Join the community
Personal Area
EN
EN
FR
8 - 11 october 2025
- MONACO
Be Invited
Exhibit
Les Assises
About Les Assises
The One to One concept
Previous Editions
Le Before
About Les Assises
Previous Editions
Le Cercle
Le Cercle networking events
Previous editions
Guests
Participation request
Guest profile
Partners
Exhibit - Become a partner
2024 partners
Start-ups
Startups Village
2024 start-ups
Programme
4 days at a glance
The theme of the programme
Full detailed programme
Conferences and keynotes
Round tables discussions
The meet up area
Press, medias and association
News
Media Partners
Associations corner
Practical Infos
Q&A
Les Assises Team
Sitemap
Home
|
Sitemap
|
Home
Les Assises
About Les Assises
The One to One concept
Previous Editions
2024 Edition
2023 Edition
2022 Edition
Le Before
About Les Assises
Previous Editions
edition-2024
2023 Edition
2022 Edition
Le Cercle
Le Cercle networking events
Previous editions
2024 Edition
2023 Edition
2022 Edition
Guests
Participation request
Guest profile
Partners
Exhibit - Become a partner
2024 partners
Start-ups
Startups Village
2024 start-ups
Programme
4 days at a glance
The theme of the programme
Full detailed programme
Conferences and keynotes
Round tables discussions
The meet up area
Press, medias and association
News
Media Partners
Associations corner
Practical Infos
Q&A
Les Assises Team
My access
Cyber Glossary
Acl (« Access Control List »)
Advanced Persistent Threat (Apt)
Agence Nationale De La Sécurité Des Systèmes D’Information
Multi-Factor Authentication (MFA)
Backdoor (Unhinged Door)
Blue Team
Buffer Overflow
Bug Bounty
Digital Certificate
Trojan Horse
Cyber
Cybersecurity And Cyberdefense
Dark Net
Data Protection Officer (Dpo)
Deep Web
Defacing
Dns (Domain Name System)
Elevation Of Privileges
Endpoint
Risk Assessment
Evil Maid Attack
Flaw (Computer Vulnerability)
False Negative / Positive
Firmware (Microcode, Microprogramme)
Forensique
GDPR (Organisation)
Google Dorks
Gray Hat
Grimaldi Forum
Hacking
Hacktiviste
Hash
Honeypot
Ics (Industrial Control System)
Social Engineering
Integrity
Iot (Internet Of Things)
Jailbreak
Kerberos
Kernel (Operating System Kernel)
Keylogger
Kill Chain
Layer (Couche)
White / Black List
Certificate Revocation List
Military Programming Law (Mpl)
Macro
Computer Maliciousness
Man-In-The-Middle Attack
Metasploit
Nids (Network-Based Intrusion Detection System)
Nis (Network & Information Security)
Non-Répudiation
Ntp (Network Time Protocol)
Obfuscation
Ooda (Loop)
Open Source Intelligence (Osint)
Osi (Model)
Personal Identifying Information (Pii)
Phishing (Hameçonnage)
Information Systems Security Audit Provider (Issap)
Private Key / Public Key
Qualification
Remediation
RGPD
Rgs
Root
Ciso
Siem (Security Information And Events Management)
Soc
Spoofing
Intrusion Test
Tor (The Onion Router)
Tunnel
Typosquatting
Usb (Universal Serial Bus)
Utm (Unified Threat Management)
Ver Ou Virus ?
Vulnerability (Human)
Vulnerabilities (Management)
Watering Hole Attack
Weaponized
Wep / Wap
Whitebox Testing
Xss (Cross-Site Scripting)
Y2K
Zero-Day (Fault)
Zombie