest to extract from this data for intelligence services). Another problem is that sometimes the data in question simply does not exist. For example it is often difficult to have photos of foreign military equipment, it is often even impossible to have images of what a missile sees when arriving at a target (due to the fact that this missile is destroyed).

In this context, the question that arises is therefore how to develop tools that make sense for the armies without being able to have access to real data? The question is important insofar as a system developed on real estate data or football results, can give an idea of what it is possible to do but will in no case be effective on data and tasks of another guy. It is therefore essential to find a way to generate a certain amount of representative, significant, non-confidential data for the armed forces in order to develop technologies and solutions that truly meet their needs. One way to approach the problem is to automatically generate, or not, data that is close to reality without being real data. This is for example the case of simulated data which is a response both to the limitation of data and to their confidentiality. This data generated  can itself be used to increase the size of labeled data, which makes it possible to have an adequate set of training data for learning systems.

Our workshop aims to understand what are the challenges related to the generation of data in general, of all types and on different aspects such as confidentiality, representativeness, evaluation.

We will focus, among others, on the following questions:

  • Which algorithms to generate data?

  • To what extent the data generated are representative of real data: qualitative and quantitative criteria, individual representativeness of a sample and statistical representativeness of a data set, we can also look at the biases they contain

  • What data to start from to generate data

  • Data types:  is there any easier data to generate

  • Data and model training: what impact on the algorithms, should the approaches be adapted?

  • From simulated to real: how to automatically improve a simulated data set to reduce the representativeness gap?

  • Multimodality: should multimodal data be generated together or can it be generated separately?

  • Data and evaluation: how far does it make sense? What are the difficulties?

pec png.png

Cities and Territories in the face of the cyber threat

Digital trust has never been so much at the heart of the debates that animate society. Faced with the development of ethical and responsible digital technology, cities and territories must today take on major issues capable of strengthening their attractiveness: ensuring cybersecurity to allow the use of reliable and available data, among other , within the framework of Open Data, establish horizontal collaboration between all the actors concerned, at the center of which the citizen, and develop the resilience of their systems to resist malicious digital acts. These are as many benefits as challenges that require redefining new governance, new organizations and therefore probably new forms of collaboration between all actors, State, communities and industries, to work together for the development of "Smart-Territories" of trust. !


Since 2019, Rennes Métropole, in partnership with the Strategic Committee for the Sector of Security Industries, has continued work on these subjects of public interest and offers to associate you with this collective approach by participating in a day of exchanges and reflections, November 15, during European Cyber Week. This event will give the floor to elected officials, researchers, industrialists, CISOs and CIOs. both French and European.


A Europe, more than ever at the heart of geopolitical issues, which must strengthen its cooperation in the face of growing digital risks and which increasingly target public infrastructures. We will begin this day of conferences with European subjects.


Session: Resilience and cybersecurity of European cities and territories.  


11h00 - 11h15 

Introduction of the day by Ms.Nathalie APPERE, Mayor of Rennes and President of Rennes Métropole


11:15 a.m. -11:40 a.m. 

Keynote: The challenges of resilience on a European scale

Francois Murgadella, Technology Advisor to the Director, Protection and State Security, General Secretariat for Defense and National Security


11:40 a.m. - 12:00 p.m. 

Keynote: Cybersecurity: when projects aim for Europe.

Maite BOYERO EGIDO, Spanish delegate to the European program Cluster 3 “Civil security”, European framework program for R&D, Horizon Europe. CDTI Innovation – Spanish Innovation Agency

12:00 p.m. - 1:30 p.m.: Lunch break 

Session: Data security as a subject of governance for cities and territories.


1.30 p.m. – 2 p.m.:

Keynote: Answers to legal questions posed by elected officials, CISOs, DPOs of local authorities.

Master Christiane FERAL-SCHUHL, lawyer and co-founder of the firm Féral and co-author of the book "Cybersecurity mode d'emploi";


2:00 p.m. – 2:30 p.m.:

Round table around the new guide on the obligations and responsibilities of local elected officials and territorial agents.

Cross interview: Jérôme NOTIN, CEO, ACYMA - Cybermalveillance.Gouv. Fr and Bertrand Pailhes, Director of Technology and Innovation, CNIL


2.30 p.m. – 3 p.m.:

Elected officials and citizens, at the heart of the social and economic development of trusted digital territories

Cross interview: Mauna TRAIKIA, Territorial digital development adviser, Plaine Commune - Grand Paris and digital innovation delegate Epinay-Sur-Seine, VP for the digital transformation of territories, Systematic Pole, European Deep Tech Pole.

Marc BOGE, Major General, commander of the gendarmerie in cyberspace

3:00 p.m. - 3:30 p.m.Coffee break and networking

Session: Cyber-resilience of our cities and territories


3:30 p.m. – 4:00 p.m.:

Keynote ofYves VERHOEVEN, Strategy Deputy Director at ANSSI


4:00 p.m. – 4:25 p.m.:

Feedback: Cyber-resilience: How to prepare to deal with a cyber attack from  type ransomware?

