09 December 2024

Recap of our third Cyber Thursday

For the third edition of our Cyber Thursday, students once again turned up in full force.

Table ronde du jeudi cyber n°3
Table ronde du jeudi cyber n°3
Table ronde du jeudi cyber n°3
Table ronde du jeudi cyber n°3
Cocktail après le jeudi cyber
Cocktail après le jeudi cyber

What better way to illustrate the challenges and careers in cyber than by presenting real-life case studies and giving you the opportunity to engage with those who experience them first-hand? This is what we offered during our 3rd Cyber Thursday, by meeting with experts.

Bug bounty and ethical hacking: the bug hunters

Miguel Anía Asenjo, Chief Information Security Officer at YesWeHack, took us into the fascinating world of Bug Hunters.

  • Why Bug Bounty? How to become a Bug Hunter? Miguel brilliantly explained this practice, where cybersecurity experts hunt for vulnerabilities in IT systems, fixing them before they can be exploited and earning rewards in return.
  • The YESWEHACK and DOJO platforms: He also presented the Bug Bounty and vulnerability management platform YesWeHack, along with the DOJO platform, an innovative tool dedicated to training and learning hacking skills.

This presentation provided a comprehensive overview of a rapidly growing method that has become essential for anticipating and countering cyber threats.

JOP 2024: Securing an Unprecedented Event

The 2024 Olympic and Paralympic Games posed a significant cybersecurity challenge. Bertrand Le Gorgeu, Program Manager for the Olympic Games and advisor to the Director General of JOP2024 at ANSSI, shared the behind-the-scenes of this long-term mission:

  • Five years of preparation: Anticipating and planning every aspect of security.
  • Key objectives: Understanding the threat, securing sensitive information systems, protecting sensitive data, raising awareness within the ecosystem, operational preparation, and establishing internal and external coordination.
  • Managing cyber threats: Although the threat level was intense, it ultimately turned out to be lower than expected and was manageable due to rigorous preparation. Among the incidents, Denial of Service (DDoS) attacks accounted for a significant portion of the reported downtimes.

This presentation highlighted the importance of strategic partnerships, coordination, and technical solutions to ensure the smooth running of such a large-scale event.

Meteorite Approach to DevSecOps

Jean-Charles Naud and Charly Collin, architects at Orange Cyberdefense, presented another view of the profession, showcasing their “Meteorite Factory”, which:

  • Optimises the flow from creation to deployment.
  • Automates the value chain while facilitating collaboration among development teams, automation, operations, and security.

This evening would not have been possible without the generosity of our speakers. Their sharing of expertise enriched the conversation and inspired tomorrow’s talents. A big thank you to them, as well as to the students who continue to show up in full force.