Bruno CAUDAL, RSSI and DPO of the City of Vannes and Member of the office of the association "Club de la Sécurité Numérique des Collectivités"


4:25 p.m. – 5:00 p.m.:

Keynote: How is the defense of our territories organised?

Philippe STEUR, Deputy Director of the New Aquitaine Regional Cybersecurity and Digital Trust Campus in charge of the regional CSIRT.


5:00 p.m. – 5:45 p.m.:

Round table: The need for a shared strategy to have trusted products and services for the resilience of our territories.

Moderator:Caroline Moulin-Schwartz, member of Cefcys


  • Gildas Oats, professor of cybersecurity, INSA Rennes / IRISA

  • Bernard Cardebat, Cybersecurity Director, ENEDIS ,

  • Laurent Denizot, en charge du projet territoires de confiance pour le Comité Stratégique de Filière des Industries de Sécurité (Conseil National de l’Industrie)

  • Mauna Traikia, territorial digital development adviser, Plaine Commune - Grand Paris and digital innovation delegate Epinay-Sur-Seine, VP for the digital transformation of territories, Systematic Pole, European Deep Tech Pole.

5:45 p.m. – 5:55 p.m.:

Conclusion of the day

pec png.png
Smart Cities
Cyber et enjeux sociétaux

Cyber and societal issues

The societal issues around cyber and security  are numerous andthey concern us allas users. There are no exceptions, from the youngest to the oldest, whatever their background, origin, background... The pandemic and the geopolitical context have only reinforced this exposure.


We have chosen to focus our actions onthe attractiveness of the professional sector, still too much seen asreserved for a few with very technical profiles.

Let's dare and stop looking for the 5-legged sheep!


We will continue in 2022 topromote the place of womenin these professions, by deconstructing the stereotypes attached to them and by showing the wide variety of possibilities. We will obviously do this in collaboration with the various specialized associations and the testimony ofwomen with inspiring journeys. This will also be an opportunity to provide feedback on the first promotion oflaunched cyber cadetsduring ECW 2021 and continue with new promotions inpartnership with schools, and to highlight many actions and achievements of various European, national and regional associations.


The second aspect that we will highlight during this day is the inclusion of neuro diversity andthe integration of people with a neuro-atypical profile.

We will focus on Asperger syndromes and various autistic traitsknowing that between 70 and 90% of these people are unemployed or in a job that proves to be unsuited to their skills. The shortage of profiles cannot afford to cut themselves off from possible nuggets,  and allow them to  flourish and contribute within the cyber sector. We have set up a multidisciplinary working group of 23 players to define and implement a program toattract, train and integrate young people with autism aspergerfrom their point of view, those of the trainers but also those of the host companies. We will present the 1st results of our work both through a round table and also through testimonials.



9:30 a.m.: Introduction by Hélène Chinal,Executive Vice President at Capgemini, project manager for societal issues at the Cyber Center of Excellence: “Why a Manifesto for more Diversity and Inclusion?".


9.40 a.m. – 10.30 a.m.: “Woman in cyber: why not me? »

Animation by Hélène Chinal, with testimonials from:

  • Mélissa Rossi, member of the cryptography team of the French Cybersecurity Agency (ANSSI).

  • Hermance Baudry, member of the organization Women4Cyber, former head of development and export support at GICAT.

  • Léa Le Pezron, Cadet of the Cyber promotion 2021/2022.

  • Brunessen Bertrand, professor at Rennes 1 University and winner of the #EuropeanCyberWomanDay 2022 in the "jury favorite category".

  • Livia Tibirna, expert in Cyber Threat Intelligence at Sekoia and winner of the #EuropeanCyberWomanDay 2022 in the category : "Europe : Woman cyber hope".


10:30 a.m. – 11:00 a.m.: Break


11:00 a.m. – 12:00 p.m.: "Promoting and fostering inclusion: a paid commitment!"

Hosted by Henri d'Agrain, General Delegate of Cigref and President of Femmes@numériques, with testimonials from:

  • Valérie Dagand, founding member of the Combattantes Numériques network, digital influencer / Speaker / Advisor.

  • Sophie Provost, member of the association Femmes de Bretagne and head of the Responsible Digital project within Rennes Métropole.

  • Michel Vandenberghe, director of Campus Cyber.


12:00 p.m. – 1:30 p.m.: Lunch break

1:30 p.m. – 2:15 p.m.: “Neuro-atypical profiles: unexplored potential”

Animation par Catherine Leguay, directrice de l’Institut Marie-Thérèse Solacroup, avec les témoignages de :

  • Amy Michot, Marie-Thérèse Solacroup Institute

  • Antoine Pestel, Marie-Thérèse Solacroup Institute

  • Mathys Gasnier, Marie-Thérèse Solacroup Institute

  • Emmanuel Sari, Capgemini

  • Jeanne Roncière, autism spectrum disorder interpreter, Marie-Thérèse Solacroup Institute.


2:15 p.m. – 3:15 p.m.: “What initiatives or concrete projects to welcome and support neurodiversity”

Animation by Séverine Meunier, Business development public sector and European institutions, Airbus CyberSecurity, with testimonials from:

  • Stéphane Szymansky, Rennes Métropole, cybersecurity training/retraining manager.

  • Charlotte de Saint-Léger, Arpejeh association.

  • Catherine Leguay, director of the Marie-Thérèse Solcacroup Institute.

  • Laureline Kiss, Airbus Defense and Space.


3:15 p.m. – 3:30 p.m.: Exchange with the audience


3:30 p.m. – 4:00 p.m.: Break


4:15 p.m. – 4:30 p.m.: Speech by Ms. Geneviève Darrieussecq, Minister Delegate for People with Disabilities


4:30 p.m. – 5:30 p.m.: Presentation of the new class of Cadettes de la Cyber

​Introduction by Charlotte Wojcik, Project Manager for the Cadettes de la Cyber project.

Animation by Pauline Quinebeche, Institutional Relations – TEHTRIS, with testimonials from:

  • Sophie Maurice, Cyber Cadet 2021/2022.

  • Aymeric Bonnemaison, Cyber Defense Command

  • Fanny Forgeau, General Manager of Yogosha.

  • Pauline Uring, Cyber Cadet 2022/2023

  • Camille Barbarin-Renvoise, Cyber Cadet 2022/2023


5:30 p.m.: Conclusion of the VAE(2S) Arnaud Coustillière – President of the Cyber Center of Excellence.

LOGO-ARPEJEH-Baseline 2 lignes.png

Cyber cognitive threats seminar

During the first edition of the CCTS in November 2021, the round tables organized around cyber crisis management, human digital vulnerabilities and Russian and Chinese state doctrines opened up exchanges between military, academic and industrial partners. .

The (recent) news offers the opportunity to develop in more detail the themes highlighted in 2021. The conflict in Ukraine presents a model of informational confrontation between two actors trained and connoisseurs of this type of struggle. The information attacks carried out against the French forces deployed in external operations underline the danger that the latter represent for the action of France outside its territory.


At the same time, the physical territory is competing with a digital counterpart that is developing a little more every day in modern societies. Mark Zuckerberg, CEO of Meta (formerly Facebook), is an ardent promoter of the metaverse, this meta-universe where the physical and digital domains will be combined by means of virtualization. The digital human vulnerabilities used by actors in cyberspace to influence Internet users can be accentuated in the metaverse through the use of devices (eg deepfake) to deceive sensory perceptions and reinforce the effects of cognitive biases.


It is therefore necessary to understand what are the links between the GAFAM (Google (Alphabet), Apple, Facebook (Meta), Amazon and Microsoft) and the States to understand what are the stakes and the risks of the arrival of the metaverse for cyberspace users. An analysis of the current and future legislation concerning GAFAM is necessary to understand the arrival of this new technology and understand the daily lives of citizens.


Thus, through three round tables organized around the links between GAFAM and the States, digital human vulnerabilities and the doctrines of Russian and Chinese influence, researchers from partner research centers will present what are the cognitive risks that the cyberspace weighs on its users in 2022.


1:30 p.m.: introductory remarks: representative of the cyber defense command

The GAFAMS and the States:

Moderator: Stéphanie Ledoux (R.OPS)

1:40 p.m. – 1:55 p.m.: Romain Badouard: The policies of the GAFAMs in terms of content regulation

Romain Badouard is a lecturer at the French Press Institute, Paris Panthéon-Assas University, and a researcher at the Center for Analysis and Interdisciplinary Research on the Media. He recently published “The New Laws of the Web. Moderation and censorship” published by Seuil. 

2:00 p.m. - 2:15 p.m.: Charles Thibout: The political and diplomatic links between GAFAMS and European States

"Charles Thibout is Senior Researcher at the Joint European Disruptive Initiative (JEDI), PhD student at the European Center for Sociology and Political Science (CESSP) and associate researcher at the Institute for International and Strategic Relations (IRIS)".

2:20 p.m. - 2:35 p.m. Julien Nocetti: The involvement of GAFAM in the war in Ukraine: a game-changer?;

Julien Nocetti is a researcher at GEODE and teacher-researcher at the Military Academy of Saint-Cyr. He is also an associate researcher at IFRI and heads the cyber risk governance chair at Rennes School of Business.

The operationalization of digital vulnerabilities through (digital/neuro) marketing practices:

Moderator: Stéphane Bartolomé (R.OPS)

2:50 p.m. – 3:05 p.m. Nathalie le Bigot: Cognition and virtual environment;

Nathalie Le Bigot is a lecturer in cognitive psychology in the psychology department of UBO and responsible for the master's degree in psychology Cognition, Learning, Evaluation and Remediation: Simulation and Virtual Reality (CAER). She develops her research, which focuses on the existing links between perception and action in virtual reality, in the COMMEDIA team of the Lab-STICC (CNRS).

3:05-3:25 p.m.: break

3:30 p.m. - 3:45 p.m. Christine Petr: audience segmentation

Christine Petr, University Professor in Management and Management Sciences, Researcher in Consumer Behavior at the LEGO laboratory, University of South Brittany.

3:50 p.m.– 4:05 p.m.: Julien Rossi: Dark patterns and collection of personal data: review of the latest developments.

Julien Rossi is a lecturer at the University of Paris 8, researcher at CÉMTI. A specialist in the production of law and technical standards governing the processing of personal data, since 2020 he has coordinated the Working Group on Internet Governance and Regulation of the GDR Internet, IA et Société du CNRS.

4:10 p.m. – 4:25 p.m.: Anne-Gwenn Bosser: Computational narration and application in the field of Defence.

Anne-Gwenn Bosser is a Teacher-Researcher at the National School of Engineers of Brest and at the Lab-STICC, where she is responsible for the COMMEDIA team. She is interested in narrative generation, interactive narration and narrative intelligence in the context of useful or serious games and recently participated in the ANR ASTRID Maturation STRATEGIC project.

4:30 p.m. - 4:45 p.m.: Bernard Claverie: The cognitive war

Bernard Claverie is a university professor at Bordeaux INP. He is the founder of the Ecole Nationale Supérieure de Cognitique. His research focuses on cognitive engineering and cognitive sciences applied to complex industrial fields and Defense aerospace. He is also a member of the "ADER"; network of the Air Force (colonel of the air citizen reserve).


Influence operations – plural and cultural visions of the same concept?

Moderator: Christian Harbulot Founding Director of the School of Economic Warfare

Christian Harbulot, is a historian and political scientist. Defender not only of the idea that economic warfare stems from a logic of balance of power and power interests, but above all that information warfare is now the epicenter of modern conflicts. In 2022, it created a research center dedicated to the study of these issues: the Research Center 451. 

5.00 - 5.15 pm Louis Pétiniaud (GEODE): Maintaining influence: Russian cyber strategy in Ukrainian territories.

Louis Pétiniaud holds a doctorate from the French Institute of Geopolitics (University of Paris 8). He is a post-doctoral researcher in geopolitics of Internet infrastructures and digital data routing within GEODE, associate researcher at the Russian-speaking Infosphere Observatory (OIR).

5:20 p.m. – 5:35 p.m. Amélie Férey: Israeli cyber at the service of influence: between hasbara and cognitive war 

Dr. Amélie Férey is a researcher at the Center for Security Studies at the French Institute for International Relations (Ifri). She coordinates the Defense Research Laboratory. His current research focuses on “soft” war in contemporary conflicts. In particular, she analyzes the use of lawfare, cognitive warfare, economic sanctions and narrative warfare.

5:40 – 5:55 p.m. Selma Mihoubi: "China's Informational Influence in Francophone Africa: A Threat to French Interests ?"

Selma Mihoubi has a doctorate in geopolitics from Sorbonne University (Mediations laboratory). His work focuses on the geopolitics of the media, and more specifically, on China's informational influence strategies on the African continent.

6:15 p.m.: closing remarks: General COMCYBER

pec png.png
Workshop COMCYBR

Cybersecurity in Canada

To face the challenges of information security at the global level, it is important for the actors of the ecosystem to develop in France, in Europe and in the World. Crossing the Atlantic is therefore an important step for many members of the PEC. And that's why ECW is organizing this year a unique morning dedicated to the Canadian ecosystem.

The objective of the morning is to discuss around the following themes:

Canada a new Eldorado for artificial intelligence.

AI is an increasingly essential brick for the technologies developed by and for the ecosystem: The race for skills in the field is on. The objective of this discussion is to discuss the deployment of Research and Development projects in Canada.


​Canada is an ecosystem in its own right.

As in France, the cybersecurity ecosystem in Canada is organized around clusters and working groups. The aim here is to present some of these clusters, their specificities and to understand how a European player can successfully cross the Atlantic.

This half-day invites us to go beyond the borders of France and Europe to continue to fight together against the global cyber threat.


9:30 a.m. – 10:30 a.m.: Round table on the challenges of artificial intelligence in Canada and the opportunity this represents for research.

  • Pierre Delesques, CTO Seela

  • Nicolas-Loic Fortin, CISA Strategic Advisor Intrasecure Canada

  • Olivier Gesny, Chief Innovation Officer Pr0ph3cy

  • French University in the process of being confirmed

  • Canadian university in the process of being confirmed


11 a.m. – 11:15 a.m.: Keynote on the interest of collaboration between French and Canadian ecosystems by Admiral Arnaud Coustillère


11:15 a.m. – 12:00 p.m.: Franco-Canadian ecosystem, how to cross the Atlantic?

  • Yasmine Douadi, CEO and Founder of RiskIntel

  • Nicolas Duguay, Development Director In-Sec-M

  • Arthur Bataille, CEO PrOph3cy

  • TerraNova being confirmed

  • Yogosha being confirmed

pec png.png
Cybersécrité au Canada

Cyber Innovations and Strategies

Continuing on from the 2021 edition, COMCYBER, Orange Innovation, NOKIA and La Ruche THALES are co-organising, with the support of the Brittany Region and the Cyber Excellence Center, the "Cyber Innovations and Strategies" day.

This day will have as its guiding thread: “Building cyber-trust to guarantee sovereignty”. By bringing together industrialists, institutional players and members of the academic community, we will endeavor to provide an overview of the cyber components of digital trust necessary for the establishment of sovereignty. At the end of the day, carte blanche will be given to the Defense Innovation Agency, which will present its priority areas of interest.

09h00 – 09h15: Opening of the day


9.15 a.m. – 10.30 a.m.: Digital sovereignty: what are we talking about?

The objective of this first part of the day will be to lay the foundations of what is meant by “digital sovereignty”. We will have the opportunity to discuss with the four participants of this round table who will speak in turn (in the form of “key notes”). They will share with us their reflections / insights on the modalities necessary to establish this sovereignty. The legal, economic, cultural and military aspects will be discussed.

A 30-minute Q&A will take place at the end of their presentation, led by Julien NOCETTI, Holder of the Cyber Risk Governance Chair, Rennes School of Business.


Strategic Information and Economic Security:

  • Mathieu KAHN, Deputy Head of ISSE Department

Enterprise Cybersecurity Report:

  • Senator Sébastien MEURANT, Senate


10:30 a.m. – 11:00 a.m.: Break


11:00 a.m. – 12:00 p.m.: How to ensure trust in the security of the software chain

Telecom networks are used more and more to handle critical missions. The certainty of using safe tools becomes essential. How can we guarantee the integrity of our activities in the face of cyber risks? This workshop will be moderated by Christophe LAROCHE, Cyber Security Domain Management at THALES GLOBAL SERVICES.



Authenticity and integrity of the supply chain for Telecom network software based on Cloud Native

  • Patrick BAZY, Cyber Security Excellence Center, Lannion, Researcher Bell Lacs, NOKIA

  • Ian OLLIVER, Bell Labs Researcher


Security SLA Demo

  • Orange Innovation




  • Elouan BUISSON, PhD student: Legal management of cyber risk in the supply chain.

  • Stefano ZACCHIROLI, Scientific Expert of the IHEDN Chair



  • Régis QUENTIN



  • Ludovic ESCHARD, Lead DevSecOps DTSI

12:00 p.m. – 1:30 p.m.: Lunch


1:30 p.m. – 3:00 p.m.: Building the safety commitment: a new challenge.

At a time of our ultra-connected world, where our data transits and is processed from servers to equipment positioned in different places and operated by various companies, the question arises of building the security commitment (IT - OT) in this complex environment?


  • Sandrine MERCIER: Orange Innovation ITS-CSO

  • Philippe CALVET: Orange innovation Security Manager



CHEOPS Technology:

  • Frederic Basroger

  • Nicolas LEROY-FLEURIOT, Chairman and Chief Executive Officer



  • Adam OUOROU, Lead research program ORANGE



  • Guillaume BONFANTE, Lecturer at the Ecole des Mines de Nancy/ University of Lorraine, Morphological analysis, LORIA



  • Pierre Yves JOLIVET, VP Cyberdefense Solution




Minimize the use of our data for authentication; towards a maturity of solutions:

  • Olivier SANDERS, Security Researcher



Variation around malware:

  • Guillaume BONFANTE


3:00 p.m. – 3:30 p.m.: Break


3:30 – 5:00 p.m.: Carte blanche to the Defense Innovation Agency

Placed under the responsibility of the General Delegate for Armaments, the Defense Innovation Agency (AID) was created on September 1, 2018. The AID federates the innovation initiatives of the Ministry of the Armed Forces by ensuring the coordination and the consistency of all innovation approaches. While pursuing work relating to technological innovation over the long term, the Agency is the sensor of opportunity innovations for the benefit of all end users, whatever their fields: operations – equipment – support – functioning – administration.

Presence of the general armament engineer Patrick AUFORT


5:00 p.m. – 5:30 p.m.: Conclusion of the day

Division General Aymeric BONNEMAISON, COMCYBER

la ruche.png
pec png.png
Journée Innoations & Stratégies Cyber

CTF Challenge

In just a few years, Smart Transport & Logistics has become the world's leading freight forwarding company by using artificial intelligence technologies to optimize its entire supply chain management.

In recent months, Smart Transport & Logistics has been confronted with several difficulties due to the pandemic and the increase of international tensions. In the last few days, the company has been the target of an exceptional wave of cyber-attacks that have severely disrupted its activities. As a result, all its customers and suppliers have been affected, and the fear of supply difficulties has already led the authorities of various countries to take emergency measures to avoid panic among the population.

State actor? Activists? Cybercriminals? The origin and motivation of the attackers remains unclear for the moment.

Faced with the urgency of the situation and in order to avoid a generalized shortage that could cause an economic collapse on a global scale, a crisis unit was quickly organized in the various logistics platforms of the company Smart Transport & Logistics that were affected by this wave of cyber-attacks. You are among the best cyber defense experts mandated to fulfill the following mission: help the logistics platforms to resume their activities as soon as possible.

To register :

pec png.png
Challenge CTF

Cyber & Health

How to strengthen the cybersecurity of healthcare establishments? What feedback following a cyberattack? What innovative initiatives to better protect healthcare establishments? During this fourth edition of the Cyber ​​& Santé conference organized by SIB and Biotech Santé Bretagne, as part of European Cyber ​​Week 2022, the focus will be on the one hand on feedback from an establishment victim of a cyberattack, a very useful testimony for all the actors concerned and on the other hand on innovative projects/approaches both at national and European level which aim to develop new solutions for cybersecurity for establishments and the care of out-of-hospital patients.

pec png.png
Logo BSB-2022-RVB.png


09:00 am - 09:15 am : Welcome words 

  • Philippe Hervé, Biotech Santé Bretagne director

  • Nicolas Jolivet, Representative of SIB

09:15 am -10:30 am

SESSION 1: Feedback

How do you live and overcome a cyber attack when you are a health care institution ? Feedback from a hospital center

  • Return of experience from CISO - Nicolas Terrade, CISO, Dax Hospital

  • Return of experience from healthcare professionals (Movie) - Gilles Larroche, GCS e-santé Bretagne


Break from 10:30 to 11:00

11:00 am - 11:30 am

SESSION 2: How to experiment with the integral security (prevention, management and remediation) of a health institution?


The Call for Expression of Interest "Securing territories" (Health scope) and zoom on the BALISE project

  • Gilles Larroche, GCS e-Santé Bretagne

  • Jean-Sylvain Chavanne, CISO University Hospital of Brest

  • Emeric Guillou, CISO manager University Hospital of Rennes


Securing connected objects used in home care

  • Nicolas Bogucki, Director of Digital Transformation and Information Systems, Caen University Hospital

  • Loïc Bousquet, CISO of the territorial hospital group Normandie Centre - CISO of the hospital center Aunay Bayeux


11:30 am - 12:00 am

SESSION 3: How to secure the integration of healthcare solutions?


Cyber Range Health: a cybersecurity test environment designed to evaluate health IS

  • Christine Toneatti (AMOSSYS), Guillaume Prigent (DIATEAM), Gaëtan Le Guelvouit (b<>com)


Cybersecurity Challenges for Health Informations Systems and Cyber Resilience Strategies

  • Karim Zkik, Head of Cybersecurity Innovation Hub by ESAIP


12:00 : Concluding remarks

Cyber & Saté

Supply chain cybersecurity

ECW's "Security and Sovereignty of Purchasing and Supply Chain" track aims to reflect on the digital/normative/methodological tools likely to participate in improving the sovereignty of the supply chains & purchases of companies in our territories . These tools and resources must in particular participate in maintaining the productive potential and critical services in operational condition. They lead to considering cybersecurity as a set of computer security and digital resources applied to resilient organizations with business continuity or disaster recovery plans and processes. The challenge of the conferences and the 2 round tables proposed is on the one hand to help companies to assess the level of security in their supply chain and, on the other hand, to exchange and understand the systems (certification, existing standards, laws, support) and how to benefit from them.


Host: Mathilda Desgres


9:00 a.m. – 9:30 a.m.: Introduction by Admiral COUSTILLIERE


Conference: ETI facing cyber attacks – a concrete case on transport activities

  • Brigitte DELAHAIE, Transport Manager ORAIN


9:30 a.m. – 9:50 a.m.:Conference: The rise in maturity of industrialists


9:50 am - 10:10 am: Conference: Presentation of the Institute of Public Purchasing and Logistics

  • Mathilda DESGRES, DGA-AID PhD student, head of the Public Procurement Masters, co-director of the ESLI Paris Campus, GIP CEI


10:10 a.m. - 10:30 a.m.:Conferences​: what framework and rules to ensure the right level of cyber security in contracts

  • Gontran CLEMENT and Mathieu GOWER, S2A, DGA  



11 a.m. – 11:30 a.m.:Conference - Training and Skills on Cyber for the Supply Chain

  • Sébastien SALLADIN, IT security expert


11:30 a.m. – 12:15 p.m.:Round table - Challenge of certification and cyber maturity

Moderator: Jean-Pierre LEBEE, CEO.





  • Philippe BOURGEOIS, Bertin technologies




1:30 p.m. - 2:00 p.m.: Conference: Feedback on the resilience of industrial organization in the event of a cyber attack

  • Xavier ROUX, Group Supply Chain Director with the Group DSI, AVRIL Group

2:00 p.m. - 2:30 p.m.: Conference: Improving ecosystem resilience

  • Colonel François Régis VIGNEAU, Cyber Command  

2.30 p.m. – 3 p.m.:Conference: The DIAG CYBER ​


pec png.png
Cybersécurité de la supply chain

INTERREG session

In the construction of a European cybersecurity market, the Regions and their innovation ecosystems play a fundamental role.

Benefiting from the proximity with the actors of the territory, they represent the ideal level to facilitate the collaboration between the various public and private actors and the link with the end-users. With the funds they manage, the Regions can put in place support policies for research and innovation and support companies in the development of their technological solutions. They can also intervene in the training of new talents to deal with the lack of skills in this sector.  


Coordinated by Bretagne Développement Innovation, the Interreg Europe CYBER project brings together 7 regions in Europe (Castilla y León (Spain), Tuscany (Italy), Wallonia (Belgium), Bretagne (France), Slovakia, Slovenia and Estonia as well as the European Organization Cybersecurity (ECSO). 

Based on the exchange of good practices and the definition of appropriate territorial policies, it aims tostrengthen the competitiveness of SMEs and their ability to deal with common problems, such as market fragmentation and lack of skills.


Financing for innovation, development of the training offer in the territories, implementation of vouchers to support the integration of cyber solutions, strengthening of the ecosystem dynamic with the European Digital Innovation Hubs are among the 11 actions of public policies put in place within the framework of the project. In 2022, CYBER focused on cybersecurity issues in the health sector and the courses of action taken by regional institutions that would allow the health system to mature.

Subjects for which interregional cooperation has real added value in the commitment of ajoint reflection at European level and in the creation of synergies between regional ecosystems.


It is within the framework of this collaborative dynamic that the partners of the CYBER project will meet during the European Cyber Week for their next project meeting.

The purpose of this meeting will be to take stock of the actions in progress, but also to continue the sharing of experience, with a particular focus onsupport for start-ups and access to private investment.

An opportunity forshowcase great entrepreneurial initiatives in our ecosystemand accompanying regional programs, such as the Cyber Booster and the Cyber Campus.


In the program :


Presentation of the ECW event to European partners

Introducing Cyber Booster by Le Pool

Presentation and demo by two companies from the Breton ecosystem, Glimps and Sekoia


This session is by invitation.

Contact: Sara Minisini,

pec png.png
bretagne développement.png
Atelier AIRBUS

AIRBUS workshop

In the shoes of a group of motivated APT-type attackers, the quest for a 0-day. On the program: Reverse, Fuzzing and Exploit.

Airbus will present research work on vulnerabilities in different fields (Windows OS, Antivirus; EDR, Wifi communication chipset, industrial systems).
This session will be the subject of a demonstration around a scenario of taking control of access to a car park. It integrates technological bricks frequently used in IoT systems such as: Lora and ESP32. 

The demonstration will take place in several phases: 
- Interception of radio communications (LoRa);
- Reverse engineering of the embedded system;
- Development of tools adapted to the ESP32 architecture;
- Search for vulnerabilities via fuzzing / emulation (AFL / afl_ghidra_emu);
- Exploitation of the vulnerability on the model (shellcode JOP).



- Flavian Dola (Presenter)
- Nicolas Delhaye (Presenter)
- Yann Breut (Carries out the actions of the vulnerability researcher)

Advances in securing critical infrastructures - The cyberCNI industrial Chair

Critical infrastructures are assets that are vital to the functioning of a society or economy, such as the production of electricity, gas, oil, water supply, public health, air or rail transport, the police, the army.

The Chair for Cybersecurity in Critical Networked Infrastructures ( is dedicated to research, innovation and teaching in the field of cybersecurity for critical infrastructures.

Headed by Prof. Dr. Marc-Oliver Pahl, it was founded in 2016. Current industrial partners include Airbus, BNP Paribas, EDF, SNCF and the Brittany region. CyberCNI is hosted at IMT Atlantique in the SRCD department at the Rennes campus, and its partners Télécom Paris and Télécom Sudparis.

During the first session you will discover the ecosystem of the Cyber CNI chair. You will understand the life at chair and the challenges of cybersecurity from the perspective of its partners.

The second session is dedicated to the research highlights of the Chair's post-doctoral and doctoral students. It will end with a round table on the challenges and opportunities of cybersecurity for critical infrastructures.

Chaire CNI

Training Day : Round tables on professions and training in cybersecurity

Cybersecurity professions are constantly being invented and developed, in the face of exceptional growth in the global cyber threat. In France, more than 5,000 jobs are to be filled in 2022, in professions with a strong digital component, but also in management, law or geopolitics.

The Professions Round Tables – Cybersecurity Training will be held on November 16 from 1:30 p.m. to 6:00 p.m. at ECW, close to the recruitment area, within the meetings of cybersecurity professionals. High school and college students will enjoy free admission to ECW on 11/16 afternoon.

The round tables make it possible to discover the various subjects of the training, to ask questions to the professionals and to open up on an orientation course towards training in cybersecurity professions.

Opening of the session by the VP Training of the Cyber Excellence Center and a representative of the Brittany region (TBC)

Round tables moderated by Mrs Pascale TREGUER, journalist at "L'ETUDIANT"

1:30 p.m.: Training after the baccalaureate
Whether general or technological – STI2D, training courses in cybersecurity professions are part of general digital training. The training can be followed under the status of student or apprentice, with the aim of immediate integration but also with the possibility of continuing studies. This round table, made up of different players in training, initial or work-study, national education or private education and higher education, will show the richness of a training offer that is sometimes overlooked.

  • Charline Giret, Teacher, Le Dantec High School

  • David Le Roy, Director, Digital Photonics Trades & Qualifications Campus

  • Eymerick Blanconnie, Employment-training officer, OPCO Atlas

  • Goulven Kerbemmec, Teacher, IUT Vannes

  • Richard Rey, Deputy Director, ESIEA

2.15 p.m .: Specialist training, Master, Engineer
The training of cybersecurity specialists is very varied in the digital fields. The methods of training, initial, by alternation but also international are a richness that one can discover. Not to mention management training and other "non-digital" sectors that cybersecurity companies are recruiting more and more.
The demand for specialists is only increasing, much faster than the supply. A person working in this field is almost certain to find a job to their liking, whether it is with a large company or a startup.

  • Valérie Poulain de Saint Pierre, Director, School 2600

  • Christophe Bidan, Director, CentraleSupelec

  • Guy Gogniat, Research Professor, University of South Brittany

  • Thomas Froehlicher, Director, Rennes School of Business

  • David Espes, Research Professor, University of Brest, animator of the Research Axis of the Cyber Center of Excellence

3:30 p.m.: Orientation for young people and adults
The large sites that present training are rich in offers in the fields of cybersecurity. This round table brings together a wealth of guidance players, public and private, schools and higher education. We will approach the keys of the orientation by the construction of a personalized course.
Cybersecurity professions can be classified into 5 families: management, organization of security and risk management / management of security projects and security life cycle / maintenance in operational condition of security / support and management security incidents / finally consulting, auditing and security expertise. Surely there is a job for you?

  • Cécile Lecomte, Director of BRIO, University of Rennes 1

  • Yves Bouillon, Regional Council of Brittany

  • Magalie Bibard, Director, GREF Bretagne

  • Joël Courtois, Advisor, Ionis Group

4:15 p.m.: Cybersecurity professions
ANSSI in France, like ENISA in Europe, have drawn up maps of cybersecurity professions and skills. This presentation will be an opportunity to better understand these professions and the skills that must be mobilized. The round table will also make it possible to open up the presentation to careers in training and research, as well as careers in the human and social sciences in cybersecurity.

  • Marion Dubus, Business Relations Consultant, Apec Bretagne

  • Julien Breyault, Teacher, ENSIBS

  • Didier Danet, Teacher-Researcher, GEODE

  • Gildas Avoine Research Professor, IRISA

  • Éric Dupuis, Training Director, Orange

5:00 p.m.: High school girls, forward to Cyber!
No, digital is not a sector reserved for men. This round table presents an inventory of the profession and aims to show, through the diversity of cybersecurity activities, that women exercise it with talent. Students, teachers and women in charge of training will testify to their backgrounds and their values.

  • Sophie Maurice, Student, ENSIBS

  • Camille Barbarin – Expelled, Student, ENSIBS

  • Laureline Kiss, Employment Marketing, Airbus

  • Sophie Allain, Director, IFSIC

VP Formation
Atelier Oodrive

Oodrive workshop: Cybersecurity: the urgency of European certification 

Sur fond de guerre économique et politique de la donnée, les états européens peinent à s'accorder sur des critères communs, notamment sur le plan juridique. Or, une démarche, la création d’un label européen, permettrait aux sociétés du secteur d'accélérer leur internationalisation et surtout la sécurité de leurs datas. Oodrive, premier acteur qualifié SecNumCloud, certifié eIDAS et éditeur de logiciels collaboratifs de confiance fera le point sur les dispositifs existants en Europe, et reviendra sur le rôle que les institutions et entreprises ont à jouer pour créer ce cloud de confiance européen tant attendu.

Intervenant : Xavier Filiu, CISO Oodrive


TEHTRIS Workshop: The European Collectivity of Alsace (CeA) and TEHTRIS: a successful collaboration in cyber defense thanks to efficient teams and innovative technologies

Against the backdrop of an economic and political data war, European states are struggling to agree on common criteria, particularly on the legal level. However, an approach, the creation of a European label, would allow companies in the sector to accelerate their internationalization and especially the security of their data. Oodrive, the first player qualified SecNumCloud, certified eIDAS and publisher of trusted collaborative software, will take stock of existing systems in Europe, and will discuss the role that institutions and companies have to play to create this long-awaited European cloud of trust.

Speaker: Xavier Filiu, CISO Oodrive

bottom of page